Mkt 455

 Read the following brief article on the 7R’s of Relationship Marketing:

https://smallbusiness.chron.com/seven-rs-marketing-mix-64543.html

Please answer the following questions:

  1. Briefly define each of the 7 R’s using any Internet references of your choosing;
  2. In your opinion, and supported by 1-2 Internet references, should marketers use the 4P’s of marketing in selling a product, the 7R’s of Relationship Marketing or both of them together (4P’s and 7R’s)?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Legal Principles

Please describe how you can incorporate your newfound knowledge about at least two legal principles to your workplace.

500 words with APA format.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussions and Practical Connection

Discussion :

  Given  the readings and assignments in the course, identify and briefly  discuss two important concepts from this course that are applicable to  your degree.    ***Standard for all discussion posts:   Please make your initial post and two response posts substantive. A substantive post will do at least two of the following:    

  • Ask an interesting, thoughtful question pertaining to the topic 
  • Answer a question (in detail) posted by another student or the instructor 
  • Provide extensive additional information on the topic 
  • Explain, define, or analyze the topic in detail 
  • Share an applicable personal experience 
  • Provide  an outside source (for example, an article from the UC Library) that  applies to the topic, along with additional information about the topic  or the source (please cite properly in APA 7) 
  • Make an argument concerning the topic 

At  least one scholarly source should be used in the initial discussion  thread. Be sure to use information from your readings and other sources  from the UC Library. Use proper citations and references in your post.  

Practical Connection :

Provide a reflection of at least 500 words (or 2 pages double spaced)  of how the knowledge, skills, or theories of this course have been  applied, or could be applied, in a practical manner to your current work  environment. If you are not currently working, share times when you  have or could observe these theories and knowledge could be applied to  an employment opportunity in your field of study.    
 

   Requirements:    

  • Provide a 500 word (or 2 pages double spaced) minimum reflection.
  • Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.
  • Share a personal connection that identifies specific knowledge and theories from this course.
  • Demonstrate a connection to your current work environment. If you  are not employed, demonstrate a connection to your desired work  environment.
  • You should not provide an overview of the assignments assigned in  the course. The assignment asks that you reflect how the knowledge and  skills obtained through meeting course objectives were applied or could  be applied in the workplace.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

DB 7 CIS312

No apa format , 1 page 

Your friends John and Pam discussed with you having plans to safeguard their restaurant’s data and equipment.  They know that the fire department, health and building inspectors have specific requirements for food, employee, and customer safety.  However, there is no inspector for technology.  They have asked you to explain the following:

  • What advice on password safety would you suggest?
  • What other elements of POS security should be pointed out?
  • What other securities, access, and recovery issues need to be analyzed?
  • What is your advice on implementing these issues?

In response to your peers, discuss the various types of attacks on networked systems.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

MKT455 week 10

 

You have heard of the 4P’s of Marketing? Price, Place, Promotion, and Product…

Did you know that there are also 7R’s called the 7R’s of Relationship Marketing?

Read the following brief article on the 7R’s of Relationship Marketing:

https://smallbusiness.chron.com/seven-rs-marketing-mix-64543.html (Links to an external site.)

Please answer the following questions:

  1. Briefly define each of the 7 R’s using any Internet references of your choosing;
  2. In your opinion, and supported by 1-2 Internet references, should marketers use the 4P’s of marketing in selling a product, the 7R’s of Relationship Marketing or both of them together (4P’s and 7R’s)?

