Initiating the Project

Question 1 Reflect on the assigned readings for the week (chapter 13,14,15). Identify what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding.

Also, provide a graduate-level response to each of the following questions:

  • Your company is hoping to outsource some of its work constructing a new development of condominiums. What would you use as selection criteria to narrow down your list of potential sellers?
  • Give specific examples of risks on a project that are within the team’s control, partially within the team’s control, and outside the team’s control. Tell how you would deal with each.
  • Give two examples of why a project might be terminated early for cause and two examples of why a project might be terminated early for convenience.
  • The sponsor of a large multi-phased project you are managing suddenly decides to terminate the project early. How do you respond? How and when do you notify your team members?

Question 2

For the Business Case project provided, identify the different types of contracts that are available for supply chain management. For each of the six (6) contract types below provide a description of each contract type (based on the weekly readings and material from the textbook) and then identify where each of the contracts could be utilized within your project. These need to be specific examples and explain why the specific contract type would be ideal for these supplies (goods or services).

Fixed-Price Contracts

Firm-Fixed-Price (FFP) Contract:

Fixed-Price-Incentive-Fee (FPIF) Contract:

Fixed-Price-Economic-Price-Adjustment (FP-EPA) Contract:

Cost-Reimbursable Contracts

Cost-Plus-Fixed Fee (CPFF) Contract:

Cost-Plus-Award-Fee (CPAF) Contract:

Cost-Plus-Incentive Fee (CPIF) Contract:

Provide a detailed analysis of the current progress of cost and schedule for an on-going project (format below) including the Variances, Indexes and Estimates for the project to provide a comprehensive report on the project. The comprehensive report should explain how the results are calculated, what the results mean, and what specific action steps should or need be taken to bring the project back within scope. Definitions must cite Kloppenborg textbook.

Planned Value (PV)

Earned Value (EV)

Actual Cost (AC)

Budget at Completion (BAC)

Schedule Variance (SV)

Cost Variance (CV)

Schedule Performance Index (SPI)

Cost Performance Index (CPI)

Estimate to Completed (ETC Method 1)

Estimate to Complete (ETC Method 2)

Estimate at Completion (EAC)

To-complete Performance Index (TCPI)

Comprehensive Situational Analysis:

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

10 questions from The Great Gatsby

Attached is the file that would help to answer the critical perspective questions. The answers don’t have to be too long but I need all the main points and keys.

1. Know the personalities of Daisy, Nick, Gatsby, Tom, Jordan, Myrtle, and George from your critical perspective.

2. Who do Daisy, Nick, Gatsby, Tom, Jordan, Myrtle, and George represent from your critical perspective?

3. Identify and explain similes and metaphors from your critical perspective.

4. Relate the setting (time and season) to your critical perspective.

5. Are there any signs of manipulation in the first six chapters?

6. What is the significance of each party in the first three chapters?

7. Have any of the characters shown inconsistent behaviors? If so, what are these behaviors?

8. What social and psychological themes have appeared in the novel so far? How might these themes have influenced each character’s behavior?

9. Which characters lie in the novel? How does lying affect these characters’ psyche?

10. In what manner has moral development played a role in the first six chapters?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

BUS421 Week 5 Discussion 1 and 2 MUST BE ORIGINAL

Discussion 1

Cover Letter

As you end this course, reflect on the learned objectives by developing a cover letter for a job application for a marketing management position. Illustrate your understanding by synthesizing your response to the Week 2 Marketing Careers and SWOTT Analysis discussion.

For this discussion, you will explore the components of a cover letter, reflect on your most relevant skills, and assess what action steps you can take to make your cover letter stronger.

