Wednesday, August 26, 2020

Conspicuous consumption Research Paper Example | Topics and Well Written Essays - 3750 words

Prominent utilization - Research Paper Example Tastes and inclinations were the key determinants for the acquisition of rich merchandise. Outstandingly rich items that kept up great quality where wanted more. Pay didn't have a heading on the choice to buy lavish products, the same number of individuals were not captivated by the cost of merchandise. The Chinese white collar class take part in obvious utilization so they can keep up a high remaining in the general public. They are more westernized and snazzy in this manner looking to be more uncommon than the other Chinese. As of late, China has seen a consistent yearly development pace of 10%. This ascent has impelled China to a monetary powerhouse in under three decades. As a result of China’s rise, roughly 500 million individuals were raised over the destitution line (Frith, 2010). The working class didn't just hotel to unfeasible top of the line ways of life yet additionally transformed from a sparing to a spending society. Obvious utilization is increasingly articulated in China since it has a generally high number of youthful tycoons. Chinese tycoons lie at 39 years old years being more youthful than their worldwide friends are. These tycoons devour extravagance merchandise so as to keep up their expert connections and high social statuses (Dorothea, M2011). Chinese individuals are known for gloating in the public arena through responsibility for items. They incredibly esteem achievement, riches, and societal position through showing costly watches, gems and vehicles to pick up regard from the ordinary people. Chinese ‘little emperors’ are likewise a significant factor adding to prominent utilization of rich merchandise in China. These youthful buyers are a consequence of the one kid strategy that was received in the 1970’s. Those conceived during that period are without kin thusly being the focal point of consideration of guardians (Dorothea, M2011). They were raised as spoilt kids who got what they needed, when they needed it. It is for this

Saturday, August 22, 2020

List of the Marginal Seas of the Indian Ocean

Rundown of the Marginal Seas of the Indian Ocean The Indian Ocean is a generally huge sea with a zone of 26,469,900 square miles (68,566,000 sq km). It is the universes third biggest sea behind the Pacific and Atlantic Oceans. The Indian Ocean is situated between Africa, the Southern Ocean, Asia and Australia and has a normal profundity of 13,002 feet (3,963 m). The Java Trench is its most profound point at - 23,812 feet (- 7,258 m). The Indian Ocean is generally known for causing the monsoonal climate designs that command quite a bit of Southeast Asia and for being a significant chokepoint all through history.The Ocean additionally fringes a few minimal oceans. A minimal ocean is a territory of water that is an in part encased ocean neighboring or generally open to the vast sea (Wikipedia.org). The Indian Ocean imparts its fringes to seven minimal oceans. Coming up next is a rundown of those oceans organized by region. All figures were acquired from Wikipedia.orgs pages on each sea.1) Arabian SeaArea: 1,491,126 square miles (3,862 ,000 sq km)2) Bay of BengalArea: 838,614 square miles (2,172,000 sq km)3) Andaman SeaArea: 231,661 square miles (600,000 sq km)4) Red SeaArea: 169,113 square miles (438,000 sq km)5) Java SeaArea: 123,552 square miles (320,000 sq km)6) Persian GulfArea: 96,911 square miles (251,000 sq km)7) Sea of Zanj (situated off the east bank of Africa)Area: UndefinedReferenceInfoplease.com. (n.d.). Seas and Seas - Infoplease.com. Recovered from: infoplease.com/ipa/A0001773.html#axzz0xMBpBmBwWikipedia.org. (28 August 2011). Indian Ocean - Wikipedia, the Free Encyclopedia. Recovered from: http://en.wikipedia.org/wiki/Indian_oceanWikipedia.org. (26 August June 2011). Minimal Sea - Wikipedia, the Free Encyclopedia. Recovered from: http://en.wikipedia.org/wiki/Marginal_seas

Wednesday, August 12, 2020

You made it to the waitlist, but who said that you need to wait

You made it to the waitlist, but who said that you need to wait If youve been placed on a schools waitlist, congratulations! You werent rejected, and many are accepted each year from waitlists. As an MBA Admissions Consultant, I advise my clients not to sit back and wait, at least not in most cases. Working to get accepted from a waitlist is simply another step in the MBA admissions process. Here are some points to consider: 1. Carefully read the email you received from the school. Some schools tell you not to do anything more than just wait. If they say that, then you take a risk if you try communicating with themâ€"so you probably should just sit tight. 2. Luckily, most schools will not ask you to do nothing. In that case, you need to launch a subtle but active campaign to get accepted from the waitlist. Be careful, since schools change their rules every year. For example, Harvard Business School used to instruct waitlisted applicants not to do anything. This year, it changed its instructions to leave it up to you as to whether or not to add materials to your application. So Id recommend taking advantage of that opportunity. First of all, assess where your application may have been weak. If youre brave, call someone you know in the schools admissions department or the person who interviewed you, and see what you can learn about areas where you need to strengthen your application. Then submit information to address that area. For example, you might: a. Submit an additional recommendation. If you worked with an admissions consultant, the chances are good that s/he helped you to decide which recommenders to use right away and which one or two to save for use should you get placed on a waitlist. Often, theres someone at your employer, perhaps a higher level executive, who wasnt your day-to-day supervisor but is a true leader and knows one when he sees one. Or you can consider getting a well-known alumnus or business leader to recommend you. b. Submit a series of letters. Start with one that thanks the admissions office for putting you on the waitlist, and makes it clear that you are still eager to go the school and wish to remain on the waitlist. Reinforce something strong about you. Then in a couple of weeks, send a follow-up letter that emphasizes things youve done since you first applied and that make you a stronger candidate. If your GPA was a bit weak, talk about courses youve taken recently where you got great grades. If your GMAT was a problem, submit a new, higher score. Tell the committee about new leadership responsibilities youve had at work, new accomplishments, volunteer charity leadership, etc. One of your goals should be to keep yourself at the forefront of the admission committee’s minds, so when an opening occurs, they consider you before others. c.. Possibly visit the school again. One of my very first clients lived in California and was waitlisted at MIT Sloan. He had already been accepted by Wharton but wanted to get accepted by MIT Sloan. He flew out twice to the school and managed to meet both times with the Admissions Director. She was impressed and he eventually was accepted. Be careful to not become an annoyance. Always use discretion regarding the frequency with which you follow up with schools. But unless the school has said not to do so, you can take control of the post-waitlist process. In many cases, your follow-up will make the difference between getting off the waitlist and settling for your second choice school. Need guidance in your MBA/EMBA Application process? Maximize your applications with help from The Essay Experts MBA Admissions Consulting Services. Or feel free to email me directly at larryessayexpert@gmail.com. Larry Sochrin

Saturday, May 23, 2020

Salvage The Bones And Up From Slavery - 2002 Words

There have been a lot of issues throughout history that concerns African Americans. They had issues with family, they had their strength and weakness, and they also struggled a lot from back in the day. â€Å"Salvage the Bones† and â€Å"Up from Slavery provides examples from all of those themes. Family is one of the main themes in Salvage the Bones. The story reflects on how family helped them get through a lot. Up from slavery also tells us about family. It’s similar to Salvage the Bones, but in a different perspective. Everyone would agree that African Americans had to struggle more than the white people, and â€Å"Up from Slavery† and â€Å"Salvage the Bones provide great context of that. African Americans also had their strength and weakness. African Americans have had their strength and weakness. Salvage the bones and up from slavery provides great context of this. In Salvage the Bone, the novel questions who are stronger between the male and female. Esc h draws the attention when she attacks Manny, winning the fight just as China did when it came to fighting kilo. It was a connection made from Esch, by narrating â€Å"I am on him like China† (203). As the novel continued, the female characters grew stronger as their male counterparts grew weaker. This is symbolized in Skeetah’s relationship with China, which often brinks on relationship. Although Esch compares Skeetah to knives continually throughout the text, he gets weaker without China, who is describes to be one of the strongest of herShow MoreRelatedManagement Course: Mba−10 General Management215330 Words   |  862 Pagesclearly under enormous stress. To maintain business growth and a sustained economy, it is essential for managers to understand and find solutions for these and other fundamental wide-ranging issues. The bursting of the high-tech bubble both in many start-up companies and in major segments of established firms dissipated many entrepreneuri al efforts and the large sums of money that were spent to create organizations that never earned a profit and were often hugely unsuccessful as business entities. However

Tuesday, May 12, 2020

Essay about Assignment 2 Critical Infrastructure Protection

Assignment 2: Critical Infrastructure Protection Eustace LangleyCIS 502 May-23-2013 Facilitator: Dr. Gideon U. Nwatu Strayer University Critical Infrastructure Protection Introduction The Presidential Policy Directive (PPD) on Critical Infrastructure Security and Resilience advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure (The White House Office of the Press Secretary, February 2013). It is imperative for every nation to develop a critical infrastructure protection plan that will provide the essential services to its society. To archive this, a government must be proactive and coordinate its efforts that will reinforce and maintain secure, functioning, and†¦show more content†¦To knock down these impediments, the present administration must initiate an action plan that marshals federal resources and technical support wisely, helps cities and states understand their infrastructure vulnerabilities and identify their priority upgrades, and incentivize private-sector investment to rapidly drive a major wave of productive new investments. Below we outline the core elements of such a successful national strategy for infrastructure resilience. Launch a national infrastructure-vulnerability assessment The Obama administration must conduct a single comprehensive assessment of our nation’s infrastructure. This survey would link the information that already exists within the agencies so it would look systematically at the needs and vulnerability of U.S. transportation, electricity, water, ports and other strategic infrastructure and identify pressing infrastructure needs nationwide. The survey would then help the administration develop a strategy to promote efficient and rapid deployment of advanced infrastructure at the nationalShow MoreRelatedSecurity and Graded Assignment Requirements1285 Words   |  6 PagesGraded Assignments STUDENT COPY    The following sections contain student copies of the assignments. These must be distributed to students prior to the due dates for the assignments. Online students will have access to these documents in PDF format, which will be available for downloading at any time during the course. NT2580 Introduction to Information Security STUDENT COPY: Graded Assignment Requirements Graded Assignment Requirements    Assignment Requirements documents providedRead MoreTaklang Sampelut1423 Words   |  6 Pages1: Information Systems Security Fundamentals Learning Objective ï‚ § Explain the concepts of information systems security (ISS) as applied to an IT infrastructure. Key Concepts ï‚ § Confidentiality, integrity, and availability (CIA) concepts ï‚ § Layered security solutions implemented for the seven domains of a typical IT infrastructure ï‚ § Common threats for each of the seven domains ï‚ § IT security policy framework ï‚ § Impact of data classification standard on the seven domains Read MoreEvaluation Of A Access Control Policy855 Words   |  4 PagesCBA SECURITY INFRASTRUCTURE I would like to describe the list of all kind of security that CBA implement: †¢ Security app services bank o Encryption – transport layer o Application whitelist blacklist o URL authorization o Automatic Website isolation o Digital certificate code signing o Remote access †¢ Security data service o Encryption all of the data within the company †¢ Security server o Malware protection disk protection o Networking ipV6 IPSEC o File classification infrastructure o Trusted platformRead MoreCloud Computing Risks Business Adoption925 Words   |  4 PagesLearn and applied skills: The thing that was truly learned during this assignment was how much time it takes to read each article for clarity. This assignment also help to develop better organization and categorizing skills for getting this assignment completed. Applications applied to the topic: The topic for the dissertation is relating to unavailability or down-times for small business using cloud computing. The research on the articles used helped to apply Bloom’s Taxonomy for knowledge, comprehensionRead MoreWhat Is DHCP 1 : An Overview Of A Network System?879 Words   |  4 Pagesrequirement for active directory and domain, other network infrastructures have to integrate into the active directory scheme and will be deployed in all IMI location. By implementing DHCP, service in its environment administrators will minimize errors caused by manual IP address configuration, such as typographical error or conflicts caused by the assignment of IP address to more than one system at the same time. All servers and mission-critical computers on the network will be assigned a static IP addressRead MoreQuestions On The Web Services Model1296 Words   |  6 PagesAssignment 2 Ebtesam Falah Alhajri, 2120007594, G:1 Write down detailed answers to following questions. At least write 250 words for each question. All assignments will be evaluated with plagiarism software and submissions having a similarity rate of more than 35% will be awarded 0 marks. While answering the questions use the rules of scientific writing such as in-text citations, paraphrasing etc. Maximum Marks=5 Due Date: 23 November 2016 1. The web services model involvesRead MoreUniversity Of New South Wales1397 Words   |  6 Pages University of New South Wales CVEN9611 –Urban Hydraulic Structures Assignment Stefan Felder Submitted by: Garth Cooper Student Number – z3189074 â€Æ' Question 1 Toowoomba City is located 125km from Brisbane in Queensland on the Western side of the Great Dividing Range. It consists of two main creek catchments, east creek and west creek catchments. In January 2011 there was a main flooding event which caused a large flood event that is described as an â€Å"Inland Tsunami†. Figure 1 - Catchment mapRead MorePricing Of Airport Facilities And Services1086 Words   |  5 Pagesof renewals. In contrast, long-term leases are more critical, permitting carriers or outsider engineers to construct airport facilities, and to amortize their venture, developers require at least 25-30 year leases (Air Cargo Guide, n.d.). Airports must take in consideration the following aspects when determining rates: â€Å"rental rates against other locations on and off-airport, carrying cost, operating costs such as security and fire protection, utilities, maintenance, personnel, administrative andRead MoreRequirements For The Corporate Computing Function Essay1181 Words   |  5 Pages Assignment 2: Requirements for the Corporate Computing Function Frank Blow Dr. Sharon Rose CIS 505 - Communication Technologies 10/20/16 Abstract This paper will describe a nine-point mission statement for the company from the new corporate CIO. It will address the new strategy in a three-phase rollout plan. It will then speculate why the fifth point, â€Å"Meet information requirements of management†, is in the CIO’s list of nine points. It will then imagine only three points are toRead MoreArbitrage Assignement Essay1546 Words   |  7 Pagesï » ¿Mergers and Acquisitions Homework Assignment 1 (revised 9/14/2013) The attached (end of this file) press release dated 12/16/04 from Symantec (SYMC) describes conditions under which it would acquire Veritas Software (VRTS). Note that will find arbitrage examples and other useful information in the file: â€Å"Arb Handouts w-o formulas.xlx† on Blackboard. This assignment has two parts, A and B. A. Arbitrage Analytical Analysis (spreadsheet required) This first part requires that you analyze

