What are Coca-Cola’s competitive advantages?

I need a question answered from HBR case study named: “Coca-Cola in 2011: In Search of a New Model”. The question is: 
An introduction to the case and What are Coca-Cola’s competitive advantages?
The case-brief should be written in a business scholarly tone, include at least 4 scholarly references which . The case-brief should have, organization, structure, use APA, include in-text cites matching all references, and the references must accurately support the ideas for which they are cited. The answer should be HBR case study Coca-Cola in 2011: In Search of a New Model.
Here is the case synopsis:  
Case Synopsis: Muhtar Kent, CEO of the Coca-Cola Company, faced a critical decision in 2011 after closing a $12 billion deal to buy its troubled North America bottling operations from its biggest bottler, Coca-Cola Enterprises. The decision was prompted by several changes in the U.S. market, including the bottler’s inability to make crucial investments, the growth of alternative, non-sparkling drinks, and the growing power of national accounts, such as Wal-Mart. Now that Coke owned most of its North American bottling network, Kent had to decide whether keeping the labor and capital-intensive side of the bottling business was in Coke’s long-term strategic interest. If not, should he re-franchise the bottling business, again, as Coke had done in the past? Or was there a third path? For one of the most successful companies in the world over the last 100 years, Kent’s answers to these questions had the potential to redefine Coke’s business model for the next century. 

Sociologist C. Wright Mills preferred to call the sociological perspective the sociological imagination, and he saw it transforming personal troubles into public issues. Let us begin our discussion this week by considering suicide, which is thoroughly explored in your textbook reading for this week. For the initial post, respond to one of the following options, and label the beginning of your post indicating either Option 1 or Option 2: Option 1: Do a little digging: What resources are there in your state or local community for suicide prevention? Are the resources adequate, in your view? Why or why not? How does the sociological imagination help you decide whether or not the resources are adequate?

Sociologist C. Wright Mills preferred to call the sociological perspective the sociological imagination, and he saw it transforming personal troubles into public issues. Let us begin our discussion this week by considering suicide, which is thoroughly explored in your textbook reading for this week.
For the initial post, respond to one of the following options, and label the beginning of your post indicating either Option 1 or Option 2:

Option 1: Do a little digging: What resources are there in your state or local community for suicide prevention? Are the resources adequate, in your view? Why or why not? How does the sociological imagination help you decide whether or not the resources are adequate?
Option 2: Is this a “downer” topic to start a course or a textbook? If so, how would you explain the sociological imagination to a friend, in a different way? If not, why is this an important topic to help you learn about the sociological imagination?

APA format for in-text citations and list of references
Minimum of 1 source cited

Describe the primary importance of the priority concept (topic) to professional practice. ·     Describe the importance of the priority concept (topic) to the health status of a patient population.

