Monday 31 July 2017

Portfolio Project Key Component:Using the case data from the Case 2, complete the provided template that has the respective tax forms (Page 1 of Form 1040 and schedules) to complete the tax return. Complete all the applicable parts of the tax forms. Also, address any instructor feedback provided in the milestone submissions. Requirements:Submit your tax return and computations to the dropbox identified for that submission. Review the Portfolio Project grading rubric to understand how you will be graded on this Portfolio Project. Contact your instructor if you have questions about the Portfolio Project. Excel file for Case 2 information to follow.

Portfolio Project

Key Component:Using the case data from the Case 2, complete the provided template that has the respective tax forms (Page 1 of Form 1040 and schedules) to complete the tax return. Complete all the applicable parts of the tax forms. Also, address any instructor feedback provided in the milestone submissions.
Requirements:Submit your tax return and computations to the dropbox identified for that submission.
Review the Portfolio Project grading rubric to understand how you will be graded on this Portfolio Project. Contact your instructor if you have questions about the Portfolio Project.
Excel file for Case 2 information to follow.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

For the Unit 4 Instructor Graded Assignment, you will be buying a car and reporting on the calculations for the loan, the interest on this type of loan, the total interest paid, as well as how credit rating might affect interest rates you might pay for go For the Unit 4 Instructor Graded Assignment, you will be buying a car and reporting on the calculations for the loan, the interest on this type of loan, the total interest paid, as well as how credit rating might affect interest rates you might pay for good credit versus poor credit. It needs to be in a powerpoint form

For the Unit 4 Instructor Graded Assignment, you will be buying a car and reporting on the calculations for the loan, the interest on this type of loan, the total interest paid, as well as how credit rating might affect interest rates you might pay for go

For the Unit 4 Instructor Graded Assignment, you will be buying a car and reporting on the calculations for the loan, the interest on this type of loan, the total interest paid, as well as how credit rating might affect interest rates you might pay for good credit versus poor credit.  It needs to be in a powerpoint form

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

for njosh only Think of something you want or need for which you currently do not have the funds. It could be a vehicle, boat, horse, jewelry, property, vacation, college fund, retirement money, or something else. Pick something which cost somewhere between $2000 and $50,000. On page 270 of Elementary and Intermediate Algebra you will find the “Present Value Formula,” which computes how much money you need to start with now to achieve a desired monetary goal. Assume you will find an investment which promises somewhere between 5% and 10% interest on your money and you want to purchase your desired item in 12 years. (Remember that the higher the return, usually the riskier the investment, so think carefully before deciding on the interest rate.) State the following in your discussion

for njosh only

  1. Think of something you want or need for which you currently do not have the funds. It could be a vehicle, boat, horse, jewelry, property, vacation, college fund, retirement money, or something else. Pick something which cost somewhere between $2000 and $50,000.
  2. On page 270 of Elementary and Intermediate Algebra you will find the “Present Value Formula,” which computes how much money you need to start with now to achieve a desired monetary goal. Assume you will find an investment which promises somewhere between 5% and 10% interest on your money and you want to purchase your desired item in 12 years. (Remember that the higher the return, usually the riskier the investment, so think carefully before deciding on the interest rate.)
  3. State the following in your discussion: 
  4. The desired item
  • How much it will cost in 12 years
  • The interest rate you have chosen to go with from part b
  1. Set up the formula and work the computational steps one by one, explaining how each step is worked, especially what the negative exponent means. Explain what the answer means.
  2. Does this formula look familiar to any other formulas you are aware of? If so, which formula(s) and how is it similar?
  3. Incorporate the following five math vocabulary words into your discussion. Use bold font to emphasize the words in your writing (Do not write definitions for the words; use them appropriately in sentences describing your math work.):
  • Power
  • Reciprocal 
  • Negative exponent 
  • Position 
  • Rules of exponents
Your initial post should be 150-250 words in length. Respond to at least two of your classmates’ posts by Day 7 in at least a paragraph. Do you agree with how they used the vocabulary? Do their answers make sense?

