Discuss the nature of derivative financial instruments.

Introduction
This assessment will allow you to practice two approaches for hedging an exposure to the change in a foreign currency.
Demonstration of Proficiency
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies through corresponding scoring guide criteria:

Competency 1: Apply advanced accounting techniques to organizational situations. 

Discuss the nature of derivative financial instruments.
Indicate the factors that might influence the value of the USD against the Ghanaian Cedi.
Explain how much was won or lost by purchasing a 90-day option.
Discuss how a defined purchase contract could hedge against a change in exchange rate between the USD and the Ghanaian Cedi.

Competency 5: Communicate in a manner that is professional and consistent with expectations for members of the business professions. 

Communicate in a manner that is professional and consistent with expectations for members of the business professions.

Scenario
Hopkins Chocolate Company buys green cocoa beans that are processed into consumer products. Cocoa beans are currently selling for $2,000 United States Dollars (USD) per metric ton. Hopkins buys 100 tons at a time from Abamo Chocolate in Ghana, Africa. Normal purchase procedures stipulate that the purchase contract is denominated in Ghanaian Cedi and payment in Cedi is due 90 days after purchase.
Recently, the treasurer of Hopkins became concerned that the U.S. Dollar would change in value against the Ghanaian Cedi. Consequently, Hopkins bought a 90-day option.
Your Role
You are the controller for Hopkins Chocolate Company.
Requirements
As the controller of Hopkins Chocolate Company, you work closely with the treasurer. She has requested that you prepare a report to help explain the recent purchase of the 90-day option to members of the board of directors. Address the following in your report (3–5 pages):

Discuss the nature of derivative financial instruments.
Explain the factors that might influence the value of the USD against the Ghanaian Cedi. Discuss at least three factors.
Hopkins bought a 90-day option to exchange $200,000 USD for 900,000 Cedi. They paid $8,000 USD for the option and today it has been 90 days. Locate today’s value of the Cedi at XE.com’s Live Exchange Rates and calculate how much Hopkins won or lost by purchasing the 90-day option. Explain your calculations in detail.
Discuss how Hopkins could use a defined purchase contract to hedge against a change in exchange rate between the USD and the Cedi.

Deliverable Format
Since you plan to share your report with the treasurer and the board of directors, you want this report to be clear, well-organized, and readable. Your supervisor has requested that your report be 2-3 pages so that you have enough space to develop your ideas and provide some scholarly and/or professional context.

Communication: Communicate in a manner that is scholarly, professional, and consistent with the needs and expectations of senior corporate leadership and other stakeholders. For this scenario, assume the treasurer and the board of directors expect original work, critical thinking, and scholarly sources. Your writing must be free of errors that detract from the overall message.
Your report is a professional document and should therefore follow the corresponding MBA Academic and Professional Document Guidelines, including single-spaced paragraphs.
Resources: At least three resources that are scholarly and/or professional. So that your imaginary board of directors can locate more information about derivative instruments and currency options, include a reference page at the end of your report.
Report length: Minimum of 2-3 pages, not including reference pages.
Font and font size: Times New Roman, 12 pt.

Faculty will use the scoring guide to review your deliverable as if s/he were a director on the board. Review the scoring guide prior to developing and submitting your assessment.

Describe the technologies, hardware, and software used within the information technology field

Competency
In this project, you will demonstrate your mastery of the following competency:

Describe the technologies, hardware, and software used within the information technology field

Scenario
You are working as a contracted information technology specialist. You have been contacted by James Otis Tax Associates, a small tax preparation company. The company is growing rapidly and is opening a new office. They are focused on hiring and retaining the best in the field, and they believe that one way to do this is to provide every employee with the appropriate tools and technology they need to effectively complete their work. Your company has been asked to provide its expertise in identifying the technology components needed for the computer systems and network for the three employees in the new office. They would also like you to address the security needs of the various employees.
Directions
The manager at James Otis Tax Associates has asked you to submit a report describing the technology hardware and software needed to build a computer network for the new office. The manager has asked you to describe the computer system for each new employee, including an explanation of the purpose for each selected technology component, and to identify specific software programs that the employees would need. He has also asked you to describe the security measures needed to support the systems. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.
The manager has provided the following employee descriptions:

Certified Public Accountant (CPA): The CPA is a senior position at a tax preparation company. The CPA will be not only handling sensitive customer data from personal tax returns but also preparing tax returns for corporate clients. The CPA is also responsible for the personal tax returns filled out by the tax and data-entry specialist employees.
Tax Specialist: The tax specialist has the dual role of entering data and verifying that tax returns are correct. This position involves customer interaction in gathering data for minimizing taxes owed or maximizing tax refunds.
Data-Entry Specialist: This position requires data entry for personal tax returns for customers who walk in the door. Although the data-entry specialist works with sensitive customer data, they do not have access to the tax returns once the returns are submitted to the tax specialist for review.

