Get help from the best in academic writing.

Read the attached case description of Monaca and her family. Based on the data provided, answer the following questions

Read the attached case description of Monaca and her family. Based on the data provided, answer the following questions. Read the attached case description of Monaca and her family. Based on the data provided, answer the following questions one at a time in the order they appear. Include the question above each answer. Be sure to save your document in a Microsoft Word compatible format, use double spacing throughout and 12 point font, title page, number each page, and a reference page is needed. Your answers will be evaluated according to how completely you incorporate concepts and strategies covered in the course. It may take a full page to answer some questions. Take time to thoroughly answer each question in narrative form with supporting rationale for your choices. 1. How would you go about the process of developing a supportive working alliance with this family? 2. Identify the 3 most relevant CASSP principles you believe will guide how you work with this family. Discuss how you would demonstrate adherence to each of these principles. 3. The parents have different parenting styles. Explain the advantages and disadvantages of these styles with respect to the four parenting functions. 4. Identify 2 goals that you imagine the family would like to work on. Explain why these goals would be important to this family. 5. Discuss the skills and resources the family would need to develop in order to reach their goals. Be sure to identify both formal and informal supports that would help the family members achieve their goals. Discuss how strengths of family members have informed the plan you have devised. 6. Points will be deducted for not following APA format and guidelines. Read the attached case description of Monaca and her family. Based on the data provided, answer the following questions
Base on the requirement and case study, finish the assignment. I need help with a Science question. All explanations and answers will be used to help me learn.

https://www.ncbi.nlm.nih.gov/pmc/articles/PMC4714754/

Identify your client and their goals
Assess the analysis they would like to purchase.

Purpose
Claims
Cost
Persons doing the analysis

Refer to the paper below and additional literature
Determine your professional opinion
Argue your opinion with references at least 3-4 points.
If you do not support your client’s idea, then offer a suggestion for another course of action.
Your video must introduce your client and the analysis they are asking your opinion on.
Your video must include references in the video and a comprehensive reference list at the end of the video.

Base on the requirement and case study, finish the assignment

University of South Africa Social Determinants of Health Research Paper.

