Archive for May, 2020

Advance Marketing


Due Tuesday 3/10/20 by 10pm eastern time 
Instructions

Marketing Plan: Part III

Throughout this course, you have been compiling a comprehensive marketing plan using one of the product/service scenarios listed in the Unit II assignment. (Note: You should have been using the same scenario for Parts IIII.) 

This units submission should consist of the items listed below. 

  1. Product 
    1. This section of the marketing plan should include a description of the products and services offered to the consumer. Remember that this product section should also identify services, warranties, and installation features. Additionally, brand, logo, and other identifying characteristics should be discussed in this section as they encompass part of the product offering. 
    2. Examine whether your company has a competitive advantage relative to its product offering (i.e., only address the product here). 
  2. Place 
    1. This section of the marketing plan should explain the entire distribution channel (see Unit VII Lesson). As a reminder, this is the flow of the product from the manufacturer or creator of the product/service to the final consumer (the entire processnot just the retailer at the end of the process). Describe a physical facility associated with your company. This can be a unique manufacturing or distribution center, retailer, or even a merchandising technique. The idea here is to describe what it looks like to the consumer and the value that this atmosphere brings to the buying experience. 
    2. Examine whether your company has a competitive advantage relative to its place offering (i.e., only address place or distribution here). 
  3. Price 
    1. This section of the marketing plan should describe the pricing strategies used by your company. Include theoretical aspects of pricing (see Unit VII Lesson) in your discussion here. 
    2. Examine whether your company has a competitive advantage relative to its pricing strategies (i.e., only address pricing here). 
  4. Promotion 
    1. This section of the marketing plan should address the promotional methods used by your company. This should not only include social media/Internet marketing but also traditional marketing and advertising used (e.g., personal selling, advertising, sales promotion, publicity). 
    2. Examine whether your company has a competitive advantage relative to its promotional strategies (i.e., only address promotion here). 

Ensure you provide an introduction for this assignment that is engaging and provides a clear background to the purpose of the assignment. The format of the submission should be in essay format using subheadings. Use APA format. Additionally, you need to include a minimum of five sources, three of which must be peer-reviewed, academic sources that are no more than 5 years old. The submission should be a minimum of three pages in length (not counting the title and reference pages).

Problem Solving

 When faced with a problem, what do you do to solve it? This assignment asks you to apply a six-step to problem solving process to a specific problem scenario. You will write a paper that presents a synthesis of your ideas about solving the problem using this systematic approach. As Voltaire said, “No problem can withstand the assault of sustained thinking.” 

  

Your child comes home from school with an assignment sheet for a school project. He / she is very excited about the project and begins work immediately, doing research on the Internet and gathering materials. You read over the assignment sheet and notice that your child is not including all of the required items in the project, and you have some ideas for how to improve the quality of the presentation. You recently read an article in a parenting magazine about the importance of a child developing responsibility for his/ her own learning. You recall the many ways in which your parents took over your school projects. You, on the other hand, want to encourage your child’s confidence in his / her ability to complete a project independently. The next day, you are at the grocery store when you see a parent of a student in your child’s class. That parent has spent over $30 in supplies for the science project and is taking a day off of work to put the pieces of the project together. 

Review the six-step problem solving process outlined in the webtext, based on the article “The Problem Solving Process” located at :

  • Step One: Define the problem
  • Step Two: Analyze the problem
  • Step Three: Generate options
  • Step Four: Evaluate options
  • Step Five: Make your decision
  • Step Six: Implement and reflect

Write a four to five (4-5) page paper in which you:

  1. Define the problem in the scenario that you have chosen.
  2. Analyze the problem in the scenario.
  3. Generate options for solving the problem in the scenario.
  4. Evaluate the options for solving the problem.
  5. Decide on the best option for solving the problem.
  6. Explain how you will implement the decision made and reflect on whether this option was the most effective.

Responses Must Be Complete, Detailed And In APA Format.

1. Overall, how effective is the partnership between IT and the business at Hefty

Hardware? Identify the shortcomings of both IT and the business.

2. Create a plan for how IT and the business can work collaboratively to deliver the

Savvy Store program successfully.

Midterm Paper

What contribution do you think Facebook will make to news in the next 5 years? Are traditional news publishers losing control? Does Mark Zuckerberg have too much power? Or, is Facebook, Twitter and other platforms the digital ages answer to the printing press or TV transmitter as a means of distribution? (See Chapters on news in your book for references) Will the snackable nature of digital content lead to less news consumption or a greater awareness of what is happening in our world? 

The Nature Of Hacking Has Changed In Recent Years With The Change In Usage Of Computing Devices. How Has Hacking Changed?

 In the early days of hacking, the primary purpose of hacking was to disrupt the workflow of an organization, business or government. At the time, we had PC computers and mobile devices, smart phones and tablets were not in wide usage. Viruses, worms and Trojan Horses were the common types of malware. It was relatively easy to disrupt a person’s usage of computers by damaging the operating system which was stored on a hard drive. The operating system is copied from the hard drive into memory and runs from memory. Thus, a virus can be loaded in memory and change the files resident on the hard drive. This causes the PC to be unusable because the operating system has been changed. Current computing devices such as smart phones and tablets have the operating system “burned” into a chip and cannot be changed unless the chip, called a SoC (Software on a Chip), is rooted. Even though the operating system is burned into a chip it can be changed by erasing the code from the chip electrically (EEPROM) and reloading the OS into the chip. Now, most hackers are after information and would rather steal information to either use it for monetary gain or to affect the operations of the government. For example, ransomware is currently the most dangerous type of malware in existence. The hacker can encrypt an organizations data and then blackmail them to provide the key to decrypt the data. Hackers will steal medical information to scam Medicare. Other hackers will steal emails to embarrass political opponents.  

Minimum of 7 to 8 pages and 6 references. The page count does not include title page and reference pages.  Please use the 7th ed. APA student paper formatting for your research papers.  Be sure you have an introduction and a summary with appropriate topics in between.  One final note, I do not like direct quotes (copy and paste) from your sources.  You should research your topic, read the references and then paraphrase your sources.  You are still required to cite your sources.  Every reference requires a citation within the body of the paper and every citation requires a reference.  

suppression project

Design and Analysis of Special Hazard Suppression and Detection Systems Using Standard Requirements

A museum archive houses various artifacts and papers. A traditional sprinkler system will not be acceptable due to limited water availability on the property. You need to:

Select an appropriate special hazard system; explain why it is the best choice
Using the relevant NFPA standard, identify the variables that you need to know in order to design the system
Identify the different components that are needed for a system
Obtain exemplar cut sheets for all of the components
Discuss the limitations of the system that you chose

I’m International student. Grammar can be okay that not complete.

Accounting and Auditing

Description
The website of The Tennessee Comptrollers Office gives the appearance of transparency. There one can find an invitation to see how the office is fulfilling its mission as well as a plethora of audits on various state organizations.

http://www.comptroller.tn.gov/

Listen to the video of the Tennessee Office of Open Records Counsel Public Hearing in Nashville, TN.

https://www.youtube.com/watch?v=PylAhlelbwI (1:18:35)

Consider the following questions and be prepared to discuss in class:

Why is the comptroller of Tennessee holding a meeting?
What promises is he making?
How are the publics questions addressed?
What inferences can you make about the auditing practices in the Tennessee Comptrollers Office?

Finial Project

 

Phase I – Project Charter

Review the assignment requirements for the project/paper (Located under Course Home). You must address each of the areas in Phase I and upload your completed paper in Canvas. Please remember, a project charter is only a high-level overview and summary of the project. The template you’ll use for this assignment can be found via the below link or in the Course Files (title: Phase 1 – Project Charter). Use the headings in the rubric to organize your paper, but be sure that your narrative under each heading is a written paragraph(s), not bullets.

Discussion

  • Assignment Guidelines
    After deciding on the topic for your researched argumentative essay, locate at least three credible sources in the South University Online Library. (You may include more if you like.) Take notes on your sources, following the methods outlined in the Week 3lecture about note-taking. For each source, note the main idea, evaluate the credibility of the author, and consider how the text relates to your topic. Remember to create your references as you search for use in the bibliography and locating the articles again when you begin writing the essay.
    Steps to Take
    1. Draft a references page in APA format.
    2. Include at least three sources.
    3. After each reference entry, provide a paragraph about the source, including the following:
      • Summarize relevant information from the source.
      • Evaluate the credibility of the author.
      • Explain how the source relates to the position you plan to argue in your research paper.
      • View some .
        Here is help for
        Peer Response Guidelines
        1. Assess the utility of the sources your peer has located on his topic. Do they seem authoritative?
        2. Are the sources sufficiently varied to cover both perspectives on the topic being examined?
        3. Help your peer with APA style in terms of formatting references, in-text citations, and any other aspect of APA style.

Nursing Research

 

PICOT is utilized by the health care community to identify and study a nursing or medical practice problem. Consequently, PICOT examples that may provide insight into the use of the PICOT process, may not be relevant to nursing practice as they are based on a medical practice problem.

Describe the difference between a nursing practice problem and a medical practice problem. Provide one example of each. Discuss why is it important to ensure your PICOT is based on a nursing practice problem.