Lab B – Computer and Network Discovery

QUESTION

Lab B – Computer and Network Discovery

Lab Goals

  • Use command line tools to discover information about your computer and network.

Lab Purpose

This lab will help to familiarize you with command line tools in Windows and Linux environments to gather information about your computer and network settings.

Lab Instructions

Follow these steps closely and take screenshots when prompted. You will need these screenshots for your lab report.

Prerequisites:

  • A Windows 10/11 system (physical or virtual machine).
  • A Linux machine, such as Ubuntu 22.04 or newer (physical or virtual).

Note:

  • The commands provided below are examples and may vary slightly depending on the specific version of the operating system.
  • Screenshot extensions in the examples described below are .png, but you can also use .jpg or .jpeg.

Part 1 – Windows Command Line Tools

  1. System Information
    1. Open the command prompt (CMD) or PowerShell on your Windows system.
    2. Enter the command: systeminfo
      1. What this does: This command displays detailed information about the computer’s hardware, operating system, and software configuration.
    3. Enter the command: echo “<Your First Name> <Your Last Name>”
    4. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task1.extension (e.g., JohnDoe_LabB_Part1_Task1.png).
  2. Disk Space
    1. Enter the command: wmic logicaldisk get caption, freespace
      1. What this does: This command displays the available free space on each logical disk of your computer.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task2.extension (e.g., JohnDoe_LabB_Part1_Task2.png).
  3. Network Information
    1. Enter the command: ipconfig
      1. What this does: This command displays the IP configuration for all network interfaces on your Windows system.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task3.extension (e.g., JohnDoe_LabB_Part1_Task3.png).
  4. Network Connectivity
    1. Enter the command: ping google.com
      1. What this does: This command sends ICMP Echo Request packets to the specified destination (google.com) to test network connectivity.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task4.extension (e.g., JohnDoe_LabB_Part1_Task4.png).
  5. Tracing Network Routes
    1. Enter the command: tracert google.com
      1. What this does: This command traces the network route taken by packets from your computer to the specified destination (google.com).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task5.extension (e.g., JohnDoe_LabB_Part1_Task5.png).
  6. DNS Lookup
    1. Enter the command: nslookup www.google.com
      1. What this does: This command performs a DNS lookup for the specified hostname (www.google.com) and displays its associated IP address(es).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the command prompt or PowerShell window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part1_Task6.extension (e.g., JohnDoe_LabB_Part1_Task6.png).

Part 2 – Linux Command Line Tools

  1. System Information
    1. Open the terminal on your Ubuntu Linux machine.
    2. Enter the command: uname -a
      1. What this does: This command displays detailed information about the Linux kernel version, architecture, and other system details.
    3. Enter the command: echo “<Your First Name> <Your Last Name>”
    4. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task1.extension (e.g., JohnDoe_LabB_Part2_Task1.png).
  2. CPU Information
    1. Enter the command: lscpu
      1. What this does: This command displays detailed information about the CPU architecture and configuration of your Linux system.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task2.extension (e.g., JohnDoe_LabB_Part2_Task2.png).
  3. Disk Space
    1. Enter the command: df -h
      1. What this does: This command displays the disk usage and available free space on all mounted filesystems in a human-readable format.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task3.extension (e.g., JohnDoe_LabB_Part2_Task3.png).
  4. Network Information
    1. Enter the command: ifconfig
      1. What this does: This command displays the IP configuration for all network interfaces on your Linux system.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task4.extension (e.g., JohnDoe_LabB_Part2_Task4.png).
  5. Network Connectivity
    1. Enter the command: ping google.com
      1. What this does: This command sends ICMP Echo Request packets to the specified destination (google.com) to test network connectivity.
      2. You will notice that it keeps pinging, more than four times like it did on the Windows system. Hit Ctrl+C to stop the ping.
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task5.extension (e.g., JohnDoe_LabB_Part2_Task5.png).
  6. Tracing Network Routes
    1. Enter the command: traceroute google.com
      1. What this does: This command traces the network route taken by packets from your Linux machine to the specified destination (google.com).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task6.extension (e.g., JohnDoe_LabB_Part2_Task6.png).
  7. DNS Lookup
    1. Enter the command: nslookup www.google.com
      1. What this does: This command performs a DNS lookup for the specified hostname (www.google.com) and displays its associated IP address(es).
    2. Enter the command: echo “<Your First Name> <Your Last Name>”
    3. Capture Screenshot:
      1. Take a screenshot of the terminal window showing the executed commands and the resulting outputs.
      2. Save the screenshot with the filename format: YourName_LabB_Part2_Task7.extension (e.g., JohnDoe_LabB_Part2_Task7.png).

Part 3 – Build and Submit Lab Report

  1. Create a lab report in your word processing application (Word, Google Docs, etc.).
    1. Your lab should be organized as follows:
      1. Title page or page heading with your name, course number, assignment name, professor’s name, and date.
      2. Create a section heading for Part 1 and Part 2.
      3. Insert your screenshots from parts 1 and 2 under the corresponding section header. You must put them in sequential order and you must label them above each screenshot. Labeling them means it should look like this:

Title Page

New Page

Part 1

Task 1

<Task 1 screenshot goes here>

Task 2

<Task 2 screenshot goes here>

and so on…

Part 2

Task 1

<Task 1 screenshot goes here>

Task 2

<Task 2 screenshot goes here>

and so on…

  1. Verify that you have inserted all screenshots and have the report formatted correctly.
  2. Submit the completed Word document to this area before the deadline. You may also save/convert it as a PDF before submitting it. This must be submitted as an attachment, not a link.

Lab Complete!

SAM Project 1a Access Module 09 Administering a Database System

QUESTION

Shelly Cashman Access 365/2021 | Module 9: SAM Project 1a

Personal Insurance, Inc.

Administering a Database System

GETTING STARTED

  • Save the file SC_AC365_2021_9a_FirstLastName_1.accdb as SC_AC365_2021_9a_FirstLastName_2.accdb
    • Edit the file name by changing “1” to “2”.
    • If you do not see the .accdb file extension, do not type it. The file extension will be added for you automatically.
  • To complete this Project, you will also need the following files:
    • Support_AC365_2021_9a_ClaimTypes.accdb
  • With the file SC_AC365_2021_9a_FirstLastName_2.accdb open, ensure that your first and last name is displayed as the first record in the _GradingInfoTable table.
    • If the table does not display your name, delete the file and download a new copy.

PROJECT STEPS

  • Personal Insurance, Inc. is a national company that insures homeowners and renters. As a regional manager, you need to understand database administration tasks. Open the database in Backstage View, and then click the View and edit database properties link. When the Properties dialog box displays, create a custom property for the database as described below:
  • With the database still open in Backstage View, click the Options tab. Select the Main Menu Navigation Form as the Display Form for the database as shown in Figure 2. (Hint: The Display Form is sometimes referred to as the startup form.)
    Save the changes to the options. (Hint: When the Access dialog box appears and displays the message, “You must close and reopen the current database for the specified option to take effect”, click the OK button.)
  • Open the ClaimsRep table in Design View, and then create a custom input mask for the ClaimRepNumber field as described below:
    • The ClaimRepNumber field must consist of two letters and two numbers.
    • All letters should display in upper case. (Hint: Enter >LL99 as the input mask.)
    • Save the changes to the table but do not close it.
  • With the ClaimsRep table still open in Design View, modify the ClaimsRepName multiple-field index by completing the following tasks:
    • Open the Indexes dialog box.
    • Change the sort order for the LastName field to Descending.

