Marketing The Decision Making and Choice of Consumers Discussion

Objective:To provide you with the opportunity to apply course concepts and ideas to a specific brand/product.This assignment will also help you to study for your exams by exposing you to the chapter and course material.Directions: In the first week of the semester your first assignment will be to select a brand/product to focus on for the semester.Pick a brand/product that is interesting and relevant to you.Refer to BlackBoard, and the course syllabus for due date and times of all assignments.After the brand/product is selected, you will focus on that specific brand/product and relate it to all concepts covered in this course.You will keep a running journal of how each chapter of the CB7 textbook materials relate to you as a consumer and/or the brand/product.In some chapters, there will be more to discuss than others.Your job is to study what is covered write how it relates to you and/or your brand/product.It is not necessary to discuss every vocabulary word or concept from each chapter.Rather, I would like you to evaluate how the concepts relate to you and product, current world/marketing events, etc. and write a summary of how and why it is important.  If you have illustrations from commercials or advertising to illustrate specific CB concepts or theories, these should be included. 

Cybersecurity Response

reply to discussion post belowCandis,Cybersecurity fits within all aspects of our connected-CIKR sectors, however, I believe the key to understanding the cyber environment, and subsequently securing it both defensively and offensively, is to realize that the cyber universe does operate in a manner were our tired and true SIGINT, IMINT, MASINT or HUMIT means of intelligence gathering will be effective.Cyber warfare is ‘fought’ with computers, machines; technology and our CIKR should be viewed from the standpoint of the actual systems that we use to connect us to the assets that are actually critical.We are spending way too much money. First, we should shift our focus away from mainly investing in new technology to maintain and operate the network, to investing in new technology designed to analyze digital threats, which would then lend itself to threat forecasting, THEN, we could shift our posture to that of offense.Last year, the Fed spent more than 80% of the budget for IT on Operations and Maintenance for our “aging legacy systems,” and only 20% percent on Development, Modernization, and Enhancement.This ‘state’ of our Federal IT systems in these threat conditions significantly increases our exposure to risk in the cyber environment.Federal legacy IT investments are simply obsolete yet many agencies are using outdated software languages and have hardware that’s not even manufactured anymore.Some agencies are using systems and components at least 50 years old which is unacceptable.Check this out; the DoD still use 8-inch floppy disks in a system that coordinates the operational functions of our nuclear forces. Floppy disks? Really? The Treasury Dep employs code initially used in the 50’s. The VA is using systems over 50 years old and the Social Security Administration is using 31-year-old software.If our Gov would fund innovation, partner via Public Private Partnerships, which is an emerging area for new enterprises, or STEM projects at our Universities and laboratories, we could pivot from defense to offense and finally secure our network of CIKR.I mean we helped fixed the ozone layer, which, by the way, is repairing itself; surely, we can create ‘cyber architecture’ that gathers and accurately analyzes threats, and design code that only recognizes and protects US Federal systems, and seeks and destroys alien attempts at intrusion?I believe we can do anything in this country.  

Commercial Facilities Sector Response

responseBrenda,This week’s readings have been extremely interesting. My main take away is how I tend to focus on the cyber security and physical aspect of a building or compound and forget about the significant importance a building’s structural build is to the overall security of the individuals working in the building and for the security of the material inside the building. According to the Reference Manual to Mitigate Potential Terrorist Attacks Against Buildings, it is of great essence to critical infrastructure for buildings to meet building code requirements to minimize the negative effects of man-made or natural hazards, all still meeting the functional needs of the building owners.  In addition, it is quite astounding how most terrorist attacks occur within the Commercial Facilities Sector, rather than in the Government Facilities Sector. Although they are both the highest attacked, it still makes sense that an act of terrorism happens directly to the general population. Often individuals have the idea that any individual who works for the government is “used to” danger, and the way to impact a nation is through the direct disruption of its people.

