Essay 2: Apply philosophical concepts of the good life

Essay 2

This assignment asks you to reflect the challenges in contemporary society to having a good life. The first challenge is work. You will interact with Crawford’s discussion of the value of various kinds of work. Choose the second challenge from several topics listed below. The essay asks you to apply ideas from Kraut’s conception of human flourishing to these challenges. Finally, you will discuss Paul Camenisch’s claim about how to evaluate products and services.

Establishing Theme, film assignment help

Select a movie from AFI’s 10 Top 10 lists and explain how three cinematic techniques and/or design elements have helped establish a major theme in that film. Note: While you are allowed to choose a film that does not come from the AFI lists, you are strongly encouraged to email your professor to receive approval before doing so.

In 800 to 1200 words

  • Describe a major theme of the movie you have selected using evidence from the movie itself as well as course resources and other scholarly sources to support your position.
  • Identify at least three techniques (cinematography, lighting, acting style, or direction) and/or design elements (set design, costuming, or hair and makeup), and explain how these techniques and/or design elements contribute to the establishment of the theme. Reference particular scenes or sequences in your explanations.
  • State your opinion regarding the mise en scène, including
  • How the elements work together.
  • How congruent the design elements are with the theme of the movie.
  • Whether or not other techniques would be as effective (Explain your reasoning).

Note: Remember that a theme is an overarching idea that recurs throughout the plot of a film. It is the distilled essence of what the film is about, the main design which the specific scenes and actions lead a viewer to understand.

Your paper should be organized around a thesis statement that focuses on how the elements of your chosen feature-length film both establish and maintain one of its major themes. Review the Week Three sample paper, which provides an example of a well-developed analysis as well as insight on composition.

The paper must be 800 to 1200 words in length and formatted according to APA style as outlined in the Ashford Writing Center.

You must use at least two scholarly sources other than the textbook to support your claims. Refer to the ENG225 Research Guide in the Ashford University Library for guidance and to locate your sources. Cite your sources (including the feature-length film) within the text of your paper and on the reference page. For information regarding APA, including samples and tutorials, visit the Ashford Writing Center.

Term Paper ( maximum in 20 pages ).

In 2012, Domino’s Pizza changed the company’s name to Domino’s, so they dropped the word pizza. After that, they added a number of meals such as sandwiches, pasta, salads, chicken wings, chocolate lava and others. So, they developed the menu because in the past they just offered pizza. In 2012, there was a significant evolution in the delivery service as well as added screens inside their branches، in which the customer can view his or her request and control the steps of demand, and minutes of waiting with comfortable waiting area. Also, they have an App through it the consumers can use it for their orders.

Please make sure it is fact based vs opinion.


Why they did those changes?

What is the purpose of those changes?

What is their business plan for that?

How this plan became successful?

How changes affected their customers? the old and new customers.

Has Domino’s received new customers after changes? HOW?

What are the objectives of the company in those changes?

and this kind of questions …. should be in this term paper.

PLEASE PLEASE make sure you have the ability to do it, it’s worth by 225 points.

Again make sure it is fact not opinions.

Course Project—Final Paper Due

Course Project—Final Paper Due

This is it! The final paper is due. Please submit the final version of your Course Project. Your Project should contain 6–8 pages of text, should be double-spaced, and should have a title page and reference page. Please be sure to proofread your project carefully before submitting, and check to be sure that citations and formatting follow APA requirements.

  • Week 2: Students will submit the research paper topic proposal. 25 points——>  DONE
  • Week 4: Students will submit the reference list and outline of their research paper. 75 points–>DONE
  • Week 7: Students will submit the final version of their research paper. 150 points
  • please find here the topic proposal and paper outline. 

    Calanacourseproject.doc 

    Calanareferencelistandoutline.doc

    Need a 10 Page Narrative Powerpoint

    Activity: SWOT Analysis PowerPoint
    Due Week 2 and worth 200 points

    Physicians and patients have been affected by development and implementation of Health Information Technology (HIT). There are many other healthcare professionals and venues affected by significant complexities and characteristics that make HIT implementation challenging. For example, standardized data formats are used to facilitate data portability, work culture barriers, system costs, training issues, and other matters. Some Emergency Medical Services (EMS) providers have begun to use a variety of portable Electronic Health Records to collect data at the scenes of patient incidents with systems designed to transmit data to receiving hospitals. Overall, however, achieving the Nationwide Health Information Network has been elusive due to administrative and technical difficulties.

