Outline one (1) job interview process, and document the methods that you must use to select the right person for available positions

Due Week 3 and worth 200 points

Imagine that you are the Director of the HR Department at your current organization or an organization with which you are familiar. You are responsible for delegating duties to your team for the selection, development, and management of both the new and current employees. You must ensure that your organization is diverse and follows all employment laws.

(Note: You may create and / or make all necessary assumptions needed for the completion of these assignments. In your original work, you may use aspects of existing processes from either your current or a former place of employment. However, you must remove any and all identifying information that would enable someone to discern the organization[s] that you have used.)

Write a three to four (3-4) page paper in which you: 1.Outline one (1) job interview process, and document the methods that you must use to select the right person for available positions. Determine two (2) employment laws that you must consider in the process in question, and examine the key ramifications of the organization’s lack of enforcement of said laws. 2.Suppose your same organization decides on an unconventional workforce comprised primarily of independent contractors and temporary workers. Predict three (3) issues that you may encounter in building relationships with each type of worker. Next, examine two (2) laws that you must follow during the relationship building process, and specify the manner in which each law would help in the relationship building process. 3.Evaluate the effectiveness of the organization’s HR policies and processes that are designed to promote a diverse workforce. Next, outline one (1) strategy for the organization that recognizes affirmative action. Include a plan to mitigate both the glass ceiling effect and reverse discrimination within your organization. Support your response with at least two (2) examples that illustrate the major benefits of the plan to the organization. 4.Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not qualify as academic resources.

Your assignment must follow these formatting requirements: •Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: •Determine employment laws that apply to the selection, development, and management of employees. •Evaluate policies and processes that promote a diverse workforce. •Use technology and information resources to research issues in employment law. •Write clearly and concisely about employment law using proper writing mechanic.

Identify the common roles in a human resource project.

Due Week 4 and worth 240 points

Read the case titled: “Project Leadership Roles at TriHealth” found in Chapter 3. This assignment is about developing a specific project team for TriHealth.

Write a six to eight (6-8) page paper in which you: 1.Identify the common roles in a human resource project. Then, analyze these roles to typical human resource functions. 2.Reorganize any two 2 roles at TriHealth that result in shared responsibilities and then state why you chose those two roles. 3.Suggest the short-term and long-term effects on the company with roles being shared among employees. 4.Analyze the need for an additional role. Then, propose a new role and its proposed impact. 5.Use at least four 4 quality academic peer-reviewed resources in this assignment.

Your assignment must: •Be typed, double spaced, using Times New Roman font size 12, with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: •Assess organizational strategies that contribute to effective project management of human resources. •Use technology and information resources to research issues in managing human resource projects. •Write clearly and concisely about managing human resource projects using proper writing mechanics

Analyze the current uses of HTTP and HTTPS, and predict the future outlook for both protocols

an you please answer the follow questions with a response of at least one and a half paragraphs for each of the 4 following questions? • Analyze the current uses of HTTP and HTTPS, and predict the future outlook for both protocols. Describe any foreseen changes in the frequency or way each protocol is used. • Identify the various uses for HTTP and HTTPS, and justify the use of one over the other. Include two examples to demonstrate the use of each protocol. • Provide three examples of inelastic traffic not discussed in the text and validate their inclusion as inelastic. • Analyze the characteristics of elastic traffic to determine why this is used on the Internet.

Suggest a way to improve the way LLC and MAC are used for LAN operation

Can you please review the attached document and answer each of the bulletined questions with at least a paragraph and a half each? Please reach out to me if you have any questions. I have just posted the questions below… since my document shows pending update for the attachment.

Routing and Switching Selection Criteria. Please respond to the following: • Compare and contrast distance-vector and link state routing, and analyze the limitations that would prevent the usage of each. • Choose the method best suited for designing a new routing protocol for a LAN architecture. Justify your decision.

Transmission Medium. Please respond to the following: • Suggest a way to improve the way LLC and MAC are used for LAN operation. • Evaluate guided and unguided transmission medium to determine which you would use to design a new facility.

Ethernet Options. Please respond to the following: • Compare the advantages of ATM and Gigabit Ethernet technologies as high-speed networking solutions. Describe how to migrate from Fast Ethernet to Gigabit Ethernet, and to 10-Gbps Ethernet. • Compare and contrast the advantages of Fast Ethernet, Gigabit Ethernet, and 10-Gbps Ethernet.

