Tuesday, January 26, 2016

COM 225 Foundations of Mass Communication

COM 225 Foundations of Mass Communication
 COM 225 Week 1 Individual Assignment Print Media Industry Worksheet
Complete the University of Phoenix Material: Print Media Industry Worksheet located on the student website
 Week 1 DQ1
 Select an influential book, newspaper, or magazine and discuss how it influenced American society. How did it stand out from the literary, political, or cultural climate of the time? What immediate and long-term effects did it have
 Week 1 DQ2
 Consider e-book devices such as the Amazon® KindleƤ. What are some successful and unsuccessful characteristics of electronic delivery of paper-based media
Week 2 Individual Assignment Electronic and Digital Media Industry Paper
 Describe the role technology has played in electronic and digital media in a 700- to 1,050-word paper.
 Discuss the historical and contemporary roles of media in society.
 Describe how the chemical and electronic technology of photography, recording, and transmission has advanced from initial discovery to the present.
 Describe how mass media uses these technological innovations.
  Analyze how the development of digital technology has affected the content, distribution, and style of electronic media.
 Discuss how the role of mass media has changed with these developments.
 Cite readings and at least two peer-reviewed sources.
Format your paper consistent with APA guidelines

Week 2 Learning Team Assignment Annotated Reference List

Decide on the topic for the final paper and presentation.
 Review
 Ch. 13 of the text, especially the Lifestyle Effects, Attitude Effects, Cultural Effects, and Behavioral Effects sections.
 Choose one lifestyle, attitude, cultural, or behavioral effect to analyze. Each team member must research the topic and select two research articles from the University Library.
 Provide annotated references. The team’s list must summarize each article and explain why it is relevant to the topic.
 Identify whether this was an experimental research study. Explain what research methodology was used to collect the data in the article.
 Format your annotated reference list consistent with APA guidelines.

Week 2 DQ1
 Do Films have a significant effect on society: Explain your answer. Select a controversial film and discuss how it empowered, motivated, or shocked people to take action

Week 2 DQ2
 Some people have called for Internet Regulation. Do you think it is possible for the government or a corporation to regulate Internet content? Why or why not? If so, what content must be regulated, how must it be monitored, and what penalties must apply to its misuse

COM 225 Week 3 Individual Assignment Controversial Issues in Entertainment Paper
Discuss a controversial issue you have seen in the media, such as violence, unethical behavior, racial or religious discrimination, drug use, or sexual content, in a 1,400- to 1,750-word paper.
Explain the nature of the controversy, why it is used, and how it would be different with the controversial content removed. Provide examples.
Find three mass media messages on the issue from different sources, such as a news report, advertisement, or press release. Discuss how each source presents a different side of the issue and how the media affects public opinion.
Discuss how new technology affects news and advertising. How does new technology affect the public’s perception of the controversy? Does the medium that pr esents the message resolve or exacerbate the controversy?
Cite readings and at least three peer-reviewed sources.
Format your paper consistent with APA guidelines. COM 225 Week 3 Learning Team Assignment Formal Outline
Prepare a 2- to 3-page formal outline covering the initial preparation for the final paper and presentation. The outline must have a thesis statement, major topics, sub-points, key supporting evidence, at least six references, and a conclusion.

Week 3 DQ1
 Many companies are looking for new ways to advertise products or services, such as product placement in TV or films, website banners and pop-up ads, and cell phone messages. How effective are these methods? As more people turn to satellite radio and digital video recording services, what are some new advertising possibilities
Week 3 DQ2
 The wars in Iraq and Afghanistan are unique in that soldiers and civilians have cell phones with cameras, video recorders, and Internet access. In previous military operations, the public was dependent on embedded reporters and official news agencies. How has citizen reporting and blogging
changed the public’s knowledge and opinion about war
Week 4 Individual Assignment Media and Government Worksheet

Complete
the University of Phoenix Material: Media and Government worksheet located on the student website
 COM 225 Week 4 Learning Team Assignment Mass Media Messages and Effects Presentation
 Create a 10- to 12-slide Microsoft PowerPoint presentation in which you present the major points of your Mass Media Messages and Effects Paper. Include speaker notes and references.
Week 4 DQ1
 Some people claim that music, video games, television programs and films that depict violence, promiscuity, unethical behavior, and drug use may encourage young people to engage in those behaviors. Compare this to films,
books, or cartoons from before the 1980’s that depicted objectionable
No comments