For each employee, you must:

Describe all hardware components, including peripherals, needed to create the systems
Identify specific software programs (more than one) that would be beneficial to each identified employee. Programs could include:

Operating systems
Applications such as:

Office automation products
Security products

Describe security measures needed to support this system. Security measures could focus on:

Access
Administration and user passwords
Firewalls

Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for components.
Finally, choose a network topology that could be used to connect all of the new employees identified by the manager. Create a Visio diagram to identify the networking equipment needed to enable the workflow between the employees.
What to Submit
To complete this project, you must submit the following:
Technology Needs ReportYour technology needs report should be 3–4 pages in length. For each of the new employees, you must describe all hardware components needed to create the system, identify specific software programs that the employees would need, and describe security measures needed to support the systems. Along with each description, explain the purpose of each technology component in each system. In your explanation, include how your knowledge of human-computer interaction (HCI) impacted your choices for each component.
Network DiagramYou have also been asked to include a visual representation of the topology you selected and the network equipment needed to support interactions between these employees. Use Visio if possible to create a 1-page (or 1-slide) diagram that identifies the networking equipment needed to enable the workflow between these employees.

Navigate to https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331. Summarize the Policy Development Guides recommendations for organizing a policy hierarchy and selecting policy topics.

Part 1: Research Security Policy Frameworks (0/2 completed)
Note: In this part of the lab, you will review internet resources on security policy frameworks in order to form a basis for their purpose and usage. Understanding the reason behind a security policy framework is key to understanding the component policies and procedures. Please take the time to review the research thoroughly and think through the concepts behind the framework itself.
1. In your browser, navigate to https://www.sans.org/reading-room/whitepapers/policyissues/information-security-policy-development-guide-large-small-companies-1331.
2. Read Sections 1-5 of the SANS Policy Development Guide.
3. Summarize the Policy Development Guide’s recommendations for organizing a policy hierarchy and selecting policy topics.
Note: It is important to understand how and why a policy differs from a standard, a procedure, and a guideline. From the top down, the policy should not change or need modification unless a major shift in corporate values or business process occurs. On the contrary, guidelines should be reviewed, and possibly changed, often.
Similarly, even though a policy should be written clearly and concisely, it is a high-level document answering the “why” questions. Standards are also high level, but they answer the “what” questions. Finally, the procedures and guidelines provide the “how.”
Examples of security policy and guideline templates are available from the SANS Institute at https://www.sans.org/information-security-policy/.
In the next steps, you will learn about COBIT 2019, a popular industry-standard policy framework.
4.  In your browser, navigate to https://www.cio.com/article/3243684/what-is-cobit-a-framework-for-alignment-and-governance.html.
5. Describe the core principles and objectives of COBIT 2019.
Part 2: Define a Security Policy Framework (0/2 completed)
Note: Understanding both unique and universal risks to your organization’s IT infrastructure is essential to developing an appropriate IT security policy framework for your organization. In this part of the lab, you will review a list of risk, threats, and vulnerabilities and define appropriate policies to mitigate them. Next, you will organize your policies into a policy framework.
1. Review the following list of risks, threats, and vulnerabilities at the fictional Healthwise Health Care Company.

Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstation operating system (OS) has a known software vulnerability
Unauthorized access to organization-owned data
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse
User destroys data in application, deletes all files, and gains access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data
Need to prevent rogue users from unauthorized WLAN access
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
User inserts a USB hard drive with personal photos, music, and videos on organization-owned computers
Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

2. For each risk, threat, or vulnerability in the list above, select an appropriate security policy that might help mitigate it. You can select one of the SANS policies or choose one from the following list.
Security Policies

Acceptable Use Policy
Access Control Policy
Business Continuity—Business Impact Analysis (BIA) Policy
Business Continuity and Disaster Recovery Policy
Data Classification Standard and Encryption Policy
Internet Ingress/Egress Traffic Policy
Mandated Security Awareness Training Policy
Production Data Backup Policy
Remote Access Policy
Vulnerability Management and Vulnerability Window Policy
Wide Area Network (WAN) Service Availability Policy

3. Organize the security policies you selected so that they can be used as part of an overall framework for a layered security strategy.
Challenge Exercise (0/2 completed)Note: The following challenge exercise is provided to allow independent, unguided work – similar to what you will encounter in a real situation.
A user at Digital Innovation Products has been using company network resources to download torrent files onto a USB drive and transfer those files to their home computer. IT tracked down the torrent traffic during a recent network audit. Unfortunately, the company does not have a current policy that restricts this type of activity.
Identify at least two appropriate policies that should be in place to define this type of behavior and the consequences thereof.
Write a brief overview for C-level executives explaining which policies should be added to the company’s overall security policy framework, why they should be added, and how those policies could protect the company.

What causes and symptoms of Neurological Disorders.

