Mathematics of Game Worksheet

After working for 18 months in your analyst position at G&B Consulting, you are now being considered for a project manager position that would put you in charge of several team members. As part of the interview process, you have been asked to make a presentation to highlight what you think are the most compelling reasons you should get the position.You are to put together a PowerPoint presentation that explains all of the key components that you feel will factor into why you should get the position.What to SubmitTo complete this assignment, you must first download the word document. Use the questions on the worksheet as your guide for the contents of your presentation.Your step-by-step breakdown of the problems, including explanations and all work shown, should be present within the PowerPoint you create. If you use Excel for any of your calculations that file must also be included in the drop box. Do not submit the Word document with instructions.     

Marketing The Decision Making and Choice of Consumers Discussion

Objective:To provide you with the opportunity to apply course concepts and ideas to a specific brand/product.This assignment will also help you to study for your exams by exposing you to the chapter and course material.Directions: In the first week of the semester your first assignment will be to select a brand/product to focus on for the semester.Pick a brand/product that is interesting and relevant to you.Refer to BlackBoard, and the course syllabus for due date and times of all assignments.After the brand/product is selected, you will focus on that specific brand/product and relate it to all concepts covered in this course.You will keep a running journal of how each chapter of the CB7 textbook materials relate to you as a consumer and/or the brand/product.In some chapters, there will be more to discuss than others.Your job is to study what is covered write how it relates to you and/or your brand/product.It is not necessary to discuss every vocabulary word or concept from each chapter.Rather, I would like you to evaluate how the concepts relate to you and product, current world/marketing events, etc. and write a summary of how and why it is important.  If you have illustrations from commercials or advertising to illustrate specific CB concepts or theories, these should be included. 

Role of The Honeypots in Safeguarding the Organization Network Response

reply to discussion post belowNathan,Discuss the role of the honeypots in safeguarding the organization’s network.           A Honeypot is typically a computer system or systems designed to look appealing to hackers so that they attempt to hack the network through this given computer or computer system so that the hacker can be controlled, confined, or deflected and also to alert the network owner.  Honeypots can be used for a few different things. They can be used to deflect a hacker from entering a network.  They can be used to contain a hacker once they get into that system.  They can be used to alert the network owner or operator.  They can also be used to gain information about how hackers are getting into systems or gain specific information about a specific hacker possibly.  Honeypots can be used for any one, or combination, of those attributes.            Utilizing a honeypot to learn about attacks is a very smart strategy for any information technology team to implement.  By analyzing honeypot hack data, people can learn things like the country of origin for the attackers, attempted method of attack, and the types of passwords being utilized.  This information can tell an information technology team how best to set up their network defenses as well as possibly what kind of training needs to be done with personnel.            Long story short, honeypots are a critical part to a fully layered security system for any network and should be utilized and studied to the fullest extent. 

Personal Entrepreneurial Competencies Discussion

  Assignment 1 – Personal Entrepreneurial Competencies (PO1, CO1, SK.2, AL.1, DL.5)In reviewing the knowledge (what to do), attitude (wanting to do), and skills (how to do) of being an entrepreneur, what are your individual competencies of each? Next, determine your resilience of your competencies: your purpose, your learning, and your facing reality. What are your core competencies and driving forces? Consider the following Venn diagrams: 

ELAC Art The Principles of Design Art as Social Commentar Discussion

I’m working on a art writing question and need the explanation and answer to help me learn. Discussion Ch. 8 and 9: The Principles of Design, Art as Social CommentarBaca and Diego Rivera…and Yes, Velazquez1.Baca was inspired in part by the muralist painter Diego Rivera.  Rivera was a revolutionary painter looking to take art to the public.  His style was direct and full of social content.  Now examine Diego’s mural Los Explotadores and then describe what you think is represented.  How is the social commentary in Diego’s mural similar to Baca’s?  How do these two artists create compositional intrigue both visually and conceptually? 2.After, you answer the first part, look at  Velazquez Las Meninas (figs. 239, 240).  What are some of the techniques Velazquez used to draw the viewer in?  How does he comment on the Spanish court of the time?

Production and Research Honeypots Response

reply to discussion post below Collins,When trying to catch someone trying to steal your car or anything of value, the thought of advertising a decoy in order to catch someone always comes to mind. The same goes for trying to catch someone trying to hack into a network that you or a company may value. To setup a decoy, a honeypot is created (think honey like what Pooh Bear would REALLY want) that looks like a valid system on the network that is exposed and vulnerable for hackers to try to attack (EC-Council). If the attacker takes the bait, then that attacker will reveal his or her methods while trying to attack that system. The attacker would probably start passively scanning, but then quickly go to actively scanning and enumerating, and once the port of entry is decided upon, would attack using their preferred method of attack. Since legitimate users on the network have no need for the honeypot and may not even know it’s there, it is assumed that any attempts at accessing the honeypot will be considered hostile (Rouse).Two different types of honeypots exist: production and research honeypots. Production honeypots are created to exist within the company’s network and to reveal attacks as well as slow down attackers while research honeypots are used to reveal types of attacks and discover new practices (Rouse). One really neat idea is to place data with unique identifying properties that can “help analysts track stolen data and identify connections between different participants in an attack (Rouse).”The biggest downfall to honeypots is that, as we read in the Certified Ethical Hacker book, honeypots can be identified by enumerating the MAC addresses of the NICs or by probing the ports with TCP packets to see if they respond properly. Unfortunately, it’s not a perfect system but it would at least reveal some attacks!EC-Council. UMUC: Certified Ethical Hacker (CEH) Version 10 eBook w/ iLabs (Volumes 1 through 4). [eVantage]. Retrieved from Rouse, M., Clark, C., & Cobb, M. (n.d.). What is honeypot (computing)? – Definition from WhatIs.com. Retrieved June 4, 2019, from

Cybersecurity Response

reply to discussion post belowCandis,Cybersecurity fits within all aspects of our connected-CIKR sectors, however, I believe the key to understanding the cyber environment, and subsequently securing it both defensively and offensively, is to realize that the cyber universe does operate in a manner were our tired and true SIGINT, IMINT, MASINT or HUMIT means of intelligence gathering will be effective.Cyber warfare is ‘fought’ with computers, machines; technology and our CIKR should be viewed from the standpoint of the actual systems that we use to connect us to the assets that are actually critical.We are spending way too much money. First, we should shift our focus away from mainly investing in new technology to maintain and operate the network, to investing in new technology designed to analyze digital threats, which would then lend itself to threat forecasting, THEN, we could shift our posture to that of offense.Last year, the Fed spent more than 80% of the budget for IT on Operations and Maintenance for our “aging legacy systems,” and only 20% percent on Development, Modernization, and Enhancement.This ‘state’ of our Federal IT systems in these threat conditions significantly increases our exposure to risk in the cyber environment.Federal legacy IT investments are simply obsolete yet many agencies are using outdated software languages and have hardware that’s not even manufactured anymore.Some agencies are using systems and components at least 50 years old which is unacceptable.Check this out; the DoD still use 8-inch floppy disks in a system that coordinates the operational functions of our nuclear forces. Floppy disks? Really? The Treasury Dep employs code initially used in the 50’s. The VA is using systems over 50 years old and the Social Security Administration is using 31-year-old software.If our Gov would fund innovation, partner via Public Private Partnerships, which is an emerging area for new enterprises, or STEM projects at our Universities and laboratories, we could pivot from defense to offense and finally secure our network of CIKR.I mean we helped fixed the ozone layer, which, by the way, is repairing itself; surely, we can create ‘cyber architecture’ that gathers and accurately analyzes threats, and design code that only recognizes and protects US Federal systems, and seeks and destroys alien attempts at intrusion?I believe we can do anything in this country.  

Comparing humanistic-existential psychotherapy with other approaches

 
Understanding the strengths of each type of therapy and which type of therapy is most appropriate for each patient is an essential skill of the psychiatric-mental health nurse practitioner. In this Assignment, you will compare humanistic-existential therapy to another psychotherapeutic approach. You will identify the strengths and challenges of each approach and describe expected potential outcomes.
To prepare:

Review the humanistic-existential psychotherapy videos in this week’s Learning Resources.
Reflect on humanistic-existential psychotherapeutic approaches.
Then, select another psychotherapeutic approach to compare with humanistic-existential psychotherapy. The approach you choose may be one you previously explored in the course or one you are familiar with and especially interested in. 

History of Music Discussion

Watch two videos featuring the performance of a twentieth century music composition. Your choices must be from the twentieth or twenty-first century classical tradition, such as solo, orchestral or chamber music performances, not pop, rock, or jazz. Please note that this assignment is not a 20th or 21st century performance of music from the Classical era – students should watch videos of music that was composed in the twentieth or twenty-first century. The music chosen for this assignment needs to have been written in the twentieth or twenty-first century, so it is important to not choose music that was composed before the twentieth century. You can either choose two compositions written by the same composer or a composition from two different twentieth or twenty-first century composers. If you are not sure if your choices fit the requirements, be sure to ask in the Questions thread or by sending a personal message to your instructor. The following is a list of possible choices for composers for this assignment. You are not required to choose a composer from this list as long as your choices are composers from the twentieth or twenty-first century.Jeanne Demessieux Harry T. Burleigh William Grant Still Arnold Bax Ralph Vaughan Williams Sergei Rachmaninoff Gustav Holst Arvo Pärt Henry Balfour Gardiner Gerald Finzi Nadia Boulanger Lili Boulanger Benjamin Britten Marcel Dupré Charles Ives Manuel de Falla Claude Debussy Maurice Ravel Augusta Read Thomas Bela Bartok Leonard Bernstein Aaron Copland Igor Stravinsky Arnold Schoenberg John Adams Dorothy Rudd Moore Philip Glass Morton Feldman Dmitri Shostakovich Ruth Crawford Seeger (Ruth Porter Crawford) Pierre Boulez Terry RileyFor each of the two videos, discuss how each composition reflects the six basics of melody, harmony, texture, rhythm, timbre, and form. You can refer to “Tools” in the course text for detailed information about each of these musical terms. Please also address how the composer’s music reflects the culture and/or time period in which he or she lived. This aspect of the assignment should include information from academic sources about the musical style of your chosen composer/s that is cited. The videos should be cited in the body of the text and in a reference page.

Leadership Training Webinar Discussion

Assignment 3: Leadership Training WebinarYour manager has asked you to develop training materials to help employees understand the role of leadership within your organization. Because there are remote employees in your organization, you will need to develop PowerPoint slides and speaker notes so that you can deliver this training as a webinar. Your manager expects you to be polished and ready to deliver a professional webinar and has asked you to submit a recording for her review prior to the live event. Use Strayer University Library at https://research.strayer.edu and the internet to research the topics for this webinar.You will create a PowerPoint slide show with narration and speaker notes. To do this, you will use Kaltura to record your screen as you show your slides and use your speaker notes to talk (screencast). Make time to practice!Create a PowerPoint Presentation Use Presenter ViewTop 10 Slide TipsTop 10 Best Practices When Using PowerPoint for PresentationsCreating and Submitting Video Assignments Using the Kaltura Desktop App InstructionsCreate a narrated PowerPoint presentation with four to eight (4-8) slides (1-2 slides per topic). Use the slides as well as the speaker notes feature to discuss each of the following leadership training topics:Motivation: Determine two (2) key ways in which a leader can motivate employees to achieve their goals for the organization. Provide background for your answer and support for your rationale in your speaker notes.Managerial Communication: Give three (3) recommendations for a leader to articulate and communicate his/her vision for the company to employees and other stakeholders. Provide background for your answer and support for your rationale in your speaker notes.Your PowerPoint presentation must be visually appealing and follow these formatting requirements:Use headings on each slide and at least one (1) related graphic (photographs, charts, clip art, etc.).Apply slide design best practices (minimal text, appropriate images/charts, and proper mechanics, grammar, and spelling) for an appropriately professional presentation. Include a title slide containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. Provide a References List in APA format on the last slide. The title and reference slides are not included in the required slide length.Include the speaker’s notes for each slide. Your speaker notes combined with your slide content must thoroughly address each of the topics in #1-#4 above.Use the Kaltura Desktop App to record your narrated presentation in which you use your speaker notes to record your delivery of the slides. You should convey a professional presence and tone in your delivery. Your videos should not be longer than 7 minutes to avoid technical difficulties with uploading.