Get help from the best in academic writing.

Personality and clinical assessments

Although it is no longer in use (due to some changes in the DSM-V), what is or was the value of the multiaxial system of diagnosis? How does the DSM-V work in school counseling? As a future clinician you will be able to diagnose your clients. What are your thoughts regarding the importance of this function and its use in clinical assessment. Support your view points with research. (minimum 250 words)
Marketing Assignment Assessment 1.B Akshay Rai Positioning Maps The first positioning map is a comparison between my hotel ‘The Rai Hotel’ and the top three main competitors in the area which are The Hilton Hotel, Sky City Grand and The Langham. Sky City Grand sits on the top as it is the highest price because of the facilities they offer such as the Sky Tower and Casino. Just under is The Rai Hotel as the price and quality is more balanced than Sky City Grand because although there is less facilities than Sky City. Just under is The Hilton and The Langham, the Hilton is more expensive but the Langham is of higher quality. The second positioning map is of accommodation types in general around Auckland. 5 Star hotels are the highest price and best quality then slightly under is serviced apartments, the price is more expensive for the location because living in central Auckland is very expensive. Just under are the 4 star hotels with the price still slightly high because the quality is high and 3 stars the price is average and the quality is average. Description of market research method with advantages and disadvantages I choose the Quantitative research methodology to conduct primary research to find out if the Wi-Fi in The Rai Hotel is up to our guest’s satisfaction and standards. I know this information is not already out there. I have organised a survey to research the chosen area I have decided to study. There are survey sheets in 400 out of the 500 rooms there is in the hotel. The guests will fill out the surveys before they depart from their stay from the hotel and housekeeping will collect them once finished. The 100 remaining rooms in the hotel there are instructions left for the guests to do the survey online and also left the survey sheet. We have done this because we also wanted to research what is the ratio of our customers would prefer to do things electronically rather than on paper. Once I have collected the results I analyse the finding I have received and found out that 219 rooms of the 400 have been completed and 37 rooms did the survey electronically and 12 did the survey on the paper. (Wright, 2014) Advantages of Quantitative Research: Less expensive than some other methods such as doing a phone or interview survey. It is fast and efficient, since the questions are simple and easy to answer. The results can be administered online from the online survey we provided. The answers from the survey as usually just yes and no, so the answers are easier to coordinate for researchers. The survey is anonymous so it is more likely for people to participate. (Wyse, 2012) Disadvantages of Quantitative Research: You need large numbers of participates involved to fill out the survey. There also can be sampling problems and answers cannot be followed up due to the anonymity. There is limited flexibility of the questions and there can be misinterpretation of questions by the participates, i.e. non English speaking guests. (Wyse, 2012) Questionnaire Is the speed of the Wi-Fi up to you’re satisfaction? Was the Wi-Fi easy to set up on you’re electronic device? Do you think the coverage of the Wi-Fi is good around the hotel? Was free Wi-Fi a factor of you choosing to book with us? Are you interested in unlimited internet or are you happy with 1GB a day? Explanation of MIS and examples MKIS stands for “Marketing Information System” is a system that allows the effective storage of data in a system on a computer, for example excel. The data can be used at any time, also anywhere for the managers to use. Computers are the core aspect of MKIS because all the data is stored on there. Having all the data about various information around the hotel, managers can make effective factual decisions. (Hatlett, 2010) Four Components of MKIS are Internal data, Marketing intelligence (External environment information), and Marketing research that all go towards the Storage and analytical processing system (Computer
HAZCOM Training Presentation, Powerpoint presentation, health and medicine homework help.

