Archive for June 4th, 2022

Wk 5, MHA 543: Part II

Review a team members charts and reply, Nichole Turtzo’s Table.

Compare your chart (Wk5MHA543WorkTraits) with team member (Nichole Turtzo’s Table).

Provide a total of 175 words of feedback that answers the following questions to your team member (total 350 words):

  • What work trait differences are similar to ones you identified in your chart? Provide a comment for each of the 4 generations for each team member.
  • Which work trait differences vary from those identified in your chart? Provide a comment for each of the 4 generations for each team member.
  • Comment on how the differences might impact both organizational culture and succession planning.

Finance project

Cryptocurrency: Bitcoin is now held on the balance sheet of Fortune 500 companies and even professional athletes are collecting a portion of their compensation in Bitcoin.  Bitcoin seems to be the “safest” bet in the world of Cryptocurrency.  Identify a competitor and compare the asset, risks, and returns of this competitor to Bitcoin.  Identify the Ex-Ante and Ex-Post factors in this investment.  The competitor can be global, you are not limited to US companies.  

Break-Even Analysis

Discuss the importance of a break-even analysis when making a decision to lease or buy a piece of equipment. Research and provide an example of a break-even analysis conducted in a health care organization. Complete the following:

  • Prepare a strategic assessment of the sample break-even analysis you researched. Within your assessment, discuss when it is appropriate to use a break-even analysis and how a break-even analysis is done.
  • Analyze the financial data in the sample break-even analysis and explain the potential implications for the health care institution. Discuss the role of fixed and variable costs in the break-even analysis and how indirect costs and profit are factored into the analysis.
  • Evaluate the probable priorities and expectations of stakeholders surrounding this break-even analysis.
  • Discuss if you would develop a strategic plan to move forward based on the sample break-even analysis.
  • Explain how the sample break-even analysis might be used to make a long-term financial decision.
  • Assess the potential financial impact of the sample break-even analysis as it relates to organizational strategy, patient care, or community health.

Discussion 4 response 2

Read classmates post and respond with 50 words:

There are three guidelines for radiology which are professional, technical and global. Technical guideline is for the use of facilities, equipment and non medical staff and supplies. An example will be code 77014-TC which indicates every non medical like the equipment and facilities. Professional guidelines is for the doctor’s professionals services only. An example is code 77014-26 which lets you know its only for professional services. Global guidelines when there is no division of costs associated with medical services because it was provided by a single operator. An example will be 99203 for a consultation with a doctor. 
Reference:

Carol J. Buck, Saunders (2022). Step-by-Step Medical Coding, 2022 Edition, by Carol J. Buck, Saunders

Project Work Breakdown

 Take a moment to review the details of this assignment below and gather any necessary files. Once you’re ready to submit your assignment, move on to Step 2.Assessment Description

Select a professional or personal (e.g., vacation, wedding, home remodeling) project that requires planning. In Excel, provide a short explanation of the event, identify all stakeholders involved in the process, and create a project work breakdown structure.

You are not required to submit this assignment to LopesWrite.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

response to clavijo

Alternative & Complementary Medicine 

In the field of healthcare and medicine, the role of alternative and complementary medication is to help individuals obtain healing, minimize pain and obtain maximum health. Therefore, some alternative and complementary medications include allopathic medicine and holistic and complementary medicine. Different patients and health care providers have different prospects of using any approach depending on the benefits, advantages, and disadvantages of medications (Hamed et al., 2020). Alternative medication is the use of those methods that are distinct from the conventional approach. The alternative medication includes the use of Chinese medication, herbs, acupuncture, chiropractic, and homeopathy medications.

            The alternative and complementary medication represent those products that are not in the protocol for standardized medical care. For instance, those patients with cancer take these medications to help minimize the side effects of chemotherapy such as fatigue, pain, nausea, and vomiting. The medication also helps to minimize the stress-related symptoms and cancer therapy and trying to see if they can cure the disease. The integrative medicine approach combines CAM with conventional medications and the pharmacodynamics have been revealed to be safer and more effective (Seet et al., 2020). The medication helps to cater for the spiritual, mental, and physical health of the patient. The complimentary medications such as acupuncture aid to minimize the side effect of conventional mediation. The alternative medications that are used for cancer patients include a special diet instead of chemotherapy drugs.