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Management of Information Systems This deliverable will assess your ability to examine the role of information systems within organizations, management, and network infrastructure. Instructions To complete this deliverable, fulfill the following instructions for each part: Part 1 - Information Systems Diagram

Management of Information Systems

This deliverable will assess your ability to examine the role of information systems within organizations, management, and network infrastructure.
Instructions
To complete this deliverable, fulfill the following instructions for each part:
Part 1 - Information Systems Diagram
  1. Download and read the Nozama Information Sheet
  2. Create a diagram that shows the various roles of Information Systems in organizations, such as Nozama
    1. State the roles within the system
    2. Place each system in the correct position in the diagram
  3. Present the diagram in way that is appropriate to the workplace
Part 2 - Rationale of Information Systems
  1. Write a 1-2 page documents that explains the ways in which an Information System can support Nozama's business functions
    1. Identify the business purpose and function of the Information System in the organization
  2. Present the document in a way that is appropriate to the workplace
  3. Sources, if used, are cited appropriately

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

A research paper Please make sure u will be serious and careful to see all requirements upload. all sentence smooth, make sense. Do not use too much complex word exclud if you have to. 5 full pages, MLA(8 th edition), 4 outside sources. This paper is very important to me. If u help me get an A I will give you five star with good evaluation. Thank u.

A research paper

  1. Please make sure u will be serious and careful to see all requirements upload.
  2. all sentence smooth, make sense. Do not use too much complex word exclud if you have to.
  3. 5 full pages, MLA(8 th edition), 4 outside sources.
  4. This paper is very important to me. If u help me get an A I will give you five star with good evaluation.
  5. Thank u.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Communication Slide Presentation PowerPoint Presentation Your assignment is to prepare a PowerPoint presentation with up to 10 slides, outlining the major communication processes between individuals and organizations. The assignment is due this week. Please ensure plagiarism free work with relevant sources and APA format. Attached is the rubrics

Communication Slide Presentation

PowerPoint Presentation
Your assignment is to prepare a PowerPoint presentation with up to 10 slides, outlining the major communication processes between individuals and organizations. The assignment is due this week.
Please ensure plagiarism free work with relevant sources and APA format.
Attached is the rubrics

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

DSC7 Discuss the various types of firewalls. What are the pros and cons of each? Are there situations when certain firewalls should be avoided? Explain. Some resources The videos this week will help you learn some firewall basics. Firewall Types (7:26) - https://youtu.be/o43Vhslg2EA Your Router Sucks (7:47) - https://youtu.be/5q_dWCzKhKk (and why PFSense is cool) Stateful vs Sateless (9:05) - https://youtu.be/KfMTsHL8k0U What is a DMZ (2:05) - https://youtu.be/MEs4RRUrX_0 REVIEW: What is a Proxy (5:26) - https://youtu.be/qU0PVSJCKcs Access Control Lists (8:30) - https://youtu.be/uR0rQCwlZ4c

DSC7

Discuss the various types of firewalls. What are the pros and cons of each? Are there situations when certain firewalls should be avoided? Explain.
Some resources
The videos this week will help you learn some firewall basics.
Firewall Types (7:26) - https://youtu.be/o43Vhslg2EA
Your Router Sucks (7:47) - https://youtu.be/5q_dWCzKhKk (and why PFSense is cool)
Stateful vs Sateless (9:05) - https://youtu.be/KfMTsHL8k0U
What is a DMZ (2:05) - https://youtu.be/MEs4RRUrX_0
REVIEW: What is a Proxy (5:26) - https://youtu.be/qU0PVSJCKcs
Access Control Lists (8:30) - https://youtu.be/uR0rQCwlZ4c
PLEASE READ THIS.IT IS VERY IMPORTANT
Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points.  You must discuss the topic using your own words first.  Using your own words indicate you understand the topic of discussions.  Secondly, you must cite your sources in-text.  This is necessary to justify your points. Sources from several sources showed good research abilities.  Lastly, you must provide references at the bottom of your post.  A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic. DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this.  You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.
www.citationmachine.net to format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.
use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements:1 and half pages at least. Make sure you cite if you take a piece of someone’s work, very important and your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 current and relevant academic references. No heavy paraphrasing of others work.
please communicate for any clarifications and please read instructions and follow them. Some tutors don't pay attention to instructions at all. Very important
I am not doing try and error here so please do not send a hand shake if you have no ideas or experience with research.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Racism Oral Presentation 5-7 minutes Use scholarly sources 1. How will you frame your selected topic within your field of study and explain why you chose that topic? 2. What is the significance of the issue you have been analyzing? 3. Highlight the key points identified in your Literature Review. Write transitions between your main points. 4. Explain (briefly) how you narrowed your focus from the global issue reviewed to a more specific topic. Justify your decision. 5. What key themes emerged in your Diversity Perspectives paper? Explain how these relate to your selected topic. 6. What strategies might result in more equitable treatment and thus may be worthy of further study? 7. What are the key ethical theories underpinning your Ethical Perspectives paper? 8. What competing perspectives are identified in your work, and what is the significance of those perspectives? 9. Summarize the ethical issues, policies, and action strategies that might result in more equitable treatment and are worthy of further study. 10. Plan to wrap up your oral presentation with a concise summary of the work you’ve done.

