Final Project

For your Final Project, you will create a capital investment plan proposal utilizing the health care business you selected in Week One as well as the answers to the Basic Information questions.  Refer to the websites for Sample Business Plans.  Create a capital investment plan proposal for your health care company that includes the following sections:

  1. Executive Summary: This section is a concise, one- to two-page/slide summary of a business report. It restates the purpose of the report, highlights the major points of the report, and describes any results, conclusions, or recommendations from the report.
  2. Service and/or Equipment Description: This section should be at least one page/slide. Describe the service or equipment suggested in the business proposal and the reasons why this is socially and politically beneficial for the community in meeting consumer demands.
  3. Establishing the Team: This section should be at least one page/slide and include a chart that illustrates the structure of the capital investment team.  In addition, provide a summary of your team (background, responsibilities, etc.).
  4. Key Strategic Goals: This section should be at least one page and include specific funding sources for the capital investment.
  5. Financial Analysis: Projected income statement and types of assumptions made to compute the figures. 
    • Typical income statement assumption information requirements.  Initial investment
    • What types of revenue will be generated from the capital investment?  Will insurance reimburse?  If so, discuss the impact of the various reimbursements (e.g., Medicare, Medicaid, private, or self-pay).
    • How many services will be offered to produce the revenue (by month)? Look at patient days.
    • How much labor will be required (FTEs)?
    • What will the labor cost?
    • How many (and what types of) supplies and/or devices will be required to offer the service?
    • What will the supplies, drugs, and/or devices cost?
    • How much space will be required?  Are renovation costs involved?
    • What will the required space occupancy cost?
    • What is the life of the equipment (if applicable) and the cost of maintaining the equipment?
      • Cash flows:
      • Payback period
      • Internal rate of return
      • Assume discount rate of 8% and 6% respectively for comparison purposes.

    Submit your proposal using a presentation tool such as PowerPoint. Your Capital Investment Plan Proposal should include a title page/slide and table of contents (section names and page numbers). In addition, include detailed speaker notes that are grammatically correct.  You may also submit a written report to go along with your presentation, but you should still include detailed speaker notes.
    Completing the Final Project

    The Final Project:

    1. Must be 8 to 10 double-spaced pages/slides in length, and formatted according to APA style as outlined in the Ashford Writing Center.
    2. Must include a title page/slide with the following:
      1. Title of project
      2. Student’s name
      3. Course name and number
      4. Instructor’s name
      5. Date submitted
    3. Must begin with a succinct thesis statement.
    4. Must address the topic of the project with critical thought.
    5. Must end with a conclusion that reaffirms your thesis.
    6. Must use at least four scholarly sources that are cited according to APA format as outlined in the Ashford Writing Center..
    7. Must include a separate reference page/slidethat is formatted according to APA style as outlined in the Ashford Writing Center.

Your first milestone consists of two deliverables: a Visio diagram that depicts your interpretation of the current network and a written summary of network vulnerabilities that you uncover. Your network diagram doesn’t have to depict every object. Instead, you can summarize objects.

Good general guidelines for your diagram are as follows:

1. The diagram fits on one page.

2. Your name is on the diagram.

3. Your diagram has a title or heading that contains the assignment number.

4. It is formatted nicely to make it easy to understand.

5. The objects in the diagram are clearly identified.

6. When a single object is used to represent multiple objects, it is labeled to show the correct numbers.

7. Connections are labeled.

Your written summary is an explanation of the network, system, and server assets along with any vulnerabilities you may observe. This should be done in Microsoft Word and should follow standard academic formatting with proper attention to spelling, grammar, punctuation, etc. Make sure you include a brief introduction explaining your document.

Harry & Mae’s Case Study:

“Welcome! I’m Tom Pierce, the president of Harry and Mae’s Inc. Recently, my company suffered a security breach where hackers obtained credit card data on over 25,000 of our customers. I need your expertise to ensure this doesn’t happen again. Come on, let’s get started. First, I’ll give you a little background about my company and then I will go into detail about the security we currently have in place.

