Determine whether diversion programs are only beneficial to offenders charged with misdemeanors and non-violent felonies or whether they are also beneficial to offenders charged with felonies and violent crimes.

Go to the Department of Corrections’ Website for your state, and research two (2) of your state’s correctional facilities. Next, use the Internet and Strayer Library to research the budgetary constraints that correctional officials must adhere to in order to operate correctional facilities. Write a three to five (3-5) page paper in which you: Determine whether diversion programs are only […]

There is a lot of debate as to whether cyber-attacks are a huge threat. Do you see cyber networks as a legitimate vulnerability? Why or why not?

Please make sure that each question has the answer below it there are 3 questions total and must be separate answers Also the instructor said less citing s below are the pages that are to be used for each book U.S. Department of Homeland Security. 2013. National Infrastructure Protection Plan. Washington, DC: Government Printing Office. http://www.dhs.gov/sites/default/files/publications/National-Infrastructure-Protection-Plan-2013-508.pdf. Read Pages i-14 U.S. […]

Justify whether your data collection techniques will provide the kind of data you need to address your questions and whether you are effectively filtering out data that you do not need.Written Communication Expectations

Discussions Leadership Conference Poster Session This discussion provides an opportunity to connect your personalized leadership strengths and motivation with your skills as a leader to further develop into an efficient change agent. Being an effective leader who successfully implements change in a school or other organization can be a challenge! Kouzes and Posner (2007) claimed “leadership is an identifiable set […]

Provide a report to management of the firm as to whether or not it should continue to operate at a loss?

You’ve been hired by an unprofitable firm to determine whether it should shut down its unprofitable operation. The firm currently uses 70,000 workers to produce 300,000 units of output per day. The daily wage (per worker) is $100, and the price of the firm’s output is $30. The cost of other variable inputs is $500,000 per day. Although you don’t […]

Write an essay on whether various kinds of speech and content on the Internet should be restricted, such as hate speech, pornography, lewd material, sex chat rooms, and similar items.

The issue is whether various kinds of speech and content on the Internet should be restricted, such as hate speech, pornography, lewd material, sex chat rooms, and similar items. Others feel that only actual specific threats of violence and obscene material should be prohibited, and in some cases not even these categories. Please note that essays do NOT require citations, […]

Explain whether the hypothesis was rejected or accepted and what the implications of this finding are for the study.

Use the University Library or the Electronic Reserve Readings to locate a peer-reviewed article that reports original research and pertains to a specific, stated hypothesis that was used to validate a research study. Use major databases in the Online Collection and the key search words research studies in to obtain an article. Select communication, finance, economics, marketing, technology, or another […]

Decide whether each vignette constitutes sexual harassment, Why or why not?

Identifying Sexual Harassment Exercise i) Read the 5 brief vignettes depicting scenarios that may involve sexual harassment (provided). ii) In your group, decide: (1) Whether each vignette constitutes sexual harassment. Why or why not? (2) If the genders of the people involved were reversed, would the situation change? Why or why not? iii) Groups should submit a single document (1,000-1,500 […]

Explain whether or not records and traffic of telecommunications companies can be accessed by government officials without warrants in the interest of national security.

This is a debate on Security vs. Privacy and I am Pro Security and the Specific question is whether or not records and traffic of telecommunications companies can be accessed by government officials without warrants in the interest of national security. This paper needs to be rewritten and plagiarism free and convincing.