Friday, September 22, 2017

List four areas of negligence for allied health professionals

List four areas of negligence for allied health professionals. Discuss the standard of care in each area, and how that standard can be applied to the healthcare facility. 150 words
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Areas of negligence for allied health professionals

List four areas of negligence for allied health professionals. Discuss the standard of care in each area, and how that standard can be applied to the healthcare facility. 150 wrds
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

A theme has a few different definitions. As defined in your text, "a theme can be, broadly, a topic explored in a literary work (e.g., 'the value of all life'), or, more narrowly, the insight about a topic communicated in a work (e.g., 'All living things are equally precious').

A theme has a few different definitions. As defined in your text, "a theme can be, broadly, a topic explored in a literary work (e.g., 'the value of all life'), or, more narrowly, the insight about a topic communicated in a work (e.g., 'All living things are equally precious'). Most literary works have multiple themes, though some people reserve the term theme for the central or main insight and refer to others as subthemes." Many works have a few themes, some major, and some minor. Think of it as a sort of message.
Grading
Each Reading Response forum is worth 10 points. See the grading rubric attached to the discussion topic.
Instructions
1. View the following texts and their notes. Note that works of the imagination often include many themes, and some may be more prevalent than others. There are also many ways to indicate how the theme is embodied in the work. Think of these as guidelines, and don't limit yourself to these interpretations.
"The Road Not Taken" with notes Excerpt from "The Story of an Hour" with notes 2. Read the works for this exercise assigned by your instructor on the Reading to Find a Theme: Assigned Reading checklist.
Reading to Find a Theme: Assigned Reading checklist 3. Then go to Reading to Find a Theme discussion topic and respond to the following discussion questions about the works and their themes.
Discussion Questions: What do you find the theme to be? What is the larger idea or message from the story/stories? Use references from the text to explain and support and your point. Reading to Find a Theme Discussion topic
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Disorders of the Veins and Arteries Advanced practice nurses often treat patients with vein and artery disorders such as chronic venous insufficiency (CVI) and deep venous thrombosis (DVT).

Assignment: Disorders of the Veins and Arteries Advanced practice nurses often treat patients with vein and artery disorders such as chronic venous insufficiency (CVI) and deep venous thrombosis (DVT). While the symptoms of both disorders are noticeable, these symptoms are sometimes mistaken for signs of other conditions, making the disorders difficult to diagnose. Nurses must examine all symptoms and rule out other potential disorders before diagnosing and prescribing treatment for patients. In this Assignment, you explore the epidemiology, pathophysiology, and clinical presentation of CVI and DVT. To Prepare
1. Review the section “Diseases of the Veins” (pp. 598-599) in Chapter 23 of the Huether and McCance text. Identify the pathophysiology of chronic venous insufficiency and deep venous thrombosis. Consider the similarities and differences between these disorders. 2. Select a patient factor different from the one you selected in this week’s Discussion: genetics, gender, ethnicity, or behavior. Think about how the factor you selected might impact the pathophysiology of CVI and DVT. Reflect on how you would diagnose and prescribe treatment of these disorders for a patient based on the factor you selected. 3. Review the “Mind Maps—Dementia, Endocarditis, and Gastro-oesophageal Reflux Disease (GERD)” media in the Week 2 Learning Resources. Use the examples in the media as a guide to construct two mind maps—one for chronic venous insufficiency and one for venous thrombosis. Consider the epidemiology and clinical presentation of both chronic venous insufficiency and deep venous thrombosis. To Complete Write a 3- to 4-page paper that addresses the following:
1. Compare the pathophysiology of chronic venous insufficiency and deep venous thrombosis. Describe how venous thrombosis is different from arterial thrombosis. 2. Explain how the patient factor you selected might impact the pathophysiology of CVI and DVT. Describe how you would diagnose and prescribe treatment of these disorders for a patient based on the factor you selected. 3. Construct two mind maps—one for chronic venous insufficiency and one for deep venous thrombosis. Include the epidemiology, pathophysiology, and clinical presentation, as well as the diagnosis and treatment you explained in your paper.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Define computer crime.

