high school portfolio speech

Thank you so much, it’s a pleasure to be here at this moment. Becoming a nurse has been one of my dreams since I was at a tender age. Studying nursing is a professional that a person is born with for there are many difficulties that are faced. During my high school, I was aiming at pursuing nursing, and I had the belief that one day I will be a registered nurse. Back in high school, I developed various growths which include, communication and excellent leadership skills.

Communication skills are necessary for the profession since I will be able to communicate with the patients effectively. Being a nurse requires that a person is efficient and they are competent in all the services that they offer to the patients. It involves a lot of effort and dedication for one to take care of the patient and build a relationship with them. With communication skills, I am in a position where I can communicate and efficiently respond to the questions and the issues that arise between the patient in the hospital. Leadership behavior has a significant impact on most of the staff members. As a senior nurse, I must be in a position where I can acknowledge the importance of the role and recognize that the junior staff is relying on my leadership for them to develop their professional skills. I am working to meet up with different people that come from different places and those that come from different backgrounds. I am working hard so that I can be able to earn values such as empathy and care. Kuder assessment has enabled me to build skills and confidence as well as come up with work values that are necessary as a nurse. This kind of assessment helped me in determining the level of interest that I have in all areas of interest. I intend to join the University of California, Davis since this is an institution that has goals such as advancement, generation, and application of Knowledge that are tied to my primary objectives. My determination for studying nursing is majorly influenced by various people.

Information technology

This is an argumentative essay. About vulnerability in US cyber-security. The citation has been included in the document.



Vulnerabilities in US Cyber-Security

Cyber security has become a major area of concern throughout the world, and especially the US becoming vulnerable to cyber-crime. In June 2016, TVs shown brought breaking news detailing how hackers working for the Russian government had hacked into one of the America major political parties and stole vital information. With the rising cyber-security breaches chances are you, or someone you know has been affected by some recent cyber-attack in the US, maybe losing personal information or unauthorized use of your credit card information or anything data related.

As the US depends more on the computerized world, the rising of technology and computerization has opened doors to increasingly aggressive attacks. Successful cyber-attack can inflict great harm on America from both national security and economic standpoint. While there is no guaranteed way to prevent all cyber-attacks, there are basic steps to educate citizens about cyber-attack and how to mitigate it. There are various types of cyber-attack and hackers are getting more sophisticated every day. The US has become vulnerable to cyber-attacks and this research paper, will explore how vulnerable the US is to Cyber-attacks, through the discipline of technology, psychology, and political science.






How is the US most vulnerable to cyber-attacks?

Cyber-attack is an indirect war that is fought at the comfort of a computer by hackers. The rise of technology and computerization have contributed to increased cyber-attacks. The constant infrastructure connectivity and unending innovations have sophisticated cyber-attacks and hackers are now doing it for profit. A successful cyber-attack in the US will cause great harm to national security and the economy.

Literally cyber activity has been on the rise with direct proportion to the rising technology, with America having so many adversaries it is much vulnerable to cyber-attacks especially from such countries that want to take economic control like China and Russia flexing muscles for superiority over the U.S in power.


Hackers are getting sophisticated, which require a new line of security defenses.

Due to sophistication of digital systems, cyber-attacks have also become sophisticated. Unlike some years ago cyber-attacks are now done by well-funded and organized threat actors that are motivated by financial gains and also political mileage. Even with the heavy spending on traditional defense mechanisms organizations have experienced new generation cyber-attacks which bypass traditional firewalls, security gateways, and antiviruses. This necessitates for real-time information and intelligence sharing system that can identify threat agents and targeted assets as opposed to reliance on repetitive signature scanning. (Tounsi)

Analysis of a Historic Negotiation Agreement

Negotiation Analysis on the 2012 agreement of the Creation of South Sudan

The nation of South Sudan gained independence in the year 2012 after a long struggle between the two major tribes in Sudan. The country which was Sudan then hosted a referendum on South Sudan’s independence (Jamie, 2017). The referendum took place in Southern Sudan from 9 to 15 January 2011. The sole purpose of the referendum was on whether the region should remain a part of Sudan or become independent. The referendum one of the consequences of the 2005 Naivasha Agreement between the Khartoum central government and the Sudan People’s Liberation Movement. The current South Sudanese voted for the referendum in overwhelming numbers. This brought an end to the civil war that started in the mid-1950s which left so many dead. Both nations signed an agreement, Sudan, and South Sudan which saw the birth of the youngest country in the world, South Sudan (Thomas, 2015)

The agreement was as a result of a decision made by the United Nations Security Council (UNSC) and the African Union High Implementations Panel (AUHIP) after a fruitful meeting. The United Security Council had threatened to impose sanctions on both Sudan and South Sudan if they failed to reach an agreement after a three months negotiations. Sudan President, Omar al-Bashir and the president of South Sudan Salva Kiir Mayardit were the two main players involved in the cooperation agreement of September 27, the year 2012 (Jamie, 2017). The agreement was a significant step in aiding the international and local efforts to end the war tensions in both countries. The signed agreement brought to a conclusion of over a month of negotiations between the two countries and a presidential meeting which despite meant to last for a day went on for four days.

