create a simple communication management plan.

 

For the project selected in Unit I, create a simple communication management plan. Your plan should follow the process for planning communication management, as referred to in Figure 3.1 and 3.3 of the textbook, and in the section beginning with Communication and the Project Plan (page 51 to 57) in the eBook, Project Management: A Common-Sense Guide to the PMBOK Program, Part Two – Plan and Execution. Consider the following questions:

 

Finally, in addition to writing out your strategies and responses to the questions, summarize the who, what, when, where, how, and why into a quick reference table. For example, consider the building the library scenario in the earlier unit. The “who” would be the stakeholders such as members of the community, future patrons of the library to name just a couple. The “what”  would include information regarding the progress of the construction, key milestones, and perhaps some announcements regarding the planned scope of the completed library (such as types of media available for checkout, services to be offered, etc.). Such a table is often used as a succinct at-a-glance form of the communications plan.As a guide to depth, your Communication Management Plan should be a minimum of two pages in length. You may either create your table in Word and include it at the end of the document, or submit it as a separate Excel file.Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used. Please note that no abstract is needed.

Identify the purported miraculous events of the Buddha’s conception & birth.

 

 

BBC’s Life of Buddha

(https://www.youtube.com/watch?v=B1Qhja4OhdM)

 

 

 

1-Identify the purported miraculous events of the Buddha’s conception & birth.

 

 

 

Father’s Name: Suddhodana

 

 

 

Mother’s Name: Maya

 

 

 

Wife’s Name:

 

 

 

Son’s Name: Rahula

 

 

 

White Elephant with 6 Tusks entered Queen Maya’s Uterus

 

 

 

Wheel Symbol on Siddharta’s Feet

 

 

 

 

 

2-What were the 2 options within the prediction about Sidharta Gautama’s eventual career path?

 

 

 

a-

 

 

 

b-

 

 

 

 

 

3-What did Sidharta’s father not want him to witness? Why not?

 

 

 

 

 

 

 

4-Why did Sidharta become sad while watching a farmer plow land?

 

 

 

 

 

 

 

5-Identify the 4 suffering people who radically altered the direction of Sidharta’s career.

 

 

 

a-

 

 

 

b-

 

 

 

c-

 

 

 

d-

 

 

 

6-Why did Sidharta leave home & abandon his family?

develop a comprehensive plan for the systems architecture for this fictitious organization in a form that would be appropriate as a PowerPoint slideshow for management.

 

Your team has been assembled to provide Information Technology consulting services to a newly formed fictitious company.

 

Your team is to select one the following:

 

This medium-sized company was formed by combining several smaller companies within the same industry into a single entity. Each of the smaller companies had their own IT system, and some were not so good, usually because the systems were cobbled together from different sources over the years. The new organization intends to avoid that undesirable outcome.

 

This organization intends to bring all of the disparate systems together into one comprehensive system. The plan is for another team to implement an ERP system such as SAP or PeopleSoft as the core application for managerial control. That part of the transition will be outsourced to another team and is NOT part of your group’s charter.

 

Your team was assembled by selecting individuals from some of those smaller companies described above, so you have never worked together before. Also, the levels of experience and training for the various team members can be quite variable.

 

Your mission is to develop an overall systems architecture plan from top to bottom for the new organization. This will involve several different platforms from the data center to the smartphone level including some levels in between. You may or may not be concerned with the specific source or brand name for a platform or subsystem as your team sees fit.

 

The team needs to consider all the possible roles that need to be supported in this organization that includes light manufacturing, procurement, sales, distribution, and customer support. A good portion of the sales staff will operate from mobile platforms while traveling to customer sites. The primary business channel is wholesale to other businesses but the organization intends to provide some in-house retail operations through brick & mortar facilities as well as online operations.

 

The overall assignment is to develop a comprehensive plan for the systems architecture for this fictitious organization in a form that would be appropriate as a PowerPoint slideshow for management. You may consider this as the means of presenting your conceptual plan.

What would you do in this scenario? Take on the burden of keeping Freeman alive for a year as the ultimate Good Samaritan? If so, why?

Think about the following scenario and reply to the questions below. In replying, do your best to be as honest as possible when stating your reasons.

Imagine one day you hear a knock on your door. You open the door and there stands Morgan Freeman with two doctors. Freeman appears very ill and the doctors explain why they are there: as it turns out, Freeman lives down the street from you (who knew!) and has a rare life-threating illness. He needs an immediate plasma transfusion and will need the same donor to donate their plasma to him for the next year in order to stay alive and eventually recover. The doctors tell you that plasma transfusions can be extremely painful and will leave the plasma donor bed ridden for several days after each plasma donation. After asking you a few simple questions, the doctors determine that you are an exact match and are ready to perform the first of many transfusions right then and there. If you decline, Freeman will die within an hour.

 

What would you do in this scenario? Take on the burden of keeping Freeman alive for a year as the ultimate Good Samaritan? If so, why? Or decline and not take on the burden? If so, why? If you decline to help Freeman, do you think you would be killing him or merely letting him die?

Create a pamphlet using any type of publisher software you choose to educate clients on a current patient safety issue.

 

Create a pamphlet using any type of publisher software you choose to educate clients on a current patient safety issue. Make brochure!! With pictures

For example:

 

If you have a question about a specific topic, check with your instructor. It is recommended that you save your pamphlet as a PDF for submission.

 

Your pamphlet must include the following items

Describe how this technology can allow for collaboration with the various stakeholders impacted by the JPB Train Derailment Scenario.

Instructions:

 

• Familiarize yourself with the JPB Train Derailment Scenario.

 

• Analyze the provided Incident Radio Communications Plan ICS-205.

 

• Research and report on currently available Interoperable Communications

 

technology.

