Archive for August 15th, 2019

Literature Evaluation Table

In nursing practice, accurate identification and application of research is essential to achieving successful outcomes. Being able to articulate the information and successfully summarize relevant peer-reviewed articles in a scholarly fashion helps to support the student’s ability and confidence to further develop and synthesize the progressively more complex assignments that constitute the components of the course change proposal capstone project.

For this assignment, the student will provide a synopsis of eight peer-reviewed articles from nursing journals using an evaluation table that determines the level and strength of evidence for each of the eight articles. The articles should be current within the last 5 years and closely relate to the PICOT statement developed earlier in this course. The articles may include quantitative research, descriptive analyses, longitudinal studies, or meta-analysis articles. A systematic review may be used to provide background information for the purpose or problem identified in the proposed capstone project. Use the “Literature Evaluation Table” resource to complete this assignment.

While APA style is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

 
 
 

2 Different Questions And Separate De Sources Per Questions

1. This discussion is much more straightforward: where do you get your news? Can you identify the leanings or inconsistencies in the content featured in your chosen media source? 

 

Please think critically and as Dr. Cornel West once said, “it takes more courage to examine oneself and corners of one’s own mind, than it does to face an opponent on the battlefield”; so don’t be shy, please consider the question.

 

 

 

2. For this final journal assignment, students must provide a short response to the following questions: 

 

1. What facets of the prison-industrial complex do you think exist in your community?

 

2. Please provide a case that is currently in front of the Supreme Court of the United States that will set important legal precedent. 

 

3. How does the Judicial Branch of government check the actions of the Legislative and Executive Branches in our system of government?

Motivation Presentation Teachers

Motivating students is something that all teachers must learn how to do and it can be done through the use of various forms of technology, instructional, and engagement strategies. It is crucial for all teachers to identify a variety of ways to motivate students.

 

Develop an 8-10 slide presentation that is used as a professional development to persuade faculty and staff in your school to implement motivational strategies to promote student success and ethical education. Be sure to include a title slide, reference slide, and presenter’s notes.  

 

Include the following in your digital presentation:

 

  1. The role of motivation in adolescent learning, including strategies to promote student success and ethical education.
  2. Researched knowledge of motivation, as well as physical, cognitive, and socioemotional development principles learned in this course, to suggest strategies that help motivate typical adolescent students.
  3. Prevention or intervention techniques to support and motivate students who might be struggling or facing a challenging situation like a learning disability.
  4. Digital tools and resources to support learning and motivation.

 

Support your findings with a minimum of three scholarly resources.

Relational Aggression

5-6 pages in length (double-spaced)

 

200 points possible

 

The research paper assignment is designed to give students a view in to the scholarly research conducted in the discipline of Speech Communication. Students will write a review of the literature on a topic of their choice, generate a hypothesis for future study, and suggest a method of inquiry appropriate for testing the hypothesis. Students will independently write their papers. 

 

Possible Topic Areas–( your actual paper topics will be more specific)

 

Relational Aggression                  Teacher/Student interaction 

 

Reality TV                                  Cultural Differences 

 

Gender Differences                     Organizational Grapevines 

 

TV Content                                Campaign messages 

 

Management Communication         Dating rituals 

 

Marital Communication                 Parent-child interaction 

 

Mission statements                         Flirting 

 

Doctor-Patient interaction         Effectiveness of Communication Training 

 

Don’t see anything that sounds interesting? You can generate your own topic. E-mail me to discuss your ideas.

 

PAPER REQUIREMENTS  

 

Each Paper must include the following elements, each clearly labeled:

 

1. A brief introduction (1 paragraph) to set up the focus of your topic.

 

2. A brief review (3 pages) of the literature– this is a summary of the research done on this topic with at least 3 sources. Papers should cite sources using the APA (American Psychological Association) format. Consult the BC library website for helpful information on this style of documentation and other research paper assistance (https://www.bellevuecollege.edu/lmc/research-guides/ (Links to an external site.)).

 

3. A (1 sentence) hypothesis for study. A hypothesis must be written so that it can be proven or not supported on the basis of your study. For example “which type of relational aggression (rumor- spreading, silent treatment, etc) causes the most pain?” is not an acceptable hypothesis. “Rumor spreading is the most frequently used tool of relational aggression in girls” would be acceptable.

 

4. A detailed description of research methods (1-2 paragraph discussion) which explains the process you could realistically use to test your hypothesis. For example, in this section you could say that “two researchers will conduct a survey of 300 middle and high school girls at 6 different schools in the Seattle Metropolitan area.” You may choose any one of the research methods discussed in the text in Chapter 13 (except rhetorical criticism). For example, you could create a lab experiment and bring in subjects, conduct a survey, engage in a structured observation of subjects, or do an ethnographic study of conversation of a particular group of people. 

 

If you suggest a survey, please include the survey questions in Appendix A (following the reference page). If you suggest an observation or a content analysis, please include the criteria you will use in Appendix A (following the reference page). If you suggest another research method (such as a lab experiment or ethnography), please contact me about how to present the details in Appendix A.

 

5. A reference section including all sources cited in the review of the literature

Healthcare Finance Paper

In the transcripts provided, you are CEO newly appointed for the Continuing Care Retirement Community that is under the Hospital System. A board retreat is coming up and you must help with a critical decision: relocate the facility to a more suburban area, or stay in its current metropolitan area location. Submit a summation of three things you learned from the scenario. Be sure to do additional research in order to fully explain the concepts you choose to discuss. Your submission should be of graduate quality, in APA format, and fully referenced (a minimum of 3 peer-reviewed references).

INF220

Our guest speaker, Karla Lewis, described functionality of a shared services infrastructure data center (INF220 Week Four Information Systems – Infrastructure Development Approaches Part One (Links to an external site.) and INF220 Week Four Information Systems – Infrastructure Development Approaches Part Two (Links to an external site.)). The Instructor Guidance discusses six categories of benefits from integrating shared services in the organization. Using these categories, discuss the benefits of the shared services provided by Karla Lewis’s organization. Give examples to illustrate your answer. Provide justification and citations for your points.

What does Carlson mean by ‘appreciation’ and how does it apply to nature?

 1. What does Carlson mean by ‘appreciation’ and how does it apply to nature? 

 

 3. What is the landscape model for aesthetic appreciation of nature and why does Carlson reject them? 

 

 4. What is Carlson’s preferred model for the aesthetic appreciation of nature? 

Research Critiques And Picot Statement Final Draft

Research Critiques and PICOT Statement Final Draft

 

Prepare this assignment as a 1,500-1,750 word paper using the instructor feedback from the previous course assignments and the guidelines below.

 

PICOT Question 

 

Revise the PICOT question you wrote in the Topic 1 assignment using the feedback you received from your instructor.

 

The final PICOT question will provide a framework for your capstone project (the project students must complete during their final course in the RN-BSN program of study).

 

Research Critiques

 

In the Topic 2 and Topic 3 assignments, you completed a qualitative and quantitative research critique on two articles for each type of study (4 articles total). Use the feedback you received from your instructor on these assignments to finalize the critical analysis of each study by making appropriate revisions.

 

The completed analysis should connect to your identified practice problem of interest that is the basis for your PICOT question.

 

Refer to “Research Critiques and PICOT Guidelines – Final Draft.” Questions under each heading should be addressed as a narrative in the structure of a formal paper.

 

Proposed Evidence-Based Practice Change

 

Discuss the link between the PICOT question, the research articles, and the nursing practice problem you identified. Include relevant details and supporting explanation and use that information to propose evidence-based practice changes.

 

General Requirements

 

Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

 

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

 

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

 

AttachmentsNRS-433V-RS-Research-Critique-Guidelines.docx
RUBRIC

How did you implement direct and indirect guided questions into your lesson?

For this assignment, use the format of one of the “Lesson Plan Templates” to create a lesson plan for K to Age 8/Grade 3. The lesson plan should cover one or more of the following topics: Magnets, gravity, and machines and contain the following information:

 

  • Clear, measurable learning objectives that align to early learning standards (ELS) as well as your state’s subject standards.
  • Anticipatory set
  • Vocabulary
  • Reasoning and problem-solving
  • Relevant materials and resources including visual or audio resources
  • Differentiation of instruction to address the diverse needs of students. Name the differentiation strategies used to achieve individual learning outcomes.
  • Assessments

 

Implement this lesson with changes based on previous feedback.

 

Write a 500-750 word reflection based on the feedback you received from your classroom teacher and personal observations about the experience, explain the following:

 

  • Strengths and opportunities for growth. Provide specific evidence from your lesson including changes based on previous feedback.
  • How did you implement direct and indirect guided questions into your lesson? What was the student response?
  • How well did problem-solving and inquiry work to address the diverse needs of students with disabilities that struggled or that needed enrichment?
  • What changes will you implement in your next lesson? Provide specific examples.

Crypto Security Architecture Exercise

Scenario

 

You work for the Apex Trucking Company. This is a firm that moves materials for clients all over North America and Europe. The leadership of the company has no real knowledge of technology, but wants to use encryption to protect the information the company has. The information to be protected consists of future marketing plans for the company, financial data, employee records, customer records, and customer shipping date.

 

 

The company wants the capability to securely allow customers to track their orders in real time from their origin to their destination on-line over the Internet. The information that is to be supplied to customers is tracking number, location of shipment, size of shipment, value of shipment, and estimated time of arrival as well as the customer contact information for this shipment.

 

 

While this information can be made available from a central server, the marketing groups in Europe, Mexico and Canada need management access to the data to enter new shipments and change orders before they ship.

 

 

The company currently is using desktops running Windows XP and Windows based servers. There are only passwords used for security, and a firewall, but no encryption to protect the information.

 

 

The project is to provide the above capability securely using encryption, as well as providing additional security to the company via encryption. You will need to address new technology, the reasons and costs behind your choices, and what policy and legal implications there are to your encryption solution

 

 

There is at least one marketing group in Mexico, Germany, and Canada, as well as three in the US. The company is based in New York. It is important that customers can rely on the shipping data being accurate, and from the company. 

 

 

You’re assigned this crypto architecture project.

 

 

Configuration

 

The current configuration has one server acting as a firewall and web server. This server is directly attached to the Internet. 

 

 

There is a database server behind the firewall, as well as a separate server for HR and marketing. The marketing server needs to be securely accessed by the marketing teams. They also need to access the database server through an Internet connection to manage data and display reports.

 

 

All databases use MySQL and are currently not secured.

 

 

Constraints

 

Your tasking is crypto architecture. The normal replacement of computers is done on a rotating schedule. It is outside the scope of your project to plan for the replacement of computers. Your architecture should work with the computers you have. You may consider the replacement of equipment if an upgrade or new equipment would be critical to the crypto architecture.

 

 

Specific Tasking

 

You have been specifically tasked to do the following things and develop a complete and sound crypto architecture. Remember, the president is very knowledgeable about cryptography and wants lots of details about how you are going to implement the encryption.

 

 

 

  

Describe in detail what new cryptographic      systems you are going to propose, how they work, and how they will enhance      security. Be specific about these      systems weaknesses and how you plan to compensate for the weaknesses.

 

  

Describe and explain the impact the new      cryptographic security architecture will have on the current security      features and how this impact will be mitigated.

 

  

What new issues will arise as a result of      implementing the new cryptographic solutions and what are the arguments on      either side of these issues?

 

  

Show a clear and detailed understanding of      the existing encryption being used such as passwords, and operating      encryption features not being used and whether you plan to use these or      not, and if not why not.

 

  

How well will all these new cryptographic      features work together?  Identify      any areas of concern, and how you propose to resolve conflicts and issues.

 

  

What if any current security features can      be eliminated cost effectively by the new crypto architecture?

error: Content is protected !!