      Save the changes to the ClaimsRep table and then close it.

  • Open the Customers table in Design View, and then create a single-field index on the LastName field. The index should allow duplicate values. Save the changes to the table design but do not close the table.
  • With the Customers table still open in Design View, create a multiple-field index as described below:
    • Use Location as the name of the index. (Hint: Be careful not to include spaces after the index name.)
    • Use the State field, sorted in Descending order, as the first field in the index.
    • Use the City field, sorted in Ascending order, as the second field in the index.

      Save the changes to the Customers table and then close it.

  • Open the Claims table in Design View, and then open the Property Sheet for the table and make the following updates:
    • Create a validation rule for the table requiring that the Paid field value is always less than or equal to the ClaimAmount field value. (Hint: Enter [Paid]<=[ClaimAmount] as the validation rule.
    • Enter Paid cannot exceed ClaimAmount as the validation text.

      Close the Property Sheet, and then save the changes to the table. (Hint: Because there was a change to data integrity rules, the “existing data may not be valid” warning message will appear. Click No and continue saving the table.)

  • With the Claims table still open in Design View, create a multiple-field index as described below:
    • Use ClaimsInformation as the name of the index. (Hint: Be careful not to include spaces after the index name.)
    • Use the CustomerID field, sorted in Ascending order, as the first field in the index.
    • Use the ClaimID field, sorted in Ascending order, as the second field in the index.

      Save the changes to the Claims table, and then close it.

  • Create a Datasheet form for the Umbrella table, and then save the form using UmbrellaForm as the form name. Close the form.
  • Create a blank form based on the 1 Right application part. (Hint: The blank form will appear in the Navigation Pane as a forms object named SingleOneColumnRightLabels and is saved automatically.)
  • Import a table from an encrypted database by completing the following tasks:
    • Open the encrypted database Support_AC365_2021_9a_ClaimTypes.accdb in Exclusive mode, using the password claims when the Password Required dialog box appears. Enable the content.
    • Decrypt the Support_AC365_2021_9a_ClaimTypes.accdb database. (Hint: You will need to use the password claims again in the Unset Database Password dialog box.) Close the database.
    • Open (or return to) the SC_AC365_2021_9a_FirstLastName_2.accdb database.
    • Import the ClaimTypes table from the database Support_AC365_2021_9a_ClaimTypes.accdb into a new table using ClaimTypes as the table name. (Hint: Ensure that the Tables tab is selected in the Import Objects dialog box.)
    • Do not save the Import steps.
  • Use the Table Analyzer to analyze the Customers table for redundancy. Implement the following options when using the Table Analyzer Wizard:
    • Select the Customers table as the table to analyze, and let the wizard decide what fields go in each table.
    • Rename Table 1 as AltCustomers using the Rename table button as shown in Figure 3.
    • Rename Table 2 as AltRegion using the Rename table button as shown in Figure 3.
    • When the wizard displays the next screen with the question, “do the bold fields uniquely identify each record in the proposed table”, make sure the CustomerID field is the primary key of the AltCustomers table as shown in Figure 3. Then, click the Next button.
    • Ensure that the “No, don’t create the query” radio button is selected, then click Finish to close the Table Analyzer Wizard.
    • When the Table Analyzer Wizard dialog box appears with the message, “The command or action TileHorizontally isn’t available now”, click OK. Close the AltCustomers and AltRegion tables.

      Confirm the Navigation Pane matches Figure 4.

  • Switch to viewing database items by the custom category named “Claims Information” in the Navigation Pane. Add the following two forms to the Claims Information Forms group:
    • Claims Master Form
    • ClaimsRep and Claims Form

      Confirm the Claims Information Forms group matches Figure 5.

  • Add a new group to the Claims Information category as described below:
    • Use Claims Reports as the name for the new group.
    • If necessary, move the Claims Reports group so that it appears between the Claims Information Forms and the Unassigned Objects groups.
    • In the Navigation Pane, add the Basic Claims Report to the new group.

      Confirm the Claims Reports group and item in the Navigation Pane match Figure 5.

Figure 1: Custom Properties Tab in the Properties Dialog Box

Figure 2: Access Options Dialog Box

Figure 3: Table Analyzer Wizard

Figure 4: Navigation Pane with Tables Created in Step 12

Figure 5: Navigation Pane Viewed by Claims Information Category

Save and close any open objects in your database. Compact and repair your database, close it, and then exit Access. Follow the directions on the website to submit your completed project.

Formulas and Functions

QUESTION

Summary

A bike rental company has two metropolitan locations, one at the beach and another centrally located near the city park. It has been operating since 2018, and each location summarizes its revenue quarterly. Both locations rent four types of bikes: cruiser, electric, racing, mountain. Rental revenue is maintained separately for the four types of bikes.

You should complete this assignment using the Excel_Exercises_Template.xls file that accompanies these instructions.

The data for this case resides in the file 2019rentalbikes.txt and can be downloaded by clicking on the Assignments tab, then on the data file name. It is a text file (with the file type .txt).

Do not create your own data. You must use the data provided and only the data provided.

Steps

Take Note

Use Print Preview to review how the first worksheet would print.

Open the Excel Exercises template:

Enter your name in Cell B1 of the DataNotes worksheet.

Set Page Layout Orientation to Landscape.

For Excel Exercise 1, disregard the Field Definitions section of Data Notes.

Follow these steps: 

  1. Create new worksheets: Data, Sorted, and Beach.
    Upon completion, there should be Data Notes as well as the three newly created worksheets.

Delete any other worksheets.

  1. Note: The three new worksheets might not have Arial 10-point as the default type so it may be necessary to change the font and point to Arial 10 for the new worksheets.
  2. If necessary, reorder the four worksheets so they are in the following order: Data Notes, Data, Sorted, Beach.
  3. Take Note

For all data (field names, data text, and data numbers), use Arial 10-point.

The field names should be in the top row of the worksheet with the data directly under it in rows. This action may not be necessary as this is part of the Excel table creation process. The data should begin in Column A.

  1. After clicking on the blank cell A1 (to select it) in the Data worksheet, import the text file 2019rentalbikes.txt into the Data worksheet.

    In Excel 2019/365 this is done via the Data tab, Get & Transform Data: Click “From Text/CSV” and follow the prompts.

    If you are using an earlier version of Excel, you can find additional instructions under Additional Tutorials for Excel 2013/2016, Importing a Text File into Excel (Excel 2016 or earlier). The data should begin in Column A. Row 1 should contain the labels for each column.

    It will be necessary to change Revenue data to Currency format ($ and comma (thousands) separators) with NO decimal points, and to change NumBikes data to number format, with NO decimal points, but with the comma (thousands separator). Note: in the Currency format there is NO space between the $ and the first numeric character that follows the $.