HAZCOM Training Presentation
The 2012 revision to the Hazard Communication Standard requires that employers train workers on the GHS-compliant hazard warning labels and safety data sheets. (See 1910.1200(h)(3)(iv). Using Appendices C and D of the current standard as a resource, develop a 7-10 slide PowerPoint presentation that can be used to train the employees at your workplace or a workplace you are familiar with. Include examples of the hazardous materials found in your selected workplace in the presentation.
When creating your presentation, be sure your explanations and discussion are in plain language and at a level suitable for your target workforce–do not simply quote the standard. Additional resources can be found at OSHA’s Hazard Communication Page: http://www.osha.gov/dsg/hazcom/index.html
Information about accessing the Blackboard Grading Rubric for this assignment is provided below. BOS
HAZCOM Training Presentation, Powerpoint presentation, health and medicine homework help

Complete Short Social Theory 375 Word Discussion ASAP…NEED IN 30 MINUTES

Complete Short Social Theory 375 Word Discussion ASAP…NEED IN 30 MINUTES. I’m stuck on a Social Science question and need an explanation.

I NEED THIS DISCUSSION VERY QUICKLY…YOU WILL SUMMARIZE THE TWO PASSAGES I WILL ATTACH
IT IS DUE IN 45 MINUTES, SO I NEED THIS VERY FAST PLEASE WITH NO PLAGIARISM AT ALL
I WILL UPLOAD THE PASSAGES ONCE THE TUTOR IS CHOSEN

INSTRUCTIONS:
Reflection Assignment –LET’S REFLECT ON THESE WONDERFUL THEORY READINGS!
You will write 375-750 words (not including the reference page) to reflect on two of the theoretical readings for each week. Please note that you should not use the Lemert introductory essays or biographies as one of your readings. You should be reviewing the highlighted theorists’ works. You will also submit this on Turnitin to double-check for plagiarism.You must be at 15% similarity index or lower. The paper should be submitted in a Word format – .doc or .docx.
For EACH OF THE TWO excerpts that you select for this week, you will need to provide a short summary (125 words each) in your own words for that excerpt of what you think are the author’s main point/s or argument/s. Please note that both of these summaries will need a short quote (40 words or less) from the excerpt that corresponds with it. Finally, after you have completed the two excerpt summaries, create a different section and discuss how one particular excerpt has implications in everyday life. Here you can relate it to aspects of your own life or modern life, in general. You will need to have a reference page where you should list the two excerpts that you covered in your reflection in APA format. Look below on this rubric to see exact style. PLEASE NOTE: The small letter after the year is only used when you have multiple excerpts by same author and they are alphabetized by excerpt title. Otherwise, reference page is in alphabetical order by author’s last name.In addition, please note that one point will be deducted for all writing issues. One word of caution: Do not over quote (i.e., use more than a line or two of quotes in the whole paper).
Complete Short Social Theory 375 Word Discussion ASAP…NEED IN 30 MINUTES

I want answers for below 3 discussions , each in separate word document with 350 words each

help writing I want answers for below 3 discussions , each in separate word document with 350 words each. I need support with this Management question so I can learn better.

Discussion 1 :
Discuss how the marketing mix will vary in relationship to the offering of a service and of a product.
Discussion 2 :
Discuss the notion that firms should stop doing business with customers who constantly generate losses versus the notion that the customer is always right.
Discussion 3 :
Select a problem that a firm might have bringing out a new product or service and discuss how the firm could overcome that problem.
I want answers for below 3 discussions , each in separate word document with 350 words each

