1. Create a TV ad, radio ad, or poster idea to discourage drug use. You can focus on a general message or focus on one substance like alcohol, vaping, opioids, etc.  Then Explain how you could use this media form for prevention. 

 1. Create a TV ad, radio ad, or poster idea to discourage drug use. You can focus on a general message or focus on one substance like alcohol, vaping, opioids, etc.  Then Explain how you could use this media form for prevention. 
2. Do you rely on caffeine to start your day? Do you rely on caffeine later in the day to “get through” your day? If no, how do you start your day or create energy? 
3. Do you think caffeine is a gateway drug?  Why or Why not?
4.  What drug do you think (alcohol, tobacco, caffeine, or marijuana) leads to exploring other drugs the most? Why?
5. Is there a drug you think should be a considered a “gateway drug”, aside from the already known ones?  What and why?

Create a TV ad, radio ad, or poster idea to discourage drug use. You can focus on a general message or focus on one substance like alcohol, vaping, opioids, etc.  Then Explain how you could use this media form for prevention.  2. Do you rely on caffeine to start your day? Do you rely on caffeine later in the day to “get through” your day? If no, how do you start your day or create energy?  3. Do you think caffeine is a gateway drug?  Why or Why not?

Please do the following in completing the final draft of your essay:
1. Revise your expository essay using the feedback received from your instructor on your outline and first draft.
2. Review the media piece 
The Writing Process to help you refine and finalize your essay.

3. Review the rubric for this assignment to ensure you have completed all necessary components of your essay.
4. Your final draft should be at least 750-1,000 words.
5. Complete the following before submitting your final essay:
· Read your paper aloud (to yourself or someone else) to “hear” issues with your grammar and sentence structure.
· Polish the issues found by smoothing out your language.
· Run spellcheck and grammar check (as a backup) 
before submitting the final draft. Make any necessary changes to address spelling or grammar issues.

· Properly cite your sources both in-text and in the References section at the end of your paper. 

(The Reference Page is the last page of your paper and should ONLY contain references. If you cited the work in the paper; the reference needs to be included. If you did not use the reference in your paper, then do not include the reference.)

· Make sure that the final draft 
does not contain any of the instructors embedded feedback from your first draft. These comments should have been corrected and the comment should be deleted. Please contact your instructor if you have questions.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center.

Review the Final Draft Rubric to help you make sure all elements is present in your essay; this is NOT the same rubric that was used in the First Draft. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. 

Submit the completed Final Draft to LopesWrite and review your report BEFORE submitting to your instructor. Make sure your LopesWrite score and essay are ready to be submitted BEFORE you select the “Final Submit” option.

General Education Program Information

This assignment assesses the following general education competency:

Effective Communication

GED2C1: Construct logical, cohesive, and persuasive arguments.

Explain the capital budgeting process and describe the available methods of evaluating alternative investments. Explain in your own words what is meant by the time value of money and why some of the methods consider it and others do not. Give an example of a method that considers it and one that does not.

Explain the capital budgeting process and describe the available methods of evaluating alternative investments. Explain in your own words what is meant by the time value of money and why some of the methods consider it and others do not. Give an example of a method that considers it and one that does not.

Is Turings test the right way to approach the idea of intelligence? In other words, if you have a conversation with a computer and you believe that you are talking with a human, would that computer be intelligent? Why or why not?

Is Turing’s test the right way to approach the idea of intelligence? In other words, if you have a conversation with a computer and you believe that you are talking with a human, would that computer be intelligent? Why or why not?

I do not believe that Turing’s test is the right way to approach the idea of intelligence. While I would agree that certain computer systems can do extraordinary things, I do not think it should be considered intelligence. This is because as far as my knowledge on computers goes, they are only able to do as much as we code them to do. Meaning, computers are nothing without human interference. If I were to have a conversation with “someone” online and it turned out to be a computer, I would think the computer possessed less “intelligence” than that of a real person I could have a conversation with. This is because I think a crucial part of intelligence is the human factor. When I have conversations with coworkers, for example, they are hearing my words for the first time and actively dig from their own personal memories and experiences to formulate a unique response to what I am saying. So while I think computers are highly advanced systems that can perform certain “roles” very well, I do not think they are the way we should really measure intelligence. 

