Hospitality career path

Hospitality career path

Based on course content, please choose and research a hospitality career path. You will need to present the sector, company, job characteristics and functions for the business of your choice.

Please choose and research a hospitality career path

HOST 1085: Principles of Hospitality and Tourism 
Final Assignment – Career Path
(Worth 20% of Final Grade)
Due: Week #14 –

Objective: 
Based on course content, please choose and research a hospitality career path. You will need to present the sector, company, job characteristics and functions for the business of your choice.

You may select the format of submission for this project!

Submission format choices include any of the following: 

Written Essay / Report (APA formatted)

Website

PowerPoint (or Prezi or similar format) presentation – including voiceover

Video presentation

 

Method: 

Provide an overview of your assignment:

Students will provide a summary (overview) of the hospitality / tourism career path research project, outlining your project and summarizing your findings and conclusion. (10 points)

 

In this section of the project:
Identify the tourism sector in which you would like to work (e.g. the accommodations, or food and beverage, or transportation, or attractions, or event sector, etc.)

Research elements of this sector in relation to the Hospitality also Tourism industry in Canada and/or globally

Moreover, discuss the size of the sector, its economic importance to the industry in Canada, number of people employed, overall revenue generated, growth of this sector, etc. (15 points)

 

In this section of the project:
Firstly, identify a company in your selected sector (e.g. Four Seasons Hotels in the accommodations sector, etc.) and research its history from founding to present

Discuss the corporate structure (i.e. national vs. international markets; public or private ownership, etc.) and also the size of the company – number of outlets, employees, revenue, etc.

Describe what competition, either nationally or globally, your selected company may face operating in the Hospitality and Tourism Industry (15 Points)

 

In this section of the project:
Research various occupations within this company and then select one that would be your “dream job” in this company. Further, explain why you consider this your dream job.

Moreover, what are your strengths (best skills) to do this job?

Also, what are the skills you would need to improve to do this job? (20 Points)

 

Lastly, grammar/Spelling/Verbal accuracy & clarity. (Note: more than 3 mistakes = 0)

 

(10 points)

Professional structure/formatting, visually professional, AND a separate page for citations and bibliography (regardless of the format you have selected for submission)

 

(10 points)

HOST 1085: Principles of Hospitality and Tourism 
Final Assignment – Career Path
(Worth 20% of Final Grade)

Article Analysis Assignment

Article Analysis Assignment

Assignment: Read the following article, which was write by a Computer Science professor at the University of California, Berkeley: https://www.nytimes.com/2019/10/08/opinion/artificialintelligence.html.

Read the following article, which was written by a Computer

ECE 390 – Section 001 Fall 2020
Writing Assignment #12: 400+ words
As we discussed in class, your name and the assignment number should be included in the file name. Your name and student ID should not be include in the text that you submit.

All assignments will be check for plagiarism through Turnitin/ithenticate.

Within the document, be sure to include the 1) title of your essay, 2) class (ECE 390), 3) section
(001 or 002), 4) the date, and 5) the word count. None of these should be included in the word count (which is easily achieved by selecting your paragraph and then going to Review->Word Count).

Minimum length: 400 words
Maximum length: 2 pages
Assignment: Read the following article, which was write by a Computer Science professor at the University of California, Berkeley: https://www.nytimes.com/2019/10/08/opinion/artificialintelligence.html.

If this article raises concerns that you share, then state those concerns and explain why you share those concerns.

If you disagree with some concerns raised by this article, then repeat the statement or statements that you find objectionable and explain why you disagree. You may also (or instead) select a present or future application of AI and discuss potential advantages of the technology as well as expected ethical concerns.

• If you uncover any sources that contribute in any way to this discussion in one or more web sites, newspaper articles, and/or any other sources (such as books and journal articles), be sure to cite them. If you do not use any additional outside sources in this assignment, then you do not need to provide any citations (however, it is generally a good idea to find and credit sources in any assignment such as this, even if it is not require). However, you should cite the article indicated above if you discuss any of the points raised in this article.

• Grades on this and future assignments will be determined in part by meeting the above standards (e.g., word count), by citing all references, and by providing a well-organized and well thought-out discussion.

• Fonts should be 11 or 12pt for each writing assignment. References, which should appear at the end of the assignment, should not be included in the word count.

Importance of knowledge and how knowledge is power

Importance of knowledge and how knowledge is power

Using The Night Thoreau Spent in Jail and the film Good Night and Good Luck write an essay that informs and persuades your audience over the topic discussing the importance of knowledge and how knowledge is power.

