Prompt You will create multiple charts of each type: line, pie, column, and combo. Then explain the new insights that you have gathered during your continued analysis. Specifically, you must address t

Do you need academic writing help with your homework? Let us write your papers.


Order a Similar Paper Order a Different Paper

MBA 504 Module Two Excel Workbook Guidelines and Rubric

Overview

Data visualization is a quick, easy, and effective way to convey concepts in a universal manner. Visualized data helps you understand large and complex data sets easily so you can make decisions based on the analysis. It also helps you identify new patterns, trends, and correlations in the attributes.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

In this scenario, you are continuing to work as a business consultant trainee with the TC Ice Cream client. Now you will take a deeper dive into the analysis, focusing on a division of your choice. The division that you select will be used for future assignments as well. The division “West North Central” cannot be used for your analysis.

After having spent time reviewing your initial discoveries, the TC Ice Cream management team has asked you to create an in-depth visualization of the data. You will be required to create multiple charts of each type: line, pie, column, and combo. Your analysis should now focus on the quantitative variables (quantity sold, advertising expenses, flavor rating, social media posts, and event promotions) and the data for the specific region you selected. Different visualizations can help one discover new aspects of the data. Examining the division data will provide further insight as you begin to identify new patterns, trends, and relationships or correlations in the key variables.

Additionally, you will create a PowerPoint presentation to present your findings for the TC Ice Cream management team. In this short presentation, you will also explain the new insights that you have gathered during your continued analysis.

Prompt

You will create multiple charts of each type: line, pie, column, and combo. Then explain the new insights that you have gathered during your continued analysis.

Specifically, you must address the following rubric criteria:

  1. Create multiple charts to represent the division you have selected. The division “West North Central” cannot be used for your analysis. Within the TC Ice Cream Excel Workbook, use the “Division Analysis” sheet to create the following charts. It is recommended that you use pivot table filtering functionality to filter the data to the specific division you have selected.
    • Create a pie chart using the qualitative variable Flavor and the quantitative variable Quantity Sold to provide a visualization of percentage overview of quantity sold by flavor for the division.
    • Create a line chart (also known as a trend chart) using the qualitative variable Date and the quantitative variable Quantity Sold to provide a visualization displaying quantity sold by month for the division.
    • Create a bar chart using the qualitative variable Flavor and the quantitative variable Flavor Rating to provide a visualization displaying average flavor rating by flavor.
    • Create a combo chart using the qualitative variable Date (x-axis) and the quantitative variables Quantity Sold (clustered column) and Advertising Expenses (line – secondary axis).
    • Create a combo chart using the qualitative variable Flavor (x-axis) and the quantitative variables Quantity Sold (clustered column) and Average Flavor Rating (line – secondary axis).
  2. Use the Module Two PowerPoint Template to create a PowerPoint presentation that explains the identified patterns, trends, and correlations. This should include key visualizations and analysis to support your answers. The template includes specific questions to answer. Use the visualizations and data analysis you created in the “Division Analysis” sheet to support your analysis.

What to Submit

In this assignment you will submit an updated Excel file and a PowerPoint presentation.

  • TC Ice Cream Excel Workbook: Submit the TC Ice Cream Excel Workbook. For this assignment, work should be completed in the “Division Analysis” sheet.
  • PowerPoint Presentation: Submit a PowerPoint Presentation using the Module Two PowerPoint Template. If references are included, they should be cited in APA format. Consult the Shapiro Library APA Style Guide for more information on citations.

Prompt

You will create multiple charts of each type: line, pie, column, and combo. Then explain the new insights that you have gathered during your continued analysis.

Specifically, you must address the following rubric criteria:

  1. Create multiple charts to represent the division you have selected. The division “West North Central” cannot be used for your analysis. Within the TC Ice Cream Excel Workbook, use the “Division Analysis” sheet to create the following charts. It is recommended that you use pivot table filtering functionality to filter the data to the specific division you have selected.
    • Create a pie chart using the qualitative variable Flavor and the quantitative variable Quantity Sold to provide a visualization of percentage overview of quantity sold by flavor for the division.
    • Create a line chart (also known as a trend chart) using the qualitative variable Date and the quantitative variable Quantity Sold to provide a visualization displaying quantity sold by month for the division.
    • Create a bar chart using the qualitative variable Flavor and the quantitative variable Flavor Rating to provide a visualization displaying average flavor rating by flavor.
    • Create a combo chart using the qualitative variable Date (x-axis) and the quantitative variables Quantity Sold (clustered column) and Advertising Expenses (line – secondary axis).
    • Create a combo chart using the qualitative variable Flavor (x-axis) and the quantitative variables Quantity Sold (clustered column) and Average Flavor Rating (line – secondary axis).
  2. Use the Module Two PowerPoint Template to create a PowerPoint presentation that explains the identified patterns, trends, and correlations. This should include key visualizations and analysis to support your answers. The template includes specific questions to answer. Use the visualizations and data analysis you created in the “Division Analysis” sheet to support your analysis.