This week, we are talking about social determinants of health and health inequities. Therefore, in your response to the week one RB, discuss the health issue presented by a peer and evaluate how the social determinants of health can expand the discussion based on the concepts discussed in chapters 2 and 3. Your discussion should focus on one of the two prompts below:The burden of that disease or health issue and trends in a specific country, orThe role of education and socioeconomic status (as a social determinant of health) in the distribution and impact of that health issue.For this assignment, you are expected to search your classmate’s topic and find at least one reference that you can incorporate into the discussion that supports your position and thesis statement. You are expected to write at least two paragraphs of content and provide at least one example that you found through your own independent research/web-searching. Remember to clearly define your terms and concepts from the course materials to receive maximum points.Although your response can be shorter than the original post, remember to present a cohesive argument with a thesis statement, several supporting sentences with examples/data for the thesis, and a concluding sentence or remarks. You are required to cite at least one scholarly reference. You may use your textbook but not as the required source. Your scholarly source must be from a reliable, credible (or peer-reviewed) reference. For additional information about references, see the tutorials in the “What is a scholarly source?” under the Resource Guides from the main course menu
Peer DiscussionOpioid EpidemicOne of the leading factors contributing to opioid abuse is the over prescription of opioid pain killers. Since the turn of the millennium, the percentage of abusers below the age of 25 has declined significantly, in the United States. However, the abuse has plagued those over the age of 50 since then. Heavy dosages of Opioids can produce a psychoactive effect altering the users respiratory system, which can lead to overdose due to respiratory failure. In order to save our fellow human suffering from Opioid dependency issues, WHO makes a few recommendations, including but not limited to, a slow approach when introducing opiates as a pain reliever, a range of treatment options, and Naxolone being readily available to those with high probability of encountering over-dosage. Hence, the opioid crisis is a global health issue that lends the opportunity for improvement for all civilians, bystanders, doctors, and dependents. The Opioid crisis is at an epidemic level in the United States, according to the National Institute of Drug Abuse and The Washington Post. Doctors and practitioners throughout Europe are keen to routinely monitor patients prescribed Opioids, and their approach is typically holistic, with longevity of quality of life in mind at all times. A regimen of attention paid to effects of physical, mental, and emotional distress could lead to a decreased dependency on mind altering pain medication. In some cases, a neurological effect is the only way for a patient to feel relief. A universal database, accessible to medical doctors and pharmacists internationally, could be created and utilized to ensure patients do not obtain multiple prescriptions, possibly leading to their demise or unregulated distribution to those without prescriptions.There are a range of risk factors for Opioid users. Some may encounter medical bills that are beyond their financial capabilities, so cheaper alternatives such as heroin, with its common derivatives: Fentanyl, and Carfentanyl are known to lead to death via overdose due to their high powered, non-regulatory nature. Those who live in the same household or have access to one with an Opiate prescription are under prospect of an opioid related overdose. Some under the same roof as one prescribed may find themselves curious of the effect of such drugs, not recognizing their strength, resulting in their accidental demise. Many are making strides to assist those who have fallen victim to Opioid dependency. Specifically Methadone clinics throughout the globe are offering a pain relieving substitute that can be taken to gradually decrease reliance for those over-using Opioids in a safe manner. Italy offers Naxolone, branded as Narcan and Evzio, over the counter to anyone who would like to purchase the drug offering emergency overdose-reversing effects. In all other countries either a prescription or medical license is necessary to obtain such drugs. Regardless, researchers have created a solution to reversing the effects of an Opioid related overdose. Opiates are available globally and are a business forefront for many countries. The continued prescription of Opioid encompassing drugs encourages the well-being of such economies. Being in an opioid epidemic state, especially in the United States, leaves the nation with plenty of room for improvement. Prescribers need to create a long-lasting initiative to monitor patients usage of strong drugs. Doctors need to ensure the gradual enhancement in prescriptions, and they need to digress upon all possible options before continuing to over-prescribe. Bystanders should recognize and respond to the risk factors to assure safety of their fellow human to their best ability. Together, this epidemic can be managed, and communities will grow stronger with a dedicated effort. Davidson, J. (2018, May 25). Unseen face of the opioid epidemic: Drug abuse among the elderly grows. Retrieved January 18, 2019, from https://www.washingtonpost.com/news/powerpost/wp/2…Information sheet on opioid overdose. (2018, August 21). Retrieved January 18, 2019, from https://www.who.int/substance_abuse/information-sh…National Institute on Drug Abuse. (2019, January 14). Opioid Overdose Crisis. Retrieved January 18, 2019, from https://www.drugabuse.gov/drugs-abuse/opioids/opio…
University of South Africa Social Determinants of Health Research Paper