Harry and Mae’s Inc. is a diner franchise that supports over 100 diners located in New York, New Jersey, Delaware, and Pennsylvania. Harry and Mae Pierce started the original Harry and Mae’s diner with two railroad passenger cars back in 1954. Since then, his children and grandchildren have transformed the company from a single restaurant into a chain of restaurants, and, most recently, to a publicly traded franchise business. The franchise business provides restaurant owners with everything they need to open and run their own operation, including buildings, fixtures, restaurant products, support services, and food. As another service to franchise owners, we resell credit card payment processing services to them at competitive rates. Harry and Mae’s reimburses, up front, for credit card transactions that are funneled through their payment processing system as an incentive for franchise owners to use our services.

As for location of the corporate headquarters, Harry and Mae Inc. call Windsor, Pennsylvania home. Both of the corporate headquarters and warehouses are located there. We built the campus from the ground up at that location because it was central to our operation and both the business climate and tax structure were favorable. The campus currently employs slightly over 400 people that see to the day to day business operations.

What about our physical security, you may be asking. Well, the campus’ physical security system was designed by a retired Army general. Its main features include a perimeter fence, cameras, smart card access points, alarms, and a full-time security staff.

The campus also features a three-layer wired network infrastructure. Plus, it has full wireless access provided by an Aruba Networks grid. Comcast Business Solutions provides Harry and Mae’s with Internet. We have a number of security appliances and devices already in place, but I’m not sure how effective they are. As for the active directory domain, there is a single one for the entire campus. It was configured using default settings, and uses the default domain group policy with one exception. Password history and complexity requirements have been disabled to make it easier for employees to use passwords they can remember and reuse them if they want. The rationale for making this change was that I had difficulty remembering my password, so I began to write it down. A member of the cleaning crew saw it and used my machine to view pornographic material. When I discovered the breach, I fired the person responsible and directed the password policy change. Bellevue University As of March 2015 Page 2 of 6

Our headquarters also features servers, and web hosting; however, the specifics for each are a bit detailed. Next, let’s focus on the on and off campus workstations. The company has over 400 Dell Optiplex 3020 workstations on campus. Each computer is installed with Windows 7. Plus, all computers are joined to the company’s Active Directory domain. Off campus, the default configuration for new restaurants consists of a high speed Internet connection supplied by a local provider, a Network Address Translation firewall device that includes a wireless access point, an office computer, and two point-of-sale computer systems that include credit card processing software. Even though we try to stay up-to-date with the latest software and hardware, our system is not immune to failure. While all employees have user names and passwords for the system, there have been problems with computers becoming infected with malware because the point-of-sale software can be minimized.

Now that I’ve explained the history and background of my company as well as the infrastructure of our system, it’s time to get to work. Visit your course site to check out your assignment. Be sure to ask your instructor any questions that arise. Good luck!

IT & Security Infrastructure

Below are details on the Information Technology and Security infrastructure, policies, and equipment currently in place at the client.

Physical security:

The campus physical security system was designed by a retired Army general. Its main features include a perimeter fence, cameras, smart card access points, alarms, and a full-time security staff. Access to all buildings on campus is restricted through smart cards. The server room is a 1600 square foot building within the main headquarters building. It has climate control, redundant uninterruptable power supplies (UPS), and a generator with enough capacity for 36 hours of uninterrupted operation. The walls, floor and ceiling are constructed of reinforced concrete and are two feet thick. In addition, the entire building is shielded against electromagnetic radiation. It has an outer set of vault doors and an inner door that is equipped with a biometric scanner. The interior of the room is equipped with fire, water, and motion sensors, as well as cameras. The sensor and video feeds from the campus are centrally monitored by a staff of three people 24 hours a day, seven days a week.

Wired network Infrastructure:

The wired network infrastructure consists of three layers. The innermost layer consists of consists of two Cisco Nexus 7000 switches populated with M1-Series 8-port fiber optic switches running NX-OS Release 5.0. These switches provide fully redundant 10Gbit connectivity between servers, to the Internet, and to the second layer. The second layer consists of a 10 Gbit dual fiber ring that provides connectivity between the core network and 2 Cisco ME 3600X Series Ethernet Access Switches located in each building on campus. The third layer consists of Gigabit copper local area networks that connect computers and Power over Ethernet (PoE) Bellevue University As of March 2015 Page 3 of 6

phones with Cisco 2960-S PoE switches that are located in communication closets in close proximity to their users. Each subnet in the third layer is connected to the second layer through both Cisco ME 3600X Series Ethernet Access Switches that provide access to the fiber ring for the building. Layers 1 and 2 are fully redundant. Layer 3 doesn’t provide redundant connections, but less than 50% of the available ports are used on each switch. The communication closets are equipped with patch panels that would permit network administrators to manually bypass a defective switch.