How are human thinking and machine computing similar in function of memory? How are they different?

I think human thinking and machine computing are similar in function of memory, because both systems work to pull data/memories that would be relevant to the question or topic at hand. These systems operate very differently at the same time, because while I use personal experiences as a base for my own intelligence, computers use whatever data is given to them. Another major difference is that I will recall past experiences with a certain bias or subjective way of thinking. This is because my memory may take into account body language, tone, and other underlying factors that only I would know. A computer cannot take into account these factors, so it will often have a pretty objective, blunt response to whatever data it is trying to receive. 

Do you think it’s possible for computers to ever think or be as intelligent as humans? Why or why not?

I don’t think it is possible for computers to ever be as intelligent as humans, because computers will never be able to feel genuine human emotion. It is a very unique experience that cannot be transferred into a technological system or any form of artificial intelligence. Emotion serves as motivation for most of our perspectives/opinions, and I think it would be impossible to assume that computers would ever be able to account for that factor. Artificial intelligence may be able to act as such through pre-written dialogues, but these systems will never be able to form their own opinions. Therefore, they will never be as intelligent as humans. 

How do either of the concepts of human intelligence or artificial intelligence apply to any of the following programmatic course themes:

I think the topic of human intelligence really applies to emotional intelligence. This is because we often draw upon our own empathy and other emotional skills we’ve learned in order to tackle certain issues during our day to day lives. I think that in order to have human intelligence, we must first have a strong sense of emotional intelligence.
Remember to respond to two peers while being respectful of and sensitive to their viewpoints. Consider advancing the discussion in the following ways:

Post an article, video, or visual to reinforce a peer’s idea or challenge them to see their point from a different perspective.
Engage in conversation with your peers around the topic of intelligence. Consider asking a question or sharing your own personal experience.

Illustrate the processes of detecting rogue devices, detecting malicious connections, and viewing network topologies to identify network weakness. Explain how to interpret the output of network scans to identify weaknesses.

 Revise and submit your finalized training manual. Make sure to incorporate all of the feedback you have received throughout the course, and add your executive overview to your submission. You will also create an overview of recommended tools in section seven of the training manual. 
 
Overview
You work for Strategic Security Consulting Group (SSCG). Recently, one of your clients located in Los Angeles, North Star Software Developers (NSSD), called with a big problem. NSSD’s strategic security goals include protecting the software development process and code as well as sensitive client information from internal and external breaches. Some of its network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the company’s software products. It is not presently known whether this attack came from inside or outside of the company. NSSD is currently dealing with this problem as best as it can, but it needs your company to help prevent this from happening again in the future.
You have been assigned to create a training manual for NSSD’s IT personnel in which you test, describe, and recommend a variety of network security tools that, when used properly, will mitigate both the risk of future breaches and the effects of a breach when it takes place.
Given the above scenario, you will also create an executive overview that describes the appropriate areas of concern from your research in this course. This should be written in language that can be understood by a nontechnical audience of company management and stakeholders.
In this assignment, you will demonstrate your mastery of the following course outcomes:

Interpret results of network and vulnerability scans for identifying security vulnerabilities
Implement appropriate methods that protect against and address network threats and vulnerabilities using appropriate risk mitigation techniques
Categorize the severity of security incidents using industry best practices for determining the appropriate immediate response
Recommend timely countermeasures that minimize the consequences of current security incidents
Communicate response and mitigation strategies that align with an organization’s strategic goals

Prompt
Specifically, the following critical elements must be addressed:
Network Assessment and Defense Training Manual:

Executive Overview

Create a brief description of the purpose of the manual that is in consumable terms for the stakeholders. Be sure you address the company’s strategic security goals and the value of the policy changes or updates.
Assess the role of network defense methods and strategies for securing the network. Support your findings with research and experience from the lab exercises.
Evaluate the role of mitigation methods and strategies in reducing security risk. Support your findings with research and experience from the lab exercises.
Summarize the role of incident response methods and strategies in minimizing the impact of breaches. Support your findings with research and experience from the lab exercises.

