PESTEL & Five Forces

Read Chapter 3 and view the required videos on PESTEL Analysis and the Five Forces Framework. Select one of the cases from Part 2 of the Thompson (2022) textbook to analyze the six components of the Macro-Environment and the Five Forces Model. For this assignment:

Textbook:
Thompson Jr. A. A, Peteraf, M. A., Gamble, J. E., and Strickland III, A. J. (2022). Crafting & Executing Strategy: The Quest for Competitive Advantage: Concepts and Cases. 23rd Edition. McGraw-Hill. ISBN: 978-1-260-07510-6  978-1-260-73517-8 

  • Prepare a brief PESTEL Analysis for your selected case from Part 2 of our Thompson (2022) text.  You must address all six elements.
  • Prepare a brief Five Force Analysis as presented in our Thompson (2022) text for your selected case. Address all five forces.

NOTE this Requirement:  The Standard & Poor NetAdvantage Database provided in the NEC Online Library is a required source (and will be extremely helpful). The Standard & Poor Database is located under the general Library database listing. Once you have accessed the Standard & Poor site, the tabs at the top allow you to click on companies or industries. If you choose industries, it then provides a box and drop-down menu showing the various industrial reports which are available. Access the relevant report, and then review the details in the report to support this assignment. The information is incredibly relevant and provides a detailed analysis of the entire industry including a listing of the key companies in the industry.  Submission Details: 

  • Your analysis must be driven by facts, research, and data.
  • Your analysis should be between 1000 and 1500 words.
  • Incorporate at least our course text and one non-course scholarly/peer-reviewed source in your paper.
  • Create Leve1, 2, and Level 3 APA headings for each portion of the analysis.  
  • All written assignments must include a cover page, introductory and concluding paragraphs, reference page, double-spaced, and proper in-text citations using APA guidelines.

Reference Videos:

create a pro forma cash flow budget for the

  

Directions

create a pro forma cash flow budget for the organization for five years – 2010 -2014.

1. Express all data in yearly format (not quarterly or monthly)

2. b.    Create three sections Operating, Investing and Financing 

 i.    create line items within each section that relate to each of these sections.

  ii.    Show inflows as a positive value and outflows as a negative value

  iii.    At the bottom, show change in cash (sum of operating, investing and financing), beginning and ending cash.

Please reference Chapter 24 materials. Read and understand the entire chapter. Be sure and pay particular attention to the information contained in the following sections:

a) 24-1The Financial Plan

b) 24.2 Cash Budgeting (Note this table illustrates three columns–current, forecast and change, you will forecasting five years of data, so total of six columns- current and years 2010 – 2014)

Note Table 24-1 illustrates the operating section of the Cash Budget. This table appears on pp 708.

· For the line items “capital expenditure” and “mortgage payment” create a separate section in your cash budget for Investing and Financing respectively and include these and any other relevant cash flows in these two sections.

c) 24.3 Pro Forma Financial Statements

responding back to classmates

 

Social media can help you create opportunities and have a positive impact as well.  

Here are some examples of a positive social media impact. 

  • Social media can help you meet mentors to help guide your career or education goals. 
  • Social media can motivate you to strive for greatness. 
  • Social media can lead to more communication. 
  • Social media can be used to spread social awareness and kindness.  

Here are some negative social media impact. 

  • Inappropriate photos or messages could affect you getting a new job or promotion. 
  • Communication skills tend to be laxed on social media and does not demonstrate one’s ability to communicate effectively.  
  • Social media can cause an employer to question your professionalism. 

What can you do to make sure social media does not have a negative impact on your professional life? 

New Testament and Transformational Leadership

  

Part A: Profile a leader from the New Testament, evaluating the leader via at least one leadership theory. Include citations for current event reference.

Part B: Transformational Leadership

Former Pepsico CEO, Indra Nooyi is known for her transformational leadership style. She is foremost the most innovator in restructuring and diversifying the PepsiCo Beverage Industry. 

Click the link to view the Indra Nooyi’s video. List the transformative attributes of Indra Nooyi. How does Indra’s leadership style compare to your present-day leadership behaviors?

Discussion 4- Project Risk and Quality Mngt

Chapter 5: Project Risk Contexts and DriversChapter 6: Approach to Project Risk IdentificationInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Complete a risk analysis for a project involving a family vacation where a family of four is driving 1,000 miles one way to Myrtle Beach, SC to stay for one week at a coastal resort. Include the construction of a risk matrix.

Text
Title: Managing Project Risks ISBN: 9781119489733 Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards Publisher: John Wiley & Sons Publication Date: 2019-08-13

Internet Research Assignment #2: “Frankenstein” Synthetic Identity Theft

 “Frankenstein ID’s” refer to synthetic identities – a new type of fraud carried out by criminals that have created fictitious identities which are pieces of mismatched identities, some fake, some real, some even deceased.

Write a two-page paper describing the origin of this type of identity theft, how these criminals build these identities to commit fraud, and who are the likely targets of such fraud. Research and describe two cases of “Frankenstein” identity theft.

This paper should be at least three pages long, double spaced, with your name, date, and title included as a header, page numbering in the footer in the form of page x of y, and have references cited per APA formatting guidelines. You must use a minimum of five references and none of them can be Wikipedia. 

You currently work in an algorithm

  

You currently work in an algorithm development group for a large multimedia, mobile device corporation. Your group has been tasked with creating an app that will play an audio file backwards (from end to beginning rather than the standard beginning to end). Because this app is likely to be used on a mobile device, your group figures that this algorithm should use as little memory and space as possible. Your group has therefore decided to construct this reversal order algorithm such that it is an “in-place” algorithm. This simply means that the audio file will be loaded to memory and reversed using the same memory locations (because you must use memory sparingly).