    To achieve the HIT goals of improving health care quality and reducing costs, extensive and rigorous work remains in the research and implementation arenas. Assume you have just graduated with your Master’s degree and you have passed a series of interviews at the top hospital known as We Care Hospital. You are hired as the Chief Operating Officer (COO) and your first task is to conduct a SWOT Analysis of the HIT system at We Care Hospital. Research the websites of your local hospital and determine their strengths, weaknesses, opportunities, and threats based on the ease of information, access for potential patients, and clinical quality features located on their website that identify the basic operations of the healthcare organization.

    Then, prepare a Microsoft PowerPoint 10-slide narrative using a SWOT Analysis. A SWOT Analysis identifies strengths, weaknesses, opportunities, and threats in a situation. Review the video: Strategic Planning and SWOT Analysis. To help you prepare the narrative PowerPoint using Microsoft 365 and older versions, review video: Record a slide show with narration and slide timings.

    Your 10-slide SWOT PowerPoint should follow this format:

    1. Slide 1: Cover Page
      1. Include the title of your presentation, your name, the course number and course title, your professor’s name, and the date.
    2. Slide 2: Background / Executive Summary
      1. Describe the details of the situation. Use bullets with short sentences. The title of this slide should be Executive Summary.
    3. Slide 3: Thesis Statement
      1. Identify the focus of your research. The title of this slide should be Thesis Statement.
    4. Slides 4-9: Support
      1. Support your thesis statement following the SESC formula: State, Explain, Support, and Conclude. (An overview of using Sublevel 1 and Sublevel 2 headings is provided in the following video: APA Style – Formatting the Title Page, Abstract, and Body.
      2. You should include at least three court cases and related peer-reviewed articles from within the past five years. In-text citations should be in the American Psychological Association (APA) format.
    5. Slide 10: References
      1. Use APA format for your Reference slide. (To help you with APA in-text citations and your Reference list, some students use Citation Machine.

    Note: Writing Resources are available from Strayer University’s Writing Center, Tutor.com, and Grammarly.com.

    The specific course learning outcomes associated with this assignment are:

    • Assess how changes in the economic and commercial environments have affected the health sector.
    • Analyze the relationships between health care cost and health care quality.

    Quantitative Reasoning Activity

    Quantitative Reasoning Activity

    Student Name:

    Instructions: Below are the results of two different psychological studies. In the first study, the raw data are presented along with an explanation of the hypotheses explored in the study. In the second study, a graphical representation of the findings is presented for review. Please examine the questions below and provide the information requested for each of the two psychological studies on this document and submit it to the Assignment folder no later than Sunday 11:59 PM EST/EDT of Module 5.

    Study 1: An industrial/organizational psychologist wants to examine the best predictors of job performance at her company. The organization evaluates employees once a year using the “Employee Performance Evaluation” – a form that evaluates employees on ten important job dimensions and results in scores of 10 through 100 with 100 being indicative of outstanding performance. The other variables available for examination include gender, college grade point average (GPA), and interview score (which ranges from 30 to 80 with a higher score being more positive). The data for the employees of the organization are presented below.

    ID

    Gender

    College GPA

    Interview Score

    Employee Performance Evaluation

    1

    1

    3.01

    50

    92

    2

    2

    2.98

    60

    78

    3

    1

    3.49

    40

    56

    4

    1

    3.90

    30

    66

    5

    2

    2.75

    45

    78

    6

    2

    2.89

    33

    88

    7

    1

    2.76

    56

    67

    8

    2

    3.26

    35

    72

    9

    1

    3.65

    78

    79

    10

    2

    3.08

    87

    83

    11

    2

    3.18

    55

    86

    12

    2

    3.33

    33

    82

    13

    1

    2.92

    32

    66

    14

    1

    3.76

    51

    99

    15

    1

    3.21

    54

    76

    16

    1

    2.90

    49

    67

    17

    2

    4.00

    77

    89

    18

    2

    3.82

    43

    88

    19

    1

    3.21

    56

    82

    20

    2

    3.07

    34

    78

    21

    1

    2.94

    65

    69

    22

    2

    3.19

    62

    79

    23

    1

    3.22

    68

    84

    24

    1

    3.41

    74

    85

    25

    2

    3.52

    34

    81

    26

    2

    3.44

    80

    90

    27

    1

    2.78

    55

    60

    28

    1

    3.06

    59

    78

    29

    1

    3.54

    62

    88

    Using the data in the table above, please answer the following three questions to the best of your ability (NOTE: SPSS is a special program that is available for purchase, but is not required for this course):