DNA Lab Report | Example

DNA Lab Report | Example. ABSTRACT: At the Dolan DNA Lab Center, an experiment was conducted to investigate Alu gene insertion on two alleles at the PV-92 Locus on Chromosome 16. Twenty two students participated in the research in the laboratory. Students washed their mouth with saline solution to extract their DNA sample and gel electrophoresis was used to find their genotype. Six students were reported to have the Alu insertion present on both alleles; ten were reported to have Alu present on one allele and the rest were reported to have no Alu present on any alleles. This experiment was significant because it showed the diversity in the human gene pool. It also showed that majority of the human genome consists of non-coding DNA called “junk genes.” It was concluded that Alu insertion is most obvious among Asian population and less in non-Asian. The presence of an Alu on an allele indicates admixture between Asian and non-Asian population. INTRODUCTION: Alu genes are believed to be retrosposons that are restricted to the primate branch of the evolutionary tree. Scientists estimate that one million copies of Alu can be found in human, which accounts for 10% of the total genome. Alu are defective Short INterspersed Elements that encode no protein and depend on another intron in the genome called L1 for mobility. L1, which is Long INterspersed Elements, is much longer than the short 300bp nucleotides long Alu. For RNA transcription, Alu relies on the retrovirus, reverse transcriptase enzyme of L1, which has the unique skill of sequencing RNA bases to make complementary strands by cutting and joining the strand at a designated juncture. During transcription, complex molecules like RNA polymerase III binds to the box on the L-Alu and copies the RNA strand needed as a blue print for other Alu genes. Using reverse transcription, rt copies the information from the RNA template into a DNA strand to make a new Alu element. A DNA polymerase completes the transcription process by forming a new Alu element with repeating sequences on opposite sides of the L-Alu and the R-Alu elements. The experiment is performed by extracting DNA samples from donors. The DNA sample is placed in a Polymerase Chain Reaction. The PCR amplifies each DNA nucleotide using primers and Tag polymerase as reaction agent. A single DNA strand is denatured to single DNA nucleotides at a temperature close to 100oC. At a low temperature, primers binds to the complementary sequence on each nucleotide to be copied making it easier for the Tag polymerase to locate the targeted spot on the nucleotide. At a slightly higher temperature, Tag polymerase binds to the primers and make a copy of the targeted sequence on the nucleotide. The PCR cycle is repeated thirty times to have a good amplification of the DNA strands. The DNA sample containing the Alu elements is placed in gel electrophoresis to separate the copied DNA fragments based on their sizes. Although the sample containing the DNA fragments is colorless, scientist adds a blue dye to determine the location of fragments as they move through the gel. In the gel, the DNA strands are separated by length, stained with purple dye, and illuminated with Ultra Violet light. Alu is a Short INterspersed Element of length 300bp. The location of SINEs of length 300bp on maternal or paternal alleles indicates the presence of an Alu gene. The experiment, if performed on donors’ alleles from different regions of the world, can explain diversity within a society, and the history of human migration. Scientists concluded that the frequency of finding Alu on paternal of maternal alleles is higher for an Asian and lower for a non-Asian. The presence of Alu on an allele in a non-Asian society can indicate identity by descent. METHODOLOGY: The experiment was performed using saline solution, chelex, polypropylene paper cup, micro pipet, micro centrifuge, thermal cycler, and primer. The micro pipet tips were described based on the colors of their ejectors: yellow represent 200 micro liter, light gray represent ultra micro liter, and dark blue represents 1000 micro liter. The students washed their mouth with 10ml saline solution to extract cells from the mouth. The DNA sample were spat into a polypropylene cup. A blue pipette was used to transfer 1ml of sample into 1.5ml plastic tube. The tubes were placed in a centrifuge for the cells to be thoroughly mixed for one minute. After the tubes were removed from the micro centrifuge, the supernatant that accumulated on the surface of the cell pelex were poured into a propylene cup. Then a micro pipette was used to mix the remaining supernatant with the cell pelex by pipetting in and out. The yellow pipette was used to withdraw thirty micro liter of the solution containing the cell pelex suspended in supernatant and put into 100 micro liter of chelex. The solution was shaken before it was placed in a thermal cycler. In the thermal cycler, the sample was boiled for ten minutes at 99oC to open the cells, cooled, and then spun for 1min in a centrifuge. The initial amount of 30 micro liter of supernatant was drawn into a 1.5ml plastic tube used for the Polymerase Chain Reaction part. Before the Polymerase Chain Reaction, the yellow pipette was used to draw 22.5 micro liter of PV-92 primer into a Ready-to-Go PCR bead tube. Then the gray pipette was used to draw 2.5 micro liter of DNA sample from the prepared supernatant. The tubes were numbered and the PCR was set for thirty cycles. RESULTS: The experiment was successful. Twenty two students participated in the experiment and all but one results were shown. A [ , -, – – ] sign was to indicate the presence or absence of an Alu element on an allele. Out of the twenty two students that participated in the experiment, six were reported to have the [ ] sign on the chart, which indicates the presence of Alu elements on the paternal and maternal alleles; ten students were reported to have the [ -] sign on the chart, which represents the presence of the Alu elements on one of the parental alleles; eleven out of the twelve remaining students were reported to have the [- -] sign on the chart, which indicates the absence of Alu on the parental alleles; one result was not shown. Alu is approximately 300bp long; any element that is more than or less than 300bp is not considered an Alu and indicates the absence of Alu on an allele. Literature Cited http://ezproxy.library.nyu.edu:2094/hww/results/results_single.jhtml;hwwilsonid=EEXHO0FPVUG33QA3DIKSFGOADUNGIIV0 http://ezproxy.library.nyu.edu:2063/stable/pdfplus/2366323.pdf http://ezproxy.library.nyu.edu:2094/hww/results/getResults.jhtml?_DARGS=/hww/results/results_common.jhtml.33 http://www.ncbi.nlm.nih.gov/pmc/articles/PMC1274485/?tool=pmcentrez DNA Lab Report | Example