Network Security and Its Importance in Computer Networks Report

Introduction Network security is an intricate topic traditionally handled only by professionally trained and experienced persons. Yet, as more and more individuals become connected through computer networks, a rising number of people need to comprehend the fundamentals of security in a networked environment. In the domain of networking, network security comprises of provisions and guidelines established by the network administrator to curb and monitor illegal or unauthorized access, misuse, alteration, or denial of the computer network and other network-based resources (Stallings 2010). Network security comprises of a range of computer networks, both private and public, that are employed in day-to-day tasks such as carrying out business transactions and communication among firms, public and private institutions, enterprises, and persons. Network security does just as its name goes, protects the network and manages all processes being done on the network. Objective The objective of the paper is to expound on network security and its importance in computer networks. Background information on computer networks will also be provided as well as risk management, network threats, firewalls, and hardware and software devices that can be used to improve the security of a computer network. Introduction to Computer Networks An elementary comprehension of computer networks is essential in order to understand the codes of network security. A network is any set of interconnected lines, basing this definition on the current topic, a computer network is basically a set of linked computers. Networks enable users to share resources and information, and are classified base on a variety of protocols (Network Security Threats 2011). For instance, a classification based on the connection manner focuses on the hardware and software systems used to link the individual computer units, such as optical fiber, wireless connection, or coaxial cable communication. Networks can also be categorized on scale, this gives Local Area Network (LAN), wide area Network, virtual Private Network (VPN), among others (Stallings 2010). Networks are made up of ‘nodes’, which are the individual computers in the network, and at least one server and/or ‘host’ computers. The nodes are linked together by communication systems, which may be private, such as that within an institution, or can be accessed by the public, such as the internet. Several private networks also use the internet. Get your 100% original paper on any topic done in as little as 3 hours Learn More The moment a computer network is instituted, it immediately becomes vulnerable to network security threats such as viruses and bugs that may affect the normal functioning of a computer. Besides, the personal information such as usernames, passwords, credit card numbers and other critical information may be at risk if the computer does not have adequate security measures. There are very many threats in a network, some of which are so severe and can bring down a large network consisting of thousands of computers. Virus In the domain of computer networks, a virus refers to a computer program that can replicate itself, similar to the biological virus. A computer virus spreads from one computer to another through an executable program that attaches itself on programs, files and folders. It can spread through various means, for example, if one computer in a network becomes ‘infected’ with a virus, the rest of the computers in the network may become infected too if the security features are inadequate. It can also be spread through USB devices, CD, DVD, or portable had drives. A computer virus may also spread by mailing a web address link to all addresses so that when a person clicks on the message to go the website, the virus enters this new computer. Certain viruses are less harmful, however, some are very harmful and can infect a computer in the network through various ways (Simmonds 2004). A virus can corrupt the files or software in a computer. Others may attack the computer hardware and bring the whole computer down. Yet, some viruses may allow a person to have partial control of a computer, this allows for unauthorized access to files and critical information stored in the computer’s hard drive. Although the Windows platform is by far the most vulnerable, other operating systems can also be attacked by viruses. Network threats arising from viruses can be managed through various ways, however, the most common technique is to install an antivirus software. UNIX-based systems such as Mac OS and Linux are far more secure than Windows. Some anti-virus programs can scan file contents and even zipped folders while some can also scan sent and received mails, a practice known as ‘on-access scanning’ (Simmonds 2004). We will write a custom Report on Network Security and Its Importance in Computer Networks specifically for you! Get your first paper with 15% OFF Learn More Vulnerability to viruses can also be reduced by carrying out data backups regularly on storage media that are not connected to the network or computer. Security patches availed by software manufacturers can also assist in reducing attacks by viruses. Secondary storage media must be scanned before opening in the host computer. Malware Malware, short form of malicious software, is a program created to interrupt normal computer operations or deny a user network or computer resources, gain partial control of the computer, access files stored in the computer, gather network-based information such as passwords, and other cruel or dishonest behavior (Curtin 1997). Malware consists of a large number of malicious programs that includes viruses, Trojans horses, worms, spyware, false adware, rootkits and other malicious programs. In 2009, malware was listed as the second most dangerous threat to computer networks. Today, millions of malware are created daily to exploit networks with weak security features. Threats arising from malware can be removed using antivirus programs. Most