    1.Using VasserStats (http://www.vassarstats.net) or another appropriate software program like Excel or SPSS, compute the mean for the GPA variable and the standard deviation for Employee Performance Evaluation. Fill in the values where indicated below:

    Mean for GPA __________

    Standard Deviation for Employee Performance Evaluation __________

    2.Using VasserStats (http://www.vassarstats.net) or another appropriate software program like Excel or SPSS, compute the bivariate correlation (Pearson Product Moment Correlation Coefficient) between the Interview Score variable and the Employee Performance Evaluation variable. Fill in the value where indicated below:

    Correlation between Interview Score and Employee Performance

    Evaluation __________

    Review the scores of participant 26 in relation to the mean and standard deviation for the Employee Performance Evaluation (Hint: You will need to calculate the mean for this variable but you can use the standard deviation you found in question 1). Based on this information about central tendency and variability, describe in a few sentences how this person performed on the evaluation. Write your responses in the space below

    CMIT-Digital Forensics and Analysis and Application

    Detailed Assignment Description for Forensic Report #2

    The purpose of this assignment is to determine if you can

    • Properly process and handle evidence for a case and perform other case management functions
    • Comply with laws, regulations, policies, procedures, and ethical constraints which apply to a case
      • Develop and document a minimum set of policies and procedures required for the professional practice of digital forensics. (See report outline.)
    • Select and use appropriate digital forensics tools
    • Process an evidence drive by using a forensic tool to view and analyze partitions, folders, and files to answer questions posed by a client and to identify additional questions that should be asked
    • Recover and analyze specific file types and contents
      • Email files
      • Encrypted or password protected files
      • Internet Explorer cache files
      • MS Office documents, spreadsheets, and presentations (including metadata)
      • Windows Registry files
      • Text files
      • Other file types as found in the image
    • Perform keyword driven searches to identify files and other digital artifacts of forensic interest to the case
    • Perform file carving to recover orphaned files and then identify which carved files contain information of forensic interest to the case.
    • Properly recover and handle contraband (adult and child pornography, evidence related to narcotics)
    • Write a reasonably professional comprehensive (full) report of a forensic examination

    Required Deliverables:

    • Forensic Report #2 File containing:
      • Transmittal Letter
      • Delivery Package Inventory
      • Forensic Report (Full) and all appendices
    • Chain of Custody Document
    • List of MD5 Hash Values for all files submitted for this assignment


    CMIT 424 Forensic Report #2Scenario

    James Randell, president and owner of Practical Applied Gaming Solutions, Inc. (PAGS), contacted you to request additional assistance in handling a sensitive matter regarding the unexpected resignation of a senior employee of his company. In your previous investigation, you learned that Mr. Randell had become concerned about an employee’s resignation after receiving a report that Mr. George Dean (also known as Jeorge Dean), the company’s Assistant Chief Security Officer, left a voice mail tendering his resignation effective immediately.

    After agreeing to accept this case, you met face to face with Mr. Randell and Mr. Singh at the PAGS offices in Rockville, MD. At that meeting you executed (signed) an investigation agreement (contract) and received a sealed envelope from Mr. Singh which contain a USB drive. The original copy of Mr. Dean’s signed employment agreement was provided for your inspection by Mr. Singh but you were not allowed to take a copy with you.

    During your meeting with the client, Mr. Randell, and the head of HR, Mr. Singh, youalso learned that:

    • PAGS is a contractor to several state gaming (gambling) commissions. The company and its employees are required to maintain high ethical standards and are not allowed to participate in any forms of gaming or gambling, including lotteries, due to their involvement as security consultants to the gaming commissioners.
    • Before starting work, each employee must sign an employment agreement which includes
    • Immediately before his departure, Mr. Dean was using a company issued laptop in the office as a temporary replacement for his workstation; an empty soft-sided laptop case was found under Mr. Dean’s desk but the company issued laptop was not found in the office.
    • Mr. Dean’s company provided workstation was sent out for repair earlier in the week; the repair ticket listed repeated operating system crashes as the primary symptom. The IT Support Center reported that the workstation had been infected with a “nasty rootkit” which required a complete wipe and reload of the hard disk (operating system and software applications).
    • The IT Support technician, Ms. Valentina Reyes, has already re-imaged the hard drive for Mr. Dean’s workstation. Per company standard practice, she saved a copy of Mr. Dean’s profile (entire directory) and the user registry file. Ms. Reyes copied the user profile from Mr. Dean’s workstation hard drive to a USB which she provided to Mr. Singh at his request. This USB was placed in a sealed envelope by Mr. Singh.
    • Acceptance of restrictions on personal activities (no gambling or gaming in any form);
    • Consent to search and monitoring of computers, media, and communications used by the employee in the performance of his or her duties for the company.

    Your contract with PAGS directs that you examine the contents of the entire USB drive and then prepare a report. The client wants to know if there is any indication of any activities by any persons which would violate the company’s employment agreement (see item #2 above). In addition to your report, you are also required to provide copies of files and information of forensic interest which were recovered by you from the USB drive.

    Notes for the Student:

    • You may encounter contraband, e.g. images depicting adult or child pornography, during your examination of the provided forensic image. If this occurs, you are to proceed as though you had legally authorized permission to continue your examination and prepare a report which includes information about the contraband. For training purposes, Adult pornography is depicted using images of canines (dogs or puppies). Child pornography is depicted using images of felines (cats or kittens). Images of child pornography (cats or kittens) should not be included in a forensic report and should not be extracted from the forensic image. The file information, however, should be reported i.e. file name, file location, and relevant metadata such as MD5 hash, creation, last written, last accessed dates.

    2. For training purposes, pictures of flowers are used to denote narcotics and related contraband.

    3. The referenced employment agreement is understood to include prohibitions against participating in any/all illegal activities on company premises or while using company IT resources. This prohibition includes receipt and transmission of illegal forms of pornography (as defined by the State of Maryland and the US Federal Government) and engaging in any/all forms of drug trafficking.

    4. For the purposes of this assignment, you (the student) are acting in the role of “forensic examiner.” In the grading rubric, actions attributed to “the examiner” are actions that you should (or should not) have taken.

    5. You should use any and all information provided in the detailed assignment description for Forensic Report #1 and the results of your examination of the evidence as reported in Forensic Report #1.

    6. Use the following case naming and evidence numbering conventions:

    • Case Names: PAGS01 (Forensic Report #1) and PAGS03 (Forensic Report #2)
    • Evidence Labels: PAGS01_USB and PAGS03_USB

    Acquisition / Forensic Imaging Report (USB)

    Forensically sterile media was created using Sumuri Paladin and then used for the imaging operation as the target media. The sterile state was verified using DCFLDD’s verify file command (sudodcflddvf=/dev/sdx pattern=00 where sdx is the drive designator for the USB).

    Imaging operation was performed using FTK Imager.

    Note: for your forensic report, you must determine whether or not you will report the imaging operation as onsite or in-lab. In both cases, your chain of custody should show transfer of a USB containing the evidence from the PAGS premises to your forensic lab location. If you perform the imaging operation onsite, you will report that you immediately returned the original media (USB from sealed envelope) to Mr. Singh.

    ————————————————————-

    Created ByAccessData® FTK® Imager 3.2.0.0

    Case Information:

    Acquired using: ADI3.2.0.0

    Case Number: PAGS03

    Evidence Number: PAGS03

    Unique description: vmdk

    Examiner: Instructor

    Notes:

    ————————————————————–

    Information for C:CMIT424PAGS03PAGS03_12162014:

    Physical Evidentiary Item (Source) Information:

    [Device Info]

    Source Type: Physical

    [Drive Geometry]

    Bytes per Sector: 512

    Sector Count: 20,971,520

    [Image]

    Image Type: Raw (dd)

    Source data size: 10240 MB

    Sector count:20971520

    [Computed Hashes]

    MD5 checksum:f311a2152887024bdd0b9155b94c4db6

    SHA1 checksum:af6c44766b188ece5ff5d91677e8adf11168a61e

    Image Information:

    Acquisition started:Tue Dec 16 17:08:13 2014

    Acquisition finished:Tue Dec 16 17:13:42 2014

    Segment list:

    C:CMIT424PAGS03PAGS03_12162014.E01

    Image Verification Results:

    Verification started:Tue Dec 16 17:13:44 2014

    Verification finished: Tue Dec 16 17:15:52 2014

    MD5 checksum:f311a2152887024bdd0b9155b94c4db6 : verified

    SHA1 checksum:af6c44766b188ece5ff5d91677e8adf11168a61e : verified

    Examination of the Evidence (Procedure) for Forensic Report #2

    Before You Begin:

    • Locate the forensic image file(s) on the share drive in the VDA (H:Lab ResourcesResourcesFR2). This is your evidence file and should be treated as if it were stored on a physical USB that you can move from place to place.
    • Download and review the outline for the full forensic report with the pre-inserted additional documentation (Transmittal Letter & Delivery Package Inventory). Take particular note of the appendices and additional required information (Policies, Glossary, Equipment / Software list, etc.). You can use the glossary from the previous FR1 template.
    • Download and review the chain of custody form. This file is stored in LEO Week 1 Content.

    Note: the Delivery Package Inventory lists the files the examiner has created and is delivering to the client. It is NOT a listing of the evidence files.

    Utilize the reporting features of the forensic applications (example: bookmarks) but bear in mind that automated reports do not replace the final forensic report. Use this information, however, to enhance your report in the form of addendums or by inserting relevant information into the report template to illustrate/justify your findings.

    Examination Procedure:

    • To begin, start a chain of custody document for this case. List the E01 files by evidence tag number (which you should assign – or, use the file name without the extension) and put the file name in the description column. Include the MD5 hash value for the E01 file. Remember to record the transfer of the USB from the PAGS location to your forensic lab. You should also record that you put the evidence media in a SAFE (for “safe keeping”).
    • Remember to record the movement of the USB from your safe to your lab “for examination.” (From here on in the procedures, it is assumed that you understand when and how to make appropriate entries in the chain of custody.)
    • Launch the forensic tool (software application) that you will use to process your case.
    • Create or Open your case
    • Add the forensic image file to your case.
    • Review the files and folders found in the case.
    • Analyze your recovered files to find answers to the questions presented in the Scenario document for this assignment. Make sure that you keep track of which files support your answers.
    • Export an inventory listing of the forensically interesting files which you will address in the body of your report and prepare the screen snapshots which you will include in Appendix A of your report. (For the purposes of this assignment, you do not need to include the actual files in your assignment submission.) Include your inventory listing as a table in Appendix A.
    • Prepare a Full Forensic Report in which you present a summary of your forensic processing and your findings (answers to the scenario questions). Typically this report ranges from 12-25 pages.
    • Crop and compress any screen snapshots included in your forensic report to reduce the total size of your report file.
    • Compute and report MD5 hash values for all files being submitted as part of your assignment. Include the list of filenames and hash values in the comments section of your assignment submission. Alternatively, you may include these in an attached text file.
    • Attach your forensic report, your transmittal letter, your delivery package inventory, and your chain of custody document to the assignment for Forensic Report #2 and submit it for grading.
      • Email files
      • Encrypted or password protected files
      • Internet Explorer cache files
      • MS Office documents, spreadsheets, and presentations (including metadata)
      • Windows Registry files
      • Text files
      • Other file types as found in the image

    Grading Information for Forensic Report #2

    The rubric for this assignment is attached to the assignment folder entry. The information below provides additional information about content and format requirements. This assignment is graded on a 100 point basis and is worth 15% of the final course grade.

    Formatting Note:

    Comprehensive forensic reports are written in narrative format. You should use a professional layout for your pages. APA style compliance is not required but, you may find that the APA formatting guidelines are appropriate and provide a professional appearance for fonts, margins, sections, paragraphs, etc.

    Outline / Required Content Items:

    The paragraph below each item lists the full performance or “A” level requirements for that item.

    1. Overview of the Case (10 points)

    Provided an overview section that contains an excellent summary of the case. The overview appropriately used information from the scenario. Clearly identified and accurately phrased the case questions.

    2. Summary of Findings (10 points)

    Provided an excellent summary of the examiner’s findings at or near the beginning of the report. Clearly and accurately summarized the findings related to each case question. Provided clear and concise answers to the case questions.

