CNN reported that Sen. Max Baucus, chairman of the Senate Finance Committee, and Sen. Richard Burr

On May 23, 2012, CNN reported that Sen. Max Baucus, chairman of the Senate Finance Committee, and Sen. Richard Burr, the senior Republican on the Veterans’ Affairs Committee were investigating charges that the Disabled Veterans National Foundation has spent little of the tens of millions of dollars it raised since 2007 on programs to help veterans. In this Discussion, you will analyze the fundraising abuses of a nonprofit organization dedicated to helping disabled veterans.
Read the article by Perry, (2014), “NY Wins $25 million in Fundraising Abuse Case” as well as the information provided by the charity navigator.
With these thoughts in mind:

Post a summary of the legal and ethical violations of the Disabled Veterans National Foundation. Next, explain what steps you would take if you were the executive director to prevent this from happening in the future and to rebuild public trust. Finally, reflect on how you felt about this organization as you read this case and how you might feel if you were a donor to this organization.

describe the various industry certifications in cybersecurity where this course may help in obtaining.

In no less than 250 words, describe the various industry certifications in cybersecurity where this course may help in obtaining.  Describe at least two certifications and why they are an important credential to have to be successful in a cybersecurity role.

2) In no less than 250 words, explain the difference between symmetric and asymmetric encryption.  Which one is better and why?

3) In no less than 250 words, describe the various type os encryption defined by the National Security Agency (NSA).  In many cases military applications need type 1 encryption to secure it’s communications.  What does this mean and how does it differ from the other types of encryption.

4) In no less than 250 words, describe what an OCSP server is and what is it’s purpose in securing a network.  Even though the textbook doesn’t mention it, this is a scheme used often when doing certificate based authentication.

5) In no less than 250 words, explain why a network engineer would enable IEEE802.1X on a Cisco switch port.  Give a scenario where this would be relevant.  Also write down the IOS configuration to enable it on a switchport.

6) In no less than 250 words, describe why it is advisable to use SSH instead of Telnet to connect remotely to a Cisco router to manage it.  Explain the reason why that is and write down the Cisco IOS configuration to enable SSH for remote connectivity.

7) In no less than 250 words, describe the difference between a fat AP and a thin AP.  What is needed to deploy a thin AP?  Are there any security considerations to think about between the 2 different APs?

8) In no less than 250 words, describe a type of email threat and how a hacker can use it to get sensitive information.  How can a network administrator prevent this type of attach from happening?

9) In no less than 250 words, describe a solution to securely connect a remote worker from their home and connected to the Internet to their company network.  How does this solution work and what is needed on the company network and the remote worker’s network to accomplish your solution?

10) In no less than 250 words, describe a hacking tool that is used to gain access to a network.  Explain how the tool is used, how it works and how a network administrator can prevent this tool from access the network.

11) In no less than 250 words, explain what is meant by an IDS and an IPS.  How are they different?  How are they connected to a network?  List a few examples of IDS/IPS tools that are currently on the market.

12) In no less than 250 words, explain the difference between an access control list (ACL) that is used in routers to block traffic and firewalls.  What similarities do they share?

13) In no less than 250 words, explain the different security measures that each version of SNMP uses.  What is the different between SNMPv1, v2c and v3?

14) In no less than 250 words, explain your topic for the project.  Explain how it is relevant to network security.

Psychologist John Bowlby coined the term attachment as it relates to child development.

Psychologist John Bowlby coined the term attachment as it relates to child development. Attachment refers to the process in which an infant bonds with primary caregivers. Attachment was once thought to be heavily influenced by the provision of food; that is, it was assumed that an infant would form the strongest bond with the caregiver who supplied food. However, Bowlby suggested that the process of attachment was much more nuanced and complex. Another well-known theorist who studied attachment at the time was Mary Ainsworth. While there are differences between Bowlby’s and Ainsworth’s attachment theories, both theories attempt to explain how attachment occurs, classify different attachment styles, and assert that the strength of attachment with one’s primary caregivers has a profound effect on social, emotional, and cognitive development and relationships later in life. However, it is important to keep in mind that psychological concepts and phenomena, such as attachment, are culturally bound. What is considered to be normal in one culture may be considered to be atypical in another culture, and vice versa. In this discussion, you will explore the applicability of Bowlby’s and Ainsworth’s theories of attachment in the context of two different cultures.
To prepare for this Discussion

Review the articles found in the Learning Resources (and any additional articles you might have located in the Walden Library) related to attachment and consider the cross-cultural aspects of attachment.
Select two different cultures examined in the articles or in literature you have located in the Walden Library.
Think about how views on attachment are similar and different in these two cultures. Consider whether the differences in attachment have any bearing on an infant’s well-being in either culture.

Nonprofit organizations must not only function within the legal frameworks

Nonprofit organizations must not only function within the legal frameworks created by the federal government and the state in which they operate, but also within the ethical guidelines and standards to maintain the public’s trust. In this Discussion, you will explain the legal and ethical responsibilities of a board of directors.
Review this week’s Learning Resources in preparation for the Discussion.
With these thoughts in mind:

Post a legal and ethical restriction and an affirmative obligation that a nonprofit organization may have. Provide an analysis of the boards’ ethical and legal responsibilities, and how they impact policy formulation. Support your response using laws, ethical codes, and current literature. As an ED, how would you begin addressing these legal and ethical situations or concerns in your organization?

Perhaps you were buying toys for your own children or children of friends or family

Think about the last time you shopped for toys. Perhaps you were buying toys for your own children or children of friends or family. If you shopped online, one of the filters you probably used to find an appropriate toy was age range. While toy manufacturers designate specific age ranges due to the choking hazards associated with the item, they also take child development into account. They know that designing a 250-piece puzzle is neither appropriate nor useful for a 2-year-old who has limited sensory and motor skills. In this discussion, you will reflect on a favorite toy or game as a child and determine which stage of Piaget’s theory of cognitive development you were in when you played with it.
To prepare for this Discussion

Review this week’s Learning Resources on Piaget’s cognitive development theory. Pay particular attention to the description of each state of cognitive development.
Consider a favorite toy or game you played with during childhood or adolescence.
Using Piaget’s theory, identify the stage of development you were in when you played with this toy or game. How did the skills evident in that stage affect how you played with your toy or game?

Financial Evaluation Activity Context

Financial Evaluation
Activity Context
This assignment helps you develop the skills to master the following course competencies:

Apply the theories, models, and practices of finance to the financial management of the firm.
Assess the impact of ethical, regulatory, and tax considerations on financial policy decisions.
Evaluate alternative methods of financing a firm in diverse economic environments.
Integrate financial analyses into general business management planning and decision making.
Communicate in a manner that is professional and consistent with expectations for members of the business professions.

Activity Instruction
For this assignment, you will complete the Financial Analysis component of your course project, and then combine all parts of your project and submit it to your instructor.
Part 1: Financial Evaluation
To complete this assignment, use the Financial Analysis Toolkit Excel file, you have been working in previously.
Complete a thorough financial analysis of your chosen company using the two most recent years’ 10-K and annual reports. Write a 4–6 page paper addressing the following elements:

Evaluate the impact of international trade on the company’s financial statements.
Evaluate the current decisions made within the company that have regulatory and tax implications.
Evaluate the current corporate governance and ethical responsibilities in your company.
Evaluate alternative methods of financing used in your company.
Provide an overall evaluation of the financial outlook for the company, and make recommendations for stakeholders:

Consider the various perspectives from different stakeholders: If you were considering investing in this company, would you buy shares?
If you were considering acquiring this company, what is your decision regarding this company? Why?
If you were the CEO, how would you use this information to make tactical and operational decisions?
If you were a banker, would you lend money to this company? Why or why not?

A thorough, professional presentation of your analysis and results is an important consideration. In your analysis, incorporate creativity, critical thinking, and real-life perspectives. Copy the raw financial data of your selected company into an Excel sheet (with labels). Then, calculate the financial ratios and other metrics using built-in Excel functions. Do not type the answers. This Excel sheet must be submitted along with your report. Cite all resource materials used in your analysis, using proper APA format.
Enhance your presentation skills by using applicable tools such as tables, graphs, diagrams, and commentary as appropriate. You may copy and paste relevant portions of the Excel spreadsheets you competed earlier in the course into your paper.
Part 2: Putting It All Together
Now combine all elements of your course project using the outline provided below as a guide. Refer to the Financial Analysis and Evaluation course project description as needed to ensure you are including all parts of the project. Be sure to integrate all of the work you completed in Units 1–5.
Your final deliverable should include all of the following elements:

Title Page.
Overview of the Company.
Financial Analysis:

Annual Reports/10-K.
Competitive Standing.
Financial Analysis (Horizontal, Vertical, Ratio).

International Trade and Risks.
Evaluation and Recommendations for Stakeholders,

Other Requirements

Written communication: Paper should exhibit proficiency in writing and critical thinking as expected of a business professional, and be free of spelling and grammatical errors.
APA formatting: Citations and references must be formatted using APA (current edition) style and formatting.
Number of resources: Minimum of 5 references, of which 3 should be academic journals and no more than 2 should be textbooks.
Length: 10-12 typed, double-spaced pages.
Font and font size: Times New Roman, 12 point.

Refer to the scoring guide for this assignment to see how you will be evaluated. When finished, submit your completed document for grading and instructor feedback.
Note: Your instructor may also use the Writing Feedback Tool to provide feedback on your writing. Within the tool, click the linked resources for helpful writing information.

What aspect of the criminal process did you find most interesting in this course?  

For the final forum in this course, please answer the following:
1) What aspect of the criminal process did you find most interesting in this course?
2) Which aspects of the criminal process do you think needed more study for you to fully understand?
3) I would like everyone to share with each other what your next step is at APUS.  Are you enrolled in another course after this one?   Has this course got you thinking about taking a course that you had not previously considered?  Is there anything that I, as your instructor, can do to help you plan out your future courses at AMU/APU?
You must post your initial response by Wednesday of the week assigned and must reply to 2 others by Sunday of the week assigned.

Your initial substantive response should be at least 250 words. YAll citations must be in APA or Blue book format.

Evidence-based social work practice calls for the use of research data to guide the development of social work interventions on the micro,

Evidence-based social work practice calls for the use of research data to guide the development of social work interventions on the micro, mezzo and/or macro-levels. Kearney (2001) described ways qualitative research findings can inform practice. Qualitative findings can help social workers understand the clients’ experiences and “what it may feel like” (Kearney, 2001). Therefore, social workers can develop clinical interventions that take into account the experiences of their clients. Qualitative findings can also help social workers monitor their clients. For example, if after reading a qualitative study on how domestic violence survivors respond to stress, they can monitor for specific stress behaviors and symptoms (Kearney, 2001). In addition, they can educate their client what stress behaviors to look for and teach them specific interventions to reduce stress (Kearney, 2001).

Given the increasing diversity that characterizes the landscape in the United States, social workers need to take into account culture when formulating interventions. Social workers can utilize qualitative findings to plan interventions in a culturally meaningful manner for the client.


To prepare for this Discussion, read (ATTACHED) Knight et al.’s (2014) study from this week’s required resources. Carefully review the findings, the photographs, and how the researchers wrote up the findings. Finally, review the specific macro-, meso-, and micro-oriented recommendations.

Then read Marsigilia and Booth’s (ATTACHED) article about how to adapt interventions so that they are culturally relevant and sensitive to the population the intervention is designed for. Finally, review the chapter written by Lee et al. on conducting research in racial and ethnic minority communities.

Post the following:

Using one of the direct quotes and/or photos from Knight et al.’s study (ATTACHED), analyze it by drawing up a tentative meaning. Discuss how this would specifically inform one intervention recommendation you would make for social work practice with the homeless. This recommendation can be on the micro, meso, or macro level.
Next, explain how you would adapt the above practice recommendation that you identified so that it is culturally sensitive and relevant for African Americans, Hispanics, or Asian immigrants. (Select only 1 group). Apply one of the cultural adaptations that Marsigilia and Booth (ATTACHED)  reviewed (i.e., content adaption to include surface and/or deep culture, cognitive adaptations, affective-motivational adaptations, etc.)(pp. 424-426). Be as specific as you can, using citations and the attached reading resources to support your ideas

Organisational Learning Case Study

Organisational Learning Case Study (1500 words)
Sanitarium (pp. 317-320, Beech, MacIntosh, Krust, Kannan & Dadich, 2017) – Case study pdf file is available in this module.
Students will conduct a case study of the organisational learning mechanisms employed by a specific business for a particular purpose, e.g., how a service business designed and utilised organisational learning mechanisms to introduce a successful, new corporate brand. Case study will be provided in the Learning management system
Address the following questions in the case analysis:
1.         Diagnose and analyse the organisational culture.
2.         Evaluate the change effort – to what extent was the company successful or unsuccessful? Support with some research and data.
3.         Examine the factors that have influenced or impacted the outcome based on organisational change and organisational learning principles?
4.         Critically analyse a range of learning mechanisms, and evaluate their impact on organisational performance, effectiveness and reputation;
1.         Evaluate organisational learning mechanisms with respect to their capacity to establish and maintain the ongoing active involvement of internal stakeholders (employees) both as individuals and as teams.
2.         What are your recommendations for the next phase of learning and change?

Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.

Ask a probing question, substantiated with additional background information, evidence or research.

Share an insight from having read your colleagues’ postings, synthesizing the information to provide new perspectives.

Offer and support an alternative perspective using readings from the classroom or from your own research in the Walden Library.

Validate an idea with your own experience and additional research.

Make a suggestion based on additional evidence drawn from readings or after synthesizing multiple postings.

Expand on your colleagues’ postings by providing additional insights or contrasting perspectives based on readings and evidence.

Use  references

Main Post

The behavioral risk factor that I selected from the Healthy People 2020 objectives is overweight and obesity among children and adolescents (ages 6 through 19), which has increased significantly over the last three decades (Knickman & Kovner, 2015). Currently, only 36% of Floridians are at healthy weight, and if we stay on our current trend, by 2030, almost 60% will be obese (Florida Health, 2017). Additionally, six out of ten children born today will be obese by the time they graduate from high school (Florida Health, 2017). Five areas in which reform is critically needed in order to prevent obesity are creating safe environments for physical activity, healthy food and beverage choices, message environments, and health care, work and school environments (Knickman & Kovner, 2015). The population-based intervention model describes downstream, midstream and upstream interventions for preventing overweight and obesity among children and adolescents (Knickman & Kovner, 2015).

A downstream health prevention program focuses on changing behaviors at an individual level, rather than preventing risk behaviors (Knickman & Kovner, 2015). Given parents’ influence and control over their children’s diet, physical activity, media use, and sleep, family interventions are a key strategy in the effort to eliminate childhood obesity (Ash, Agaronov, Young, Aftosmes-Tobio & Davison, 2017). An example of a downstream intervention that would be effective is to provide a hand-out for parents and children through the school with helpful tips on reducing screen time, suggestions for healthy food swaps (having an apple instead of chips after school) and suggestions for easy ways to incorporate exercise into your day, such as go for a walk as a family for 20-30 minutes after school each day.

A midstream health prevention program focuses on changing behaviors at a community level, with health promotion programs that are targeted at populations to change or prevent risk factors (Knickman & Kovner, 2015). An example of a midstream intervention that would be effective is to provide school-based sports and physical activity to children each day. Two main individual behavior determinants of health are diet and physical activity (ODPHP, 2018). The school would provide coaches and equipment for children to participate in sports who may not have the ability to otherwise in their home environment.

An upstream health prevention program focuses on developing policies at state and national levels in order to reduce the promotion of unhealthy products and behaviors (Knickman & Kovner, 2015). An example of an effective upstream intervention is the great efforts made in the public-school system to improve the quality of food provided in school lunches, and to eliminate the availability of junk-food to kids. In April 2014, the US Department of Agriculture (USDA) issued new regulations, which took effect in July 2014, banning the sale of all junk-food in schools (Ballaro & Griswold, 2018). The regulations stated that only fruits, vegetables, dairy products, lean-protein foods, and whole-grain items could be sold in cafeterias or vending machines, limiting the maximum calorie count of 200 for snacks and 350 for entrées (Ballaro & Griswold, 2018). Foods containing trans-fats could not be sold, and drinks could contain no more than 35% sugar or fat, and must be limited to water, low- or no-fat milk, and 100% fruit or vegetable juice (Ballaro & Griswold, 2018).


Ash, T., Agaronov, A., Young, T., Aftosmes-Tobio, A., & Davison, K. (2017). Family-based childhood obesity prevention interventions: a systematic review and quantitative content analysis. International Journal of Behavioral Nutrition & Physical Activity, 14(1), 1-12. doi:10.1186/s12966-017-0571-2

Ballaro, B., & Griswold, A. (2018). Junk food in schools. Salem Press Encyclopedia. Retrieved from

Florida Health. (2017). Healthy weight. Retrieved from