The complementary and alternative medicine includes the mind and body therapies that entails meditation, biofeedback in monitoring the heart rate and blood pressure, hypnosis to promote calmness and openness, yoga, and tai chi which include controlled breathing, and imagery and creative outlets. The biologically targeted practices include vitamins to maintain the body healthy with normal physiology, dietary supplements, and botanicals such as turmeric and cinnamon (Chowdhuri & Kundu, 2020). In addition, examples of body-based and manipulative practice are massage therapy, chiropractic therapy, and reflexology which is the application of pressure to specific body parts.

            Several complementary and alternative therapies have been through a careful evaluation and are effective and safe like meditation, yoga, and acupuncture. However, some therapy may reduce the efficacy of chemotherapy while others may become harmful to the body. Some alternative supplements may be harmful to the body when they are taken alone or in large doses. For example, kava kava that is used to minimize stress may cause hepatotoxicity while for cancer patients it may lower the potency of the medication (Tangkiatkumjai et al., 2020). Several clinical trials are ongoing to study the side and adverse effects of some complementary medications that are used. Some studies also are doing a comparison of conventional medications and other alternative therapies.

            Allopathic medicine is used to describe modern medicine also known as conventional medicine or biomedicine. This therapy is prescribed by medical officers, pharmacists, nurses, and other healthcare professionals. The treatment is provided through administering medication, radiation therapy, and surgery. Allopathic medications can be used to provide preventive care such as vaccinations and probiotics, and curative care such as analgesics and biotics to manage infections (Brodt et al., 2018). As a healthcare provider, I would not have concerns about allopathic medications because they are prescribed by health professionals, they are prescribed upon assessment and laboratory tests, they are extensively researched and tested and they are more effective.

References

Brodt, E., (Ojibwe), Bruegl, A., (Oneida, Stockbridge-Munsee), Thayer, E. K., Eiff, M. P., Gonzales, K., (Cherokee), Crespo, C., Spector, D., (Nez Perce), Kamaka, M., (Native Hawaiian), Carpenter, D. A., (Native Hawaiian), & Carney, P. A. (2018). Concerning trends in allopathic medical school faculty rank for Indigenous people: 2014-2016. Medical education online, 23(1), 1508267. https://doi.org/10.1080/10872981.2018.1508267

Chowdhuri, P. D., & Kundu, K. (2020). Factors determining the choice of complementary and alternative medicine in acute and chronic diseases. Journal of complementary & integrative medicine, 17(3), 10.1515/jcim-2019-0105. https://doi.org/10.1515/jcim-2019-0105

Hamed Abdalla, M., Ali, A. M., & Loong, L. (2020). The use of complementary and alternative medicine (CAM) among cancer patients at a tertiary hospital in Malaysia. Complementary therapies in medicine, 50, 102343. https://doi.org/10.1016/j.ctim.2020.102343

Seet, V., Abdin, E., Vaingankar, J. A., Shahwan, S., Chang, S., Lee, B., Chong, S. A., & Subramaniam, M. (2020). The use of complementary and alternative medicine in a multi-ethnic Asian population: results from the 2016 Singapore Mental Health Study. BMC complementary medicine and therapies, 20(1), 52. https://doi.org/10.1186/s12906-020-2843-7

Tangkiatkumjai, M., Boardman, H., & Walker, D. M. (2020). Potential factors that influence usage of complementary and alternative medicine worldwide: a systematic review. BMC complementary medicine and therapies, 20(1), 363. https://doi.org/10.1186/s12906-020-03157-2

Assessment project

 Competencies

4027.1.4 : Network Characteristics

The  graduate determines network characteristics based on functionality  defined in the Open Systems Interconnection (OSI) reference model and  the TCP/IP protocol stack for designing and building highly secure  computer networks.