What to Submit

In this assignment you will submit an updated Excel file and a PowerPoint presentation.

  • TC Ice Cream Excel Workbook: Submit the TC Ice Cream Excel Workbook. For this assignment, work should be completed in the “Division Analysis” sheet.https://www.mediafire.com/file/uji3fljgeoguuah/TC_Ice_Cream_Excel_Workbook.xlsx/file
  • PowerPoint Presentation: Submit a PowerPoint Presentation using the Module Two PowerPoint Template. If references are included, they should be cited in APA format. Consult the Shapiro Library APA Style Guide for more information on citations.https://www.mediafire.com/file/eppaog766ewwbi8/MBA_504_Module_Two_PowerPoint_Template.pptx/file

Watch the video: Earth 2050: The Future of Energy. (Closed Caption and Transcript available on YouTube.)Write a two-page essay based on the video and no other source that summarizes the present problems that exist from energy consumption in the world. Explain the type of solutions that scientists are exploring to help with creating alternative energy sources by 2050.  Do you believe that Utopia will ever be possible?  Include APA reference for the youtube video at the end the document.

Watch VideoYouTube URL:http://www.youtube.com/watch?v=yFr-OocOb7Y

Schizophrenia: Annotated Bibliography

Find at least six to eight scholarly and/or peer-reviewed sources that were published within the last five years, including a minimum of two original research studies that discuss your selected neuropsychological disorder: Schizophrenia.

  • Include a full reference citation in APA format for each resource.
  • Summarize each resource in a paragraph (do not copy the article’s abstract—this summary should be in your own words).
  • Describe how you plan to use this source in your Week 3 outline that you will write next week.

This analysis paper:

  • Must include at least six to eight scholarly or peer-reviewed sources to complete this annotated bibliography.
  • Please use the attached template for the annotated bibliography.
  • Must include a separate title page and reference page.
  • Must utilize academic voice.
  • Please referenced attached Week 1 assignment so reference on topic chosen. You may reuse the references used in completing the Week 1 assignment. You may use the DSM-5 as one of your resources.

Schizophrenia

Affecting approximately one percent of the population across the world, schizophrenia is a complex neurodevelopmental disorder (NDD) characterized by delusions, hallucinations, disorganized speech and mental processes, social isolation, and inconsistencies in behavior (Wilson, 2013). To understand schizophrenia, one must first understand neurobiology. Neurobiology is the study of the nervous system and how it influences behavior. Neurology is instrumental in the understanding of neurodevelopmental disorders. Hence, schizophrenia being a type of NDD, can apply the neurobiological theory. Kim (2016) concurs that neurobiological theory helps understand the cause, treatment, mechanism, and results of schizophrenia. This paper seeks to: 1) Explain theories of etiology of schizophrenia, 2) examine the factors causing the disorder, and 3) explain the disease pattern associated with schizophrenia. Lastly, the paper will discuss the various treatment methods and technologies while factoring in the neurobiological aspects of the methods.

Theories of Etiology of Schizophrenia

Kim (2016) explains the causes of schizophrenia using the neurobiological theory, the neurodevelopmental theory, and the genetic theory. The main theory of emphasis to the paper is the neurobiological theory. From a neurobiological approach, NDD occurs when neurotransmitters start to malfunction. If there is a mismatch in the production of serotonin, glutamate, and dopamine in the nervous system, the patient may have a dysfunctional brain. This theory explains the onset of this disorder from the point where the neurotransmitters are dysfunctional. Tang et al. (2021) put out that the neurotransmitters may have excess dopamine, less glutamate, expression of high levels of gamma-aminobutyric acid (GABA), or low serotonin levels. Therefore, they hinder proper brain function.

Secondly, the genetic theory explains the presence of genes that influence the risk of NDD. Several epidemiological studies reported that some genes are associated with different types of NDDs (Rosella and Vetri, 2021). Moreover, genetic studies confirm the possibility of genes that influence NDD when siblings are born with NDD from parents suffering from NDD. Kim (2016) concurs through hereditary reports from schizophrenia that siblings exhibit an estimate of eighty percent chances of having schizophrenia if the parents suffer from schizophrenia. Thirdly, the neurodevelopmental theory associates the risk of NDD to adverse environmental exposure, exposure to pathogens, or linkage to lifestyle patterns.

Factors that Cause the Disorder

Schizophrenia occurs due to several factors. One, an individual’s genetically enhances the risk of NDD. Research studies show that genes are associated with neurodevelopmental disorder development (Tang et al., 2021). Here, genetic theories explain the involvement of catechol-O-methyl transferase (COMT) and neuregulin one genes in the development of autism schizophrenia (Kim, 2016). Two, the NDD’s may occur along family lines. Therefore, when someone in the family line suffers from NDD, another person is born with NDD. In addition, NDD may develop from human interactions within the life complexities. D’Souza and Karmiloff-Smith (2017), through their study of the neuroconstructivist developmental approach process, posit that the human brain undergoes changes when brain regions process different types of inputs. As a result, the brain gets injuries that impair its cognitive functions. In this sense, when the individual is in a war zone, the explosive sounds damage their brains, increasing the chances of developing NDD’s.