Part A Define computer crime.
Part B Differentiate between insider and outsider computer crimes. The crime you choose could be embezzlement (insider), theft (outsider), or another form of crime such as mail fraud or child pornography.
Part C Summarize five computer crimes that you find on the FBI website. Detail the cases, methods of investigation, charges brought, and identify the federal and state laws that govern the crimes. Include in your discussion a summary of how investigators ferreted out the offenders, the charges brought against them, as well as the minimum and maximum consequences for committing such a crime. If the offenders have not yet been punished, detail the possible consequences they will receive for their misdeeds.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Using your mock business or organization, write a formal proposal explaining how your product or service could be provided in a more efficient and effective way.

Portfolio Project Proposal
This week, you are tasked to write a Formal Project Proposal for your portfolio (think gatekeeper readers). Using your mock business or organization, write a formal proposal explaining how your product or service could be provided in a more efficient and effective way. Your proposal should be directed toward gatekeeper readers.
Organize your proposal following the steps laid out in our textbook. You are free to choose the layout for your proposal, but make sure you are keeping your readers’ needs, values, and attitudes central in your design.
Your proposal should be 500-750 words in length.
One you have finished your proposal, please submit it to the week three drop box.
Portfolio Project Proposal
This week, you are tasked to write a Formal Project Proposal for your portfolio (think gatekeeper readers). Using your mock business or organization, write a formal proposal explaining how your product or service could be provided in a more efficient and effective way. Your proposal should be directed toward gatekeeper readers.
Organize your proposal following the steps laid out in our textbook. You are free to choose the layout for your proposal, but make sure you are keeping your readers’ needs, values, and attitudes central in your design.
Your proposal should be 500-750 words in length.
One you have finished your proposal, please submit it to the week three drop box.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Application: Planned Change in a Department or Unit

Assignment: Application: Planned Change in a Department or Unit
For this Assignment, you propose a change at the department or unit level and develop a plan for guiding the change effort. Book required: Marquis, B. L., & Huston, C. J. (2015). Leadership roles and management functions in nursing: Theory and application (8th ed.). Philadelphia, PA: Lippincott, Williams & Wilkins. To prepare:
1. Review Chapter 8 in the course text. Focus on Kurt Lewin’s change theory, and contrast it with other classic change models and strategies. 2. Reflect on problems, inefficiencies, and critical issues within a specific department, unit, or area in your organization or one with which you are familiar. Select one issue as a focal point for this assignment, and consider a change that could be made to address the issue. 3. Think about how the change would align with the organization’s mission, vision, and values as well as relevant professional standards. 4. Using one of the change models or strategies discussed in Chapter 8, begin formulating a plan for implementing the change within the department/unit. Outline the steps that you and/or others should follow to facilitate the change effort. Align these steps to the change model or strategy you selected. 5. Determine who should be involved in initiating and managing the change. Consider the skills and characteristics that are necessary to facilitate this change effort. To complete: Write a 3- to 5-page paper (page count does not include title and reference page) that addresses the following:
1. Identify a problem, inefficiency, or issue within a specific department/unit. 2. Describe a specific, realistic change that could be made to address the issue. 3. Summarize how the change would align with the organization’s mission, vision, and values as well as relevant professional standards. 4. Identify a change model or strategy to guide your planning for implementing the change. Provide a rationale for your selection. 5. Outline the steps that you and/or others would follow to facilitate the change. Align these steps to your selected change model or strategy. 6. Explain who would be involved in initiating and managing this change. Describe the skills and characteristics that would be necessary to facilitate the change effort.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Respond to a colleague’s post who has selected a different value.

Respond to a colleague’s post who has selected a different value. Describe whether or not your colleague’s post swayed your point of view. Does your opinion change when on reporting in different contexts? Why or why not?
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

History of punishment History of prison development Comparison of the Pennsylvania system and the Auburn system Impact and involvement of prison labor over time

Write a 700- to 1,050-word paper that examines the purpose and history of penitentiaries. Include the following: History of punishment History of prison development Comparison of the Pennsylvania system and the Auburn system Impact and involvement of prison labor over time Format your paper consistent with APA guidelines.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

larify, describe and explain carefully your answers.

a. Read The chapter 4: pages 79 to 111,: 1. Answer questions 1,2,3,4,5 in your textbook page 108 Note: Please Clarify, describe and explain carefully your answers.
b. Read The chapter 5: pages 113 to 136:
1. Answer questions 1 in your textbook page 62. Note: Please Clarify, describe and explain carefully your answers.
c. Read The Chapter 6: Pages 135 to 156 : 1. Answer the questions 1, 2, 3,4,5, 7, in your textbook page 154. Note: Please Clarify, describe and explain carefully your answers.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Analyze the relationship between cultural psychology and cross-cultural psychology.

Choose one of the case studies provided in the electronic readings for Week One. Note - for this exercise - you must you one of the 3 case studies listed in the electronic readings for week one. They are the first 3 listed. I have attached the Case studies, please pick one to use for this assignment. I have also included the Assignment grading rubric.
Write a 1,050- to 1,400-word paper in which you analyze cross-cultural psychology. As a part of your analysis, do the following: Provide an overview of the case study. Use the case study to provide a definition and an example of cultural and cross-cultural psychology. Analyze the relationship between cultural psychology and cross-cultural psychology. Discuss the methodology associated with cross-cultural psychology research. Discuss how the case study helps you better understand how ethnicity, race, and worldviews are separate yet related concepts. Discuss how enculturation may play a role in the case study you have chosen. Incorporate a minimum of three credible, peer-reviewed references. Format your paper consistent with APA guidelines.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

The class lectures, Entwistle, and McMinn all discuss the concept of suffering and factors guiding how we counsel those who are suffering

Consider how to counsel suffering clients. The class lectures, Entwistle, and McMinn all discuss the concept of suffering and factors guiding how we counsel those who are suffering. In fact, a careful reading of the Reading & Study materials indicates numerous concepts and principles that we could apply as we counsel those who are hurting. 1. Considering the numerous points that were made, make a list of at least 5 concepts (“questions to ask myself as I counsel those who are suffering. . . “) that you found particularly helpful, insightful, unique, or had not thought about before. What guidelines would you particularly emphasize as you counsel hurting people? 2. Then consider this client’s statement: Client: “Dr. Counselor, I have been coming to you now for six weeks. I am not sure that counseling is working. I don’t feel any better now than when we started talking. Why are you not helping to remove this pain that I am feeling?” If your client expects that you help to remove the suffering, how would you respond, based on what you learned from your study for the week?
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Ancient Near East Essay


This is a pass/fail assignment that must reach a minimum of 600 words. (Word counts are specific to each assignment and carefully chosen to ensure complete coverage of each subject. Essays that do not reach this required word count will not pass.) To receive credit you must fulfill ALL assignment criteria. This assignment uses Turnitin, a teaching tool that records your "similarity" report. Submit your paper early enough so that you can check your report. If your similarity is more than 7-8% you must rewrite and resubmit. Only the newest submission is graded.
Essay Evaluation Rubric
Describe the Epic of Gilgamesh and thoroughly explain its significance to both the culture in which it was created and our own time, using sufficient specific support from your textbook and the poem.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Career Management and Training

Assignment 1: Discussion—Career Management and Training
As your workforce continues to age, training professionals are at the forefront of designing and delivering programs that can assist employees in managing their current career as well as preparing for their retirement.
In this assignment, you will review how the rapidly changing workforce demographic is challenging training professionals to look at various approaches. You will discuss various approaches that may be an option for your organization.
Tasks:
Given the increasing age of your workforce, respond to the following:
Can retirees be as valuable as part-time employees in an organizational hiring strategy? Why? Defend your response. What might be the challenges in developing training programs for the retirees? Why? Submission Details: post your responses to this Discussion Area. respond to at least two of your classmates' posts. While responding, focus on expanding the discussion to include commentary and analysis of what your classmates are saying. Write your initial response in 300–500 words. Your response should be thorough and address all components of the discussion question in detail, include citations of all sources, where needed, according to the APA Style, and demonstrate accurate spelling, grammar, and punctuation
Do the following when responding to your peers:
Read your peers’ answers. Provide substantive comments by contributing new, relevant information from course readings, Web sites, or other sources; building on the remarks or questions of others; or sharing practical examples of key concepts from your professional or personal experiences Respond to feedback on your posting and provide feedback to other students on their ideas. Make sure your writing is clear, concise, and organized; demonstrates ethical scholarship in accurate representation and attribution of sources; and displays accurate spelling, grammar, and punctuation.
-------------------------------------------------------------------------------------------------
Assignment 1: Discussion—Bringing It All Together
You have reached the end of the course, and it is time to look back and review what you have learned. Training and development is a critical part of any organization and can be a defining part of the organizational success.
Task:
On the basis of your course readings, learning from the course, written assignments, and classmates' comments during previous discussions, respond to the following point.
Discuss at least three challenges of and three opportunities for the implementation and maintenance of an effective training program. Submission Details:
post your responses to this Discussion Area. respond to at least two of your classmates' posts. While responding, focus on expanding the discussion to include commentary and analysis of what your classmates are saying. Write your initial response in 300–500 words. Your response should be thorough and address all components of the discussion question in detail, include citations of all sources, where needed, according to the APA Style, and demonstrate accurate spelling, grammar, and punctuation
Do the following when responding to your peers:
Read your peers’ answers. Provide substantive comments by contributing new, relevant information from course readings, Web sites, or other sources; building on the remarks or questions of others; or sharing practical examples of key concepts from your professional or personal experiences Respond to feedback on your posting and provide feedback to other students on their ideas. Make sure your writing is clear, concise, and organized; demonstrates ethical scholarship in accurate representation and attribution of sources; and displays accurate spelling, grammar, and punctuation.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Saturday, September 9, 2017

Putting it into practice

Putting it into practice"
Specify two (2) concepts learned from this course that you think would be the most important for the success of a physician practice. Support your rationale. In your opinion, determine the most challenging aspect of a physician’s role as the administrator of a group practice. Justify your response.
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

American National Government

News Journals require you to relate current events to the topics covered within POS 2041, American National Government. For this Journal you will select your own article. The article you select will determine your success on this Journal. The article must be about Political Behavior (Elections, Political Parties, Public Opinion, Media, Interest Groups), and illustrate a concept discussed in your textbook. The news article you select must itself be at least 4 paragraphs in length and come from a major, national news source.
For a list of sources and search possibilities please go to the Media tab, on the POS 2041 Lib page. Please format your News Journal in the following manner:
Summary - Summarize in paragraph form the facts and issues presented in the article. Please document the source of your information with a parenthetical reference.
Application - Apply one or more concepts from your textbook to the information in the news article. Specifically explain how the material in your textbook is illustrated in the article you are examining. This can be accomplished by using examples from the article and terms or concepts found in the textbook.
Analysis - Provide an analysis that identifies the perspective presented in the article and compare it to your understanding of the effect of political behavior on American Government today. Please specifically identify each section by number and title.
Your essay should be between 300 and 500 words, double-spaced and in APA format, with parenthetical citations and a Reference List. A cover page is not necessary.
View the Written Assignment Rubric to understand how you will will be evaluated.
All essays will be submitted in the assigned drop box, which will include a Turnitin originality report. * News Journals require you to relate current events to the topics covered within POS 2041, American National Government. For this Journal you will select your own article. The article you select will determine your success on this Journal. The article must be about Political Behavior (Elections, Political Parties, Public Opinion, Media, Interest Groups), and illustrate a concept discussed in your textbook. The news article you select must itself be at least 4 paragraphs in length and come from a major, national news source.
For a list of sources and search possibilities please go to the Media tab, on the POS 2041 Lib page. Please format your News Journal in the following manner:
Summary - Summarize in paragraph form the facts and issues presented in the article. Please document the source of your information with a parenthetical reference.
Application - Apply one or more concepts from your textbook to the information in the news article. Specifically explain how the material in your textbook is illustrated in the article you are examining. This can be accomplished by using examples from the article and terms or concepts found in the textbook.
Analysis - Provide an analysis that identifies the perspective presented in the article and compare it to your understanding of the effect of political behavior on American Government today. Please specifically identify each section by number and title.
Your essay should be between 300 and 500 words, double-spaced and in APA format, with parenthetical citations and a Reference List. A cover page is not necessary.
View the Written Assignment Rubric to understand how you will will be evaluated.
All essays will be submitted in the assigned drop box, which will include a Turnitin originality report. News Journals require you to relate current events to the topics covered within POS 2041, American National Government. For this Journal you will select your own article. The article you select will determine your success on this Journal. The article must be about Political Behavior (Elections, Political Parties, Public Opinion, Media, Interest Groups), and illustrate a concept discussed in your textbook. The news article you select must itself be at least 4 paragraphs in length and come from a major, national news source.
For a list of sources and search possibilities please go to the Media tab, on the POS 2041 Lib page. Please format your News Journal in the following manner:
Summary - Summarize in paragraph form the facts and issues presented in the article. Please document the source of your information with a parenthetical reference.
Application - Apply one or more concepts from your textbook to the information in the news article. Specifically explain how the material in your textbook is illustrated in the article you are examining. This can be accomplished by using examples from the article and terms or concepts found in the textbook.
Analysis - Provide an analysis that identifies the perspective presented in the article and compare it to your understanding of the effect of political behavior on American Government today. Please specifically identify each section by number and title.
Your essay should be between 300 and 500 words, double-spaced and in APA format, with parenthetical citations and a Reference List. A cover page is not necessary.
View the Written Assignment Rubric to understand how you will will be evaluated.
All essays will be submitted in the assigned drop box, which will include a Turnitin originality report. Links to help you choose topic
https://digital.library.unt.edu/explore/collections/CRSR/ https://www.congress.gov https://www.nationaljournal.com https://news.google.com/news/?ned=us&hl=en https://www.popvox.com
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Bioecological System Theory

Discuss the Bioecological System Theory. Give the main problem the theory is attempting to explain. Give the reason why this is so, the solution the theory suggests, the weaknesses or criticisms of the theory. Apply the theory to your family or your patient's family. Answers to questions should be based on the readings from the textbook or from other references which should be in APA format and these should be in your own words, clear, concise and precise. The discussion questions presented may have m
CLICK HERE TO ORDER THIS PAPER………………………NO PLAGIARISM Get 100% Original papers from the writing experts Logo     CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……
ultiple responses. The goal is to support your position you have taken regarding the topic of the discussion questions.

Saturday, September 2, 2017

Common Chemical Hazards and Superfund Sites"

(these answers should only be two-three sentences max) expertsolution Watch the video titled “Groundwater Contamination” (4 min 35 sec) under the Water Pollution terms section of the Science Corner. You can also view the video at https://www.youtube.com/watch?v=5xs1jLlbztE. Next, explain the main reasons why some groundwater sources that we use may be more vulnerable to chemical contamination than others. Next, suggest one (1) strategy that the government can take to reduce groundwater contamination.
Access the Superfund Sites Website under the Super Fund terms section of the Science Corner. You can also access the site at http://www.epa.gov/superfund/sites/index.htm. Click on your region of the country in the map and then click on your state. Next, choose one (1) of the Superfund sites on the list and provide a brief summary of the site. Describe the community involvement (e.g., remediation strategies, current stage of cleanup at the site, etc.) in the discovery or cleanup of the site and give your opinion as to whether or not you believe the community involvement is efficient.
Imagine that you recently found out you live close to a Superfund site. Identify the most important information you would want to know about the site. Give your opinion on whether you would move to a new location. Explain why or why not.
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Pressure, Temperature, Electricity, and Magnetism

"Pressure, Temperature, Electricity, and Magnetism" Please respond to the following:
Read the article titled “Aging US Power Grid Blacks Out More Than Any Other Developed Nation” under the Smart Grid terms section of the Science Corner. You can also view the article at http://www.ibtimes.com/aging-us-power-grid-blacks-out-more-any-other-developed-nation-1631086. Next, assess the efficiency of the current state of the national electric grid in the United States. Then, describe the key challenges in updating this grid to a so-called “smart grid”.
Read the article titled “Earth's Inconstant Magnetic Field” under the Earth’s Magnetic Field terms section of the Science Corner. You can also view the article at http://www.nasa.gov/vision/earth/lookingatearth/29dec_magneticfield.html. Next, summarize the main reasons why the researchers stated that “our planet's magnetic field is in a constant state of change”. Then, discuss the overall manner in which a magnetic reversal might impact human activities on Earth. Include one (1) example of such impact to support your response.
Demonstrate an instance of static charge such as seen with examples #32 and 33 shown on page 209 of your textbook. Next, post a picture of your example then explain the method of charging you used as well as the charges displayed in each object.
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session.

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, a system should provide only what is truly needed. This means that a security expert has to carefully analyze what is more important among these three dimensions of security in a system or application.
Please provide an example (and justification) where the confidentiality of a system is more important than the integrity or availability of that system. Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system. Finally, provide an example of a system where the availability of a system is more important than the confidentiality or integrity of that system. For example, you might say availability is more important than integrity and confidentiality in a cell telephone system since one must be able to reach their loved ones in an emergency. Someone else might argue confidentiality/privacy is more important in such a system.
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

The Pacific Ocean is a powder keg ripe for explosion with the Imperial Red Fleet (IRF) making trouble by terrorizing the shipping lanes between us and our interests in the Far East.

Background: The Pacific Ocean is a powder keg ripe for explosion with the Imperial Red Fleet (IRF) making trouble by terrorizing the shipping lanes between us and our interests in the Far East. The Pacific Blue Fleet (PBF) needs a capable commander to lead them in this time of peril. You have been selected as the new commander of the United States Pacific Blue Fleet. Reconnaissance units have located the enemy fleet. You job is to engage the enemy fleet and annihilate them completely. The IRF fleet is well equipped and possesses ships that rival your own. They would like nothing more than to send your fleet to the bottom of the ocean. This battle would be decided by the cunning and tactics of the commander. Mode: The game should have three player modes: player vs. player or player vs. computer or computer vs. computer. Goal: Strategically place your ships throughout your part of the ocean to keep them away from the enemy. Try and sink the enemy by hitting their ships before they hit you! Skill Level: When the game is in player vs. computer mode, there should be 3 skills levels. The skill levels are as follows: Beginner: The computer randomly guesses selects coordinates. No intelligence involved. Intermediate: The computer will make an educated guess passed on previous hit. For instance, if computer achieved hit, it should check next available coordinate along x coordinate. Expert: The computer will make an educated guess passed on previous hit. For instance, if computer achieved hit, it should check next available coordinate along x axis and/or y axis. Ocean Grids: The Pacific Ocean is broken up into two ocean grids: one grid for each fleet. An ocean grid consists of a 10 x 10 grid. Each position on the grid will be represented by a two positive integers that constitutes a XY coordinate. Ships: There are a total of 5 ships for both the PBF and the IRF respectively. Each fleet has the same complement of ships. The description of the ships is listed below including the number of hits needed to sink a ship:  Aircraft Carrier 5 hits  Battleship – 4 hits  Cruiser – 3 Hits  Destroyer 3 hits  Submarine – 2 Hits Deployment: Each ship will be strategically placed in their part of the ocean. Ships must be placed horizontally or vertically. It cannot be diagonal. Basically, for each ship placement, either the x or y coordinate must be the same for every coordinate of that particular ship. For example, a cruiser could be: (8,1) (8,2) (8,3) or a battleship could be: (5,3) (6,3) (7,3) (8,3) How to Begin: When the game begins, the program should prompt the PBF player to enter the coordinates of every ship in the PBF fleet one at a time. Once all of your ships have been entered, the IRF player will enter the coordinates for all of the ships of their fleet. Game Rules: The PBF player will fire first by entering a XY coordinate. If the entered coordinate scores a hit (i.e. the entered coordinate corresponds to a position on the ocean grid occupied by an enemy ship) the program should indicate that an enemy ship was hit. The PDF player would be allowed to enter in another coordinate. Once the PBF player one misses (selecting a coordinate that is not occupied by an enemy ship), player 2 would be asked to enter a coordinate. Once a player sinks a ship, the program should indicate that ship was sunk and specify which ship was sunk. Note: The program should not indicate the type of ship when it is first hit. It should only be specified once the ship is sunk. The first player that sinks all of the enemy ships will win the game. Error Checking: The game should have some basic error checking functionality built-in. The following functionality should be included: The game should check to make sure that multiple ships are not placed on the same coordinates. When deploying a ship, the game should insure that the players place acceptable coordinates for each ship. For example, if a ship has a 1st coordinate of (2,1), it should not accept (3,4) as a second coordinate because they are not continuous. The game should make sure that when a player fires on a ship, they don’t select a coordinate outside of the grid. The game should make sure no ship is placed on a coordinate outside of the grid. The game should not allow a player to fire at the same coordinate more than once during a game. Bonus Points: For those individuals interested in an additional challenge, here are some ideas for enhancements: The game requires that the program prints a response indicating when a ship is hit. Modify the program so that it randomly responds with different messages when a ship is hit. For example: “Great shot” “Hit her again!” “Go for the kill!” If you have other ideas for bonus points, they may be submitted for consideration What to turn in: You need to turn in the following: Software requirements specification outlining what you program will do, any assumptions, class / function diagram and “will-do” list Complete printed out source code including any user created header files: Sample output for various runs to illustrate the game in action Submit a soft copy of all source and executable files. Instructions for playing the game Sample Run: PBF player enter ship coordinates: Carrier 1st coordinate: 1 2 Carrier 2nd coordinate: 1 3 Carrier 3rd coordinate: 1 4 Carrier 4th coordinate: 1 5 Carrier 5th coordinate: 1 6 Your carrier has been deployed! Battleship 1st coordinate: 5 6 Battleship 2nd coordinate: 4 6 Battleship 3rd coordinate: 3 6 Battleship 4th coordinate: 2 6 Your battleship has been deployed! …… And so on for the rest of the PBF ships …. IRF player enter ship coordinates: Carrier 1st coordinate: 4 9 Carrier 2nd coordinate: 5 9 Carrier 3rd coordinate: 6 9 Carrier 4th coordinate: 7 9 Carrier 5th coordinate: 8 9 Your carrier has been deployed! Battleship 1st coordinate: 8 3 Battleship 2nd coordinate: 8 4 Battleship 3rd coordinate: 8 5 Battleship 4th coordinate: 8 6 Your battleship has been deployed! …… And so on for the rest of the IRF ships …. Start the battle! PBF fire at a coordinate: 5 5 You missed! IRF fire at a coordinate: 2 6 Direct hit! IRF fire at a coordinate: 3 6 Direct hit! IRF fire at a coordinate: 4 6 Direct hit! IRF fire at a coordinate: 5 6 Direct hit! You sank the PBF battleship! IRF fire at a coordinate: 1 1 You missed! PBF fire at a coordinate: 8 6 Direct Hit! …. PDF, you win! Great game! IRF, you are demoted! Return home in shame! Would you like to play again? (Y/N)
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

fundamental security design principles.

(4 Points Each) 1. List and briefly define the fundamental security design principles.
2. Describe the risk analysis approach and the steps in a detailed or formal risk analysis.
3. Describe the basic principles utilized in mandatory access control. How do these basic principles help MAC control the dissemination of information?
4. What is a message authentication code?
5. What is the security of a virtualization solution dependent upon? What are some recommendations to address these dependencies?
6. List the items that should be included in an IT security implementation plan.
7. Describe the inference problem in databases. What are some techniques to overcome the problem of inference?
8. Assume you have found a USB memory stick in the parking lot at work. What threats might this pose to your work computer should you just plug the memory stick in and examine its contents? What steps could you take to mitigate those threats and safely determine the contents of the memory stick?
9. Explain why input validation mitigates the risks of SQL injection attacks.
10. What are the benefits and risks of server-side scripting?
11. What is the difference between persistent and non-persistent cross-site scripting attacks?
12. Briefly describe how Unix-like systems, including Linux, use filesystem quotas and process resource limits. What type of attacks are these mechanisms useful in preventing?
13. Why are pharming and phishing attacks often used in concert with each other?
14. Describe the Windows 10 security feature, Control Flow Guard, and the type of attack it helps to prevent. Who is responsible for implementing Control Flow Guard—the system administrator or application developer?
15. Define three types of intellectual property.
16. Give an example of a computer crime. What are some unique issues associated with such crimes?
17. Briefly summarize one federal law or regulation that addresses confidentiality, privacy, or security. Give an example of how the law is applied to ensure confidentiality, privacy, or security.
18. List and briefly describe three cloud service models.
19. What are the disadvantages to database encryption?
20. What are three broad mechanisms that malware can use to propagate?
21. What are the typical phases of operation for a virus or worm ?
22. Imagine you are the database administrator for a military transportation system. There is a table named cargo in the database that contains information on the various cargo holds available on each outbound airplane. Each row in the table represents a single shipment and lists the contents of that shipment and the flight identification number. Only one shipment per hold is allowed. The flight identification number may be cross-referenced with other tables to determine the origin, destination, flight time, and similar data. The cargo table appears as follows: Flight ID Cargo Hold Contents Classification 1254 A Boots Unclassified 1254 B Guns Unclassified 1254 C Atomic Bomb Top Secret 1254 D Butter Unclassified
There are two roles defined: Role 1 has full access rights to the cargo table. Role 2 has full access rights only to rows of the table in which the Classification field has the value Unclassified. Describe a scenario in which a user assigned to Role 2 uses one or more queries to determine there is a classified shipment on board the aircraft.
23. As part of a formal risk assessment on the use of laptops by employees of a large government department, you have identified the asset “confidentiality of personnel information in a copy of a database stored unencrypted on the laptop” and the threat “theft of personal information, and its subsequent use in identity theft caused by the theft of the laptop.” Suggest reasonable values for the items in the risk register for this asset and threat, and provide justifications for your choices.
24. Consider a popular Digital Rights Management (DRM) system like Apple’s FairPlay, which is used to protect audio tracks purchased from the iTunes music store. If a person purchases a track from the iTunes store by an artist managed by a record company such as EMI, identify which company or person fulfils each of the DRM component roles (Content Provider, Clearinghouse, Consumer, and Distributor).
25. Assume you receive an e-mail which appears to come from your bank, includes your bank logo on it, and with the following contents:
“Dear Customer, Our records show that your Internet banking access has been blocked due to too many login attempts with invalid information such as incorrect access number, password, or security number. We urge you to restore your account access immediately, and avoid permanent closure of your account, by clicking on this link to restore your account. Thank you from your customer service team.” What form of attack is this e-mail attempting? What is the most likely mechanism used to distribute this e-mail? How should you respond to such e-mails?
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

What are the most recent developments in the debate over immigration and crime?

In a 3-4 page paper discuss the current immigration debate. What are the most recent developments in the debate over immigration and crime? Search the web and see if there is any new important evidence? What has happened with the law suits over the 2010 Arizona immigration enforcement law? Has the case reached the U.S. Supreme Court? If it has, what was the Court's decision?
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

current immigration debate

In a 3-4 page paper discuss the current immigration debate. What are the most recent developments in the debate over immigration and crime? Search the web and see if there is any new important evidence? What has happened with the law suits over the 2010 Arizona immigration enforcement law? Has the case reached the U.S. Supreme Court? If it has, what was the Court's decision?
CLICK HERE TO ORDER THIS PAPER FROM OUR WRITERS  ➤➤   NO PLAGIARISM  
Get 100% Original papers from the writing experts Logo 
CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……