Hello,
I need a 4-6 page research paper, 
The reference and Title pages are separate pages.
Style: APA, Times New Roman, 12pt font
The topic for the presentation is   Parental Management Strategies for Children with Attention Deficit Hyperactivity Disorder
1)     Include the following sections:
a.     Introduction
·     Offer a detailed description of the purpose statement for the paper.
·(topic): health promotion and maintenance of health.
·     This section should not exceed two (2) paragraphs. A paragraph is 3-5 sentences.
b.     Importance – 
·     Describe the primary importance of the priority concept (topic) to professional practice.
·     Describe the importance of the priority concept (topic) to the health status of a patient population.
·     Include 2 potential negative effects (s) on professional practice if the priority concept (topic) is unresolved.
·     Include 2 potential negative effects (s) on the patient population if the priority concept (topic) is unresolved.
·     Provide appropriate, adequate, and relevant scholarly support for this section.
c.      Healthcare Disparities, Inequalities, and Interventions 
•       Identify a primary patient population that may be negatively influenced by the priority concept (topic) if unresolved.
•       Identify a healthcare resource to support evidence-based professional practice related to the priority concept (topic).
•       Summarize potential priority concept (topic) healthcare disparities and inequalities related to diverse populations.
•       Propose an evidence-based solution for the priority concept (topic) related to healthcare disparities.
•       Identify an evidence-based practice intervention.
•       Discuss patient education considerations related to the priority concept (topic).
•       Provide appropriate, adequate, and relevant scholarly support for this section.
d.     Legal & Ethical Considerations and Intervention Challenges 
•       Identify one (1) ethical and one (1) legal implication for addressing the priority concept (topic) in professional practice.
•       Discuss one (1) strategy for preventing an ethical dilemma related to the priority concept (topic) in professional practice.
•       Discuss one (1) strategy in preventing legal consequences related to the priority concept (topic) in professional practice.
•       Identify one (1) anticipated challenge to the success of preventing the priority concept (topic) in professional practice.
•       Identify one (1) anticipated challenge to the success of resolving the priority concept (topic) in professional practice.
•       Provide appropriate, adequate, and relevant scholarly support for this section.
e.     Participants and Interdisciplinary Approach – 
•       Identify three (3) parties (identify two (2) members of a discipline outside of nursing) who will be involved in the implementation of the priority concept (topic) interventions.
•       Discuss the role of this member in the intervention implementation for the priority concept (topic).
•       Discuss the benefit of including the identified interdisciplinary members from disciplines outside nursing to promote evidence-based professional practice.
•       Provide appropriate, adequate, and relevant scholarly support for this section.
f.      Quality Improvement – 
•       Provide at least one (1) benefit in patient outcomes from addressing the priority concept (topic) within the clinical environment.
•       Provide at least one (1) benefit to the nursing profession that will result from addressing this priority concept (topic) in clinical professional practice.
•       Discuss at least one (1) resource utilized to promote improved patient outcomes in the clinical environment.
•       Discuss at least one (1) resource utilized to increase professional nurse knowledge promoting improved clinical professional practice.
•       Provide appropriate, adequate, and relevant scholarly support for this section.
g.     Conclusion – 
•       Provide a thorough recap of the purpose to promote increased evidence-based professional practice knowledge related to the priority concept (topic) deficiency.
•       Summarize resources identified to support improved evidence-based professional practice related to the priority concept (topic).
•       Include a complete statement describing why addressing the priority concept (topic) matters for patient outcomes and evidence-based professional practice.
•       This section should provide no new information and should be limited to 1-2 paragraphs.
h.     APA Style and Organization 12 points/10%
•       References are submitted with the paper. 
•       It uses the current APA format and is free of errors.
•       Grammar and mechanics are free of errors.
•       Paper is 4-6 pages, excluding title and reference pages.
•      A minimum of three (3) scholarly, peer-reviewed primary sources from the last 5 years, excluding the textbook, are provided.
•      Each section should have a cited source to support the information provided.

What is the role of primary care in the United States? What level of care does it provide? 2. Compare the roles of outpatient services and hospitals related to their place within the health care delivery system. 3. How have the roles of outpatient services and hospitals evolved in the past 10 years?

essayrequirements.docx

Write a 500-750-word essay, describe the following: 
1. What is the role of primary care in the United States? What level of care does it provide?
2. Compare the roles of outpatient services and hospitals related to their place within the health care delivery system.
3. How have the roles of outpatient services and hospitals evolved in the past 10 years?
4. Identify two functions shared by both outpatient services and hospitals. How do outpatient services and hospitals differ in their approach to these functions?
5. What are the future trends of outpatient and hospital services?
Do not include the title page or the references page when determining whether you have achieved the required word count for this assignment.
A minimum of two references, in addition to the textbook link that’s attached below

BibliU – Reader – Essentials of the U.S. Health Care System, Sixth Edition

The futures markets offer investors an opportunity to trade precious metals (gold, silver, copper), agricultural goods (grains, livestock, coffee), financial assets (stocks, bonds, bitcoin), and many others. The trading is done via a futures contract, which is a commitment to deliver or accept delivery of a certain quantity of an asset at a specified date at an agreed-upon price.Describe two essential features of a futures contract and how the futures market operates.Discuss one major difference between a cash market and a futures market.Explain why both hedgers and speculators are important to a futures market.Explain one challenge you faced when creating your own hypothetical investment portfolio in Week 4.Discuss one area of investment planning you want to learn more about.

The futures markets offer investors an opportunity to trade precious metals (gold, silver, copper), agricultural goods (grains, livestock, coffee), financial assets (stocks, bonds, bitcoin), and many others. The trading is done via a futures contract, which is a commitment to deliver or accept delivery of a certain quantity of an asset at a specified date at an agreed-upon price.Describe two essential features of a futures contract and how the futures market operates.Discuss one major difference between a cash market and a futures market.Explain why both hedgers and speculators are important to a futures market.Explain one challenge you faced when creating your own hypothetical investment portfolio in Week 4.Discuss one area of investment planning you want to learn more about.Provide one credible resource that will help you gain additional knowledge, such as a credible website, article, or video. (Note: This resource should be different from what you provided in earlier weeks.)

