Overview Foreign exchange impacts the profitability of transactions in internati

Overview
Foreign exchange impacts the profitability of transactions in international markets. It can turn a profitable business into one that loses money and can turn an unprofitable business into one that makes money.
In this assignment, you will analyze the impact of foreign exchange on different business scenarios and present your findings in a short business memo.
Scenario
You manage the international business for a manufacturing company. You are responsible for the overall profitability of your business unit. Your company ships your products to Malaysia. The retail stores that buy your products there pay you in their local currency, the Malaysian ringgit (MYR). All sales for the first quarter are paid on April 1st and use the exchange rate at the close of business on April 1st or the first business day after April 1st if it falls on a Saturday or Sunday. The company has sales contracts with different vendors that determine the number of units sold well in advance. The company is contractually obligated to sell 4,000 units for exactly 1.25 million MYR for the first quarter. The break-even point for each unit is $90 in U.S. dollars. Use the following foreign exchange rates:
On January 1, the daily spot rate is 3.13 MYR, and the forward rate is 0.317 U.S. dollars/MYR for April 1st of the same year.
On April 1, the daily spot rate is 3.52 MYR.
Prompt
Using the information above, create a short business memo that explains the profitability, viability, and importance of considering foreign exchange on the basis of the scenarios below.
Scenario 1: The company uses the spot rate on April 1st to convert its sales revenue in MYR to U.S. dollars.
Scenario 2: On January 1st, the company uses that day’s forward rate today to lock in a foreign exchange rate for its expected 1.25 million MYR in sales. This means the company agreed to exchange 1.25 million MYR using the forward rate on January 1st when April 1 arrives.
Scenario 3: Another option for the company is to spend the foreign currency and avoid any currency exchange. Because it is a manufacturing company, raw materials are always needed.
Specifically, you must address the following rubric criteria:
Foreign Exchange Calculations: Determine the profitability of the international business by using foreign exchange calculations for the first and second scenarios.
Spend or Save: Discuss what you would need to consider when determining if the company should buy raw materials with the foreign currency in an effort to avoid foreign exchange risk and whether this is a viable option for the company.
Conclusion: After determining the result for each scenario, explain the importance to a company’s financial results of considering foreign exchange risk.
What to Submit
Submit this assignment as a 250- to 300-word Microsoft Word document. Sources should be cited according to APA style.

OVERVIEW Comparative politics is concerned with the important quest to understan

OVERVIEW
Comparative politics is concerned with the important quest to understand why things are the way
they are. For example, we seek to discover why ideas and cultural values have the impact they
have, why some nations prosper, and others do not, why some countries enjoy liberty and others
do not, and countless other “why” questions that help explain the dynamics of human
governance. As with all inquiry, the conclusions drawn are only as good as the methodology
employed to produce them. In this Research Paper: Comparative Approach Assignment, we
will begin our exploration of comparative politics by examining the comparative approach that
provides a starting place for any scholarly inquiry addressing these important questions
INSTRUCTIONS
You are required to write a short research paper evaluating and analyzing the comparative
approach introduced in your textbook readings. Your readings in this module addressed various
ways of approaching comparing and analyzing aspects of political systems. For this Research
Paper: Comparative Approach Assignment, assume that you are preparing to begin a project
that attempts to explain the success of democracy in the United States. Specifically, your
Research Paper: Comparative Approach Assignment should: 1) Describe in detail how the
comparative approach described in the Dickovick and Eastwood textbooks might apply to this
question; 2) Explain which prominent questions might be addressed, what kinds of facts and
evidence might be useful and which kind(s) of comparison(s) would be beneficial; and 3)
Explain what role prevailing worldviews might play in the presumptions of a comparative
approach and what role a Judeo-Christian worldview might play in one’s approach to this
project.
 The text of this Research Paper: Comparative Approach Assignment must be 5–7
pages (not including title page, reference page, and any appendices).
 This Research Paper: Comparative Approach Assignment must be in current APA
format.
 You must include citations to a sufficient number of appropriate scholarly sources to
fully support your assertions and conclusions. Each paper must contain citations to a
minimum of 3 scholarly sources not including the course textbook, assigned readings,
and the Bible.
Note: Your assignment will be checked for originality via the Turnitin Plagiarism tool.

This essay will critically explore the influence of ontology—beliefs about the n

This essay will critically explore the influence of ontology—beliefs about the nature of reality—on the selection of research methods. It aims to examine how different ontological perspectives shape methodological approaches in research, affecting the interpretation and generation of knowledge across various academic fields.
Comprehensive Essay Writing Tips for this Essay Level:
1. Word Limit and Footnotes:
(Don’t go over the word limit and make it exactly 2500 words.) The 2,500-word limit includes footnotes, emphasizing concise and relevant commentary within them.
– The word count excludes the cover sheet, essay title, and bibliography.
2. Introduction:
– Start with a clear introduction that outlines the essay’s structure.
– Clearly state what will be covered and excluded, with rationales for these choices.
3. Structure and Argument Flow:
– Use a thematic structure to organize your essay, justifying your choice of themes in the introduction.
– Employ linking paragraphs or sub-headings to ensure a coherent argument flow.
4. Conclusion:
– Conclude with a substantial section that encapsulates your analytical depth.
– Avoid new ideas in the conclusion; instead, indicate potential areas for further research.
5. Referencing and Footnotes:
– Adhere to the Chicago Manual of Style for referencing. Access guidance here: [Chicago Manual of Style Citation Guide](https://www.chicagomanualofstyle.org/tools_citationguide/citation-guide-1.html).
– Utilize footnotes for supplementary comments or references, ensuring they remain succinct and pertinent.
6. Presentation:
– Format your essay using a font size of 12 and double-space for clarity and readability.
7. Additional Master’s Level Writing Tips:
– Demonstrate deep analytical engagement with your chosen topic, supported by a wide range of scholarly sources.
– Critically engage with these sources, showcasing your ability to assess their relevance and reliability.
– Strive for originality in your analysis, presenting unique insights or perspectives.

This essay will critically explore the influence of ontology—beliefs about the n

This essay will critically explore the influence of ontology—beliefs about the nature of reality—on the selection of research methods. It aims to examine how different ontological perspectives shape methodological approaches in research, affecting the interpretation and generation of knowledge across various academic fields.
Comprehensive Essay Writing Tips for this Essay Level:
1. Word Limit and Footnotes:
(Don’t go over the word limit and make it exactly 2500 words.) The 2,500-word limit includes footnotes, emphasizing concise and relevant commentary within them.
– The word count excludes the cover sheet, essay title, and bibliography.
2. Introduction:
– Start with a clear introduction that outlines the essay’s structure.
– Clearly state what will be covered and excluded, with rationales for these choices.
3. Structure and Argument Flow:
– Use a thematic structure to organize your essay, justifying your choice of themes in the introduction.
– Employ linking paragraphs or sub-headings to ensure a coherent argument flow.
4. Conclusion:
– Conclude with a substantial section that encapsulates your analytical depth.
– Avoid new ideas in the conclusion; instead, indicate potential areas for further research.
5. Referencing and Footnotes:
– Adhere to the Chicago Manual of Style for referencing. Access guidance here: [Chicago Manual of Style Citation Guide](https://www.chicagomanualofstyle.org/tools_citationguide/citation-guide-1.html).
– Utilize footnotes for supplementary comments or references, ensuring they remain succinct and pertinent.
6. Presentation:
– Format your essay using a font size of 12 and double-space for clarity and readability.
7. Additional Master’s Level Writing Tips:
– Demonstrate deep analytical engagement with your chosen topic, supported by a wide range of scholarly sources.
– Critically engage with these sources, showcasing your ability to assess their relevance and reliability.
– Strive for originality in your analysis, presenting unique insights or perspectives.

• Part 1: 15-minute presentation, reflecting critically on one strategic issue i

• Part 1: 15-minute presentation, reflecting critically on one strategic issue in cybersecurity (1,500 words).
• Part 2: Policy paper looking at a case study of Russian use of cyber power with recommendations on how to deter this type of subversion (1,500 words).
This order is a two-part assignment,
-Please read full details before starting.
– for part 1- the power point need to be creative and good looking.
– for part 2 – there is a mandatory memo template in the attachment you have to follow.

First part is a 15-minute Presentation. Second part is a policy paper. ( each part should be in a different file and is not related to the other part ) the power point presentation is just for part 1. ( if you have any questions contact me for more clarification )
More Details:
The Task:
Part 1 : Presentation
This assignment is a 15-minute presentation, reflecting critically on one strategic issue in cybersecurity. It will contribute 50 per cent of your module mark.
You may choose which issue you want to reflect on. The following list provides some example issues, which you may choose to focus on (note that this list is not exhaustive, and you may choose a different issue):
• ‘Cyber’ as a strategic lever of power
• Power diffusion in the cyber domain
• The blurring lines between offensive and defensive use of cyber power
• The attribution issue in the cyber domain.
In your presentation, you should discuss the issue conceptually in the context of strategic discourse in the 21st century before undertaking a more empirical examination of the issue. You should use two empirical examples (either actual real-life examples or potential future scenarios) to illustrate your points. Also, you should be able to demonstrate your subject knowledge in reference to at least one core reading in the literature.
You are also required to submit the scriipt (or notes) that you used to record your presentation. You should note that it is the presentation that will be graded, not the notes you submit in support of your assignment. They are intended to support the module tutor when marking your presentation.
Part 2: Policy paper:
This assignment is a 1,500-word policy paper – which you must write using the mandatory “memo template” at the attachments . It will contribute 50 per cent of your module mark.
You should choose a case study of Russian use of cyber power and write a policy paper for your chosen country’s national security adviser which is Mohammed bin Ahmad Al-Musnad, National Security Advisor to the Amir of Qatar ( State of Qatar ) , making recommendations for how to best deter against this type of subversion.
You should choose one of the three case studies listed below and reflect on how to combat such activities in the era of social media and ‘fake news’.
• Russian subversion amid the Ukraine Crisis 2014 resulting in the Russian annexation of Crimea and the armed conflict in the Donbas region
• Russian subversion during the 2016 Brexit Vote in the UK
• Russian subversion during the 2016 US Presidential election

Complete required readings (choose any 2 assigned readings and 2 assigned multim

Complete required readings (choose any 2 assigned readings and 2 assigned multimedia sources)
In addition to the required readings, students will research on their own and post to the discussion board one article relevant to the topic discussed in the class from periodicals Washington Post, New York Times, Financial Times, or peer-review journals. 2 posts are required: 1 original post (at least 200 words), and 1 response to/comments (at least 100 words) on your classmates’ original post.
ARTICLES:
Roland Paris, “Human Security: Paradigm Shift or Hot Air?” International Security 26, no. 2 (2001): 87–102
https://learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com/blackboard.learn.xythos.prod/5a33ed4744755/9485455?X-Blackboard-S3-Bucket=blackboard.learn.xythos.prod&X-Blackboard-Expiration=1707253200000&X-Blackboard-Signature=g%2B3sYIQEb7tzM6VvES%2Bnw00IekUMKWnQvHONDscec%2FQ%3D&X-Blackboard-Client-Id=100501&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Paris.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPj%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIQC%2BCrl86BGWxU%2Bw6BtMi0G%2FtT1wvL5JL%2BAhl2U90e%2Ft1AIgb2qzE9KE6LGavwKD27lGFVqBLuZtJOV55pUKtwfgRM0qvAUIwf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw1NTY5MDM4NjEzNjEiDE7VORPUuZIExZW%2BcSqQBXfFUT9RTBsIFuNznAYrRsxM3XoVUEfSeWCHc7SB3THIhMz2rfHsgCoch5SeqULa8hMC3XAEoerxVaksYBBwQ%2Bt%2BRZOxC7MWbWzyNruz%2BTV6SAIs4orMdPxo464BJizg2I%2FQMSBjk7lnsDMVWWogZdHjASGPKf96w44WtOMxl856kydTgLRUoopcCbGtIiF6Brcaq%2F5mQ8oiQfJfabGQ78NQsgTtEuHJtic2CEKytbceCoIL2EUezODm58up%2FsY%2Fgrn84xPyLGgQtGSRGcUtqapFWxNkR7EEvSxhtSGd3VWmZgI4zYNqC6x5zJ3rywtpizCVD%2FMP7JyApYMVH7HDnnjPIAHtkdq806R4e6xOIC3rJT06My3TTlwvlooAOi%2FO7pGLMFtxZ0%2F%2FtFxEBGrGflJWIltbQlqZRePIgpCxJcN3hzAedI6VQq1SG2otpD69%2BUm3IDGiwS6N4i4JISHFBAPFwkaTicZmTKO%2FrXKJJoZVObIKGE9R9s1XmEzSUeeRUOJGpCw8q7nzBrwncExhcYdE78fYFDJjCaTNsZ3EIZnxzpECExBreHjag2%2BXjh3bnO6kObESpfm8ag6YoU%2BzkIMDcxCNFi6VUbmOVJB66GOcKlx2qSgPSUt2W2h9msEge9zjpm9BNdyA3XhQyyfw5wHlNPxaFbdHHnDYNIhDtTlt3cYaI3PDdjzCiYCSqGJ6s4%2B%2FfBK%2FGQEIEF3IJhCzfnINVJ0EcwbgBX92l0%2FzMNmp21rQR3g6GxzfBDiF7TJHfkz3BT0DVP9BMw1ZgIxR%2F4HSF4HG%2BsgrutJUKCvZ8DmQHh%2FrZbbdFlgKpZz3G3ePVRSTUFnZfjXum2loNVHLVUrtcMaDxlQrcUlZXZjmFTkpMO%2Beia4GOrEBndblI0vKqU3pvruQReO5diamMoYauYREy8LxUYT%2FQkPhG9iSsCYhlBNFuadIOgHhzSBXC2V%2FubVTcKlyzjmFcI%2Fyq%2FmnvUMGgFVXNZD%2FpM3VSTl3CdyRANNJfzKfCG9U2fo7LAspm9puRP6wuEWmz%2B4698RUzk3eGowQR%2Bd%2Fu95julnf9YuI5UBr1SUkDuqlkxLL3Ydi5xk9DXaeuVKhwBdsMGH2%2BKXnmVADPp6Hx%2BY8&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240206T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAYDKQORRYX2FKYFX3%2F20240206%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=208d231f05216089679ed9e84b4f995960317252107928204617327d1a993f99
SKIM “Human Security in Theory and Practice”
https://learn-us-east-1-prod-fleet01-xythos.content.blackboardcdn.com/blackboard.learn.xythos.prod/5a33ed4744755/9485456?X-Blackboard-S3-Bucket=blackboard.learn.xythos.prod&X-Blackboard-Expiration=1707253200000&X-Blackboard-Signature=U055A5ABtw2Luml6Nhl%2FXBt1t%2FrtVoEhUrJk%2B%2BCWPnQ%3D&X-Blackboard-Client-Id=100501&X-Blackboard-S3-Region=us-east-1&response-cache-control=private%2C%20max-age%3D21600&response-content-disposition=inline%3B%20filename%2A%3DUTF-8%27%27Human%2520Security%2520in%2520Theory%2520and%2520Practice%2520English.pdf&response-content-type=application%2Fpdf&X-Amz-Security-Token=IQoJb3JpZ2luX2VjEPj%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FwEaCXVzLWVhc3QtMSJHMEUCIQC%2BCrl86BGWxU%2Bw6BtMi0G%2FtT1wvL5JL%2BAhl2U90e%2Ft1AIgb2qzE9KE6LGavwKD27lGFVqBLuZtJOV55pUKtwfgRM0qvAUIwf%2F%2F%2F%2F%2F%2F%2F%2F%2F%2FARAAGgw1NTY5MDM4NjEzNjEiDE7VORPUuZIExZW%2BcSqQBXfFUT9RTBsIFuNznAYrRsxM3XoVUEfSeWCHc7SB3THIhMz2rfHsgCoch5SeqULa8hMC3XAEoerxVaksYBBwQ%2Bt%2BRZOxC7MWbWzyNruz%2BTV6SAIs4orMdPxo464BJizg2I%2FQMSBjk7lnsDMVWWogZdHjASGPKf96w44WtOMxl856kydTgLRUoopcCbGtIiF6Brcaq%2F5mQ8oiQfJfabGQ78NQsgTtEuHJtic2CEKytbceCoIL2EUezODm58up%2FsY%2Fgrn84xPyLGgQtGSRGcUtqapFWxNkR7EEvSxhtSGd3VWmZgI4zYNqC6x5zJ3rywtpizCVD%2FMP7JyApYMVH7HDnnjPIAHtkdq806R4e6xOIC3rJT06My3TTlwvlooAOi%2FO7pGLMFtxZ0%2F%2FtFxEBGrGflJWIltbQlqZRePIgpCxJcN3hzAedI6VQq1SG2otpD69%2BUm3IDGiwS6N4i4JISHFBAPFwkaTicZmTKO%2FrXKJJoZVObIKGE9R9s1XmEzSUeeRUOJGpCw8q7nzBrwncExhcYdE78fYFDJjCaTNsZ3EIZnxzpECExBreHjag2%2BXjh3bnO6kObESpfm8ag6YoU%2BzkIMDcxCNFi6VUbmOVJB66GOcKlx2qSgPSUt2W2h9msEge9zjpm9BNdyA3XhQyyfw5wHlNPxaFbdHHnDYNIhDtTlt3cYaI3PDdjzCiYCSqGJ6s4%2B%2FfBK%2FGQEIEF3IJhCzfnINVJ0EcwbgBX92l0%2FzMNmp21rQR3g6GxzfBDiF7TJHfkz3BT0DVP9BMw1ZgIxR%2F4HSF4HG%2BsgrutJUKCvZ8DmQHh%2FrZbbdFlgKpZz3G3ePVRSTUFnZfjXum2loNVHLVUrtcMaDxlQrcUlZXZjmFTkpMO%2Beia4GOrEBndblI0vKqU3pvruQReO5diamMoYauYREy8LxUYT%2FQkPhG9iSsCYhlBNFuadIOgHhzSBXC2V%2FubVTcKlyzjmFcI%2Fyq%2FmnvUMGgFVXNZD%2FpM3VSTl3CdyRANNJfzKfCG9U2fo7LAspm9puRP6wuEWmz%2B4698RUzk3eGowQR%2Bd%2Fu95julnf9YuI5UBr1SUkDuqlkxLL3Ydi5xk9DXaeuVKhwBdsMGH2%2BKXnmVADPp6Hx%2BY8&X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Date=20240206T150000Z&X-Amz-SignedHeaders=host&X-Amz-Expires=21600&X-Amz-Credential=ASIAYDKQORRYX2FKYFX3%2F20240206%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Signature=3dfcc69579832c167159e9074aa30f91f94065c9d71c81dfb10ed5986588ffae
MULTIMEDIA
Human Security and Agenda 2030

Jennifer Leaning: Keys to Human Security
Jer Thorp is a data artist in residence at the New York Times who explores the boundaries between science, data, art, and culture. His work has appeared in the Museum of Modern Art in Manhattan. “I come here today because I am excited about data, but also because I am terrified. I am terrified that we are having progress without culture in the world of data.”

View Time: 20:34 minutes
UNSSC Human Security Approach

RESPONSE :

Inter American Institute on Human Rights “What is Human Security?
Hama, Hawre Hasan. “State security, societal security, and human security.” Jadavpur Journal of International Relations 21, no. 1 (2017): 1-19

Multimedia:

Human Security and Agenda 2030
Jennifer Learning: Keys to Human Security

The article chosen: Human rights in patient care: A theoretical and practical framework.

In this article, the author discusses a wide range of human rights violations that occur within healthcare settings, with a specific focus on civil and political rights in relation to patient care. The author highlights that patient care, being an integral component of the right to health, has been greatly impacted by various abuses that not only violate human dignity, but also has a negative influence on health outcomes.

Furthermore, the article sheds light on the challenges faced by healthcare providers, including unsafe working conditions, limitations on freedom of association, and the denial of due process when addressing complaints. The author argues that these issues contribute to a negative environment within healthcare settings as well.

The author emphasizes the importance of acknowledging the impact of discrimination and social exclusion, particularly in the abuse experienced by marginalized groups such as people living with HIV, ethnic minorities, and individuals with disabilities. The pervasive nature of discrimination within the healthcare system leads to inaccurate diagnoses and a breakdown of trust between patients and their healthcare providers.

As a potential solution, the author suggests addressing healthcare abuses, advocating for systemic change, and demanding accountability from the government. This approach aims to rectify the current issues and promote a healthcare system that upholds human rights standards, ensuring the well-being of both patients and healthcare providers.

The main text of the paper must be at least 2,500 words long. This excludes the

The main text of the paper must be at least 2,500 words long. This excludes the Works Cited list, parenthetical citations, title, captions to illustrations, and any identifying information (your name, the course name, the date, etc.).
You must have a clear and easily identified thesis statement.
You must provide ample support for your thesis.
The paper must be organized and all the supporting evidence for your thesis must be relevant.
You must use correct grammar, spelling, and punctuation, and you must pay attention to diction and tone.
You are to follow MLA format throughout the paper.

Write a speech with an outline regarding Israel and Palestine conflict since att

Write a speech with an outline regarding Israel and Palestine conflict since attack on October 7th to current. The speech/outline should contain 3 main informative speech points in the thesis. The speech/outline should first include the background of the attack on October 7th and Israel’s response on Gaza and the West Bank if applicable. The speech should also include current escalation with the US/Israel an other countries to include Lebanon, Yemen, Turkey, and Russia. The speech can also include world or country division over the conflict.

400 words on ONE of the questions on John Stuart Mill from week Three. Read Chap

400 words on ONE of the questions on John Stuart Mill from week Three. Read Chapter One of On Liberty and write a full paragraph dealing with one of these tasks: (choose only one of these tasks, not all)
· Show how and why Mill spoke of ‘engines of moral repression’.
· Show how Mill relates ‘engines of moral repression’ to the ‘tyranny of public opinion’ and ‘the ascendant class’.
· Show how Mill developed the ‘harm principle’ to limit the influence of public opinion, i.e., of engines of moral repression, over civilised individuals.
· Show how it made sense to Mill to reconcile liberty for civilised individuals with ‘despotism’ as a legitimate mode of governing barbarians.
· Show how Mill might have thought that ‘barbarians’ could be improved, and what this means for how people become ‘civilised’.

Read Hobhouse’s chapter, taking notes on his ideas as you do so. According to H

Read Hobhouse’s chapter, taking notes on his ideas as you do so.
According to Hobhouse, Mill’s attempt to theorise liberalism was problematic because it was too ‘individualistic’. He meant that Mill seems to think that personal development is a strictly individual matter and that society was only a source of repression, i.e. society seeks to impose conformity and prevent personal development. Hobhouse argues that personal development is never only an individual matter and always a ‘social’ one. He agrees that there can be repressive social relations, which should be abolished because we all need society to be organised to support our progressive development. He goes on to argue that we can replace all repressive social relations with progressive ones. ‘The Heart of Liberty’ is about the principles which should guide our efforts to build a society which supports individual progress for everyone.
Write 300 words on one of these tasks. (Hobhouse’s ideas are all related to each other, so writing on one task will involve giving some thought to others.)
Show how Hobhouse argues that true liberalism is ‘social’ rather than individualistic
Show how Hobhouse develops the idea that we have ‘organic’ raelationships with one another.
Show how Hobhouse relates our ‘individual good’ to our ‘common good’?
Show how Hobhouse argues that we should only have individual rights which are compatible with the common good.