CRJ 306 Week 4 D1 Business Finance Assignment Help. CRJ 306 Week 4 D1 Business Finance Assignment Help.
(/0x4*br />
International Criminal Law |
The United States has refused to join the International Criminal Court since its inception. In your 300-word minimum primary response to this discussion board, expand upon the following:
- Describe the purpose and function of the International Criminal Court (ICC).
- Explain why the United States has not joined the ICC.
- Examine the pros and cons for the United States to be a member of the ICC.
- Construct an argument proposing the United States should join or continue to not be a part of the ICC and provide sound reasoning for your opinions.
- Explain the ramifications of the opinion that you advance to the United States and the international community.
The issue of the United States’ reluctance to join the ICC continues to be a matter of international debate. This week’s discussion requires you to take a position on whether or not the United States should formally join, and accept the jurisdiction of, the International Criminal Court. In this discussion, avoid notions of jingoism, and examine the international community and the responsibilities of the United States as an international actor in both civilian and military affairs. Make sure to explain the consequences of not joining or a decision to join the ICC.
CRJ 306 Week 4 D1 Business Finance Assignment Help[supanova_question]
Intermediate Macroeconomics ECO-3351 Research Paper Economics Assignment Help
Instructions:
1. The text of your paper (not including bibliography) must be approximately 1500 words absolutely no less than 1300 words.
2. You must include a bibliography. Use either MLA or APA format.
MLA:
http://www.library.cornell.edu/resrch/citmanage/ml…
APA:
http://www.library.cornell.edu/resrch/citmanage/ap…
3. You must include at least two refereed journal articles within your citations.
4. You must use third person format. (No “I” or “you”)
5. No title page, no table of contents
6. Abstract optional (if you choose to include an abstract, it should be no longer than 150 words)
7. Times New Roman, size 12 font (title can be larger)
8. Standard margins
9. Double-spaced
Rubric:
1. Content-70points
2. Length (at least 1500 words)-10 points
3. Use of two refereed journals, cited within text and bibliography-10 points
4. Proper MLA or APA citations used within text and bibliography-5 points
5. Correct formatting (See “Sample Format for Research Paper)-5 points
I will take off 10 points for each day the paper is past due.
I will be using Turnitin. If I detect any hint of plagiarism, you will receive a 0%.
[supanova_question]
Design an Entity Relationship Model via Systems Analysis Writing Assignment Help
Your task:
This is a two-part assignment. First, you will design a new table to be added to the ROClinic database that you worked on last module. This table will provide more information about the tetanus vaccination that we studied. You will also create a relationship between this new table and the table already present in ROClinic for HIS Development.
For Part 1 of this assignment you need:
- The Access database files that you worked on last module
- Part 1 Instructions
For Part 2, please locate a source online or in our library on tetanus immunization. Read about the various types of vaccines, recommended schedules, and the like. Describe two things you learned about the immunization process and timing that would be helpful in developing a database for storing patient information.
Save the assignment Part 1 as a .pdf file (Adobe Acrobat) or as a zipped Access database. Save your assignment Part 2 as a Microsoft Word document.
[supanova_question]
writing Instructions for Completing an annual personnel evaluation Writing Assignment Help
In this assignment, you will write a set of instructions using one of several instructor-provided scenarios*. The instructions must include visual elements to augment the text. The goal of this assignment is to write clear and concise steps that can easily be followed by a novice. Before starting this assignment, please review the following learning materials:
- Catrambone, R. (1990). Specific versus general procedures in instructions (Links to an external site.). Human-Computer Interaction, 5(1), 49-94.
- Hailey, D. (2014). Baywood’s Technical Communications Series: ReaderCentric writing for digital media: Theory and practice (Links to an external site.)(Chapter 9, Writing User-Centric Content)
This activity allows you to practice all of the module outcomes:
- MO1. Write clear and concise instructions for a variety of processes.
- MO2. Apply appropriate rhetorical appeals in written instructions and corresponding visuals.
- MO3. Design or procure appropriate illustrations for use in instruction sets.
- MO4. Produce technically and mechanically correct instructions for use in specific contexts.
- MO5. Create comprehensive instruction sets that allow novice users to complete complex tasks.
For this assignment, the following scenarios:
- Taking inventory in a small store
- Responding to a customer complaint
- Packing and sending a product order for fulfillment
- Completing an annual personnel evaluation
- Conducting a project completion review, including evaluating effectiveness
- Determining whether to lease or buy new equipment (industry and type of equipment is your choice)
- Creating a budget for a specific department
Write a complete set of instructions, including appropriate visual aids. You can use whatever visual aids you feel are most appropriate for your specific scenario, but make sure they help your intended readers. Follow the best practices you have learned in this module for writing instructions, but feel free to be a bit creative. Be sure to apply appropriate rhetorical appeals for textual and visual elements, as we discussed in M7D1 and M7D2.