University of Washington Salsa Music as Expressive Liberation Responses

write my term paper University of Washington Salsa Music as Expressive Liberation Responses.

Have clear identification of the author’s main point(s), with specific examples of supporting evidence from the reading/film. Simply writing “I liked this reading” or “I disagree with the film” is NOT sufficient—be more specific! What points and evidence in particular did you find informative, convincing, or moving?Relate to any class material we’ve covered on the topic (i.e., lectures, textbook, listening examples)Cite all outside sources accurately and consistently (this includes the article/chapter/film you are summarizing, as well as your textbook). You are free to use a citation style of your choice as long as you’re consistent for the assignment. Post two replies to other students’ original, main posts in the same discussion assignment thread Be PoliteAddress the person to whom you are replying by nameDemonstrate thoughtful engagement with your classmates’ posts (i.e., responses that indicate you have carefully read your classmate’s post and thought about their analysis/argument). This could be in the form ofquestions for your classmate, suggestions for further consideration, or your own insights. We encourage you to respond to questions classmates may ask about your original post. Responses such as “I watched this to and thought it was really interesting!” are not sufficient. How discussion-based assignments are graded:-0.5 for each missing citation-1 for each of any of the following:Lack of identification of the author’s main point(s)Lack of specific supporting evidence or points from the reading/filmLack of connection to other class materialsUnclear due to significant spelling/grammatical errorsUnder 200 wordsReplies that do not demonstrate deep engagement with your classmates’ posts (e.g., only writing statements like “I agree with your post,” “great job on your post,” or “I liked this reading too” are NOT sufficient. Be more specific!)
University of Washington Salsa Music as Expressive Liberation Responses

