Get help from the best in academic writing.

Writing Style Logical Consistency Help Me With My History Homework


Historical Fiction and U.S. Slavery history assignment help online: history assignment help online

Historical Fiction and U.S. Slavery

The unit described herein will focus on the issue of slavery in the United States while also exploring the role that historical fiction can play in developing critical thinking, forming connections between people, ideas, and other times/cultures, and even in better understanding the modern world through an understanding of past technologies, capabilities, and limitations. Multiple technologies will be used throughout the unit to aide in the exploration of a specific text from multiple perspectives, identifying ways in which this text relates and ties to the lives of the fifth-grade students immersed in, and allow learners to make more immediate and direct connections between the text and the experiences embedded in it and their own life experience. Comparisons between technologies will be drawn, narratives will be identified and reconstructed, and the means by which fiction can be used to better explore history and provide understandings of real social, ethical, and psychological issues will also be identified. The learning in this unit will provide a solid foundation for other critical thinking, social studies, and literature/language arts units.

Key technologies that will be utilized during the unit include extensive Internet-based researching, the use of PowerPoint and/or similar software to create interactive multimedia presentations, and media recording equipment (audio and visual). All of these technologies are very modern innovations relative to the time period being studied, and there will be a natural disconnect perceived between the technologies and capabilities of the individuals examined within the key text and the surrounding historical context and those of the learner’s own time and capabilities. This initial separation will be used as an entry by the instructor to develop lines of critical thinking and association, noting the differences that exist as a means of identifying similarities — the desire to tell stories, to record stories, and to be able to take some control over our own actions and lives. The technological aspects of the learning planned in this unit will thus be used quite explicitly as a means of delving deeper into the thematic content of the unit, which is not actually technology-focused but rather is interested in exploring the way a fictitious text from another period can help lead to a better understanding of that period and of our own time and society. Learners will progress from research into the time period and a comparison with modern times to an immersive narrative construction the incorporates historical and autobiographical knowledge and storytelling, and the core truths about humanity that can be identified in the key text will be explored through a large project that serves as the culmination of the unit.

Freedom Stone, a novel by Jeffrey Kluger, will be used as the key text for this unit, and will include passages read as a group in class and read independently by students, at home and during some instruction time to provide assistance to those requiring it (Cunningham et al., 2011). The concept of “revealing the learner” as defined and discussed by Senge et al. (2012) provided highly important guiding principles in the construction of this unit and the educational approach it belies; the lessons are all designed such that they can be approached in multiple ways and completed successfully with a fair amount of flexibility in terms of speed and method of approach and learning. Freedom Stone provides many points of engagement for learners approaching the novel from a variety of experiences and perspectives, and takes place in a rich context that will allow for a full exploration of the thematic and technological content planned for this unit. The range of perspectives that it is hoped this unit will help expose learners to and allow them to express is also in keeping with the guiding principle of social justice in teaching, which explicitly recognizes the added difficulties that minority students have in finding representation in the curricula and understands the degree to which this absence reinforces marginalization amongst the entire population of learners (Henry et al., 2013; Hextall & Mahony, 2013). Overall, the unit is meant to provide students with a highly interactive and self-directed yet guided approach to understanding historical and current social pressures, conducting research and expressing their learning and creativity through a variety of different technologies.

Internet research will be utilized to some degree in all three lessons as a means of familiarizing learners with the practical and educational/narrative-building potential of a tool they are most likely familiar with in other contexts. Other technologies, including the PowerPoint software and audio/visual recording equipment, will be utilized as means of modern story-telling and narrative creation, with parallels to the experiences detailed in Freedom Stone drawn. In this manner, the technology utilized for learning will not only be used as a means of creating greater technical acumen and engagement with the learning but will be tied directly to the thematic content of the text. The artificiality of the creations will also be discussed as appropriate for the learning level, with the separation of fact and fiction and the difficulty in such a determination included in media discussions and presentations.

Lesson 1: Context Introduction

As an introduction to the novel Freedom Stone and the learning unit as a whole, preliminary guided research will be conducted on the Internet into the historical facts of slavery in the United States and certain details regarding the lives and rights — and lack thereof — of slaves. Principles of online literacy will be introduced, some explicitly as part of the initial guidance and some more implicitly as guidance continues and various cites and sources of information are encountered and discussed (Castek, 2008). Learners will be steered towards an understanding of the daily lives and experiences of slaves via the various narrative projects and other sources that exist online, and will also be encouraged to view images and listen to music of the time to gain a deeper appreciation for the social context within which the story is set. Each learner will be able to independently pursue certain areas of research, broadening their understanding of the historical context for the unit in a personal yet direct manner that will allow more full engagement with the learning. Class discussions with full participation and contributions from all learners will ensure that comprehensive information is provided in an interactive way, while technological acumen, online literacy, and independent research and critical thinking skills will all be enhanced via individual Internet exploration.

Encouraging a largely self-directed and multifaceted approach to historical studies has also been demonstrated to lead to far more effective learning, especially when properly guided and contextualized by appropriate classroom instruction before, during, and after such individualized research and varied media exposure (Brophy & VanSledright, 1997). By utilizing this lesson to provide individual time for immersion in the Internet technology and the aspects of history most appealing to each individual learner, the tone for the unit as one of ongoing exploration and personal identification with the learning material and context will be set and the immersion in historical detail will be more effective while online literacy is simultaneously promoted (Brophy & VanSledright, 1997; Castek, 2008). Lesson objectives will include the discovery and listing of various facts about the time period and issues in question, development of skills in finding specific pieces of information online, development of critical thinking skills that inform research and allow independent connections to be made, and practice in the communication and reception of ideas, facts, and critical connections will also be achieved through the group discussion element of the lesson.