Wireless connectivity on the campus:

The campus has full wireless access provided by an Aruba Networks grid. There are two Aruba 6000 Modular Mobility Controllers serving over 100 Aruba Networks AP-125 wireless access points. The wireless network interfaces directly with the corporate headquarters wired network. The mobility controller has the ability to serve as a firewall, but the default settings currently allow all traffic in both directions. In addition, the president of the company has directed that the current wireless system be configured to provide open access without logon capability because he wants to make it as easy as possible for employees to use their mobile devices. When asked about potential security issues, he said that the convenience of mobile devices outweighs the risk. He is emphatically supporting BYOD throughout the company. He had his physical security consultant walk the perimeter with a mobile device to confirm that the signals from wireless devices on the campus were too weak to register.


The Internet connection for the company is provided by Comcast Business Services. Comcast provides a fully redundant 1000Mbps down and 50Mbps up fiber connection to the campus on a fully redundant dual fiber ring consisting of two fiber pairs.

Security appliances:

The campus network has two Dell SonicWAll NSA 4600 Firewall Security Appliances that connect the Comcast Internet connections to the core network. These two devices are currently configured to allow all traffic in both directions. These devices are capable of up to 1000 VPN connections each. However, the company chooses to forward VPN traffic through the firewalls and handle it using a Microsoft PPTP solution.

The campus also has two Barracuda Spam & Virus Firewall 300 appliances. These devices are located on the core network, and all mail traffic is forwarded through them. However, the company has not activated the subscription that updates the signature files, and some users are Bellevue University As of March 2015 Page 4 of 6

complaining about excessive SPAM. Other users (especially Sales and Accounts) are complaining about missing email.

Active Directory Domain:

There is a single Active Directory domain for the entire campus with two Domain Controllers. It was configured using default settings, and uses the default domain group policy with one exception: password history and complexity requirements have been disabled to make it easier for employees to use passwords they can remember and reuse them if they want. The rationale for making this change was that Tom Pierce had difficulty remembering his password, so he began writing it down. A member of the cleaning crew saw it and used Tom’s machine to view pornographic material. When Tom discovered the breach, he fired the person responsible and directed the password policy change. There are five members of the IT group with domain administrative privileges.

There is a second AD Organization Unit set by the Chief Financial Officer for the Accounting and Finance Group. In this OU, all administrative assistants are also administrators in order to quickly add or remove user accounts. This OU has full password complexity turned on.


The headquarters has a 200TByte HP StorageWorks Storage Area Network (SAN) that provides storage for 10 Hewlett Packard ProLiant DL380 G7 servers. The firmware and drivers was last updated in July 2013. The HP servers are running VMware vSphere Hypervisor (ESXi) version 5.1. On that virtual platform, the company currently hosts redundant virtual servers for their domain controllers, Inventory Tracking System (ITS) Point of Sale (POS) system, accounting system, payment processing system, email system, Web site with database support for active content, Windows Routing and Remote Access Server (used for VPN connections,) authentication services, and database management systems. All virtual machines are running Microsoft Windows Server 2012 Datacenter edition. The administrative staff elected to not install antivirus software on any of the virtual servers, as that would slow them down. After all, Web browsers are disabled on all servers and by policy administrators are not allowed direct access or email.

The Web servers (IIS) and Email servers (Microsoft Exchange Server 2010 SP3) have two network connections: an internal one and external one with a public IP address. There are no firewalls on the external connections. The Web Server uses SSLv3.0 for any sensitive pages along with certificates signed by Verisign. Web developers move web pages to the Web server using File Transfer Protocol (FTP). FTP is enabled for both internal and external networks, as some programmers access the Web server from home. Security is enabled, so they must log in using Bellevue University As of March 2015 Page 5 of 6

their Active Directory user accounts. In addition, the system administrators have discovered that FTP is a convenient way to move files, and they often log in using their accounts, as well. Using the FTP server as a staging server, it is possible to move files from the outside to the Web server, and then from the Web server to a workstation.

Web hosting:

The Web server is used to host the company’s web site. The site has two parts that are both hosted on the same server, a public part that is available over the Internet using the company’s URL, and a “private” part that is available on the internal network only that is accessible only by using the internal URL http://www.haryandmae.local. Employees can log into the “private” Web site using their Windows login credentials and view their pay statements, work performance reports, vacation time, and other personal information.

The franchise owner in Scranton, PA purchased and uses the domain for customers at his three restaurants. He also has an active Facebook page and Twitter and Instagram accounts. He often runs contest using these sites.

Campus workstations:

The company has over 400 Dell Optiplex 3020 workstations with Windows 7 Professional installed. All computers are joined to the company’s Active Directory domain. These computers are configured for IPv4 only, and IPSec is disabled by group policy. All workstations have Symantec Endpoint Protection installed. About 1/3 of employees have local administrator access in order to install and run applications. The company uses WSUS to update Microsoft applications. There is no standard process for updating other programs.

In spite of the new relaxed password rules, some employees still write their passwords down, and they can be found taped to the inside of drawers, on the bottom of mouse pads, or on notes stuck to their monitors. The company uses a Web front end for all of its applications, and the workstations are capable of accessing them using Microsoft’s Internet Explorer. IE10 is the company standard. Some employees have installed and use other browsers. Remote users have access to the same applications via the VPN.

Off campus:

The default configuration for new restaurants consists of a high speed Internet connection supplied by a local provider, a Network Address Translation (NAT) firewall device that includes a wireless access point, an office computer, and two point-of-sale computer systems that include Bellevue University As of March 2015 Page 6 of 6

credit card processing software. The WAP router at each store is procured and set-up by the franchise owner. All franchises are supposed to have free Internet WiFi for customers. All computers are Microsoft Windows 7 machines with Norton Antivirus software. All employees have user names and passwords for the system. There have been problems with computers becoming infected with malware because the point-of-sale software can be minimized. Point-of-sale computers connect with the corporate headquarters for payment processing using Microsoft PPTP VPN clients on each machine”.

Use the Internet and / or Strayer databases to research budget planning and control. Imagine that the company that you currently work for, have previously worked for, or would like to work for in the future has tasked you with preparing a budget plan.

Write a Five to Six (5-6) page paper in which you:

  1. Describe the company that you currently work for, have previously worked for, or would like to work for in the future. Determine at least two (2) compelling reasons that this company should prepare and manage a budget. Predict the two (2) most likely positive and negative financial outcomes for this company if it properly or improperly performs effective budgeting.
  2. Outline a high-level budget plan for the company. In your high-level budget plan, recommend the most appropriate budgeting phases for the company.
  3. Propose two (2) methods and techniques that the company should use to manage its budget over time in preparation for the fact that budgets are ever changing. Justify your response.
  4. Imagine that the company is facing a financial challenge that is causing the actual amounts of money that it spends to become significantly off target from its budgeted amounts. Prepare an action plan to resolve the budget misalignment. In your action plan, recommend at least one (1) budgeting technique to resolve the budget and actual discrepancies. Provide a rationale for your response.
  5. Use at least three (3) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources.

Assignment 2: Attentional Blink

There are many stimuli in your environment of which you are
not aware. You use attention to filter out unimportant stimuli and focus
on relevant stimuli. However, there are circumstances under which you
cannot perceive stimuli, regardless of how hard you “pay attention.” One
situation is when visual stimuli are presented in quick succession. If
the interval between the two stimuli is short enough, you do not
perceive the second stimulus. This lapse in attention is known as
attentional blink. In this assignment, you will experience the
attentional blink for yourself and will also read about practical
implications of the phenomenon.

Access the CogLab demonstrationAttentional Blink. Follow the instructions to complete the demonstration.

Read the following article:

  • Livesey, E. J., Harris, I. M., & Harris, J. A.
    (2009). Attentional changes during implicit learning: Signal validity
    protects a target stimulus from the attentional blink.Journal of Experimental Psychology: Learning, Memory, and Cognition,35(2), 408-408-422. doi:10.1037/a0014525 (ProQuest Document ID: 614494049) Retrieved from

Using the experience from the CogLab
demonstration and information from the article, write a paper that
addresses the following:

  • Explain how the attentional blink relates to
    attention. Analyze how the variation in time influences the
    probability of seeing the second target letter. Explain the
    circumstances under which the attentional blink can be eliminated.
  • In the CogLab demonstration, letters were used
    as targets. The target used can influence the duration of one’s
    attentional blink and whether the attentional blink even occurs.
    Complete the following tasks:

    • Propose at least two other targets that could be used to induce the attentional blink.
    • Predict the effect each of your suggested
      targets would have on the duration of one’s attentional blink as
      compared to the CogLab activity you completed.
    • Explain the reasoning behind your predictions.
  • Present and discuss at least three occupations
    in which workers’ performance could be adversely affected by
    attentional blink. Identify and explain the types of problems or
    mistakes that might occur in such occupations due to the
    attentional blink.
  • Several years ago, some vehicle models came
    with a heads-up display (HUD). Instead of looking down at a panel
    on the dashboard, speed, distance traveled, fuel level, and time
    appeared to be displayed over the hood of the car. Discuss this
    design in terms of divided attention and attentional blink. Do you
    think the design was a good idea?

Write a 4-page paper in Word format. Apply
APA standards to citation of sources. Use the following file naming
convention: LastnameFirstInitial_M2_A2.doc.

By Wednesday, August 7, 2013, deliver your assignment to the M2: Assignment 2 Dropbox.

Assignment 2 Grading Criteria

Maximum Points

Explained the phenomenon
of attention, described how time between targets affects the
probability of seeing the second target, and analyzed how it can be
eliminated or reduced in other conditions showing understanding and
application of cognitive psychology concepts.


Applied knowledge of
cognitive psychology concepts to propose other targets appropriate for
experiment, predict their effects on attentional blink, and provide an
explanation for predictions showing understanding and application of
cognitive psychology concepts.


Identified three
occupations that could adversely be affected by attentional blink and
explained the types of problems or mistakes that might occur in such
occupations due to attentional blink showing understanding and
application of cognitive psychology concepts.


Related the concepts of divided attention and attentional blink to explain the heads-up display (HUD) design.


Wrote in a clear, concise,
and organized manner; demonstrated ethical scholarship in accurate
representation and attribution of sources; displayed accurate spelling,
grammar, and punctuation.




assistance with any problems you may have when completing this
assignment—OR—to offer your assistance to classmates, please use the Problems and Solutions Discussion area located through the left side navigation link.

1. English Literature from the Anglo-Saxon period

 a. reflected oral poetry.
 b. recorded historical facts only.
 c. always used rhyming verse.
 d. was never expressed orally.

2. A scop was a person who

a. denounced poetry as immoral.
 b. denounced poetry as historically inaccurate.
 c. knew nothing about poetry.
 d. recited poetry and kept track of a tribe’s historical information.

3. “The Seafarer” differs from Beowulf because

 a. “The Seafarer” says that one must do no harm and be humble.
 b. “The Seafarer” is an epic tale of conquest.
 c. Beowulf regrets that good can never triumph over evil.
 d. Beowulf denounces warfare under any circumstances.

4. Why does the Seafarer enjoy the sea?

 a. He feels an unexplainable joy and excitement when sailing.

 b. He is free from his responsibilities on land.
 c. He can forget his lost love when he is at sea.
 d. He wants to prove his loyalty to his lord by enduring hardship.

5. According to lines 68–71 of “The Seafarer,” what is the speaker’s view of death?

 a. People can triumph over death with determination and hard work.
 b. Death is counterproductive to the will of God and Fate.
 c. A force beyond human control decides matters of life and death.
 d. Religious people do not die.

6. The fear that the speaker refers to in lines 41–42 of “The Seafarer” is an admission that 

 a. the Seafarer hates being a sailor.
 b. the Seafarer is cowardly.
 c. the Seafarer lacks faith in a higher power.
 d. a higher power is in control.

7. The first part of “The Seafarer” is the story of

 a. a man’s life on the sea.
 b. a sailor’s conversion to Christianity. 
 c. an exile’s lament for his country.
 d. an ocean storm off the coast of England.

8. What is the reason, despite all the hardships he has suffered, that the speaker in “The Seafarer” continues to follow the life of the sea?

 a. weary fatalism
 b. passionate curiosity
 c. religious vision
 d. material desires

9. According to “The Seafarer,” what happens to earthly success?

 a. Wealth and glory fade in a brief time.
 b. God punishes injustices committed by the wealthy.
 c. Fate rewards the righteous with wealth and glory.
 d. Wealthy people have greater responsibility.

10. Which of the following best describes the speaker’s message at the end of “The Seafarer”?

 a. Life at sea is both exhilarating and wearisome.
 b. Gifts of gold for heaven will not redeem a sinful soul.
 c. Those who walk with God shall be rewarded.
 d. The earth no longer flourishes in glory.

11. When reading Anglo-Saxon poetry, how does recognizing historical context help a reader understand why certain things happen?

 a. It gives the reader clues about the situation of the time in which the work was written.
 b. It helps readers restate in their own words what the poem says.
 c. It requires readers to use a dictionary to find the meanings of complicated words.
 d. It shows the reader how important correct spelling and grammar are.

12. Which element in “The Seafarer” is most characteristic of lyric poetry?

 a. regular rhythm and rhyme
 b. strong reliance on figurative language
 c. intense personal emotion
 d. narrative structure

13. The phrase “summer’s sentinel,” meaning a cuckoo, is an example of

 a. a kenning.
 b. a predicate.
 c. assonance.
 d. caesura.

14. In “The Seafarer,” the speaker finds comfort by

 a. accepting that the material world will fade away.
 b. losing faith in God and Fate.
 c. retiring from life at sea.
 d. realizing that earthly life is all that exists.

15. Who does Grendel’s mother kill to avenge the death of her son?

 a. Beowulf
 b. Hrothgar’s friend
 c. Hrothgar
 d. Wiglaf

16. When he says that God will decide the winner in the fight with Grendel, Beowulf

 a. expresses a wish to die.
 b. means that he is tired of fighting.
 c. shows that he respects Grendel.
 d. reaffirms his righteousness by respecting God’s will.

17. How do you know that Beowulf is an honorable man?

 a. He is willing to risk his life in order to earn fame by killing Grendel.
 b. He is known as a follower and cousin of Higlac.
 c. His father was the great Edgetho, a famous warrior.
 d. He refuses to use a sword to fight Grendel because Grendel has none.

18. Why does Beowulf come to see Hrothgar?

 a. He wants to help Hrothgar by killing Grendel.
 b. He has been sent into exile by the king of Geatland.
 c. He needs Hrothgar’s help against an enemy.
 d. He comes to seek shelter in Hrothgar’s hall.

19. If you interpret Beowulf as a statement about corruption, with Grendel representing organized crime and the mead hall representing society, you are accepting the poem as a(n) 

 a. metaphor.
 b. symbol.
 c. allegory.
 d. kenning.

20. After he becomes king of the Geats, Beowulf

 a. continues to fight for what he believes is right.
 b. becomes greedy and selfish.
 c. lets younger warriors defend his kingdom.
 d. loses his courage.

21. Read the following line from Beowulf and determine its meaning: “The monster’s / Thoughts were as quick as his greed or his claws . . .”

 a. He is hungry.
 b. He has intelligence.
 c. He has sharp claws.
 d. He is not trustworthy.

22. Why is it ironic that after his death the Geats build a tower to memorialize Beowulf?

 a. Beowulf requested that the tower be built.
 b. The treasure is left in the tower.
 c. Beowulf’s body has been cremated.
 d. Most of the Geats had deserted him in battle.

23. Read the following quotation from Beowulf and choose the best way to paraphrase the bolded words: “. . . they could hack at Grendel / From every side, trying to open / A path for his evil soul, but their points / Could not hurt him . . . .”

 a. to kill him
 b. to drive him out of the hall
 c. to turn his soul to God
 d. to help him escape

24. Beowulf finally dies

 a. after a fight with a dragon.
 b. as the result of a spell cast by Grendel’s mother. 
 c. in a fight with Wiglaf.
 d. after being stabbed in the back by one of his men.

25. What weapon does Beowulf use to kill Grendel?

 a. his sword
 b. his hands
 c. a dagger
 d. a lance

26. To what does the poet give credit for Beowulf’s victory over Grendel’s mother?

 a. God’s judgment
 b. Beowulf’s kindness
 c. good luck
 d. Beowulf’s powerful grip

27. How do you know that Beowulf is an epic poem?

 a. It is a poem about terrible monsters and dragons.
 b. It is a long poem that tells a story about a legendary hero.
 c. It tells about real events and real people of long ago.
 d. It was not written down at first but told by storytellers.

28. Why does Bede include a quotation from the Scots in A History of the English Church and People?

 a. He is trying to flatter the Scots.
 b. He wants to show how unreasonable the Scots were.
 c. He wants to provide a complete account of the British Isles.
 d. He has read the quotation in another work.

29. Which statement best describes the Venerable Bede?

 a. He claimed to have had mystic visions.
 b. He encouraged laws against pagan practices.
 c. He claimed to be the reincarnation of Saint John the Apostle.
 d. He wrote many historical accounts from a Christian perspective.

30. Bede performed a valuable function because he

 a. translated the works of the Greeks into Old English.
 b. translated the Bible into rustic Latin.
 c. protested the use of the vernacular.
 d. generated a history of Britain for the world.

31. According to Bede, who settled on the north end of Britain?

 a. the Scots
 b. the Picts
 c. the Britons
 d. the Irish

32. Why does Bede go into such detail in A History of the English Church and People to describe the kinds of shellfish found in Britain?

 a. He knows his readers are interested in the fish of the seacoast.
 b. He wants to show how varied and rich the waters of Britain are.
 c. He wants readers to know the Britons are well nourished.
 d. He is stressing the importance of the seacoast. 

33. What keeps Bede from being completely accurate in his A History of the English Church and People?

 a. He sometimes accepted unlikely stories as true.
 b. He usually did not tell where he got information.
 c. Much of his information comes from his own observations.
 d. He used the limited resources available to him at the time.

34. What does Bede feel most unifies the people of Britain in A History of the English Church and People?

 a. their love of the land
 b. their fear of the Picts
 c. their desire for peace
 d. their belief in and study of God’s truth

35. How does Ireland’s climate compare to Britain’s in A History of the English Church and People?

 a. It is much colder.
 b. It is much wetter.
 c. It is more variable.
 d. It is superior.

36. According to Bede, what is true of Ireland?

 a. It is the largest island.
 b. It gets lots of snow.
 c. It does not have any snakes.
 d. The climate is too warm.

37. Read these quotations from A History of the English Church and People. Based on the details they provide, which quotation is probably the most historically accurate?

 a. “I have heard that folk suffering from snakebite have drunk water in which scrapings from the leaves of books from Ireland have been steeped . . .”
 b. “On the opposite side of Britain, which lies open to the boundless ocean, lie the isles of the Orcades.”
 c. “As Saint Basil says: ‘Water receives its heat when it flows across certain metals, and becomes hot . . .’”
 d. “. . . almost everything in this isle enjoys immunity to poison . . .”

38. What was a reason Bede had for writing A History of the English Church and People?

 a. to compare Britain and Ireland
 b. to identify the languages spoken
 c. to describe the geography of Britain
 d. to record the history of Britain

39. Considering the time in which he wrote, which source would probably have provided Bede with the most reliable information that Britain had “twenty-eight noble cities”?

 a. personal experience
 b. testimony from sailors
 c. records from a monastic library
 d. accounts in letters

40. Which of the following seems to lend the greatest credibility to Bede’s work?

 a. the large amount of factual, specific, information
 b. his personal observations on climate
 c. the references to religion in Britain
 d. his descriptions of different customs

Determine whether each statement is true or false.

41. Comitatus refers to the social structure of Anglo-Saxon society.

 a. true
 b. false

42. An elegy is a poem that laments hardships and mourns the loss of a better time.

 a. true
 b. false

43. An epic is a long poem with a larger-than-life hero.

 a. true
 b. false

44. Vernacular refers to a language spoken by common people.

 a. true
 b. false

45. Beowulf kills Grendel by ripping his arm out by the roots.

 a. true
 b. false

46. Grendel attacks Beowulf to avenge the death of Grendel’s mother.

 a. true
 b. false

47. The vowel sounds of Old English are very different from those of modern English.

 a. true
 b. false

48. The base language for English, German, French, and Spanish is Indo-European.

 a. true
 b. false

49. Anglo-Saxon poetry was an oral as well as a written art.

 a. true
 b. false

50. Old English is a Germanic language.

 a. true
 b. false

Week 4 – Discussion 1

Your initial discussion thread is due on Day 3 (Thursday) and you have until Day 7 (Monday) to respond to your classmates. Your grade will reflect both the quality of your initial post and the depth of your responses. Reference the Discussion Forum Grading Rubric for guidance on how your discussion will be evaluated.

Id, Ego, and Superego

As with personality theories, Freud’s theory and other psychoanalytic theories may be difficult to test and prove in court. Analyze Freud’s theory and discuss the impact that it has on the development of criminal behavior. What roles do the Id, Ego, and Superego play in problematic behavior, and what influence do defensive mechanisms have on the development of criminal behavior?  Discuss the pros and cons of Freud’s theory and how you feel it would hold up in court.

Your initial post should be at least 250 words in length. Support your claims with examples from the required material(s) and/or other scholarly resources, and properly cite any references.

Week 9 Assignment – Problem-Solving Essay: Part 2


The 18th-century French writer known as Voltaire has been quoted as
having said, “No problem can withstand the assault of sustained

When faced with a problem, what do you do to solve it?

This assignment asks you to apply a six-step problem-solving process to a specific problem scenario.


You will write a paper that presents a synthesis of your ideas about solving the problem using this systematic approach.

  • Review the six-step problem-solving process outlined in the webtext.
  • Read the article, The Problem-Solving Process.
  • Write a 4–5 page paper in which you:
    • Define the problem in the scenario that you chose in the Week 7 assignment, Problem-Solving: Part 1.
    • Analyze the problem in the scenario.
    • Generate options for solving the problem in the scenario.
    • Evaluate the options for solving the problem.
    • Decide on the best option for solving the problem.
    • Explain how you will implement the chosen solution and reflect on whether this option was the most effective.

Please do not accept this question if you do not understand or cannot meet the deadline.

I need help with a memo based on the following and discussing the items below, this should be at least 600 words:

Emma Harrison is the Director
of Student Advising for Kingston State University. She has 20 Student Advisors
working for her who handle approximately 4,000 student complaints and problems
per month. Each Student Advisor earns a monthly salary of $2,000, including
benefits. The number of student issues varies each month, and in the past year
has been as low as 2,750 per month and as high as 4,200 per month. Emma has
been complaining that 20 Advisors is not enough to handle the level of student
issues and that the problem will get worse as enrollment is expected to
increase. In a recent study conducted by Emma, she found that it takes a
well-trained Student Advisor approximately one hour to handle a student issue.
This time varies, of course, depending upon the severity of the student issue.
While Kingston State University realizes that 20 Student Advisors is not enough
when student issues number 4,200 per month; however, during months when student
issues total only 2,750, 20 Student Advisors can adequately handle the student
issues. The Administration, therefore, concludes that 20 Student Advisors is
adequate for the current enrollment and will not agree to hire additional
Student Advisors until enrollment numbers increase by at least 10%.

that each Student Advisor works an 8 hour day which includes two 15-minute
breaks. Further, assume that each month has 22 working days. In the most recent
month, June, the Student Advisors handled 3,950 student issues.

has asked you to review this situation to help her make the case to hire
additional Student Advisors.

In a
memo to Emma, discuss the following:

type of cost center SBU Kingston State University appears to consider the
Student Advising department.

Kingston State University uses the discretionary-cost method to implement cost
SBU’s, what is the budgeted cost for Student Advising for June?

Kingston State University uses the engineered-cost method to implement cost
SBU’s, what is the budgeted cost for Student Advising for June?

an argument for Emma to hire additional Student Advisors.

Write a report based upon the Consequentialist ethical theories learned during the course of this milestone. Your instructor wants you and your co-workers to think about your own moral viewpoint. Analyze the motivation behind some of the decisions you have made and the actions you have taken and try to determine the extent to which you were motivated by self-interest. Have you ever done, what might be called, a purely altruistic act? Does this analysis of motivation lead you to believe that psychological egoism is an accurate description of how human beings live their lives? To what extent do you agree and if not, why? (Thiroux 44)

Review the Sample for Case Study , to complete this task and meet the expectations of how the case study is to be compiled.

You should cite all sources by using a number in parentheses after the sentence in which a source was utilized, keyed to a reference list below your completed answer with the full citation in MLA format. Like this:

Human beings have been described as “symbol-using animals” (Burke 3). An artistic example of this can be seen in Paul Klee’s “Twittering Machine” (Klee).

Works Cited

Burke, Kenneth. Language as Symbolic Action: Essays on Life, Literature, and Method. Berkeley: U of California P, 1966.

Klee, Paul. Twittering Machine. 1922. Museum of Modern Art, New York. The Artchive. “Klee: Twittering Machine.” 22 May 2006

Submission Specifications

  • Consequentialist Ethical Theory Case Study in a Microsoft Word document named LastnameFirstinitial_M1T2_CaseStudy_PHI1010.doc that includes:
    • 200-word (minimum) essay