assignment marketing 3 – The Nursing Hub

Instructions – PLEASE READ THEM CAREFULLY

The Assignment must be submitted on Blackboard (WORD format only) via allocated folder.
Assignments submitted through email will not be accepted.
Students are advised to make their work clear and well presented, marks may be reduced for poor presentation. This includes filling your information on the cover page.
Students must mention question number clearly in their answer.
Late submission will NOT be accepted.
Avoid plagiarism, the work should be in your own words, copying from students or other resources without proper referencing will result in ZERO marks. No exceptions.
All answered must be typed using Times New Roman (size 12, double-spaced) font. No pictures containing text will be accepted and will be considered plagiarism).
Submissions without this cover page will NOT be accepted.

Assignment Question(s):
Weightage:05 marks
Learning Outcomes:

Analyze marketing opportunities using environmental scanning market data, measurement, and analysis.
Explain issues pertaining to marketing environment both internally and externally.
Demonstrate an understanding of the global competitive environment and the changing marketing practices.
Ability to formulate marketing strategies that incorporate psychological and sociological factors that influence consumers.
Ability to carry out objective and scientific analysis of consumers’ needs and wants.

Assignment-1
CRITICAL WRITING

From the real national market, select any company of your choice, wishing to go global. Critically analyze the chosen company based on the following questions.

Questions:

What variables need to be considered while developing a list of potential countries?
Describe the four steps a firm should take when it is considering going global.
Discuss at least three challenges that a company may face in the early period of expansion.
Describe the three main categories of market entry strategies.

Instructions for the students

This assignment is an individual assignment.
Justify your answers, with the help of course materials, Text Book, Online resources. (See the course materials of Ch-5)i will send to you the ch after add me
The choice of the company and the selection of countries must be based on referenced information. (Why did you select the country and the company?)
All students are encouraged to use their own words.
Referencing is necessary and student must apply APA Referencing Style.
Submit your Answers using the same format.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

 

“Are you looking for this answer? We can Help click Order Now”


psychological tests related to intelligence

  

There are numerous Internet sites that offer psychological tests related to intelligence, personality, and general compatibility. Please address the following in your forum with a minimum of 400 words. 1.  Explain the value of standards and ethics in the testing process. 2.  Using the APA Ethics Code, identify and discuss three Guidelines that relate to any aspect of using online testing in practice. For example, how might Informed Consent or Confidentiality be relevant to using these tests? How would Multiple Relationships be relevant to the testing process?

 

“Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code “Newclient”

The post psychological tests related to intelligence appeared first on Psychology Homework.

 

“Are you looking for this answer? We can Help click Order Now”


Designing a Secure Network/ CIS534

This term paper involves putting together the various concepts learned throughout this course. You are tasked with designing the most secure network possible, keeping in mind your goal of supporting three (3) IT services: email, file transfer (centralized), and VPN. Your first step is to design a single network capable of supporting there three (3) different services. Once you have fully designed your network, you will need to provide three (3) workflow diagrams explaining how your designed network handles the three (3) different transactions. The first is an internal user sending an email using his / her corporate email address to a user on the Yahoo domain with an arbitrary address of [email protected] The second workflow diagram should show a user initiating an FTP session from inside your network to the arbitrary site of ftp.netneering.com. The third workflow is an externally located employee initiating a VPN session to corporate in order to access files on the Windows desktop computer, DT-Corp534-HellenS, at work. 

Write a ten to fifteen (10-15) page paper in which you complete the following three (3) Parts. Note: Please use the following page breakdown to complete your assignment:

  • Overall network diagram: One (1) page
  • Datapath diagrams: Three (3) pages (one for each diagram)
  • Write-up: six to ten (6-10) pages

Part 1

  • Using Microsoft Visio or its open source alternative, create a diagram showing the overall network you’ve designed from the user or endpoint device to the Internet cloud, and everything in between, in which you:
    • Follow the access, core, distribution layer model.
    • Include at a minimum:
      • Authentication server (i.e. Microsoft Active Directory)
      • Routers
      • Switches (and / or hubs)
      • Local users
      • Remote users
      • Workstations
      • Files share (i.e. CIFS)
      • Mail server
      • Web servers (both internal and external)
      • Firewalls
      • Internet cloud
      • Web proxy
      • Email proxy
      • FTP server (for internal-to-external transport)
  • Explain each network device’s function and your specific configuration of each networking device.
  • Design and label the bandwidth availability or capacity for each wired connection.

Part 2

  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user sends email to a Yahoo recipient. Local (corporate) user having email address [email protected] sends an email to [email protected]
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Local user, Jonny Hill, transfers file using ftp through the Internet to another company’s site (ftp.netneering.com). He has to access the secure shell using his active directory credentials to authenticate to the ftp server (linux running Redhat) on the DMZ. He needs to transfer files from his desktop across the Internet to ftp.netneering.com.
      • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
      • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
      • Show user authentication when necessary.
  • Using Microsoft Visio or its open source alternative, create a Datapath Diagram for the following scenario:
    • Remote user, Hellen Stover, connects via VPN from home through the Internet to her corporate desktop, DT-Corp534-HellenS. Hellen uses a browser to initiate her VPN connection. By browsing tohttps://VPNaccess.corp534.com, she arrives at a login page where she needs to authenticate using her Active Directory credentials before the VPN tunnel is built.
  • Document and label the diagram showing protocols and path of the data flow as data traverses through your network from source to destination. 
  • Include path lines with arrows showing directions and layer 1, 2, 3, 4, 5, 6, and 7 (OSI) protocols that are used for each flow. 
  • Show user authentication when necessary.
  • Explain how your overall design protects the organization from both inside and outside attacks. Give examples. 
  • Explain how your layered design compensates for possible device failures or breaches in network security.
  • Determine whether any possible bottlenecks exist in your design.
  • Explain how to make the file transfer process more secure.

Part 3 

  • Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in Visio or an equivalent such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

The specific course learning outcomes associated with this assignment are:

  • Explain the essentials of Transmission Control Protocol / Internet Protocol (TCP / IP) behavior and applications used in IP networking.
  • Identify network security tools and discuss techniques for network protection
  • Describe the foundational concepts of VPNs.
  • Design a secure network to address a business problem.
  • Use technology and information resources to research issues in network security design.
  • Write clearly and concisely about Advanced Network Security Design topics using proper writing mechanics and technical style conventions.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post Designing a Secure Network/ CIS534 appeared first on Topnursingtutors.com.

 

“Are you looking for this answer? We can Help click Order Now”


【海外正規品】 BUFFALO バッファローHD-QHA12U3 R5 外付けHDD ブラック 据え置き型 12TB -psychologyhomework.com

機能項目本体サイズ(幅×高さ×奥行)mm177×127.5×227本体重量5500gケーブル長100cm容量12TB最大記憶容量12TB対応OSWindows0 S 10 8.1/7 Server 2016/2012R2/2012/2008R2/2008 Mac10.11?10.13付属品USB3.1(Gen1)ケーブル(A to B )、ACアダプター、取扱説明書、保証書仕様1RoHS基準値準拠仕様2最大消費電力90W仕様3動作環境温度5〜35℃湿度20〜80%※結露なきこと

 

“Are you looking for this answer? We can Help click Order Now”