Lesson Two: Technology Then and Now

After the contextualization of the first lesson and reading of the first few chapters in Freedom Stone, learners will already be immersed in the narrative of the book and an appreciation of the historical context of the narrative. Explicit differences between the time period and experiences detailed in Freedom Stone and of the learners’ own time and experience will doubly have been noted and been discussed, however this lesson will explicitly focus on these differences in a manner that ultimately reveals such differences to be historically/technologically constrained solutions to the same problems. The means of communicating that are observed in Freedom Stone will form an area of especial consideration during this lesson, with newspapers, slave songs, and other communication media all identified and first explored as different. Leaners will be assigned to groups to examine a different means of communication as it has been seen in the primary text and as they were used during the time period, again using Internet-based research. Students will then create a multimedia presentation using PowerPoint to illustrate the knowledge they have obtained in their specific area of study, and these presentations will be shown to the class.

After these presentations, a discussion of how these communication technologies would be viewed today will be engaged in, and groups will be tasked with deciding what modern technology is the best analog for their assigned historical communication media. Presentations will be adjusted to include this new connection. This lesson would itself actually consist of several smaller lessons in order to incorporate all tasks and provide proper room for learning and absorption. This extended time period will also assist learners in making greater strides with the multimedia technology they have available, which as a dynamic setting and experiential means of expression and communication requires time to allow for repositioning and reanalysis (Gonzalez et al., 2000). By progressing in segments, leaners will come full circle form an examination of how alien history can be to how similar the technologies of the period in question are to certain technologies of today, despite the substantial and unquestionable differences. Lesson objectives include an improved understanding of communication technology and its importance in all times, societies, and civilizations; an ability to make connections between historic technologies and capabilities and those that exist today, the ability to work effectively in groups, the ability to work effectively with software, and aesthetic skills in the design and construction of the multimedia project.

Lesson 3: Telling Stories

Towards the end of the unit, as the novel is nearly being completed in class and individual assigned readings, learners will be asked to write out in paragraph form the narrative of the central character in Freedom Stone. Each learner will then be asked to write out a similar narrative of their own life, finding similarities in their own growth and progress despite the clear differences that will exist in their life experiences compared to those of the protagonist in Freedom Stone. Learners will be encouraged to share their own narratives in a class-wide discussion, after which they will divided into pairs for the primary task of the lesson, that of creating an audio/visual version of their narrative. Ideas for “sets,” costumes, and props that can be used to illustrate various aspects of their own narratives or contexts will be given to the class by the instructor, with actual production of the media limited to the classroom environment. Equipment availability will prove a major time constraint for the project, but concurrent tasks and activities will also be available as limited recording equipment is shared by the learning pairs. Once learners have obtained some video and audio footage illustrating a narrative with at least three plot points, leaners will practice editing their footage using iMovie or other similarly simple available software.

Interpersonal interactions in both the narrative creation and in the substance and content of the narratives themselves — that is, placing the narratives in an explicit special and cultural context — will both be used in this lesson as a means of improving the quality of classroom interactions and of creating greater social awareness generally (Curby et al., 2011). The ability to share stories and the connections that story and narrative construction and sharing builds will be discussed in the context of Freedom Stone and the narratives created by the learners, with similarities, differences, and points of connection between various narratives discussed in the class following presentations of the created audio visual narratives. This lesson, like the second lesson described here, will need to be completed in a multi-part fashion in order to be effective and to retain interest and maximizing learning and absorption. Primary lesson objectives for this lesson include practice with critical reading skills, practice writing, technological advancement with audio visual equipment, experience with audio visual editing software, practice in interpreting and developing narratives, and the development of an appreciation for different modes of storytelling and expressing experiences.


This unit has far-reaching goals and a complex, multi-faceted approach meant to provide immersive learning in multiple areas. Though it is ambitious in its scope, it is built on strong foundations of educational theory and practice, and should prove effective in transmitting social, historical, and literary knowledge while also exposing learners to technologies that are already ubiquitous to much of day-to-day life and that will only be of greater importance as these learners grow older. The emphasis on guided but ultimately independent and self-directed learning is also an essential aspect of the unit plan, allowing learners to “reveal themselves” and learn about how they learn, providing a foundation for ongoing education and the development of stronger critical thinking skills.


Brophy, J., & VanSledright, B. (1997). Teaching and learning history in elementary schools. New York: Teacher’s College Press.

Castek, J.M. (2008). How do 4th and 5th grade students acquire the new literacies of online reading comprehension? Exploring the contexts that facilitate learning. ProQuest.

Cunningham, P.M., Hall, D.P., & Cunningham, J.W. (2011). Comprehension During Guided, Shared, and Independent Reading, Grades K-6. Carson Dellosa Publishing Company.

Curby, T.W., Stuhlman, M., Grimm, K., Mashburn, A., Chomat-Mooney, L., Downer, J., … & Pianta, R.C. (2011). Within-day variability in the quality of classroom interactions during third and fifth grade. The Elementary School Journal, 112(1), 16-37.

Gonzalez, R., Cranitch, G., & Jo, J. (2000). Academic directions of multimedia education. Communications of the ACM, 43(1), 89-95.

Hextall, I., & Mahony, P. (2013). Reconstructing Teaching: Standards, Performance and Accountability. New York: Routledge.

Senge, P., Cambron-McCabe, N., Lucas, T., Smith, B. & Dutton, J. (2012). Schools That Learn. New York: Random House.

Business Plan Forecasted Balance Sheets world history essay help

Business plan Version page

Business Plan

Business Identification:

Mission, Goals and Objectives:

Keys to Success:

Company Summary

Industry History:

Legal Form of Ownership:

Location and Facilities:

Management Structure:

Products and Service:

Market Analysis

Target Market

Industry Analysis

Competitive Analysis

Market Strategy

Price List-

Selling Strategy-

Sales Forecast-

Implementation Strategy

Overall Strategy-


Control Plan-

Financial Statements and Projections

F1. Revenue and Cost Estimate-

Error! Bookmark not defined.F3. Forecasted Balance Sheet-

Financial Projections

2G1a- Breakeven Point-

2G1b-Financial Position:

2G1c-Capital/Investment Needs:


Executive Summary

AAA Software, a security software vendor with proposed headquarters in Amsterdam, Netherland aspires to foster innovation by developing outstanding security solutions to make life simple while working on computers. There is a growing demand for antivirus/security solutions with the increase in the sales of Personal Computers. The company is likely to start its software development within the next few months and post development & testing the software will be available for sales immediately. The company is planning to outsource the development of antivirus software to reduce cost. The company will position itself in the competitive antivirus software market and will initially distribute the software throughout U.S. And then expand worldwide.