Training ManualFor each section of the training manual, develop guidelines for employees to select and employ specific software, tools, and methods to address the elements of the section topic. Your guidelines serve as recommendations of specific tools and criteria for determining when to use these tools. Each section should include relevant screenshots to support the instructions.

Traffic Analysis: Based on the labs used for traffic analysis, address the tools, methods, and techniques related to traffic analysis. Be sure to provide screenshots for the output elements that support the following areas:

Create guide materials for identifying vulnerabilities and potential threats through interpreting output from packet capturing tools.
Recommend the alert response procedures required for traffic anomalies identified through monitoring network traffic and examining logs.

Firewalls: Based on the labs associated with firewalls, address the tools, methods, and techniques related to perimeter defense using firewalls. Be sure to provide screenshots for the output elements that support the following areas:

Illustrate the process of rule creation and firewall configuration.
Outline the steps for segmenting networks. Be sure to describe the benefits of the segmenting strategies.
Explain the process and criteria for blocking, allowing, and filtering traffic.
Create guidelines for the implementation of methods for detecting attacks.

Intrusion Detection: Describe the configuration of intrusion detection systems, specifically addressing the following:

Whitelisting and blacklisting
IDS placement
Summarize the key aspects of monitoring, logging (auditing), and alerting using intrusion detection systems

Vulnerability Assessment

Illustrate the proper implementation of port scanning, device scanning, and penetration testing and detection for conducting vulnerability assessments.
Explain how to interpret the output of a vulnerability scan to identify weaknesses.

Network Assessment

Illustrate the processes of detecting rogue devices, detecting malicious connections, and viewing network topologies to identify network weakness.
Explain how to interpret the output of network scans to identify weaknesses.

Auditing and Log Collection

Recommend appropriate company-approved tools that minimize the consequences of incident events, and include appropriate rationale and justification.

Tools Overview: Provide a brief summary of the key company-approved tools, represented by those used in the lab exercises. In your summary, identify the importance of and rationale for selecting these tools.

What to Submit
Make sure to incorporate all of the feedback you have received throughout the course, along with adding your executive overview to your submission. For this assignment, you must follow these formatting guidelines: 12-point Times New Roman font, and APA references and citations.

How can project risk management help improve project performance? What do you think are the most important factors to keep in mind and manage when managing risk? Some examples might be communication, schedule management, stakeholder management, etc. What will you be focusing on to manage the risks that you identify in your project?

 Assignment1:
Discussion Questions
Read pages 96 -103 of your textbook (Meredith et al., 2021), and discuss the following questions: How can project risk management help improve project performance? What do you think are the most important factors to keep in mind and manage when managing risk? Some examples might be communication, schedule management, stakeholder management, etc. What will you be focusing on to manage the risks that you identify in your project?
Reminder: A high quality post is one that explicitly links your personal opinion or experience with the course materials or other relevant outside sources using proper APA format. Both in-text citations and a reference list are required for this discussion. You may earn up to 5 points for this discussion; and you may find the following resources helpful:
Web Links https://apastyle.apa.org/instructional-aids (Links to an external site.)Links to an external site. https://www.wyzant.com/highered/student/sso/northeastern-university/tutoring-request (Links to an external site.)Links to an external site. https://owl.purdue.edu/owl/research_and_citation/apa_style/apa_style_introduction.html (Links to an external site.)Links to an external site. http://www.cps.neu.edu/student-resources/tutoring-services.php  (Links to an external site.)Links to an external site.https://prowritingaid.com/  (Links to an external site.)Links to an external site.http://owl.excelsior.edu/grammar_essentials/  (Links to an external site.)Links to an external site.http://library.northeastern.edu/Links to an external site.

Assignment2 :

 
Week 3 – Personal Assessment of Skills (12 points)
4949 unread replies.4949 replies.
Complete the Complete Project Manager Assessment Survey Instrument
Actions found in the Reading area.  This is a good way to assess the "talent gap" referred to by Mark Langley in the "Are You Ready?" video last week.
Use the Excel spreadsheet TCPM survey short22.xlsx Download TCPM survey short22.xlsx(or Survey Tables from the Discussion area) to record and post your results.
(NOTE:  It is important to use numerical formatting, not images or text, so the scores may be cut and pasted into a benchmark database).
Post the spider diagram that depicts your skill set (e.g. Excel radar chart). Copy and paste or scan the diagram and insert it in your posting.  Discuss how this assessment may be helpful for determining your readiness to lead and manage technical projects and compare your skills with team mates.  How might it then guide you on a personal development plan?  Cover how assessment and diagramming tools like these can be helpfully deployed on technical projects.

Assignment 3:
 
Week 3 Discussion – Motivating Behaviors (12 points)
4040 unread replies.4040 replies.
Pick a current, previous [or hypothetical] team of five people who have different motivators for success — describe how they are motivated, based on your observations or discussions with the individuals. How did you determine these motivating factors–what clues, statements, or behaviors were evident?
Prepare an announcement to the team, just prior to starting a technical project.  Describe your approach to meeting each person’s needs, as well as motivate the group as a whole.  Include relevant examples from personal experiences.   Include a communications plan, such as in a spreadsheet, that lists individuals, their traits, and suggested approaches.
It is important to ensure that team members or employees feel they have a good fit between themselves and their job, that they feel comfortable talking to their project manager or supervisor, that communications are clear, and that they are appropriately recognized for their performance or achievements.
To practice effective stakeholder management, what do or would you do to make sure that, regardless of individual job descriptions, the needs of your team members are being honored? Be specific about how you would set clear expectations, taking into account the different needs and personalities of team members.

TCPMsurveyshort22.xlsx

Sheet1

Name:

Score

The Complete Project Manager Evaluation Tool

1
Leadership/Management–interact with others and achieve results

2
Personal–able to motivate and influence others

3
Humor–commitment to creating fun working environments

4
Project management–competent with people and processes to deliver results

5
Environment–creating people friendly operating conditions

6
Organization–structure and culture to support "green" relationships

7
Negotiations–engage with others to reach agreements

8
Politics–effective in using power and influence

9
Conflict management–able to work through disagreements

10
Sales–secure necessary commitments to ideas, plans, or actions

11
Change management–willing to guide alternate approaches

12
Market/customer–knowledgeable about clients, end-users, and market forces

13
Integration–able able to apply complete set of people, organizational, and technical skills

14
Success–project met all objectives and achieved desired outcomes

ERROR:#DIV/0!

Average (items 1-13)

© Englund Project Management Consultancy

Lead / Mgmt
Humor
Personal
Proj Mgt
Environment
Organization
Negotiate
Political
Conflict
Sales
Change
Mkt/Cust
Integrate
Success

My Complete PM Skill Radar Chart
Lead / Mgmt Humor Personal Proj Mgt Environment Organization Negotiate Political Conflict Sales Change Mkt/Cust Integrate Success

My TCPM Skill Scores
Lead / Mgmt Humor Personal Proj Mgt Environment Organization Negotiate Political Conflict Sales Change Mkt/Cust Integrate Success

Explain the competitiveness factors supporting the Fourth Industrial Revolution.