Racism Oral Presentation 5-7 minutes

Use scholarly sources
1. How will you frame your selected topic within your field of study and explain why you chose that topic?
2. What is the significance of the issue you have been analyzing?
3. Highlight the key points identified in your Literature Review. Write transitions between your main points.
4. Explain (briefly) how you narrowed your focus from the global issue reviewed to a more specific topic. Justify your decision.
5. What key themes emerged in your Diversity Perspectives paper? Explain how these relate to your selected topic.
6. What strategies might result in more equitable treatment and thus may be worthy of further study?
7. What are the key ethical theories underpinning your Ethical Perspectives paper?
8. What competing perspectives are identified in your work, and what is the significance of those perspectives?
9. Summarize the ethical issues, policies, and action strategies that might result in more equitable treatment and are worthy of further study.
10. Plan to wrap up your oral presentation with a concise summary of the work you’ve done.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

dq2wk5 Discuss three different approaches that managers can use to address or minimize resistance to the implementation of change. What determines the approach an effective manager uses with stakeholders? What approaches would be best received by stakeholders in your industry or organization?

dq2wk5

Discuss three different approaches that managers can use to address or minimize resistance to the implementation of change. What determines the approach an effective manager uses with stakeholders? What approaches would be best received by stakeholders in your industry or organization?

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Sunday 30 July 2017

Assignment 2: Punishment vs. Rehabilitation: What Society Wants vs. What Works It's a popular notion that harsh punishment in prison should act as a deterrent to crime. The slogan "to be tough on crime" often extends to the conditions in prison. The evolution of punishment has included executions, corporal punishment, hard labor, and exile. Despite the presence of harsh punishments since the last twenty years, there has been only a slight deterrent effect. Conversely, approaches to reduce recidivism through evidence-based practices and programs have succeeded.

Assignment 2: Punishment vs. Rehabilitation: What Society Wants vs. What Works

It's a popular notion that harsh punishment in prison should act as a deterrent to crime. The slogan "to be tough on crime" often extends to the conditions in prison. The evolution of punishment has included executions, corporal punishment, hard labor, and exile.
Despite the presence of harsh punishments since the last twenty years, there has been only a slight deterrent effect. Conversely, approaches to reduce recidivism through evidence-based practices and programs have succeeded.
It is important to understand the goals of punishment and how they relate to public opinion and prison philosophy within the context of what works according to recent research.
Public opinion often recommends harsh punishments and labor for inmates during their incarceration.
Evaluate the use of hard labor and even chain gangs and compare to the theories of criminal rehabilitation and the impact on society. For example, the governor of North Carolina has ordered the use of inmates to clean up public areas after Hurricane Irene in 2011.
Tasks:
Look for the quantitative and qualitative research available to you on the use of inmate labor in your state and one other state using the Argosy University online library resources and prepare a 2- to 3-page paper addressing the following:
  • Evaluate the outcome of making inmates do hard labor and compare the theories of criminal rehabilitation and the impact on society.
  • Find research evaluating the outcome of making inmates do hard labor. Does the research support the use of hard labor as an effective method to elicit rehabilitation? Analyze and explain.
Note: Make sure you include a reference page in APA style.
Submission Details:
  • Save the paper as M4_A2_Lastname_Firstname.doc.
  • By Wednesday, August 2, 2017, submit your paper to the M4: Assignment 2 Dropbox.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Assignment 1: Prisoner Programming as It Relates to Inmate Characteristics Prison officials deal with different categories of inmates, such as aging, mentally ill, or violent inmates. To ensure rehabilitation, prosocial behavior, and reduction and elimination of violent behavior among prisoners, there must be proper programming. When considering the proper programming for prisoners, criminogenic factors and needs must be taken into account. Programming is recommended based on each prisoner's unique characteristics. While prisoners may have some general characteristics as a group, each prisoner has unique needs and characteristics. Considerations such as age, medical needs, psychiatric needs, and violence factors come into play when making needs assessment.