Imagine that you are running for political office in an African Country. Create a campaign video, brochure, or flyer that include the eight elements described below. Include the type of government, (1) the office that you are seeking, and (2) how you can bring change to the country. Make your campaign propaganda specific to the issues (3) environmental, (4) political, (5) economic  facing the country you have chosen. Include at least one solution to each issue/how you will address the issue as a member of government

Imagine that you are running for political office in an African Country. Create a campaign video, brochure, or flyer that include the eight elements described below. Include the type of government, (1) the office that you are seeking, and (2) how you can bring change to the country. Make your campaign propaganda specific to the issues (3) environmental, (4) political, (5) economic  facing the country you have chosen. Include at least one solution to each issue/how you will address the issue as a member of government (6-8). 

Discuss what role FinTech is playing in the financial industry. Also how companies are increasing their sales through technology.

Discussion 4.1
What is Statement of Cash Flows? Discuss. Also discuss the three activities which are part of the statement. Operating/Financing and Investments.
REFERENCES ARE MANDATORY. MINIMUM 150 WORDS REQUIREMENT.
Case Study 4.1
Answer the following questions:
1. Discuss what role FinTech is playing in the financial industry. Also how companies are increasing their sales through technology. MINIMUM ONE AND HALF PAGE REQUIREMENT. REFERENCES ARE MANDATORY AND OUTSIDE THE BOOK REFERENCES ARE ENCOURAGED.

2. Explore the website of FICO and write TWO pages as to what info you found on the website. Either you are applying for a loan as a business owner or for personal use this score is very important to keep track. Explore different tabs.
WWW.MYFICO.COM

3. Explore the website of Motley Fool and write TWO pages as to what info you found on the website. Explore different tabs.
WWW.FOOL.COM

PLEASE FOLLOW THE PAGE REQUIREMENT GUIDELINES. REFERENCES SHOULD BE ON A SEPARATE PAGE/ REFERENCES ARE MANDATORY AND OUTSIDE THE BOOK REFERENCES ARE ALLOWED. GOOD LUCK!
Weekly Summary 4.1
Each week you will write and submit a brief summary of the important concepts learned during the week. The summary will include a summary of the instructor’s weekly lecture including any videos included in the lecture. MINIMUM ONE PAGE REQUIREMENT.

What constitutes an appropriate role for the judiciary? Some people argue that courts have become too powerful and that judges legislate from the bench. What does it mean for a court to be activist? What does it mean for a court to show judicial restraint? Although conservatives have long complained about the activism of liberal justices and judges, in recent years liberals have pointed out that conservative judges and justices are now more likely to overturn precedents and question the power of elected institutions of government. Conservatives counter by saying they are simply returning to an older precedent that had been ignored by liberals. If both liberals and conservatives engage in judicial activism, what is the role of the concept of “activism” (perhaps judicial activism is just a term used to describe a court decision you disagree with)?

What constitutes an appropriate role for the judiciary? Some people argue that courts have become too powerful and that judges legislate from the bench. What does it mean for a court to be activist? What does it mean for a court to show judicial restraint? Although conservatives have long complained about the activism of liberal justices and judges, in recent years liberals have pointed out that conservative judges and justices are now more likely to overturn precedents and question the power of elected institutions of government. Conservatives counter by saying they are simply returning to an older precedent that had been ignored by liberals. If both liberals and conservatives engage in judicial activism, what is the role of the concept of “activism” (perhaps judicial activism is just a term used to describe a court decision you disagree with)? must be

Explain the importance of information security (IS). 5.1 Identify potential cyberthreats presented with electronic communications.

SEC 3302, Advanced IS Security 1

Course Learning Outcomes for Unit I
Upon completion of this unit, students should be able to:
5. Explain the importance of information security (IS).
5.1 Identify potential cyberthreats presented with electronic communications.
5.2 Develop a security policy.
5.3 Investigate strategies for instigating an email security testing campaign.

