+1 (909) 375-5650
4982 Parkway Street, Los Angeles, CA 90017
support@smartwritingservice.com
800-888

design two surveys

You will design two surveys (one focused on customers and one focused on employees) that will answer the question posed in the Key Assignment. Be sure that the surveys are structured correctly and written to maximize data collection. You will complete 6 surveys, 3 from the perspective of the customers and 3 from the perspective of the employees. This data will provide the information for the analysis you will do later, so be as deliberate and thoughtful as you can when completing the surveys (think like a customer and then like an employee).

Use the following information to help you formulate the questions you will ask in your survey. You may add additional questions if you would like, but at a minimum, you must use the survey questions provided below for the customers and employees.

For customers:
Gender
Age
Frequency of shopping at the store (you name it)
Past purchases of the product (you name it)
Purchases of the product in the last month
Perceptions of why product sales have decreased
What would encourage the costumer to begin purchasing the product again?
For store employees:
Gender
Age
Length of employment
Perceptions of why the product sales have decreased
Recommendations of what the company can do to increase sales
The answers from each population need to reflect some variability and should be clearly written from the two differing perspectives.

” The Bluest Eye” by Toni Morrison

You would have needed to read the book ” The Bluest Eye” by Toni Morrison

Directions:

Choose 2 of the following prompts to answer for

Writing Quiz #3.
1. To what extent is Cholly to blame for his violence against his family? Which other people or circumstances may also be to blame? What is the novel’s position on blame?

.
2.Who is Maureen Peal? What does she represent in the novel?

.
3. What is the significance of the mother-daughter relationship between Pecola and her mother, Pauline (Polly)?

Requirements:
• 250 words each; Be sure to include evidence (quotes from the novel) to support your ideas.

.
• Avoid outside sources. Do not use online sources to create discussion posts. When you submit your post it will be submitted to SafeAssign, which determines whether the entry is plagiarized or not.

.
• First-person (“I,” “me”) and second person pronouns (“you,” “your”).

.
• Using “I think,” “I feel,” “I believe,” and “In my opinion” because these statements prove nothing.

.
• Using the author’s first name. (For instance, instead of Frederick, use Douglass.)

.
• Carefully proofread.

.

French Expressionists

1. Select one of the French Expressionists and describe his / her major work commenting on the work’s subject, theme, style, use of color, and emotional impact on the viewer.
Explain which factors influenced the French Expressionists and highlight their philosophy toward life.

2. Explain how social influences have an impact on many artists and their works. Use examples from movements and examples explored in the chapters up to this point.
Explain how current events have been influencing art in such areas as movies and music. Use examples to illustrate your views.

3. Give your opinion on which graphical representation of a project schedule (e.g., Gantt or PERT) is ideal for presenting the project schedule to a company executive with no project management background, and also discuss the need of shortening project schedules. Based on what you’ve been experiencing in class so far, support your decision based on your comfort with each.

4. Suppose you were asked to prepare a cost estimate for a project to purchase laptops for all faculty and staff at your college or university. How would you start? How long would it take you to prepare a good estimate? What type of estimate would you prepare, and what approach would you use to develop a cost estimate? Why do you think it’s necessary to understand some of the basic cost terms in project management?

Capture and Intrusion Detection

Now that you have gathered all the data for your report, it is time to organize it. Conclude the report and organize your report in sections. The following is a suggestion, but use what is best for the FBI chief and the FS-ISAC representative:

Event: the types of information attacks you have been tasked to examine.
Target and Profile: Here, you will describe FS-ISAC and the bank institution.
Overview of Network Architecture: Explain in a few paragraphs what other tools and techniques you may use to detect this signature. Provide enough detail so that a campus network administrator could follow your explanation to deploy your system in production.
Network Traffic Monitoring and Results
Recommended Remediation Strategies
The report should be an eight- to 10-page double-spaced Word document i with citations in APA format. The page count does not include figures, diagrams, tables or citations.

Submit your report in the assignment folder. You are now ready for the final step, the Joint Net Defense Bulletin.
In the overview, you will describe the various data transmission components. Select the links below to review them:

User Datagram Protocol (UDP)
Transmission Control Protocol/Internet Protocol (TCP/IP)
Internet packets
IP address schemes
well-known ports and applications
You will also address the meanings and relevance of information, such as the sender or source that transmits a message, the encoder used to code messages, the medium or channel that carries the message, the decoding mechanisms that were used, and the receiver or destination of the messages.

Your overview will describe the intrusion detection (IDS) and intrusion prevention (IPS) systems used and the firewalls that have been established. Make sure to link the operating systems and the software and hardware components in the network, firewall, and IDS that make up the network defense implementation of the banks’ networks. Identify how the banks are using firewalls and how they are using IDSs, and identify the difference between these technologies. Include the network infrastructure information and the IP address schemes, which will involve the IP addressing assignment model, and the public and private addressing and address allocations. Identify potential risks in setting up the IP addressing scheme. Here are some resources for you to review:

intrusion detection & prevention (IDS/IPS) systems
firewalls
Identify any well-known ports and applications that are being used and the risk associated with those being identified, and possibly targeted. This portion can be made up of fictitious information, or you can use information from research, citing your source using APA format.
Second part of paper
The last step in the project is to create the Joint Net Defense Bulletin. Compile the information you have gathered, taking care to eliminate any information that could identify the bank, and create an educational public service announcement document for the bank consortium. Provide this PSA also to the FBI Chief and the FS-ISAC representative.

The bulletin should be a one- to two-page double-spaced Word document.

Federal Contracting

Answer the following questions in paragraph format. Please make sure you provide detail answers.
1. How can government contracts help small business?

2. Compare methods to secure government contracts. Explain what methods should be used in what cases.

3. Why does government supports small businesses seeking to pursue government business?

4. Compare the standards procurement methods used in federal acquisition.

5. What are the consequences of the “commercial item” definition?

6. How can prime contractor protect his business when working with subcontractor? How can subcontractor develop business when working with a prime contractor? Is it possible to find the balance of interests?

7. Compare commercial proposal budgets with government programs one.

8. How do government contracts ensure ethics are being upheld?

Sexual assault

Topic: Sexual assault is more likely to be perpetrated by someone known to the victim rather than a stranger

BRIEF OUTLINE
Your final paper should be the cumulative result of the efforts made throughout the semester to design a research project. Use the prior assignments and feedback to develop your final paper. Your Final Paper should be 8-12 pages long, and it should include all of the following elements:
1. Title page –
2. Abstract
• 150-200 words,
• highlight the importance of the topic,
• state research question(s) and proposed methodology
3. Introduction Section
• define the problem
• pose your research question
4. Literature Review Section –
• Review previous studies that speak to the question at hand
• identify strengths and weaknesses
5. Hypothetical Methods Section –
• Discuss your population/sampling techniques
• Discuss how you plan on measuring your IV and DV
6. Conclusion Section
• Why this research would be useful
• How might this research affect policy or practice in the field of criminology/criminal justice

Your paper should contain at least 10 citations from high quality external sources. A high quality source is one coming from peer-reviewed journal articles, scholarly books, and governmental records or reports.

infant daycare

Discuss the benefits and consequences of infant daycare. This should be at least a 2 page (3 at most), double spaced paper (in APA format). You must use at least 2 outside research articles/sources to support your discussion.

Items to discuss:

1. What are the benefits of infant daycare? Are there benefits? Look at what current research says.

2. What could be some negative consequences of infant daycare? Are there any? Look at what current research says.

3. In addition, you may incorporate personal experiences, or ones of friends/family.