homwork 22

You will write a 3-full-page minimum essay that describes THREE responsibilities of citizens in a democracy. To do this, you will base your work on at least 2 selections of your choosing from a list provided on the course website. You must cite both of your sources in your essay for full credit.

In your conclusion, you must reflect on whether or not you are a good citizen according to these responsibilities. (If you are not from America but are from a different democracy, do this for your own country. If you are not from America and are not from a democracy, explain how these responsibilities might differ from what you would consider the responsibilities of citizens from your country).

(( im from saudi aribia)) i think u need ues the last two file i sent it u

10 Points:

  • Writing quality and following directions: 3 points
  • Discussion of responsibilities and use of sources: 6 points (2 for each responsibility)
  • Conclusion paragraph: 1 point

Validity in Quantitative Research Designs

Reflect on the following scenarios:

Wanda has been involved in a research study of the causes of tooth decay in elementary school children. Twenty-five percent of the students in the free breakfast program at a local school have been screened by a local dental hygienist. The dental hygienist finds an average of 3.5 cavities per student. The same dental hygienist recently screened 25% of the students in a school with no free breakfast program, and found an average of only 1.5 cavities per student. Wanda concludes that the breakfast served to students is the cause of higher tooth decay. Do you agree with Wanda? Can you think of other causes for the higher number of cavities among the students from the school with free breakfast?

Jerry is conducting a phone survey to determine public opinions on Medicaid reform. In order to get a random sample, Jerry decides to call the tenth number on the second column of every fifth page of the phone book. He also decides to stop sampling when he has completed 50 surveys. After reaching the target number, Jerry begins to analyze the data he has gathered and is surprised to find that opposition to reform is running about 18% higher than the national average. He is at a quandary to explain this significant difference in numbers. What are some reasons you can think of for the higher rate of opposition?

As you consider these scenarios, you may note issues or problems related to the validity of the research and conclusions. This week, you assess validity in quantitative research. You are introduced to the different types of validity and why they are important to consider when evaluating evidence and research studies. You also examine common threats to validity and consider how to minimize those threats.

Discussion: Validity in Quantitative Research Designs

Validity in research refers to the extent researchers can be confident that the cause and effect they identify in their research are in fact causal relationships. If there is low validity in a study, it usually means that the research design is flawed and the results will be of little or no value. Four different aspects of validity should be considered when reviewing a research design: statistical conclusion validity, internal validity, construct validity, and external validity. In this Discussion, you consider the importance of each of these aspects in judging the validity of quantitative research.

To prepare:

  • Review the information in Chapter 10 of the course text on rigor and validity.
  • Read the method section of one of the following quasi-experimental studies (also located in this week’s Learning Resources). Identify at least one potential concern that could be raised about the study’s internal validity.
    • Metheny, N. A., Davis-Jackson, J., & Stewart, B. J. (2010). Effectiveness of an aspiration risk-reduction protocol. Nursing Research, 59(1), 18–25.
    • Padula, C. A., Hughes, C., & Baumhover, L. (2009). Impact of a nurse-driven mobility protocol on functional decline in hospitalized older adults. Journal of Nursing Care Quality, 24(4), 325–331.
    • Yuan, S., Chou, M., Hwu, L., Chang, Y., Hsu, W., & Kuo, H. (2009). An intervention program to promote health-related physical fitness in nurses. Journal of Clinical Nursing, 18(10), 1,404–1,411.
  • Consider strategies that could be used to strengthen the study’s internal validity and how this would impact the three other types of validity.
  • Think about the consequences of an advanced practice nurse neglecting to consider the validity of a research study when reviewing the research for potential use in developing an evidence-based practice.

Post the title of the study that you selected and your analysis of the potential concerns that could be raised about the study’s internal validity. Propose recommendations to strengthen the internal validity and assess the effect your changes could have with regard to the other three types of validity. Discuss the dangers of failing to consider the validity of a research study.

elder self-neglect

Elder Self Neglect

Requirements

This paper must be written in Microsoft Word (no exceptions)

This paper must follow APA format. https://owl.english.purdue.edu/owl/resource/560/01…

This paper must be double spaced, 12” font, 1” margins all around

Submission of this research paper must have cover page with appropriate headers, page numbers, and appropriate information utilize in APA format

Must use references/resources submitted

In-text citation (Last name, Year)

Give me your best writing because I need to score an A

Absolutely, NO PLAGARISM

Resources

–Case Scenario (Personal)

Mr. and Mrs. English was married for nearly 50 years and had 9 children. In spite of the fact that Mr. English was the bread winner in the family, he spent practically most of his time outside the home. During his absenteeism, Mrs. English struggled and managed to raised their children single-handedly. There was a great lack of responsibility for nurturing and making necessary provision for the family on the part Mr. English. As the years went by, there had been a marked sign of resentment from the children and Mr. English never attempted to make amends. Now that everyone of the children are all grown with their own family, they feel no reason for obligation toward their father’s well-being. Moreover, Mrs. English has deceased and nearly 15years later, Mr. English, now 90years is living alone, has very limited contact with his family and no friends. Although still mobile, he is very frail and is experiencing several issues with his health. His living condition are very bad, the home is dirty and cluttered, no running water and electricity installed. Eats scraps and canned foods. Maintains a strong body odor due to poor hygiene. However, as feeble and weak and unkempt as he is, he manages to still take public transportation 3 or 4 times weekly to sit in an area of public interaction as well as to seek after a small pension that’s deposited in his bank account each month. He possesses no benefits to contribute toward his care. Most with the exception of one of the children have migrated abroad. Seven out of the nine children do not care to participate in any efforts towards contributing in his care. At times, Mr. English complains that he has many children and grandchildren and sees no one. In his current condition, it is suggested that he should be institutionalized for a better quality of care or perhaps have a caretaker in his home. He refuses both options and as a results, causes strife for the one remaining adult child.

–The New York Times – Elder Abuse : Sometimes it’s self-inflicted (03/02/2018)https://www.nytimes.com/2018/03/02/health/elderly-self-neglect-.html

–Dealing with self-neglect in the elderlyhttps://www.lockportjournal.com/community/dealing-with-self-neglect-in-the-elderly

–What are the warning signs of elderly self-neglect vs abusehttps://www.hawklawfirm.com/warning-signs-elder-self-neglect-vs-abuse

–Elder self-neglect research and practicehttps://www.dovepress.com/elder-self-neglect-research-and-practice

–Prevalence of elder self-neglect in a Chicago Chinese population : the role of cognitive physical and mental health. Geriatrics & Gerontology International Sept-2016 Vol-16, page 1051-62

–Recognizing, reporting, and responding to abuse, neglect and self-neglect of vulnerable adults. Journal of Elder Abuse and Neglect, Jan/Feb 2018: 30(1): page 42-63

–Social work intervention with adults who self-neglect in England: responding to the Care Act 2014. Journal of Adult Protection, 2017; 19(2): pages 67-77

–The meaning of elder self-neglect: social workers’ perspective. International Journal of Aging & Human Development. 2013: Vol.77(1), page 17-36

— Home care nurses’ experiences of elder self neglect, Home Healthcare Now,Jan 2015: Vol.33(1), pages 31-37

–Elder self-neglect: a geriatric syndrome or a life course story? Journal of Aging Studies, April 2012, 26(2): 109-118

No sure cure for Elder self-neglect: A Case Study. Review-Columbia University of Social Work, 2011, Vol.2, pages 49-58

–From Despair to Integrity: Using narrative therapy for older individuals in Erikson’s last stage of development. Clinical Social Work Journal, Dec 2017, Vol.45, Issue 4, pages354-363

This is a research paper.

This is not a report. Please give me your personal perception and experiences on the subject of elder self-neglect. All discussion under each subheading must reflect your personal thoughts or opinion of the issue(s) being address. Write the paper as your experience (in the first person).

Topic question (Thesis statement/abstract)

  • What is the purpose of this paper?
  • Why are you writing about elder self-neglect?
  • What are your reason for choosing to write about elder self-neglect?
  • What are your concerns about elder self-neglect?
  • What triggered your thoughts to choose to do your research on elder self-neglect?

Key words🙁Please use key words to help construct this research paper)

Social isolation, integrity vs despair, inadequate preparation, elder expectations, informed knowledge, self neglect, vulnerability, mental awareness, physical issues, emotional issues, loneliness, psychological issues, unsafe living condition, poor hygiene, malnutrition and dehydration, declining functional abilities, unkempt appearance, noncompliance, interventions, lack of support, lack of resources, risk factors, warning signs, prevalence, statistics

Introduction

  • Meaning of elder self-neglect.
  • What are the causes and impact of elder self-neglect.
  • Who is prone or vulnerable of elder self-neglect.
  • Background information on elder self-neglect.
  • What is the debate/conversation/perspectives surrounding the issue?