AAA Software will also strive to become one of the leading security solutions providers soon after its initial operation and launch.


Provide security software which delivers quality protection against virus, worms, other malicious programs, hacker attacks, spam and spyware with effective protection from all types of threats.


Envisage AAA Software as one of the leading player in the security software market.

Set a standard for excellence in the security software industry along with commitment to quality, good customer support and best security tools.

Always strive hard to provide the best security tools to its customers to become the business leader in the community.

Provide state-of-the-art-infrastructure to create an enjoyable working atmosphere that inspires loyalty and dedication


For Home and Small Office Users, AAA Software offers hassle-free quality protection for personal computers and laptops against virus, worms, malicious programs and other security threat

Unique Selling Point

AAA Software offer complete seamless security solution to its customers with efficient tools and high service quality.

Value Propositions for AAA Software

Unanticipated – Free software available for limited period with limited features

Desired – Easy and fast to install, Easy to download, Frequent Updates, Flexibility in delivery, Innovative

Expected – Provide protection from all type of threats, Reasonable Cost, Easy Availability, and Convenience

Basic – Compatibility, Quality protection, Provide peace of mind


AAA Software proposes to provide antivirus solutions to home and small business users which delivers seamless, hassle-free and quality protection against antivirus, anti-spyware, anti-spam and provides firewall protection. The antivirus software will be designed to protect the PC hackers and identity thieves. The antivirus will be designed to provide effective protection for all the threats that arise from the internet. The company will initially launch the antivirus software for Windows PC users, but will gradually upgrade the software for Mac users. The antivirus will be available in different versions for specific purposes (during the initial stage of operation).

Everyone needs protection from viruses and there are certainly more than a few antivirus products on the market. Over the last few years, various antivirus software vendors have entered the space and announcing new technologies to the market. Antivirus software provides an essential layer of protection from a multitude of virus, trojan, worm, spyware, adware, dialer, keylogger and rootkit infections.

The increase in the number of personal computer and laptop users, there is a surge in the demand for anti-virus software in the market, esp. within the home users and small office users segment. However, even with the increasing demand, customers tend to be more concerned with the price and the effectiveness of security solution as there is plenty of free antivirus software available in the market. Also, new viruses are created each day increasing security risk and dangerous trend of malware spreading through cloud-based file sharing services along with the increasing acceptance of broadband. Thus, there is a need to protect the computers and laptops to prevent cyber thefts and system failures on our computers. The virus might corrupt or delete data on the computer or completely erase it.

But, there is a widespread piracy which continues to hinder the growth of this market. However, the increasing convergence of security solutions is expected to promote market growth.KET D

B. Company Summary

B1. Industry History:

According to Gartner, the worldwide security software revenue totaled $17.7 billion during 2011, a 7.5% increase from 2010 revenue of $16.4 billion. The market is slated to grow to $23.3 billion during 2015. This growth in the security software segment is driven by increase in Small and Medium Business (SMB) and their demand, advanced persistent threats and compliance were among the main drivers. The worldwide security software revenue is shown in the figure.


According to Gartner, although the economic downturn slowed security revenue, organizations have indicated an intention to give priority to security budgets. Gartner’s principal research analyst Ruggero Contu, forecast that the most segments (including antivirus) will grow over the next few years. The security software market continues to benefit from prioritization and demands related to compliance requirements, as well as the need to keep up with ever increasing sophistication and volume in the threat landscape. Key countries that are expecting higher growth are China and India, but did not experience double digit growth.

The market share of companies in the security software market is shown in the figure below:


B2. Legal Form of Ownership:

The business will be comprised of as a limited liability company and operate online for the customers globally.

B3. Location and Facilities:

B4: Management Structure:

The company will be managed by a team of highly qualified individuals with experience in the internet and affiliate marketing. The company will be owned by Mr. A who is a self-employed internet marketer since the age of 16. He has also been a successful affiliate marketer for over 5 years and grew up doing online marketing.

Key Personal

The company will hire highly qualified business and industry professionals/experts who will assist the management team in making appropriate decisions and taking the most effective decision. The company will also hire outside consultants and professionals to provide tremendous input and support to enable the management to make well-informed, creative and appropriate decisions. The following are the people who will be required to assist the management team:

Board of Directors/Advisors

Outside Consultants & Professional Advisors

Accountant/CPA, Auditor

Legal Counsel

Marketing/PR Agency

Apart from the Board of Directors and the Outside Consultants & Professional Advisors who assist the management in strategic decisions, the company needs to hire people who will run the daily operations. The company will attract key talent and every effort will go into locating and training the appropriate person, who have sales aptitude, software know-how, positive attitude, problem solving skills and integrity.

B5. Products and Service:

AAA Software proposes to provide antivirus solutions to home and small business users which delivers seamless, hassle-free and quality protection against antivirus, anti-spyware, anti-spam and provides firewall protection. The antivirus software will be designed to protect the PC hackers and identity thieves. The antivirus will be designed to provide effective protection for all the threats that arise from the internet. The company will initially launch the antivirus software for Windows PC users, but will gradually upgrade the software for Mac users. The antivirus will be available in different versions for specific purposes (during the initial stage of operation).

C. Market Analysis

A research conducted by the market research agency GfK NOP Pvt. Ltd. has researched the Small and Medium Business (SMB) Landscape on their security software usage. The key results of the research are outlined below


A research conducted by the market research agency GfK NOP Pvt. Ltd. has researched the Small and Medium Business (SMB) Landscape on their security software usage. The key results of the research are outlined below

C1: Target Market- Describe the current market for your company’s product.