Read The article on Neurological Disorders
website: hopkinsmedicine.org/health/conditions-and-diseases/neurological-disorders
Then choose one neurological disorder from the website and address the following:
1. What causes and symptoms of Neurological Disorders.
2. What are the symptoms/warning signs?
3. How common is this disease/disorder?
4. What is the treatment for the disease/ disorder?
Make sure you are putting this in your own words!

You are a medical professor in charge of creating college assignments and answers for medical college students. You design and conduct lectures, evaluate student performance and provide feedback through examinations and assignments. Answer each question se

Argue why critical thinking skills are important for someone going for your degree or the career you plan to get after graduation.

PROMPT #1 – All of the Student Learning Outcomes for this course, in some way, are based on the idea of critical thinking skills. Students must think critically in order to develop ideas, synthesize sources, analyze & interpret texts, use those texts logically, communicate the information clearly, & cite the information properly. Critical thinking requires students to examine all aspects of an idea, as well as their own biases & views so that they can clearly address the information. Write n assignment* in which you argue why critical thinking skills are important for someone going for your degree or the career you plan to get after graduation. Please include specific examples to discuss how you have demonstrated critical thinking & research skills in your classes/career thus far. 

Research your state (South Carolina) and discuss policies that have been put in place to help those students who choose to pursue vocational or trade-specific education after high school.

 Various policies help K-12 students prepare for furthering their education after high school. Higher Education institutions also have measures in place to help potential students pursue their goals. For this week’s discussion, please respond to the following according to your focus in K-12 or Higher Education.
K–12: Research your state (South Carolina) and discuss policies that have been put in place to help those students who choose to pursue vocational or trade-specific education after high school. Be sure to focus on requirements established by policies that students will need and share at least one program available for students who pursue this type of education.
Higher Education: Discuss policies that provide access to education or help community colleges and/or trade schools in your city provide students with free or reduced-cost tuition when enrolling in their programs. Be sure to include scholarship and grant information as well as policies in place for students who may be military learners.

Identify at least two academic and at least two professional individuals, colleagues, or teams that might help you succeed in your MSN program and as a practicing nurse.

Begin creating an academic and professional network by identifying which academic and professional connections and resources with which you need to collaborate to succeed in your MSN program and as a practicing nurse.

Consider individuals, departments, teams, and/or resources within Walden University and within your profession that you believe can support your academic and professional success.
Identify at least two academic and at least two professional individuals, colleagues, or teams that might help you succeed in your MSN program and as a practicing nurse.
Download the Academic Success and Professional Development Plan Template.

The Assignment:
Academic and Professional Network
Complete Part 1 of your Academic Success and Professional Development Plan Template. Be sure to address the following:

Think carefully and thoughtfully about the service-learning project you just completed.What surprised you in working at (insert name of the nonprofit)? How was the experience different than what you expected prior to the experience?

Think carefully and thoughtfully about the service-learning project you just completed. Based on your experience and reflection about it, write a 2-3 full paragraph (6-8 sentences each) response to each of the following questions. 1. What surprised you in working at (insert name of the nonprofit)? How was the experience different than what you expected prior to the experience? 2. What need in the community does this agency address? Do you see this as a low, medium or high priority need? Explain Why. How does that assessment influence your perception of your work at the agency? 3. What readings in your text do you associate with the service hours you just performed? Present and apply at least 2 frameworks or concepts in this analysis. 4. If you were doing this project as part of a corporate volunteer initiative, would you feel the same or different about the experience? Why or why not?

Professionalism seminar | Human Resource Management homework help

 

Are you planning to apply to graduate or professional school in the future?

If so, what type of degree and/or program are you considering and when would you like to apply (i.e., next year, after some work experience, etc.)?
If not, how will you continue your professional development in order to advance in your career of choice?

Describe at least one thing related to email professionalism that you learned from the lecture that resonated with you, and include why it caught your attention.
Describe one email “don’t” or mistake that you have done or seen someone else do.  After describing the “don’t” or mistake, explain what could be done to correct this “don’t” or mistake.

side note: public health major planning on pursuing a nursing career.

How do you ensure continuity of care when staff are working a rotating schedule?

How do you ensure continuity of care when staff are working a rotating schedule?may need additional support connecting to community-based care. CN provides dedicated follow-up, either in person or over the phone, from a clinician and peer support after the initial 9-1-1 crisis interaction. 
The Goal: Increase the likelihood that people connect with community-based care, reduce unnecessary use of the emergency room, and decrease the number of people who experience multiple crises. 
Questions: 
1.) the follow up team will go from working 8 hrs to a 12 hr rotation. What will they do during the evening hours when referral agencies are closed?
2.)what does a warm handoff look like when this is appropriate?3.)How do you ensure continuity of care when staff are working a rotating schedule?4.) How to ensure an equal distribution of work amongst staff?5.) What does quality assurance look like for this follow up program?