Good And Bad Points Of Biometrics Information Technology Essay

Biometrics have a wide range of applications in the real world, the main uses being data gathering and security. Biometrics can be invaluable tools in preventing identity theft or unauthorised access to data or to a physical location. The increase in security comes from the fact that biometrics are extremely difficult to forge and the characteristics used are mostly unique to each individual, theoretically resulting in high levels of security. Sir Francis Galton calculated that the chance of two people having the same fingerprints were “1 in 64 billion” about 10 times the population of the entire planet Biometrics are increasingly being used in everyday life, for example some schools are using fingerprint scanners to restrict access to certain areas of the school and to take register of attendance. This is a fool proof way of recording pupil attendance as there is no possibility of someone being signed in who is not actually present. There are two main types of biometrics- behavioural biometrics and physical biometrics. Behavioural biometrics refers to individual traits that have been developed over time such as voice recognition and speech analysis as well as other traits such as a person’s written signature. Physical biometrics refer to the bodily/external traits unique to each person such as finger prints or retinal/iris recognition. Behavioural biometrics are used for verification purposes while physical biometrics can be used for identification and/or verification purposes. There is a subtle difference between verification and identification. Verification involves checking a basic identity (e.g. ID number) and then taking a biometric template of the subject and comparing it to one stored in the database using a 1:1 matching algorithm. Essentially it is determining if a person is who they claim to be.1 Identification however is to establish a person’s identity solely using biometric measurements i.e. there is no basic identity like ID number, PIN etc. It works by taking a biometric sample and comparing it to the ones in the database until it finds a match or terminates. It uses a 1:N matching algorithm. Identification refers to determining who a person is. 1 1The main types of Behavioural biometrics are keystroke recognition and speaker identification(Any more). Keystroke recognition also known as Keystroke Dynamics () measures the characteristics of a person’s typing patterns. Two main measurements are recorded – dwell time and flight time. Dwell time refers to how long a key is pressed and flight time is the time between the previous key being depressed and the next key being pressed. The data is then fed into a unique neural algorithm which determines a primary pattern for future comparison(). The data needed for keystroke recognition is obtained using keystroke logging. Keystroke recognition is possible because some characteristics of keystroke production are as individual as handwriting or a signature(). The techniques used to determine the individualities range from statistical techniques to neural-nets to artificial intelligence(). Speaker identification or recognition is checking a user’s claimed identity using characteristics extracted from their voices(). It is different from speech recognition and voice recognition. Speech recognition is recognising what is being said not who is saying it. Voice recognition uses speaker identification to determine what is being said (speech recognition). It cannot recognise speech accurately from new users but can be quite precise with individuals which it has been trained with(). Speaker identification uses acoustic patterns that reflect anatomy, e.g. size and shape of the throat and mouth, and learned behavioural characteristics. Examples of learned behavioural characteristics are voice pitch, speaking style and accent. There are two phases to speaker recognition systems – enrolment and verification. Enrolment is where the user has his voice recorded and a number of features are extracted to form a voice print. In the verification phase, a sample of a person’s speech or an utterance is taken and compared against a previously created voice print(). Speech identification systems fall into two categories – text-dependant and text-independent(). Text-dependant systems record a pass phrase from a user during enrolment. This pass phrase must be spoken whenever using the system. The text for the enrolment and verification phases are the same. Passwords and PINs can be used for additional authentication(). Text-independent systems can have any text during enrolment and verification. The text does not have to be the same. This type of system does not compare what was said at enrolment and verification and hence, very often speech recognition is also used to determine what the user is saying at the point of authentication(). 2 There are four main types of physical biometrics – fingerprint recognition, voice authentication, hand/finger geometry recognition and facial recognition. Fingerprint recognition involves taking an image a person’s fingertips and recording certain characteristics. The main characteristics recorded are patterns, which are aggregate characteristics of ridges, and minutia points, which are unique features found within patterns(). Knowledge of the structure of the human skin and its properties are needed to create these technologies. Fingerprint recognition can be used from criminal investigations to time attendance systems, in a movie rental or in a police identification institute. (2) There are three common sensors employed in taking fingerprints – optical, ultrasonic and capacitance. Optical fingerprint imaging uses visible light to capture a digital image of the fingerprint. The surface layer of the sensor is called the touch surface and is where the finger is placed. Beneath this surface is the light-emitting phosphor layer which shines light onto the surface of the finger. Light reflected from the finger travels through the phosphor layer to a charge-coupled device which captures an electronic print of the fingertip. However the quality of the image is greatly affected by the state of the skin. If the skin is dirty or eroded the image is very difficult to capture accurately. This sensor can also be easily fooled by an image of a fingerprint if it does not have a “live finger” detector(). Ultrasonic sensors use very high frequency sound waves to penetrate the upper layer of the skin. The reflected energy is measured using piezoelectric materials. As the dermal skin layer has the same characteristic pattern of the fingerprint, the reflected energy can be used to form an image(). Capacitance sensors use two plates. One plate is of a parallel-plate capacitor and the other is the dermal layer which is electrically conductive. The epidermal layer is non-conductive and hence acts as the dielectric. Voice recognition was discussed before under behavioural biometrics. This can also be used as a physical biometric device if the text-independent system is used without any other forms of identification such as ID number. However it is slower that the behavioural version as it uses a 1:N algorithm for matching. Hand or finger geometry recognition uses characteristics such as finger length, thickness and curvature. This type of biometrics is less invasive and it is easier to collect the data. It can be desirable in access control situations such as border control. Although hand features are not descriptive enough, it is possible to attain a robust verification by combining