Moreover, lifestyle choices such as abuse of drugs influence the risk of the infant developing NDD. Lastly, environmental factors may influence the risk of NDD’s, especially during birth. Therefore, exposure of pregnant mothers to chemicals influences the risk of NDD. D’Souza and Karmiloff-Smith (2017) emphasize the need for pregnant women to avoid contact with toxic environmental chemicals that affect the nervous system, such as lead and pesticides, since they increase the chances of NDD’s on the baby.

Pathology and Abnormalities of the Disorder

A patient who has schizophrenia may experience a variety of different disease patterns. Patients with severe cases suffer hallucinations due to inconsistent neurotransmitters. Moreover, high-risk patients are associated with several abnormalities. The abnormalities occur in the brain structure, physiological functions of the brain, neurochemical balance, or neuropathological aspects of the brain. According to Tang et al. (2021), while reporting etiological findings, those abnormalities involved: less white matter, dysfunctional frontal cortex, malfunction in neuronal and membrane, and improper function of neurotransmitters. On the other hand, the chronic stage involves patients with less severe symptoms. Here, the case may result from slight alterations of neurochemicals or abnormalities associated with the prefrontal cortex.

Treatment Options Based on Neurobiological Aspect

The pharmacological approach involves the practical application of antipsychotics helps with the regulation of the dysfunctional neurotransmitters. For example, the use of Clozapine antipsychotic helps regulate serotonin and dopamine (Tang et al., 2021). Moreover, Clozapine reduces hallucinations while providing lower levels of side effects.

Alternatively, the patient may undertake behavioral health programs. Here, the therapist administers an antipsychotic drug then takes the patient through sessions while monitoring changes in behavior (Rosella & Vetri, 2021). One example is undertaking therapy sessions to help patients learn to manage their behavior control techniques.

Diagnostic and Research Technologies Employed

For effective treatment methods, the doctor may recommend medication and non-drug treatment methods. First, drug treatment methods involve antipsychotic drugs (Tang et al., 2021). Alternatively, non-drug treatments involve diagnostic programs, therapy programs, and behavioral programs. Diagnostic programs are thorough and involving. In this approach, the patient needs to be aware of various steps in the diagnostic procedure, including possible side effects. If the patient and the family agree, they are given the most applicable antipsychotic followed by psychoeducation programs to help them manage the medication.

Some technological advancements to cure NDD involve brain imaging. Brain imaging procedures help to evaluate the brain state. In this sense, brain imaging on the patient will help the caregiver assess the brain’s progress. Lastly, monitoring the patient’s progress by the caregiver while noting the side effects of the antipsychotic medication helps evaluate the treatment progress.

Conclusion

The neurobiological theory critically explains the etiology, mechanism, abnormalities, and treatment of schizophrenia. From the theory, clarity is given when defining the disorder. The theory further explains the likely symptoms by showing schizophrenia causes brain damage while disrupting internal chemical functions of the brain. Moreover, the theory scientifically explains the treatment methods and technology, thereby providing an applicable medical treatment guide. Therefore, the theory is significant to the proper explanation of diseases.

References

D’Souza, H., & Karmiloff-Smith, A. (2017). Neurodevelopmental disorders. Wiley Interdisciplinary Reviews. Cognitive Science, 8(1-2). e1398.

Kim, M. (2016). Understanding the Etiology and Treatment Approaches of Schizophrenia: Theoretical Perspectives and their Critique. Open Journal of Psychiatry, 6(04), 253.

Rosella, M., & Vetri, L. (2021). Embracing the Complexity of Neurodevelopmental Disorders.

Tang, X., Jaenisch, R., & Sur, M. (2021). The role of GABAergic signaling in neurodevelopmental disorders. Nature Reviews Neuroscience, 22(5), 290-307.

Wilson, J. F. (2013). Biological basis of behavior. Bridgepoint Education.

Ethical Responsibilities in Software Design and DevelopmentLouis V. Gerstner, Jr., former CEO and Chairman of the Board of IBM, stated, “Computers are magnificent tools for the realization of our dreams, but no machine can replace the human spark of spirit, compassion, love, and understanding” (Reynolds, 2019, p. 263).A solid ethical framework is crucial for companies involved in the design and development of software and IT systems. At the very least, companies involved in these endeavors want to avoid poor sales and bad press from bugs or poor design. However, much more is at stake. Companies face potentially massive criminal and legal liability exposures if they make subpar or unethically designed products and services available to the public. Software bugs or poor design within computer systems can produce financially damaging occurrences and could lead to property destruction or even fatalities.To complete this assignment, use the Internet or the Strayer library to locate an example of poor IT design or software errors that led to personal or corporate financial or property loss or to a fatal accident.Write a 3–5 page paper that addresses the following items:

  1. Identify and describe the software design flaw, glitch, or error. Summarize the resulting impact of the failure.
  2. Determine if the failure was a result of poor quality or an ethical requirement deficiency. Provide recommendations that you feel would have prevented the failure.
  3. Explain who, in your opinion, should be held accountable for the incident and why.
  4. Identify the corrective actions that were put in place by the organization after the incident.
  5. Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources. The Strayer University Library has many excellent resources.