Assignment 1: Prisoner Programming as It Relates to Inmate Characteristics

Prison officials deal with different categories of inmates, such as aging, mentally ill, or violent inmates.
To ensure rehabilitation, prosocial behavior, and reduction and elimination of violent behavior among prisoners, there must be proper programming. When considering the proper programming for prisoners, criminogenic factors and needs must be taken into account.
Programming is recommended based on each prisoner's unique characteristics. While prisoners may have some general characteristics as a group, each prisoner has unique needs and characteristics.
Considerations such as age, medical needs, psychiatric needs, and violence factors come into play when making needs assessment.
Therefore, in order to ensure optimal chances for rehabilitation and prosocial behavior among prisoners, proper programming is paramount. It is important to understand that for programming to be effective, the "one size fits all" approach is not optimal.
Tasks:
By Saturday, July 29, 2017, in at least 250 words, post to the Discussion Areayour answers to the following:
  • Discuss examples of rehabilitation programs that you could find related to different categories of inmates.
  • Explain how social learning theory relates to prison programs.
  • Discuss the evidence that demonstrates the effectiveness of prison rehabilitation programs.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Netbean 8.1 using UI on Java program. Write a Wedding Lottery program A beautiful princess is to select a husband from n suitors. The suitors are assigned numbers 0, . . . , n – 1 and seated at a round table, and a random sequence of n – 1 numbers x0, x1, . . . , xn – 2, all of them in the range 0, . . . , n – 1 is selected. The princess starts at suitor 0, and moving in a clockwise direction, she counts off x0 positions and eliminates the suitor at that position. From there, she counts off another x1 positions and eliminates the suitor at that position. She continues doing this until one lucky guy is left: she marries him and they live happily ever after.

Netbean 8.1 using UI on Java program. Write a Wedding Lottery program

A beautiful princess is to select a husband from n suitors. The suitors are assigned numbers 0, . . . , n – 1 and seated at a round table, and a random sequence of n – 1 numbers x0, x1, . . . , xn – 2, all of them in the range 0, . . . , n – 1 is selected. The princess starts at suitor 0, and moving in a clockwise direction, she counts off x0 positions and eliminates the suitor at that position. From there, she counts off another x1 positions and eliminates the suitor at that position. She continues doing this until one lucky guy is left: she marries him and they live happily ever after.
Assume that the princess’ position is always between two suitors. As an example, assume the suitors are A, B, C, and D, with A being numbered 0 and D being numbered 3. Let the random sequence be 0, 2, 1. Then the suitors will be eliminated in the order A, D, and C, and the lucky suitor will be B.
Write a class that uses linked lists to help the princess make her decision. The constructor for the class will be passed the number n of suitors (say 4), followed by a list of n suitors’ names (say A, B, C, D), followed by a list of n – 1 numbers used to “rotate” among the suitors (0, 2, 1). The current position starts at the beginning of the list. The class should have a method rotate(int x) that counts off x steps in the clockwise direction beginning at the current position. The class should have a method
List<String> getEliminated()
that returns a list, in order of elimination, of the names of the suitors already eliminated. The class should also have a method
List <String> getHopeful()
that returns a list of suitors not yet eliminated.
Write a driver program that obtains the input n, a list of n suitors’ names, and a list of n – 1 integers to be used as “rotate steps.” Using the class you have written, the program prints the names of the rejected suitors (in the order of rejection), and then prints the name of the lucky guy.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