    Though the intent is to import the text file into the Data worksheet, sometimes when text data is imported into a worksheet, a new worksheet is created. If this happens, delete the blank Data worksheet. Then change the name of the new worksheet with the imported data as “Data.”

Take Note

  1. Some adjustment may be necessary to column widths to ensure all field names and all data are readable (not truncated or obscured).

In the Data worksheet:

Create an Excel table with the recently imported data. (Office 2019/365 may have automatically created an Excel table when you imported the data).

  1. Pick a style with the styles group to format the table (choose a style that shows banded rows, i.e., rows that alternate between two colors).

The style should highlight the field names in the first row.

Ensure NO blank cells are part of the specified data range.

Ensure the table has headers.

Ensure that Header Row and Banded Rows are selected in the Table Style Options Group Box, but do NOT select a Total row.

In the Data worksheet:

  1. Select the entire table (data and headers) using a mouse.

Copy the table to the Sorted worksheet.

The upper left-hand corner of the header/data in Sorted should be in cell A1.

Adjust column widths if necessary, to ensure all data and field names are readable.

Make sure that all the format requirements for the Data Worksheet are met in the Sorted Worksheet.

Take Note

Ensure the entire table is selected, NOT just the location column.

All data (field names, data text, and data numbers) should be in Arial 10-point.  

  1. In the Sorted worksheet:

Select all the cells with data in the table (including the header row).

Sort the data by location (ascending).

Adjust column widths if necessary, to ensure all data and field names are readable with no truncation.

Take Note

Ensure all cells with data are selected.

All data (field names, data text, and data numbers) should be in Arial 10-point.  

Follow these steps:

Copy the entire table from the Sorted worksheet to the Beach worksheet. In the Beach worksheet, the field names should be in Row 1 and the Year column should be in Column A.

Some column adjustments may be necessary so that the field names as well as the data are all legible.

Make sure that the same format requirements for the Data Worksheet are met in the Beach Worksheet.

Take Note

Delete the rows from the Excel table, NOT just the data.

In the Beach worksheet:

Delete all the rows in the table where the data is for City Park.

  1. The field names should remain at the top of the table.

The remaining data should be for the Beach location. 

Take Note

Ensure that all cells with data have been selected before sorting. This sort is completed in a single step, not three separate steps.

  1. Note: If the sort does not result in sequential row listing of all bikes of the same class, the ranges will be difficult to create as well as to evaluate.
  2. In the Beach worksheet, using a custom sort:
  3. Sort all the data first by BikeType (Ascending).
  4. Then by Year (Ascending).
  5. Then by Quarter (Ascending).

Take Note

The format of the table must be extended to the new column.

  1. Format the table as follows:

Arial 10-point

  1. data values for AvgRev are Currency Format (using the Format Cells option). A typical AvgRev value could be $123.45, for instance with no space between the $ and the 1
  2. Revenue and NumBikes format from Data Worksheet
  3. In the Beach worksheet:
  4. Add a new column heading AvgRev for the column where the average revenue per bike for each row will be calculated and displayed. This column must be the next column to the right of the NumBikes column, the column heading should be in cell G1.
  5. Add a formula to calculate the AvgRev by dividing the contents of the Revenue cell by the contents of the NumBikes cell for each data row in the table

The AvgRev values format is currency (a $ and two decimal points) with no space between the $ and the first number following it. When you are clicking on cells to construct a formula in cell G2, you may expect to see =E2/F2 and what may appear in the cell editor is =[@Revenue]/[@NumBikes] or =[Revenue]/[NumBikes]. These last two formulas are the result of using an Excel table.

Column adjustment may be needed to ensure both the title and the data are visible.

Health & Medical Question

Question

YOU WILL NEED EXPERIENCE IN EXCEL!

PLEASE READ ALL THE INSTRUCTIONS CAREFULLY AND ANSWER ALL 6 STEPS

EXCEL SHEET / TWO PAGE MANUSCRIPT / ALL 6 STEPS COMPLETED 

We are conducting a environmental scan on fall prevention programs in the Windsor Essex Area, Onterio, Canada.

This is Masters level course, at a Canadian University!

There are various approaches as to why and how to conduct an environmental scan. Although approaches could include creating and utilizing a survey, leading focus groups, or conducting interviews, they do not necessarily fit within the time from of a weekly assignment.

Implemented as part of their environmental scan strategy, Diouf et al. (2016) conducted a structured search on Google and social media platforms such as Facebook and Twitter. Although engaging people on social media platforms would be interesting, it may require more detailed research and ethics board clearance. Therefore, this assignment will focus on Google (or you may suggest an alternative search engine; have it approved in advance). Note: the steps below are very similar to ones you may see for a systematic review for example – Cornell University Library A Guide to Evidence Synthesis: Steps in a Systematic Review, link: https://guides.library.cornell.edu/evidence-synthesis/steps 

Step One:

You will need to decide (as a group) on what you specifically wish to conduct an environmental scan. For example, do you intend to complete a scan on fall prevention programs in general, or do you want to look at something more specific. It is suggested that you approve your scan topic with the instructor, but this is not mandatory.

We are conducting a environmental scan on fall prevention programs in the Windsor Essex Area, Onterio, Canada.

This is Masters level course, at a Canadian University!

Step Two:

Develop your key search terms. Your search strategy may be informed by a list of key terms you would use for your chosen topic, but it may also be informed by asking a group of other individuals (independently) what they would enter into a Google search to gather corresponding information.

For your search strategy, you will also have to determine your search location. For example, if you are searching within Windsor-Essex, you may repeat each of your search terms for Windsor, Belle River, Tecumseh, La Salle, and Essex. Please note, you do not need to stay specifically within Windsor-Essex for this assignment, you may choose, for example, to search for resources in the area of Eindhoven, Holland.

When developing search terms, it is advantageous to first think of the key terms such as falls and assessments. Then you want to think of alternative terms that you could use in a search just as: falling, faller, test, examination, etc. You want to develop a list of different key words and combinations that you can use for your search. In other words, you would not complete just a one-step search of “fall prevention in Windsor, Ontario” – you will want to run multiple searches with a variety of key search terms. It will be important to record the different searches you attempt and include this in your write up. (note, there are ways to search utilizing parameters – or you may want to explore the advanced search options through Google – but the assignment is also to help you experience what an older adult or loved one might experience as they attempt to search and navigate the online world to find community resources). 

Step Three:

Conduct the search(es). Personally, I like to record for each search the number of results in the amount of time (typically in the top left corner area of the google search). I then like to have either an excel of word document where I can copy and paste the links of websites yielded from the search. You will need to independently review each website for continued inclusion in the study. It is recommended that you create a flowchart that indicates the number of searches initially found by the Google search (check out the PRISMA Flow Diagram as a potential example – see http://prisma-statement.org). It is important to determine the eligibility criteria that will be required for a website to be included in a full review. For example, resources may need to involve the older adult (senior) population, fall prevention program, and be within the geographical location. But maybe an exclusion criteria is an individual in a wheelchair (which you would probably want to justify).