Required Unit Resources
Chapter 1: The Threat Environment
In order to access the following resources, click the links below. You can access transcripts for the videos by
clicking on the three dots below the video on the right, then clicking “Open transcript.”
Professor Messer. (2020, December 10). Other social engineering attacks – SY0-601 CompTIA Security+ :

1.1 [Video]. YouTube. https://www.youtube.com/watch?v=trAs7C5h1BU
Professor Messer. (2020, December 10). Principles of social engineering – SY0-601 CompTIA Security+ : 1.1

[Video]. YouTube. https://www.youtube.com/watch?v=ndwCR1kYz5M
Professor Messer. (2020, December 10). Threat actors – SY0-601 CompTIA Security+ : 1.5 [Video]. YouTube.


Professor Messer. (2020, December 20). Bots and botnets – SY0-601 CompTIA Security+ : 1.2 [Video].

YouTube. https://www.youtube.com/watch?v=CHrES3Swpw4
Professor Messer. (2021, January 7). Denial of service – SY0-601 CompTIA Security+ : 1.4 [Video]. YouTube.


Professor Messer. (2021, January 11). Attack vectors – SY0-601 CompTIA Security+ : 1.5 [Video]. YouTube.


Unit Lesson
The Threat Environment
Corporate security is vitally relevant in today’s business world. One cannot look at their newsfeed on any day
without seeing a story about an organizational cyberattack, customer data theft, or some newly detected
threat. These types of attacks can have an enormous impact on infrastructure, resources, reputation, assets,
customer information, and corporate data. Attacks come in many forms, evolve almost daily, and may include
malware, phishing, social engineering, web-based attacks, malicious code, botnets, stolen devices, denial of
service (DoS), malicious insiders, or ransomware (Boyle & Panko, 2021).
Businesses obviously have a strong interest in protecting infrastructure from these threats, but protection
requires corporations to have comprehensive information technology (IT) security policies, procedures,
hardened applications, and secure hardware. Because all of these topics are also covered in your Chapter 1
readings, you may have guessed that the topic for this unit is the threat environment.
UNIT I STUDY GUIDE
IS Security and Basic Threats

SEC 3302, Advanced IS Security 2

UNIT x STUDY GUIDE
Title
Threats to the Entity Are Threats to the Individual
Let’s start with a general understanding of how the threat environment impacts both entities and individuals.
While we could separate personal from corporate threats, the reality is that the potential for exploits overlaps
both worlds. For instance, although we do not generally concern ourselves with corporate espionage in our
personal lives, most security issues can affect us both personally and professionally.
For example, a data breach happens when an unauthorized person views, alters, or steals secured data
(Boyle & Panko, 2021). While these breaches are extremely expensive for an organization to rectify—in both
direct and indirect costs—there are also costs for the individuals whose information was stolen. Often, this is
because personally identifiable information (PII), such as bank account information and social security
numbers, is stolen during the attack and used illegally by the attackers.
Thus, it is important to understand security holistically. We need to understand what the threat is, how it is
perpetrated, how we can mitigate the threat, and how we can clean up the mess.
Motivations for Attacks
To start, we must understand the terminology and basic differences in malware, exploits, and types of attacks.
However, the purpose of this lesson is not to define and explain each of the types of attacks. You can read
that information in your textbook. The purpose of this lesson is to give you some context and to discuss some
of the concepts of attacks and why they occur. Why are individuals and organizations attacked? What is it the
attacker wants?
It is important to understand that motivations have changed over the years. Initially, years ago, hackers did
not aim to cause massive damage to systems or seek financial gain. Instead, that era of hackers were more
interested in the thrill of break-ins, the validation of their skills, and a sense of power. Hackers who
communicated and operated within groups could demonstrate their ability by breaking into well-defended
hosts, which would increase their reputations amongst other hackers. Attacks were, therefore, an essential
part of climbing the hacker social hierarchy.
Today, these motivations have largely changed in modern society. Whereas early hackers were interested in
social status and being part of a social group, nowadays, hackers are more interested in financial gain.
Therefore, they often desire personal information, such as credit card information, that may provide them with
access to financial resources. Obtaining social security numbers and other personal information may lead to
identity theft, resulting in the potential for theft of large sums of money from multiple victims. There have even
been instances when identity thieves filed bankruptcy on behalf of their victims in an attempt to buy
themselves more time to get away with their crimes.

Hackers are a reality in today’s world, and their work is becoming more prevalent and far-reaching.