Assignment

  • Part 1: Before attempting this implementation, you      choose to develop a simple prototype version of this algorithm in C++.      Specifically, you will build an in-place, order reversal algorithm. This      algorithm will take as an input an array of ints and will reverse the      order of the elements in the array, in place (essentially using only the      memory in the array). For example, if the array contains five elements      [1,2,3,4,5], the output of the algorithm will be [5,4,3,2,1]. Comment your      program.
  • Part 2: using this prototype, you will analyze the      time complexity and space complexity of your algorithm in the worst case.      Specifically, for time complexity, count the number of steps for each line      of code, and write down the total lines executed as a mathematical      expression where n is the size of the input array. For space complexity,      write an expression for the number of memory locations and components that      are required for algorithm in the worst case. (Assume that each int is one      location.)
  • Part 3: Program a      function, method or class that will track the true runtime of your      algorithm. Find the true runtime of your algorithm using arrays of varying      sizes (e.g., n = 500, n = 1,500, and n= 2,500) using your new tool. Plot,      on a Cartesian plane, the runtime of your algorithm as a function of the      size of the input array, n.

PowerPoint_3F_Report

PowerPoint_3F_Report

     

Open   the file named Student_PowerPoint_3F_Report.pptx downloaded with this project.

 

On Slide 3, in the content   placeholder, insert a Line with Markers chart.
  In the worksheet, enter the following data:
  In row 1, beginning in cell B1, enter Taxes, City Fees, Capital Grants
  In row 2, beginning in cell A2, enter Quarter 1, 8074, 4154, 3525
  In row 3, beginning in cell A3, enter Quarter 2, 6380, 3092, 3785
  In row 4, beginning in cell A4, enter Quarter 3, 6695, 3260, 4150
  In row 5, beginning in cell A5, enter Quarter 4, 7382, 6958, 2795

 

Apply Chart Style 7, and then   apply the Wipe entrance effect to the chart. 

 

Including the parentheses,   change the Chart Title to (IN THOUSANDS).

 

On Slide 4, in the content   placeholder, insert a Table with 2 columns and 5 rows.
  In the first row enter Item in the first cell and Description in the second cell.
  In the second row, in the first cell type Street Improvements and in the second cell, type Monroe Avenue   asphalt, signage, and street lighting
  In the third row, in the first cell type City Buildings and in the second cell, type Infrastructure   upgrades
  In the fourth row, in the first cell type Flood Control and in the second cell, type Main Street   storm drain replacement
  In the fifth row, in the first cell type City Parks and in the second cell, type Monterey Park   installation of two baseball diamonds

 

Change the height of the table   to 4.36“. Align the table text so   that it is centered horizontally and vertically within the cells. 

 

Apply table style Medium Style 3   – Accent 2, and then apply a Round Bevel effect to the first row.   Note—Depending on your version of PowerPoint, this may be named Circle Bevel.   Change the Font Size of the text in the first row to 24.

 

On Slide 5, in the content   placeholder, insert a Clustered Column chart. In the worksheet, enter the   following data:
  In row 1, beginning in cell B1: Year 1, Year 2, Year 3
  In row 2, beginning in cell A2: Land, 71534, 72823, 83653
  In row 3, beginning in cell A3: Structures, 95746, 95920, 97812
  In row 4, beginning in cell A4: Equipment, 35042, 33465, 39767
  In row 5, beginning in cell A5: Infrastructure, 111586, 121860, 125873

 

Apply Chart Style 4 to the   chart, and then remove the Chart Title element. 

 

Apply the Wipe entrance effect   to the chart. Change the Effect Options so that the animation is applied By   Series. 

 

Change the chart animation   Timing so that the animation starts After Previous.

 

Insert a Header & Footer on   the Notes and Handouts. Include the Date and time updated automatically, the   Page number, and a Footer with the text 3F_Report. Display the document   properties. As the Tags, type city council report

 

Save and close the file, and   then submit for grading.

2 Case Studies 1 Book Report and 2 LAB works.

Case Study 7.1

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a location that you would like to physically infiltrate.  List the areas you would need access to and the methods you would use to get access given the list of different security controls that could be in place.  Also, provide examples of ways you would avoid detection if confronted by someone at the location you are trying to infiltrate.    

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)

Case Study 7.2 

For this project, write a 3 to 4 page paper (not including title and reference page), conduct additional research and come up with a use for Base64 that involves the sending of encrypted letters. List some of the reasons you would need to use Base 64 and the methods you would use to send Base 64 messages  Also, provide examples of ways you would avoid detection if confronted by someone who gained access to your Base 64 encrypted letters..    

Writing Requirements

  • 3-4 pages in length  (excluding cover page, abstract, and reference list)

Book Report for Chapters 7, 8, 9, and 10

Each week you will write and submit a book report. The book report will include a review of chapters 7, 9, and 10 of the book. 

Writing Requirements

  • 3 pages in length
  • APA format, Use the APA template located in the Student Resource Center to complete the assignment.

Lab # 7-1 Base 64 Encoding and Decoding

This lab will familiarize the student with the use of Base 64 Encoding. The student will create a text file using one of the file editors (Nano, Vi, or Emacs), then the student will encode the file using base 64. The student will then save the encoded file to a test file.  Once the file is encoded the student will then decode the using the base 64 decode command.

Then the student will write a report on the process of base 64 encoding and decoding  

Lab # 7-2 Base 64 Encoding and Decoding (Scripting)

This lab will allow the student to create a script that will run the base 64 coder command “n” number of times and then allow for decoding “n” number of times upon request.

Then the student will write a report on the process of base 64 encoding and decoding using a script

Assignment

Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references. 450 words minimum

In today’s fast-paced, often “agile” software development, how can the secure design be implemented?