ACME, Inc.

ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection between our headquarters and our satellite offices. The two locations are approximately one mile apart and are in a heavily populated area.
You can make assumptions as to what technologies, cabling, etc. are available.
In a Word document, you need to lay out, how you would connect these two facilities together using what you feel to be the best solution.
Include a budget, figures are going to be a range, which is understood
What technologies, hardware, software, cabling, etc. are you using to make the connection
Why is your choice the best choice (justify!)?

Bass-Fineberg Leasing, Inc. v. Modern Auto Sales, Inc.

 

Decision and Remedy: A state intermediate appellate court affirmed the lower court’s order. The contract between Cipriani and Allie was void because Cipriani could not assign his rights under the lease without Bass-Fineberg’s written consent. Because the contract was void, the parties were to be returned to their pre-contract status, which included a refund of the $5,000 payment.

The repairs to the bus cost $1,341.50. Who should pay this amount? Why?

2016 Laureate Education, Inc

 

Scenario 1
Introduction: Police are summoned by the husband of the deceased after his wife was
found in their basement bedroom, dead from blunt force trauma to her head. Both the
husband, 56, and wife, 52, had been attending a funeral and the deceased decided to
leave early to come home and prepare for the luncheon for those attending the funeral.
Crime Scene: The victim was found lying on her back on the floor at the end of the bed.
The victim had died from blunt force trauma to her head, specifically her face. The killer
had obliterated the victim’s face with a blunt instrument, most likely a shoe worn by the
perpetrator. No other wounds were visible. The victim’s shirt top had been unbuttoned
and pulled back to either side, revealing the victim’s bra. Her outer pants had also been
unbuckled and partially pulled down. Her panties had not been removed. A pillow lay
against the left side of her face. An opened bottle of Vaseline was near the body. The
rest of the room appeared not to be disturbed. Upon closer inspection, a few hundred
dollars in cash had been removed from a desk drawer in the bedroom. In order to do so,
the desk chair would have had to be moved in order to gain access to the desk drawer.
The chair had been placed back in its original position against the front of the desk. A
sliding glass door was partially open and partial shoe prints were visible due to the
tracking of blood from the crime scene, out the glass sliding door, across the lawn, and
over the back fence.
Questions to ponder:
 Who is the most likely to be the killer? A family member? A relative? An
acquaintance? A stranger? Why?
 What can you determine from the crime scene?
 What additional information do you need to help solve this case?
 What was the primary motivation for the crime?
 Are there sexual components to this crime scene?
 Are any of the following crime scene elements present: Staging, Undoing,
Posing, and Signatures?
Scenario 2
Introduction: A girl, 15, and her boyfriend, 16, are found dead late one evening in the
boyfriend’s Volkswagen Beetle, parked behind some tennis courts in an area of a small
town that has low crime rates. They were eating a pizza when both of the victims were
shot to death while sitting in the car. Both victims were good students. She was on the
cheerleading squad, and he was on the high school football team. Neither had any
known enemies. Their parents were devastated. The girl’s mother and stepfather were
home watching a movie the evening of the shooting, as were the parents of the male
victim. No one could offer any insights as to the motivation for such random killings.
© 2016 Laureate Education, Inc. Page 2 of 2
Crime Scene: The female victim had been shot once point blank in the head. Her car
window had been rolled down. The male victim was also shot once through the open
window. He was hit in his right side and bled out in a few minutes. No expended shell
casings were found. The driver’s window was closed. A partially eaten pizza lay in a box
on the lap of the female victim. Nothing was stolen. There was no apparent sexual
assault. No drugs were found nor were they using drugs or alcohol. There were no
reports of any violent crimes in the area for several years.
Questions to ponder:
 Who would carry out such random acts of violence?
 What could be some of the motivations for the killings?
 Do you think there could have been a sexual component to this crime?
 Where would you begin your investigation?
 Who might be able to give you clues to the killer’s identity?
Scenario 3
Introduction: A 15-year-old girl’s body was found just off a park pathway not far from a
pub at about 6:00 a.m. She had been drinking the night before and was seen leaving
the party alone at about 11:00 p.m. She was known to party often and was used to
walking by herself. Her parents had a hard time controlling her behavior. She liked to
dress provocatively and stay out late.
Crime Scene: Victim was found lying in a grassy area, face up. Her throat was slashed
so severely that she was almost decapitated. Her pants had been removed and a near
perfect, circle-shaped incision about the size of an average apple was made through
her lower abdominal wall. Her small intestines had been removed and placed on her
body next to the incision. The victim had not been raped. No one had heard any
screaming or calls for help.
Questions to ponder:
 Who is the most likely to be the killer?
 What can you determine from the crime scene?
 Was this a sex crime?
 What do you think was the primary motivation for this brutal crime?
 Are any of the following crime scene elements present: Staging,
Undoing, Posing, and Signatures?
 Is this the type of crime that the offender might do again?

Orgasm, Inc.