Production and Research Honeypots Response

reply to discussion post below Collins,When trying to catch someone trying to steal your car or anything of value, the thought of advertising a decoy in order to catch someone always comes to mind. The same goes for trying to catch someone trying to hack into a network that you or a company may value. To setup a decoy, a honeypot is created (think honey like what Pooh Bear would REALLY want) that looks like a valid system on the network that is exposed and vulnerable for hackers to try to attack (EC-Council). If the attacker takes the bait, then that attacker will reveal his or her methods while trying to attack that system. The attacker would probably start passively scanning, but then quickly go to actively scanning and enumerating, and once the port of entry is decided upon, would attack using their preferred method of attack. Since legitimate users on the network have no need for the honeypot and may not even know it’s there, it is assumed that any attempts at accessing the honeypot will be considered hostile (Rouse).Two different types of honeypots exist: production and research honeypots. Production honeypots are created to exist within the company’s network and to reveal attacks as well as slow down attackers while research honeypots are used to reveal types of attacks and discover new practices (Rouse). One really neat idea is to place data with unique identifying properties that can “help analysts track stolen data and identify connections between different participants in an attack (Rouse).”The biggest downfall to honeypots is that, as we read in the Certified Ethical Hacker book, honeypots can be identified by enumerating the MAC addresses of the NICs or by probing the ports with TCP packets to see if they respond properly. Unfortunately, it’s not a perfect system but it would at least reveal some attacks!EC-Council. UMUC: Certified Ethical Hacker (CEH) Version 10 eBook w/ iLabs (Volumes 1 through 4). [eVantage]. Retrieved from Rouse, M., Clark, C., & Cobb, M. (n.d.). What is honeypot (computing)? – Definition from WhatIs.com. Retrieved June 4, 2019, from

AU American History The Election of 1848 & Its Significance Essay

Instructions Timeline Project After reviewing the Unit VII materials, you should be familiar with some events that shaped Western Expansion and the Antebellum South. Take a look at the 1793-1857 timeline here. For this assignment, you will pick one of the events identified on the timeline and discuss how that event prompted a change in national philosophies or ideals. In addition to discussing a specific event from the timeline, you will also want to take into consideration how the nation’s views had evolved to the point of the event you choose. Incorporating ideas and related concepts from previous units may help you develop your ideas. Below are the steps you will need to take in order to successfully complete this assignment.Step 1: Choose an event.Choose an event from the timeline above that interests you the most. Your research will surround this event, so it is important to think about what you want to learn more about.Step 2: Conduct research.Conduct research around the event you chose. For this assignment, you are required to utilize at least one source from the CSU Online Library. Your source can either revolve around the event you chose or it can focus on the philosophies and ideals before/after your event, whichever supports your writing more. Note that you may not find an article specifically addressing both the event you chose and the philosophies surrounding it; in most cases, you will need to use your critical thinking skills to infer the information. You may use more sources if you would like, but those sources cannot include Wikipedia, biography.com, history.com, or other encyclopedias. Click here to view a valuable resource that will walk you through tips and tricks on how to use the library for this assignment.Step 3: Plan and reflect.Reflect on the change in American life before and after the event you chose. Once you have completed your research, you should sit back to think about what it means to see if you notice any trends and to have a better sense of what you want to convey in your writing. Although it is not required, you may want to develop a short outline to help you organize your thoughts and ideas. Use some of the following prompts to help guide you:Step 4: Write your assignment.

Personal Entrepreneurial Competencies Discussion

  Assignment 1 – Personal Entrepreneurial Competencies (PO1, CO1, SK.2, AL.1, DL.5)In reviewing the knowledge (what to do), attitude (wanting to do), and skills (how to do) of being an entrepreneur, what are your individual competencies of each? Next, determine your resilience of your competencies: your purpose, your learning, and your facing reality. What are your core competencies and driving forces? Consider the following Venn diagrams: 

TCC History Texas Government Getting Rid of Jury Trials Discussion

Under the federal constitution everyone charged with a crime where their liberty is at stake (possibility of jail or prison) is entitled to a lawyer and a jury trial.  Class C misdemeanors (for example: speeding, public intoxication, disorderly conduct) are not included in this because the judge can only assess a fine.  In Texas, someone charged with a class C misdemeanor does not have a right to a court-appointed attorney, but Texas does allow for jury trials on class C misdemeanors.  More than half of the other states do not allow someone to request a jury trial for these minor offenses – any trial would be heard only by a judge.The question this week:  Should Texas get rid of jury trials for class C misdemeanors?  Trials to the judge save time and money, but are citizens rights at stake?  Is it worth your time as a citizen to sit as a juror on one of these cases just in case you might want to have a jury trial on a class C misdemeanor one day? 