Whether they are beginners working in a basement with purchased malware or highly skilled experts
working in a terrorist cell, they can cause issues for individuals as well as for large companies. Note:

As shown in the photo on the right, hacking is not limited to computers—cellphones and other devices
may also be used as tools or become targets.

(Photos from left: Stevanovicigor, n.d.; Hackcapital, 2018; Flynt, n.d.)

SEC 3302, Advanced IS Security 3

UNIT x STUDY GUIDE
Title
These segments (Segments 1–4) from the video The Rise of the Hackers provide interesting information
concerning hackers, and, as a part of that information, it details the experiences of one man who was hacked.
In the video, hackers’ keyboards are being equated to bombs when describing the amount of destruction they
can cause.
For a transcript of the video, click on “Transcript” at the top of the video segment menu to the right of
the video.
Attacks for Financial Gain
Password gathering may mean obtaining bank account information, which means the potential for stolen
money. In an organization, accessing the network via hacking usually means the hacker is looking for
information. That information could include employee social security numbers or customer credit card
information. The thieves may be middlemen who sell that information to others rather than using it
themselves, but either way, the end result is always financial gain. In rare cases, the attacks may involve
extortion or the selling of trade secrets. Again, the result being sought is financial gain.
There are also known cases of corporate identity theft. Imagine gaining access to the personal information of
the owners of a partnership or small business that is incorporated. If the business owners have good credit
and the business is in good standing, the thief could potentially borrow a lot of money in the name of the
business owners.
Although financial gain is often the major reason for hacking, it is not the only one. In some cases, such
attacks are not about financial gain.
Attacks Intended to Harm Infrastructure
Besides monetary gain, what are some other reasons that organizations are attacked by hackers? Let’s take
the example of a distributed denial-of-service (DDoS) attack to illustrate our inquiry. DDoS attacks are created
to disrupt systems and stall operations. A fundamental question is, “Why?” Why would someone put in the
time, effort, risk, and resources to do something like that if there is no monetary return?
The answer must take into account the multiplicity of reasons that attacks occur in our modern society.
Usually, it is because the attacker is upset and trying to either make a political statement or do malicious harm
to the infrastructure of the victim. Hacktivism, for instance, is the use of hacking techniques to promote an
activist agenda or express an opinion. These tactics may be illegal, but they do not create a high degree of
fear or concern among the larger community.
On the other hand, cyberterrorism is an ideologically motivated attack against electronic data, applications,
and networks that is intended to cause serious harm to noncombatant targets to effect ideological, political, or
social change. In contrast, the attacker may simply be an angry customer who feels wronged. There are many
possibilities and motivations that are not necessarily financially driven.
As you may have guessed, the victims of these attacks can come from a variety of sectors. Victims may be
government offices, financial institutions, educational institutions, political sites, news sites, and the like.
Cyberwarfare
DDoS can also be a form of cyber warfare. One government may use DDoS to attack the governmental
websites of another country. This is because militaries, in recognition of cyberspace’s communications and
critical infrastructure aspects, have started to treat cyberspace as a new warfare domain like land, air, and
sea. Cyberwarfare may, therefore, be classified as an act of violence. This is like using military operations by
virtual means to achieve the same ends that could be obtained by using conventional means.
An interesting contemporary example of cyber warfare that you may want to research is the Soviet-Estonia
conflict over removing a war memorial that had honored Russia. This conflict resulted in riots in the streets as
well as virtual attacks on Parliament, news agencies, and banks. Another example is the development and
use of Stuxnet, a worm used against an Iranian uranium enrichment facility. Stuxnet accessed supervisory