Wireless LAN. Please respond to the following: • Analyze the characteristics of wireless LANs and assess the security concerns of this technology in organizations such as universities or hospitals. Identify additional areas of concern for organizations that implement a wireless LAN. Then, explain whether the implementation of a WAN would solve these problems. Explain your rationale. • Rank the following IEEE 802.11 standard addresses in order of importance with the first one being the most important. Justify the reason for your chosen order. o Association o Re-association o Disassociation o Authentication

Circuit Packet Switching and VPNs. Please respond to the following: • From the e-Activity listed below*, analyze at least one major advantage of private networks and the impact it creates for a communication technology organization. Be sure to provide your source either as an article or URL. • From the e-Activity, compare three VPN services available to organizations to determine the primary differences among each. Discuss the pros and cons of each VPN service and suggest the type of organization that would best fit each network provider.

*E-Activity- Research the Internet for an article, publication, or other electronic document written in the last 12 months that discusses the advantages of private networks and the leading VPN services available to organizations.

ATM and Frame Relay. Please respond to the following: • Compare the advantages and disadvantages of ATM to those of frame relay. Recommend the superior technology and explain your rationale. • Suppose you are in charge of selecting ATM or frame relay as a WAN alternative for your technological needs of a communication technology organization. Choose one of the WAN alternatives and justify your decision.

Research Study Proposal–Part II: Literature Review and Research Questions

Research Study Proposal–Part II: Literature Review and Research Questions PLEASE READ THE ATTACHED!!!!! PART 1 is needed for this question…. Resource: Ch. 3 of Introduction to Health Research Methods (Jacobsen, K.H. (2017). Introduction to health research methods: A practical guide (2nd ed.). Sudbury, MA: Jones & Bartlett.) Create a research question related to your problem statement and then conduct a literature review. Conduct background reading on your topic. Select at least five research articles related to your problem statement. Create a 1,050- to 1,500-word summary of the articles that best support your research question. Introduction and conclusion. Be sure to: 1) Discuss components of a research study. 2) Determine validity of study. 3) Discuss strengths and weaknesses. 4) Determine future research needs. Resource: Ch. 3 of Introduction to Health Research Methods (Jacobsen, K.H. (2017). Introduction to health research methods: A practical guide (2nd ed.). Sudbury, MA: Jones & Bartlett.) Cite your sources according to APA format. References and plagiarism free.

Identify an interesting problem or issue that affects a community that you are a part of and that merits your taking a stand

Prompt: The Productive Counterargument is your chance to engage in civic deliberation that is mutually productive and creative and influence your readers to understand your position on an issue. Identify an interesting problem or issue that affects a community that you are a part of and that merits your taking a stand. Next, research the positions others have taken on the issue, and identify one published position that differs from your own. Finally, demonstrate why you disagree with that position and put forth your own argument. Do more than just respond to an already existing position, advance a position of your own. To accomplish this, decide (1) what points you are responding to that need to be refuted and (2) where you need to present your own new arguments and information to give a fuller picture of the issue to your audience. Your goal is to actively listen to other positions, civilly engage with a larger conversation, and create understanding and new insights that build community. Process: For brainstorming, think about a local issue that is debatable. You are more likely to make a strong, insightful, and fresh argument about issues affecting your hometown, university, or academic organization than about national or global issues like hunger, gun control, or the drinking age. After you have explored various positions about this topic, select one existing argument with which you disagree. This argument provides your exigence: respond directly to it. As part of your proposal, provide a copy (or link) of the existing argument you would like to refute. Explain your exigence and purpose for addressing this topic, and identify an audience you can address, with your common ground. As you are drafting, consider the character of your audience—friendly? hostile? mixed?—and how best to address them. How might you establish common ground and build consensus with the opposition, even as you refute and rebut to distinguish your own position? Consider what persuasive arguments, examples, reasoning, and rhetorical appeals will best achieve your purpose and avoid fallacies. To support your position, you should have sufficient evidence (from credible sources) that is properly integrated, cited, and developed through your own reasoning. As you revise and edit, consider tone. The 1-page cover letter should explain your rhetorical decision-making, and specifically for this paper, it should include: (1) an explanation of your rhetorical purpose, its relation to the issue and your audience, and (2) several examples of rhetorical choices you made to achieve your purpose with an analysis of the outcome. Format: Your final draft should be 4-5 pages (double-spaced, TNR font, 1” margins).  Grading Criteria: Your essay should (1) define a debatable issue clearly; (2) address and influence a specific audience; (3) identify, summarize, and engage with an existing position; (4) respond to an existing argument with a convincing, rhetorically effective counterargument; (5) support your claims with examples, details, and reasoning; (6) use research that is credible, appropriate, and properly cited following MLA guidelines; (7) demonstrate the potential to influence your audience toward your purpose; and (8) explain and defend these rhetorical choices in a cover letter.

How does “ideology” shape meaning in our lives, according to Mumby?

Reaction Paper 6 Instructions

Professor Dennis Mumby is a critical scholar of organizational and business communication. What arguments in his article reveal the fact that he is a scholar who believes and uses the “critical paradigm”? What does Dr. Mumby say are the primary functions or purposes of communication; what does communication do? How does “ideology” shape meaning in our lives, according to Mumby?

In the second paragraph of your reaction paper, please identify at least one ideology that you, personally, believe. Even if you don’t agree with Mumby’s perspective, first please explain what the ideology is that shapes your life in an important way. Second, explain specifically how it creates or “constitutes” meaning in your life. You can use one example to illustrate this point. Third, explain how that ideology can be or sometimes is a form of “domination” in how you see and relate to the world.

Readings

Mumby, “Ideology and the Social Construction of Meaning.” DownloadPreview the documentView in a new window

General Reaction Paper Instructions Every week, we will post an opportunity for you to write a “reaction paper” that is connected to the assigned readings for that week. To fulfill this assignment, you must complete at least five reaction papers.

Each reaction paper must be single-spaced, 12pt. Times New Roman font with 1” margins on the tops and sides. Each paper must run a complete page and contain two paragraphs. The first paragraph should summarize the major claims of the article(s) you read. The second paragraph must relate the content of the article to a real-world experience. Each paper is worth 3.75% of the total class grade. You should submit the reaction papers in paper at the beginning of the class period on which that paper is due.

A certificate authority provides what benefits to a user?

Part 1: Multiple Choice Questions. Note Unless specified otherwise all multiple choice questions have only one correct answer. Each question is worth 4 points.

General questions

1. Which of the following are not directly addressed when implementing network security? (Choose two.)

A) Personal safety B) Freedom of information initiatives C) Evolving business requirements D) Protection of data E) Physical plant security

2. Select from the following the best definition of security risk analysis:

A) Risk analysis looks at the probability that a vulnerability exists in your system. B) Risk analysis looks at the probability that your security measures won’t stop a hacker breaking in to your system. C) Risk analysis determines what resources you need to protect and quantifies the costs of not protecting them. D) Risk analysis looks at the probability that a hacker may break in to your system. E) Risk analysis looks at the consequences of being connected to the Internet.

3. Which of the following is considered the first line of defense against human behavior?

A) Policies B) Cryptography C) Physical security D) Business continuity planning

4. Which of the following is considered a flaw, loophole, oversight, or error that makes the organization susceptible to attack or damage?

A) Risk B) Vulnerability C) Exposure D) Threat

Cryptography Fundamentals. Public-Key Cryptography and Message Authentication 5. The two methods of encrypting data are A) Substitution and transposition B) Block and stream C) Symmetric and asymmetric D) DES and AES

6. The only cipher system said to be unbreakable by brute force is A) AES B) DES C) One-time pad D) Triple DES

7. When a user needs to provide message integrity, what options may be the best? A) Send a digital signature of the message to the recipient B) Encrypt the message with a symmetric algorithm and send it C) Create a checksum, append it to the message, encrypt the message, then send it to the recipient D) Encrypt the message with a private key so the recipient can decrypt with the corresponding public key

Key Distribution and User Authentication 8. Consider the following protocol that involves both RSA public-key operations and DES. Suppose that A has an RSA private key prv(A) and an RSA public key pub(A). Suppose that B has an RSA private key prv(B) and an RSA public key pub(B). Assume both A and B knows each other’s public key. A wants to send B some message M. A selects random DES key K and send B the following two messages: — Epub(B)( K, Sigprv(A)(K)) — EK(M) “E” means encryption and “Sig” means digital signature. Which of the following statement(s) is true? (Choose two.) (A) Only B can decipher the contents of the message M. (B) B is certain that the message M is from A. (C) B can prove to a third party that the message M arrived from A. (D) B cannot decipher the contents of the message M. (E) B is not certain that the message M is from A. 9. Suppose a user is authenticated based on an ID and password that are supplied by the transmitter in plaintext. Does it make any difference if the password and ID are encrypted? (A) If the system authenticates users based on IDs and passwords that are transmitted in plaintext, the system is very insecure. (B) If the password and ID are encrypted, the system is definitely more secure than in the plaintext case. (C) The intruder can still record the encrypted ID and the corresponding encrypted password. By replaying these, the intruder can gain access to the system. (D) None of the above is correct.

10. You have an issue in your company with users claiming they did not receive e-mail messages, while other users claim they were sent. What PKI component will help you to prove the dates and times of messages sent on the network?