Wednesday, May 6, 2020

Challenges faced by Indian IT Free Essays

1. Uncertain global economy: The Indian IT outsourcing industry gets about 75% of its revenues from US and Europe. The renewed concern regarding the European sovereign debt has led to companies slowing down their IT spending. We will write a custom essay sample on Challenges faced by Indian IT or any similar topic only for you Order Now BFSI segment has been the biggest contributor to Indian IT revenues. As shown in the figure below, the recent turmoil in Europe US has resulted in slowing demand in BFSI segment. Source: Business Standard 2. Protectionist measures: There have been periodic threats of the US stopping all outsourcing work. Rising US rhetoric against shipping of jobs to low cost locations ahead of US presidential elections in November might result in lower market shares for Indian IT companies. The US Senate will be looking into a bill backed by the Democratic party popularly known as the ‘Bring Jobs Home Act’. If the bill is passed, tax benefits will be extended to companies that shift their work back to the US will end tax incentives for those who send work offshore. On the other hand, Europe has quietly enforced visa restrictions making people difficult to travel onsite for work. . Tough competition from MNCs: Increasing competition from MNCs like IBM, Accenture who have set up bases in several of the IT zones earlier dominated by Indian IT firms. Also, US wages have been decreasing and are on par with Indian wages for some of the sectors. Outsourcing will be less attractive to American employers. 4. Pressure on billing rates: Discounts from key financial sector clients is pinching IT f irms. On 12th July, Infosys claimed that pricing has fallen by 3. 7% in the June quarter from the previous quarter. As the growth in demand has fallen, firms are vying for the small pie by opting for price cuts. 5. Low employee utilization: Increasing bench size has been reported across various IT firms. Employee utilization has fallen down to 67% for lot of Indian companies. Companies have to reserve certain human capital so as to accommodate them in case of future demand. 6. Volatility of Indian rupee against the dollar: Depreciating rupee helps the IT industry. Increase its revenues as most of the companies earn in US dollars. However, as the companies would have already hedged against rupee appreciation in advance, the currency volatility wouldn’t affect much. Planning for the future becomes a problem. Major players in Indian IT: 1. TCS is the largest software company in Asia and was one of the pioneers of the global delivery model. Its Q1 results have been slightly better than expected with 14. 6% increase (over previous quarter) in Q1 profit at Rs 3280 crore with revenues at Rs 14869 crores. TCS has said that it is expecting to beat the forecasts of 11-14% growth in revenues set by NASSCOM for FY13. According to the CEO, TCS has been seeing strong growth from markets like North America, UK Europe despite the gloomy economic environment. 29 new clients were added in the June quarter. Successful execution of its restructuring much before its competitors has been one of the reasons of success for TCS. Also, it is more flexible than its peers when it comes to pricing. And is more open to the client’s suggestions The fixed component is atleast 8-10% higher than that of its peers. 2. Infosys is the 2nd largest Indian IT service provider and reputed for its work ethics world class management practices. In the past by exceeding revenue expectations, it kept investors and analysts happy. But by failing to meet expectations in 3 of the 5 recent quarters, it has lost its status as the industry bellwether. It has cut down its revenue forecasts for FY13 to 5% down from its April estimate of 8-10% growth. The company has underlined weak macroeconomic environment, falling clients’ confidence fall in discretionary spending (spending by corporate which can be held back at discretion and are usually for long term benefits) as the reason behind its fall in revenues. Critics have blamed the poor results on the change in leadership, its inability to motivate its employees when the morale is already down because of delayed and small pay raises, premium pricing in the face of slowing economic growth and its conservatism by not using its excessive cash pile (around $3. 