Body paragraph(Use questions below to help construct your research) Each paragraph should have a specific issue of discussion under the subject of elder self-neglect. A topic statement is therefore necessary under each of the paragraphs. You, the writer should support the issues under each paragraph with sources provided. Number of paragraphs will depend on how you organize the paper. (Follow the rules of the body paragraph)

  • Points you want to make.
  • Reasons that helps prove your thesis.
  • Explain/elaborate/commentary and give evidence.
  • Concluding sentence/transition to next point, (connect back to thesis)

————————————————————————————————————————–

  • What are the expectations of the elderly?
  • Were they prepared or did they make any provision for old age.
  • Was there lack of resources available to them?
  • Were they in tuned with of available information to prepare for elder years?
  • Were they aware of the consequences they may face?
  • Did they made survival plans for themselves?
  • How do Erikson’s 8th stage of development relate to the incident of elder self-neglect?
  • What are the risk factors involved in elder self-neglect?
  • How many older Americans are prone to self-neglect?
  • What makes an older adult vulnerable to self-neglect?
  • What are the warning signs of elder self-neglect?
  • What are the effects of elder self-neglect?
  • How is elder self-neglect identified?
  • How can elder self-neglect be prevented?

——————————————————————————————————————————-

Counter argument and rebuttal paragraph

The research on elder self-neglect should end in a manner that communicates clear message to the reader.You should therefore connect the conclusion with other paragraphs of the paper.In this regard, your research on elder self neglect can follow some important tips in preparing the best conclusion.

——————————————————————————————————————————-

Conclusion paragraph

  • Restate thesis and major reason(s).
  • Give a brief summary of the entire paper content.
  • Answer… Why is this topic important to think about?
  • Suggestion for more research and information on the topic of elder self-neglect.
  • Prove your point of view to influence and convince any concerned reader.
  • Leave the reader with a striking impression through a strong conclusion.

Please make reference to the personal scenario and the New York time article

Art and history paper about Arabic calligraphy.

write 5 to 8 pages (or more) about Arabic calligraphy.

Notes:

  • Format: MLA
  • The paper is both about art and history so it needs to include both aspects. Start with the history (how/where/when/by whom it began). Describe possible religious/political reasons behind it. Compare it with the type of art came before it and current version of Arabic calligraphy. Then talk about the artistic features; pick some important pieces and talk about them and the artist(s) who made them.
  • make sure the introduction is interesting (imagine yourself introducing a movie)
  • the last sentence of the introduction should clearly state your thesis, what the paper is about and how are you going to handle the topic.
  • use a minimum of 5 sources: 3 books and 2 articles (or more)
  • You may include some pictures

1000 word paper Analytical

Analytical Essay: During the term you will be required to write a thesis driven critical essay of not less than 1.000 words. For your analytical essay you should (a) select an artifact and/or artist from the disciplines of music, film, the visual arts and sculpture, philosophy, literature, or architecture and (b) discuss how the artifact and/ or the artist are representative of a particular movement. Your analytical essay has to be related the movements discussed in this course. (I can give further information on what we have discussed in the class). 

I also have to use 2 secondary sources in my essay. This is the link to the sample he would like us to somewhat follow: http://www.fountainheadpress.com/signs/supportmaterials/AE_Shrew%20Essay.pdf

Accounting Discussion question and answer, accounting homework help

Discussion Prompt

Review the case study below and respond

Cliff Hall opened Meridian Co. on January 1, 2009. At the end of the first year, the business needed additional capital. On behalf of Meridian, Cliff applied to Federal National Bank for a loan of $300,000. Based on Meridian financial statements, which had been prepared on a cash basis, the Federal National Bank loan officer rejected the loan as too risky.

After receiving the rejection notice, Cliff instructed his accountant to prepare the financial statements on an accrual basis, and to include income for contracts that would not close until well after he re‐applied for a loan. Cliff then applied for a $300,000 loan from First City Bank, using the revised financial statements. On this application, Cliff indicated that he had not previously been rejected for credit.

Discuss Cliff’s ethical and professional conduct in his second application for credit, with First City Bank.

Complete Personal Finance Assignment NO PLAGIARISM

Personal Debt Management

Develop a plan for managing your debt. How many sources of debt do you current have, and what are the balances owed on each? What specific behavioral steps do you personally need to take to match your debt aspirations with your debt reality? How will you practically implement these steps?

Criteria:

The requirements below must be met for your paper to be accepted and graded:

  • Write a minimum of 400 words (approximately 2 pages) using Microsoft Word.
  • Attempt APA style, see example below.
  • Use font size 12 and 1” margins.
  • Include cover page and reference page.
  • At least 60% of your paper must be original content/writing.
  • No more than 40% of your content/information may come from references.
  • Use at least two references from outside the course material, preferably from EBSCOhost.
  • Text book, lectures, and other materials in the course may be used, but are not counted toward the two reference requirement.
  • Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must be identified in the paper and listed on a reference page.
  • Reference material (data, dates, graphs, quotes, paraphrased words, values, etc.) must come from sources such as, scholarly journals found in EBSCOhost, online newspapers such as The Wall Street Journal, government websites, etc.
  • Sources such as Wikis, Yahoo Answers, eHow, etc. are not acceptable.

A detailed explanation of how to cite a source using APA can be found here (link).

Download an example of a paper using APA formatting here

Discussion Replies Chapter 14 Bitlocker File Encryption, writing homework help

Must be 150 words each and contain relevant content. Do not just critique the others writing.

1) Chapter 14 Bitlocker File Encryption

Let explore this scenario, you travel extensively for business and travel with a laptop and you are worried that you confidential data on your computer will be compromised. In this thread let talk about BitLocker Encryption. What is a BitLocker Drive Encryption? What are the pro and cons of using this technology? If you’ve used BitLocker, what has your experience been with it?

Answer the questions and respond or comment to any of your classmates responses.

2) Chapter 14 FAT

Class,

This is a discussion on FAT (file allocation table) and how it relates to storage. Let’s list and define them to make certain everyone understand what is it. There are FAT16 and FAT32. What are the difference between those two. There is technology called NTFS. What is NTFS and how does it relate to FAT32 or FAT 16?

Answer the questions and respond or comment to any of your classmates responses

3) Chapter 14 Direct Access vs VPN

lass,

Here’s another scenario. You are working at your home but you forgot an important document on your work server and need to finish your work. That’s where the innovation of VPN or virtual private network comes in. I’d like to discuss that in this thread and also discuss DirectAccess. What is DirectAccess? What is VPN? What are the similiarities or differnces of each.

4) Chapter 14 MCSA Windows Server 2012

Everything I’ve read to this point, and including this point, tells me not to put a bunch of different servers on one machine. And, if you have different locations – especially like our Wadley Inc. example – we have the ability to set up a server network and implement a BCP/DRP at the same time.

Active Directory appears to work, reference making things easier.

I was aware that I needed to publish shared folders. Not sure if it’s in my Lab Sim notes, Plural Sight notes, class book notes, or where – but I remember reading about it before this.

Off line folders and synchronization sounds like a really good thing to me. I’ve been wondering what I could do for my network, should I choose not to allow access to my network during off work hours. This seems ideal as an alternative.

I understand the benefits of NTFS. Ah, good tip reference encryption, after a person leaves the company.

I wondered about the security of individual folders – excellent! Oh, NOW I understand the need for Deny! I saw this on one of our simulations and thought, if I am handing out the permissions why would I need to deny anyone? Now I get it. We use deny if the person has multiple permissions, and we want them in another group, but we want them to have no permissions in that specific group. Makes sense.

This was a good tip – shared permissions can only be placed on the folder – not on individual files.

I thought how NTFS Security and Shared Permissions work together was an interesting section.

I have the feeling, based on what I’m reading, FSRM is going to be one of my favorite tools.

I like the idea of bit locker, although I’m not so sure I like that every User has the ability to reset passwords and stuff. I’ve not had a personal experience though, so, I’m thinking – particularly in a large company – that’s probably a plus in the long run.

Oddly enough, I have heard of direct access before this. I was kind of curious about alternatives to VPN’s – although I love the idea of VPN’s, they do use a lot of resources – anyways, up popped direct access via IPsec. (I also sort of chewed on APIPA).

Now this is the part I’ve been waiting all morning for – disk quotas. Wow, it reads like it’s simple to implement, I like that!

I found a really good article reference DFS Replication – not sharing yet though. As I understand DFS Replication, it’s not only good for load balancing and fault tolerance, but it’s an excellent avenue when exploring BCP/DRPs also.

Publishing printers (or anything really) to AD is new for me, but I’m keen to learn how. I think it’s an immensely useful tool in a network!

This was an excellent read!

5) Chapter 17

Chapter 17 covers file and storage systems which includes basic and dynamic disks, RAID sets, some material on virtual disks, and configuring firewalls. A lot of the material falls right in line with the information needed for this weeks writing assignment on protecting files and folders. Protecting data starts with ensuring the integrity of it, through RAID (redundant array of independent disks). There are a couple different types of RAID, each with their own pros and cons. RAID-5 seems to be a common and popular one, it uses a minimum of 3 disks and a maximum of 32. Data is striped (like RAID-0) across all the available disks with built in error correction blocks called “parity”. In the event of a failure, parity is used to reconstruct lost data using pieces stored on other disks.

