MM G1

students will develop a marketing plan for a small business (either real or fictional).

Topic:

Pricing and Positioning Strategy 

1. Should be in APA format with references.

2. Should be 400- 500 words with references

Week 2 Discussion Due TONIGHT

 For  this discussion, you will need to address all the tasks below and be  sure to participate fully by responding to your classmates as well.  Citations should be used to support your analysis and references should  be included in APA format. Before you begin, be sure to review the Discussion Question Guidelines!  

Now that you have been introduced to some advanced features in  Microsoft Word, you will teach the class an advanced skill in it. In  this discussion, select at least one advanced feature of Microsoft Word  and, using your own words (no copying and pasting) and examples, teach  your classmates this skill. Check the posts on the discussion board to  choose something no one else has shared yet!

In your discussions with your classmates, see if you can follow their directions or offer any help to problems they had.

You can also offer any help with challenges your classmates have shared.

By Thursday, December 10, 2020, make your initial  post to the Discussion Area. After you post your initial submission, be  sure to respond to at least two of your classmates, and to the professor  when appropriate, by Monday, December 14,2020, on at least two different days of the week.  /content/enforced/71846-17093625/Week_Two_Discussion_Question1.pptx  

12_Imoprtance of strategic IT planning

 Research Paper: COSO Framework

The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. 

Your paper should meet the following requirements:

  • Be approximately 3-4 pages in length, not including the required cover page and reference page.
  • Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Note: Please Use Scholar articles for APA references

Penetration testing

Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:

  • What is penetration testing
  • Testing Stages
  • Testing Methods
  • Testing, web applications and firewalls

Your paper should meet the following requirements:

  • Be approximately 4-6 pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. 
  • Be clear and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

discuss an important aspect of information technology

Discussion: This week we discuss an important aspect of information technology: ethics.  Please describe the term information system ethics and note some of the principles a company can establish to ensure they are acting ethically within their information systems.

Note: The first post should be made by Wednesday 11:59 p.m., EST. I am looking for active engagement in the discussion.  Please engage early and often.

Your response should be 250-300 words.  Respond to two postings provided by your classmates.

DForsnisc-we-6

Describe the plain view doctrine, and why  it has such a significant impact on digital forensics? What are three approaches to determining whether the doctrine applies to a specific case.

350 words

The Relationship between Cyberbullying and School Bullying

 Textbook Chapter 9: Cyberbullying, Online Harassment, and Cyber Stalking.

1. To what area(s) of which chapter does the work most closely relate?

2. What does(do) the author(s) set forth as their thesis in the piece?

3. What subjects does the work regard: people, entities, industries, political bodies, demographic groups, etc.?

4. What journal was it published in, and when?

5. **Key** How can you apply their work to your academic and professional understanding of DF?

6. What did the author(s) get right? Wrong? How could they have expanded/focused their scope?

· No Plagiarism 

· Should be 400 words without References.

76-year-old female patient

 

76-year-old female patient complains of weight gain, shortness of breath, peripheral edema, and abdominal swelling. She has a history of congestive heart failure and admits to not taking her diuretic, as it makes her “have to get up every couple hours to go to the bathroom.” She now has to sleep on two pillows in order to get enough air.

In your Case Study Analysis related to the scenario provided, explain the following

  • The cardiovascular and cardiopulmonary pathophysiologic processes that result in the patient presenting these symptoms.
  • Any racial/ethnic variables that may impact physiological functioning.
  • How these processes interact to affect the patient.