Scaffolding and imitation | English homework help

 
This week’s assignment is going to focus on imitation and understanding writing voice. This will be done in three parts. The first part of this assignment will be to complete the scaffolding exercise outlined in the textbook (p. 56). You will select a poem (this can be of your choosing or one of the poems in the book) and scaffold it in a similar fashion to the scaffold in the text (Note: Poem must be at least 15 lines long) using your own word choices.
The second part of this assignment will be to work on imitating the voice of prose. Select either Scarpa’s “I Go Back to Berryman’s” (p. 65) or Painter’s “The New Year” (p .69) and reread it. Then, using that piece as a template, attempt to write your own story while trying to capture the voice of the author. Think about the choices that the author is making while you do this (you should do this for about 10-15 minutes, but at least make sure it is a page long).
The third part of this assignment will be to provide a reflection for the two first parts. Think about the two different exercises. What did you learn? How did it feel to try and capture the different voices of these writers? Why do you feel the authors made the choices that they did? What prompted you to make the choices that you’ve done here? Were you surprised by anything? What have you learned about your own voice? What authors have inspired you and whose voices you’d like to imitate?

Security trends and legal issues

 
Final Project
For the final project, write a paper exploring themes at the intersection of technology and policy. Select one of the following topics:
•  Methods for reducing the level of international cybercrime
•  Coping with the fragility of and lack of security on the Internet
•  Establishing norms of national behavior in cyberspace, in peace and conflict
•  Developing national legal support for norms
•  The role and importance of declaratory national policies for cyberspace
•  Creation of international risk mitigation frameworks
•  Development of strategies that encourage international agreements
•  Assess the risk of catastrophic attacks on national infrastructure.
•  Should cyberspace be treated as a potential battlefield?
•  Explore the impact of commercial cyber-espionage on advanced economies.
•  Contrast European and American approaches to privacy on the Internet.
•  Explore freedom of expression via the Internet within autocratic regimes.
•  Must freedom of speech and association in cyberspace be sacrificed for cybersecurity?
Prepare an 8 – 10 paged paper that fully discusses the policies, events and technology for your selected topic using the brainstorming and analysis methodology. You should use current events, laws/regulations, technology and methods to support your opinion in your paper. You must include at least 5 reference resources. You should include a title page, table of contents, and reference page. Format your paper consistent with APA guidelines.

Annotated bibliography 1 | Human Resource Management homework help

                                                    Objectives
1) The Role of  Human Resources & Developing and Implementing Strategic HRM Plans.
2) Explain the role of HRM in organizations
3) Define and discuss some of the major HRM activities
4) Be able to define human resource management and the certifications that can be achieved in this profession.
5) Explain the professional and personal skills needed to be successful in HRM.
6) Be able to define the steps in HRM strategic planning.
7) Describe the steps in the development of an HRM plan.
8) Explain the aspects needed to create a usable and successful HRM plan.
Instructions
1)  You are to research two peer-reviewed articles 
2)  Your AB’s should be ½ to ¾ pages long. 
3)  It should be double-spaced, and you are to use Times new Roman 12 font. 
4)  APA Reference before the information  (see example) 
5)   You should pick the topic for your AB from the objectives listed at the beginning of each week’s module or from the syllabus. 
 Annotated bibliographies must be written in manner, in which, they are understandable. You must describe all-important data such as: 
• The participants 
• The reason the study was conducted 
• What research design was used (surveys, interviews, case study, etc.) 
• Which research analysis was used (MANOVA, ANOVA, Kruskal Wallace, etc.) • The results of the study along with any conclusions of the author(s) 

Viable erp solutions presentation | Computer Science homework help

 The CEO of the manufacturing company you are currently consulting for is planning to have a cross-functional division off-site meeting. The structure of the off-site is segmented into small 30-minute breakout sessions. You have been asked to lead a discussion on the discovery of other viable ERP solutions and how the various aspects of customer-driven business involve and impact SCM, CRM, and ERP systems.
Search the internet and/or University Library for various ERP software systems that are available.
Determine the main selection criteria ERP packages have in common (features, benefits, modules, and functionality).
Select three packages from your research and create a table summarizing the results of your research. Be sure to compare and contrast how each package handles SCM, CRM, and ERP.
Distinguish how the various aspects of customer-driven business involves and affects SCM, CRM, and ERP systems.
Prepare a 15- to-20 slide, multimedia-rich presentation with audio. The presentation should include:

Comparison table of your three selected software packages
Details of each system
Table of comparisons
SCM, CRM, ERP andthe relationship of customer-driven business
Summary with your conclusion

ACC 310 Accounting for Non-Accounting Majors Worksheet

Suzie Maye needs help in setting up basic accounting practices for her business. You begin by showing her how to set up a transaction analysis based on the accounting equation of Assets = Liabilities + Owner’s Assets. show Suzie how to enter the various assets, liabilities and owner’s assets into the transaction analysis template demonstrating the balance based on the equation. This will help Suzie understand that through this process every financial transaction that occurs in her business must be reconciled on each side of the equation. Please record the following transactions using transaction analysis. Please use attached template 1-MayOwner, Suzie Maye, invested $7,000 in her business, Matrix Consulting.2-MayCompany paid monthly rent, $900.3-MayCompany bought supplies on account, $600.5-MayCompany paid monthly advertising, $125.9-MayCompany performed services, $4,000.12-MayOwner, Suzie Maye, withdrew $1,000 for personal use.15-MayCompany performed services on account for $5,400.17-MayCompany paid monthly salaries, $2,500.20-MayCompany made a payment on account, $600.23-MayCompany received $4,000 from a customer on account.26-MayCompany borrowed $5,000 from local bank.29-MayCompany bought equipment on account for $4,200.30-MayCompany paid monthly utilities, $275.

UCLA Director of Rooms at A Large Hotel Management Discussion

Need help with my Management question – I’m studying for my class. Please review the scenario and answer the following questions:You are the Director of Rooms at a large hotel, and the top candidate for becoming the next Assistant GM. You are committed to creating and sustaining an employee-centered workplace. It comes to your attention that one of your frequent valued guests is sexually harassing one of your front desk attendants. This guest spends a lot of money at your hotel and also brings in numerous large meeting groups to the hotel throughout the year. You mention the harassment issue to the GM who tells you to overlook it because the guest in question is “just kidding around”. The harassment continues and the front desk employee comes to you again with a complaint. What should you do to correct this issue? Be very detailed in your response.What are the potential ramifications should this issue not be handled properly and your front desk attendant continue to be sexually harassed by a guest? 

Psychology discussion: how has research on human subjects changed?

HUMAN SUBJECTS: How has research on human subjects changed?
Read the Current Code: APA’s Ethical Principles of Psychologists and Code of Conduct (Uploaded to the link below and also attached as a file):
https://drive.google.com/file/d/14QdWlzbx0jM2OcnSK5pD3fXDniuU21E3/view?usp=sharing
Research an academic article (i.e. peer-reviewed) of a scientific experiment with human subjects that would VIOLATE CURRENT APA ETHICAL STANDARDS.
Briefly summarize your experiment in a post. Include a summary of the study itself (topic, method, results) as well as why you think this study is unethical. 
Now listen to the following podcast:
Trust engineers:  https://www.youtube.com/watch?v=nEBRa3NDbm8
and discuss whether or not Facebook was conducting unethical research, and how you personally feel as a potential research subject.
Your post should:
Explain why your experiment would be considered unethical by today’s standards.
Maximum of two pages.
Provide APA style reference (Author, Year Published, Title of Article, Journal Name)
Use your own words (i.e. no quotes and do not plagiarize)
Provide a 1-2 page summary of the study, what ethics code violation you believe occurred, as well as any valuable findings from the study, in addition to your response to the Facebook research. 

UCLA Human Resource Director Case Study

You are the HR Director of a seasonal ski resort in Vail, Colorado. One of the hourly kitchen employees approaches you and says that he was told by the kitchen manager that he could not receive company benefits because he works part-time hours; however, he informs you that he was hired during the off-season as a full-time employee, and has been working 25 hours per week because currently he is not needed for any additional hours. At the same time, he claims that one of the front desk staff told him that they were hired as a part-time employee, but receives benefits because they have been working 40 hours per week for the past year. QUESTIONS:1. What would you do to resolve this situation? Please be very detailed in your response and give the steps that you would follow to rectify the situation. (25 points)2. What criteria must be met for employees to receive benefits? Would there be any reason for an employee to potentially be disqualified from receiving employee benefits?  (15 points, 7.5 points for each portion of the question)

Annotated bibilography | Information Systems homework help

 
Please find 5 research article related to the topics discussed in Chapter 5. 
Topics could include:

System dynamics
Multi-actor systems modeling
Complex adaptive systems modeling

or any other topic contained in the chapter.
After reading and finding the 5 research articles, create an annotated bibliography. The deliverable will be one MS Word file that you will submit here. Please make sure that there are at least 150 words per article, this does not include references or copies of the abstract or introduction, these must be what you come up with.  
Here is a link with instructions on how to create an annotated bibliography. 
How to Prepare an Annotated Bibliography: The Annotated Bibliography 
Please find 5 research article related to the topics discussed in Chapter 5. 
Topics could include:

System dynamics
Multi-actor systems modeling
Complex adaptive systems modeling

or any other topic contained in the chapter.
After reading and finding the 5 research articles, create an annotated bibliography. The deliverable will be one MS Word file that you will submit here. Please make sure that there are at least 150 words per article, this does not include references or copies of the abstract or introduction, these must be what you come up with. 
https://guides.library.cornell.edu/annotatedbibliography

Discuss what type(s) of countermeasures need to be implemented to

 
In this scenario, hackers launch cyber attacks that affect several parts of the nation’s financial infrastructure over the course of several weeks. Specifically, sensitive credit card processing facilities are hacked and numbers are released to the Internet, causing 120 million cards to be cancelled; automated teller machines (ATMs) fail nearly simultaneously across the nation; major companies report payroll checks are not being received by workers; and several large pension and mutual fund companies have computer malfunctions so severe that they are unable to operate for more than a week. Identify the countermeasures that need to be implemented to prevent these cyber attacks from occurring in the future.
Start a discussion thread and discuss what type(s) of countermeasures need to be implemented to prevent the cyber attack described above from occurring in the future. Be specific in recommending countermeasures for this scenario.