...P3: Describe how a selected organization uses marketing research to contribute to the development of its marketing plans Market Research: Market Research is a systematic, objective collection and analysis of data about a particular target market, competition, and/or environment. It always incorporates some form of data collection whether it be secondary research (often referred to as desk research) or primary research which is collected direct from a respondent. The purpose of any market research project is to achieve an increased understanding of the subject matter. With markets throughout the world becoming increasingly more competitive, market research is now on the agenda of many organisations, whether they are large or small. Marketing Plans: Product specific, market specific, or company-wide plan that describes activities involved in achieving specific marketing objectives within a set timeframe. A market plan begins with the identification (through market research) of specific customer needs and how the firm intends to fulfil them while generating an acceptable level of return. It generally includes analysis of the current market situation (opportunities and trends) and detailed action programs, budgets, sales forecasts, strategies, and projected financial statements. Primary internal research: where the business conducts their own research internally - inside of the business. For example conducting interviews/questionnaires with the staff within the business...
Words: 1559 - Pages: 7
...1. Discretionary Access Control – For Shovels and Shingles I would use Discretionary Access Controls. This way certain user groups have certain access. Considering there is only 12 clients I would assume the employee base and small and only 2-3 groups would be required with different access levels. 2. Rule Based Access Control – Due to the small client base and the fact most users would most likely be sharing information in a small advertising company I would go with Rule Based. This way there is certain files that everyone can access and ones that can’t be accessed. It allows for a personal data structure while allowing some files to be shared freely. 3. Non-Discretionary Access Control – Due the company being larger and associated with IT, I would go with the non-discretionary controls. This way the employees will only have access to what is dictated to them by the administrators. This is especially recommended because there are employees traveling and using the network from the outside. All control for the network should be done administratively. 4. Role-Based Access Controls – For Backordered Parts defense contractor I would recommend Role-Based access controls. As there are many facets to a design and building company there will be many access levels and areas that should only be accessed by certain personnel. Using this role-based control will allow for all users to only see what they need to see, and not see what they don’t need to see as pertaining to their...
Words: 321 - Pages: 2
...chance against a true disaster. It may be impossible to ward off every threat actors attempt, so understanding what actions must be taken in the midst of a network infiltration or malicious attack is of dire importance. Lastly, risk management allows a company to understand ways to reduce risk. This may be through testing the network, applications, and systems for vulnerabilities and determining how to improve, outsourcing some of the operations to reduce risk to operations, obtaining insurance to maintain financial obligations, accepting the residual risks within the organization, and more. Each aspect of risk management can create a better understanding of the assets that require more protection, and ways to improve processes for the company. 2. What is the difference between a'smart' and a'smart'? Discuss how you would assess the risk of identity theft in a non-profit agency. Describe your agency and your needs. Give your agency a creative name. Our non-profit organization, Hero’s Helping Hero’s (HHH) develops programs based on the needs of the community. We function mainly throughout the state of Virginia but provide services to those out of state when visiting different areas. We help others in need of rental assistance, food, jobs and education, mental health counseling, substance abuse training, temporary housing, and community service opportunities. We are stationed in Petersburg, VA, Richmond, VA, and Norfolk, VA. Although we are open to providing everyone assistance, we primarily...
Words: 3281 - Pages: 14
...Ensuring adequate security for your home is vital. It is advisable that you invest in better locks and other security devices to help deal with issues like break-ins, burglary, or fire. The best way to go about enhancing security in your home is by employing the services of a professional residential locksmith. If you are looking for reliable residential locksmith services Richmond Virginia, American Lock & Key is just what you need. We have the tools and skills to help you make your home completely secure. We are certified and licensed so you can rest assured that we have the expected expertise, and that our services will exceed your expectations. Professional Residential Locksmith services in Richmond Virginia Are you locked out of your house in Richmond? American Lock & Key can get you into your home in case you have been locked out. If your keys are lost, we can take the door lock cylinder apart and decode the pins. We will then use this information to produce an original key matching the misplaced one. We will correct mismatched hardware, poorly installed security hardware, and fix all other lock and security faults in your home around Richmond. Efficient Residential Locksmith services Richmond Virginia From lock installation, to upgrade to repair and maintenance, and other security requirements for your home in Richmond, we have a solution. Let America lock & key know your security needs or concerns and see how efficiently we will sort them. At American lock & key, we...