SEC 3302, Advanced IS Security 4

UNIT x STUDY GUIDE
Title
control and data acquisition (SCADA) systems and logic controllers controlling centrifuges and allowed them
to be remotely controlled.
Unfortunately, in most cases, it is hard to tell who the perpetrator of the attack is, so it may be difficult to
definitively determine the reason for the attack. In most cases, hacking seems to originate from highly skilled
individuals. However, that is not always the case, as a hacker may have only basic skills but can buy the
scripts and software they need. There is no longer a need for them to be able to write their own programming.
Accessibility of Malicious Software
Boyle and Panko (2021) describe amateur hackers as script kiddies. This term refers to new hackers who rely
on premade scripts or tools but do not understand how they work, which can cause their efforts to fail or to
create more damage than intended. It reflects the reality that many of the tools one needs in order to hack or
send malware to an individual or organization can be purchased illegally and do not require a great deal of
programming skill.
This does not mean that all hackers are amateurs. Many hackers are very skilled individuals. They may
be members of teams and may work in groups, which are called cells, and may be located in a number
of countries.
International Attacks
As we discussed earlier, attacks can take the form of cyber warfare or cyberterrorism. Nation-state actors
from foreign nations may also effectuate them. For instance, in late 2020, hackers perpetrated a massive
computer breach that enabled them to spend approximately four months exploring the systems of several
U.S. government networks and private companies in numerous countries. Industry experts say a country
mounted the complex hack—and government officials allege that Russia is the country responsible for the
attack (Chappell et al., 2020). The hackers attached their malware to a software update from SolarWinds,
a company based in Austin, Texas. Many federal agencies and thousands of companies worldwide use
the SolarWinds Orion software to monitor their computer networks. SolarWinds says that nearly 18,000 of
its customers received the tainted software update in the government and the private sector (Chappell et
al., 2020).
The effects of this breach have been massively expensive and reveal the increasingly sophisticated attacks
that will, unfortunately, be a part of our everyday lives in our increasingly digital world. A quick Google search
will give you a fascinating glimpse into this series of attacks and its impact on IT security.
Conclusion
Today’s reality is that in the world in which we live, the threat environment is very real and can be very costly.
To an individual, an information breach can be devastating. Banks will usually reimburse stolen money, but
damage may also occur in the form of such things as bounced payments. In the case of identity theft, it may
take years to reverse the effects. A serious breach can cost an organization millions of dollars in fees and in
refunded money. The organization’s reputation may also be damaged in the process. In an increasingly
technological world, the implications must be met with a focus on security. Many of these concepts will be
addressed throughout this course.
References
Boyle, R. J., & Panko, R. R. (2021). Corporate computer security (5th ed.). Pearson.

https://online.vitalsource.com/#/books/9780135823354
Chappell, B., Myre, G., & Wamsley, L. (2020, December 21). What we know about Russia’s alleged hack of

the U.S. government and tech companies. NPR. www.npr.org/2020/12/15/946776718/u-s-scrambles-
to-understand-major-computer-hack-but-says-little

SEC 3302, Advanced IS Security 5

UNIT x STUDY GUIDE
Title
Flynt. (n.d.). Computer hacker with mobile phone (ID 127216995) [Photograph]. Dreamstime.
https://www.dreamstime.com/computer-hacker-mobile-phone-smartphone-stealing-data-computer-
hacker-mobile-phone-image127216995

Hackcapital. (2018, February 21). Hack capital [Photograph]. Unsplash.

https://unsplash.com/photos/uv5_bsypFUM
Stevanovicigor. (n.d.). Ransomware computer virus concept, hacker with monitor (ID 132496548)

[Photograph]. Dreamstime. https://www.dreamstime.com/ransomware-computer-virus-concept-
hacker-monitor-screen-internet-cyber-security-image132496548

Course Learning Outcomes for Unit I
Required Unit Resources
Unit Lesson

The Threat Environment

Threats to the Entity Are Threats to the Individual
Motivations for Attacks
Attacks for Financial Gain
Attacks Intended to Harm Infrastructure
Cyberwarfare
Accessibility of Malicious Software
International Attacks

Conclusion
References

Watch the following video and then discuss the related questions that follow: It Starts With One: Changing Individuals Changes Organizations—26:25 minutes   Do you agree that organization change begins with the individual not the organization? Why or why not?Which barrier discussed in the video resonated with your experience of change management the most?Discuss how the principles shared in the video might facilitate a successful change project.Discuss which models and principles you learned during the course relate to the approach offered in the video.

Watch the following video and then discuss the related questions that follow: It Starts With One: Changing Individuals Changes Organizations—26:25 minutes   Do you agree that organization change begins with the individual not the organization? Why or why not?Which barrier discussed in the video resonated with your experience of change management the most?Discuss how the principles shared in the video might facilitate a successful change project.Discuss which models and principles you learned during the course relate to the approach offered in the video. Which is most similar?Embed course material concepts, principles, and theories, which require supporting citations along with two scholarly peer-reviewed references in supporting your answer. Keep in mind that these scholarly references can be found in the Saudi Digital Library by conducting an advanced search specific to scholarly references.Directions: