Part I of your paper will provide a brief history of AA, NA, OA, SA etc. – whichever 12-step group you attended.
Part II will describe your experience of the meeting. What were your thoughts? What transpired at the meeting? How did it impact you? The second part of the paper should be written in first person (your point of view).
This assignment is due on Sunday at 11:59 pm (PST). Please make sure to use APA style and write a minimum of 8 – 10 pages plus cover page and reference page. This assignment accounts for 30% of your grade. I will provide you with a rubric as well that explains how well you’ve done on each domain.[supanova_question]
1 6 Literature Review Jasmin Lyons Wilmington University Rebecca Lawton Capstone MHS
1
6
Literature Review
Jasmin Lyons
Wilmington University
Rebecca Lawton
Capstone MHS 7020
9 July 2021
Literature Review
The United States is still facing the threat of international and domestic terrorism and the challenges of securing its borders. Essentially, given the advancement in technology, terrorist groups are now shifting their focus to information warfare. While there may be an attempt to meet the information warfare tactics, the terrorist seems to be one step ahead of the system. More so, while the military counterterrorism program focuses on neutralizing, detecting, and preventing any attack directed towards the US, with cybersecurity being amongst the primary areas of focus, this has posed a challenge in halting various terrorist groups. This is considered a problem since most of the groups use cyber strikes against the US, often stealing crucial intelligence information to aid in organizing attacks. Furthermore, many critics establish that the US is still as vulnerable to terrorist attacks as before. This could be linked to the fact that more and more military personnel are becoming a part of the extremist groups. Ideally, this means that the war on terrorism calls for a concerted effort and effective strategies among the military emergency response team in order to ensure that all suspected terrorists are apprehended. The focus of the literature review is to establish how the emergency response management can help the US military to respond to terrorist attacks, measures that need to be taken by the military to ensure the effectiveness of the military response, and how the military emergency response can help deter or prevent future attacks in the US.
Ways in which the Emergency Response Management Can Help the US Military respond to Terrorist Attacks within the country.
The principal goal of any emergency response team is to ensure that the danger is reduced and the extent to which the events impact the society is relative to its pre-disaster condition. Considering that there are numerous actions that individuals in the emergency response management team can adopt in supporting the pre-and post-disaster, the focus is on reducing the possible effects to the point of its elimination. Regarding terrorist attacks, emergency response management plays an important role in helping the military respond to terror attacks (Bennett, 2018). The following section provides the various ways in which the management accomplishes the goal. This can be defined by informing the military on how to address terrorism attacks and their associated impact through four phases.
The first ways are by ensuring that the military is always prepared. Be?liu (2017) defines preparedness as the various activities conducted in a short time before the act of terrorism results. Through preparedness, the military tends to be more ready for the activity and thus can respond effectively. It is worth noting that being prepared helps shorten the time needed for the subsequent response phase, thus speed recovery. During this time, the military can detect the impending terror attacks and make appropriate plans to address response and recovery requirements (Bennett, 2018). Ideally, the focus is placed on having a ready response plan that can help in addressing the risk of attacks and how to respond to it, and recovery requirements.
The second way is defined by having an excellent understanding of the response activities. This involves events that should follow immediately after an attack, which should be mainly to assist the victims. The military needs to be well-informed on how to reduce life-threatening conditions, offer life-sustaining aid, and stop any further damage to the infrastructure. In addition, the emergency response management can educate the military about the search and rescue efforts. Another crucial area that the emergency response team can assist in is educating the military about the importance of recovery. In this case, the military may be involved in various support efforts that focus on enhancing the well-being of the victims (Bennett, 2018). Lastly is mitigation, which focuses on making sure that the activity does not reoccur.
Overall, emergency response management is integral in informing the military about the importance of being aware of the risk posed by terrorism on the citizens or critical infrastructure. Parallel to being prepared and how they mitigate the issue, the military is informed on the importance of having techniques for deterring or preventing the effectiveness of the attacks from reducing the overall consequences. According to Jones et al. (2021), in most cases, both the population and infrastructure are rendered susceptible to the attacks. Using geospatial data and tools, the military can effectively detect worrisome conditions at a given point in time. This can help them to design a deterrence mechanism that will prevent future attacks in such a location.
Measures that can be Taken from the Military to Ensure the Emergency Response is Effective in Deterring Future Attacks Within the US.
In recent times, the military succeeded in the fight against terrorism. Perhaps this could be associated with a drastic decline in terrorism attacks throughout the country. According to the article by Golden Age, Silke & Schmidt-Petersen, (2015) noted that there are notable measures that the emergency team can draw from the military to help in deterring future attacks. One crucial measure understands how and why it works. According to a growing body of evidence, the emergency response focuses more on the motivations of terrorism and counterterrorism, with little attention being given to strategies that the groups employ and the condition in which the strategies succeed or fail (Jones et al., 2021). With the military seeming to focus mainly on these areas, it is upon the emergency response to adopt the measure.
Notably, the emergency response needs to understand that effective counterstrategies cannot be created without first understanding the strategic logic behind terrorism. Jenkins (2020) noted that terrorism works not because they need to instill fear upon the target population; rather, it is because it wants the government and individuals to respond in ways that can aid their cause. Understanding this area has helped the military in combating terrorism since they have been vigilant enough to ensure terrorism does not understand their strategies. This could be sufficiently elaborated using the World Trade Center attack on September 11th, where al-Qaida’s primary aim was to raise the cost of the US in supporting Israel, Saudi Arabia, and other Arab regimes, thus provoking it into a military regime response that would help mobilize the Muslim globally (Silke & Schmidt-Petersen, 2015). Ideally, understanding the principal motive behind the attackers and the strategies they pursue to attain their goal is central in finding the most effective responses for preventing terrorism and protecting the country from future attacks.
Another measure that can be taken from the military by the emergency response is engagement. It is undeniable that counteracting terrorism calls for a more holistic approach defined by a strengthened outreach to and cooperation with partners across various sectors (Jenkins, 2020). The success in the military sector in the fight against terrorism has been facilitated by a smooth collaboration between the law enforcement agencies and the department of homeland security through information sharing. Using the approach, the military remains informed about the risk of terror attacks, associated suspects and proactively addressing various incidences (Jenkins, 2020). The adoption of such measures by the emergency response can help them be prepared to prevent future attacks, considering that they will always be informed about any impending danger and how they can avert it.
Ways through which the Military Emergency Response Can Help to Deter or Prevent Future Attacks in the US.
To help deter or prevent future attacks, a number of responses have been proposed by various scholars. One important measure that is debated is the use of tough security measures. The major issue revolving around the subject is whether the security measures can facilitate the safeguarding of the well-being of the citizen while curtailing their civil rights (Jr et al., 2021). Nonetheless, according to the military emergency response team, the fundamental consideration is that potential terrorists have the capacity to cause massive damages or even kill many people. Strict security measures like the use of targeted killing can be ethically justified since it is defensive and necessary. Besides, potential terrorists cannot be arrested or treated in the same way as American citizens (Gausden, 2009). Dealing directly with the terrorists means thwarting any threats that may risk the lives of thousands and millions of civilians.
Various scholars have gone further in justifying the use of tough security measures. However, the emphasis is placed when the authority wants to get certain intelligence information from a suspected terrorist. According to Jones et al. (2021), getting this information makes it possible to safeguard the citizens’ well-being without curtailing their civil rights. Besides, the events of 9/11 compelled most people to assert that torture is justified as a federal security counterterrorism approach in the interest of protecting the citizen’s civil rights (Chan, 2012). In such an instance, suspected terrorists would be treated with much greater measures compared to American civilians. It is also worth noting that combating terror is one of the emergency military significant commitments, which means that the ethical restrictions to law enforcement would be different when dealing with potential terrorists compared to when dealing with US citizens. The underlying moral justification is that terrorists have the capacity to cause mass killings and destruction and hence should not be handled in a similar manner as the American civilians. Furthermore, the human rights activists maintain that the conduct of counterterrorism must not encroach upon the security rights of the civilians (Gausden, 2009).
The second measure, considered as most effective, is the adoption of peace-making measures. Jr et al. (2021) considered it the ultimate alternative to any unjust system and can also help the offenders amend their ways. While terrorists may be considered as perpetrators, who act violently, without consideration for human well-being, solving violent acts with violent actions does not eradicate the problem from its roots (Gunaratna, 2017). Ideally, there is a need for the military emergency response team to write a policy in relation to measures that will effectively allow halting their activities to their entirety. Perhaps they need to develop a theoretical guidepost that will help in understanding the terrorist criminal thinking styles and various circumstances that set them on the pathway to violent extremism. While this may seem like the most basic response measure, other various preventive measures need to be identified to include both primary, secondary, and tertiary measures through arrest and prosecution of those found guilty.
According to Silke & Schmidt-Petersen (2015), the approach should be different from the prevailing tactical strategy in apprehending the groups that involve addressing violence. Although, for the longest time now, the use of peace-building measures has been neglected, it is perhaps the most effective response measure, which could act effectively in addressing the problem. This contrast with arguments forms various law enforcement agencies who establish that considering that terrorist groups are violent and thus need to be handled with violent means (Gunaratna, 2017). Unfortunately, while this has seen most perpetrators apprehended, this has not facilitated the solving of the issue. It is worth noting that the prevailing counterterrorism measure that the emergency military team is using is somehow ineffective.
Another critical measure is the creation of fusion centers. According to various pieces of evidence, the centers are integral in preventing terrorism since they focus on receiving, assessing, collecting, and allotting any threat-related information to the military emergency response (de Castro Garcia et al., 2017). Moreover, given that they are strategically located, the centers ensure sharing of information between the military and law enforcement partners, thus facilitating the stop, securing, and responding to terrorist acts. Most importantly, it is through fusion centers that the Department of Homeland Security can give trends in terrorism and criminal activities within the country, in turn, facilitating the pointing out of vulnerable domains (de Castro Garcia et al., 2017).
Furthermore, the military emergency response can focus on increasing their focus on counter-extremism education. This is identified as a form of training that ensures the military provides transparent reporting and oversight processes. For example, counter-extremism education may include training a military on identity signaling inside an extremist network to include symbols that may be displayed in the form of tattoos and apparel. Silke & Schmidt-Petersen (2015) establish that this may serve an essential function in ensuring that the military emergency response has a better understanding of counter-extremism, thus helping in preventing future attacks.
Conclusion
To sum up, terrorism, both domestic and international, is rising in the US and poses a threat to the nation. The intelligence community, among them the military, military emergency response, CIA, and the police department, have come up with various strategies to combat terrorism both at home and outside. The US military has put up various counterterrorism measures among them, remaining up to date with the terrorism motive, already planning how to deal with the attack, and various ways to punish the attackers. More measures are being put in place to control the manufacture of nuclear and biological weapons by other countries, which are a threat to the United States.
References
Bennett, B. T. (2018). Understanding, assessing, and responding to terrorism: protecting critical infrastructure and personnel (2nd ed.). Wiley Blackwell.
Chan, D. (2012). The Ethics of War and Law Enforcement in Defending Against
Terrorism. Social Philosophy Today, 28, 101-114. https://doi.org/10.5840/socphiltoday2012287
de Castro Garcia, A., Matei, F., & Bruneau, T. (2017). Combatting Terrorism Through Fusion
Centers: Useful Lessons from Other Experiences? International Journal of Intelligence and Counterintelligence, 30(4), 723-742. https://doi.org/10.1080/08850607.2017.1297119
Gausden, A. (2009). Law, Ethics, and the War on Terror. International Criminal Law
Review, 9(2), 437-439. Doi: 10.1163/157181209×444220
Gunaratna, R. (2017). Strategic Counter-Terrorism: A Game Changer in Fighting Terrorism? Jstor.org. https://www.jstor.org/stable/26351525?seq=1#metadata_info_tab_contents
JENKINS, B. M. (2020, September 17). The Future Role of the U.S. Armed Forces in Counterterrorism. Combating Terrorism Center at West Point. https://ctc.usma.edu/the-future-role-of-the-u-s-armed-forces-in-counterterrorism/
Jones, S. G., Doxsee, C., & Hwang, G. (2021). The Military, Police, and the Rise of Terrorism in the United States. Www.csis.org. https://www.csis.org/analysis/military-police-and-rise-terrorism-united-states
Jr, R. O., Tran, rew B., & Hawkins, D. (2021). The rise of domestic extremism in America. Washington Post. https://www.washingtonpost.com/investigations/interactive/2021/domestic-terrorism-data/
Silke, A., & Schmidt-Petersen, J. (2015). The Golden Age? What the 100 Most Cited Articles in Terrorism Studies Tell Us. Terrorism and Political Violence, 29(4), 692–712. https://doi.org/10.1080/09546553.2015.1064397[supanova_question]
An 8-10 slide presentation to your staff describing your analysis, linking what
An 8-10 slide presentation to your staff describing your analysis, linking what tools you utilized and why you chose those tools. You will use data to support your evidence-base financial decisions. You will also explain your recommendations to maximize stakeholder value, translating those to tactical outcomes to be implemented by your staff.
Introduction
This assessment builds on your prior work in Assessments 1 and 2. It is a presentation to your staff describing you analysis, linking what tools you utilized and why you chose those tools. You will use data to support your evidence-base financial decisions. You will also explain your recommendations to maximize stakeholder value, translating those to tactical outcomes to be implemented by your staff.
Apply the theories, models, and practices of finance to the financial management of an organization.
Analyze financing strategies to maximize stakeholder value.
Apply financial analyses to business planning and decision making.
Use data to support evidence-based financial decisions.
Scenario
The senior leadership has approved your recommendations to move forward. You are now tasked with operationalizing your recommendations. Meeting with your staff, you will translate recommendations to strategies and corresponding tactical objectives. You will explain how you used financial analysis to develop these recommendations, discussing the financial tools you will use to monitor implementation progress.
Your Role
You are one of the high-performing financial analyst managers at ABC Healthcare Corporation and are under consideration for a promotion to Director of Operations.
Requirements
Follow these steps to complete this presentation:
You are presenting to your staff a summary of the reports presented to senior leadership (Assessments 1 and 2).
Start by presenting the overall current financial condition of the company as presented to senior leadership (one to two slides).
Provide an overview of your analysis, linking what tools (financial statements, ratios, industry trends, capital structure) you utilized and why you chose these tools (two slides).
Link the data used to support your evidence-based financial decisions, providing justification for the recommendations (two slides).
State the recommendations focused on maximizing stakeholder value into strategies newly adopted by the company, i.e., expansion to a new geographical market, the development of a new dividend policy, changes in capital expenditures, reduction of workforce (one slide).
Translate those strategies to tactical objectives to be implemented by your staff, noting evidenced-based academic citations (one to two slides).
Discuss what financial tools you will use to monitor the progress of these tactics (one slide).
Deliverable Format
Be sure to use a bullet format in your slides but also include detailed narrative supported by relevant literature citations in the notes section.
Ensure written communication is free of errors that detract from the overall message and quality.
Use at least three scholarly resources.
Length: 8-10 content slides in addition to title and reference slides.
Use 12 point, Times New Roman.
Evaluation
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies through corresponding scoring guide criteria:
Competency 1: Apply the theories, models, and practices of finance to the financial management of an organization.
Demonstrate an understanding of key financial tools (financial statements, ratios, industry trends, capital structure, competitive analysis) by providing an overview of the analysis used supporting recommendations made in Assessments 1 and 2. Provide a rationale for why tools were utilized.
Competency 2: Analyze financing strategies to maximize stakeholder value.
Link the data used to support evidence-based recommendations, translating the recommendations to strategies focused on maximizing stakeholder value.
Competency 3: Apply financial analyses to business planning and decision making.
Translate strategies to tactical objectives to be implemented by staff, noting evidenced-based academic citations.
Competency 4: Use data to support evidence-based financial decisions.
Evaluate and recommend financial tools to be used to monitor the progress of these tactics.
Your course instructor will use the scoring guide to review your deliverable as if they were your CEO. Review the scoring guide prior to developing and submitting your assessment.
Financial Engineering to Enhance Shareholder Value Scoring Guide
Criteria
Non-performance
Basic
Proficient
Distinguished
Demonstrate an understanding of key financial tools (financial statements, ratios, industry trends, capital structure, competitive analysis) by providing an overview of the analysis used supporting recommendations made in Assessments 1 and 2. Provide a rationale for why tools were utilized.
Does not demonstrate an understanding of key financial tools (financial statements, ratios, industry trends, capital structure, competitive analysis) by providing an overview of the analysis used supporting recommendations made in Assessments1 and 2. Does not provide a rationale for why tools were utilized.
Demonstrates an understanding of key financial tools (financial statements, ratios, industry trends, capital structure, competitive analysis) by providing an overview of the analysis used supporting recommendations made in Assessments 1 and 2. But does not provide a rationale for why tools were utilized.
Demonstrates an understanding of key financial tools (financial statements, ratios, industry trends, capital structure, competitive analysis) by providing an overview of the analysis used supporting recommendations made in Assessments 1 and 2. Provides a rationale for why tools were utilized.
Demonstrates an understanding of key financial tools (financial statements, ratios, industry trends, capital structure, competitive analysis) by providing an overview of the analysis used supporting recommendations made in Assessments 1 and 2. Provides a rationale, supported by models and theories, for why such tools were utilized.
Link the data used to support evidence-based recommendations, translating the recommendations to strategies focused on maximizing stakeholder value.
Does not link the data used to support evidence-based recommendations and does not translate the recommendations to strategies focused on maximizing stakeholder value.
Links the data used to support evidence-based recommendations, but does not translate the recommendations to strategies focused on maximizing stakeholder value.
Links the data used to support evidence-based recommendations, translating the recommendations to strategies focused on maximizing stakeholder value.
Links the data used to support evidence-based recommendations, translating the recommendations to strategies focused on maximizing stakeholder value and citing various financial models and theories.
Translate strategies to tactical objectives to be implemented by staff, noting evidenced-based academic citations.
Does not translate strategies to tactical objectives to be implemented by staff, noting evidenced-based academic citations.
Translates strategies to tactical objectives to be implemented by staff, but does not not evidenced-based academic citations.
Translates strategies to tactical objectives to be implemented by staff, noting evidenced-based academic citations.
Translates strategies to tactical objectives to be implemented by staff, noting evidenced-based academic citations. Justifies tactics with historical examples and other qualitative information.
Evaluate and recommend financial tools to be used to monitor the progress of these tactics.
Does not discuss nor recommend financial tools to be used to monitor the progress of these tactics.
Discusses but does not recommend financial tools to be used to monitor the progress of these tactics.
Evaluates and recommends financial tools to be used to monitor the progress of these tactics.
Analyzes and recommends financial tools to be used to monitor the progress of these tactics, providing a rationale for the recommendations.[supanova_question]
Assessment 3 Instructions: Performance Evaluation Write a 1-2 page executive summary, along
Writing Assignment Help Assessment 3 Instructions: Performance Evaluation
Write a 1-2 page executive summary, along with an appendix of supporting information, in which you analyze an organization’s financial performance as well as their level of risk for lending and make and present a recommendation to help leadership make a loan decision.
Introduction
This portfolio work project will help you complete a thorough review of an organization’s financial performance as well as their level of risk for lending. Your recommendation will help leadership create a loan portfolio, and your executive summary will clearly and concisely communicate your review to others in the organization.
Scenario
You work for an organization that provides loans to businesses. You are working with a client who is requesting a loan that will require a review of financial and related performance documents. You have been asked to review the documents and summarize your findings in a loan recommendation for your management team.
You may apply this scenario to the described in Requirements below.
Your Role
You are a loan manager for a lending organization, and your responsibilities include reviewing loan requests and providing recommendations in regard to whether the loan requests should be funded.
Requirements
Your client works for Ace Company. Assume Ace Company requested a $3 million 10-year loan to purchase production equipment and develop accompanying software. Use the Ace Company Data document for this option.
Loan Recommendation
To arrive at your recommendation, analyze the financial performance of the requesting company and present it to your organization’s upper-management team. The management team will take your recommendation into consideration as they finalize loan requests.
Analyze the company’s performance and performance trends. Include the following in your analysis:
Analyze the trend for accounts receivable collections.
Identify the trend.
Explain the relevance of the trend.
Determine if the trend is improving or getting worse.
Compare the company’s average inventory turnover to the industry average inventory turnover rate. Note that the average industry turnover rate for Ace Company is 10 times per year.
Consider whether the company’s average inventory turnover is higher or lower than the industry average.
Explain whether a higher or lower average is better.
Determine whether the trend is improving or getting worse.
Evaluate the company’s short-term and long-term credit worthiness based on financial performance and trend (comparing this year to last year). Include in your evaluation:
Information about performance and trends.
Information about other relevant financial information you consider important to the decision.
Your recommendation regarding whether the bank should grant the loan based on the financial data.
Deliverable Format
The management team of your organization requests this information in the form of a 1–2 page executive summary along with a title page, references page, and appendix of supporting information. The executive summary must highlight the key findings from your review and will provide your recommendation and rationale. The appendix must include data used in your analysis for others to review. Assume that this document is the only communication in regard to your analysis and recommendation and that you will not be with the team to explain anything as it deliberates. In other words, the documentation you provide must be well organized and include information for the management team to clearly see your recommendation and rationale.
Related company report standards:
The executive summary is a professional document and should therefore follow the corresponding MBA Academic and Professional Document Guidelines, including single-spaced paragraphs.
In addition to the executive summary, include:
A title page.
A references page.
Appendix with supporting materials. If you are using a firm or scenario of your choosing, ensure faculty has sufficient information to understand how you reached your recommendation.
At least two APA-formatted references.
Evaluation
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies through corresponding scoring guide criteria:
Competency 1: Explain how accounting concepts and practices impact financial reporting.
Analyze the trend for the company’s accounts receivable collections.
Compare the company’s average inventory turnover ratio to an industry average.
Competency 2: Apply principles of accounting to assess financial performance.
Evaluate the company’s short-term and long-term credit worthiness.
Competency 4: Communicate financial information with multiple stakeholders.
Communicate accounting information clearly.
Faculty will use the scoring guide to review your recommendation as if they were a member of your organization’s management team. Review the scoring guide prior to developing and submitting your assessment.
Performance Evaluation Scoring Guide
Criteria
Non-performance
Basic
Proficient
Distinguished
Analyze the trend for the company’s accounts receivable collections.
Does not analyze the trend for accounts receivable collections.
Identifies the trend but the analysis is incomplete or missing information.
Analyzes the trend for the company’s accounts receivable collections.
Analyzes the trend for accounts receivable collections and explains findings clearly and in sufficient detail that helps managers make decision.
Compare the company’s average inventory turnover ratio to an industry average.
Does not compare the company’s average turnover ratio to the industry average.
Compares the company’s average turnover ratio to the industry average, but the comparison is incomplete or missing information.
Compares the company’s average inventory turnover ratio to an industry average.
Compares the company’s average inventory turnover ratio to the industry average and explains the difference it makes in the company’s financials in detail and with clarity that will help bank managers make a loan decision.
Evaluate the company’s short-term and long-term credit worthiness.
Does not evaluate the company’s short- and long-term credit worthiness.
States a belief about the company’s short- and long-term credit worthiness but does not provide an analysis.
Evaluates the company’s short-term and long-term credit worthiness.
Evaluates the company’s short- and long-term credit worthiness for this year compared to last year and explains and includes information that will help bank management make a loan decision.
Communicate accounting information clearly.
Does not communicate accounting information clearly.
Communicates accounting information, but some information is not clear.
Communicates accounting information clearly.
Communicates accounting information clearly and engages the reader with the fluidity of expression. There are few if any errors of mechanics, grammar, or style. https://onlyassignmenthelp.com/index.php/2021/11/28/strategic-management-risk-management-3/ [supanova_question]
Sustainable construction practices can be highly contextual, diversely defined, and varied in their applications. Leaders in the construction industry Essay
Sustainable construction practices can be highly contextual, diversely defined, and varied in their applications. Leaders in the construction industry must understand the concepts and techniques of sustainable construction and how they are currently impacting the industry. Knowing how to best incorporate sustainable materials and techniques into construction projects will help to make one’s construction company not only successful, but also competitive in today’s market. Accurately communicating the significance of using sustainable goods and techniques in a project is crucial in building a trustworthy, professional relationship with current and prospective clients.
As a construction leader, imagine you are a consultant hired to advise a design-build firm submitting a proposal for a competitive bid. The firm has recently added a commitment to being a leader in sustainable practices to its mission statement, but is just embarking on this new challenge and has little experience in using sustainable building practices. The firm is reluctant to use more sustainable methods for this project out of concern it will raise the amount of their bid, making it uncompetitive. You have been hired as a consultant because of your expertise in sustainable construction practices. Part of your role is to work with the project team and advocate for the use and adoption of potentially more costly, but sustainable, construction methods.
As a leader, what strategies will you use to influence team members to use sustainable construction practices? Provide an analysis of your leadership strategies and how they may impact production of sustainable construction practices. Be sure to reference this week’s Learning Resources to support your ideas.[supanova_question]
Write a lab summary (4-6 pages) that may include (but is not
Write a lab summary (4-6 pages) that may include (but is not limited to): description of network testing to verify connectivity and routing; troubleshooting steps; how devices can be managed and tested; evaluation of technology complexity; considerations for adopting this technology at home or in the workplace; what you learned about emerging technologies from the lab.
Introduction
IPv6 is slowly but surely becoming our next generation protocol. As a network layer (layer 3) protocol, it is needed for devices to communicate over the Internet. IPv6 was designed to replace IPv4. IPv6 is necessary as IPv4 addresses have reached the point of exhaustion, meaning we are running out of available IPv4 addresses.
This assessment will consist of a Packet Tracer activity to set up an IPv6 network and perform IPv6 routing using Cisco’s Enhanced Interior Gateway Protocol (EIGRP). After completing the lab, you will write and submit a report that summarizes your lab experience.
Preparation
To complete this assessment, you will use the Cisco Packet Tracer you used in the previous assessment.
Watch the following video:
IPv6 Network Setup with EIGRP Routing | Transcript.
Use Cisco Packet Tracer to create a basic IPv6 lab and advertise routes using EIGRP. While working on this lab, consider:
The steps you completed to build the IPv6 network.
What you are learning about IPv6.
Troubleshooting steps.
How devices can be managed and tested.
You also may also choose to access the suggested resources in the studies for this assessment.
Requirements
Follow these steps to complete this assessment:
Write a lab report (4–6 pages) that includes the following:
Describe how to create an IPv6 network and advertise IPv6 routes.
Explain the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Describe needed changes and limitations to infrastructure and processes for implementation of the new technology.
Articulate the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Draft a conclusion to your lab report that includes (but is not limited to) the following:
Describe insights learned from the lab concerning models that inform development of implementation plans for new technology.
Submit your Packet Tracer file and lab report.
Deliverable Format
You may choose to use the optional Lab Report Template [DOCX] to complete this assessment. This lab report should be 4–6 pages so that you have enough space to develop your ideas and provide some scholarly context. Please observe the following other formatting requirements for your lab report:
Communication: Communicate in a manner that is scholarly, professional, respectful, and consistent with professional practice and the needs and expectations of senior IT leaders and other stakeholders. For this scenario, assume your supervisor expects original work, critical thinking, and scholarly sources. Your writing must be free of errors that detract from the overall message.
Lab report length: Minimum of 4–6 pages, not including the title page and reference page.
Resources: At least six scholarly resources. Include a reference page at the end of the paper.
APA guidelines: Double-spaced paragraph formatting in the body of the paper. When appropriate, use APA-formatted headings. Resources and citations are formatted according to current APA style and format.
Font and font size: Times New Roman, 12 point.
Evaluation
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies through corresponding scoring guide criteria:
Competency 3: Analyze the challenges of implementing new technologies with existing infrastructures and processes.
Describe how to create an IPv6 network and advertise IPv6 routes.
Explain the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Describe needed changes and limitations to infrastructure and processes for implementation of the new Technology.
Articulate the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Describe insights learned from the lab concerning models that inform development of implementation plans for new technology.
Competency 5: Communicate effectively with key technical and non-technical stakeholders.
Communicate in a manner that is scholarly, professional, respectful, and consistent with professional practice and the needs and expectations of senior IT leaders and other stakeholders.
Remember to review the complete scoring guide prior to developing and submitting your assessment.
IPv6 Network Setup and EIGRP Routing: Packet Tracer Activity and Lab Summary Scoring Guide
Criteria
Non-performance
Basic
Proficient
Distinguished
Describe how to create an IPv6 network and advertise IPv6 routes.
Does not describe how to create an IPv6 network and advertise IPv6 routes.
Describes with significant errors how to create an IPv6 network and advertise IPv6 routes.
Describes how to create an IPv6 network and advertise IPv6 routes.
Describes with no errors how to create an IPv6 network and advertises IPv6 routes.
Describe the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Does not describe the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Describes with significant errors the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Describes the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Describes with no errors the requirements for implementing the new technology and limitations of existing infrastructure and processes to accommodate new technology.
Identify needed changes and limitations to infrastructure and processes for implementation of the new technology.
Does not identify needed changes and limitations to infrastructure and processes for implementation of the new technology.
Identifies with significant errors needed changes and limitations to infrastructure and processes for implementation of the new technology.
Identifies needed changes and limitations to infrastructure and processes for implementation of the new technology.
Identifies with no errors needed changes and limitations to infrastructure and processes for implementation of the new technology.
Articulate the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Does not articulate the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Articulates with significant errors the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Articulates the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Articulates with no errors the requirements for implementing the new technologies and gaps between the needs of new technology and current infrastructure and processes.
Describe insights learned from the lab concerning models that inform development of implementation plans for new technology.
Does not describe insights learned from the lab concerning models that inform development of implementation plans for new technology.
Describes with partial clarity insights learned from the lab concerning models that inform development of implementation plans for new technology.
Describes insights learned from the lab concerning models that inform development of implementation plans for new technology.
Describe insights learned from the lab concerning models that inform development of implementation plans for new technology, and provides specific details for context.
Communicate in a manner that is scholarly, professional, respectful, and consistent with professional practice and the needs and expectations of senior IT leaders and other stakeholders.
Does not communicate in a manner that is scholarly, professional, respectful, and consistent with professional practice and the needs and expectations of senior IT leaders and other stakeholders.
Communicates key points but does not always give credit to external sources or meet the expectations of senior IT leaders.
Communicates in a manner that is scholarly, professional, respectful, and consistent with professional practice and the needs and expectations of senior IT leaders and other stakeholders.
Communicates in a manner that is scholarly, professional, respectful, and consistent with professional practice and the needs and expectations of senior IT leaders and other stakeholders; provides specific examples that generate a unique perspective.[supanova_question]