Step Four:

Once the website/resource is retrieved, you will need to extract the data. It may be beneficial to develop a Microsoft word table, or excel spreadsheet, to assist with the data extraction. For example, you may develop a data extraction form that includes listing each of the following: website url, name of organization, contact information (phone number, address, office hours), programs offered, target audience, referral, equipment and partner organization, costs, and transportation options. What is the relevant information you want to pull from the website in order to learn about the community resources related to your environmental scan that you decided in step one.

How do you know when you have enough data? The term we use is saturation (discussed during live lecture). 

Step Five:

Determine how you think it would be best to display the data/information gathered as part of this environmental scan. If an older adult was to refer to the product of your environmental scan as an information resource, what may be the best format and display? Knowledge Translation to non-academic audiences is an important consideration. How you display your findings as an information resources will become an appendix for your weekly assignment. You may also wish to add screenshots of your Google search, and the excel document as part of your appendices. 

Step Six:

For the purpose of this weekly assignment, write a two-page brief in the form of a manuscript. This means, your paper should have a title, introduction, methods, results, discussion, recommendations, and conclusion, references (but the references should follow the format of the module and should be extra to the two pages). No abstract is needed, but a title is advisable. As noted above, the results of the scan should be displayed in an appendix, thus, your results section in the briefing may only be a few sentences. As for the recommendations please consider the strengths and gaps found as a result of your environmental scan.

Note: a title page for the individual weekly assignment is not necessary.

Text/Format Specifics: Single spaced typed, Calibri 12-point font, 1 inch margins, page numbers as the bottom centred.

References within text should be numerical in order of appearance, with square [1] brackets. Formatting for references:

[1] Ronholm, E., Pittman, R., Suboni, P., Otte, G., & Coene, W. (2024). Title of article. Journal Name, Vol (issue): Pg-Pg.

[2] Wrigley, T., & Fenway, R. (2024: Pg-Pg). Chapter Title. Book Title. Editors. Location

[3] Heart & Stroke Canada: www.heartandstroke.ca Last visited on: Jan. 8th, 2024

respond to 5 questions from a article.

QUESTION

Article:
Glamour magazine has set off somewhat of an Internet phenomenon with a small photo it ran on page 194 of its September 2009 issue. It’s a nearly nude image of model Lizzi Miller sitting on a bench with a great big smile on her face. As photos go, it’s no more than PG. Certainly other photos in the magazine, either editorial or advertising, showed more skin. So why is this photo garnering so much attention? Ms. Miller has a small belly pooch. Glamour Editor-In-Chief Cindi Leive writes on her blog:It’s a photo that measures all of three by three inches in our September issue, but the letters about it started to flood my inbox literally the day Glamour hit newsstands. (As editor-in-chief, I pay attention to this stuff!) “I am gasping with delight …I love the woman on p 194!” said one…then another, and another, andanotherandanotherandanother. So…who is she? And what on earth is so special about her?Here’s the deal: The picture wasn’t of a celebrity. It wasn’t of a supermodel. It was of a woman sitting in her underwear with a smile on her face and a belly that looks…wait for it…normal.The photo goes with a story by Akiba Solomon on women feeling comfortable in their own skinLinks to an external site.. The photo has no caption, no mention of who the model is, no mention of the fact she wears a size 12/14 and weighs 180 pounds.The response to this small photo it’s not a cover photo, not promoed anywhere in the magazine has been big.There have been at least 770 comments added to Editor Leive’s blog postLinks to an external site. about the photo, not to mention the e-mails. Many of the comments are laudatory. One woman called it “the most amazing photograph I’ve ever seen in any women’s magazine,” while another wrote, “Thank you Lizzi, for showing us your beauty and confidence, and giving woman a chance to hopefully recognize a little of their own also.”Miller loves the reaction she’s had to the photo:“When I was young I really struggled with my body and how it looked because I didn’t understand why my friends were so effortlessly skinny. As I got older I realized that everyone’s body is different and not everyone is skinny naturally–me included! I learned to love my body for how it is, every curve of it. I used to be so self-conscious in a bikini because my stomach wasn’t perfectly defined. But everyone has different body shapes! And it’s not all about the physical! If you walk on the beach in your bikini with confidence and you feel sexy, people will see you that way too.”Not everyone loved the photo and what it stood for, however. One commenter wrote, “I must say I have to agree that the normalization of obesity is a disturbing trend today.”Another commented,“We have enough problems with obesity in the US and don’t need your magazine promoting anymore of it. Shame on Glamour for thinking this was sexy!”More interesting was the criticism of Glamour for using an image like the one of Miller as a publicity stunt:[W]hile I do give Glamour a big thank you for showing us Lizzi at all, it was to create temporary buzz and to give themselves a pat on the back for “doing the right thing” for America’s women and girls, but when it comes down to dollars and cents they aren’t going to change a thing. Not being a cynic here…just a realist. Take care. I wish it could be different too.Student journalist Rebecca Koons, writing in University of Iowa’s Daily Iowan, argues a similar position:The only problem is, this type of positive attitude toward accepting and being oneself is not marketed nearly as much as it should be. We do have publications such as Self that are taking things in a healthier direction — aside from that whole Kelly Clarkson debacle.Links to an external site. One can only hope that Glamour and others will begin to follow suit. While a total upheaval of beauty and fashion may never happen, one can only hope that baby steps like these will only help women find solace in embracing what they were born with.Of course, none of this addresses the issue that Lizzi Miller at size 12/14 is hardly a plus size, though she is considered a plus size model. Even when there were magazines such as Graceand Mode targeted at size 12 women and larger, there were charges that only “skinny” plus-size models need apply.Since the photo and article were published in Glamour, model Lizzie Miller’s career has taken off.  In this interview with journalist Lydia Slater of London’s Daily MailLinks to an external site. Miller says that she initially felt embarrassed when the photo was published because it showed her stretch marks and a tummy roll:“I said to myself: ‘OK, It’s not the best picture, but it’s not a big deal.  And anyway, nobody’s going to see it.’”But more than a year after “the photo” was published, Miller had become a superstar of the modeling world and says she has become much more accepting of her own size.“We need to be celebrating skinny girls, curvy girls, tall girls, short girls, black girls, Asian girls and all nationalities,” Miller said. “I think that would make women feel a lot better about themselves.  We have a long way to go until a girl who’s curvy can be in a magazine without a lot of attention being drawn to her.”Instructions
Please respond to the following questions. Please number your responses and do not re-write the questions. 

  • How did you initially react to this “unconventional” photo of a model showing a belly pooch? Did you think it is unattractive, a great realistic image, or no big deal? Why do you think you have this instinctive reaction?
  • Look at the photo. What makes it different from the typical photo in fashion/beauty/lifestyle magazines for women? 

How does Miller describe her feelings about the photo? What did it do for her career? How did Glamour’s readers react to the story? What do critics of the photo have to say?

What do you think about the photo? Why do you think the photo drew such strong reactions? Is it important for fashion magazines to publish photos of models of different sizes? Will plus sized models find a place in fashion spreads that aren’t devoted to “curvy” models?

Advertising tells women that what’s most important is how they look, and ads surround us with the image of ideal female beauty. However, this flawlessness cannot be achieved. It’s a look that’s been created through airbrushing, cosmetics, and computer retouching. How do you think this trend of ads depicting ideal beauty impact women in society?

Case Study: Facebook’s “Unfriendly” Privacy Policies

QUESTION

Facebook CEO, Marc Zuckerberg,
couldn’t quite believe all the attention he was getting. Facebook was on
the verge of its initial public offering (IPO), and it seemed that the
media couldn’t get enough of this Cinderella story. Zuckerberg had
created a primitive version of the social media application in his
Harvard dorm room. Thanks to its immediate popularity, he commercialized
this product and founded Facebook, a pioneer in social networking.
There were 1.4 billion active users on Facebook and the company’s
revenue exceeded $12 billion. As Zuckerberg traveled around the country
to promote the IPO, the press followed him everywhere. The Facebook IPO
took place on May 18, 2012, making many of its brash and talented
managers instant millionaires by the end of 2014. Since the IPO,
Facebook’s user base has expanded to 2.7 billion. It has also grown by
making strategic acquisitions including WhatsApp and Instagram

Most
people at the social network company welcomed the publicity and
attention surrounding the IPO. But over the years Facebook has attracted
negative publicity and unwelcome attention for its controversial
privacy policies. Facebook has had to deal with several embarrassing
missteps as it struggles to reconcile user privacy with an open network.
The company’s policies have been the object of scrutiny by the
U.S. Federal Trade Commission, which has investigated a number of
privacy-related complaints. Problems arise from Facebook’s business
model: collect voluminous information about the user base so that
advertisers can target Facebook users with more precision.57 This case
reviews some of Facebook’s most contentious privacy policies and
disputes.

Facebook
first caught the attention of privacy advocates in 2007, when it
implemented a technology known as the “News Feed.” This feature was
designed to display in real time changes a person makes to her user
profile on the home pages of all of her online friends. A Facebook user
like Sally no longer had to visit the pages of all her friends to see
updates since those updates were now automatically shared in a stream of
data appearing on Sally’s homepage. To the surprise of the company,
users initially balked at this innovation and Facebook had to abandon
this default feature, but it has now become the “most valuable billboard
on earth.”

In
that same year, Facebook launched an ill-fated venture known as the
Beacon program, a new way to “socially distribute information.” Thanks
to Beacon, advertisers and web merchants could track user purchases
across the internet. A Facebook user’s purchase on a website (such as
Amazon) was disclosed to his or her network of friends as soon as the
purchase was made. This information was conveyed without the user’s
knowledge or consent. The Facebook community protested the online
tracking along with the immediate disclosure of these aspects of their
personal history. As resistance mounted, Facebook abruptly ended the
program.

In
2010, Facebook once again shocked many of its users by suddenly
changing its privacy settings. In its early years, Facebook shared most
profile fields only with friends and friends of friends. But the policy
was modified so that information that was once private such as one’s
profile picture, name, gender, address, professional networks, and so
forth, became publicly available by default to everyone online. As one
observer noted, Facebook changed the defaults to more efficiently
monetize customer information and because the company “appreciated its
power.” Facebook’s decision to make previously confidential information
“publicly available” was reversed thanks to public protest, and users
now have the capability to control access to most of their personal
information.

Despite
these and other problems, Zuckerberg insisted in 2010 that privacy was
no longer a “social norm.” There was an expectation that people wanted
to be more open about their lives and activities. Zuckerberg and other
Facebook executives remained convinced that the social media company’s
innovations were ahead of the convictions of its user base and not in
opposition to them.

In
order to expand its revenues the corporation decided to open its
platform to outside developers. Programmers could build Facebook games,
develop personality tests, or construct other apps. These programs were
offered to users for free in exchange for information. For a few years
the Facebook developer platform hosted several popular games including
Farmville and Candy Crush. Facebook customers agreed to give these game
developers access to their data in exchange for playing these games.
However, there were no protections for the reuse of these data collected
by the developers. Algorithms were extracting items such as users’
messages and photographs. One game developer used Facebook data to
construct unauthorized profiles of children on its own website. Facebook
had allowed for the sharing of its customer data without a system to
prevent any abuses.

In
2009, Facebook introduced a remarkable innovation which it called the
“Like” button. The famous plug-in was a matter of internal debate among
Facebook executives for some time. But they gradually realized that this
simple button could “transform the platform from a book into a blizzard
of mirrors.” The more things a user liked, the more she revealed about
herself, her preferences, interests, and aspirations. Facebook now knew
what their users “liked” along with their friends and relationships.
This data gold mine allowed advertisers to target those Facebook users
with even greater precision.

Facebook’s
tracking of its users across the internet had begun in 2010 with the
help of the Like button. At first, Facebook denied that it was tracking
users as they surfed the web. But by 2014 internet tracking was an
established corporate policy and part of the contract between Facebook
and its users. Facebook collects data on its users’ internet browsing
even when they are no longer logged into their Facebook accounts. This
happens by means of a small piece of technology known as the “datr”
cookie that Facebook deposits in each user’s web browser (once they log
on to Facebook.com). The datr cookie informs Facebook whenever that
browser visits a website with an active social plug-in, such as the
“like” button. This tracking of website activities and purchases allows
Facebook to build a more detailed profile of their users as the basis
for more personal ads. Users are informed of the tracking (in the dense
terms-of-service agreement), but they do not have the option to opt out
of this practice, which has riled European authorities. They claim that
Facebook has unfairly leveraged its power to collect data on the
activities of Facebook users on those third-party sites that use tools
such as the “like” button.

It
remains to be seen whether Facebook can successfully fend off
regulators in Europe and the United States and live up to the
expectations of its investors, who expect the company to continue
leveraging the commercial value of the information it collects. Facebook
became a social media behemoth by collecting user data when there were
few privacy restrictions. There are now stricter laws in Europe, and if
similar laws minimizing data collection are enacted in other countries,
Facebook may be able to crush would be competitors who want to challenge
Facebook using the same business model that made Zuckerberg’s company
so successful.

Questions:

What
is your opinion Facebook not being transparent about the like button
function to be used as a data collection tool with your information
without your consent? What are your thoughts about the Facebook invading
your privacy and using your information for marketing purposes? Is this
ethical? Should the US overment intervene more like EU has done? Why?
Why not?

Develop an External Factors Analysis Summary (EFAS) for your selected

QUESTION

There should be 5 strategic factors for Opportunities and 5 strategic factors for Threats.

What are external factors?

External factors are those the firm has NO control over. I will be doing reality checks when reading your work, asking, “Does the firm control this activity or not?” For instance, a firm has control over the price it chooses to charge, but they don’t have control over whether or not that price is acceptable to the ultimate consumer.

What do you have to do?

Fill in the table in TemplateSA-EXH 1-EFAS.docx available in this location and Course Resources. The table has five columns: External Factors, Weight, Rating, Weighted Score, and Comments.

Use short names for the factors, but flesh them out in the comments so they make sense when you approach them later on.

The textbook is clear enough to work on all columns but the Comments. Your comments make all the difference in the quality of the EFAS.