App3 Assignment: Financing Your Small Business Small businesses often rely on lending institutions to finance their ventures. Banks, however, are not the only means to secure capital. Through creative and diligent research, entrepreneurs may uncover alternative sources of funding for their small business venture. For this Assignment, review Table 15.1 in your Entrepreneurial Small Business textbook, which presents various types of financing options for small businesses. Next, conduct a search for specific examples of financing that are readily available for small businesses. In your 2- to 3-page paper, be sure to address the following: Evaluate the risks, total cost, and the effect of time horizons for each financing option. Which financing option(s) is most advantageous for each phase of the business, given the different financing needs at each phase? Justify your selection for each of the phases.

App3

Assignment: Financing Your Small Business
Small businesses often rely on lending institutions to finance their ventures. Banks, however, are not the only means to secure capital. Through creative and diligent research, entrepreneurs may uncover alternative sources of funding for their small business venture.
For this Assignment, review Table 15.1 in your Entrepreneurial Small Business textbook, which presents various types of financing options for small businesses. Next, conduct a search for specific examples of financing that are readily available for small businesses.
In your 2- to 3-page paper, be sure to address the following:

App 4 Assignment 1: Develop Engaging Learning Experiences—Step 1 of 3 Over the next 3 weeks, you will design a set of engaging learning experiences for a context and learning environment of your choice. You may use the Learning Plan you developed in EDUC 6757 as the basis for these learning experiences, or you may choose another appropriate learning context. This week you will develop the first learning experience, addressing the categories of learning goals discussed in the readings and in the Discussion. In the next 2 weeks, you will develop additional learning experiences addressing other categories of learning goals relevant to your learning plan. For your assignment this week: Create two strategies to develop the following categories of learning goals addressed by Barkley:

App 4

Assignment 1: Develop Engaging Learning Experiences—Step 1 of 3
Over the next 3 weeks, you will design a set of engaging learning experiences for a context and learning environment of your choice. You may use the Learning Plan you developed in EDUC 6757 as the basis for these learning experiences, or you may choose another appropriate learning context.
This week you will develop the first learning experience, addressing the categories of learning goals discussed in the readings and in the Discussion. In the next 2 weeks, you will develop additional learning experiences addressing other categories of learning goals relevant to your learning plan.
For your assignment this week:
Create two strategies to develop the following categories of learning goals addressed by Barkley:

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

powerpoint Create a theory-based instructional presentation (PPT) The theory-based presentation should be designed to instruct the other class members about the theory as it relates to the couple (conceptualization). The class presentation will be 30-minutes and should be a comprehensive presentation that includes information on:

powerpoint

Create a theory-based instructional presentation (PPT) The theory-based presentation should be designed to instruct the other class members about the theory as it relates to the couple (conceptualization). The class presentation will be 30-minutes and should be a comprehensive presentation that includes information on:
a.       theoretical formulations
b.       assumptions about normal couple development or functioning
c.        development of behavior disorders
d.       goals of therapy

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Saturday 29 July 2017

Week 4 instructions are attached. Please let me know what else you need.

Week 4 instructions are attached. Please let me know what else you need.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability at various layers: Layer 1: Physical; Layer 2: Link; Layer 3: Network; Layer 4: Transport, and Layer 5: Application. (This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single Application layer). Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. Be as specific and as complete as possible and cite your reference materials in your response. You may create a new topic for your response or respond to someone's topics expanding upon it or challenging it. Start a New Thread

In this conference, we will focus on typical attacks in the Internet affecting confidentiality, integrity and availability at various layers: Layer 1: Physical; Layer 2: Link; Layer 3: Network; Layer 4: Transport, and Layer 5: Application. (This is IP Layering; in IP layering, roughly Session, Presentation and Application of the OSI layers are combined into a single Application layer). Pick one layer and describe typical attacks in that layer and the controls that are employed in the layer to minimize the attack or vulnerability that leads to the attack. For example, in the link and network layers, there can be packet sniffing attacks, in the IP (network layer), there could be spoofing attacks, and in various layers, there could be denial of service attacks. Be as specific and as complete as possible and cite your reference materials in your response. You may create a new topic for your response or respond to someone's topics expanding upon it or challenging it.
Start a New Thread

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Imagine you are the HR manager at a company, and an employee came to you upset because she felt a male co-worker had sexually harassed her by repeatedly asking her out on dates even after she said “no.”