Your assignment must follow these formatting requirements:

  • This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course.

The specific course learning outcome associated with this assignment is:

  • Examine the ethical responsibilities of IT users, professionals, and organizations.

ReferenceGeorge Reynolds. 2019. Ethics in Information Technology (6th ed.). Cengage.

For this assignment, read “The Purina Story” on page 129 and the “Let’s Get Technical—Data Mining” section on page 133 of the textbook. Once you have read and reviewed this information, respond to the following questions with thorough explanations and well-supported rationale.

  • Compare and contrast online research and data mining. How does each affect the business strategy of a company?
  • Classify the research methods used by Purina in the case study, and determine if some type of cross-selling would benefit the company’s brand. Provide support for your conclusion.
  • With the privacy concerns of today’s online consumers, do you find Amazon or Purina behaving unethically in their practices? Why, or why not?
  • Analyze the privacy policies of Purina and Amazon online. What parts of their privacy policies are reassuring? Is there anything of concern?

Your case study must be at least two pages in length, not counting the title and reference pages. References should include your textbook, at least one website, and one additional credible source; therefore, you should have a minimum of three sources. All sources used must be referenced; paraphrased and quoted material must have accompanying citations and be cited per APA guidelines.

The Purina Story

Nestlé Purina PetCare Company knows with certainty that Purina websites and online advertising increase offline buying. How? Through a carefully conducted study that integrated online and offline behavioral data.

Switzerland-based Nestlé S.A. purchased the Ralston Purina Company in December 2001, gaining a full line of dog- and cat-care brands such as Friskies, Alpo, Purina Dog Chow, and Fancy Feast. The firm manages more than 30 branded websites, serving the following markets: consumers, veterinarians/veterinary schools, nutritionists/food scientists, and breeders/other enthusiasts. Nestlé started its inquiry with the following three research questions:

Are our buyers using our branded websites?

Should we invest beyond these branded websites in online advertising?

If so, where do we place that advertising?

Combining ComScore Media Metrix’s representative panel of 1.5 million internet consumers and the Knowledge Networks, Inc.’s frequent-grocery-shopper panel of 20 million households revealed 50,000 consumers belonging to both panels. Researchers created three experimental cells from survey panel members, with two of the cells receiving Purina O.N.E. banner advertising as they naturally surfed the internet: a control cell (no ads), a low-exposure test cell (1 to 5 exposures), and a high-exposure test cell (6 to 20 exposures). Banner ads were randomly sent as exposure-cell subjects viewed web pages anywhere on the internet. Next, the firm surveyed all cell members to assess the brand awareness of Purina, purchase intent, and advertising awareness. Finally, the researchers compared survey results with offline buying, as measured in the Knowledge Networks panel.

Nestlé’s marketers were very interested in the study’s findings. First, banner click-through was low (0.06 percent on average). Second, when study participants were asked, “When thinking of dog food, what brand first comes to mind?” 31 percent of both exposure-cell subjects mentioned Purina. In contrast, only 22 percent of the no-exposure subjects mentioned the brand; this result clearly showed an advertising effect. Further, 7 percent more of the subjects in the high-exposure group mentioned the brand compared with those in the low-exposure group. Next, researchers reviewed the internet panel’s website viewing habits of those who purchased Purina products and determined that home/health and living sites receive the most visits from these customers. This information helped the firm decide where to place banner ads. Among the sites frequented by Purina’s market, petsmart.com and about.com enjoyed heavy usage and were thought to be great ad buys.

(Source: “Does Online Marketing . . .” 2002)

Let’s Get Technical – Data Mining

Let’s Get Technical—Data Mining

In 2012, the New York Times chronicled a case where the Target department store chain used data mining to predict which customers were pregnant. Through extensive analysis of past customer purchases over a long period of time, Target researchers found that pregnant women made a series of specific changes in their shopping habits—for example switching to unscented products and buying lots of cotton balls. Not only could the researchers predict pregnancy, but they could even predict due dates within a narrow time frame. Understanding that pregnancy is one of the few times in life that a company can garner a loyal customer, Target would then send ads for baby products to the expectant mother. So as not to spook her, Target would include ads on the same page for unrelated items—such as lawnmowers. Nonetheless, one father of a high school girl took offense and asked a confused store manager why his daughter was receiving ads for baby products. A short while later the father called back to apologize.

Data mining is the search for information hidden in large databases. It is much like scientific inquiry except that the subject of study is human-made data rather than nature. The larger the database, the greater the need for specialized data mining tools to spot patterns and relationships in the data. The tools themselves are quite sophisticated and data miners tend to have advanced degrees—with special emphasis on statistical training.

A common form of data mining familiar to online shoppers is cross sell data. Based on past sales patterns, marketers can predict which products sell well together. They then present this information to the shopper with a friendly note saying something like, “customers who bought the iXT widget also bought . . .” The same idea is behind streaming music sites that learn your preferences. They look for pattern matches with other customers that listen to your same music, and then suggest other songs that they listen to. The larger the database of customers, the more accurate the predictions are likely to be.

Here is how cross sell data mining works. Imagine that Joe buys the iXT widget and the alpha widget. As it turns out 200 other customers buy both widgets together. For each customer, the database examines what items they bought in combination. Then it counts the frequency with which each combination appears. Finally it sorts the counts from largest to smallest and presents future customers with the most likely cross sell.

Amazon has taken cross-sell analysis one step further by tying page views to purchases. For example, look at a camera on Amazon and you are likely to see the message, “What Other Items Do Customers Buy After Viewing This Item?” (emphasis added). Maybe you are on the fence between two camera models. Amazon will tell you what others on the fence ultimately purchased! They do this by counting page views of every customer and correlating those views with purchase behavior. So as you click around Amazon’s website you are creating a massive amount of data that is automatically mined.

Note that the cross-sell data is the process of fishing for relationships. We are looking at the strength of correlation between every combination of variables in the database, which is sometimes called factor analysis. However, factor analysis does not show the direction of dependence—which variable causes which. Nor does factor analysis incorporate subtle hypothesis variations to find just the right fit with the data.

But data mining can be more directed—a form of hypothesis testing. The investigator forms a hypothesis (e.g., advertising dollars are best spent on existing customers) and then uses a statistical technique such as regression to test the hypothesis. This process is the foundation of most academic research. However, it is somewhat slow and requires inventive hypothesis formation. Typically tools to carry out this analysis include SPSS and SAS.

More sophisticated still is a data mining technique called evolutionary programming. A computer program adopts the role of a scientific investigator. The program forms and tests hypotheses. When it finds a hypothesis that looks promising, it varies it slightly, forming a series of daughter hypotheses. Each of these hypotheses is tested in turn looking for the best match with the data. After churning away for a while, the program reports back to the user on which hypotheses show interesting relationships in the data.

Tasks solved by data mining include predicting, classifying, detecting relationships, and market basket analysis (the cross-sell data). The packages themselves are becoming more user-friendly, which is good news for marketers. Companies such as Megaputer may one day make sophisticated data mining commonplace.

Textbook reference – Frost, R., Fox, A. K., & Strauss, J. (2019). E-marketing (8th ed.). Routledge. https://online.vitalsource.com/#/books/9781351744843

The security consulting firm that you work for has been awarded a contract to implement a new IT Security Infrastructure to secure the Information Technology data assets of a local government agency. This agency has many remote workers that are in the field and need to connect back to the agency’s system servers.The remote workers use a wireless network infrastructure to connect their electronic pads to servers located within the local government’s facility. The remote workers have needed to access property records, citing zoning violations electronically, and validate building permits.The public demand to expand IT services has grown faster than its ability to provide an adequately secured infrastructure. In fact, this government entity was previously featured on the news for having minimal security controls and methods for accessing property tax information of citizens. The inadequate security allowed many construction trade businesses to illegally access property records and zoning violations.Your role in this project is to enhance and optimize the security mechanisms for accessing these systems.InstructionsWrite a 4–5 page paper in which you:

  • Create an information flow diagram (using Visio or Dia):
    • Illustrates how remote users will securely connect to the government agency’s network.
    • Illustrates the patch of network devices that data packets must travel to get from server to remote user’s device and back to the server. Note: The graphically depicted solution is not included in the required page length.
  • Provide an equipment list of network security devices that would be needed to ensure the integrity and sensitivity of private information. In this list:
    • Propose at least two vendor brands per each device and the associate costs required to procure these items.
    • Identify the functionality each device serves and the expected benefits the government agency should experience upon the successful installation of this equipment.
  • Develop a maintenance plan that should be recommended to the government agency to ensure having the latest security measures available within the network in which you:
    • Describe the risks associated with not fulfilling the activities outlined within your maintenance plan.
    • Indicate specific activities, personnel and resources required, and frequency of execution.
  • Recommend at least four physical security measures that could be developed to ensure the electronic perimeter of electronic assets.
  • Recommend at least two physical security vendors that could achieve the four security measures you identified. Justify your recommendations with your response.
  • Evaluate and consider activities that the Human Resources Department could perform in order to complement and instill security from within the organization. Provide a rationale with your response.
  • Use three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.The specific course learning outcome associated with this assignment is:

  • Develop a plan for implementing network and personnel security measures.