 

o Explain how this technology can be applied to

 

optimize communications forthe JPS Train Derailment

 

scenario.

 

o Describe how this technology can allow for

 

collaboration with the various stakeholders

 

impacted by the JPB Train Derailment Scenario.

 

Requirements:

 

•1.5 to 3 pages in length.

 

• APA formatting and citations shall be used.

 

• At least two primary source references will be used.

 

No plagiarism

Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities.

 

 

Part 1: Current Security Threats 

 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

 

Scenario
It is your first day at the job in the information security department, and you are called for a meeting. In the meeting the need for strengthening the information security for the college is discussed, and everyone agrees that the first step in this direction is to identify the top five threats that are a potential risk to Aim Higher College.
The college’s administrative staff and faculty run the latest version of Microsoft Windows on their primary workstations, whereas students’ laptops may run Windows or macOS. The college’s web servers run on Linux; however, all other servers are Windows Server-based. Student, staff, and faculty mobile devices, such as tablets and smartphones, run on iOS or Android; all mobile devices can connect to the campus network.

 

Tasks
You have been given the responsibility to determine the top five threats that Aim Higher College faces. You asked your supervisor for support in this task and he gave you the following resources that might be useful in your research and analysis:
 Microsoft Security Advisories and Bulletins (https://docs.microsoft.com/en-us/security-updates/)
 Common Vulnerabilities and Exposure (CVE) database search (http://cve.mitre.org/find/index.html)
 Security organizations, such as Secunia (http://secunia.com/)

 

Your supervisor has also asked you to consider the following questions as you shortlist the threats:
 What threats are new this year, and which have become more prevalent?
 Why are these threats more common and why are they important?
 What threats remain constant from year to year? Why?
 What threats do you believe will become more critical in the next 12 months? Why?
 What is the likelihood of an exploit affecting Aim Higher College, and which operating system(s) does it target?

 

With these considerations in mind, write a summary report of the top five threats to Aim Higher College. Briefly explain why you have selected them and what effect they might have on the institution or its students, employees, graduates, or other communities on campus.

 

Part 2: Identify Vulnerabilities in IT Security  

 

Overall Scenario
Aim Higher College is a fictitious institution located in the United States. The college offers undergraduate and graduate courses in domains, such as business management, information security, and nursing. Imagine that you have a new job at Aim Higher College as an information security analyst. Throughout this course, you will analyze the threats and vulnerabilities of Aim Higher College and recommend controls to secure the college’s information systems.

 

Scenario
Aim Higher College has been the target of focused attacks from a variety of attackers. Your manager has assigned you the task to review the port and vulnerability scan data recently gathered from a typical system to determine what ports and services are exposed to attackers, and what vulnerabilities exist on that system.

 

Required Resources
 Access to the Internet
 Text sheet: Zenmap Intense Scan Results pdf file (hacking_ts_zenmapscan.pdf Download hacking_ts_zenmapscan.pdf)

 

Tasks

 

1. Analyze the results of the Zenmap scan. Your report must answer the following questions:
 What are the first five open ports as identified by the Zenmap scan?
 Include the port number
 Include the service name
 Include a brief description of how each is used

 

2. The Nessus scan identified two critical vulnerabilities, identified as ID 32314 and ID 33850.
 Research the vulnerabilities against the Common Vulnerabilities and Exposure (CVE) database .
 Include the name and a brief description of each vulnerability.

 

3. Determine what can be done to protect the system and defend the campus network against attempts to gather data, and to resolve vulnerabilities. Also determine which ports and services likely need to remain open.

 

4. Write a report targeted at IT management and systems administration staff explaining the vulnerabilities and protection mechanisms that Aim Higher College should adopt, which will be applied to all similar systems at the college.

discuss specific interventions and techniques that you would use with this family and mention the duration of therapy and prognosis. What would be your role as a therapist?

Complete a case study of a family that you are familiar with (not your own family). It would be best to conceptualize using at least 3 of the various theories we have covered in class.   In addition, you should discuss specific interventions and techniques that you would use with this family and mention the duration of therapy and prognosis. What would be your role as a therapist? The case study should be at least 3 pages in length in content (plus a cover page and reference page). In addition to the 3-page paper, you must attach the family’s Genogram and Minuchin’s structural mapping of the family. See this site for examples Genogram Timeline Snapshots – Genogram Analytics  Be sure to look at the symbols tab on both maps

So, the minimum number of pages with cover page, content, references, and maps is 7 pages.

 

With the presence of eSports rising in popularity, what steps do you think would need to be taken in order for them to be considered a proper sport by the vast majority of people?

Based on what you’ve learned in this module, answer the questions below in a two-page, double-space written paper, and explain your answers:

 

With the presence of eSports rising in popularity, what steps do you think would need to be taken in order for them to be considered a proper sport by the vast majority of people? What would help them gain acceptance at events such as the Olympics? Also, what can be done to tackle the lack of professionalism that is present in eSports today?

 

Review the rubric below to see how you will be graded.

 

What are the steps you would take to advocate for your patient while she is still in the acute care setting?

 

You have a patient who only has Medicare Part A and B. She has limited income most of which is used to pay for Medicare Part B. She is in dire need of placement into a nursing home as she can no longer care for herself at home. You gleaned from your reading that long-term care needed by low-income elderly people is paid by Medicaid, and you feel your patient meets the criteria. What are the steps you would take to advocate for your patient while she is still in the acute care setting? Who are some of the other health care professionals you would collaborate with to ensure your patient receives the additional healthcare coverage she needs? Analyze the role Medicaid plays in supporting long-term care for the elderly and disabled.

Initial: 400 words. Make up 2 replies to 2 students 200 words each.