A) Non-Repudiation B) Encryption C) Encapsulation D) Integrity E) Confidentiality

11. A certificate authority provides what benefits to a user? A) Protection of public keys of all users B) History of symmetric keys C) Proof of nonrepudiation of origin D) Validation that a public key is associated with a particular user

Network Vulnerabilities, Attacks and Countermeasures 12. All of the following are types of cyber attack, except:

A) A nuclear explosion that knocks out all electronic devices. B) Spam. C) Malicious software designed to interrupt services. D) A flood of computers hacked to disrupt other computers.

13. If you notice that the number of existing half-open sessions is beginning to rise, what could this indicate? (Select all that apply)

A) Answers B) Man in the Middle attack C) Serial Scan D) IP Spoofing E) Port Scan F) DoS attack

14. DoS attacks exist for which part of the OSI protocol stack?

A) Application and Presentation B) Session and Transport C) Network and Data Link D) All of the above

15. Consider using DHCP. What are the major security concerns? Indicate the two best answers from the following list.

A) The network is vulnerable to man-in-the-middle attacks. B) Anyone hooking up to the network can automatically receive a network address. C) Clients might be redirected to an incorrect DNS address. D) There are no security concerns with using DHCP

[Delete everything above this prior to submission]

Name:_____________________________________________________ First Last

INFA 620 MIDTERM

Please put your answers in the following table.

Multiple Choice Questions Answer 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15

Part 2: Short Answers. Please answer briefly and completely.

1. Consider a public key encryption. Ann wants to send Bill a message. Let Annpriv and Annpub be Ann’s private and public keys respectively. The same for Bill (Billpriv and Billpub).

(a) If Ann sends a message to Bill, what encryption should Ann use so that only Bill can decrypt the message (secrecy)? (4 points)

(b) Can Ann encrypt the message so that anyone who receives the message is assured that the message only came from Ann (authenticity)? (4 points)

(c) Is it possible for Ann to devise a method that will allow for both secrecy and authenticity for her message? Please justify your answer. (4 points) 2. Alan and Bill agree (through a public exchange) on using the Diffie-Hellman algorithm to create a common secret key. They also agree on two public numbers: q (large prime number), a (generator mod q): q = 7, a = 2

Alan generates a random CA =6, use CA to calculate DA and then sends DA to Bill. Alan has also received a value DB from Bill.

Bill generates a random CB =7, use CB to calculate DB and then sends DB to Alan. Bill has also received the value DA sent from Alan as mentioned above.

(a) What is DA? (i.e. DA =?) (4 points) (b) What is DB? (i.e. DB =?) (4 points) (c) What is the common secret key between Alan and Bill? (4 points) (Note you must show calculation procedures to obtain full points for each question)

3. Consider the following hashing algorithm. A binary block of length M is divided into subblocks of length 128 bits, and the last block is padded with zeros to a length of 128. The hash consists of the XOR of the resulting 128-bit vectors. Is this algorithm appropriate for encryption? Explain. (16 points)

Write a blog about a Dispositional, Biological and Evolutionary Theorist

Write a blog about a Dispositional, Biological and Evolutionary Theorist. Choose a theorist you find interesting from Week 4’s readings (Allport, McCrae/Costa, Eysenck or Buss). You could even use your blog to debunk a theorist’s concepts. Do some research and find three concepts your theorist proposed and/or controversies about your theorist. Write three blog posts. Because blogs are often someone’s opinion, I give you permission to use first person pronouns and state your opinion about the theorist you are writing about. Work on making your blog interesting. Below I included some links to articles about writing a blog. You do not to worry about actually publishing your blog online. You do need to support your opinions with reliable and valid sources. Don’t hesitate to ask questions if anything I have said isn’t clear. Also, don’t miss that requirement to include a link to an outside website, article or book for every blog. It’s worth 1.25 point for every blog entry. Include a minimum of two to three sources. Format your blog consistent with APA guidelines regarding citing sources.

I did not set a word count requirement, but please include more than just a couple of sentences for each blog. AND don’t miss including links to an outside website, article or book for every blog. In addition, please make sure you cite sources for all information you use.

Draft ofoutline + presentation + partner Emails Ascientific6bus

Please go through the chapter Try to improve the out line it is all a bout our ability to make the class participate and discuss the subject Also the third part of the presentation will be discussing the classmate comment and question they put on 4 Articles me and partner George post them Earlier . Please review the out line add the activity and new ideas and YouTube links but any thing you add do it in red color so when you post it back to me i will know that the red is mine in the out line , you can say Sharif or George will present as my partner do in the end of each outline idea o add Ideas and impoundment to the out line find YouTube links related to the presentation , some activity we use through the presentation like multiple choice question to ask the classmates after they answer we provide , presentation is 4 hours so it needs activity YouTube with explanation why we picked it question and the Articles Keynote

1 2 3 20