    3. Case Management and Evidence Handling (10 points)

    Demonstrated excellence in the handling, management, and documentation of the case. Submission included evidence tagging/labeling, transfer of evidence between the client and the examiner, full provenance of the evidence (as known to the examiner), chain of custody documentation, delivery package inventory, transmittal letter, and hand receipts.

    4. Client interview and Onsite examination (5 points)

    Provided an excellent, thorough report detailing the conduct of a client interview and all information obtained through direct questions of the individuals who were involved or had knowledge of the incident or evidence. Correctly executed and reported upon the onsite examination (if any). Reporting includes properly labeled pictures or images of the site and all evidence.

    5. Evidence Acquisition and Imaging (5 points)

    Report correctly explains how the forensic duplicates of the original evidence were created (or explains how this would have been done in cases where an E01 file was provided for the examination). The report includes an appendix which provides an understandable policy which governs the acquisition and forensic imaging of evidence. The policy includes requirements for wiping media (forensic sterilization) prior to use for duplication.

    6. Physical and Logical Analysis of the Evidence (10 points)

    Report provides an excellent (correct and thorough) explanation of how the examiner analyzed the structure of the physical and logical media. Provides pictures, measurements, and descriptions of the physical media. Provides a logical analysis which includes partition types, file system types, partition names. Analysis included MBR or BPB or VBR, partitioning, root directory structure, and evidence of wiping / formatting (if any). Provides information about file systems contained within partitions (name, type, etc.).

    7. Files and Folders: Recovery and Analysis (20 points)

    Conducted and reported upon a thorough and procedurally correct examination of active and deleted files and folders in all partitions. Identifies, recovers, and presents important files which provide answers to case questions or otherwise support the examiner’s findings. Examination report includes discussion of findings related to the following:

    8. File Carving, Keyword Searches, Password Recovery, and Recovery of Hidden Text or Messages (10 points)

    Conducted and reported upon a thorough and procedurally correct examination of the media which included recovery of files and contents thereof through file carving, password recovery, locating and recovering hidden messages or hidden information. Conducted appropriate keyword searches and reported upon both positive and negative results for all of the above.

    9. Policies, Procedures, Ethics Compliance (10 points)

    Demonstrates excellence in compliance with ethical and procedural requirements for the conduct of forensics examinations. Report package includes correct and appropriate statements showing ethical use of software and hardware (licensing / authorized use / anti-virus protection). Provided 3 or more policy statements regarding compliance with standard practices, e.g. wiping media, evidence tagging, transfer of evidence, etc. Provided a glossary and bibliography. Provided a brief resume showing examiner’s experience and credentials.

    10. Professionalism (10 points)

    Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.No formatting, grammar, spelling, or punctuation errors. Appropriately uses footnotes or end notes (or other form of citations).

    Importance of emotional intelligence at work?

    Information:

    One of the most important constructs in leadership today is the concept and application of emotional intelligence (EI). Imagine that you are an internal consultant to an organization and the CEO has tasked you with preparing a presentation for the Board of Directors on what emotional intelligence is, and its influence on leadership and the people within the organization.

    This assignment will provide an opportunity for students to enhance their understanding of emotional intelligence by considering its importance in today’s workforce.

    • Assignment instructions:

    In a 2-page paper, suggest two to three (2-3) reasons why leaders need emotional intelligence to manage today’s workforce. Speculate on at least two (2) possible consequences should a leader not possess emotional intelligence.

    Please see attachment for information on emotional intelligence please feel free to use cited outside information.

    Probability

    The major shopping areas in the community of Springdale include Springdale Mall, West Mall, and the downtown area on Main Street. A telephone survey has been conducted to identify strengths and weaknesses of these areas and to find out how they fit into the shopping activities of local residents. The 150 respondents were also asked to provide information about themselves and their shopping habits. The data are provided in the file SHOPPING. The variables in the survey can be found in the file CODING.

    The contingency tables and relative frequency probabilities in this exercise are based on the Springdale Shopping Survey database. Information like that gained from the two parts of this exercise could provide helpful insights into the nature of the respondents, their perceptions, and their spending behaviors. In particular, part 2 focuses on how conditional probabilities related to spending behavior might vary, depending on the gender of the respondent.

    Note: Be sure to use five (5) decimal places for your probabilities in the report, as some of them will be quite small. Do not convert to percentages as we are interested in probabilities only here.