Pharmaceuticals, marketing and sexuality
Write a short proposal (about 250 words – about 1-2 paragraphs) stating the documentary and social issue you will be evaluating in your research paper. This paragraph will be your initial plan for your research. You will be required to research 8 sources for this paper, two of which may be articles from our book. Your post to the “Documentary/Topics DB” should be a paragraph-length proposal should answer the following questions:

  1. What documentary did you settle on? What is the social issue it addresses? What is the position you think that the documentary takes on the issue? What might some opposing ideas be against the documentaries’ stance? What sorts of data and research will help you evaluate the work of the documentary?
  2. Be prepared to rhetorically evaluate the movie – what sorts of emotional persuasion are used (what you agree with the documentarian’s position or not), analyze how the issue is framed and presented to the viewer. If you have already watched the film, describe a specific scene that you think is important in the movie that you will analyze the rhetorical tools employed by the filmmaker.
  3. What are scholarly sources that would be good to find the most credible work from a variety of sources and institutions?
  4. List some subsidiary questions (smaller questions) you will have to answer as you are answering your main question. If the topic is very general, please be prepared to narrow the focus of your research. For example, if you’re analyzing problems associated with food processing and corporations – you may decide to just narrow your research to “organic” food definitions and whether those are useful regulations for the public or not. It is a better idea to narrow the focus of your research because you can to address something meaningfully within the 8-10 page requirement.

Cyber attack on Universal Health Services, Inc., 2018

 

Ransomware is a type of malware from crypto virology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. While some simple ransomware may lock the system so that it is not difficult for a knowledgeable person to reverse, more advanced malware uses a technique called crypto viral extortion. It encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt. Ransomware attacks are typically carried out using a Trojan disguised as a legitimate file that the user is tricked into downloading or opening when it arrives as an email attachment. International law enforcement authorities during the height of the pandemic warned that hospitals and health-care facilities in multiple countries were being targeted in ransomware attacks.

Often a ransomware attack is the first phase of a multistage extortion attempt from cyber criminals. Criminals routinely demand millions of dollars to unlock the encrypted systems, and then follow that up by threatening to publish stolen data on the internet if they are not paid a second time.

On September 28, 2020, until October 7, 2020, Universal Health Services, which runs more than 400 healthcare facilities in the United States and the United Kingdom, has more than 90,000 employees and cares for about 3.5 million patients each year, had its IT network hit by a ransomware attack which left a number of its hospitals in the United States without access to computer and phone systems, including facilities in California, Florida, Texas, Arizona and Washington, D.C.

The ransomware attack managed to disable multiple antivirus programs in place on the targeted systems. Once the antivirus software was disabled, the malware caused the computers to log out and shut down, and if administrators attempted to reboot these systems, they simply shut down again. With their systems shut down, clinicians were unable to access vital information, including data found in their Electronic Health Record (EHR) or picture archiving and communication system (PACS) system.

Your assignment:

In a MEMO format, in 1000-1200 words, please discuss the following about the Universal Health Services (UHS) Ransomware attack of September, 2020:

What went well with the response? What were the significant challenges with the response? In which ways could the response have been improved?

During Week One, we discussed Fayol’s Five Functions of Management: (a) Planning, (b) organizing, (c) coordinating, (d) commanding, and (e) controlling.

As the Chief Operating Officer (COO) at one of the (UHS) healthcare facilities in the United States or Territories (Universal Health Services, Locations; pick one), how would you augment your healthcare facility’s preparation and response to protect and mitigate against future cyberattacks? Discuss ways which you would use all five functions of Fayol’s Five Functions of Management, would influence the development of your plan.

 

The CEO of Murky Mining, Inc.

 

Mike Millionaire is the CEO of Murky Mining, Inc. Mike is not involved in the day-to-day operations of Murky Mining, Inc., and the company has incurred multiple violations under 33 U.S.C. § 1319. Could Mike Millionaire be charged or fined as an officer of the company? Would the fact that Mike Millionaire was not involved in the day-to-day operations of Murky Mining, Inc. be considered?
Explain each of the elements of the tort of negligence, providing examples of each in a business setting.
apa format , 500 words

 

ACME, Inc.

 

ACME, Inc. is growing like crazy! Now, we need to put into place a more secure and faster connection between our headquarters and our satellite offices. The two locations are approximately one mile apart and are in a heavily populated area.

You can make assumptions as to what technologies, cabling, etc. are available.

In a Word document, you need to lay out, how you would connect these two facilities together using what you feel to be the best solution.

– Include a budget, figures are going to be a range, which is understood

– What technologies, hardware, software, cabling, etc. are you using to make the connection

– Why is your choice the best choice (justify!)?

 

 

How to perform a Stress Test Under Scenarios of Adversity: Amazon, inc

 

“Financing plans typically work well if the assumptions on which they are based turn out to be accurate. However, this is an insufficient test in situations marked by volatile and unpredictable conditions. The test of the soundness of a 3-5 year plan is whether the continuity of the flow of funds to all strategically important programs can be maintained under various scenarios of adversity for the firm and/or the capital markets—or at least be maintained as well as your competitors are able to maintain the funding of their programs.”

Is there a stress-test process that I can follow to analyze Amazon? What would be the best path forward?

How to perform a Stress Test Under Scenarios of Adversity: Amazon, inc

 

“Financing plans typically work well if the assumptions on which they are based turn out to be accurate. However, this is an insufficient test in situations marked by volatile and unpredictable conditions. The test of the soundness of a 3-5 year plan is whether the continuity of the flow of funds to all strategically important programs can be maintained under various scenarios of adversity for the firm and/or the capital markets—or at least be maintained as well as your competitors are able to maintain the funding of their programs.”

Is there a stress-test process that I can follow to analyze Amazon? What would be the best path forward?