Discussion: Triple Bottom Line

Prompt: This discussion will focus on a fictitious, publicly traded company named Global Energy Services, Inc. that provides oil to three states. This organization is facing significant challenges in several areas:

1) With the price of oil falling and revenues negatively impacted, the company is at risk of not meeting the shareholder expectations for the next quarter and perhaps even the year.

2) An EPA report on a lucrative oil drilling field in one of the states indicates that the fresh water supply may be contaminated and must be remediated immediately.

3) Organizational changes to reduce expenses and pay for the water supply cleanup will almost certainly require headcount reduction affecting employee morale and further reducing staff to work on the other issues. The rumor mill is already active with concerns about layoffs and budget reductions.

Providing a one- to two-page summary of recommendations to the organization’s board of directors regarding the following issues:

· How to balance the performance objective of revenue growth and increased market share

· Remediating the costly environmental issue caused by the company

· Addressing the hard decision to downsize at a critical time

· Identify the priority order of social (people), economic (profit), and environmental (planet) focus. Include your rationale.

· Address two steps you propose for your area relative to balancing the need to address the environmental issue while considering company growth and employee concerns.

Compose a 1250 words assignment on geology of colorado. Needs to be plagiarism free! The effects of plate tectonics are felt, both on the surface and at depth. This leads to Colorado’s continuous evolution as a state in the United States (Chronic & Williams, 2002). It has been ranked as the eighth-largest country in the nation. Whatever happened that brought about the pattern that exists in Colorado has not been repeated anywhere, ever since. This means that no other region can boast of having the same natural state like Colorado.

Plate boundary location

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. Plate boundaries are sharp, and they spread wide. In some instances, they may run up to hundreds of kilometers. The nature of a plate’s edge is characterized by the relative motion of the leaves involved (Chronic & Williams, 2002). There is only one boundary between the three that is predominantly used. This is the divergent type.

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. The locations of the boundaries vary, but they are mostly found on ocean floors. This is no mistake since the water tends to weaken the rock and sometimes promotes melting. This further facilitates plate interactions (Chronic & Williams, 2002). The plate interactions on the ocean floors lead to the movement of water or its displacement. This leads to certain natural occurrences like the tsunami that caused enormous damage along the Asian coastline.

Topography description

&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp.&nbsp. It is said that Colorado has fifty-four peaks. They all measure up to 4300 meters or more. Western Great Plains cover a third of the eastern state. The lowest point can be found in the Arkansas River. The Continental Divide is located on the north-south line. This is slightly west of the geographic center (Chronic & Williams, 2002). It has been used to separate the Rockies into the Western and Eastern slopes. There are some mountains that exist on both the Eastern and Western slopes.

Granite intruding and metavolcanics belts covered in supracrustal rock can be found in this province (Chronic & Williams, 2002). The processes that led to the pattern are not yet known. It has been a long time since Colorado has been affiliated with active plate boundaries, but the effects are still being felt.

spring 2020 quiz 1

Parenting Today

Jean Piaget`s theory of cognitive development in children

The concrete operational stage (ages 6 or 7 – 11), introduces logical thinking by way of principles such as cause and effect.

The WIC program addresses nutrition risks such as anemia, low weight, pregnancy complications or any conditions that fail to meet the current Dietary Guidelines for Americans the details.

Two Essay Questions

Question One: Jean Piaget

Question Two: Special Supplemental Nutrition Program for Women,

Infants and Children (WIC)

Hello, I am looking for someone to write an essay on Williamson Mortgage Inc. It needs to be at least 500 words.

The fact that the president has accepted to buy the mortgage at the market price that will prevail at that time exposes Jennifer to risk of losing if the interest rate at that time goes beyond 5.5%. An increase in the interest rate with even a 0.5% to 6.0% on the market prices will mean that Jennifer will have to sell the bonds and earn a profit but a decrease will mean the reverse. Jennifer may have to pay in to cater for the drop in rates. It is therefore the uncertainty of the market on aspects of risk on the interest rates that could affect Jennifer’s business prospects (Billingsley, Gitman & Joehnk, 2013). This uncertainty may either bring loss or profit to her business especially considering a rise or a fall in the future value of money, owing to affecting factors such as inflation as well as rates of interest.

For the purposes of hedging this risk, Jennifer needs o consider the history of the market rates and their fluctuation levels, considering these, she should be in position to establish an average that can help her have the market fluctuations taken care of (Billingsley, Gitman & Joehnk, 2013). The interest rate that she offers to the cousin could also remain unaffected if it is placed among a margin that will prevent her from burning her capital. Considering the interest of the Treasury bond, she can also make the Treasury bond and consider the fluctuations and see if they can help her cover her interest and profit.