    1. Based on the relative frequencies for responses to each variable, determine the probability that a randomly selected respondent from:
      1. SPRSPEND [variable 4] spends at least $15 during a trip to Springdale Mall.
      2. DOWSPEND [variable 5] spends at least $15 during a trip to Downtown.
      3. WESSPEND [variable 6] spends at least $15 during a trip to West Mall.

    Comparing the preceding probabilities, rank the areas from strongest to weakest in terms of the amount of money a shopper spends during a typical shopping visit.

    1. Based on the relative frequencies for responses to each variable, determine the probability that a randomly selected respondent from:
      1. BSTQUALI [variable 11] feels that Springdale Mall has the highest-quality goods.
      2. BSTQUALI [variable 11] feels that Downtown has the highest-quality goods.
      3. BSTQUALI [variable 11] feels that West Mall has the highest-quality goods.

    Comparing the preceding probabilities, rank the areas from strongest to weakest in terms of the quality of goods offered.

    1. Set up a contingency table for the appropriate variables given, and then determine the following probabilities:
      1. SPRSPEND and RESPGEND [variables 4 and 26]: Given that the random respondent is a female, what is the probability that she spends at least $15 during a trip to Springdale Mall? Is a male more likely or less likely than a female to spend at least $15 during a visit to this area?
      2. DOWSPEND and RESPGEND [variables 5 and 26]: Given that the random respondent is a female, what is the probability that she spends at least $15 during a trip to Downtown? Is a male more likely or less likely than a female to spend at least $15 during a visit to this area?
      3. WESSPEND and RESPGEND [variables 6 and 26]: Given that the random respondent is a female, what is the probability that she spends at least $15 during a trip to West Mall? Is a male more likely or less likely than a female to spend at least $15 during a visit to this area?

    Based on the preceding probabilities, rank the shopping areas where males and females are most likely to least likely to spend $15 or more during a shopping visit.

    Paper Requirements
    Write a report that uses the Written Assignment Requirements under the heading Expectations for CSU-Global Written Assignments found in the CSU-Global Guide to Writing and APA. Items that should be included, at a minimum, are a title page, an introduction, a body which answers the questions posed in the problem, and a conclusion paragraph that addresses your findings and what you have determined from the data and your analysis. As with all written assignments, you should have in-text citations and a reference page. Please include any tables of calculations, calculated values, and graphs associated with this problem in the body of your assignment response.

    Note: You must submit your Excel file with your report. This will aid in grading with partial credit if errors are found in the report.

    Complete Social Theory Discussion (WALDEN)

    USE THE CASE STUDY OF JAKE

    Discussion: Using Research to Select a Therapeutic Modality

    Imagine that some of your colleagues mention using cognitive behavior therapy, dialectical behavioral therapy, acceptance and commitment therapy, and reality therapy. Your colleagues continue to say that based on their experiences, they really like these therapies and that they appear to work. Your instincts also tell you that perhaps they might be helpful for your client in your case study. However, from Week 1, you recall that experiences and instincts as sources of knowledge are quite limited because they are biased. Instead, it is important to utilize existing research and data to support your choices of interventions. Theory helps inform the evidence-based practice process that should guide social workers’ practice.

    In this Discussion, you examine the research related to a therapy based on cognitive or cognitive behavior theory to determine its effectiveness.

    To prepare:

    • Recall the client from the case study you have been using in this course. You will apply your research for this Discussion to that client.
    • Select one therapy from the following: cognitive behavior therapy, dialectical behavioral therapy, acceptance and commitment therapy, or reality therapy.
    • Conduct a search in the Walden Library for one peer-reviewed research study about the effectiveness of the therapy you selected.
      • Note: You must select a study that has not already been used by a colleague in the Discussion. Each student is required to identify a unique research study.
    • Remember when looking for studies to take into account your client’s age and developmental stage and presenting problem.

    By Day 3

    Post:

    • Provide the reference for the study you found using APA guidelines.
    • Briefly paraphrase, in 2 to 3 sentences, the methodological context (i.e., research method, how data was collected, and the instruments used) of the study and the findings.
    • Evaluate the findings in terms of its applicability or appropriateness for the client in your case study.
    • Determine whether you would use or not use the therapy you selected for the client in your selected case study (consider how culturally relevant it is, how aligned it is with social work ethics, etc.) and explain why.