In your initial post

  • First, identify a position on http://www.indeed.com/ (Links to an external site.)Links to an external site. that interests you as a potential job opportunity. Using the job description, identify three skills or qualifications that match your background and type them out.
  • Next, using the format suggestions from both the webinar and cover letter sample, create a three- to four-sentence paragraph that communicates the three matching skills and/or competencies you would like to highlight for the employer. The goal is to tailor the body of your cover letter to the position you seek.
  • Paste the link of the job description you are interested in and the three- to four-sentence paragraph that you have written for this job application into the discussion forum so you can obtain feedback from your classmates.

Discussion 2

Marketing Control

Why would an organization implement marketing controls in order to determine whether or not the marketing plan is performing up to expected results?

Text

Wood, M. (2008). The marketing plan handbook (5th ed.). Upper Saddle River, NJ: Pearson Prentice Hall.

MUST BE ORIGINAL!!!

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

Law

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

ExtremeNet and Allen Lopez

1. Read the case study for this unit regarding ExtremeNet and Allen Lopez.As the Chief Executive Officer for ExtremeNet, you are responsible for resolving the conflict between Allen Lopez and ExtremeNet in a manner that demonstrates solid ethical reasoning skills and the ability to manage stakeholder interests.

2. As the leader of ExtremeNet, it is your responsibility to resolve the following questions:

  • Should Allen Lopez be allowed to keep his job with ExtremeNet? Support your answer using ethical theory.
  • Should ExtremeNet attempt a lawsuit to force the removal of this website? Support your answer using ethical theory.
  • How can ExtremeNet’s leadership best respect the rights of Allen Lopez and ExtremeNet? Explain the impact of your ethical decision on Allen Lopez and the company.
  • How can ExtremeNet’s leadership best repair the relationship between management and employees while meeting the needs and goals of the company? Demonstrate an understanding of the issues and how to best unify the company to move forward.

Write a one to two page decision in which you address the above questions and explain your reasoning.

  • The paper should be double-spaced, well organized, and free of errors.

Add reference__________

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

Cause of World War I REWRITE

In a well organized essay discuss and explain the part played by each of the following in causing World War I.

1. European great power imperialist competition

2. Slavic nationalism

3. the arms race among the great powers

4. the rival alliance system

5. Chauvinistic Nationalism.

Just please revise it so it mentions all these 5 points.

I asked this essay to another tutor, and I don’t know why this essay is talking about US and women rights.

Please make sure it includes two DIRECT quote(with quotation marks) while writing about this. I need total two quotes from scholar, and I you can leave the quote as it is if you think it’s relevant

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

HCS 380 Discussion

There are five types of accounts, assets, liabilities,equity (balance sheet accounts), and revenue and expenses (income statement accounts). Assets increase on debit side, decrease on credit side. Liabilities and equity both increase on credit side, decrease on debit side. Then revenue accounts increase on credit side, decrease on debit side and expense accounts increase on debit side and decrease on the credit side. You might map out these increases/decreases and types of accounts on a sheet of paper and refer to it often. These are principles that will not ever change.

Next, remember that assets are things of value, i.e. cash is an asset. Note that revenue is not an asset because revenue does not equate to cash. We have been discussing the fact that revenue and cash aren’t one in the same, so it’s important to make that distinction. So, assets are things of value that are worth money. Liabilities represent what is owed to someone else, or debts. Equity is capital, or think about it this way: if assets represent everything of value, and assets = liabilities plus equity, then what’s left over after you subtract debt from assets will equal owner’s worth. Does this make sense? Capital represents value to the owner(s) after all debts are subtracted from all liabilities.

Now let’s think about revenue. Revenue is earned at the time of sale of a good or service, so revenue is the foundation of business profitability. From revenue we subtract expenses, and the expenses on monthly income statements represent expenses for the month that were required in order to generate the revenue we bring in that month. Revenue minus expenses = net profit (or loss), and this net profit is what increases the capital account on the balance sheet (or decreases capital if we have a loss).

Each of the five accounts all fit together, and information derived from the income statement affects the entire balance sheet (for example when we have revenue we debit accounts receivable on the balance sheet giving the asset section strength even though we have not collected the cash yet.)

Class: Please think through this information, begin a
discussion so that we can help each other, and please ask specific questions
.150-200 WORDS

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

What programs that can help homeless veterans

  1. Interpret information through close and critical reading.
  2. Demonstrate effective use of the writing process.
  3. Employ effective academic tone, style, mechanics, and citation method.
  4. Integrate relevant source material effectively and ethically.
  5. Support a position appropriate to the rhetorical situation.

You will submit a five- to seven-page (1,250 to 1,800 word) well-structured essay that is formatted in proper APA style. This final draft assignment must integrate prior feedback and show effective improvement from the prior rough draft assignment. Your essay is expected to be the product of a complete and thorough writing process.

The argument presented in your essay must be sound, valid, and based upon evidence from at least eight credible sources—at least five of which must be scholarly. (Review the Scholarly, Peer Reviewed, and Other Credible Sources (Links to an external site.)Links to an external site. table for more information about appropriate sources). Information and evidence must be integrated properly, cited accurately, and used with integrity. The essay must be appropriate for an academic audience.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

Polygraph Results

Polygraph Results

Competencies Addressed in This Assignment

  • Competency 1: Articulate how the rules of criminal procedure apply to a criminal justice practitioner.
  • Competency 3: Apply the 4th, 5th, and 6th Amendments in a criminal justice context.
  • Competency 5: Communicate effectively in writing.

Overview

Polygraph results fail to conform to the Frye doctrine and are therefore inadmissible as evidence in court. This doctrine, enunciated in Frye v. United States (1923) states that, before the results of scientific tests will be admissible as evidence in a trial, the procedures used must be sufficiently established to have gained general acceptance in the particular field to which they belong. Most courts refuse to admit the results of polygraph (lie detector) tests in either civil or criminal proceedings unless admissibility is agreed to by both parties.

Instructions

Polygraph results are frequently used in other situations, such as pre-employment or background tests. If this is the case, it begs the question of why these results should be excluded from courtrooms.

For this assignment, prepare a three-page memorandum to your supervisor, an attorney, addressing the admissibility of polygraph results.

In your memorandum:

  • Analyze the current position of the U.S. Supreme Court with respect to reliability and admissibility of polygraph evidence.
  • Determine the potential impact of Frye v. United States on criminal cases.

Be sure to review the Polygraph Results Scoring Guide to ensure you understand the criteria for this assignment.

Requirements

Your memorandum should meet the following requirements:

  • Written communication: Must be free of errors that detract from the overall message.
  • References: A minimum of two references.
  • APA format: Format resources and citations as per current APA style and formatting guidelines.
  • Length of memorandum: Three pages, not including the title page and the references page.
  • Font and font size: Times New Roman, 12 point.

https://prsa.capella.edu/bbcswebdav/institution/CJ/CJ3540/160402/Scoring_Guides/u07a1_scoring_guide.html

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now

What role does innovation play in the cybersecurity industry?, critique analysis assignment help

First Critique:

What role does innovation play in the cybersecurity industry?

Our society has entered an age in which a majority of our operations rely on the internet and information technology. In addition, as a result of President Obama’s 2012 Digital Government initiative the U.S. government has increased information technology usage in order to increase government productivity, collaboration, and the way in which government entities interact with the populace. As a result, our computers and computer networks are at risk of malicious cyber-attacks from nefarious actors around the hoping for financial gain, theft of intellectual property, and other politically motivated reasons. In order to stem the constant threats “advances in cybersecurity are urgently needed to preserve the Internet’s growing social and economic benefits by thwarting adversaries and strengthening public trust of cyber systems (The art of managing innovation risk)”. Despite increasing awareness of these threats a majority of organizations still do not take advantage of available technology and processes to secure information technology, nor are protective measures evolving as quickly as the threats. This general research and development has put organizations at great risk. Thus, addressing security issues requires a partnership that begins with constant and increased innovation.