antivirus have an added feature of removing various malwares from the network of individual PCs. Besides, anti-spyware software can be used to prevent spyware threats. Denial-of-Service Attacks A Denial-of-Service (DoS) attack is a practice aimed at making network resources unavailable to some users. This vice entails the resolute efforts of a person or group of persons to prevent an internet site or service functioning normally or bringing it down altogether. This network threat is commonly committed against websites or services hosted on high profile internet servers such as financial institutions and credit card payment services (Stallings 2010). One mode of attack involves flooding a web server with requests in such a way that it cannot respond to legitimate communication requests, or responds in a sluggish manner that virtually renders it unusable. In general, DoS attacks are executed by either compelling the targeted systems to reset, or using up its resources so that it is unable to offer the intended services. DoS attacks are perhaps the most malicious and hardest to prevent or manage. They are the most malicious due to the ease with which they can be launched and the difficulty of tracing their origins, and it is difficult to deny the requests of the attacker without also blocking out genuine requests for service. DoS attacks can be prevented through various ways. The first technique is to use firewalls. Firewalls have simple instructions of blocking or allowing certain IP addresses, or ports, however, firewall are not very effective in some DoS attacks as they cannot distinguish legitimate traffic from DoS traffic. Switches and routers can also be used to prevent these attacks (Kizza 2006). Intrusion-prevention systems (IPS) have been successfully used to halt DoS attacks that have signatures attached to them. Not sure if you can write a paper on Network Security and Its Importance in Computer Networks by yourself? We can help you for only $16.05 $11/page Learn More Unauthorized Access This is a very wide terminology as it can refer to various types of attacks, however, the objective of these attacks is to access some information that the computer or server is not supposed to reveal. Unauthorized access to a computer or server can be achieved by using viruses, malware and other malicious programs. This form of threat can be waded off by using antivirus programs and security patches. Another strategy used by intruders to access a computer on a network is a technique known as packet sniffers. Packet sniffers can be used on a vulnerable network and they just ‘listen’ on the server for words such as password or login in the packet stream, then sends the information thereafter to the perpetrator. This way, an intruder is able to obtain usernames, passwords, credit card information and other critical information from unsuspecting users (Bragg et al 2010). This type of threat can be prevented by using clear-text passwords, besides, data encryption can help divert such attacks. When using a wireless network, it is advisable that one should use a long or complicated password, also, it is advisable that the strongest security supported by the wireless connection hardware should be used, such as encryption tools. Passwords can also be changed regularly. General Methods for Preventing Network Attacks and Reducing Vulnerability on Networks The most commonly used technique for reducing network threats is the installation of antivirus programs. These programs must be regularly updated and security patches and updates installed. Improving the security of the network infrastructure can also involve switching on features that enhance network security on switches, routers, and other hardware (Fadia 2006). These security features ensure a secure connection, enhance perimeter security, prevents intrusion, protects identity services, and general security management. Fixing intrusion detection systems and firewalls offers protection for most areas of the network and allows for a safe connection. Working on a virtual private network (VPN) can also enhance security. VPNs provide network access control and encryption services. Network security can also be improved by undertaking regular network security audits. A network security audit simply means that an expert comes and examines the security of the network, he also checks for loopholes that may be used attack the system and fixes them. The audit can go beyond an inspection of the computers in the network and may comprise a site assessment of the physical security of the organization. A network security audit fixes an organization security flaws in the network and makes it difficult for perpetrators to attack the network (Network Security Threats 2011). Since network threats come in a variety of forms and cannot be totally eliminated, it is advisable that secure updated data backups should be kept on systems that are detached from the network. None of these strategies will singly eliminate the threats arising from a network connection, but when they are used together, they can be exceedingly effectual at keeping a network safe. Besides, well –thought-out organizational policies can be effective at preventing unauthorized access to critical and parts of the network. References Bragg, R., Rhodes-Ousley, M., Strassberg, K. (2004). Network security: the complete reference. New Jersey: John Wiley

case study economics

case study economics. I’m studying for my Economics class and need an explanation.

This Assignment must be submitted on Blackboard (WORD format only) via the allocated folder.
Email submission will not be accepted.
You are advised to make your work clear and well-presented; marks may be reduced for poor presentation. This includes filling your information on the cover page.
Assignment will be evaluated through BB Safe Assign tool.
Late submission will result in ZERO marks being awarded.
The work should be your own, copying from students or other resources will result in ZERO marks.
Use Times New Roman font 12 for all your answers.

case study economics