Start with U.S. And spread across the globe in a phased manner




>15 Years





Family Size

Single/Married/With Children



Students, Professionals, Homemakers, Businessmen, Executives


Socio-Economic Class

A, B, C

3) Psychographic



Technology oriented lifestyle, People curious to try new technology and software

4) Behavioral



Throughout the year as consumers can use the antivirus software at their own time.



Functional Benefits (Removes Malware, virus, protects passwords, etc.)


User Status

All type of users (Non-Users, Potential Users, First-Time Users and Regular Users)



There is not much loyalty in this industry. But if consumers are happy with an antivirus software, they would prefer using the same again


Readiness Stage

Interested and Intend to buy

C2: Industry Analysis – Discuss the characteristics of this industry such as growth trends, units sold, or employment.

Alternatively, the target market for the antivirus industry can be approximately estimated by the number of new PC usage worldwide. The market size for AAA Software based on PC usage can be estimated by the total number of new PC sales and the level of antivirus usage on them. The total PC usage during the corresponding year is shown in the figure.


C3: Competitive Analysis- Describe your company’s current competition.


Registered/Head Office

Czech Republic

United States

United States

Slovak Republic

United States

Number of Users

More than 150mn users





Product Variants

Home Users – Antivirus (Free, Pro and Internet Security), Products available for Mobile and Mac, Business Users — Small or Home Office, Enterprise and Server needs

Home Users – AVG Antivirus Free, Antivirus, Internet Security, PC Tuneup, Secure Search, Business Users — Antivirus, Internet Security, Email Server, File Server, Linux Server, Rescue CD, Remote Administration, Mobile Users — Antivirus Free/Pro

Home Users, Business Users — Microsoft System Center Endpoint Protection (only upto 10 users)

Home Users — Antivirus, Mobile Security, Cyber security for Mac, Business Users — Small and Business Solutions, Enterprise Solutions, Professional Services

Home Users — Norton 360, Internet Security, Antivirus, Mac Security, Mobile and Tablet Security, Multi-Device and Cloud Security Software, Enterprise Users, Small Business Users

Trial Versions




Yes, Business Trials also available

Minimum System Requirements

Windows 7, Vista, XP with SP2 or higher, P3 Processor, 128MB RAM

Pentium 1.8 GHz Processor, 512 MB RAM, Windows 7, XP, Vista

Windows 7, XP, 256 MB RAM, 200 MB hard disk space, IE 6.0/Firefox 2.0

Intel/AMD, Windows 7, XP, Windows 2000, 55MB

Windows 7, XP, Vista, 300 MHz for XP, 1 GHz for Windows 7, 256MB RAM, 300 MB space, IE 6.0, Firefox 3.0, Chrome 10.0

Pricing and Validity

Avast! Internet Security / Pro – $39.99, Secure Line – $69.99

Antivirus – $39.99, Internet Security – $54.99, Premium Security – $69.99, File Server – $39.99, Linux Server — $162.99, Email Server – $149.99, Antivirus Business Edition – $89.99, Internet Security Business Edition – $125.99


Smart Security – $53.99, Antivirus – $39.99, Cyber security for Mac – $39.99

Antivirus – $39.99, Internet Security – $49.99, Norton 360 — $59.99

Brand Positioning

Price — Free, Product- Best Protection, Varying levels of protection, Maximum Business Protection

Product — Free protection, High quality, Active Protection

Product — Anti-annoying, Anti-expensive

Product — Smarter, Lighter PC Protection

Product – #1 in Security Software, Symantec Authentication, Trade-in, Trade-Up to Symantec

Unique Features

Heuristics Engine, Real-time Shields, Greater Usability, Hybrid Cloud Technologies,

Award winning antivirus, Highest level of protection, Business Partner Program

Real-time protection, Comprehensive malware protection, Alerts only on specific actions, Efficient, Compact, Digital Signature Service,

New Parental Controls, Internet Security Training, New Gamer Mode, Multi-layered Protection, Online / Offline Protection, Advanced On-access Scanning, Threat sense technology, Cost Effective, Flexible, Customized, Live Grid, Interactive

Top ranked, comprehensive, smart and effective protection, Seamless technology, Easy to use, PC Tuneup,

Other Features

Smart Updates, New Protective and Hi-Tech Features, Endpoint, File Server, Email Server, Avast Community

Remote Support, 100% Money Back Guarantee, Rated best value for money

Easy to use, Simple to install, Automatic Updates, Award winning protection

Secure, Proactive Protection, Built for Speed, Easy on You, Seamless Updates, Interactive Comparison, Fast Scanning,

Cybercrime Tool, Web-based Backup, Silent Mode, Monthly Report, Power Saver Settings,

On-site Support





Yes (24×7)




Scalable only upto 10 users




Affiliates, Resellers

Distributors, Re-sellers, Affiliates, Technology Partner

The Link Logo Program (Allows financial institutions, academic institutions, business that has consumer facing to offer the software at no cost, OEMs and System Builders can pre-install the software in the product at no cost

Worldwide Business Development Partners (Provide high margins, Dedicated development exercise, Licensable multi-function engine for Windows & Linux

Partner Programs (Channel Partners, Service Providers, Technology Partners, Global Strategic Partners, Specializations), Symantec University for Partners,


North America Antivirus Product Market Share

Microsoft made its biggest gains in this category, with Security Essentials increasing 6.6% over the previous six months for a total market share of 21.3%. This is much more than twice the 8.2% of its nearest competitor, avast! Free Antivius, which lost almost 1.5%. Total Defense (CA) Antivirus Plus also experience a big gain of 4.6%, resulting in 6.1% of the market and a remarkable climb from 18th to 4th position on the list. The remainder of the top five — AVG Antivirus free edition (#3) and Norton Antivirus (#5) posted losses of about 2% each. In contrast, Norton’s second product on the list — Internet Security — gained 1.8% of the market for a 3.5% market share. Overall, the top 11 AV products in North. America increased their combined dominance of the market, with a gain of 6.2% for a total of almost 70% of the market. Nearly half of the market is controlled by the top 5 products

Worldwide Antivirus Product Market Share

Avast! Free Antivirus continues to lead the worldwide market at 13.5%, an increase of 1% over the 6-month period. Usually this increase would reinforce the top product’s position, but Microsoft Security Essentials is close behind and narrowing the gap. Security Essentials has almost 13% of the market, and with a 2.3% increase, is gaining at a much faster rate than that of avast! Free Antivirus. The third-most popular product, ESET NOD32, also increased its share to 8.3%, a gain of 1.2%, while the next three competitors each lost more than 1% of the market. Further down the list, the biggest gain in the challengers came from Norton Internet Security, gaining 1.5% for a total market share of 2.8%. Avira Free Antivirus and Norton Antivirus show the biggest loss at -1.5% each. The top 11 products showed a slight increase in their control of the market and the top five products combined

D. Market Strategy

The following are the marketing objectives during the first year of operation:

To position the company as one of the ‘Premium antivirus software’ in the industry

To increase awareness and establish a brand name and recognition of its antivirus products to increase the exposure

To establish an image of the company as an organization that is professional, technologically advanced, reliable and highly positioned in the market

Try to bring AAA software as ‘Top of the Mind’ brand within the target segment

To establish a strong base in the market and achieve a turnover of during the first year of operation. The marketing plan is designed to establish a strong base over the next 12 months of operation after which AAA Software can upscale to projected revenue of – and – during the second and third year of operation

Focus Areas

Attract customers who are using competitor’s antivirus competitors

AAA Software will attract customers by providing efficient and quality product to its customer

AAA Software will offer value-added services along with the product to attract customers

New customers who require antivirus software

Be it customers or businesses, AAA Software will create visibility through its various promotional strategies

Enhance focus on online marketing will be done to promote the products

Actively follow the market to acquire more new customers

Non-users of antivirus software o AAA Software has realized that about 20% of the market is not using the antivirus software. Capturing a small share will increase the market share of the company

Marketing Strategy

Make it easy for new customers to experience the software

Build a network of partners who have complementary relationships with your target customers

Leverage testimonials from customers who have used the product

Promote the software by submitting it to as many download sites and directories possible

Affiliate Marketing is one technique with which people will promote and sell the software products from their websites

Pay per click advertising is a marketing technique to bid for relevant ‘keywords’ that brings pertinent results to the product sold

Target Geographic Market

New customers who require antivirus software

Be it customers or businesses, AAA Software will create visibility through its various promotional strategies

Enhance focus on online marketing will be done to promote the products

Actively follow the market to acquire more new customers

Non-users of antivirus software

AAA Software has realized that about 20% of the market is not using the antivirus software. Capturing a small share will increase the market share of the company

D1: 4Ps.

Market Entry Strategy

Market Penetration Strategy

AAA Software will gain the competitor market share by pricing the product at a competitive price (called “penetration pricing”) for its premium product and a free product for its antivirus software which would bring in first time users and also act as a tool in switching customers of competition

AAA Software will provide other value-added services which will attract many users to their company

Intensive promotional and branding activities will enable greater reach and better market penetration

Attract customers from competitors by focusing on their Unique Selling Proposition (USP) and Value Proposition

The company will have strong alliances and partnerships with software vendors who will provide additional business.

Antivirus Software Market Trends and Tendencies

By examining these leaders, we are able to look more closely at market trends of antivirus and how these market trends are influenced by the features of these antivirus products. The antivirus market tendencies are not only established by market leaders, but the infections that continue to be released all the time. Market leaders set the trends by reacting to threats quickly and keep their product dynamic and up-to date11.

User Friendly Interfaces

Primary reason for a vast success in the market is because it has the easiest of user interfaces available in the market today. Aviary and AVG also have very good user friendly interfaces, but there is a problem with these products

Each year, even though the options remain similar, they change the theme or the style of all the options. The regular users who find it irritating to map the functionality of the new model of antivirus protection

Frequent Updates to the Virus Database

Another key features for the success of antivirus software is the frequent updates. The security solutions are updated almost weekly with latest updates. Microsoft Security Essentials (MSE) is another top product in North America which is gaining popularity

Real Time Social Networking and Email Protection

With the advent of technology, internet and social networks, high magnitude of data transfers is bound to happen constantly and viruses are to be sent from one computer to another. Therefore, antivirus real-time protection software is greatly needed to protect uses from infection, identity thefts, blackmail, phishing and fraud. Real-time protection has become standard or all reputable products

Network Protection

Network protection is predominantly required in the business environment and the premium security solutions cater only to the home computers. Norton is the leader in the Network Protection sub-segment

OPSWAT release quarterly market share reports for several sector of the security industry. This report include both worldwide and North American market share of antivirus software and Window Operating System. The key outcomes of the report published by OPSWAT about the antivirus vendors are elucidated below:

Worldwide Antivirus Vendor Market Share

A vast continues to dominate the worldwide antivirus market, as it has for the last few years. Now at 17.4%, the vendor has slightly increased its share compared to the previous 6-month period. However, its two competitors, Microsoft and ESET, increased their shares at D2: Price List-

Value Pricing

Provide a flat fee for the product rendered to the customer based on the features and its validity

User-based Pricing

Provide a variable fee for the product rendered to the customer based on the number of users who will be using the same

Bundled Pricing

Provide a bundled/discounted pricing for the product rendered to the customer

Monthly Pricing

Provide a fixed monthly fee for the product rendered to the customer which allows the customer to use the software for a limited period

Premium Pricing

AAA Software will offer antivirus solutions with limited features to its customers which allows them to experience the product

D3: Selling Strategy-

Promotional Tools


AAA Software will advertise in various IT and Technology magazines and publications which increases the visibility of the software

Social Media

AAA Software will use social media effectively to establish its presence and reach the mass. Some of the social media tools used are Twitter, Face book, YouTube, etc.

Brochures, Flyers & Presentations

AAA Software will use brochures and flyers to reach the consumers


AAA Software will offer discounted packages, seasonal discounts, etc. To frequent users of antivirus software and those who avail antivirus for longer periods.

Referral Program

AAA Software will have referral programs for customer who can refer a buyer of the product and get discounts on the next buy of the software

Cross Promotion

AAA Software will promote its value-added services of the product such as internet security

Blogs and Forums

AAA Software will promote its products by constantly updating information about its product on various software technology blogs and forums with the help of influential bloggers in the software domain

Word of Mouth/Viral Promotion

AAA Software will consider this as a most successful marketing tool as the recommendation from satisfied customers will increase their business

Marketing Campaign

AAA Software will promote its brand to the software vendors for gauging their initial acceptance to the product. The company will also promote its brand to the customers

News Letters and Press Releases

AAA Software will send monthly/quarterly newsletters to its customers, re-sellers, partners and strategic alliances

Partner with software development vendors who will help the company in developing the software and update the software frequently with their R&D and cutting edge technology

Software Development Alliances

AAA Software will partner with software distributors, re-sellers and retailers who will help them reach the market, market and sell the product to the customers

Channel Alliances

AAA Software will partner with delivery providers like FedEx and other major providers for quick & efficient delivery. The company will also partner with fulfillment centers

Logistics Alliances

With PC manufacturers who can bundle/embed the software while selling to companies

With CD label manufacturers who can make the DVD/Packaging at competitive rates

The company will have relationships with its strategic alliances/partners through which they are expected to generate business. The strategic alliances are:

D4: Sales Forecast-

The target market size for the antivirus industry can be approximately estimated by the number of new PC sales worldwide. The market size for AAA Software based on new PC sales can be estimated by the total number of new PC sales and the level of antivirus usage on them. The PC Market can be product segmented into PC Server Sales, Desktop PC Sales and Mobile PC Sales. To estimate the market size for AAA Software, we can eliminate the PC Server Sales and consider the other two segments (i.e. Desktop PC Sales and Mobile PC Sales). The total new PC sales during the corresponding year are shown in the figure.


E1. Overall Strategy-

Promote the software by submitting it to as many download sites and directories possible Affiliate Marketing is one technique with which people will promote and sell the software products from their websites. Pay per click advertising is a marketing technique to bid for relevant ‘keywords’ that brings pertinent results to the product sold. The overall strategy will be based on low cost and high quality software to the end consumers


Threat of New Entrants

1. Cost of entering the antivirus market is very low and thus enable any company to become an antivirus solution provider

2. As the industry is growing at a very good pace and showing promising opportunities, threat of new entrants is very high

3. Small competitors or lesser known competitors might have competitive advantage

4. Cultural barriers acts as a major factor to enter the industry, esp. The global market

5. Established IT companies entering the antivirus market e.g. Intel takeover McAfee

Threat of Substitutes

Budget is a challenge for companies to develop the software, update and diversify. Thus companies with less funds may not be able to invest high on technology and the competitors might capture the market share

Customers switch to other service providers if the quality of the existing service provider is poor and does not meet expectations

Industry Rivalry

90% of the market share is captured by 11 antivirus solution providers (e.g. A vast, Microsoft Security Essentials, Avira, AVG, ESET, etc.)

Rivalry and competition is very high between the top antivirus solution providers as they pursue strategies that give competitive edge over their rivals

Aggressive growth strategies by small competitors in the unorganized sector causes rivalry

Growth of internet is one of the main growth drivers of the antivirus industry and many business and household depend on internet for their daily work

With the advent of internet and its growing usage, the proliferation of virus is very high thus driving the antivirus market

Bargaining Power of Suppliers

Partnership with the outsourcing software development company is critical as entire business depends on the software develop and updates

In the antivirus market, forward integration is not possible as a software development company may not be willing to enter the antivirus market

Supplier switching cost is very low as there are many software development companies who are willing to offer a highly competitive cost for development

Bargaining Power of Customers

There is very little difference between the core services offered by the antivirus solution providers and thus the customer can choose between them. This is a major bargaining power for the customers

Customers have very low or nil switching cost from one antivirus provider to the other as many offer trail versions of the software and the customers can use and test them

To capture the market share, many antivirus solution providers offer their product with complete features at a very competitive cost to its customers

The bargaining power of the customer increases depends on the size of the organizations, the number of users and the validity of the product

Fluctuation in demand for our products/services due to economic conditions, competition, technological change, change in buying patterns, levels of broadband usage, security threat to IT systems and other factors

Unable to develop new and enhance products/services that achieve widespread market acceptance

Dependence on the outsourcing company for development of software and its updates

Longer development cycle for new products, product enhancements, etc.

Entering into new and unproven markets which has limited exposure and experiments

Operating in a highly competitive environment will allow competitors gain the market share and will reduce the company revenue

Improper management of sales and distribution channels/partners

Problems generating visibility, product positioning and branding

SWOT Analysis


Focus on a specific target segment (i.e. Home Users and Small Business Users)

Basic antivirus software is available for free

Competitive Pricing for software with advanced features

Emerging markets for software products and solutions

Very attractive and profitable growth potential

Exploit software development by outsourcing

Offer value-added services along with the product

Will have impressive partner program to attract distributors

To be launched in the place where antivirus users are in large number


No proven track record in the industry

No brand recognition

Relatively small organization in a vast industry

Limited availability of funds and requires investor funding


Worldwide security software revenue totaled $17.7bn during 2011 and is slated to grow to $23.3bn during 2015

Can start offering the product to consumers and then diversify into Small and Large Business products

Educate users about threat and the use of antivirus. Try to capture the market share of people who don’t use any antivirus

The business model is scalable and can be replicated in several countries in a phased manner

34% of the people use paid antivirus

Global Antivirus for Consumer Antivirus Software $4.72bn during 2012 and will grow $6.32bn during 2018


Competition is intense in the industry

For security reasons, financial institutions may wish to have the technology development and support teams in-house which reduces the opportunity for outsourcing

The industry has a low entry barrier

E2 Financial Statements and Projections

G1. Financial Projections





Year 1

Year 2

Year 3

Year 4

Year 5

Property Value






Cash Investment


















Brokers Fees and Closing Costs






Proceeds after Mortgage and RE Fees







Mortgage Interest






Property Insurance






Property Taxes







Property Management






Total Operating Expenses






Income Tax Adjustment (30%)






Net Costs after Tax Benefit







Net Costs after Tax Benefit






Mortgage Principal






Cash Outflow






Net Cash Flow after Sale







Property Value






Less: Cost Basis (Purchase Price)






Less: Cost Basis (Improvements)






Less: RE Brokers Fees






Long-Term Capital Gain/Loss






Capital Gains Tax (15%)






Long-Term Capital Gain/Loss After Tax






G1a- Breakeven Point-

Table: Break-even Analysis

Break-even Analysis

Monthly Revenue Break-even



Average Percent Variable

Cost 30%

Estimated Monthly Fixed

Cost $9,647

G1b-Financial Position:


Initial Sales Value:


Initial Property Cost:


Rate of Appreciation – Year 1:


Rate of Appreciation – Year 2-5:


Brokers Fees and Closing Costs


Income Tax Adjustment:


Capital Gains Tax:


G1c-Capital/Investment Needs:








Rent Income












Total Income






Property Insurance






Property Taxes







Property Management






Total Operating Expenses


















Mortgage Interest






Net Earnings before Taxes






Prior Year Loss Carry forward

Income Tax Adjustment (30%)






Net Earnings after Tax






Other Income and Expense

Capital Gains/Loss (Net of Tax)






Combined Income after Tax

$ (297,117)














$ (164,623)





Cash Equivalents


Short-term Investments

Non-Rental Property Held for Sale






Total Cash and Short-term Investments






Long-term Investments

Rental Property – LE






Rental Property – HE






Accumulated Depreciations-LT

Rental Property – LE






Rental Property – HE






Total Long-term Investments






Total Assets








Short-term Mortgage Loans






Long-term Mortgage Loans






Total Liabilities







Common Stock






Distributions in Excess of Net Income






Additional Paid in Capital

Retained Earnings






Total Equity






Total Liabilities and Equity


















Net Earnings after Tax














Mortgage Principal






Net Cash Flow







Blokdijk, G. (2008). Change Management 100 Success Secrets: The Complete Guide to Process, Tools, Software and Training in Organizational Change Management.

Cameron, E., & Green, M. (2012). Making Sense of Change Management: A Complete Guide to the Models Tools and Techniques of Organizational Change (3 ed.). Kogan Page Publishers.

Chambers, R. (Ed.). (2007). How to Succeed as a Leader (Illustrated ed.). Radcliffe Publishing.

Doe, J.P. (2011, 10-10). Retrieved from Student Template in APA for Business Plan:

Government Office for the South West. (2007). Managing Change. Ampersnad Design Ltd.

Gustin, J.F. (2007). Safety Management: A Guide for Facility Managers (2 ed.). The Fairmont Press, Inc.

AAA Software?

Firstname I. Lastname

Information Technology

0000 Name of St.

City, State 00000

(000) [HIDDEN]


October 11, 2011

Should Students Take a Gap Year Off After High School? ib history essay help: ib history essay help

Environment, high school graduates in the Middle East have started to think differently about their paths in life. For example, high school students have become aware that they can select the exact and appropriate course of their life by breaking free from the pressures of their parents and the pressures of the past. After finishing high school, students intending to pursue a higher education have two main choices. First, they can choose to go to college in order to continue their studies immediately after high school. Second, they can choose to take a year off known as a gap year. Usually the gap year entails working, traveling, or both. Taking a gap year can be a very good stepping stone for students before entering university. It exposes the young person to new people, places, and ideas. The year between high school and college is very valuable for students because it allows them to think about their future, helps them pursue a path that is not constrained by the pressures of family and society, and exposes them to a range of experiences, people, and ideas.

A gap year is valuable because it provides space for the student to think about the future without the confines of family or society. While in high school, the student is still trying to please his or her parents and teachers. The student has spent an entire life until that point trying to live up to the society’s standards. Parental expectations can cloud the student’s vision of the future. Often, society’s standards and parental expectations are unrealistic or even unhealthy for the student. This can lead to great distress and unhappiness later in life, if the student pursues a college or career path just because it is what the parents wanted. As the University of Canberra (2012) points out, the gap year helps the student gain maturity, perspective, confidence, and independence. These four features help the student to envision a future that is entirely their own, without the expectation or pressures of family. During the gap year, for example, a female might discover that instead of becoming a nurse as her mother urged her, she decides to become a lawyer. Pursuing a path that is unique does not mean that the student gives up on family. On the contrary, the student becomes a better member of the family after developing the confidence to be independent.

Therefore, the student develops a unique identity during gap year. This personal identity becomes very important, even crucial, during adulthood. When an individual develops a unique personal identity during the gap year, that person returns to college sure of what his or her goals are in life, and full of energy, motivation, and dedication to accomplishing those goals. As Birch & Miller (2007) found, students who take a gap year earn higher marks in university than students who go straight to college from high school. Thinking about the future can therefore have a direct positive influence on the ability of the student to succeed in whichever career path is chosen.

Travel is a core component of many gap years, because travel exposes students to learning opportunities that cannot be acquired in a classroom environment. The individual who does not take a gap year might not be able to travel to this extent, because once university has commenced, the pressure of schooling becomes immense. During gap year, the individual is still young enough to enjoy the fruits of traveling before the pressures of a degree program and internship begin.

Another reason why traveling is critical to the gap year is that the individual might not otherwise be exposed to different cultures. During gap year, the individual usually meets people from different backgrounds and different cultures. This encourages a vision of the future that is far different from the one that might have been accepted if the student went straight to college after high school. When the student goes to college straight away, he or she does not have the opportunity to explore different ways of being, or different work paths. Exposure to other cultures reveals different job sectors that might exist in parts of the world that the person never entertained before. Likewise, traveling reveals opportunities for volunteer or charitable service. Traveling also opens doors to creative entrepreneurial ideas that the individual might not have thought of without taking the gap year.

Another reason why the gap year is valuable is because it exposes the student to “real world” or “real life” experiences, in the sense that they are not part of the relatively safe academic environment of the university. Campus life is healthy and good, but it is insulated from the outside world. Students who take a gap year can visit the places they read about, rather than simply reading about them.

The parents might not yet realize the importance of “real life” experiences to their child’s future, but an increasing number of colleges and universities are favoring students who take gap years. Some universities are actively promoting gap year experiences for their matriculating students, encouraging them to defer enrollment until after a year of work-travel has been accomplished. For example, Princeton University in the United States “announced plans to formalize a ‘bridge year’ program for admitted students to do service work abroad before enrolling,” (MacDonald, 2008). As Heath (2006) found, “the gap year emerges as an important means of ‘gaining the edge’ over other students in the context of increased competition for entry to elite institutions,” (p. 89). Students seeking entrance to elite universities would therefore do well to consider a gap year experience, and persuading their parents to assist in the endeavor. If the parents are concerned about the motivation of gap year, research shows that the gap year is about much more than “rest and relaxation,” (MacDonald, 2008, p. 1). University admissions officers know that the applicant who takes a gap year can gain a wealth of knowledge that cannot be acquired in the classroom. This knowledge, gained by work and/or travel, can help that student become a more valuable member of the university campus life. This is especially true for students hoping to attend universities in diverse countries like the United States, Canada, and Great Britain.

Two main objections to the gap year include the fact that it might be more difficult for students to get back into school after the gap year. The student might start partying during gap year, and lose interest in academics. After a gap year, the student might decide to take a whole new path other than that which was outlined by the parents. In fact, this is one of the reasons why a gap year can be so very important. Another objection to the gap year is the fact that not all students can afford it. The gap year might be just one more way that poor students have fewer opportunities than more privileged students. Regardless of whether the gap year is taken, though, a student can still do very well in college and enter a lucrative career path.

Therefore, the gap year is helpful for all students because it encourages clear thinking about the future, exposes the students to new ideas and experiences, and helps them to pursue an independent path. When a student takes a year off between high school and college, that person can see how people in other countries live or how people in their chosen profession actually spend their days. The gap year often entails a focused venture that might include traveling to a foreign country or countries; and often that traveling also includes working or volunteering. Many of the universities most desirable to students in the Middle East are looking for well-rounded, worldly applicants and taking a gap year is the best way to develop those desirable traits.


“Are Gap Years A Waste of Time?” (2001). BBC. 21 Aug, 2001. Retrieved online:

“The Benefits of a Gap Year.” The Good Universities Guide. Retrieved online:

Birch, E.R. & Miller, P.W. (2007). The characteristics of gap year students and their tertiary academic outcomes. Economic Record 83(262): 329-344.

Heath, S. (2006). Widening the gap: pre-university gap years and the ‘economy of experience.’ British Journal of Sociology of Education 28(1): 89-103.

MacDonald, G.J. (2008). ‘Gap year’ before college gives grads valuable life experience. USA Today. June 18, 2008. Retrieved online:

Soderman, N. & Snead, S.L. (2007). Opening the gap: the motivation of gapy year travelers to volunteer in Latin America. Chapter 10 in Journeys of Discovery in Volunteer Tourism. CABI.

University of Canberra (2012). Are there any benefits in taking a gap year? Retrieved online:

Solicited Proposal Student Demographics for C.T. Bauer ap art history homework help

Solicited Proposal

Over the last several years, the world of business has been continually changing. This is because globalization and advancements in technology have transformed the kind of strategies that are being utilized by professionals. As a result, the C.T. Bauer College of Business needs to expand the number of courses that it is offering online. This will provide the University of Houston with increased amounts of exposure and give them the ability to have cutting edge business solutions. When this happens, the school will be able to reach out to a larger number of candidates and it will increase the underlying levels of support for various programs. (“C.T. Bauer College of Business,” 2012) As a result, the thesis statement will focus on the impact of adding more online courses.


The best way that the C.T. Bauer College of Business can address these challenges is to expand the total amount of courses they are offering online. This is because the college has a history of working with a diverse group of students from different backgrounds. Evidence of this can be seen in the below table (which is showing a significant number of individuals who are pursuing their degrees in a non-traditional format).

Student Demographics for C.T. Bauer College of Business



Part Time BMA

Full Time MBA













These different statistics are illustrating how a large amount of students are attending the school part time. Moreover, there is a considerable percentage that is from international backgrounds. This means that expanding the number of online courses will provide everyone with greater choices. Over the course of time, this will allow the school to create programs that are addressing the needs of businesses. (“Our Exceptional Students,” 2012)

Moreover, the college is offering a wide variety of online classes ranging from: accounting to finance. This has helped students to excel in real world business environments. Once this takes place, is when they are effective in assisting corporations with addressing their underlying needs. As a result, this has caused 3,000 firms to come to the college, who are seeking out the best graduates. While 436 corporations, have formed strategic partnerships with the C.T. Bauer College of Business. The combination of these factors is showing how the school needs to begin offering more online courses. This will allow the college to increase the total number of partnerships and expand the kinds of programs they are offering. When this happens, the University will improve upon its reputation. (“C.T. Bauer College of Business,” 2012)

At the same time, this kind of flexibility will allow the University of Houston and C.T. Bauer College of Business to compete against some of the best schools in the country. This is because the larger choices of courses will give students more areas to specialize in. Once this takes place, is when the college’s graduates will be sought out by some of the country’s top employers. This is when the school will attract a larger demographic of well qualified students from around the world.


Clearly, the statistics are illustrating that a significant amount of students at the C.T. Bauer College of Business are attending classes in a non-traditional format. This means that the school should be expanding its online programs that are geared towards this demographic. Over the course of time, this will allow the University to build upon its reputation among the business community. This is the point that more firms will seek out the school’s graduates and form strategic alliances with the college.


C.T. Bauer College of Business. (2012). University of Houston. Retrieved from:

Our Exceptional Students. (2012). University of Houston. Retrieved from: