Assignment 3.2: Voice Mail Follow-Up – Submit Here Humanities Assignment Help. Assignment 3.2: Voice Mail Follow-Up – Submit Here Humanities Assignment Help.
br />
Assignment 3.2: Voice Mail Follow-Up – Submit Here
Week 6 Assignment 3.2: Voice Mail Follow-Up
Due Week 6 and worth 40 points
Your supervisor has asked to you write a brief email on the vacation policy changes to be distributed to staff. You have just finished up and have sent your newly constructed email to the staff. Now, you must call your supervisor and leave a voice mail response updating him or her that you have sent out the new vacation policy email to staff. Once you create your voice mail message, be sure to attach it when submitting this assignment.
Note: For this assignment, you will need to use a sound recorder such as Sounder Recorder on PC or Quicktime on Mac.
Leave a follow-up reply voice mail for your supervisor when you have completed the email in which you:
- Inform your supervisor that you have completed the email.
- Confirm to which employees you sent the email.
- Confirm the date and time when you sent the email.
- Target the appropriate professional audience.
- Use appropriate rate, volume, and pitch for professional audience.
- Speak for clarity, including articulation, pronunciation, and fluency.
- Meet three to five (3-5) sentence minimum requirement.
The specific course learning outcomes associated with this assignment are:
- Demonstrate understanding of the basic fundamentals of communication.
- Develop and practice communication skills, including verbal, nonverbal, listening, writing, interpersonal, perception, and critical thinking.
- Use various electronic communication platforms in academic and professional work.
- Relate to the interpersonal and organizational dynamics that affect communication in organizations.
- Analyze and assess effective communication.
- Use correct sentence mechanics, grammar, spelling, punctuation, and style.
- Use technology and information resources to research issues in communications.
- Write clearly and concisely about communications using proper writing mechanics.
Assignment 3.2: Voice Mail Follow-Up – Submit Here Humanities Assignment Help[supanova_question]
Workplace Privacy and Employment Law Discussion Boards Business Finance Assignment Help
THIS ASSIGNMENT HAS 2 PARTS. THERE ARE 2 CASES DISCUSSION BOARD QUESTIONS TO ANSWER. FOLLOW THE INSTRUCTIONS CORRECTLY ON EAHE DISCUSSION BOARD. Be careful with grammar, be professional, no plagiarism. REMEMBER THE REFERECES, ANSWERS ALL QUESTIONS, IN TEXT-CITATION AS WELL.
******DISCUSSION BOARD #1: Think about an unethical workplace privacy issue that either you or a colleague experienced. The experience should be an unethical situation in which an employee violated workplace privacy and consequences occurred.
1- In your mind, why was this situation an unethical issue?
2-What ethical model could explain the decisions made, both from the employee perspective and the employer perspective?
For this week’s discussion, incorporate the following concepts into your post:
A)Provide a brief description of the experience (scenario) with the outcomes.
B)Explain why this experience was an unethical workplace privacy issue.
C)What ethical decision-making model did you or your colleague use?
D)What alternative ethical decision-making model could have been used that would have provided a more favorable outcome? Explain.
*******DISCUSSION BOARD #2: Select one of the employment laws covered in this module that you, a family member, or a friend has experienced (no names). Conduct some credible research on the employment law your experience falls under. For your discussion:
1-Discuss why/how the company violated the employment or labor law.
2-Discuss the legal ramifications of the situation for both the employee and the employer.
3-Was there a legal case for the EEOC or Federal courts? Please explain.
[supanova_question]
reaction paper Humanities Assignment Help
Please answer both of these questions in your paper.
- At the beginning of the book, Frazier explains to his visitors how sheep are trained to stay in a limited area of lawn, confined only by a string. Explain how this works in terms of learning theory, using the terminology from the textbook. Also explain why the sheep escape later in the book and how they are once again restrained. Skinner intends this to be a metaphor for the people at Walden II and in the larger society. How might the control of the sheep be extended to apply to people?