  Assignment 1: HR Management Due Week 2 and worth 125 points Imagine you are the HR manager at a company, and an employee came to you upset because she felt a male co-worker had sexually harassed her by repeatedly asking her out on dates even after she said “no.” What would you do? Write a one (1) page paper in which you: Formulate the conversation you would have with the employee, based the concepts found in Chapter 2 in your textbook. Summarize the conversation you would have with the employee’s male co-worker, based on the concepts found in Chapter 2 of your textbook. Format your assignment according to the following formatting requirements: Typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides. Include a cover page containing the title of the assignment, your name, your professor’s name, the course title, and the date. The cover page is not included in the required page length.
The specific course learning outcomes associated with this assignment are: Explain the human resource management process, its role in supporting the overall organizational strategies, and the various functions involved in human resource management. Explain the key provisions of major government legislation affecting human resource management, including equal employment opportunity, affirmative action, health and safety, and labor relations. Use technology and information resources to research issues in human resource management. Write clearly and concisely about human resource management using proper writing mechanics.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

The Bill of Rights finds its roots in documents such as the British Magna Carta of 1215 AD

Assignment 1: Procedural Law and the Bill of Rights Due Week 4 and worth 200 points
The Bill of Rights finds its roots in documents such as the British Magna Carta of 1215 AD. It was one of the first documents that provided the common man independence from a monarch. It did imply that the federal government’s law dominated all others; however, it gave each state control of any laws outside of those reserved to the federal government. The Bill of Rights acts as a blueprint that every individual state uses to protect the rights of individual citizens. In this assignment, you will utilize the various concepts found in the Bill of Rights to provide the foundation of the various sections of the question.
Write a four to six (4-6) page paper in which you:
Compare and contrast two (2) of the sources of rights and fundamental principles found in the United States’ legal system as outlined by the text. Critically analyze and discuss two (2) steps of the criminal justice process from arrest to imprisonment. Identify and discuss the particular amendment related to arrest, search and seizures. Compare and contrast the concepts of probable cause and reasonable suspicion. In your own words, explain how they are similar or different. Examine and discuss the two (2) examples in which the exclusionary rule may not apply. Identify and discuss one (1) contemporary issue or case law related to the use of force. Use at least four (4) quality references. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:
Research and analyze procedures governing the process of arrest through trial. Critically debate the Constitutional safeguards of key Amendments with specific attention to the 4th, 5th, 6th, and 14th Amendments. Describe the difference between searchers, warrantless searches, and stops. Use technology and information resources to research issues in the criminal procedure. Write clearly and concisely about the criminal procedure using proper writing mechanics.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Describe one neurodevelopmental disorder and one neurocognitive disorder.

Paper Grading Guide to write paper Write a 1,500- to 1,750-word paper on the following: Describe one neurodevelopmental disorder and one neurocognitive disorder. Discuss behavioral criteria for each disorder. Discuss incidence rates and causes for each disorder. Propose two options for treatment for each disorder, based on two different theoretical models. Format your paper consistent with APA guidelines.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment.

Security Monitoring" Please respond to the following:
Considering your place of employment or your home computing environment, discuss in detail the way in which in-depth (or layered) defense is employed to enhance security in your chosen environment. According to the textbook, Intrusion Detection Systems (IDS), which can be categorized as Host IDS (HIDS) and Network IDS (NIDS), is a means of providing real-time monitoring. Compare and contrast HIDS and NIDS, and provide at least one (1) example identifying when one (1) would be more appropriate to use over the other. Provide a rationale to support your chosen example.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……