Protecting Power Grids from Cyber Attacks Response

reply to discussion below christopher,Protecting power grids from cyber attacks has been gaining attention for the last several years. Last year, hackers infiltrated the computer systems of a consortium of small utilities known as the Nebraska Municipal Power Pool 3.8 million times. The network serves 200 communities in six Midwestern and Rocky Mountain states. The U.S. power grid’s vast size and aging equipment make the system highly susceptible to both cyber and physical attacks on its transformers, substations and power lines by saboteurs or terrorists. The growing use of a computerized “smart grid,” where sensors replace human meter readers to gather data and communicate digitally with a utility’s operations center, adds to the challenges. In a worst-case scenario, coordinated attacks on the U.S. electrical grid could cause massive economic losses and perhaps widespread illness or death. Because of advanced electronic technology, these attacks can now happen from any country. Computer hacking has removed security fences for the would-be attacker.

Mathematics of Game Worksheet

After working for 18 months in your analyst position at G&B Consulting, you are now being considered for a project manager position that would put you in charge of several team members. As part of the interview process, you have been asked to make a presentation to highlight what you think are the most compelling reasons you should get the position.You are to put together a PowerPoint presentation that explains all of the key components that you feel will factor into why you should get the position.What to SubmitTo complete this assignment, you must first download the word document. Use the questions on the worksheet as your guide for the contents of your presentation.Your step-by-step breakdown of the problems, including explanations and all work shown, should be present within the PowerPoint you create. If you use Excel for any of your calculations that file must also be included in the drop box. Do not submit the Word document with instructions.     

History of Music Discussion

Watch two videos featuring the performance of a twentieth century music composition. Your choices must be from the twentieth or twenty-first century classical tradition, such as solo, orchestral or chamber music performances, not pop, rock, or jazz. Please note that this assignment is not a 20th or 21st century performance of music from the Classical era – students should watch videos of music that was composed in the twentieth or twenty-first century. The music chosen for this assignment needs to have been written in the twentieth or twenty-first century, so it is important to not choose music that was composed before the twentieth century. You can either choose two compositions written by the same composer or a composition from two different twentieth or twenty-first century composers. If you are not sure if your choices fit the requirements, be sure to ask in the Questions thread or by sending a personal message to your instructor. The following is a list of possible choices for composers for this assignment. You are not required to choose a composer from this list as long as your choices are composers from the twentieth or twenty-first century.Jeanne Demessieux Harry T. Burleigh William Grant Still Arnold Bax Ralph Vaughan Williams Sergei Rachmaninoff Gustav Holst Arvo Pärt Henry Balfour Gardiner Gerald Finzi Nadia Boulanger Lili Boulanger Benjamin Britten Marcel Dupré Charles Ives Manuel de Falla Claude Debussy Maurice Ravel Augusta Read Thomas Bela Bartok Leonard Bernstein Aaron Copland Igor Stravinsky Arnold Schoenberg John Adams Dorothy Rudd Moore Philip Glass Morton Feldman Dmitri Shostakovich Ruth Crawford Seeger (Ruth Porter Crawford) Pierre Boulez Terry RileyFor each of the two videos, discuss how each composition reflects the six basics of melody, harmony, texture, rhythm, timbre, and form. You can refer to “Tools” in the course text for detailed information about each of these musical terms. Please also address how the composer’s music reflects the culture and/or time period in which he or she lived. This aspect of the assignment should include information from academic sources about the musical style of your chosen composer/s that is cited. The videos should be cited in the body of the text and in a reference page.