4027.1.5 : Network Device Security

The graduate securely configures network devices to maximize the security of a computer network.

4027.1.6 : Network Segmentation

The  graduate recommends network segmentation strategies to isolate network  segments based on business requirements and security concerns.

4027.1.7 : Troubleshooting Network Problems

The graduate performs root cause analysis to determine sources of network-related problems and propose solutions.

4027.1.8 : Secure Network Architecture

The graduate designs secure network architectures based on industry best practices and the principles of secure network design.

IntroductionSecure  network design is a critical component for protecting resources,  processes, and business continuity. Effective network design involves  evaluating existing network problems and potential threats, considering  secure architectures based on industry best practices and secure design  principles, and proposing secure network design solutions that address  the business needs of the organization.

For this task, you will  access the Performance Assessment Lab Area to run Zenmap and OpenVAS.  Screenshots saved for submission must include your name and student ID.  Your final network drawing should be saved in *.vsd format using  Microsoft Visio or a similar software tool.ScenarioCompany  A is a property and casualty insurer underwriting multiple types of  insurance. Company A is acquiring Company B, a financial services  organization, in order to diversify and increase market share. Company B  conducts business in the same geographical area as Company A and  delivers business and individual financial planning services. Both  companies provide services from their respective offices and at the  customers site. Both companies use broadband connectivity.

You  are the IT director for Company A and will be the chief information  officer (CIO) for the merged organization. You are tasked with  analyzing, designing, and presenting the proposed IT integration  project. Company A has clear IT infrastructure documentation, including a  logical diagram, an organizational chart, and a recent security risk  analysis. Company B does not have any IT infrastructure documentation,  and several security and integration issues are evident. Company B  outsources any IT-related needs to a consultant. Leadership for the  merged organization has allocated a limited budget of $35,000 for this  project and will expect justification for recommended expenditures.

Integration  project requirements include following secure network design  principles, selecting or repurposing secure network components, assuring  secure communication channels, addressing relevant regulatory  compliance, minimizing potential network problems and security threats,  delivering integration cost savings, and aligning IT to meet the  business needs of the post-merger organization. This post-merger  organization will reflect one corporate office and a branch office.Requirements

Your  submission must be your original work. No more than a combined total of  30% of the submission and no more than a 10% match to any one  individual source can be directly quoted or closely paraphrased from  sources, even if cited correctly. The originality report that is  provided when you submit your task can be used as a guide.

You  must use the rubric to direct the creation of your submission because it  provides detailed criteria that will be used to evaluate your work.  Each requirement below may be evaluated by more than one rubric aspect.  The rubric aspect titles may contain hyperlinks to relevant portions of  the course.

Tasks may not be submitted as  cloud links, such as links to Google Docs, Google Slides, OneDrive,  etc., unless specified in the task requirements. All other submissions  must be file types that are uploaded and submitted as attachments (e.g.,  .docx, .pdf, .ppt). 

A.  Describe  the problems Company A has with network security and infrastructure  using details from one or more of the Company A Organizational Chart,  Company A Risk Analysis, and Company A Visio Diagram supporting  documents.
 

B.  Run  Zenmap and OpenVAS on Company Bs network(s) using the Performance  Assessment Lab Area web link. Your submission should include the  following documents:

  a  screenshot of the completed Zenmap scanshould be taken within the lab  environment and should include your name and student ID

  a  screenshot of the OpenVAS report resultshould be taken within the lab  environment and should include your name and student ID

  the completed Zenmap PDF file(s)

  the completed OpenVAS PDF fileshould include your name in the summary of the report
 

Note:  This assessment requires you to submit pictures, graphics, and/or  diagrams. Each file must be a supporting document no larger than 30 MB  in size. Diagrams must be original and may be hand-drawn or drawn using a  graphics program. Do not use CAD programs because the file will be too  large. Your final network drawing should be saved in *.vsd format using  Microsoft Visio or a similar software tool.
 