various individual features. Facial Recognition(Need completing) Facial recognition uses characteristics derived from the subjects face to find a match with picture stored in a database using various algorithms. There are a number of different ways to achieve this. (There are two different algorithmic approaches/ways) Now that we have some insight into biometrics, the different types and how they work, we shall briefly discuss the good and bad points related to biometrics. Biometrics usually always result in the increase in security, whether for a small home laptop or for a large bank who hold personal data. The increase in the security comes from the fact that instead of using passwords or other software based forms of access, physical biometrics requires the user to physically interact with the system and use hardware to input a key, the key being the finger print, iris scan, face image etc. This further strengthened security can also be relatively inexpensive, depending on the type of biometric solution used. For example finger print scanners are very common nowadays and prices are decreasing. Security is increased due to the fact that everyone has a unique finger print or iris etc. and therefore forgery of these kinds of access methods is a difficult task. An advantage of physical biometrics is the prevention and elimination of threats caused by the loss of ID’s and passwords. The way in which biometrics eliminate this problem of lost passwords or ID’s, is that it uses physical input, which will always be on the user wherever they are and in addition they are mostly un-detachable from the user. So the problem solved here is that when passwords or ID’s were lost, they could have been used to gain unauthorised access in different ways, however the elimination of these reduces vulnerability. Some large organisations make use of long and hard to remember passwords which may cause difficulty of remembrance, however with the use of biometrics, users can be assigned to access the systems by the use of their biological credentials, eliminating the requirement of remembering a long password. Another advantage of biometrics is that it is possible to have a network of this technology, so that it can be incorporated into a whole organisation, allowing access to buildings and rooms with verification of a person’s biological data. This will allow a central system to hold biological data of all authorised users and allow access to rooms and buildings to which they have authority to do so otherwise blocking any access. In addition to this it is possible to record automatically information about who did what, where and when. So it is possible to log all accesses to different rooms by different users. Another advantage of biometrics is that it is a cost effective method. The reason it is cost effective is that it doesn’t require ID cards which incur costs for materials and printing, instead the user simply use their own biological data to access systems and buildings. Although biometrics seem like a good choice(contrary to popular belief), they do have major drawbacks. For example some forms of biometrics cannot be used in certain places. For example it is not suitable for people working in the Chemical industries(proof has been given at the end). Another disadvantage is that biometric technology does not have a 100% success rate and can result in false positives and negatives. For example the human voice changes as we age or it differs when we may have a sore throat or a cold, and therefore identifying a person by their voice when they are ill can be extremely difficult. Imagine you have a very sore throat and you have to go to work to finish something urgent but you are not able to get into your office because the system cannot recognise you. Some forms of biometrics only work under certain conditions and almost all biometric systems cannot adapt to change. Another example are individuals, who are affected by diabetes, have an effect which occurs within their eyes and therefore as a result, a biometric system may deny this individual access, due to the mismatch of data. Another disadvantage is that biometrics is a relatively new technology solution which is still in the process of being perfected and therefore certain forms of biometric authentication is rather an expensive solution, although this may not apply to finger print scanners, it does apply to iris scanning, or DNA checking or hand geometry checking etc. Following on from the fact that the technology is relatively new and still in the stages of being perfected, it may be impractical to use some forms in an organisation or system, since it may not be working to its best potential. The technologies used in biometric systems are rather complex, hence the reason for high costs for such systems. One major disadvantage is that such systems require large amounts of storage space, as each authorised persons data will be required to be stored so that it can later be checked. This can incur large costs and the requirement for an administrator who maintains this database of stored information. Leading on from this, biometric methods require the storing of personal data, and some users may find this intrusive and therefore may neglect use of such a system. In addition to data integrity, some forms of biometric identification may not be accepted by some people, for example some people may believe retinal scanning could be potentially harmful, and therefore they may choose not to use it. Another disadvantage is that some forms of biometrics do still have security issues. For example someone’s voice can easily be recorded and used to gain unauthorised access if the biometric method used was voice recognition. (rephrase) Biometrics is a new technology with huge potential. It offers a higher level of security which requires very unique data to gain access. Another point to consider is that with this technology ID cards and passwords will no longer be necessary and therefore this will result less fraud and unauthorised use of such identities and passwords. However we do believe there is one issue which will affect most of the population, this issue is the issue of personal data being stored on a database, which may for some be highly intrusive. On a few occasions the Government has already failed us by loosing data personal to use. Therefore what is to say that our biometric information stored on computer systems is not vulnerable to being “lost” or “misplaced” as has happened with other forms of data. Biometric data is highly security. If it is lost one cannot change their ‘password’. Biometrics is now being implemented into many different areas, and its usage is ever increasing. We will provide a few examples of where it is used currently in the UK. All new British passports will have a chip within them which contain biometric data, which holds information such as distance between eyes, nose, mouth etc. This will help prevent fraudulent passports which may be used for suspicious activities. About 4 years ago, the Government was considering issuing every British Citizen with an ID card which would hold biometric data of the person. However this operation was cancelled and will not be further pursued. Currently in the UK biometrics information is used for finger print checks on visa applicants at the border to ensure that the person entering the UK is the same as the person who applied to enter the UK. Biometrics have long been in use by the police force who keeps record of finger prints of previous criminals to help identify cases in the future.

Now that you have evaluated the marketing environment and established some marketing goals for MM, it is time to get started with the new product plan.

Now that you have evaluated the marketing environment and established some marketing goals for MM, it is time to get started with the new product plan..

I have also uploaded my previous discussion board and PowerPoint presentation along with some other helpful resources . Please include citations and references in a APA format. Primary Discussion Response is due by Friday (11:59:59pm Central), Peer Responses are due by Tuesday (11:59:59pm Central).Now that you have evaluated the marketing environment and established some marketing goals for MM, it is time to get started with the new product plan. The first step is to research the mobile phone market. Without knowing who is buying phones in certain market segments, Michelle won’t know how to market MM’s new product. She needs your help to determine who the market is for the new product.Primary Task Response: Read the dialogue below. Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.Michelle knows that MM needs to determine who the target customer is for the new product. She knows that marketing research needs to be done as part of this market segmentation and product development processes, but she is not well-acquainted with some of the details that are involved in the processes. She has stopped by your office to ask some questions.“Thanks for canceling your other meeting this afternoon,” she says.“No problem,” you say. “I rescheduled my meeting with multimedia; it actually works out better for them, too.”“I’ve heard about quantitative and qualitative research, but I’m not sure I really understand the difference between the two,” she begins. “I’m sure there are advantages and disadvantages to each of them, but without knowing, I’m not sure which type of research we need to conduct. What do you think?”Before you can respond, Michelle’s cell phone vibrates.“Excuse me, I have to take this,” she says.Michelle takes her call and then stands up.“Well, I’m sorry to do this, but I have an emergency that I have to deal with right now,” she says. “Would you do me a favor? Send me a memo that explains the two types of research and include brief explanations about the advantages and disadvantages of each as related to how they could be used by MM. I’d like to be able to speak intelligibly to this at the next board meeting.”“Sure,” you respond, thinking that this will make for a pretty lengthy e-mail. “I’ll also include how each method can help us define our target market. Will that help?”“Yes, great idea,” she replies.“Ok! I’ll get that to you by close of business tomorrow,” you say.
Now that you have evaluated the marketing environment and established some marketing goals for MM, it is time to get started with the new product plan.