Mketing 100

You will now complete your secondary market research and consider what distinguishes your company from your competitors, their products, and / or the price of their products and services. The key word in Unique Selling Proposition (USP) is “unique.” There are very few products or services that are truly one of a kind. In order to target the demographic for your company, you need to pinpoint what...
Read More

Bus -599 Business plan draft

CLASS: Strategic Management   BOOK: Successful business plan: Secrets & Strategies, 6th edition Rhonda, Abrams What’s needed: executive summary + business plan table of contents=5 pages Please list all references. Cover page is not needed. Financials worksheet and business plan draft are attached as separate files. Please include: graphics, maps, tables, flow charts, appendix, diagrams. If copied, Please paste as “ picture “ Income statement and cash flow are attached. It has valuable information and graphs to be used.   This project consists of developing a business plan. I am attaching reference material such as a non-alcoholic company portfolio (NAB) as an example, chapter book pages, videos, template, instructor insight, I am also attaching the entire business plan draft for reference in creating the executive summary and table of contents.   Project Overview This course brings together concepts and learning from other courses you have taken, and you culminate your graduate degree journey with a final project: a Business Plan. With the focus on the creation of major sections of a successful Business Plan, you...
Read More

A new type of third-party-reimbursement healthcare payment plan is emerging in the United States.

A new type of third-party-reimbursement healthcare payment plan is emerging in the United States. CDHPs strive to control costs and improve quality of care by requiring consumers to take control of their own healthcare decisions. Consumers decide how they want to spend their healthcare dollars, depending on what is important to them. CDHPs are geared to encourage participants to enroll in some type of wellness program and improve their lifestyles. Specific types of CDHPs are health reimbursement accounts (HRA), flexible spending accounts (FSA), and health savings accounts (HSA). However, there are concerns about CDHPs. The consumer may neither understand nor have the education and the tools to manage his or her own healthcare appropriately. This may have long-term ramifications on the whole healthcare system and whether CDHPs can be successful for the consumer, the employer, the physician, and the healthcare facilities, as well as the insurers. Answer the following questions in regard to this development: Summarize the history of when,...
Read More

Develop diagnoses for clients receiving psychotherapy* Evaluate the efficacy of therapeutic approaches for clients*

Develop diagnoses for clients receiving psychotherapy* Evaluate the efficacy of therapeutic approaches for clients* Analyze legal and ethical implications of counseling clients with psychiatric disorders* * The Assignment related to this Learning Objective is introduced this week and submitted in Week 7. Select a client whom you observed or counseled that suffers from a disorder related to trauma. Then, address the following in your Practicum Journal: Describe the client (without violating HIPAA regulations) and identify any pertinent history or medical information, including prescribed medications. Using the DSM-5, explain and justify your diagnosis for this client. Explain whether any of the therapeutic approaches in this week’s Learning Resources would be effective with this client. Include expected outcomes based on these therapeutic approaches. Support your approach with evidence-based literature. Explain any legal and/or ethical implications related to counseling this client. ...
Read More

 Why is the waterfall model of software engineering the most commonly used method for development of trusted systems?

Note: There is no minimum or maximum page length for your answer sheet. Answer questions with well thought out answers, explain your answer, and show your work. Answers, even if right but without an explanation (Also- must include references for each problem-APA Style), will get no credit. Test is open book/notes/internet, but individual, NOT TO BE SHARED.  There is no limitation in terms of space for each answer as the content is more important than the quantity. Save the file as a word file, and post it in the Grade Book before the deadline. Do keep the questions/instructions in this word file with your answers. Answer the following questions.1)(10 pts.) Chapter 18 (pgs. 494-495) –Problem#4 Requirements are often difficult to derive, especially when the environments in which the system will function, and the specific tasks it will perform, are unknown. Explain the problems that this causes during development of assurance. 2) (10 pts.) Chapter 18 (pgs. 494-495) –Problem#5  Why is the waterfall model of software engineering the...
Read More

From what founding documents and principles of U.S. government has American health care law evolved?