7 billion as of June 2012) to make acquisitions that can make it a global company. The CEO said that Infosys is looking out for opportunities in product, consulting, platform space and system integration. The company’s strategy of positioning itself as a premier global consulting system integration major has backfired since the economy has still not recovered from the slowdown. 3. Wipro is the third biggest Indian IT firm and its revenues for the year 2011-12 stood at $5. 7 billion. It is betting on regions like Latin America, Asia Pacific and Ghana as they have been contributing almost 16-17% of the total revenues for Wipro. Wipro is also shifting its focus from telecom equipment vendors who have reduced IT spending to telecom analytics mobile broadband where the end users are telecom operators. . HCL Technologies is the fourth largest Indian IT company. In the last 2 quarters, it has won deals worth $2. 5 dollars and Europe has contributed almost 54% to it. It is strong in total IT outsourcing which comprises of infrastructure services, application development and maintenance. While most of the other Indian IT firms are vying for high-end consulting contracts, HCL has been focusing on infrastructure deals. Future prospects : Inspite of the economic upheaval, Indian IT firms still feel that BFSI will bring in the maximum revenues. The optimism is based on the fact that even clients were supposed to have cut spending during the credit crisis time, Indian IT exports have grown $33 billion between 2008-09 to 2011-12. However all the IT firms have to get used to lower margins. Gone are the days when experienced 30% growth. IT firms have so far mainly relied on cost differentiation. To cope up with the various challenges, they need to start innovating. So they have to find new markets, new customers, develop products etc. For eg: Wipro has started offering to IT solutions to the petroleum industry in Ghana. Transformations are taking place as the use of cloud computing mobile devices is slowly increasing. Infosys has added about 20 new clients in the past quarter in cloud, big data and security. With the increase in use of apps on mobiles, programs are being written for mobile. Also companies have started positioning themselves as IT consulting firms. In the near future, government of India might provide the impetus as it plans to go big on digitization. The immediate future for IT companies may not be as bright as it was in the past. But companies should reboot its systems and log on to new sites The decade of 1990 was the golden era for information Technology in India. With liberalization, privatization globalization, Indian IT Sector took huge leaps in Information Technology. Today, with total revenues of about $88. 1 billion, Indian IT sector being one of strongest industries worldwide has grown for more than 30% for more than 20 years. Indian IT firms have moved up the value chain from low cost programming in the early years to providing premier global IT consulting services. Before the onset of recession in 2008, the IT industry flourished thanks to the exponential increase in global IT spending. During the recession, companies decreased their IT spending thereby slowing down the growth of IT industry. But this created a pent-up demand for IT. With economic recovery, companies have started spending on IT albeit with great caution. Fig : Statistics of IT BPO in India Intense competition has impacted growth in billing rates thereby affecting revenues. For the first time in 47 quarters, Infosys missed quarter’s expectations. The major IT firms have reduced their growth expectations for the year 2012-13. The top 4 Indian IT companies grew at 17% in the 3rd quarter and at 14% in the fourth quarter as opposed to 24% in the first quarter in the last financial year and this is a cause of worry. Industry Verticals: The various verticals in IT sector are shown in the pie chart. Achievements of Indian IT sector in 2011: Increase in global sourcing industry from 51% in 2009 to 58% in 2011. * Contribution to India’s GDP has increased from 1. 2% in 1998 to 7. 5% in 2012. Demand Supply : Due to the expansion in IT sector in terms of form, volume etc, there is a continuous demand for engineering graduates, skilled workforce etc. Being a service oriented industry, this sector is highly dependent on manpower. While there is enough of supply of grad uates, it is very important for the labour to be technically competent and possess soft skills. How to cite Challenges faced by Indian IT, Papers

Sunday, May 3, 2020

Project Proposal-Wal-Mart Fedex free essay sample

Professor I think according to some internet articles that I’m currently reading I should be able to provide an interesting paper on the successes and obstacles that each company face and the strategies of both company’s employs and how they use various techniques to increase their organization effectiveness in order ensure great performance of their workers. I shall expand upon their efforts as I work on the course project. Well I like how you are thinking so far! References Mann Jr, Joseph (2012). A Few Questions for Rush OKeefe CEO Fed Ex. Air Space Lawyer. (Vol. 25 Issue 3, p23-24. 2p). Retrieved from DeVry library database. Nickles, W. G. , (2010). Understanding Business (9th  ed. ) McGraw-Hill, New York, NY (pp. 321). Wolf, Alan (2013, April 22). MillManfrotto Broadens U. S. Business, Outsources Distribution with Wal-Mart. TWICE: This Week in Consumer Electronics. (Vol. 28 Issue 9, p33-33. ). Retrieved from DeVry library database. Where is the hanging indent for your references and remember to list them alphabetically? Also, there are items missing from your references. We will write a custom essay sample on Project Proposal-Wal-Mart Fedex or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page Nickles looks like a text?! If so, there should be an italicized portion. The others do not need â€Å"Full text available† placed in the body of the reference. Check with the APA manual for the ruling on this or Purdue OWL works well also. 23/25 |Part 2: The Change Analysis Images of Change (Due Week 3) | | The â€Å"Images† section focuses on the six different images of managing change and how each â€Å"approach† to change effects all that follows in its implementation and continued support. Download the â€Å"Week 2 Project Images Grid† from doc-sharing. Pick three of the â€Å"images of change† explained in the Week 2 lecture from the grid, and analyze how those particular â€Å"images† would affect the ensuing diagnosis and implementation in your two selected companies on their change plans. Here’s what to do: 1. Working with the information that you provided in your topic proposal, and any feedback you have received from your Professor, flesh out the facts and information from your original proposal. . Review the changes in each company and describe them thoroughly in a word document. Explain how the change impacted the companies, and who it impacted. Compare some of the similarities and differences between the change in the two companies. 3. Look at your grid and pick three images of change from your grid. Fill out the empty blocks on the grid for those three images using outlines, bullet points, and rough ideas for both company’s change. 4. Now, in a Word document, analyze, compare and contrast the three images and explain how the behaviors of those images would be different or the same during your companies’ changes, and how those differences could (or did) impact the success (or failure) of the change, comparing and contrasting the results at both companies. 5. Explain which image (or combination of images) you feel would have best facilitated the described change and why. 6. Based on the information you actually read about the results of this change, state which image you think the leader of the change actually resembled the most. You may speculate here on which image you feel best represents the â€Å"change agent† at either or both of the companies. This will depend on how much information you found about the internal workings of the company during the change. This paper should focus on evidence that demonstrates how the management of the organization integrated one or more of the six images of managing change (Chapters 2 and 3) how effective the change was and what management could have done differently to increase the probability of successfully implementing the strategic change initiative. Again, this is a compare and contrast paper – so include information about both companies in your report. Grading rubric for paper #2 –  Change Images |Item |Total points | |Properly filled out and submitted change grid showing your initial analysis and |10 | |notes. | | |Two companies selected, â€Å"briefed†, and referenced. 20 | |Thorough description of the change explained |20 | |Comparison of the two companies, similarities/differences of the changes and the |25 | |results | | |Image analysis |25 | |At least 4 new references, properly cited. 10 | |Total Points |110 | References should be scholarly I just need help with put together billets in the excel spreadsheet.