This weeks LabSim exercises really helped me get a working knowledge of how RAID actually works by giving me a visual of the different disks and how the data gets distributed when using different styles.

6) Supporting Activity Printer Options

Many factors that’ll help improve scalability and performance of print servers; some involve the number of clients, client-side rendering, and printer hardware. According to TechNet (2014), the number of clients can cause some problems for the print server, when a large number of clients connect to the server it’ll cause a significant drain on system resources. Another thing to note about these amount of clients is that if one leaves an application activated for an extended amount of time, then the connection with the print server might remain open and constrain it, a large number of clients connected when printing while connected. Client-side rendering allows the print system on that client to translate the document to a printer specific PDL before data gets sent to print server, the client-side rendering sometimes gets used instead of server-side rendering so it can maximize server capacity. Printer hardware may vary depending on what printer gets utilized for a print server, printers that support OpenXPS require minimal server support and printers that support PCL6 or PostScript are less efficient than XPS because they are vector formats (TechNet, 2014).

7) Supporting Activity Securing the Network

think rights delegation and file access, particularly reference security, are all steeped in least privilege. I’ve not encountered a situation/scenario where least privilege was called rights delegation or file access though, so I’m going to research a bit before I make up my mind. However, I think it might be least privilege on a higher plane than just Users or Groups. I mean, if I think about it, who has security or permission rights? IT Admin. So perhaps rights delegation is the hierarchy of IT Admin? Not sure about file access though.

Okay, as I complete my research (because now I HAVE to know!), I’ll post more.

8) Chapter 17 MSCA Windows Server

In this chapter, it mentions how to work with volume sets, created from volumes that span multiple drives by using the free space from the said drives to construct something that looks like a single drive. There are many types of volume sets, and they are simple volume, spanned volume, striped volume, mirrored volume, and RAID-5 volume, these included work in various ways. According to Panek (2015), simple volume uses either one disk or a portion, spanned volume spans multiple disks with a maximum of 32 and used when volume needs are too high for one. Striped Volume stores the data in stripes across two or more disks if the set of stripes fall the entire volume will fail. Mirrored volume duplicates the data across two disks, its fault tolerant because if one of the drives fails, then data on the other isn’t affected. RAID-5 volume stores its data in stripes like striped volume, but across three or more disks, the thing is the OS files and boot files can’t reside on the RAID-5 disks (Panek, 2015).

Global Issues in Context, economics homework help

The “Global Issues in Context: Left Homeless, Storm Victims Turn to Internet to Find Shelter” podcast, located in this week’s Electronic Reserve readings.

  • The podcast discusses the use of technology to locate available places where homeless storm victims can find shelter. If a family locates a place using the electronic resource, they are expecting it to be a guarantee. Consider some of the risks associated with misinformation.

Imagine you are a reporter for a national news syndication. You are tasked with writing a summation of the usefulness of technology in a crisis situation. Be sure to include in your article your opinion of or personal experience with crisis.

Write a 350- to 700-word article that discusses the following:

  • How was the use of technology demonstrated in this podcast?
  • Identify uses of information technology to connect clients to online resources.
  • Is there any danger in being dependent on technology, specifically in the scenario from the podcast?
  • Evaluate the differences between and benefits of electronic information over receiving information in a written printed format.
  • When considering the needs of people in crisis, how effective is the use of technology in the following circumstances?
    • Speed of information
    • Accuracy
    • Access to the technology
    • Updating data
  • How can a human service agency ensure that they are not liable for information that could be wrong?
  • Are there any regulations you can think of that should be considered when providing access to materials using technology?

Click the Assignment Files Tab to submit your assignment. 

Personal Writing Improvement Plan

What I’d like you to do is take a moment to think about what you’d like to improve on in your own writing. What did you like about what you saw in the writing of others? What would you like to practice and incorporate into your own writer’s toolbox? What parts of your writing are you nervous about and want more practice and support with? Be honest.

In addition, come up with some ideas to help yourself throughout this semester. What can YOU do to develop your writing? What can YOU practice and review and research to become a stronger writer? I’ll give you a hint for one idea: READ AS MUCH AS YOU CAN! Every published piece is a model for writing. READ! READ! READ!

Write a paragraph or two about your personal writing plan. What do you hope you can improve this semester, and how do you plan on doing it?