Use the template for Exhibit 1 – EFAS

Use the Template EFAS as the template for your work. Ensure that your format displays correctly and is readable.  Do NOT copy from the text or from the Template EFAS text!  Use your own critical analysis and critical thinking.  The template is provided to assist you with the layout–i.e., make it easy for you to construct the chart.  The template also gives you a good idea of the appropriate explanations required in the Comments blocks about the why an SF, potential quantified impact, how weighted, and how rated.

Comments Column

Comments are expected to be 4-5 sentences in length and depth and offer a clear explanation of the strategic factor (SF) in 4 aspects:

  • Why it is a strategic factor (SF); (1-2 sentences only)
  • A quantified estimate of the potential impact (QPI) of the SF; (1 sentence only)
  • How you assign the weight; (1 sentence only) and
  • How you assign the rating. (1 sentence only)

Keep the 4-5 sentences of your Comments in order for clarity and ease of understanding.  The recommended order is:  Why SF comments; QPI comments; Weight comments; and finally Rating comments.

How to write the Why SF and QPI comments: For the Why SF, explain WHY you selected this SF, WHY it is important to your firm, and WHAT is the potential impact on the firm in the future.

For the QPI comments, estimate the potential impact on the firm in the future in a quantitative manner using some metric:  sales, revenues, costs, market share, profits, logistics pipeline, CSI, etc.  Express the quantitative potential impact (QPI) in Dollars $$.  If you express the potential impact in $$, that makes each strategic factor comparable against the other strategic factors. And expressing the impact in sales makes them even more easily comparable.   Make sure you are making significant estimates based on the size of your company based on annual revenue values in your 5-Y financials. You develop this estimate.

The monetary value of the QPI is useful to compare the strategic factors and rank them in relevance.  Ranking them will help you to assign the Weights (2nd column in the table) to each strategic factor. Use a positive analysis (quantitative) rather than a normative analysis (feelings, desires).  Focus on what is the potential gain for your SF opportunities or the potential loss from an SF threat in the future.  History lessons are not needed nor applicable.  You should estimate and predict the impact in the future. Be creative. 

Don’t develop future actions or alternatives here in the EFAS about how a firm may, or should take action on a particular SF.  The brainstorming development of those alternative actions comes with the TOWS Analysis that we will start presenting in Module 4.

HINT:  To focus your thinking on addressing “why” you selected each SF and “why it is important,” start your “why select/important” sentence with words like this:  “I selected this SF because…..” or “This SF is important because…”  By using this lead-in phrase you should be able to concisely state why that particular SF is important.

HINT:  To focus your thinking on addressing the quantitative potential impact (QPI) in the future of each SF, be sure your QPI sentence contains words like this:  “potential impact of $____” or “potential increases to ____ are $____ per year” or “reduction in sales by $____ per year.”  Be sure to state the potential impact in dollars so you can compare the potential impacts of your various SF.

How to write the Weight and Rank comments: To assign weights, explain the importance of the SF to the firm’s future survival.  Is the SF of vital importance or low importance on a scale of 1 to 0?  What is the impact of the SF on the future survival of the firm?  What SF has the biggest impact?  Which one(s) are the Big Dogs?  Make a logical explanation of why the weight you have assigned is what it is.  Comparison and ranking between SF is a useful technique to assign the weight.  See your potential $$$ impacts from your “Why” analysis above. The bigger the $$$ impact is, the bigger the weight should be.  Remember the weight column adds to 1.0.

HINT:  To focus your thinking on addressing the importance of the SF to the firm’s future survival, be sure to include the keyword “survival” in your weight sentence.

To assign ratings, provide an explanation of how well, or how badly, the firm is handling each specific external SF RIGHT NOW not in the future or not in the distant past but right now. Use the scale of 1 5, poor to outstanding; comparing the firm’s performance against the industry standard rating of 3.  Give a logical explanation of why the rating you have assigned is what it is.  Do they handle it well or are they lost?  Are they performing in average way as other competitors are? Remember the industry average performance is rated at 3.

HINT:  To focus your thinking on addressing how well your firm is handling each SF, understand what the 1-5 scale means and then use your rating number from the rating column with matching words (low, average, above average, high, etc) in your rating sentence.

Example of a good comments block:

SF – International Growth Opportunities in SE Asia, Japan, and Korea

This SF was selected because of its very significant potential impact on profit growth.  Successful expansion into overseas markets could potentially result in doubling the size of OPC to a firm with $800M in sales per year and an increase in profits from $50M to $100M per year.  This SF is weighted highest at .25 since expanding internationally is vital to the future survival of OPC in light of worldwide competitors and markets.  I rated this low at 2.5 since OPC does not have any international experience or markets at this time.

Women clincial d3

Question

Melissa

During one of my clinical experiences as a nurse practitioner, a female client presented with signs and symptoms of Bacterial Vaginosis. The client was hesitant when I first mentioned the diagnosis. Calmly, I tried to talk to her about it. I discussed all the available treatment options to gain her consent. In addition, I established a rapport and created a conducive environment for the client to open up to me and discuss her sexual history (McCuistion et al., 2021). While she explained, I actively listened, making a client-centered and holistic approach essential to nursing care. To clear her doubts, I referred her for differential tests that included candidiasis and trichomoniasis vaginalis. She was satisfied at the end of her visit because I could develop a tailored care plan for her and engaged her in a health promotion strategy.

Challenges and Successes

A significant challenge was navigating the trauma associated with reproductive health diseases. Initially, the client was not willing to open up about her sexual history, which made it challenging for me to tailor a care plan. Due to the stigma associated with these diseases, healthcare providers should ensure that they provide a nonjudgemental and supportive environment characterized by active listening skills and affirmation of clients to develop trust. A notable success was the rapport we finally built that enabled me to tailor a care plan and educate the client about BV and how to handle it.

Assessment

Signs and Symptoms (S&S)

According to the patient, she was experiencing a greyish vaginal discharge, fish smell, and itching. On examination, whiff test odor and a PH higher than 4.5 were present (Kairy & Garg, 2023).

Differential Tests

Differential Diagnosis: Bacterial Vaginosis

Rationale: The symptoms presented concur with Amsel’s odor, discharge, and high PH (more than 4.5), which indicates bacterial vaginosis (Kairys & Garg, 2023).

Differential Diagnosis: Vulvovaginal Candidiasis

Rationale: Vulvovaginal candidiasis is characterized by a cottage cheese discharge with high Ph but lacks fish odor. Also, upon examination, microscopic yeast would further differentiate it (Jeanmonod et al., 2023).

Differential Diagnosis: Trichomoniasis

Rationale: Like the two diseases mentioned above, trichomoniasis presents with high ph, vaginal discharge but lacks the fish odor. Upon examination, motile trichomonads are present (Schumann & Plasner, 2023).

Plan of Care

Metronidazole, an antibiotic that has shown effectiveness against pathogenic bacteria for Bacterial Vaginosis, is prescribed to remove the patient’s distressing symptoms like fishy odor and abnormal discharge (Coudray & Madhivanan, 2020). Furthermore, eliminating the infection with such focused therapy helps in restoring balance in vaginal microbiota, thus significantly helping to eliminate Bacterial Vaginosis and ensure its prevention.

Health Promotion Intervention

I insisted on condom use and having one sexual partner to minimize the risks of developing other infections, such as chlamydia and gonorrhea (Kairy & Garg, 2023). Also, the approach will reduce pregnancy complications that BV might cause. Besides, I advised the client to maintain optimal vaginal microbiome by using probiotics.

Clinical Learning

The clinical experience underscored the importance of reproductive health education among patients. Also, it reinforced the significance of destigmatizing these illnesses. Accurate diagnosis and treatment were made possible by clinical guidelines such as those from the World Health Organization (WHO) and the Center for Disease Control and Prevention (CDC).

Plan of Care and Research Guideline

CDC approves metronidazole as a first-line pharmacological treatment for BV (Coudray & Madhivanan, 2020). In addition, insistence on health promotion strategies concurs with global health organizations’ mandates that advocate for and advance reproductive health among women
Yulemis

This week’s clinical gave me the chance to evaluate, diagnose, and manage the patients with diverse health ailments or issues. I had a patient who was 44 years old and of African American descent with a uterine fibroid history. In this case, the major challenge posed by the patient was her worry and fear over how fibroid would affect her fertility and quality of life. As reported by Angioni, D’Alterio & Daniilidis (2021), fibroids may block the fallopian tubes and disrupt gamete transport that leads to infertility; thus, creating alarming fears in the patient’s mind. My success in this interaction was based on true collaboration through the teamwork of other health care providers, patients, and family to provide patient-centered and comprehensive education.

The patient had a long and heavy menstrual flow during the last four days. She reported chronic pain in the pelvic area which was especially painful during sex and menstruation. In this visit, the patient admitted to experiencing shortness of breath in addition to generalized weakness and tiredness. These symptoms could be attributed to her long and heavy menorrhagia, suggesting a potential iron-deficiency anemia that necessitated a workup and treatment (Mansour, Hofmann, & Gemzell-Danielsson, 2021). Apart from the uterine fibroids, the medical history of the patient was notable for pulmonary emboli and deep venous thrombosis. Both her social history and family history were not contributory.

Upon initial evaluation, the patient appeared appropriately dressed, with signs of fatigue and distress. Her vital signs include a BP of 122/78mmHg, Pulse of 98/min, RR of 20/min, Temp of 98.6oF, BMI of 28.4, and pain of 5/10. Palpitation of the lower abdomen revealed enlarged uterus with irregular contours, and pelvic exam revealed palpable masses that were indicative of the presence of fibroids within the uterus (Ahmad et al., 2023). Consequently, we consulted Gynecology and a diagnosis of multiple large fibroids was made after a transvaginal ultrasound exam. The core differential diagnoses that were considered included adenomyosis and endometrial polyps.

Based on the presumptive diagnosis of multiple large fibroids, a hysterectomy was recommended. However, the patient’s hemoglobin level of 3.8 g/dL during this visit was too low for surgery. Consequently, the physician started the patient on Lupron to help with the cessation of hemorrhage from uterine fibroids. She was started on iron sucrose 200mg intravenously daily and given darbepoetin alpha 25mcg intravenously every week. This treatment plan was based on the recommendations by Angioni, D’Alterio & Daniilidis (2021) that uterine fibroids is treated with medications that target hormones controlling the menstrual cycle. The medications target such symptoms as pelvic pressure and heavy menstrual bleeding, and work to shrink fibroids and not get rid of them.

In conclusion, the clinical experience for this week provided another opportunity to assess, diagnose, and manage patients presenting with different health conditions and problems, including uterine fibroids. In the case of the 44-year-old patient, the health promotion intervention that was addressed entailed education about lifestyle alterations, an iron-rich healthy diet, and supplementary regular exercise and stress management to improve the patient’s general wellness during recovery. The clinical experience confirmed the importance of patient education, shared decision-making, and a holistic approach to women’s health care. It emphasized that constant research and knowledge of the current guidelines in obstetrics and gynecology were needed to provide client-centered care.

Unit 2 Responses

QUESTION – QUESTION

Unit 2 – Discussion Board

Accounting for Managers(ACG510-2401B-02)

TM

Tammie Merkel

INSTRUCTOR

Jami, thanks for posting. You are correct in that one person having all the controls would be considered weak internal controls and an auditor will definitely bring this issue up. 

Response: Arneisia Mccutcheon

Hello Jami,

Your post was very informative & provided a lot of information about this week’s topic. I actually was able to view the topic from a whole different perspective due to the specifications that you have provided. I totally agree when you stated, one person having control over the duties of accepting cash payments, making deposits and bank reconciliation makes for a very weak internal control system. Often times there has been a better success rate when you are able to provide an actual paper trail of events, this will help identify protection.

Response: Jacquelyn Evans

Greetings everyone – 

An internal control review is a critical process within organizations. This is process is designed to assess the effectiveness and efficiency of internal controls to help safeguard assets, ensure accuracy of financial reporting and compliance with regulations.

In the context of the cashier’s office, where cash transactions are frequent and significant, a robust internal control structure is imperative to mitigate risks, potential errors, fraud and misappropriation of funds.

One approach is to incorporate checks and balances with the segregation of duties to prevent a individual from having total control over all aspects of a transaction. For instance each employee would have distinct roles, such as cashier, cash reconciler, supervisor and auditor.

The cashier is responsible for processing cash transactions, receiving payments and issuing receipts. 

The cash reconciler would verify the accuracy of daily cash receipts against transactions recoded in the system, reconcile discrepancies and prepare the bank deposit.

The supervisor’s function is to oversees the activities of the cashier and reconciler, ensure adherence to policies and procedures and provide approvals for exceptions and or adjustments.

The auditor would conduct periodic reviews of the internal controls, perform spot checks on transactions and investigate any anomalies or irregularities. 

By segregating the duties, the organization can reduce the risk of errors and fraud, enhance accountability and strengthen the overall control environment (Smith & Jones, 2020)

Reference:

Smith, A., & Jones, B. (2020). Strengthening Internal Controls: The Role of Segregation of Duties. Journal of Accounting and Finance, 15(2), 45-62.

Response: Sahanna Stubblefield

Hello class, 

Internal control is a process. It is intended to prevent errors, irregularities and identity problems. When dealing with internal control, it is vital to ensure that corrective action is taken. Internal control is expected to provide only reasonable, not absolute, assurance to and entity’s management and board. 

One way to handle internal control in a work place is to assign different duties and tasks to employees, but to also ensure that everyone can preform each and every task needed. For instance, if two employees are on the clock as a cashier and cook, one should be able to work the register, take orders, payments and make sure the customers get exactly what they ordered. As the cook, it is both the cashier and cooks responsibly to make sure orders are done in a timely manner at the customers request.  Team work is necessary, but it is a requirement to perform or have internal control in every work place. If both employees are signed in on a register, it is important to be signed in under your name with your correct information to avoid any problems or issues. If the register is short and both employees were signed in, both employees could be held accountable. 