The use of treasury bonds could provide an option for Jennifer to explore. The treasury bonds can help her raise the money to facilitate her mortgage business but the uncertainty of the markets too could affect them. Unless if the interest rate specified ensures that at that time Jennifer will remain in position to facilitate the mortgage to the cousin and still make, some profit on the interest then

Homework assignment ..Instructions Answer the following problems found in your textbook Review the information on demand and supply curves. How do the aggregate demand and aggregate supply curves presented in this chapter differ from market curve?One supply side measure introduced by the Reagan administration was a cut in income tax rates. Use an aggregate demand aggregate supply diagram to show what effect was intended. What might happen if such a tax cut also shifted the aggregate demand curve?

Need an argumentative essay on Your own contemporary utopia. Needs to be 2 pages. Please no plagiarism.

A principal aspect of many Utopias is peacefulness. This implies that there is zero tolerance for violence on the part of the community members. Alternatively, members of a utopian community may result to policies of diplomacy thus treating other societal members with utmost courtesy. This requirement of peaceful coexistence may even encompass living things other than humans.

For instance, one of the most renowned imaginary ideal communities, Platos Republic, bears the description of a peaceful community irrespective of its relatively rigid economic equality and social classes supposed to uphold state functions (Grube and Reeve 41-49). Fictional ideal communities serve the purpose of criticizing prevailing societal issues. In the case of Ashram West, the teachings are not any different since they are based on customary Hindu Tantra and Vedanta philosophy. These teachings foster integration of all life factors with spirituality, inclusive of sexuality. Vedanta philosophy also teaches that nature is divine, pure, and perfect, while Hindu Tantra develops additional awareness of an individual’s divine self. Additionally, Ashram West community guards against gay stereotyping, as is evident from giving refuge to gay people.

The ideal utopian society according to Ashram West (n.pag) advocates for reverence, equality, and knowledge. Knowledge refers to the information acquired by individuals and utilized to enhance awareness and comprehension of issues. On the other hand, reverence alludes to the respect accorded to highly esteemed individuals or beliefs. Finally equality refers to the same level ranking of all individuals irrespective of their conditions or status in the society. These three aspects constitute other fundamental grounds upon which a utopian society prevails. These aspects are also evident in Ashram West’s case, since even

Need an research paper on the many forms of violence against women. Needs to be 5 pages. Please no plagiarism. Taking India as an example, the society, as well as the economic dependence that women have on men, have allowed men to continue discriminating and abusing women and girls. Reports have been made of women been assaulted to the point of death in some Indian communities that have raised several questions concerning the protection of women rights by the law. This paper will discuss some of these inhuman assaults to women that have been taking place and still go on even at this age.

The issue of rape is the most disturbing and prevalent form of assault against women. With cases of rape around the world rising, this has become a problem in most societies and the victims are innocent women and girls. Taking the example of Canada, the number of women that reported having been sexually assaulted in 2009 was a staggering 472,000. As mentioned in the introduction, this number could be greater since this figure only counts for the self-reported victims. Statistics show that most of the victims are women of ages between 15 and 24. This problem has proven difficult to curb for women, in most cases, lack the confidence to talk about the traumatic events that they go through such as rape (Renzetti, 2011). With rapes case being reported to happen almost everywhere, be it at homes, streets or workplaces, women have been left insecure and almost powerless. Gang rape is even worse for victims since some have been reported to die after such horrible experiences or suffered irredeemable trauma.

Another form of assault that is closely associated with rape is physical abuse. Most rape cases follow as a&nbsp.result of an episode of physical abuse. This includes any of the following acts by men against women: inflicting bodily harm using objects, slapping, kicking, choking or restraining women just to undermine them.

Provide a 5 pages analysis while answering the following question: Marine Mammals in Captivity. Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is required. &nbsp.The Marine Mammal Protection Act (1972) was the first law by the American Congress to call distinctively for a network approach to natural resource conservation and management. The Act was signed into law on 21st October 1972 by President Richard Nixon. It took effect two months later on 21st December 1972. The Act disallows the capturing of marine mammals. It also endorses a suspension on the export and import of any marine mammal. The Act also forbids any marine mammal product or part inside the United States (Marine Mammal Commission, 2008). The Act identifies “take” as the Act of killing, hunting, harassment, and capture of any marine creature or endeavor.

Purpose of the Act

The Marine Mammal Protection Act (MMPA) identifies harassment as any attempt of torment, pursuit, or irritation that has the likelihood to either harm a marine creature in the wild or agitate an aquatic animal by causing disturbance of behavioral patterns. This comprises, but is not restricted to, breathing, migration, nursing, feeding, breeding, or sheltering (Marine Mammal Commission, 2008). The Marine Mammal Protection Act grants for enforcement of its preventions and the issuance of rules to execute its legislative goals. Another purpose of the Act, as stated earlier by the paper, is to disallow the capturing of marine mammals and endorse a suspension on the export and import and trade of any marine mammal (Marine Mammal Commission, 2008).