Discussing the importance of knowledge and how knowledge is power

Using The Night Thoreau Spent in Jail and the film Good Night and Good Luck write an essay that informs and persuades your audience over the topic discussing the importance of knowledge and how knowledge is power. The essay should be in MLA format and each body paragraph should include two or three pieces of evidence. Three different rhetorical devices will need to be typed and highlighted.

More details;

The Night Thoreau Spent in Jail Summary

The play is divided into two Acts. There are no delineations between scenes despite the fact that the setting shifts back and forth between the present and various periods in the past. Despite the fact that these flashbacks take place in different locations, the “setting” of the play never changes. The set is essentially a bare bones jail cell and the shifts in time. Also, place are indicated through various other means. Indeed, the entire play could very easily be performed without any notable break between Act One and Act Two. Though to do so would diminish the impact of the Thoreau’s famous retort which brings the curtain down on the first act.

The choice of the jail cell as the play’s lone scenic design is important both literally and thematically:

the “present” time relates the actual historical event in which Henry David Thoreau chose to be jailed rather than pay taxes to support a contemporary war against Mexico which he considered immoral. So in the “present” the cell literally holds Henry prisoner. But as narrative explores through fluidity of time several episodes from Thoreau’s past. The jail also becomes a metaphor for the imprisonment of ideas.

Tragic accounts of Margaret Garner

Tragic accounts of Margaret Garner

After reading both tragic accounts of Margaret Garner & Frederick Douglass, in what ways might a slave narrative (Garner’s account was written by a male) written by an enslaved woman differ from Douglass’s account.

After reading both tragic accounts of Margaret Garner

Read both tragic accounts of Margaret Garner & Frederick Douglass, in what ways might a slave narrative (Garner’s account was written by a male) written by an enslaved woman differ from Douglass’s account. Please respond in a few paragraphs making sure that you back up statements with evidence from both texts.

More details;

Who Speaks for Margaret Garner? Slavery, Silence, and the Politics of Ventriloquism

Trinidad and Tobago police – Administration branch transformation process

Trinidad and Tobago police – Administration branch transformation process

This is a report indicating the transformation process at the administration branch of the trinidad and tobago police service.

Administration branch transformation process – Trinidad and Tobago police service

Firstly, you are to write an Introduction. This section should involve what the aims and objectives of the report are and the context. Additionally,  to what the report will cover, why and your method of analysis.

Secondly,  the report should include a Literature Review. You will need to critically evaluate the sources in relation to the application of theory to practice.

Thirdly, you should indicate the Method of Data Collection, Data Analysis and Findings used in the report. You need to state and justify the method of analysis as appropriate to the aim and objectives of your project. Additionally, If using Systematic Review you will need to present full details of the search(es) with number of results and inclusion/exclusion criteria resulting in the final sample of evidence for review. You need to present the evidence (data) published in quality academic sources. You need to analyse in-depth the evidence (data) and present the fi‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍ndings clearly. For systematic review and comparative analysis methods a table is useful to illustrate the findings.

Fourthly, provide a discussion which you will need to interpret your findings with reference to theories introduced in the literature review. Apply the theory to the data, critically analyse. Then, evaluate in-depth the effectiveness of theory in applied in practice. What is the unique insight from your research?

Conclusions

Lastly, this section should initially answer the report aim and objectives and draw together the main points from your analysis. It summarises what has been learned from undertaking this project concerning the application of theory into practice. What are the main conclusions from your project? No new information should be presented in the conclusions.

Recommendations

Make recommendations for improvement based upon your conclusions, clearly stating how they can add value. Recommendations should be fully feasible and justified considering costs, priority level, time-scale, resources, who is responsible, benefits and any further implications. Proposals should be actionable (‘immediately implementable’) not just a list of ideas.

Security and Finance Strategy budget allocation to implement security

Security and Finance Strategy budget allocation to implement security

This is an essay on the Security and Finance Strategy for an organization focusing keenly on the budget allocation required to implement security. You will act at the capacity of a security manager.

Security and Finance Strategy – budget allocation to implement security

Firstly, Imagine you are the security manager for a startup company. You have asked you to create a budget for the security department. The company will be a 200,000 square foot warehouse that stores electronics. There will be 10 loading doors, 10 offices for staff, and a shipping and receiving department. The warehouse has 5 entry and exit doors aside from the dock doors. The parking lot has 50 parking stalls.

Budget proposal

Secondly, write a 1,400- to 1,750-word proposal in which you design a budget for security of the warehouse, its contents, the staff, and customers. You may choose to augment this proposal/assignment with an “after” version of the Warehouse Layout which depicts where you added various security features listed below.

  • Include the following in your proposal:
  • 24 hour security protection – How many security officers do you recommend for this type of a facility? Also, the cost per officer for a full year. The total cost for the security staff.
  • Salary for the security manager per year. o Fire system installed (number of pull stat‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍ions, smoke detectors & control panels installed).
  • Approx. how many fire extinguishers will we need throughout the building? What type and cost per unit?
  • Burglary system installed (type and quantity of door alarms, motion sensors and control panels installed).
  • Do you recommend a fence around the exterior of the property? If so, what type?
  • Do you recommend a vehicle for exterior patrol? If so, what type and the cost.
  • Do you recommend a Segway type device for interior patrol? If so, the cost.
  • Cameras installed for interior and exterior (total number and the type that will be used).
  • The type and cost of lighting will you use on the exterior parking lot.
  • What is your recommendation for the “high end” electronics that come in? Also, explain the costs involved, if any.
  • Miscellaneous – Any other expense that you might think of will need to be added and explained. There is no set dollar amount for this proposal but be as detailed as possible. However, there should be a total dollar amount for operating costs of the security department‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍.

Sheldon Kennedy Story “Why I Didn’t Say Anything”

Sheldon Kennedy Story “Why I Didn’t Say Anything”

This is a paper that seeks to discuss the Sheldon Kennedy Story “Why I didn’t say anything”. However, you are to use the Toronto:Insomniac Press in writing the assignment,

The Sheldon Kennedy Story “Why I Didn’t Say Anything” Toronto:Insomniac Press.

Firstly, criticize why I Didn’t Say Anything Kennedy, S. (2011). Why I Didn’t Say Anything: The Sheldon Kennedy Story. Toronto: Insomniac Press

Secondly, the following questions will help you prepare for a discussion of the complexities of disclosing sexual victimization. As you read Why I Didn’t Say Anything, answer the following questions. However, while writing this paper ensure that you do not use any other source. Below are the questions that you are to answer concerning the topic.

1.What were the forces that made Sheldon Kennedy vulnerable to victimization? Also, identify as many factors as you can at each of following levels: a.Individual Level (Sheldon’sown characteristics, belief etc) b. Level (Relationship between Sheldon and Graham c. Family level d.community level and lastly E. Cultural level

2. Describe how Graham James “groomed” Sheldon.

3. ‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍Why did Sheldon’s victimization continue over such a long period of time? Additionally, think about factors at the following levels: a.Individual Level b. Dyadic Level c. Community level d. Cultural level and lastly e. Family level

Additionally, also answer these questions:

4. Identify the forces that deterred Sheldon from disclosing his victimization. Think about factors at the following levels: a.Individual Level b. Dyadic Level c. Family level d. Community level and lastly e. Cultural level

5. What was the impact of Sheldon’s victimization on his: a. Mental health? b. Physical health C. Family relationship d. Peer relationship and also e. Romantic relationships and marriage? However, ensure that you answer the question focusing on the stated characteristics.

6. What were the effects of the trial on Sheldon?

7. Lastly, what factors have helped Sheldon to cope with and heal from‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍ his victimization?

Gun control issue in the society and aspects of research

Gun control issue in the society and aspects of research

The following is a paper that discusses the gun control issue in the society and aspects of research. The paper also discusses the various aspects that are along the topic.

Gun control issue in the society and aspects of research

P‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍rompt: Address the following critical elements which must be in this submission: – An introduction, which includes: o A quick background for your chosen political issue o A clear outline of your research – A brief literature review, which addresses:

Firstly, what methods and techniques have been used to study an issue similar to yours?

Secondly, how will your research contribute to the existing body of knowledge in political science? – A methodology, which includes: o From which population will you gather your data and what technique do you think is most appropriate? o How would you ensure conformity with political science ethical standards if you were to collect data for this proposal? o What statistical technique(s), measures of association, and tests of statistical signi‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍ficance would be most appropriate to test your hypothesis? – Some variables and hypothesis, which focus on:

Thirdly, what are the conceptual definitions for each of the variables you plan on studying?

How would you defend the validity and reliability of the variables you have developed?

What level of measurement do you believe you can achieve for each variable?

What is your testable hypothesized relationship between your independent and dependent variable?

Why do you believe the control variables will affect your first-order relationship?

Lastly, write a conclusion, which addresses: o To which other contemporary political issues could this research proposal be applied? o What kinds of ethical-political change could be affected if you were to carry out this research‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍?

The paper should consist of at least three sources. The references should be in APA format and follow the guidelines of APA referencing and citation.