publically traded U.S. companies

 publically traded U.S. companies

Use the Internet to research two (2) publically traded U.S. companies, and download their financial statements. Assume you are the CEO of a major corporation. You are responsible for expanding the corporation through the acquisition of another company. Assume that the acquisition involved $15 million in goodwill. Write a three to four (3-4) page paper in which you: 1.Provide an explanation for the business combination method you selected in expanding the corporation by acquiring another firm, your reason for selecting that business combination method, and how the purchase will grow the business. Identify at least five (5) possible synergies that could occur as a result of the proposed acquisition. 2.Analyze the accounting requirements for the business combination method you selected. Prepare consolidated financial statements for the date of acquisition. 3.Assume that, in year two (2) of operations, goodwill has been impaired. Explain to management how you determined goodwill was impaired and the financial impact of such impaired goodwill. Prepare the necessary accounting entries to recognize goodwill impairment. 4.Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources. Your assignment must follow these formatting requirements: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: •Examine the business combination planning and accounting process. •Analyze the accounting requirements for business combination and prepare the financial statements for the consolidation of subsidiaries on the date of acquisition. •Use technology and information resources to research issues in advanced accounting. •Write clearly and concisely about advanced accounting using proper writing mechanics
No comments

Web applications Need help with these question ASAP

Web applications
Need help with these question ASAP



 (Short Answers qt 1-6)
1- When you should test Web applications for known vulnerabilities? Provide at least two examples using the SDLC phases
2- Identify and describe three different types of Web application tests that can be demonstrated using the Damn Vulnerable Web Application tool.
3- Explain how you can use a CVE number to learn more about recommended countermeasures and safeguards for the identified vulnerability
4- Briefly describe how a SQL injection attack can be used to compromise the confidentiality of information stored in a database
5- Briefly describe how a cross-site scripting attack can be used to compromise the confidentiality of information stored in a database
6- Why should Web applications be tested for known vulnerabilities both (a) before and (b) after being released into the production environment? You must address both types of testing in your answer

NETWORKING
7- Netwwork Troubleshooting
Experts-Exchange (www.experts-exchange.com) is one of the best places to get answers to any computer-related problems.
The way it works is that people will post their computer/networking problems and "Experts" would try to help them by troubleshooting the problems.
Now, go to: http://www.experts-exchange.com/. Scroll down and see the “Open Questions”, meaning questions that nobody has posted an answer to.
This is a long list of problems that nobody has provided explanations for.
Look through a few of them, and then select one that is related to networking.
Come back here and post the problem that you found and  research on the Internet on the possible source of the problem and how to fix it.

8- COMMON NETWORK PROBLEM
What is the most common network problems that you have experienced or heard about?
Why is that a problem?
What are some of the symptoms of this problem?
How do you fix it?
How do you prevent it?

9- NETWORK TROUBLESHOOTING STEPS
I have a network with several subnets, several switches, and a firewall / router.
I use DHCP and an internal DNS server. All of a sudden, a workstation that has worked for months loses connectivity to sites it has used regularly.
Define a troubleshooting regimen that will help you isolate the problem and fix it.

CYBESECURITY (Your response should be 150+ words in length and include APA format references and citations.)

10-Prevent, Detect, Respond, Control and deter Attacks
Select one of the Critical Infrastructure Key Sectors (as defined by DHS https://www.dhs.gov/critical-infrastructure-sectors). Name the top three cybersecurity threats to this sector and provide detection/mitigation/incident response recommenations. Use the "prevent, detect, respond, control, and deter" framework in your explanation.
11- ANTIVIRUS- SILVER BULLET ?
Take a moment to review the malware and spam statistics on these reputable sites:
https://www.shadowserver.org/wiki/pmwiki.php/Stats/Malware
https://www.virustotal.com/en/statistics/
https://www.projecthoneypot.org/statistics.php
Here's the scenario... Your boss is resistant to spending any more budget on the cybersecurity program because the company has a "top of the line", expensive antivirus solution. Using statistics from the websites I've provided and at least 2 additional sources to prepare an "elevator speech" for him/her to secure funding for at least one additional technology (your choice).

No comments

Compensation and Benefits


What impact do benefit offerings have on marketplace competitiveness and the ability to attract and keep quality employees? Do you think pay is the primary motivating factor for most job applicants and existing employees? In 300 words or more.

No comments

Discuss the strengths and weaknesses of the ethnographic approach. Choose appropriate examples from the literature

Discuss the strengths and weaknesses of the ethnographic approach. Choose appropriate examples from the literature.
This paper is for Research Techniques and Approaches. It is requested to do a literature review on the following question:
Discuss the strengths and weaknesses of the ethnographic approach. Choose appropriate examples from the literature.
Please explain what ethnography is, and how it is used in research, then discuss a few strengths and weaknesses in using ethnography as a research approach or technique.
please refer to the list of references below that I would like you to use in this paper:
* YOU MUST USE THESE:
1- Doing Ethnography - by Giampietro Gobo - Most importantly Chapter 1: What is ethnography?
2- Handbook of Anthropology in Business - by Alessandro Caliandro - Chapter 35: Ethnography in Digital Spaces: Ethnography of Virtual Worlds, Netnography, and Digital Ethnography.

* The following references are optional to use, but preferable:
1- Ethnographic Methods - by Karen O'reilly
2- Key Concepts in Ethnography - by Karen O'reilly
3- What's wrong with Ethnography? - by Martyn Hammersley
4- Ethnography: principles in practice - by Martyn Hammersley and Paul Atkinson
5- Critical Ethnography: Methods, Ethics, and Performance - by D. Soyini Madison
6- Doing Sensory Ethnography - by Sarah Pink

No comments

e-business from scratch






Welcome to Week Three

Launching a fully functional e-commerce site is a sizable financial investment in technology, marketing, advertising, inventory, merchant account fees, site-hosting fees, office supplies, labor, etc. Few businesses become profitable immediately, and many failures are due to lack of investment. Startup costs must cover equipment and whatever is required to take an e-commerce site live as well as ongoing expense until the business can meet them. Many businesses budget in the expectation that meeting expenses may take three to six months. Disaster planning and related expenses should also be part of these budgeted funds.

Discuss the role of eCommerce in practical business applications

Identify techniques and tools that can be used to evaluate the driving forces of eCommerce

Assess eCommerce influence on businesses and how it provides a competitive advantage

Join me in the Discussion Board this week as we investigate financing opportunities.





Respond to this week’s discussion questions in 3-4 well researched short paragraphs. Support your view with evidence, explanations and credible references.

Your e-commerce site was successful in its first year of operation; however, you would like additional financing for expansion. You are intrigued by venture capital. Is it usually a good financing source for a small e-business?





Assignment

Assume you are going to start a simple e-business from scratch, using no existing equipment or materials. Briefly describe the business, and then do a rough calculation of startup costs, following the list provided.  Research costs that are realistic for the area in which you live. Be generous in your estimates and avoid cutting corners on any expenses. Include a table embedded in your text (Use Word>Insert>Table) which summarizes your estimates, including a total.

Accounting, consulting, and legal
Advertising, marketing, and public relations
Business plan
Business travel
Communications (including telephone and cellular service)
Computer equipment and software
Feasibility study
Insurance
Interest on loans
Internet service provider (ISP) and web site hosting fees
Inventory
Labor (employees and contractors)
Market study
Merchant account fees
Office furniture, equipment (such as copy and fax machines) and supplies
Order processing/shipping
Phone line (toll-free number, where applicable)
Printing and design for marketing materials, business cards, stationary
Rent and utilities (such as elec, heat, water, and sewer)
Taxes
Web site design and maintenance

Publicly held e-commerce companies (Yahoo.com, for example) must publish financial statements with their annual reports, which are available online. Access a recent annual report for one of these companies and review the balance sheet. List the following: current assets, total assets, current liability, total liability, and owner’s equity. Prove that the balance sheet balances by applying the appropriate equation (found in our text). Do not reproduce the company’s entire financial statements in your paper, just the items identified above as needed to balance the equation.

Response should be no less than two pages, supported with credible references and submitted in an APA format
No comments

Psychopathology and Criminality Individual


Psychopathology and Criminality Individual Project 1



This paper must be completed in a Position Paper format.


You are more than welcome to google if you are not sure of the format.

However, please ensure the APA is the latest format.

Scenario:

You are a member of the training division in a maximum-security prison facility. There are about 8,000 inmates, and another 350 staff members, of which 220 are corrections officers. Because of the recent economic downturn, the number of prisoners incarcerated for property crimes, such as grand thefts and burglaries, has been on the rise. About 3,000 of the 8,000 inmates are violent offenders. Traditionally, the violent offenders establish a structure of control amongst the inmates, and often abuse the property crime offenders who are not used to violence. You have been tasked by the warden and the prison counsel, the mayor, and the city council to provide a method for dealing with an anticipated rise in violence as the demographic of the prison population puts more less experienced inmates in the facility. You must identify types of personnel who you would involve in the evaluation. There will be a number of inmates whose mental health will make them prone to violence and some who will be more likely to be victimized by that violence. An example that may be considered is not to put a minority in a cell block with large numbers of members of white supremacy gangs. Other issues might include identifying persons who have demonstrated leadership through force, and segregating them to prevent them from affecting the population’s mood.

In a 5 page position paper, respond to the following questions based on the scenario:

Describe how corrections officers responding to an incident in the cell block might identify a potentially mentally ill inmate from one that is just acting out.
Explore the mental illness of post-traumatic stress disorder (PTSD), schizophrenia, and bipolar disorder. Given the confines of the cell block, how you would best approach an inmate who is suffering from one of these three conditions?
Explain what you believe should be included in training corrections officers and staff to safely handle mentally ill inmates in a restricted environment (keep in mind: safety first, followed by reasonable empathy).
It is critical that, when you make a statement of fact in your presentation, you cite the reference that you used to obtain the information from. Do this in the text of the paper, and then include the reference in your References page. As always, your paper will be submitted in the current edition of APA format. No abstract is required because this is a short position paper, but a title page, reference page, and appropriate running header with page numbers are necessary.

No comments