East Georgia College Economics for Pubic Administrators Discussion

for my Economics class. I?m stuck and don?t understand. 1.Social media can play a big role in business communication if that is the form of communication that is used within the corporation. I feel that text messaging is not always the best form of communication towards employees and it is better to use other forms of communication. I have noticed that in the workplace social media can be a disturbance and can cause people to procrastinate on tasks. Agree or disagree within 2-3 sentences2.When trying to promote global competitiveness of firms in the U.S., there could be several different policies that would help. One of the issues is the tariffs trade barriers and nontariff trade barriers. A foreign country could use nontariff trade barriers such as dumping policies or import quotas in order to minimize the amount of trade from the United States. The U.S. can also implement the same strategies to allow their companies to perform well. If the U.S.Agree or disagree within 2-3 sentences

DHA 7002 Walden University Evaluate Characteristics of Systems Leaders

InstructionsThe work of those leading healthcare organizations is intense due to its dynamic nature, which is further complicated by the human element. Teamwork is vital, but someone needs to inspire the team!For this assignment, evaluate and discuss the health industry?s need for systems leaders.What are some of the common characteristics of systems leaders?Develop a leadership profile (managerial, professional, entrepreneurial, and personal qualities) of a fictitious health industry leader who has utilized systems thinking.

CU Computer Science Wannacry Attack & Damage Caused Essay

Computer Science question. All explanations and answers will be used . Conduct some Internet research on any malware, virus or DOS attack. Summarize your findings and be sure to include a link to your reference source. Explain this occurrence in your own words (do not just copy and paste what you find on the Internet).Include the following information:1. Name of the Malware or Virus2. When this incident occurred (date)3. Impact it had or explanation of the damage it caused4. How it was detected5. Reference.

Determining Audit Tests Over Cash and Receivables Questions

Can you help me understand this Accounting question? 1. Henry?s Mills is responsible for preparing checks, recording cash disbursement, and preparing bank reconciliations for signet Corporation. While reconciling the October bank statement, Mills noticed that several checks would never be presented for payments, Mills prepared a check for $937 payable to himself, forged the treasurer?s signature, and cashed the checked. Mills made no entry in the accounts for this disbursement and attempted to conceal the theft by destroying the forged check and omitting the long- outstanding checks from subsequent bank reconciliations.2. Following are typical questions that might appear on an internal control questionnaire for investment in marketable securities.Is custody of investments securities maintained by an employee who does not maintain the detailed records of the securities?Are securities registered in the company name?Are investment activities reviewed by an investment committee of the board of directors?3. Adapted AICPA Task ? Based Simulation You are involved with the audit of Jelco Company for year 1 and have been asked to consider the confirmation reply results indicated below. For each confirmation reply as to the proper action to be taken from the following possible actions;Exception; propose an adjustment.Send a second confirmation request to the costumer.Examine shipping documents and/or subsequent cash receipts.Verify whether the additional invoices noted on the confirmation reply pertain to the year under audit or the subsequent year.Not an exception, no further audit work is necessary.Costumer Reply (and any audit action take)                                                                            Proper Action a. We mailed the checked for this on December 31.b. We returned those goods on December 2.? You havebeen able to determine that the goods were received bythe client on December 29, butnot recordeduntil January 2.c. We also owe for two invoices for purchases we made aroundYear-end, I?m not of the exact date.d. We are very satisfied with Jelco and plan to purchase from themin the future.e. While that?s what we owe, we didn?t owe it on December 31 since we didn?t receive the goods until January 2 of year 2.f. You receive no reply to a negative confirmation requestto Adams Co.g. You received no reply to a positive confirmation request to Blake Co.Subsequently you recalled that Blake Co. has a policy of not respondingto confirmation-in a writing or orally.

Cuyamaca College Psychology Affective Neuroscience Discussion

Affective Neuroscience –  I have a very old video of someone getting brain surgery while they are wide awake – Not horror movie stuff – but cool neuroscience  – Search for  – “brain surgery while awake” on YouTube and you can see a few different ones – share what you find!!!Here is the one I have Please watch this TED Talk about vision and other parts of the brain   (Links to an external site.)and this amazing youtube clip  (Links to an external site.)- Can you connect it to the First Chapter?Look for the words Occipital LobeParietal LobeFunctional Magnetic Resonance Imaging (fMRI)Temporal LobeHypothalamusDrive stateHomeostatic set pointHypothalamusShare what you found!!  

Cyber Practices Among Private Entities Involved in Critical Infrastructure Discussion

reply to discussionI wanted to talk about an initiative that is helping to improve cyber practices among private entities involved in critical infrastructure. Recently, at the end of March of this year, DHS?s Science and Technology Directorate (S&T) awarded $5.9 million to the Norwich University Applied Research Institutes (NUARI) for them to expand a really neat program called the Distributed Environment for Critical Infrastructure Decision-Making Exercises (DECIDE). DECIDE is platform for cyber training that is aimed at energy sector companies, specifically for practicing different simulated scenarios involving the energy sector and other ?war-game? type situations.Honestly, more development of tools like this could be super beneficial in all areas of critical infrastructure. This platform provides an excellent way to practice and learn new techniques and procedures for when crises happen. This is largely cyber-based, sure, but it can also be applied in other areas as well. Some of the situations it can simulate include limited resources, system instability, cascading failures due to the actions of operators (or just as a result of system failures for any reason), man-made issues, and other mystery errors. This program seems to provide a more advanced level of simulation that tries to hit on every issue possible, in hopes operators are able to overcome it and keep our critical infrastructure running.I am sure there are some private entities probably conducting some sort of similar scenario-based exercises, but this mega-scenario platform seems to be a great way for everyone in CIKR to keep up to date and ensure that they are indeed actually conducting these exercises and staying proficient. You can read more about DECIDE here.

DePaul University Human Development and interaction Human Development Discussion

1. Gender roles and parenting in Young adulthoodTop of FormIn regards to the article by Katz-Wise, Priess, and Hyde (2010):Bottom of Form2. Occupational goals and transitions in Young Adulthood Top of FormArnett (2015) outlined Super?s theory of the development of occupational goals. According to this theory, occupational development occurs in stages and begins at age 14. However, this theory has been critiqued for being too linear. For example, people may have multiple careers in their life and women may take time off of work to help raise their family.In addition, Johnson (2005) assessed the flux of intrinsic and extrinsic work values when individuals get married and become parents. Johnson noted that there is a bidirectional relationship between work values and family formation. Johnson claimed that individuals who value extrinsic work rewards are more likely to get married and have kids than individuals with intrinsic work values. People with low extrinsic and high extrinsic work values may enter marriage later. Additionally, marriage and parenthood may heighten extrinsic work values, particularly for men.

Cuyamaca College Mind is from a Psychology Perspective Discussion

The Mind  This chapter is an introduction into what we think the Mind is from a Psychology Perspective. You have to make a post before you can see the other posts! Video to watch –  Rebecca Saxe – TED talk (Links to an external site.)1) Please ask 2 people outside of the class what they think the mind is and post it here.  Bring Something to the class that is not in the course content!! 2) Using the following vocabulary form Chapter 1 –   can you find examples of these terms in the TED TALK – False-belief testMirror neuronsTheory of mindVisual perspective taking3) Give an example of the terms from your own experience.