Benjamin Franklin is credited with the following quote, “In this world, nothing is said to be certain, except death and taxes.” In the United States, the Constitution defines the structure of the national government and dictates the scope and limitation of its powers. According to the US Constitution, under the Sixteenth Amendment, “Congress shall have power to lay and collect taxes on incomes.” But in addition to the United States Constitution, each state has its own constitution and therefore, its own body of constitutional law. Did you know states are allowed to impose and collect their own taxes, which is included but not limited to income taxes, sales tax, and property tax?

Benjamin Franklin is credited with the following quote, “In this world, nothing is said to be certain, except death and taxes.” In the United States, the Constitution defines the structure of the national government and dictates the scope and limitation of its powers. According to the US Constitution, under the Sixteenth Amendment, “Congress shall have power to lay and collect taxes on incomes.” But in addition to the United States Constitution, each state has its own constitution and therefore, its own body of constitutional law. Did you know states are allowed to impose and collect their own taxes, which is included but not limited to income taxes, sales tax, and property tax? Research your state’s income tax and discuss the following: State of Georgia Identify which state you researched, personal income tax rate for that state, state sales tax, state property tax, and any other tax levies. Identify any local taxes for your city. Everyone has to pay federal income tax, but state taxes vary. In Week 2 we studied how cost of living impacts different states, and now you can see some states’ income taxes are much higher than other states’. Discuss how your paycheck has been impacted by these taxes already, and if the information you learned today has influenced where you plan to live or retire someday.

Effective surveillance system | Principles and Theory of Security Issues | American Military University

What are the two end results discussed in the assigned reading of an effective surveillance system? From both an external and internal perspective, what security measures are needed to accomplish these results and what issues serve as impediments concerning these security-related efforts? 
Need to be at least 350 words with APA citations. Can also use other sources in addition to the attachments I provided.

discuss the major types of organic molecules of the human body. Then, compare and contrast the kinds of chemical bonding exhibited by secondary and tertiary levels of protein structure.

Hello everyone,
Please discuss the major types of organic molecules of the human body. Then, compare and contrast the kinds of chemical bonding exhibited by secondary and tertiary levels of protein structure.
Use illustrations to support your discussion points.
1. Your original post must have a clear understanding of the topic and should be a minimum of 1 paragraph with at least 5 sentences

  Think of a work, school, or family situation, problem, or task you need to accomplish.  Discuss the hygiene and motivator factors using Herzberg’s Two-Factor Theory.  Then consider Dan Pink’s definition of motivators, would it be better to use extrinsic or intrinsic rewards?

 
Think of a work, school, or family situation, problem, or task you need to accomplish.  Discuss the hygiene and motivator factors using Herzberg’s Two-Factor Theory.  Then consider Dan Pink’s definition of motivators, would it be better to use extrinsic or intrinsic rewards?  Finally, based on your situation, would you be ‘satisfied’ or ‘not satisfied’, ‘dissatisfied’ or ‘not dissatisfied’?  Please be specific in your post.

A famous New York City hotel, Hotel Lux, is noted for its food as well as its luxury accommodations. Hotel Lux contracts with a famous chef, Chef Perlee, to become its head chef at $6,000 per month. The contract states that should Perlee leave the employment of Hotel Lux for any reason, he will not work as a chef for any hotel or restaurant in New York, New Jersey, or Pennsylvania for a period of one year. During the first six months of the contract, Hotel Lux extensively advertises Perlee as its head chef, and business at the hotel is excellent. Then a dispute arises between the hotel management and Perlee, and Perlee terminates his employment. One month later, he is hired by a famous New Jersey restaurant just across the New York state line. Hotel Lux learns of Perlee’s employment through a large advertisement in a New York City newspaper. It seeks to enjoin (prevent) Perlee from working in that restaurant as a chef for one year. Discuss how successful Hotel Lux will be in its action.

A famous New York City hotel, Hotel Lux, is noted for its food as well as its luxury accommodations. Hotel Lux contracts with a famous chef, Chef Perlee, to become its head chef at $6,000 per month. The contract states that should Perlee leave the employment of Hotel Lux for any reason, he will not work as a chef for any hotel or restaurant in New York, New Jersey, or Pennsylvania for a period of one year. During the first six months of the contract, Hotel Lux extensively advertises Perlee as its head chef, and business at the hotel is excellent. Then a dispute arises between the hotel management and Perlee, and Perlee terminates his employment. One month later, he is hired by a famous New Jersey restaurant just across the New York state line. Hotel Lux learns of Perlee’s employment through a large advertisement in a New York City newspaper. It seeks to enjoin (prevent) Perlee from working in that restaurant as a chef for one year. Discuss how successful Hotel Lux will be in its action.

List three approaches to message authentication. 3.2 What is a message authentication code? 3.4 What properties must a hash function have to be useful for message authentication?

ASSIGNMENT

3.1 List three approaches to message authentication.
3.2 What is a message authentication code?
3.4 What properties must a hash function have to be useful for message authentication?
3.5 In the context of a hash function, what is a compression function?
3.6 What are the principal ingredients of a public-key cryptosystem?
3.7 List and briefly define three uses of a public-key cryptosystem.
3.8 What is the difference between a private key and a secret key?
3.9 What is a digital signature?

Complete your answers on a WORD Document,

 The method section aims to provide sufficient detail about your research project to enable readers to replicate your study should they desire. The section is typically made up of three subsections: (1) Participants, (2) Materials, apparatus, and testing instruments, and (3) Procedure. Justify why you are using these methods. Participants subsection answers three questions: Who are your participants (demographic information), how many participants (approximate desired amount of people), and how are the participants selected for the study (random sampling; convenience sample, etc.)?

 
Assignment Content
Methods: The method section aims to provide sufficient detail about your research project to enable readers to replicate your study should they desire. The section is typically made up of three subsections: (1) Participants, (2) Materials, apparatus, and testing instruments, and (3) Procedure. Justify why you are using these methods.
Participants subsection answers three questions: Who are your participants (demographic information), how many participants (approximate desired amount of people), and how are the participants selected for the study (random sampling; convenience sample, etc.)? Include how any potential ethical concerns regarding your participants will be addressed.
The Materials subsection includes what assessment tools you will use in your study (e.g., survey, structured interview, observation). Also, include any additional apparatuses necessary for your study (e.g., informed consent forms, surveys, permissions, experimental materials, etc.). Please indicate whether your study is quantitative, qualitative, or mixed methods.
The Procedures subsection accounts for what the participants and researchers will perform during the study and the methodology used. In other words, how will you conduct your study? Give enough information to allow a replication of your method.
End this section with a description of the statistical analysis methods you propose. Include subheadings for all sections (APA format, left aligned, bold typed).

What type of team did the McDonalds brothers and Ray Kroc originally form? What aspects were positive, and which were negative? 2) What were the goals of the partnership? What were the team norms? Which additional team norms should have been added or updated?  3) What leadership style did Ray Kroc have? Was it effective? Why?

  NEED TO WATCH THE MOVIE REGARDING THE McDonalds brothers and Ray Kroc ON YOU TUBE. PLEASE DO NOT COPY OTHER WORK FROM ONLINE. GET TO ANSWER IN YOUR OWN WORDS BY WATCHING THROUGH THE FOLLOWING VIDEO.
” The Founder | Based on a True Story – YouTube “
PLEASE ANSWER THE EACH QUEST WITH THE 1,2,3…7
The Founder – Team Project Assignment
1) What type of team did the McDonalds brothers and Ray Kroc originally form? What aspects were positive, and which were negative?
2) What were the goals of the partnership? What were the team norms? Which additional team norms should have been added or updated? 
3) What leadership style did Ray Kroc have? Was it effective? Why?
4) How did Ray Kroc use power? Give three examples that support your team answer.
5) How did group emotion negatively affect the McDonalds brothers and Ray Kroc partnership? Give three examples that support your team answer.
6) Do you think “sucker aversion” drove Ray Kroc reaction to differentiate the real estate business venture from the McDonalds brothers? Explain why with concrete examples. 
7) Do you think “adaptive capacity” was an issue for the partnership. Explain why with concrete examples.

Develop and draw a network diagram of LOCAL AREA NETWORK for one Office Section only. You will be presenting only one of the LANs in the building. Draw only one LAN considering one of the offices in the main building.

BUSINESS CASE: New-Horizon Insurance Company needs your service to establish a new IT network.  Main parameters of the given case.
New-Horizon company has a four-story office building in the city. There are four offices in that building.  In each office, there will be

25 desktop computers
10 portable/laptop computers and need a wireless connection (WiFi)
One network printer for all employees in each section.
All office computers must have access to the network 

So, there are four local area networks in the building.
You should be developing and drawing network diagrams. Your name and the company name must be written on each diagram. You should label all network devices in your diagrams.
Question 1: 
Develop and draw a network diagram of LOCAL AREA NETWORK for one Office Section only. You will be presenting only one of the LANs in the building. Draw only one LAN considering one of the offices in the main building.
Question 2: 
Draw the block diagram for INTRANET to connect all LANs in the main building. All computers in the main building will be connected to each other with this network. There is one database for customer all transactions. All computers in the main building should have access to this database.  This is your Backbone Network Diagram.
Here you should represent all LANs by using a simplified LAN diagram that was covered during the virtual class. 
Question 3: 
Finally, you should be connecting all computers in the main building to the INTERNET as well.
Use https://www.draw.io  to develop/draw three network diagrams. And place them in your MS Word document and upload them.  
In your network diagram; You should write your name on the upper right section of the DRAW.io diagram and export it as JPEG. And insert into your answer MS Word document.
Rules and guidelines 
Follow proper guidelines 
If there is a diagram(s) then the word count is between min 100 and max 400 words.

Research a real-world company, such as Walmart, Starbucks, or Apple, that has expanded operations internationally. Write words on international supply chain management using the company that you researched as your focus. Your response should answer the following questions: What are the main elements of a global supply chain organization? What are the steps involved in producing an order and shipping it to the customer in a global environment? What are some of the advantages and disadvantages of expanding operations internationally or sourcing goods internationally?

Research a real-world company, such as Walmart, Starbucks, or Apple, that has expanded operations internationally. Write words on international supply chain management using the company that you researched as your focus. Your response should answer the following questions:
What are the main elements of a global supply chain organization?
What are the steps involved in producing an order and shipping it to the customer in a global environment?
What are some of the advantages and disadvantages of expanding operations internationally or sourcing goods internationally?
From manufacturing to the distribution of goods on an international scale, what are the main elements of a supply chain?
What are the steps involved in producing an order and shipping it to the customer?
What are some of the advantages and disadvantages of international operations?
Please site 2 or more sources.