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

intel x86 assembly program

 please i need you to debugg my code. bellow is question and my code is uploaded

Implement the Insertion Sort algorithm for an array of int values in Intel assembly language. The algorithm, in C, is given below, assuming int a[ ], n; where n is the number of elements stored in the array. for(i=1;i=0&&a[location]>temp) { a[location+1]=a[location]; location–; } a[location+1]=temp; } Implementing this in Intel assembly language can be tricky because you are limited to the 4 data registers and you might need to be accessing other values as well. This may require that you move values back and forth between variables and registers. Remember that array access in assembly language is of the form a[ebx] where ebx is storing the byte offset, not the array index. You can have variations of this notation like a[ebx*4] so that ebx can be incremented in units of 1 instead of 4, and a[ebx+4] or a[ebx*4+4] to access a[i+1]. Write the program in C first to make sure you understand the logic, and then either convert the instructions into assembly instructions or write it from scratch using your C code as a basis. Your program will be organized as follows: • initialize the int array (hardcode this in the program so that you don’t have to input the values) and the number of elements of the array in C code • enter assembly code to perform the sort o all logic for the sorting algorithm must be done in assembly code • exit assembly code and output the sorted array using a for loop in C to iterate through the array Use only one array (do not manipulate a copy of the array). Run the program on the 2 data sets below. Between runs, change the array values and the number of elements in the array, recompile and rerun it. Collect both sets of output and attach them in comments at the bottom of your source code. Remember to comment your code, especially with respect to how it helps accomplish sorting. This program should be contained in one file and use only one function (main). Run #1: 100, 99, 97, 95, 90, 87, 86, 83, 81, 77, 74, 69, 63, 50, 44, 43, 39, 31, 29, 12 Run #2: 123456, 342100, 87539, 606006, 443322, 198371, 99109, 88018, 707007 Hand in your source code with the output from the two runs. 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Describe Design Issues in Distributed Systems

Describe Design Issues in Distributed Systems 3 pages o fessey

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Week # 1 Assignment

Assignment Instructions:

You are tasked as the Cyber Security Analyst at your new organization to prepare a briefing for executive management (comprised of people with anywhere from a basic understanding of Information Technology [IT] to a Chief Information Officer with a vast knowledge of IT). The purpose of the briefing is to make recommendations on a course of action they should take to deal with a myriad of threats due to a recent compromise of critical IT Infrastructure by an unknown intruder or insider.

For the purpose of this assignment, you are to select one of the topics below and create an in-depth and thoroughly analyzed report that first researches the subject matter and provides a well thought out background based on current trends; and then makes rationalization for the subsequent recommendations.

TOPICS (you may use more than one topic in your report if you like):

1. Attack Methodology plus Tools and Techniques used

2. Attackers – Types of Threats

3. How Most Organizations Defend Today (Lessons Learned)

4. Targeted Capabilities – What we should be Defending

REQUIREMENTS:

– 4 Pages in length in APA format (not including a cover page and reference section)

  • Cover Page
  • Background Section
  • Analysis of current research on the subject matter
  • Recommendations
  • Reference Section  
  • 100% original work. no plagiarism. 

MISCELLANEOUS:

  1. Use current and real world data to make your points, not just the textbook
  2. Your report may focus only on the topic of your choosing – imagine yourself working on one aspect of the report while team members complete the other areas following the same structure.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

BMIS 664 – Final Project

  Final Project Assignment Instructions

Overview

In order to fully comprehend the many aspects that factor into information forensics and risk management, you must examine a situation from the perspective of a computer forensic specialist. For the Final Project Assignment, you will be placed in a hypothetical scenario in which you must utilize all of the information gained throughout this course.

Instructions

Assume that you are the Chief Information Security Officer (CISO) of <Place your full name here> Corporation.  If your name is “Mariah Smith” the name of the company should be named the Mariah Smith Corporation. While performing your regularly scheduled duties, you receive a call from the Senior Vice President of the Human Resources Department informing you that, in the past 4 days, there have been 4 occurrences of money transfer to unauthorized recipients. Given your position and your understanding of recent cyber and information security attacks, you assume that an attack of some sort is at fault for the unauthorized transfers.

During the conversation, you are given the name of the department where the fund transfers have occurred.  The department is internal to the organization but only certain fund transfers were committed internal to the network. In addition, you know the external public IP address of the system that executed the transfers. Privilege escalation, man-in-the-middle attacks, buffer overflows, and malicious code were all present during the Information Assurance Team’s initial investigation.  Some of this is puzzling, given the IP address location that seems to be the source. You are given specific instruction not to engage anyone from the department where the money transfer have occurred; however, you are permitted to engage law enforcement and third party agencies if appropriate. This is to preserve any ongoing investigations and to allow the greatest opportunity to catch the suspect. 

Refer to the Final Project Network Diagram.  The enterprise network is much larger, with many additional pieces of hardware. Regardless, these are the only systems the initial investigation indicated were affected. The organization fund/money transfer systems are comprised of Microsoft, Linux, and Solaris servers. The firewall prior to the Cisco core switch only allows access to necessary web facing application ports. The Microsoft servers are responsible for authentication through directory services. Despite one firewall and some group policy being verified as sound and uncompromised by the investigation, the current information system components identified play certain roles in the unauthorized transfers.

The Final Project Network Diagram will be used as a point of reference in determining what is necessary to determine how this incident could occur in a real organization; this includes applications, information systems, human experts, and any other stakeholder involved in such an incident. Your goal is to identify where vulnerabilities and threats could exist specific to anauthorized transfers in this scenario and how to mitigate future occurances. 

The final plan must identify the technology and equipment and all access and file data that is compulsory—including log files, auditing, group policies, firewall rules, and other information system elements—to determine the root cause. Upon the successful completion of the investigation plan, a subsequent plan will determine a superior information system and plan for future mitigation and prevention. This can include everything from firewall rules to policy.

Before being graded, all code, access control rules, diagrams, and/or Visio diagrams (each) must include screenshots with a valid date and piece of data that shows completion on the student’s personal computer. The Final Project Assignment must be comprehensive and include a minimum of 5,000 words (excluding the title page, diagrams, and reference page). Each project deliverable should be well supported by related, relevant, and current scholarly literature. In total, it should contain at least 20 peer-reviewed sources. The Final Project Assignment must also be written in current APA format, include a title page, table of contents, introduction, conclusion, references, and appendixes with appropriate data. You are encouraged to utilize Microsoft Visio or a similar application in order to provide visual aides to assist in your assessment of the situation as well as Microsoft Project and/or valid alternatives. In your analysis, be sure to include the following:

· A comprehensive literature review of unauthorized transactions, how this can occur, and a comprehensive review of the affected IT infrastructure;

· A project adhering to an industry standard methodology (such as PMBOK) to manage the Final Project completion;

· An appraisal of the situation using the knowledge gained from this course and personal experience;

· A thorough assessment of the Information Assurance Team’s initial findings;

· A performance of a forensic investigation on the matter;

· An illustration of your strategy for conducting this investigation;

· The formulation of a complete plan including: a proposed personnel structure/team, mechanisms of defense, budget, schedule, risk management, procurement management, secure systems analysis, and design to prevent this incident from occurring in the future; 

· Over two (2) new unique IT architecture diagrams using at least two (2) network security frameworks that highlight the new strategy and design that could mitigate future unauthorized transactions. Diagrams must have screenshots from the user’s computer in the program they were designed and include the operating system date and time from the student’s person computer.

· A strong attempt to integrate a biblical worldview into the secure enterprise solution. 

Introduction  More than 3 scholarly sources and 250 words 

Review of literature – 2,500 words 10 scholarly journal articles

Mitigation Plan – Over two (2) new comprehensive network architecture diagrams with proper screenshots and over 20 pieces of hardware that 2,000 words 10 scholarly sources

Conclusion – More than 2 scholarly sources and 250 words 

Total Overall – Over 5,000 words and Over 20 unique scholarly sources

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Business process in a specific industry.

 Discussion Question #1: Some say that analytics in general dehumanize managerial activities, and others say they do not. Discuss arguments for both points of view. Discussion Question #3: What are some of the major privacy concerns in employing intelligent systems on mobile data? Discussion Question #4: identify some cases of violations of user privacy from current literature and their impact on data science as a profession. Exercise #2: Search the Internet to find examples of how intelligent systems can facilitate activities such as empowerment, mass customization, and teamwork. Write a report.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now