Grand or Mid-Range Theory appropriate to your practice

Grand or Mid-Range Theory appropriate to your practice

This is a paper discussing the Grand or Mid-Range Theory appropriate to your practice. Additionally, the paper explains the theories of reasoning.

Grand or Mid-Range Theory appropriate to your practice

Firstly, select a Grand or Mid-Range Theory that is appropriate to your practice setting.(you CANNOT choose to review Leininger, Benner or Pender). Then, describe the theorist’s background in detail and discuss how their experiences have impacted the theory development. Examine crucial references for the original and/or current work of the theorist and other authors writing about the selected theory. Identify the phenomenon of concern or problems addressed by the theory.

Theory Description

Secondly, explain whether the theory uses deductive, inductive or retroductive reasoning. Provide evidence to support your conclusion. Describe the major concepts of the theory. How do you define them? (theoretically and/or operationally) Also, is the author consistent in the use of the concepts and other terms in the theory? Interpret how the ‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍concepts are defined. Implicitly or explicitly? Examine the relationships (propositions) among the major concepts. Evaluation Identify explicit and implicit assumptions (values/beliefs) underlying the theory. Consequently, on what assumptions does the theory build? Examine if the theory has a description of the four concepts of the nursing metaparadigm. If so, how are they explained in the theory? If the metapardigm is not explained, what elements do you see as relevant to the theory and why?

Discuss the clarity of the theory. Did it have lucidness and consistency? Application Examine how the theory would guide nursing actions. Describe specifically how you can use this theory in your area of nursing (Practice, Education, Informatics or Administration).

Download the Theory Critique Template. The paper should to be in the APA format and guidelines. Also, include sources and include references in the paper. The references should be in APA style.

Linux Implementation Proposal Client Response Memo

Linux Implementation Proposal Client Response Memo

This is an assignment that focuses on the Linux Implementation Proposal in writing a Client Response Memo. The paper discusses in length the Linux implementation.

Linux Implementation Proposal in writing a Client Response Memo

Instructions

Managing file systems, storage, and other hardware devices is critical for a Linux administrator. You’ll put these skills to use in this project. File Systems and Hardware Faster Computing is a growing company. As such, its technology will need to grow as well. Faster Computing will undoubtedly need to expand file systems—not to mention add new hardware and expand storage. Logical Volume Manager (LVM) will be a critical tool on the file system side. LVM allows an organization to manage storage logically rather than physically. This means that physical disks can be added to or removed from a storage pool on the fly. It greatly simplifies some of the tasks of storage management.

Additionally

For other hardware, Faster Computing will want to benefit from hot-swap devices. Hot swap allows hardware components that support it to be replaced on the fly if they fail, with no down time. Hot-swap devices can encompass everything from power supplies to hard drives. Monitoring and Managing Processes Your experience with Linux has taught you that it’s not uncommon for systems to run for months or even years without a single reboot. You know that in Windows, whenever updates are installed—or if the system is “acting up”—a common troubleshooting tactic is to reboot. But in Linux, it’s seldom necessary to reboot, and you have found that rebooting can cause issues in a production environment.

With this in mind, it will be critical for Faster Computing to be able to monitor and manage processes. There are many tools available for this, such as Top, which shows an overview of the main running processes on a system. Faster Computing will also need to understand how the logging pr‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍ocess works in Linux. When there’s a system problem or failure, the logs can lead to the source of the problem. Without logs, troubleshooting certain issues would be difficult or impossible. Faster Computing was impressed with your presentation in Linux Migration Proposal (see attachment).

Questions

The company is interested in moving forward with the project, but the senior management team has responded to the presentation with the following questions and concerns:

1. How will security be implemented in the Linux systems—both workstations and servers?

2. End users have expressed some concern about completing their day-to-day tasks on Linux. How would activities such as web browsing work? Also, how would they work with their previous Microsoft Office files?

3. The current Windows administrators are unsure about administering Linux systems. How are common tasks, such as process monitoring and management, handled in Linux? How does logging work? Do we have event logs like we do in Windows?

4. Some folks in IT raised questions about the Linux flavor that was recommended. Additionally, they would like to see comparisons between your recommendation and a couple of other popular options. Then, what makes your recommendation the best option?

5. How does software installation work on Linux? Can we use existing Windows software?

6. How can Linux work together with the systems that will continue to run Windows? How will we share files between the different system types? The deliverable for this phase of the project is a memo. The recommended format is to respond to the questions in a bulleted format. Also, provide sufficient detail to fully address the q‌‌‍‌‌‍‍‍‌‍‍‌‍‍‍‌‌‌‍uestions.