- The book introduces many examples of social engineering (behavioral engineering or cognitive engineering). These raise interesting questions about whether nature (genetics) or nurture (environment) is responsible for different aspects of our culture. For example, can musical or artistic genius be nurtured, can deviant behavior be eliminated by early education or re-education, can force be eliminated as a means of controlling behavior. Pick an example of social engineering from the book and discuss whether it would work in today’s world. In your response, discuss whether you think that social customs should be replaced by Frazier’s idea of “experiments”. State your reaction to what was proposed in the book and whether you feel it would be realistic outside the ideal circumstances contrived in the novel.
Paper Format
It is not necessary to use APA style. I prefer double spaced papers. 6 pages. If you quote from the text or refer to examples in the book, please give the page numbers.
Be concise, specific, and to the point. There is no need to summarize or describe what happens, except in support of your analysis.
do not include external sources, references or criticism.
The course textbook should be your only reference — do not
include external sources, references or criticism. I am most interested in your
thinking and how well you apply ideas from the course to the content of the
book.
THE book LINK : Walden Two by B.F Skinner
http://www.sparknotes.com/lit/walden2/
[supanova_question]
(((((IoT network security))))) Computer Science Assignment Help
1-summarize and describe any IoT architecture.
- should include a diagram of IoT Architecture then identify and describe the architecture layers in details
2-Analyze and describe the security concerns (attacks) on IoT architecture.
- identify the possible attacks on each IoT architecture layers( Attacks, Weakens, Limitation)
3-recommend security services and mechanisms to countermeasure the attacks.
- detailed description for each service and mechanism
- identify the security service that could detect/prevent the attack in each layer
- describe mechanisms to implement the identified services
4-Referring to at least three research papers
* 0 % similarity
*references and citation is required( Article. Books and conference paper)
* total page of assignment is 10.
* kindly use the easy language.
*harvard style referencing
[supanova_question]
IoT network security Computer Science Assignment Help
1-summarize and describe any IoT architecture.
- should include a diagram of IoT Architecture then identify and describe the architecture layers in details
2-Analyze and describe the security concerns (attacks) on IoT architecture.
- identify the possible attacks on each IoT architecture layers( Attacks, Weakens, Limitation)
3-recommend security services and mechanisms to countermeasure the attacks.
- detailed description for each service and mechanism
- identify the security service that could detect/prevent the attack in each layer
- describe mechanisms to implement the identified services
4-Referring to at least three research papers
* 0 % similarity
*references and citation is required( Article. Books and conference paper)
* total page of assignment is 10.
* kindly use the easy language.
*harvard style referencing
[supanova_question]
[supanova_question]
Add to the statement in bolded font defining cleaning data and why this is necessary in fraud data analytics. Business Finance Assignment Help
Building a fraud data analytics plan requires a defined skill set. The absence of one skill set will diminish the effectiveness of the plan. The audit team needs to ensure all the right skills are contained within the team:
Knowledge of fraud. Since fraud data analytics is the process of searching for fraudulent transactions, the auditor must have a full understanding of the fraud concepts.
Fraud scenarios. This skill relates to how to write a fraud statement that correlates to developing a fraud data analytics statement.
For an analogy, the scenario approach should be considered the system design aspect of the project and creating the routines is the program aspect of the project, or the scenario creates the questions and the fraud data analytical plan creates the answers.
Audit software knowledge. Coding software, whether writing scripts or using software functions, is necessary to write the data interrogation routines. The ability of the auditor to clean data, reformat data, combine data, and create reports is an absolutely necessary skill.
Add to the statement in bolded font defining cleaning data and why this is necessary in fraud data analytics.
Include scholarly references to support your statements, no .com sources, not older than 7 years.
Add to the statement in bolded font defining cleaning data and why this is necessary in fraud data analytics. Business Finance Assignment Help[supanova_question]
Week 7 Assignment 4: Email Revisions Business Finance Assignment Help
Due Week 7 and worth 100 points
Revise the two (2) emails below to remove problematic content and help these students construct polite, effective email messages instead.
Scenario 1:
Susan is unhappy with her grade in her college class. She wants to clarify what she can do to improve in the course. She also feels like venting her frustrations to her professor due to the many hours she is spending studying and writing papers (which may or may not be a good idea). She decides to email her professor; however, before she hits SEND, she asks you, her friend, to take a look at the email.
Reading the email, you note a lack of civility, polarizing language, and other unethical language (given the context). Help Susan rewrite her email, so she can express her concerns over her poor grade politely and ask for help from the professor.
Susan’s Email:
(No greeting) I want to know why my grade was so bad. I spent hours finding sources and writing that paper and it was graded unfair. My friend wrote her paper the night before it was due and got a better grade. I know most professors grade hard but this is ridiculous. I felt good when I submitted the paper but now I feel like crap. I guess I am going to fail. (No closing)
Scenario 2:
Don is worried about passing his college class due to some low grades. He wants to ask his professor for help to pass the class. He decides to email his professor; however, before he hits SEND, he decides to ask you, his friend, to take a look at the email.
Reading the email, you note a lack of civility, poor manners, and poor grammar in Don’s email. Help Don rewrite the email, so he can express his concerns and appropriately seek help from the professor.
Don’s Email:
(No greeting) Yo teach. I dunno no way to pass this class. What I gotta do to pass? (No closing)
Instructions:
- Revise both emails.
- Create two (2) new email messages of one to two (1-2) paragraphs each for a total of two to four (2-4) paragraphs.
- Create an appropriate greeting and closing for each email.
- Target the appropriate professional audience.
- Use appropriate language for professional audience.
- Use appropriate email formatting.
- Follow appropriate netiquette rules for electronic communication.
- Meet the 100-to-200-word minimum requirement for each email revision.
- Use correct sentence mechanics, grammar, spelling, punctuation, and style.
Your assignment must follow these formatting requirements:
- Be typed, single-spaced, using Times New Roman font (size 12), with 1-inch margins on all sides. Check with your professor for any additional instructions.
- Include a cover page containing the title of the assignment, student’s name, professor’s name, course, and date. (The cover page is not included in the required page count.)
The specific course learning outcomes associated with this assignment are:
- Demonstrate understanding of the basic fundamentals of communication.
- Develop and practice communication skills, including skills in verbal, nonverbal, listening, writing, interpersonal, perception, and critical thinking as appropriate for the audience.
- Relate to the interpersonal and organizational dynamics that affect communication in organizations.
- Analyze and assess effective communication.
- Use correct sentence mechanics, grammar, spelling, punctuation, and style.
- Use technology and information resources to research issues in communications.
- Write clearly and concisely about communications using proper writing mechanics.
Click here to view the grading rubric.
[supanova_question]
Answer the following 4 questions Business Finance Assignment Help
1. As presented in the module this week, the fraud triangle consists of:
Rationalization: justification of dishonest actions
Opportunity: ability to carry out misappropriation of cash and organizational assets
Pressure: motivation or incentive to commit fraud
As a fraud investigator, it is a key skill to be able to identify potential risks to a company based on the three areas of the triangle.
For this discussion, try to recall a circumstance in an organization you worked with or knew about in which opportunity, pressure, and rationalization played out in a mutually reinforcing way as the fraud triangle illustrates. If you cannot or choose not to recall an actual instance, you may fabricate a fictional scenario.
Describe the circumstance you have chosen and explain how individuals reacted to the associated incentives and/or how they might have reacted. Then offer suggestions regarding the types of remedies and changes that could be implemented to “break” the triangular relationships and lessen the incentives for fraudulent activity.
Formulate your answers based on the material in this week’s module and also on the video below.
Video Summary from the website listed below: Kimberly Ginn, of Baker Tilly Virchow Krause, LLP, uses the Fraud Triangle to help us understand how fraud occurs.
http://www.veoh.com/watch/yapi-aFbDISSYKRs?h1=Fraud+Triangle
McGurrin, D., Jarrell, M., Jahn, A., & Cochrane, B. (2013, August). White collar crime representation in the criminological literature revisited, 2001-2010. Western Criminology Review, 14(2), 3-19.
2. Being able to import data into MS Excel is a critical skill for the forensic investigator. Once data is in Excel, it can be manipulated and studied for analytical purposes. The textbook and this week’s module both provide tutorials on the proper steps to import data into Excel. For this discussion, import data into Excel from three locations (Access, another Excel sheet, text, or internet) and then describe the process step by step in detail and document your successes, challenges, and struggles in the forum.
Formulate your answers based on the material in this week’s module. Use the video below to augment the information you already have. This video provides some great tips on working in Excel.
Video summary from the website listed below: Tutorial explaining 10 of the most common must-know features in Microsoft Excel 2010. Excel is used worldwide, and this tutorial shows slightly more than the basics of how to perform useful tasks.
Albrecht, W. S., & Hoopes, J. L. (2014, October). Why audits cannot detect all fraud (cover story). CPA Journal, 84(10), 12-21.
3. Ratios are a key element in the forensic examiner’s toolbox. Ratios can provide a great deal of forensic information and can be used to filter out many fraudulent schemes, such as kickbacks. For this discussion, develop a list of 10 ratios that would be worthy of forensic analysis in a large company. List the ratios you have decided to discuss and then describe what each might signify and why each would be worth investigating. Examples of the types of ratios you might select include payments to one contractor versus another, invoices from one employee versus another, revenues versus expenditures, etc. Be as specific as you can in your identification of the items being compared and what sort of discrepancies might engender suspicion.
Formulate your answers based on the material in this week’s module and augment that information with the video below, from the N S Toor School of Banking. This video provides a nice summation on ratios and financial analysis.
https://www.youtube.com/watch?v=heV8ttsBXxA
Lepeudry, P. & Cheadle, A. (2013). Proving staff kickback allegations: How to gather evidence efficiently-regional analysis-Asia-Pacific. Retrieved from http://www.kroll.com/CMSPages/GetAzureFile.aspx?pa…
4. Studies have revealed that financial statement fraud often begins as a “slight exaggeration,” fabrication, or inflation of business records. Such a reporting discrepancy could be as minute as adding several dollars to an expense account. Research tells us that such small actions often grow into larger illegal misrepresentations. In order to prevent financial fraud in the first place we need to ensure that minor fabrications are not tolerated by the company.
In your current or past employment experiences, ponder several instances where you came to be aware of questionable activity. Describe the situation, how you handled it, and how some sort of forensic countermeasure could have prevented it from occurring. (If you have been so fortunate as to not have such an experience, fabricate a fictional scenario for this exercise and describe how you would have responded to it.)
View the video below and ponder how this greedy CEO committed fraud without alerting his employees.
http://www.newson6.com/story/27560930/former-arrow-trucking-ceo-accused-of-fraud-tax-evasion
Hussain, S. N., & Manzoor, S. R. (2014). Enhancing firm financial position by reducing white collar crime through financial crime control remedies: A study of KP hospitals. Pakistan Journal of Commerce & Social Sciences, 8(2), 384-398.
***Each answer must be 300 words minimum. Support your statements with citations. Sources are provided however you can add more if they are scholarly sources (no .com sources, no sources older than 7 years).
[supanova_question]
SULA final paper (please make sure you have read the book before bidding) Writing Assignment Help
criteria: The final paper will be a more thorough written version of your in-class
presentation. Choose one of the books we read this semester and pair it with another
work. Synthesize the two and analyze them
Theme of paper: racism, and black community segregation.
Supplemental material: The case for Reparations by Ta-Nehisi Coates from The Atlantic
https://www.theatlantic.com/magazine/archive/2014/…
please use this material to synthesize with SULA
the following PDF file is an example of final draft, go take a look, and please write like this.
Please, make you have read this book already, known this book well, before your bidding.
Thank you!
[supanova_question]
Business Entities Business Finance Assignment Help
Please respond to the following:
- Watch the short video on basic corporate structure and business entities. The video helps explain some of the legal nuances of a corporation and compares the corporation to other types of business entities discussed in the text.
Understanding Corporate Structure (1:07)
https://www.investopedia.com/video/play/corporate-…
Exploring business entity types | Small business | lynda.com (10:10)
Question:
- A friend has asked you to help her decide how to protect her soon-to-be-opened bakery from liability, while still maintaining a business structure that fits her needs. Compare and contrast two (2) different possible business entities that would be suitable for her and explain why. Be sure to support your response with legal reasoning.
[supanova_question]
Assignment 3.2: Voice Mail Follow-Up – Submit Here Humanities Assignment Help
Assignment 3.2: Voice Mail Follow-Up – Submit Here Humanities Assignment Help