Your instructions should be at least 15 steps, and at least one visual element is required. If you do not create the visual element yourself, you must cite the source appropriately to avoid copyright infringement issues. If you have questions about whether or not your illustration is appropriate, please contact your instructor.
Follow this naming convention for your file before submitting it. The file should be Word or txt (No PDF): LastnameFirstinitialAssignmentLetterNumberLetterNumber. For example: HoneaSM7A1. To be accepted, the file must be Word or txt and must be in the above naming convention.
Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. For those assignments that are not written essays and require uploading images or PowerPoint slides, please follow uploading guidelines provided by your instructor.
Check your work and correct any spelling or grammatical errors. When you are ready to submit your work, click “Upload Submission.” Enter the submission title and then click on “Select a file to upload.” Browse your computer, and select your file. Click “Open” and verify the correct file name has appeared next to Submission File. Click on “Continue.” Confirm submission is correct and then click on “Accept Submission & Save.”
Do not check with turn it in.
[supanova_question]
Assignment Programming Assignment Help
After watching the videos below and reading about the Balanced Scorecard in Chapter 12, compare and contrast the Balanced Scorecard to one of the IT frameworks below (COBIT, ITIL, TOGAF, CMMI-Dev). Describe the context in which the Balanced Scorecard and the IT framework would be used. The paper should 3-4 pages in APA format, not counting the title and reference pages. Make sure you include in-text citations. Your paper should cite at least 3 peer-reviewed articles on IT governance frameworks. The rubric for this assignment can be viewed when clicking on the assignment link.
Use the resources below to help you with this week’s assignment.
Read the following chapters in the textbook:
- Chapter 12 – “IT Strategy and Balanced Scorecard” Chapter 12 – IT Strategy and Balanced Scorecard.pptx explains how the Balanced Scorecard can be used in IT strategies.
Additional resources:
- Video: The Balanced Scorecard explains the Balanced Scorecard.
- Video: Communicating Strategy with the Balanced Scorecard explains the relationship between strategy and the Balanced Scorecard.
- Video: Introduction to COBIT 5 introduces the COBIT 5 framework for management of enterprise IT.
- Video: ITIL Fundamentals describes the ITIL framework for IT service management.
- Video: What is TOGAF? introduces a framework for developing and managing systems architectures.
- Video: CMMI Levels Introduction is an introduction to the Capability Maturity Model Integration (CMMI) for systems development.
The following are examples of frameworks related to IT governance. You do not need to read the entire the framework–Use the PDFs below for background material for your research. The PDFs below can be referenced in your paper, but do not count as one of the peer-reviewed articles.
- COBIT 5 Framework – This PDF describes the COBIT 5 (Control Objectives for Information and Related Technologies) framework for management of enterprise IT.
- ITIL V3 – This PDF describes version 3 of the ITIL (Information Technology Infrastructure Library) framework for IT service management.
- TOGAF 9.1 – This PDF introduces The Open Group Architecture Framework (TOGAP) for systems architecture.
- CMMI-Dev v1.3 – This PDF describes the Capability Maturity Model Integration (CMMI) for systems development.
[supanova_question]
[supanova_question]
discussion 2 Business Finance Assignment Help
Aging, Lifestyle, and Disease
The presentation you watched earlier in this unit demonstrated the effects of various lifestyle choices or socioeconomic circumstances on various biological systems.
For this discussion, address the following questions:
Knowing that certain choices improve or decrease a person’s susceptibility to disease and sub-optimal aging, how should society respond to poor choices?
What rights does the community-at-large have?
Should policy be affected by our increasing understanding of the effect of lifestyle on aging and disease? In what ways?
How can these changes in policy be implemented?
As always, support your discussion with citations from the presentation, your readings, and research.
discussion 2 Business Finance Assignment Help[supanova_question]
What is Phenology Writing Assignment Help
- I have past examples that you can use, I also have the data and pictures that will be used for this essay.
- Introduction that describes what phenology is. Give the scientific name of your plant. You can include a picture of your species here. Include a description of the life history of your plant (pattern of bud burst, flowering, seed production, dispersal, leaf fall, etc.).
- Methods: Describe the method you used to collect data on your plant’s phenology. (how often, when were pictures taken, what did you record, etc., where did you get information on rainfall, temperature and degree-days*)
- Results and Discussion: Include your graph which shows a line graph of temperature/rainfall/degree days on the y axis against days on the x axis. Use a different color line for each item. See the example graph in the phenology folder. Indicate on your graph with a bold line on the date that you observed a major phenological change (first color change, first leaf fall, 50% leaf fall or more, any change in flowering or seeds, or create your own category if your plant has some other factor.)
- Discuss the relationship between phenological changes and their correlations with temperature change, rainfall change, degree day change. Discuss the effects that climate change may have on any of your plant’s phenological characteristics or the timing thereof. Include one reference which discusses the effect of climate change on phenology of any species of plant. How might this effect the insects or animals that rely on this plant for food, nesting, etc?
- Project budburst website gives a good introduction to the principle of phenology.
[supanova_question]
Case study on cybersecurity Writing Assignment Help
Please, read the statement and answer the questions in the “It is requested section”. The attached files are:
– the document with the material on Forensic Analysis in Cybersecurity;
– files with the evidence mentioned in the task.
There is no need to write introductory part. Please, get down straight to answering questions.
Statement
The company Invent SL, which has offices in Australia, Italy and Spain, has suffered a security incident in each one of them.
Headquarters in Australia:
On the one hand, at the headquarters in Australia, the leakage of sensitive information from several of its employees (email addresses and passwords) has been detected. The affected set indicates that they received a suspicious email campaign with similar HTML attachments to the Office 365 portal during the last days. This company does not have (2FA) authentication factor in two steps, so an attacker could access corporate mail and other types of public applications on the Internet hosted by Microsoft. Since there are more than 10,000 employees in the company, it is not possible to reset and block all accounts for reasons of business continuity, so it is necessary to locate only those affected.
Headquarters in Italy:
On the other hand, in Italy there has been an unauthorized access to one of its accounting servers. This access has been detected through a periodic review by the IT team. In this case, the team plans to hire an external provider to take charge of this incident.
Headquarters in Spain
Finally, at the headquarters in Spain, an attack was detected on one of the servers of its textile factory. All files on the server have been encrypted with the extension “.NM4”. These computers were patched against MS17-010.
Since we are part of the incident response team of the company, our mission is to discover what has happened in each of the situations that arise .
For this, the IT team has provided us with the following evidences:
- Australia: Navigation proxy traffic logs in the date range in which the incident occurred.
- Italy: no position that will be handled by an external provider.
- Spain: status of open ports in the system and part of the rescue message.
It is requested to answer the following questions:
Before analyzing the evidence:
- What kind of threat has impacted the Australian headquarters? (0,5p)
- What type of threat has impacted the headquarters of Madrid? (0.25p)
- What risk exists for an entity when a leak of information occurs as described in the incident in Australia? (0.75p)
About the incident in Italy:
- Should the equipment be disconnected from the network for analysis? (0.2p)
- What hardware part of the server should be cloned / dump before turning off the computer? (0.1p)
- By what known command would the cloning of the hard disk be performed? Write an example of execution. (0.2p)
- What should be calculated after cloning the disk to verify its integrity? (0.1p)
- Briefly describe the chain of custody that must be followed for the transfer of evidence to the external provider (max 15 lines) (0.4p)
Final analysis of the evidence.
Analyze the evidence provided for the Australian headquarters:
- Generate a script to parse the captured traffic, so that it shows the final result by command line. (2 P)
- What user email addresses have been affected? You can perform a manual analysis if you have not been able to perform the previous section. (1,5p)
Analyze the evidence provided for the Madrid headquarters:
- How does this type of threat work? (max 5 lines) (1p)
- Could the data be recovered today? (0.25p)
- What has been the input vector used by this threat? (Use the evidence spain.jpg) (0.75p)
- Implement countermeasures for the Australian headquarters so that this type of incident does not happen again. (1 p)
- Implement countermeasures for the Madrid headquarters in order to avoid repeating this type of incident. (1 p)
Notice:
- It is not necessary to complicate (it is simpler than you think).
- Not everything is on the agenda, you have to look for some concepts in other sources (work done by any analyst).
- The URLs contained in the rescue message of Spain (spain_recover_files_message.png) are not relevant and therefore it is not advisable to access them, since it poses a risk to the student’s team.
[supanova_question]
find the level of economic well-being of the two populations and assess changes over time for the same dates for which you have demographic data. Science Assignment Help
Using resources from the World Bank at http://www.worldbank.org/ (click on “Data”), find the level of economic well-being of the two populations and assess changes over time for the same dates for which you have demographic data. Has the number of tractors been increasing? Has the use of fertilizers, pesticides, and other concomitants of the Green Revolution been increasing over time? Has the amount of arable land been increasing or decreasing? Has the acreage devoted to forest been declining? Using a resource such as the Ecological Footprint calculations for countries (see, for example,http://www.footprintnetwork.org/en/index.php/GFN/page/footprint_basics_overview/ ), evaluate the likely environmental impact of population growth in each country.
Germany and Yemen
just 1 paper is enough!
[supanova_question]
Adobe Illustrator – EMOJI Humanities Assignment Help
Create a new EMOJI that effectively symbolizes an important icon, trend, or event.
OBJECTIVES
• The vector document follows le conventions
• The EMOJI is created ONLY using shapes (no strokes!)
• The EMOJI is grouped and centered to the artboard
• Utilize Path nder Operations or Shape Modes within the symbols
Path nders/ Shape modes allow you to edit drawn shapes into more complex and interesting compositions. Use these tools to merge overlapping shapes together, pull apart overlapping shapes where their paths intersect, and create/edit compound forms.
- Gradients are used in the le
- A second variant EMOJI is created using all tools
- The le follows proper naming/ le type conventions
[supanova_question]