 Unit 2 – Discussion Board

Employment Law(MGT555-2401B-02)

Response: Ernest Jackson

Interpret the Legality of the Questions That the Office Manager Asked Marsha

According to Marsha’s case, the questions asked by the manager were illegal. For instance, the manager inquired about how many kids she had and how old they were. The manager asked whether she was planning to have more children and what her husband did for a living. All the above questions asked by the manager were inappropriate and personal, and they did not determine whether Marsha would qualify to be a receptionist. Interviewers must ask legal questions about applicants’ qualifications for a specific job. Henceforth, asking personal questions is illegal, and applicants such as Marsha are not obliged to answer them.
Provide Examples and Discuss the Types of Questions That Are Legal to Ask During Interviews
Interviewers can ask various legal questions during interviews. For example, what skills do you have to be the best candidate for this position? Why would you want to work for this company? Are you a team player? What are your educational qualifications? Tell me about yourself.  Where do you see yourself in five years? Why did you leave your previous position? What are your expectations in terms of allowances and salary? Are you ready to travel if you are required to? Are you prepared to work overtime?
 These are some of the legal questions that can be asked during an interview and mainly focus on an applicant’s qualifications. Consequently, such questions will let the interviewer know the best applicant to offer the position. In addition, according to Roulin et al. (2019), offering interviewers training is essential. It would enable them to ask appropriate, vital interview questions, eliminating bias and promoting organizational diversity. Altogether, questions asked during job interviews are crucial because they allow companies to acquire top-notch employees, leading to a company’s growth and success.

Reference
Roulin, N., Bourdage, J. S., & Wingate, T. G. (2019). Who is conducting “better” employment interviews? Antecedents of structured interview components use. Personnel Assessment and Decisions, 5(1), 2.

Response: Andrea Graham

The questions the officer manager asked Marsha about children, age of the children, and if she planned on having more children was not only unethical, but illegal. The question violates the Title VII Civil Rights of 1964, which created the Equal Employment Opportunity Commission, (EEOC).  According to the EEOC, it is illegal to ask the number of children you have, the age of your children of if ou have future child bearing plan or employment of a spouse(“Pre-employment”, n.d., para. 4).

It was also illegal to ask what her husband did for a living. Asking this question has nothing to do with Marsha’s ability to perform the job at hand. This question could possibly lead to a discrimination lawsuit.

In my opinion, here are some legal questions that the office manager could or should of asked:

Questions about work:

“Can you work overtime?”

“Is there any reason you can’t start work at 8?”

Questions about attendance/availability

“Are there any activities or commitments that may prevent you from meeting the attendance requirements?”

Reference:

U.S. Equal Employment Opportunity Commission (EEOC).(n.d.). Pre-employment injuries and marital status or number of children

ENG130 Post University Unit 2 Literature and Composition

QUESTION

  • unit 2 Overview

    Unit 2 Overview
    An open book with scenery on over the pages that lines up with the background of a lake and mountains with a person in the center. A place belongs forever to whoever claims it hardest, remembers it most obsessively, wrenches it from itself, shapes it, renders it, loves it so radically that he remakes it in his own image.”
    ~ Joan Didion

    Setting as a literary device is often mistaken for the place in which a story transpires. However, setting can be so much more. When an author ponders about setting, he/she also needs to consider the time, place, and era in which the story is set, the mood and atmosphere of the surroundings, and the weather conditions the characters will have to battle. What would the story of The Titanic be if the waters were not remote and icy? Would the battle of the sexes in Pride and Prejudice be as relevant in the 1990s, and would the desperateness of The Martian have any impact if not on a remote and isolated planet?

    All of these things must be considered when analyzing the setting in any piece of literature. Pay close attention to all of these aspects of setting when reading during this unit. This form of active reading will certainly help in your response writing.

    Objectives:
    • Identify ethical considerations for the use of AI-generated content.
    • Analyze how setting affects a story’s characters and events.
    Activities:
    • Read, view, and engage with Readings and Resources.
    • Actively participate in the Unit 2 Discussion.
    • Complete and submit the Unit 2 Assignment – The Impact of Setting on Narrative and Reader Experience.
  • Item

    Readings and Resources

    Readings and Resources

    Topic One: Setting as a Literary Device

    Even though we are all reading the same texts, our views and experiences can be poignantly varied because of our own experiences. Think about what your experiences bring to these stories and poems as you read them. Enjoy!Kirszner, L. G., & Mandell, S. R. (2024). Portable literature: Reading, reacting, writing (10th ed.). Cengage Learning US.

    • Chapter 11: “The Secret Lion” by Alberto Alvaro Rios
      • pages 222-226
    • Chapter 26: “Theme for English B” by Langston Hughes
      • page 726
    • Chapter 26: “Bucharest” by Harriet Levin Millan
      • page 731
    • Chapter 32: Fences by August Wilson
      • pages 1221-1234
      • Read Cultural Context, Setting, The Play, and Act 1 Scene 1

    This interactive course was created to assist you in your mastery of setting.

    Topic Two: Academic Integrity: Plagiarism, Citations, and Generative Artificial Intelligence

    Plagiarism has likely been reviewed in each of your courses up until now. A good portion of plagiarism occurs because the writer does not understand the parameters and formatting of quotes, paraphrases, and researched information. Further, Artificial Intelligence Modeling Software can be an excellent research tool if you understand how to use it properly and its limitations. You should have begun the course by reading the announcement that discusses plagiarism. Please also be sure to read the University Policy on Academic Integrity linked in this course’s left-hand menu under University Policies. Post University created this interactive presentation to give you insights into using Generative AI in your coursework and how to utilize it best.

    Topic Three: Critical Thinking

    Critical Thinking skills build confidence and enable you to efficiently gather knowledge, quickly process information, and intelligently analyze data.

    How can evidence be presented for maximum effectiveness in arguments? Simply laying it all out is not always enough, but hiding parts of it is not the answer, either. This program begins by illustrating the meaning and significance of evidence and the presentation of evidence in numbers, percentages, rates, and over time. An argument against zoos then allows viewers to evaluate how evidence is used to support the arguments.

    Supplemental Resources:

    To achieve a deeper understanding of the literary device of setting.
    The article offers tips and advice to authors on establishing a setting in a literary narrative. The author reflects on the disorienting impact of the Internet and social media on society. Topics discussed include finding a key detail in order to evoke further details, appealing to many senses, and establishing the relationship between character and setting.

    The setting of children’s books has probably been given less prominence than their plots or characters, yet, as Rosie Webb Joel shows in this thought-provoking essay, setting can be crucial in influencing children’s responses and understanding of what they read.

    This article offers tips and advice to authors on the development of setting in literary works. The author reflects on traveling to the locations in the story, traveling as a means to develop plot, and basing a fictional location on an actual site. Other topics include describing sensory details within action sequences, checking references for accuracy, and research on the Internet.

  • Discussion Board

    Unit 2 DB: AI Generated Content – Unraveling the Ethical Dilemma

    Unit 2 DB: AI Generated Content – Unraveling the Ethical DilemmaIn academia and various professional fields, the concept of AI-Generated Content has sparked debates about the boundaries of originality and intellectual integrity. For this discussion, let us delve into the complexities of AI-generated Content and creative expression.

    • What are the main ethical challenges posed by AI-generated content?
    • Consider issues related to plagiarism, copyright infringement, and ownership of the generated works when providing your response.

    In response to your peers: discuss whether or not you feel AI-generated content may devalue human creativity and artistic expression. Why or why not? This is just a Discussion Broad assignment.