C.  Describe the potential impact of two  network security or infrastructure problems of Company B using details  from the outputs of Zenmap and OpenVas (see supporting documents below),  including rationale for each problem.

1.  Explain how correcting each of these problems will improve the functioning of the merged network.
 

D.  Provide  a network topology diagram using Microsoft Visio or a similar software  tool that represents the proposed merging requirements from the scenario  of Company A and Company B, including remediation of all existing infrastructure problems described in part A and part C.
 

Please follow the web link listed below to download a free student version of Visio Professional 2019.
 

E.  Identify which layer of the OSI model and layer of the TCP/IP protocol stack apply to each component in the merged network topology diagram.
 

F.  Justify the retention or deletion of four  existing components as suggested in your proposed network topology  diagram. Include how each components retention or deletion and any  newly required additions to the network address both security concerns and budgetary restrictions found in the scenario.
 

G.  Explain how two secure network design principles are included in your proposed merged network topology diagram.
 

H.  Describe two secure hardware and/or software components integrated into the proposed network topology and how each component will address the security needs of the merged organization.
 

I.  Explain  how the proposed network topology diagram for the merged organization  addresses security safeguards based on a regulatory compliance  requirement.
 

J.  Explain  a security threat and one potential network problem that would become a  risk as part of the implementation of the proposed network topology  diagram, including why each would become a risk.

1.  Explain how the security threat and potential network problem should each be managed or mitigated as part of the implementation of the proposed topology diagram.
 

K.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
 

L.  Demonstrate professional communication in the content and presentation of your submission.

File RestrictionsFile name may contain only letters, numbers, spaces, and these symbols: ! – _ . * ‘ ( )
File size limit: 200 MB
File  types allowed: doc, docx, rtf, xls, xlsx, ppt, pptx, odt, pdf, txt, qt,  mov, mpg, avi, mp3, wav, mp4, wma, flv, asf, mpeg, wmv, m4v, svg, tif,  tiff, jpeg, jpg, gif, png, zip, rar, tar, 7z 

https://lrps.wgu.edu/provision/285225355 – performance lab link

You can use draw.io for the network diagram

NUR 4827 – DB #2 Elements of Change

– Use the standard English grammar and spelling

– References are cited (if necessary)

– Post must be 150-300 words. 

The health care environment is rapidly changing, and nursing should be proactive in guiding change. Nurse leaders are in a unique position to be change agents. You have two staff nurses that have recently completed graduate degrees as a clinical nurse leader (CNL). You have received administrative approval to change the current nursing model on your unit to incorporate the role of the CNL.

  • Question 1: Using Lewins Theory of Change, describe specific strategies you will employ to incorporate the CNL role for each of Lewins three stages of change.

  • Question 2: Not everyone on your nursing unit is excited to incorporate the role of the CNL into the nursing model because it requires a change in their current job responsibilities. Propose strategies to overcome staff resistance to change.

Value Chain and Process Improvement

Assessment Description

Operations are composed of many different processes to fulfill customer needs and requirements. The value chain is a higher-level view of those processes from a customer view. In order to meet customer requirements like quality and cycle time, organizations need to identify the value chain, subprocesses and measures needed to meet the customer needs.   

Consider a process from an organization you are familiar with. In 500-750 words, complete the following:

  • Identify the steps in the high-level value chain required to fulfill the customer requirements from beginning to end. 
  • From the high-level value chain steps, identify the operational subprocesses.  
  • Identify those metrics that the organization should monitor at both the value chain level and subprocess level.  
  • Based upon the process you described above, if an organization needs to improve a process within the value chain, how would you analyze the process and metrics to know that the process is not working
  • Explain what steps the organization could take based upon your analysis for value chain improvement.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. A link to the LopesWrite technical support articles is located in Class Resources if you need assistance.

homework

 

What do you see as similarities and differences between the research process, the Evidence-Based Practice process, and nursing process? Include rationale to support your response.

Submission Instructions:

  • Your initial post should be at least 500 words, formatted and cited in current APA style with support from at least 2 academic sources. 
error: Content is protected !!