The Agreement on Security

The agreement addressed a large number of issues that had been a significant blow to peace and stable relations between Sudan and South Sudan. The Agreement was to solve these issues to ensure peace reigned between these countries. The critical issue addressed in the agreement was insecurity. The agreement sought to bring an end to the civil war between the two nations. Insecurity was the key source of all the problems the two countries were experiencing. The agreement was mainly to bring peace between the countries and end the spell of bloodshed. The Agreement would make a provision for special arrangements for the “14 Mile Area”, which involve the complete demilitarization of the Area overseen by the Joint Political and Security Mechanism (JPSM) and supported by the mechanism under the JSPM. The parties were to maintain the status quo of the joint tribal mechanisms for the resolutions of disputes. The agreement brought the two countries to a commitment to respecting each other, keep a distance from the other nation’s internal affairs and avoid the use of force in any case (Jamie, 2017).  The nations were also to withdraw any troops to the border to give room for peace. The two countries agreed to immediately open the ten agreed border-crossing corridors linking the two states. If these were strictly followed, then peace would reign between the nations. However, there was the challenge of the long-existing ethical issues between the countries. These clashes between the two countries rendered the efforts for peace fruitless over the years (Jamie, 2017). To achieve peace the countries were to go out of their way to ensure individual efforts and implementations which would lead to peace between them.

The Agreement concerning Oil and related Economic Matters

Another major issue addressed by the 2012 agreement was the issue of management of oil resources and exportation (Jamie, 2017).  Oil is a crucial resource for both Sudan and South Sudan. In the agreement, the two nations undertook to adequately ensure the resumption of production of oil by South Sudan. The Agreement would also provide arrangements for the transportation and processing of the oil in Sudan’s territory. This arrangement would ensure that oil from South Sudan would reach international markets as an effort to contribute to the economy of both nations. Oil would be produced in South Sudan, and Sudan would provide assets for transport and processing. The agreement also stated that South Sudan would make a financial contribution to the Republic of Sudan to cushion from financial loss resulting from loss of oil revenues (Spears, & Wight (2015). Accordingly, the Agreement provides for Transitional Financial Arrangements (TFA) whereby the Republic of South Sudan will make substantial financial contributions to Sudan. The financial assistance was to be made over a period of 42 months. The “Joint International Approach” was also cited in the Agreement on certain Economic matters. In this Agreement, the two nations will participate in seeking to secure debt relief and financial support for Sudan’s debt. The two nations, however, faced the challenge over the control of Abyei, the wealthiest oilfield in both countries. The final decision over this 10,460 square kilometers of oilfield was reached in the International court. Neither country was given power over Abyei. The presidential commission formed in the year 2005 was given governance over the oilfield.



1. Using no more than two sentences, describe Auto- Zone’s strategy.

2. Based on Michael Porter’s discussion of the characteristics of an effective strategy, does AutoZone have a good strategy for growth? Explain.

3. To what extent is AutoZone following the five steps of the strategic-management process?

4. Conduct an environmental scan or SWOT analysis of AutoZone’s current reality and recommend whether the company’s current strategy is poised to succeed.

4. Which of Michael Porter’s four competitive strategies is AutoZone trying to follow? Discuss.

5. What is the greatest takeaway from this case in terms of strategic management?

·  550 words with conclusion and use level header for each question.

·  3 sources and use APA format for the citation


For similar essays, make an order at essaydynamics.com

New customer? Get a 30% discount to try us.

No plagiarism. Your essays will be checked for plagiarism by reliable and top class software. 100% originality is guaranteed.

We meet your deadline


Evaluate different axiological assumptions of the EU and US in their response to the immigration crisis

Question description

Critically Evaluate different axiological assumtions of the European Union and US in their response to the immigration crisis

The paper is to present briefly a comparative analysis of two approaches towards liberty or a reflection on the impact of international judicial bodies on sovereign states. The paper should have from 3000 to 3500 words and have a form of a scholarly paper, with proper referencing and bibliography and should be written by harvard referencing style


For similar essays, make an order at essaydynamics.com

New customer? Get a 30% discount to try us.

No plagiarism. Your essays will be checked for plagiarism by reliable and top class software. 100% originality is guaranteed.

We meet your deadline


on’t Tell Mama!: pp. 62-67 (Bryant, fiction); 82 (Cavalieri, poem); 123-27 (Del Tinto, fiction); 148-53 (Guido, fiction); 193-98 (Ferro, fiction);164 (Di Piero, poem); 190-91 (Ferlinghetti, poem); 469-71 (Quiello, fiction).

Write at least 4 double-spaced pages about the readings from Don’t Tell Mama!: pp. 62-67 (Bryant, fiction); 82 (Cavalieri, poem); 123-27 (Del Tinto, fiction); 148-53 (Guido, fiction); 193-98 (Ferro, fiction);164 (Di Piero, poem); 190-91 (Ferlinghetti, poem); 469-71 (Quiello, fiction).

4 double-spaced pages is the minimum requirement: you may, and are encouraged to, write longer essays if you wish to expand on some readings, their themes, characters, stylistic choices, etc.

You may want to follow the “Readings: Analysis Guideline” below.

In your analysis of poems/short stories/novel excerpts/essays, address the following questions (questions 3 and 5 may not apply when dealing with an essay):

What point/s is the author trying to make? What message is s/he trying to convey?
What are the main ideas/themes/conflicts in this piece?
Who are the characters in the story? Describe them. Do any of the characters change during the course of the story?
What is the author’s ‘tone’ toward the subject/person/idea s/he writes about?
From whose ‘point of view’ is the story told?
Write why/in what way are the pieces you have read relevant to the Italian American experience: do they relate to/address/reflect key aspects/issues/values/customs/stereotypes/events discussed in this course?

Mr. Calata Foundation: The State of Philippine Farming

  • Type of paperArticle Review
  • SubjectAgricultural Studies
  • Number of pages2
  • Format of citationOther
  • Number of cited resources1
  • Type of serviceWriting from scratch

Reducing Methane Emissions Using Seaweed By Cattle

  • Format of citationAPA
  • Number of cited resources8
  • Type of serviceWriting from scratch

Friendship from dill in to kill a mocking bird

  • Type of paperAssignment
  • SubjectOther
  • Number of pages2
  • Format of citationMLA
  • Number of cited resources6
  • Type of serviceWriting from scratch