Allowance and Regulations of Animals in Captivity

The Act prohibits the exploitation and takes off any marine creature without appropriate approval, which is only be offered by the Service (Marine Mammal Commission, 2008). Consents might be granted for public display, scientific research, and the exportation or importation of marine animal products and parts upon clarifications by the Service, in which the issuance is steady with the Act’s regulations. At no cost are individuals who are permitted to keep marine mammals allowed to hurt them. People with a permit are supposed to do their best to give the creatures an environment similar to the one they were taken from. To manage and conserve marine creatures, the keepers should avoid any psychological and physical disturbance to the creatures (Marine Mammal Commission, 2008).

You will prepare and submit a term paper on Citric Acid Cycle. Your paper should be a minimum of 2000 words in length. CO2 is released as waste. In the next step, NAD+ is reduced to NADH. Lastly, the pyruvate dehydrogenase complex attaches the CoA to the acetyl. No ATP is produced during pyruvate oxidation. During this entire process, two NADH’s are used for energy and the net products include two acetyl-CoA and two NADH. These two acetyl-CoA molecules become oxidized by the citric acid cycle. Acetyl-CoA can also be produced by breaking down fats and amino acids.

Fatty acid oxidation occurs in the matrix when a fatty acid is linked to the thiol group of coenzyme A. The acetyl CoA is removed from the fatty acid chain during each round and is fed into the citric acid cycle. This leads to the disassembly of the fatty acyl CoA molecule. Fatty acid oxidation produces one NADH and one FADH2.

Once acetyl Co-A is formed, it is fed into the citric acid cycle, which is also referred to as the Krebs Cycle or the tricarboxylic acid cycle. Here, carbon atoms are oxidized and released one by one as waste products and the energy is conserved. This process occurs in the mitochondrial matrix and occurs twice per molecule of glucose.

The two-carbon acetyl group from acetyl-CoA is transferred to the four-carbon oxaloacetate compound and forms the six-carbon molecule citrate. The citrate molecule undergoes isomerization which removes water and then adds water back in to move the hydroxyl group from one carbon atom to another. This produces isometric form isocitrate.

This six-carbon isocitrate is oxidized and one molecule of carbon dioxide is removed and the five-carbon alpha-ketoglutarate molecule is formed. Also in this step, NAD+ is reduced to NADH and H+. Next, alpha-ketoglutarate becomes oxidized as carbon dioxide is removed. Coenzyme A is added and the four-carbon succinyl-CoA compound is formed. Here also, NAD+ is reduced to NADH and H+.

In the next step of the citric acid cycle, CoA is removed from the succinyl-CoA compound to produce succinate. This forms a high-energy phosphate linkage to succinate.

omplete 5 pages APA formatted article: Functions of Production and Operation Management. Responding to the increased level of competitiveness in the business environment in terms of quality, productivity and lead times, the function of Production and Operations Management has evolved significantly over the history to its current standing within organizations. While the process involved may vary from organization to organization depending on the nature of output be it a tangible product or intangible service, the essential elements of production and operation management is concerned with the management of the input-throughput-output process effectively and efficiently (Wikipedia 2008). Operation Management can therefore be defined as “the management of the conversion process, which converts land, labor, capital and management inputs into desired outputs of goods and services” (Everett & Ebert 2002).

The origins of operations management can be traced to the Industrial Revolution era which began in the 1700s in England. &nbsp.The main features of the changes which took place during this era were the Centralized production, Powered machinery, and the concept of Factory production (Gaither & Frazier 2002). One of the landmark achievements of this era was the steam engine being invented by James Watt in 1764, which provided a new source of energy to power the factory concept. Another key milestone that revolutionized the discipline was the 1776 publication of Adam Smith’s seminal work known commonly as “The Wealth of Nations” which proposed the economic benefits associated with the specialization of labor. His recommendation was that work should be broken down to sub-tasks, and assigned to workers where they became specialized in performing these tasks with efficiency through repetitive performance (Everett & Ebert 2002). As the industrial revolution gained momentum and spread to other parts of the world, Eli Whitney from America developed the concept of “Interchangeable parts” in 1970, laying the foundation for volume productions and standardized parts and the inception of large-scale factories in industries such as textile. By the mid-1800s, the traditional manufacturing systems associated with cottage and artisan productions were completely replaced by factory systems which also brought in new challenges such as managing the workforce and management of quality issues.

Henry V

Focus on Act 4, scene 1, where the disguised King Henry visits John Bates and his fellow ordinary soldiers.  Their subsequent debate is a key passage in the play.  What do you think of the ideas about responsibility for what happens in the battle that they and the king debate?  Is Henry making excuses for his decision to send men into battle and indeed to violently invade another realm?

300 words

Our team of vetted writers in every subject is waiting to help you pass that class. With keen editors and a friendly customer support team, we guarantee custom-written, original, high-quality papers. Get top grades.


Order a Similar Paper Order a Different Paper