  1. Who are the major developers of cybersecurity related inventions?

As highlighted by Intel Security, “Cybersecurity threats are a growing concern for all types of organizations, and that makes it more important than ever to recognize those who have made keeping critical systems secure a top priority,” (Cyber-Security Leaders). Some highlighted innovators from the last year include Intuit, Verizon, Israel, and the U.S. Government. No one organization is the leader in all areas of cybersecurity, however companies such as Verizon, Booz Allen Hamilton, Fire Eye, Lockheed Martin have and continue to invest billions of dollars and commit large amount of resources for the advancement of cyber security (National Cybersecurity Innovation Awards).

  1. How can technology innovations impact risk and risk management in the cybersecurity and/or cyber defense domains?

Technology innovation can be can be a driver of success as long as risk management dictates a cautious approach to innovation. “For most companies, the big, breakthrough innovations that deliver new benefits to customers and thus create new markets” (The art of managing innovation risk). However, each new innovation could open organizations to a plethora of new risks as such risk management and innovation must as much as possible work in unison. As highlighted by Accenture, “A corporate culture that only celebrates success can discourage innovation by making people nervous about taking risks—yet no rational organization would reward failure”.

H. (2015, March 27). Cyber-Security Leaders. Retrieved January 08, 2017, from https://www.moneyandmarkets.com/cyber-security-leaders-70527

National Cybersecurity Innovation Awards. (n.d.). Retrieved January 08, 2017, from https://www.sans.org/cyber-innovation-awards/year/2015

The art of managing innovation risk. (n.d.). Retrieved January 08, 2017, from https://www.accenture.com/us-en/insight-outlook-ar…

Second critique:

How can technology innovations impact risk and risk management in the cybersecurity and/or cyber defense domains?

All business investments require trade-offs between risk and reward. Tough questions must be answered by weighing up the business imperatives against a calculation of the risk and the greater the risk, the harder it is to make the case for investment.

Technology investments are no different. They, too, have always been a trade-off between risk and return. However, for enterprise technology, increased global connectivity is raising the stakes on both side of the equation. The commercial rewards from tapping into this connectivity are enormous, but the more tightly we are connected, the more vulnerabilities exist that attackers can exploit and the more damage they can do once inside. Therefore, when a manufacturer invests in a new product life-cycle management system, it is making a bet that the system will not enable the theft of valuable intellectual property. When a retailer invests in mobile commerce, it is betting that cyber-fraud won’t critically damage profitability. When a bank invests in customer analytics, it is betting that the sensitive data it analyzes won’t be stolen by cyber-criminals. The odds on all those bets appear to be shifting away from the institutions and toward cyber-attackers. They could swing decisively their way in the near future given most companies’ siloed and reactive approach to cybersecurity.

Chief information officers (CIOs), chief technology officers (CTOs), and chief information security officers (CISOs) indicate that concerns about cyber-attacks are already affecting large institutions’ interest in and ability to create value from technology investment and innovation. Potential losses, both direct and indirect, reduce the expected economic benefits of technology investments, as do the high cost and lengthy time frame required to build the defense mechanisms that can protect the organization against a growing range of attackers. In short, the models companies use to protect themselves from cyber-attack are limiting their ability to extract additional value from technology.

Reference: Beyond cybersecurity: protecting your digital business James Kaplan-Tucker Bailey-Chris Rezek-Derek O’Halloran-Alan Marcus, Time Books – 2012

GAO. (2010). U.S. GAO – Cybersecurity: Key Challenges Need to Be Addressed to Improve Research and Development. Retrieved fromhttp://www.gao.gov/products/GAO-10-466

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-12 hours? PAY FOR YOUR FIRST ORDER AFTER COMPLETION..

Get Answer Over WhatsApp Order Paper Now

Do you have an upcoming essay or assignment due?

Order a custom-written, plagiarism-free paper

If yes Order Paper Now