Read the article and answer the below questions (1-page answer per question; Times New Romans, 12, 1.5 space):Sala-I-Martin, X., Crotti, R., Baller S., Battista A., Drzeniek-Hanouz M., Geiger T., Gaviria D.G., Marti G. (2017), Modernizing the Measurement of Drivers of Prosperity in Light of the Fourth Industrial Revolution, (pp. 51-62). In K. Schwab (Ed.), The global competitiveness report 2016-2017. Geneva: World Economic Forum. (article is posted in eLearning – Learning Modules)Questions to be answered:
1. Explain the competitiveness factors supporting the Fourth Industrial Revolution.
2. Article claims that “Increased measurement challenges in calculating GDP have lessened its value as an indicator of economic progress, and also calls in to question the accuracy of productivity estimates, which require precise evaluation of output, capital, and labor.” (pp.52). Explain this claim.
3. Explain the five directions for measuring competitiveness during the rise of the Fourth Industrial Revolution.

TheGlobalCompetitivenessReport2016-2017_FINAL.pdf

A dentist has asked his assistant to perform a cleaning on a patient. The assistant has observed many cleanings and she’s confident she can do a good job. But the assistant is not licensed to carry out a cleaning and she points this out to her boss. The dentist offers her $30 cash on the side and the assistant accepts the arrangement. The assistant performs the cleaning and the procedure goes smoothly. The patient has no idea what’s happened and is satisfied with the office visit. Fully explain and apply utilitarianism to this particular situation. Was it OK for the dentist and assistant to treat the patient this way? Describe how utilitarianism works in general and address factors that would be important according to this view. Do you think the dentist and assistant behaved morally?

  
A dentist has asked his assistant to perform a cleaning on a patient. The assistant has observed many cleanings and she’s confident she can do a good job. But the assistant is not licensed to carry out a cleaning and she points this out to her boss. The dentist offers her $30 cash on the side and the assistant accepts the arrangement. The assistant performs the cleaning and the procedure goes smoothly. The patient has no idea what’s happened and is satisfied with the office visit. Fully explain and apply utilitarianism to this particular situation. Was it OK for the dentist and assistant to treat the patient this way? Describe how utilitarianism works in general and address factors that would be important according to this view. Do you think the dentist and assistant behaved morally? Justify your own view. Write 2-3 paragraphs. Begin typing your answer below. 

Describe some leadership styles and traits that would make you the ideal candidate for an executive position in a health care organization.

 
Use Basic Search: Strayer University Online Library and the Internet, to research leadership traits and merits. Respond to the following:

Describe some leadership styles and traits that would make you the ideal candidate for an executive position in a health care organization.

Assignment Instructions
Write a one-page paper You will be graded on the following:

Quality of your response.
Coherence and organization.
Mechanics.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all support. Check with your professor for any additional instructions.
The specific course outcome associated with this assignment is:

Synthesize the functions of the master's-prepared health care administrator, including role, responsibilities, and priorities.

What information are hackers trying to obtain through the enumeration process? Why is this data so valuable to hackers? What are the safety measures that organizations can implement to protect this information?

 
Assignment 1: Enumeration of Information
During the enumeration process, hackers are trying to learn more about the actual system and the information contained within the computer systems.
Tasks:
On the basis of information from the course textbook, answer the following questions:

What information are hackers trying to obtain through the enumeration process?
Why is this data so valuable to hackers?
What are the safety measures that organizations can implement to protect this information?

Note: Your response should rely upon at least two sources from professional literature—articles from peer-reviewed journals and relevant textbooks. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and use accurate spelling, grammar, and punctuation.
Submission Details:
By Week 3, Day 3, in a minimum of , post your response to the appropriate Discussion Area. Through Week 3, Day 7, review and comment on at least two of your peers’ responses. Consider the following in your response:

Provide a statement of clarification or a point of view with rationale.
Challenge a point of discussion or draw a relationship between two or more points of the discussion.

Discussion Grading Criteria and Rubric
All discussion assignments in this course will be graded using a rubric. This assignment is worth 40 points. Download the discussion rubric and carefully read it to understand the expectations.