Words: 494 - Pages: 2
...PS1355 Unit 3 Assignment 2: Yucca Mountain Sierra Baltins Wednesday Imagine several families suffering from radioactive sickness. People affected by nuclear waste can get very, very sick or quickly die. One-billionth an ounce of nuclear waste consumed is enough to disrupt a person’s genetics. The U.S. Department of Energy wants to transport 77,000 tons of radioactive materials to Yucca Mountain, most that are coming from area near the Mississippi river. Since scientists expect the volcano to have its next eruption after the next 10,000 years, the radioactive materials are intended to stay that long. I would never permit a nuclear waste dump in my backyard for several reasons. Radioactivity easily spreads for long distances and...
Words: 469 - Pages: 2
.../*----------------------*
| Nikeshnee Padiachey |
| 2014 960 33 |
| Modelling 2A11 |
| Assignment 2 |
|(version 1.0) |
| 27/02/2015 |
*----------------------*/
#include
Words: 598 - Pages: 3
...Reflections on Essay Writing EN 1320 Composition 1 Class 8 Oct 2014 Unit 3 Assignment 2: Refelerctions on Essay Writing EN1320 Where to start; to explain about what I have learned about writing in composition 1 class. I have always been a pretty good writer, I think. As long as I like the genre that I’m writing on, I can usually produce a good product. Composition one has helped me slower but surely, I think it will just take a little more time. This class has helped me considering it is only the fourth week of class. I guess my style of writing is; I believe I’m a prewritter, most of the time. First, I get all my source material together, I read and outline said materials and I just start writing. I do the same thing that I’ve always done through my entire US Air Force career. It’s how I approach all my writing assignments and I’ve got proficient at it. In the Air Force, I wrote for subordinates or troops, their EPRs (Enlisted Performance Reports). I always used this approach when I wrote metals, awards and disciplinary reports on someone actions. I would start with few bullet statements or what you would call brief statements on accomplishments. I would start with some short bulleted statements and expound on them. I’ve had a few good supervisors in the Air Force that taught me how to write. They have told me, it doesn’t matter what comes out when you write, just get it down. I have used this lot and I got pretty good at it, for example when an accident occurred...
Words: 413 - Pages: 2
...frames and side panels. Get a pre drill that is 2” long for pocket holes and drill each end of the 2x4 and screw them together with 2” screws. Get a 2” pre drill and drill pocket holes in each end of the 1×4 frame pieces as well as all four edges of the panels. Secure the frame pieces to the legs, then secure the panel to the legs and the side frames using and 2” screw. The front face of the panels will be 1” back from the outside face of the legs. Cut the pieces for the drawer spacers, and drill pocket holes in each end. Secure to the legs as shown using a 2” screws. Step 2 Cut the piece for the back and drill pocket holes in each shorter edge. Secure to the legs using glue and 2” screws. The outside face will be flush...
Words: 504 - Pages: 3
...Access to all the confidential patient information should be restricted. The organizations should maintain a log that will capture all details regarding permission of access to protected information. This can also include details about why the access was sought and how many times the record has been accessed by authorized individuals. 2. All the medical records of patients will need to be password protected if they are stored electronically. If they are stored in physical form they would need to be kept in secure areas that cannot be easily accessed. If they are kept in cupboards they would need to be locked and the keys should be kept safely to prevent any unauthorized access. 3. If any patient information is required to be transmitted electronically, it will need to be password protected and encrypted. This will ensure that no one will be able to read it even if they had managed to get access to it. The information will need to be decrypted before it can be read by the authorized individuals. 4. All computers that are used to store and transmit information would also need to be password protected so that any kind of unauthorized access is prevented. If different employees are accessing the patient information they will need to be provided...
Words: 515 - Pages: 3
...Task 1 A business keeps various types of financial record to monitor its performance and ensure that taxes are paid. These include cash flow statements, profit and loss accounts and a balance sheet. Profit and Loss Account A trading, profit and loss account shows the business's financial performance over a given time period, e.g. one year. The sales on the profit and loss account are the revenue that the business is receiving from selling products or services which was £187,730. The cost of sales then needs to be calculated in order to generate a gross profit figure. Cost of sales is the money that is needed to provide products or services to customers which was £83,000 in this scenario. The trading account shows The Craft & Pottery Shop & Studio LTD has made a gross profit of £105,785 before taking into account other expenses such as overheads. Gross profit is the profit a company makes after deducting the costs associated with making and selling its products, or the costs associated with providing its services. The profit and loss account shows a net profit of £18,865 has been made. Net profit is the amount of ‘true profit’ a business makes after deducting the expenses of the business off the gross profit figure. Balance Sheet A balance sheet shows the value of a business on a particular date. A balance sheet shows what the business owns and owes (its assets and its liabilities). Fixed assets show the current value of major purchases that help in the running...
Words: 3798 - Pages: 16
...explaining that if anyone knows your genotype, you have an extreme chance to get treated differently. We are opening up more discrimination and bullying. You could not get jobs, or health insurance the same way or get your price raised. Also as stated “Employers may discriminte against people who are genetically likely to get a disease and be favorable to those who are healthy.” This means if in the future you are likely to get a disease, employers are going to look past you and favor healthier people. Doctors, orginazations, goverment agencies, and more all have access to your genetic information. In the future our genes could determine how we are treated. We then have to worry about people not giving us the treatment we need. Evidence 2: This will probably be about a paragraph. Include text evidence and the reasoning....
Words: 634 - Pages: 3
...IS427: Unit 3 Assignment 2: IT Security Compliance and Governance Gap Analysis Plan Outline Learning Objectives and Outcomes You will learn about the process of performing an information technology (IT) security compliance and governance gap analysis. Assignment Requirements In this assignment, you will be given a Request for Proposal (RFP) that includes a current IT policy framework description and a complete technical description of what is needed. You are required to prepare a project plan that defines the tasks necessary to perform a security compliance and governance gap analysis. You should include tasks, resources, cost estimates, and time estimates in the project plan. You will be graded on your ability to break the IT security compliance and governance gap analysis process into manageable parts and then organize them into a project plan. Students who produce a project plan with task details for all necessary tasks in an IT security compliance and governance gap analysis should receive a full grade. Required Resources RFP Worksheet: Project Plan IT Security Compliance and Governance Gap Analysis Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: Chicago Manual of Style Length: 1–2 pages Self-Assessment Checklist I have prepared a project plan that defines the tasks necessary to perform a security compliance and governance gap analysis. I have included tasks, resources, cost estimates, and...
Words: 322 - Pages: 2
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...ITT Technical Institute NT1210 Introduction to Networking Onsite Course SYLLABUS Credit hours: 4.5 Contact/Instructional hours: 56 (34 Theory Hours, 22 Lab Hours) Prerequisite(s) and/or Corequisite(s): Prerequisites: NT1110 Computer Structure and Logic or equivalent Course Description: This course serves as a foundation for the study of computer networking technologies. Concepts in data communications, such as signaling, coding and decoding, multiplexing, circuit switching and packet switching, OSI and TCP/IP models, LAN/WAN protocols, network devices and their functions, topologies and capabilities are discussed. Industry standards and the development of networking technologies are surveyed in conjunction with a basic awareness of software and hardware components used in typical networking and internetworking environments Introduction to Networking Syllabus Where Does This Course Belong? This course is required for the associate program in Network System Administration and the associate program in Electrical Engineering Technology. The following diagrams demonstrate how this course fits in each program. Associate Program in Network Systems Administration NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database Concepts NT1330 Client-Server Networking II NT1230 Client-Server Networking I NT1430 Linux Networking PT1420 Introduction to Programming NT1110...
Words: 4400 - Pages: 18
...Network Technology and Service Integration Unit 1 Homework The following homework is designed to cover the course objectives for this unit. Assignment 1.1: Textbook/Workbook Assignments • Complete the following exercises and questions from Routers and Routing Basics: CCNA 3 Labs and Study Guide: Vocabulary Exercise: Matching on page 3 VLSM Subnetting a Subnet Exercises on pages 9-11 VLSM Addressing Design Scenarios 1-6 on pages 15-20 Summary Route Exercises on pages 21-24 Concept Questions on pages 25-27 VLSM Case Study on page 27 Internet Research on page 29 (Use the ITT Tech Virtual Library.) • Complete Chapter 9 Review Questions 2-7, 10, 14, 20-22 on pages 258-259 of Introduction to Telecommunications. Submit your written answers to your instructor at the beginning of Unit 2. . Assignment 1.2: Virtual Labs • Complete Virtual Labs 6, 7, and 8 from the CCNA 640-802 CCNA Simulator, which you can find by clicking through these paths: ICND1 Troubleshooting Scenarios Lab 6: IP Addressing and Routing. ICND1 Troubleshooting Scenarios ICND1 Part 4: Troubleshooting Labs Lab 7: IP Routing I ICND 2 Troubleshooting Scenarios Lab 13: IP Routing II Submit your written answers to your instructor at the beginning of Unit 2. ©ITT Educational Services, Inc: Date: 03/13/09 Network Technology and Service Integration Unit 2 Homework The following homework is designed to cover the course objectives for this unit. Assignment 2.1: Textbook/Workbook Assignments • Complete the following exercises and...
Words: 2825 - Pages: 12