Chapter 2 Review Questions 1. From what founding documents and principles of U.S. government has American health care law evolved? 2. Briefly describe the role of the judicial branch and how it relates to the work of the legislative branch. 3. What is the composition of the executive branch? What are two of its historic health-related priorities? 4. How does the Federal Trade Commission protect American health care? 5. What does the regulation of nanotechnology have in common with regulation by the FDA? Chapter 3 Review Questions 6. Are public health programs more susceptible to health care fraud than private health care programs? Why or why not? 7. What must the government show to convict providers for violations of the anti-kickback law? 8. Describe the possible sanctions for violations of the False Claims Act. 9. Compliance programs are spreading consistency and transparency in compliance practices throughout the health industry in spite of potential drawbacks. What are some of these potential drawbacks? 10. What...
Read More

Suggest a change in the strategy chosen by the colleague to increase your colleague’s company’s domestic market share.

Suggest a change in the strategy chosen by the colleague to increase your colleague’s company’s domestic market share. Explain why you think your suggestion would improve the anticipated outcomes or effectiveness of the strategy. · Suggest a change in the strategy chosen by the colleague to increase your colleague’s company’s international market share. Explain why you think your suggestion would improve the anticipated outcomes or effectiveness of the strategy. General Guidance: Your original post, due by Day 3, will typically be 3–4 paragraphs in length as a general expectation/estimate. Your responses, due by Day 5, will typically be 1–2 paragraphs. Refer to the rubric for the Week 1 Discussion for grading elements and criteria. Your Instructor will use the rubric to assess your work. POST1 The company that I have selected to describe is my own, Zola’s Glory. Zola’s Glory is an organic cosmetic company that is owned and operated by my business partner and me. We are currently an online retail company with...
Read More

Select an organization you wish to explore.When you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester,

Select an organization you wish to explore.When you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Select an organization you wish to explore. When you make your selection, keep in mind that you will explore the following roles in the organization: Cyber Security Threat Analyst, Penetration Tester, Cyber Security Engineer, Risk Management Analyst, and Software Engineer. You need sufficient knowledge of the organization you select to complete these security assignments. A Cyber Security Threat Analyst conducts analysis, digital forensics, and targeting to identify, monitor, assess, and counter cyber-attack threats against information systems, critical infrastructure, and cyber-related interests. Take on the role of a Cyber Security Threat Analyst for the organization you select. Use the Threats, Attacks, and Vulnerability Assessment Template to create a 3- to 4-page Assessment Document. Research and include the following: -Tangible assets: -Include an assessment scope. The scope must include virtualization, cloud, database, network, mobile, and information system. -Asset descriptions: -Include a...
Read More

Interview a social worker and give a written report.

Project Paper Assignment Paper must be 4-5 pages with references. Interview a social worker and give a written report. In the paper, address each of the following areas and support your ideas with evidence from course reading resources and additional research. Details are given below. I have already done the interview and I have provided the questions and responses. Please include interview responses and references provided into a 4-5 page paper. Also please include references into paper with each given outline and the importance of practice in the social work field. Overall in the conclusion how it has helped me view the social work field and what I learned from the interview. If there are any additional questions please let me know. Thank you! Interviewed name of social worker: Name of agency:   1. Tell me about yourself I've been in the field for over 21 years and I'm originally from New York and worked for a few years and then opened...
Read More

Prepare 3 Long-Term Objectives that you believe will provide a competitive advantage for hilton.

Step 1: Prepare 3 Long-Term Objectives that you believe will provide a competitive advantage for hilton. Be sure to write in SMART form! Step 2: Using the information from your IFE and EFE prepare a SWOT Matrix. Note for this step only use 3 S's, W's, O's, & T's. It follows, then, that you will have to re-weight them so that the Internal Factors (Strengths and Weaknesses) total 1.0 and the External Factors (Opportunities and Threats) total 1.0! Step 3: Describe 2 strategies you have come up with for each category: SO, ST, WO, WT Step 4: Choose 4 Strategies from the eight you have listed in Step 3 and evaluate them using a QSPM. Please fill out all of your answers in the EXCEL file. Exam 2 HM490 Su20.xlsxPreview the document here is the zoom link to this exam https://psu.zoom.us/rec/play/75x5f-r5qT43GIeV4gSDV_AsW468Lq-s0Ccd_6UKyk68ViVSN1ukMLVEN-PPJmQF_J51gkRWuLAUvK_8 ...
Read More