1. Watch the video a. Episode 9: Munchausen by Proxy: Dying for Attention (13:16) https://www.youtube.com/watch?v=RGw3d6dzHuM
2. Search one of the cases mentioned in this video and answer the following questions:
a) Name 3 legal and/or ethical issues- refer to your course materials for this information.
b) Provide an explanation of how this case applies to the issues you chose
c) If you were the nurse caring for the patient and was involved in the case, what would you do? Find one journal article to support your action(s).
d) Complete your activity on this page
i.
ii.
XYZ Bank Software Test Plan
Student Name
Student ID
2
Date
Software Test Plan
Project Name: XYZ Bank Software Test Plan
Purpose of Project: To prepare an effective software test plan for testing the organization software components and functionalities.
Features To Be Tested/Not To Be Tested
The features to be tested in this project include;
i. Software application units
ii. Software system
iii. Software integration
iv. Software performance and stress
v. Software user acceptance
vi. Software automatic regression
vii. Software beta requirements
On the other hand, the following feature will not be tested
i. Software batch. This feature will not be tested since it has low risk based on the previous risk assessment conducted.
Testing Pass/Fail Criteria
Feature
Pass/Fail Criteria (Pass definition)
Software application units
All test cases completed
All codes covered
Software system
All test cases completed
All codes covered
Software integration
All test cases completed
All codes covered
Software performance and stress
All test cases completed
Software user acceptance level
All test cases completed
Software automatic regression
All test cases completed
Software beta requirements
All test cases completed
Testing Approach
Execution of this project applied the box approach. This is a hybrid method combing the two traditional approaches. White-box and black-box testing are two types of software testing methods. These two methodologies are applied in the description of tester's point of view when creating test cases. Grey-box testing is a hybrid approach to software testing methodology that can be used. The above "arbitrary distinction" among black- and white-box testing has faded somewhat as the concept of grey-box testing—which develops tests from specific design elements—has gained traction.
White-box testing verifies a program's internal structures or workings rather than the functionality that is visible to the end user. In white-box testing, test cases are created using an internal perspective of the system (the source code) and programming skills. The tester selects inputs in order to exercise code paths and determine appropriate outputs. It includes API testing, code coverage, fault injection among others.
On the other hand, black-box testing looks at the program as if it were a "black box," assessing functionality without knowing how it wo ...
Find out more about quality assurance training and specifically about Testing concepts and manual testing. Topics covered in this session are:
Overview of Testing Life Cycle
Testing Methodologies
Black Box Testing
White Box Testing
Gray Box Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
For more information, visit: https://www.mindsmapped.com/courses/quality-assurance/quality-assurance-training-learn-manual-and-automation-testing/
In this quality assurance training, you will learn Testing Concepts and Manual Testing. Topics covered in this session are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Integration Testing
• System Testing
• Regression Testing
• User Acceptance Testing (UAT)
For more information, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-beginners-and-intermediate-level/
In this session you will learn:
Overview of Testing Life Cycle
Testing Methodologies
Black Box Testing
White Box Testing
Gray Box Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
For more information: https://www.mindsmapped.com/courses/quality-assurance/qa-software-testing-training-for-beginners/
In this quality assurance training session, you will learn Testing Concepts and Manual Testing. Topics covered in this course are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Integration Testing
• System Testing
• Regression Testing
• User Acceptance Testing (UAT)
To know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-quality-assurance-qa-training-with-hands-on-exercises/
In this session you will learn:
Overview of Testing Life Cycle
Testing Methodologies
Black Box Testing
White Box Testing
Gray Box Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
For more information, click here:
https://www.mindsmapped.com/courses/quality-assurance/software-testing-tutorial/
In this session you will learn:
Testing Concepts and Manual Testing
Overview of Testing Life Cycle
Testing Methodologies
Dynamic Testing
Black Box Testing
White Box Testing
Gray Box Testing
Unit Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
Find out more about quality assurance training and specifically about Testing concepts and manual testing. Topics covered in this session are:
Overview of Testing Life Cycle
Testing Methodologies
Black Box Testing
White Box Testing
Gray Box Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
For more information, visit: https://www.mindsmapped.com/courses/quality-assurance/quality-assurance-training-learn-manual-and-automation-testing/
In this quality assurance training, you will learn Testing Concepts and Manual Testing. Topics covered in this session are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Integration Testing
• System Testing
• Regression Testing
• User Acceptance Testing (UAT)
For more information, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-beginners-and-intermediate-level/
In this session you will learn:
Overview of Testing Life Cycle
Testing Methodologies
Black Box Testing
White Box Testing
Gray Box Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
For more information: https://www.mindsmapped.com/courses/quality-assurance/qa-software-testing-training-for-beginners/
In this quality assurance training session, you will learn Testing Concepts and Manual Testing. Topics covered in this course are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Integration Testing
• System Testing
• Regression Testing
• User Acceptance Testing (UAT)
To know more, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-quality-assurance-qa-training-with-hands-on-exercises/
In this session you will learn:
Overview of Testing Life Cycle
Testing Methodologies
Black Box Testing
White Box Testing
Gray Box Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
For more information, click here:
https://www.mindsmapped.com/courses/quality-assurance/software-testing-tutorial/
In this session you will learn:
Testing Concepts and Manual Testing
Overview of Testing Life Cycle
Testing Methodologies
Dynamic Testing
Black Box Testing
White Box Testing
Gray Box Testing
Unit Testing
Integration Testing
System Testing
Regression Testing
User Acceptance Testing (UAT)
WHITE BOX & BLACK BOXTESTING IN DATABASESalman Memon
White box & black box are software testing methods.
Software testing is a process that should be done during the development process. In other words software testing is a verification and validation process.
Verification : is the process to make sure the product satisfies the conditions imposed at the start of the development phase. In other words, to make sure the product behaves the way we want it to.
http://phpexecutor.com
In this Quality Assurance Training session, you will learn about Testing Concepts and Manual Testing. Topic covered in this session are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Static Testing
• Dynamic Testing
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Levels of Testing
• Unit Testing
• Component Testing
• Integration Testing
• System/ Functional Testing
• Regression Testing
• UAT (User Acceptance Testing)
• Various Types of Testing
• Start And Stop Software Testing
• Class Assignment
For more information, about this quality assurance training, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-with-hands-on-project-on-e-commerce-application/
11 steps of testing process - By Harshil BarotHarshil Barot
11 Steps of The Software Testing Process.Software Testing Process is a Find out the Maximum Bugs and Errors From the Software or Product and Make the Software
Bugs or Error Free.(Bugs/Errors/Defects).
Now to answer, “What is Testing?” we can go by the famous definition of Myers, which says, “Testing is the process of executing a program with the intent of finding errors”
11Getting Started with PhoneGapWHAT’S IN THIS CHAPTERSantosConleyha
11
Getting Started with PhoneGap
WHAT’S IN THIS CHAPTER?
! History of PhoneGap
! Di! erences between HTML5 and PhoneGap
! Getting a development environment set up
! Implementing the Derby App
PhoneGap is an open source set of tools created by Nitobi
Solution
s (now part of Adobe)
that enables you to create mobile applications for multiple devices by utilizing the same code.
PhoneGap is a hybrid mobile application framework that allows the use of HTML, CSS,
and JavaScript to write applications that are based on the open standards of the web. These
applications also have access to the native functionality of the device. PhoneGap has been
downloaded more than 600,000 times, and more than 1,000 apps built with PhoneGap are
available in the respective app stores, which makes PhoneGap a viable solution for creating
cross-platform mobile apps.
HISTORY OF PHONEGAP
PhoneGap was started at the San Francisco iPhone Dev Camp in August 2008. iOS was shaping
up to become a popular mobile platform, but the learning curve for Objective-C was more work
than many developers wanted to take on. PhoneGap originally started as a headless browser
implementation for the iPhone. Because of the popularity of HTML/CSS/JavaScript, it was a
goal that this project use technologies with which many developers where already familiar.
Based on the growing popularity of the framework, in October 2008 Nitobi added support
for Android and BlackBerry. PhoneGap was awarded the People’s Choice award at the Web2.0
Expo Launch Pad in 2009, which was the start of developers recognizing PhoneGap as a
valuable mobile development tool. PhoneGap version 0.7.2 was released in April 2009, and
was the fi rst version for which the Android and iPhone APIs were equivalent.
c11.indd 309c11.indd 309 28/07/12 6:08 PM28/07/12 6:08 PM
310 " CHAPTER 11 GETTING STARTED WITH PHONEGAP
In September 2009 Apple approved the use of the PhoneGap platform to build apps for the iPhone
store. Apple required that all PhoneGap apps be built using at least version 0.8.0 of the PhoneGap
software. In July 2011, PhoneGap released version 1.0.0.
WHY USE PHONEGAP?
PhoneGap enables you to leverage your current HTML, CSS, and JavaScript skill sets to create a mobile
application. This can greatly speed up development time. When you develop for multiple platforms
using PhoneGap, you can reuse the majority of the code you have written for the mobile project, further
reducing development costs. It isn’t necessary to learn Java, C#, and Objective-C to create an applica-
tion with PhoneGap that can target iPhone, Android, BlackBerry, and Windows Phone 7.
If you fi nd native functionality missing from PhoneGap, you can extend the functionality of the
PhoneGap platform using native code. With the PhoneGap add-in structure, you can create an add-in
using the native language of the device and a JavaScript API that will call the native plug-in you
created. Cross-platfo ...
11Proposal Part One - Part 1 Influence of Internet on TourismSantosConleyha
11
Proposal Part One - Part 1: Influence of Internet on Tourism Industry
Research Proposal: Influence of Internet on Tourism Industry
Introduction
The tourism industry has been among the best-valued sectors within the nation to generate massive revenue for the government. Besides, the industry is considered among the earliest since it started several decades ago. For an extended period, the industry uses Integrated Marketing Communications to promote their various products and services to the entire world. The introduction of technology in the industry leads to improvements in the sectors. Most individuals without extensive information on the tourism industry can access the data in their comfort zones. It implies that IT and internet technology play a significant role in ensuring effective strategy due to its existence globally.
Most European countries have tried to promote and implement internet technology in ensuring satisfactory delivery of products and services (Kayumovich, 2020). Since it has a custom within the tourism and hotel industry to provide intangible products and services, including but not limited to services alongside comfort, the internet has been an effective method of delivering its messages to the targeted customers. Also, through internet technology, the industry has achieved more customers in the global market, including the European market. The promotion of branding within the European tourism industry has been effective due to the introduction and implementation of internet technology. Thus, the internet is believed to significantly influence the tourism industry in various sectors, including but limited to infrastructure, travel, alongside the marketing sector. Before introducing the internet alongside the IT, travelling of customers was dangerous and unpleasant since travellers had constraint understanding of locations they were visiting.
As a result, the existing vacationers of time had limited knowledge of the cultures and terrain alongside the climate change and patterns necessary to stimulate the travelling issues. Therefore, tourism sectors, including but not limited to tour companies, travel agencies and other like hotels, had developed strategies necessary to promote booking and reservation processes (David-Negre et al. 2018). However, several decades ago, popular sites were visited by tourists. It implies that the tourism sectors within the local or remote area faced challenges of securing sufficient clients as people were could not define the destination. Also, shortage of information on a particular region leads to reduced travelling by visitors. The research involved the utilization of relevant literature review on the subject matter to provide factual information. Therefore, the report offers adequate information on the influence of the internet on the tourism industry. This research would give me the stage to show my finding and view and also propose how the internet can be leveraged to an extend i ...
More Related Content
Similar to 1. Watch the video a. Episode 9 Munchausen by Proxy Dying fo
WHITE BOX & BLACK BOXTESTING IN DATABASESalman Memon
White box & black box are software testing methods.
Software testing is a process that should be done during the development process. In other words software testing is a verification and validation process.
Verification : is the process to make sure the product satisfies the conditions imposed at the start of the development phase. In other words, to make sure the product behaves the way we want it to.
http://phpexecutor.com
In this Quality Assurance Training session, you will learn about Testing Concepts and Manual Testing. Topic covered in this session are:
• Overview of Testing Life Cycle
• Testing Methodologies
• Static Testing
• Dynamic Testing
• Black Box Testing
• White Box Testing
• Gray Box Testing
• Levels of Testing
• Unit Testing
• Component Testing
• Integration Testing
• System/ Functional Testing
• Regression Testing
• UAT (User Acceptance Testing)
• Various Types of Testing
• Start And Stop Software Testing
• Class Assignment
For more information, about this quality assurance training, visit this link: https://www.mindsmapped.com/courses/quality-assurance/software-testing-training-with-hands-on-project-on-e-commerce-application/
11 steps of testing process - By Harshil BarotHarshil Barot
11 Steps of The Software Testing Process.Software Testing Process is a Find out the Maximum Bugs and Errors From the Software or Product and Make the Software
Bugs or Error Free.(Bugs/Errors/Defects).
Now to answer, “What is Testing?” we can go by the famous definition of Myers, which says, “Testing is the process of executing a program with the intent of finding errors”
11Getting Started with PhoneGapWHAT’S IN THIS CHAPTERSantosConleyha
11
Getting Started with PhoneGap
WHAT’S IN THIS CHAPTER?
! History of PhoneGap
! Di! erences between HTML5 and PhoneGap
! Getting a development environment set up
! Implementing the Derby App
PhoneGap is an open source set of tools created by Nitobi
Solution
s (now part of Adobe)
that enables you to create mobile applications for multiple devices by utilizing the same code.
PhoneGap is a hybrid mobile application framework that allows the use of HTML, CSS,
and JavaScript to write applications that are based on the open standards of the web. These
applications also have access to the native functionality of the device. PhoneGap has been
downloaded more than 600,000 times, and more than 1,000 apps built with PhoneGap are
available in the respective app stores, which makes PhoneGap a viable solution for creating
cross-platform mobile apps.
HISTORY OF PHONEGAP
PhoneGap was started at the San Francisco iPhone Dev Camp in August 2008. iOS was shaping
up to become a popular mobile platform, but the learning curve for Objective-C was more work
than many developers wanted to take on. PhoneGap originally started as a headless browser
implementation for the iPhone. Because of the popularity of HTML/CSS/JavaScript, it was a
goal that this project use technologies with which many developers where already familiar.
Based on the growing popularity of the framework, in October 2008 Nitobi added support
for Android and BlackBerry. PhoneGap was awarded the People’s Choice award at the Web2.0
Expo Launch Pad in 2009, which was the start of developers recognizing PhoneGap as a
valuable mobile development tool. PhoneGap version 0.7.2 was released in April 2009, and
was the fi rst version for which the Android and iPhone APIs were equivalent.
c11.indd 309c11.indd 309 28/07/12 6:08 PM28/07/12 6:08 PM
310 " CHAPTER 11 GETTING STARTED WITH PHONEGAP
In September 2009 Apple approved the use of the PhoneGap platform to build apps for the iPhone
store. Apple required that all PhoneGap apps be built using at least version 0.8.0 of the PhoneGap
software. In July 2011, PhoneGap released version 1.0.0.
WHY USE PHONEGAP?
PhoneGap enables you to leverage your current HTML, CSS, and JavaScript skill sets to create a mobile
application. This can greatly speed up development time. When you develop for multiple platforms
using PhoneGap, you can reuse the majority of the code you have written for the mobile project, further
reducing development costs. It isn’t necessary to learn Java, C#, and Objective-C to create an applica-
tion with PhoneGap that can target iPhone, Android, BlackBerry, and Windows Phone 7.
If you fi nd native functionality missing from PhoneGap, you can extend the functionality of the
PhoneGap platform using native code. With the PhoneGap add-in structure, you can create an add-in
using the native language of the device and a JavaScript API that will call the native plug-in you
created. Cross-platfo ...
11Proposal Part One - Part 1 Influence of Internet on TourismSantosConleyha
11
Proposal Part One - Part 1: Influence of Internet on Tourism Industry
Research Proposal: Influence of Internet on Tourism Industry
Introduction
The tourism industry has been among the best-valued sectors within the nation to generate massive revenue for the government. Besides, the industry is considered among the earliest since it started several decades ago. For an extended period, the industry uses Integrated Marketing Communications to promote their various products and services to the entire world. The introduction of technology in the industry leads to improvements in the sectors. Most individuals without extensive information on the tourism industry can access the data in their comfort zones. It implies that IT and internet technology play a significant role in ensuring effective strategy due to its existence globally.
Most European countries have tried to promote and implement internet technology in ensuring satisfactory delivery of products and services (Kayumovich, 2020). Since it has a custom within the tourism and hotel industry to provide intangible products and services, including but not limited to services alongside comfort, the internet has been an effective method of delivering its messages to the targeted customers. Also, through internet technology, the industry has achieved more customers in the global market, including the European market. The promotion of branding within the European tourism industry has been effective due to the introduction and implementation of internet technology. Thus, the internet is believed to significantly influence the tourism industry in various sectors, including but limited to infrastructure, travel, alongside the marketing sector. Before introducing the internet alongside the IT, travelling of customers was dangerous and unpleasant since travellers had constraint understanding of locations they were visiting.
As a result, the existing vacationers of time had limited knowledge of the cultures and terrain alongside the climate change and patterns necessary to stimulate the travelling issues. Therefore, tourism sectors, including but not limited to tour companies, travel agencies and other like hotels, had developed strategies necessary to promote booking and reservation processes (David-Negre et al. 2018). However, several decades ago, popular sites were visited by tourists. It implies that the tourism sectors within the local or remote area faced challenges of securing sufficient clients as people were could not define the destination. Also, shortage of information on a particular region leads to reduced travelling by visitors. The research involved the utilization of relevant literature review on the subject matter to provide factual information. Therefore, the report offers adequate information on the influence of the internet on the tourism industry. This research would give me the stage to show my finding and view and also propose how the internet can be leveraged to an extend i ...
11Social Inclusion of Deaf with Hearing CongreSantosConleyha
11
Social Inclusion of Deaf with Hearing Congregants within a Ministerial Setting Comment by Stumme, Clifford James (College Applied Studies & Acad Succ): As you review this sample student paper, please keep in mind that there are some flaws in this paper (as with any piece of writing). However, it is one of the best INDS 400 research proposals received to date, so it is an excellent reference point.
Sample Student Comment by Stumme, Clifford James (College Applied Studies & Acad Succ) [2]: Also, remember that what you are looking at is an example of the overall research proposal, not just the literature review. If you are working on your literature review, refer to the portion marked “literature review” and remember that within that literature review portion, there is a unique introduction, body paragraphs, and conclusion. The first paragraph is the introduction for the proposal as a whole, which is different from the kind of introduction you should write for the literature review itself. Also remember that while this research proposal has an abstract, you do not need one for the literature review.
Liberty University
INDS 400: Knowledge Synthesis for Professional and Personal Development
January 3, 2020
Abstract Comment by Stumme, Clifford James (College Applied Studies & Acad Succ) [2]: Notice how the abstract gives a brief overview of the elements of the research proposal without arguing or getting ahead of itself by predicting results.
Culture can influence how people interact and the level of inclusion of different cultures in a particular setting.While numerous studies have been conducted examining deaf studies and deaf culture, there is a curious lack of research that has specifically considered the level of inclusion of deaf people in evangelical hearing churches. This research proposal includes an interdisciplinary including a literature review that examines a handful of studies on interactions among deaf and hearing populations to consider challenges of hearing and deaf integration. Examining these diverse perspectives, including Catholic ministry, disability ministry and deaf culture, provides a fresh interdisciplinary perspective to approach the challenges of deaf inclusion in ministerial settings. It was found through this literature review that a gap in scholarly research exists in this area. As further research would be necessary to address this gap, the goal of this research proposal is to conduct a qualitative study for further research by petitioning deaf perspective through online interviews utilizing the social media platform of Facebook. Although a low budget would be necessary, the implications of this research would provide a platform to open community conversation to address challenges and provide ideas on integration of deaf and hearing congregants in evangelical hearing churches. Examining deaf perspectives may provide additional information for fellowship, growth and exposure to the Gospel for deaf congr ...
11Mental Health Among College StudentsTomia WillinSantosConleyha
11
Mental Health Among College Students
Tomia Willingham
Sophia Learning
Eng 215
March 14, 2021
Introduction
Going to college can be demanding for many people. In addition to managing academic insistence, many students have to cope with their families' complex separation tasks. At the same time, some of them continue to deal with a lot of many family duties. Mental health experts and advocates contend that it is an epidemic that colleges need to investigate further. Depression, anxiety disorders are some of the significant mental health issues that affect college students. The effects of suicidal ideas on university students' academic achievement have not been explored, yet mental health conditions are associated with academic achievement (De Luca et al., 2016). A novel coronavirus has worsened the situation of mental health. Even before the onset of this virus, there was concern from mental health policymakers in America because of the rising mental health challenges. They claimed a need for additional aid for struggling university students and the capability for these institutions to provide it. Regrettably, many university students with mental health conditions do not seek and receive the necessary treatment. The primary reasons for not pursuing help include thinking that the challenge will get better with time, stigma from their peers and no time to seek the treatment because of a busy schedule (Corrigan et al. 2016). Without this treatment, college students experiencing medical conditions most of the time get lower grades, drop out of college, immerse themselves into substance abuse, or become unemployed. Because these mental health conditions are invisible, they can only be seen through academic performance or social behavior change. Should universities strike a balance between mental health conditions and academics? This review will conclude that the mental health condition of university students and scholars should be balanced. Comment by Dr. Helen Doss: You need to answer this question and present the answer as the thesis at the end of this paragraph. Comment by Dr. Helen Doss: This is not a review essay—it is an argumentative or persuasive essay. Comment by Dr. Helen Doss: What does this mean—should be balanced? By what? For what? And, by whom? Comment by Dr. Helen Doss: This paragraph is too long. See: https://www.umgc.edu/current-students/learning-resources/writing-center/writing-resources/parts-of-an-essay/paragraph-structure.cfm
Effects of not Balancing Mental Health and Academics
There are consequences of not balancing mental health and academics in higher learning institutions, mainly if they do not receive any treatment. For example, if depression goes untreated, it raises the chances of risky behavior like substance abuse. The condition affects how students sleep, eat, and it also affects how students think. Also, students cannot concentrate in class, and they cannot make rational decisions. By lack of concent ...
11From Introductions to ConclusionsDrafting an EssayIn this chapSantosConleyha
11From Introductions to ConclusionsDrafting an Essay
In this chapter, we describe strategies for crafting introductions that set up your argument. We then describe the characteristics of well-formulated paragraphs that will help you build your argument. Finally, we provide you with some strategies for writing conclusions that reinforce what is new about your argument, what is at stake, and what readers should do with the knowledge you convey
DRAFTING INTRODUCTIONS
The introduction is where you set up your argument. It’s where you identify a widely held assumption, challenge that assumption, and state your thesis. Writers use a number of strategies to set up their arguments. In this section we look at five of them:
· Moving from a general topic to a specific thesis (inverted-triangle introduction)
· Introducing the topic with a story (narrative introduction)
· Beginning with a question (interrogative introduction)
· Capturing readers’ attention with something unexpected (paradoxical introduction)
· Identifying a gap in knowledge (minding-the-gap introduction)
Remember that an introduction need not be limited to a single paragraph. It may take several paragraphs to effectively set up your argument.
Keep in mind that you have to make these strategies your own. That is, we can suggest models, but you must make them work for your own argument. You must imagine your readers and what will engage them. What tone do you want to take? Playful? Serious? Formal? Urgent? The attitude you want to convey will depend on your purpose, your argument, and the needs of your audience.◼ The Inverted-Triangle Introduction
An inverted-triangle introduction, like an upside-down triangle, is broad at the top and pointed at the base. It begins with a general statement of the topic and then narrows its focus, ending with the point of the paragraph (and the triangle), the writer’s thesis. We can see this strategy at work in the following introduction from a student’s essay. The student writer (1) begins with a broad description of the problem she will address, (2) then focuses on a set of widely held but troublesome assumptions, and (3) finally, presents her thesis in response to what she sees as a pervasive problem.
The paragraph reads, “In today’s world, many believe that education’s sole purpose is to communicate information for students to store and draw on as necessary. By storing this information, students hope to perform well on tests. Good test scores assure good grades. Good grades eventually lead to acceptances into good colleges, which ultimately guarantee good jobs. Many teachers and students, convinced that education exists as a tool to secure good jobs, rely on the banking system. In her essay “Teaching to Transgress,” bell hooks defines the banking system as an “approach to learning that is rooted in the notion that all students need to do is consume information fed to them by a professor and be able to memorize and store it” (185). Through the banking s ...
11Groupthink John SmithCampbellsville UnivSantosConleyha
1
1
Groupthink
John Smith
Campbellsville University
BA611 – Organizational Theory
Dr. Jane Corbett
January 17, 2021
Definition
Groupthink is a pattern of thought characterized by self-deception, forced manufacture of consent, and conformity to group values and ethics.
Summary
Valine (2018) discussed how powerful an effect groupthink can have on community and peers. It followed two case studies about JPMorgan Chase and Wells Fargo, which explains how many sources and credentials the author has used. The focus of the article is that circumstances have occurred inside these companies which were able to affect the entire economy as well. Groupthink is usually followed by irrational thinking and decision making which completely ignores alternatives and constantly goes for the primary decision. The large difference between group and groupthink is that the group consists of members of various backgrounds and experiences, while groupthink usually has members of similar ones. Further, there is no way for groupthink to recover from bad decisions mainly because all members have a similar understanding and point of the view towards a certain topic. The illusion of invulnerability is the main characteristic related to groupthink, where teammates ignore the danger, take extreme risks, and act highly optimistic.
Discussion
Groupthink is characterized by incorrect decisions that groups make mainly due to mental efficiency, reality testing, and moral judgment. Many conditions can cause groupthink to occur, and the most frequent ones are collective rationalization, belief in inherent morality, stereotyped views of out-groups, direct pressure on dissenters, and self-censorship.
The collective rationalization explains how different warnings are against the group thinking, so and where those opinions can create a misunderstanding. Belief in inherent morality points out that members ignore the ethical and moral consequences of decisions because they believe the correctness of their cause. The stereotyped views of out-groups are the characters to create a negative feeling about opposition outside the group environment. The direct pressure on dissenters is where team leaders discuss all members that have different opinions and philosophies than the group’s commitments and agreement. Lastly, the self-censorship is where teammates keep their thoughts and opinions without expressing them to others.
The case study about the London Whale explains how JPMC, one of the largest banks in the world, has lost 6.5 billion dollars due to bad and poor investment decisions. Everything occurred in April and May of 2012, where larger trading loss happened in Chase’s Investment Office throughout the London branch. The main transaction that affected Morgan Chase was credit default swaps (CDS) and it was shown that famous trader Bruno Iksil has gathered significant CDS position in the market at that time. Following this case, the internal control has risen o ...
11Sun Coast Remediation Research Objectives, Research QueSantosConleyha
11
Sun Coast Remediation: Research Objectives, Research Questions, and Hypotheses
4
Sun Coast Remediation
Unique R. Simpkins
Southern Columbia University
Course Name Here
Instructor Name
11-2-2021
Research Objectives, Research Questions, and Hypotheses
Based on the information amassed by the former health and safety director, the organization needs to pursue safety-related programs or initiatives to ensure employees' health. It is an appropriate approach to help the firm and the employees achieve goals and inhibit costs arising from injuries and illnesses while on duty. The completion of this task will provide managers with practicable insights on the approach to enhance safety and protect the firm from losses. This task accounts for the objectives, questions, and hypotheses of the research based on the provided statement of the problem.
RO1: Explore the correlation between the size of the Particulate Matter (PM) and the health of the employee.
RQ1: Is there a correlation between the size of the Particulate Matter (PM) and the health of the employee?
Ho1: There is no statistically significant evidence connecting the size of the Particulate Matter (PM) and the health of the employee.
Ha1: There is statistically significant evidence connecting the size of the Particulate Matter (PM) and the health of the employee.
RO2: Establish whether safety training is feasible in decreasing the lost-time hours.
RQ2: Is safety training feasible in decreasing the lost-time hours?
Ho2: There is no statistically significant evidence linking safety training and reduction in lost-time hours.
Ha2: There is statistically significant evidence linking safety training and reduction in lost-time hours.
RO3: Establish the effectiveness of predicting the decibels (dB) levels before the employee placement on determining the on-site risk.
RQ3: Is predicting the decibels (dB) levels before the employee placement on determining the on site risk effective?
Ho3: There is no statistically significant relationship between predicting the decibels (dB) levels before the employee placement and effective determination of the on-site risk.
Ha3: There is a statistically significant relationship between predicting the decibels (dB) levels before the employee placement and effective determination of the on-site risk.
RO4: Establish whether the revised training program is more practicable than the initially adopted initiative.
RQ4: Is the revised training program is more practicable than the previously adopted initiative?
Ho4: There is no statistically significant proof that the new training program is more feasible than the old program.
Ha4: There is statistically significant proof that the new training program is more feasible than the old program.
RO5: Determine the blood lead levels variation before and after exposure at the end of the remediation service.
RQ5: Do the blood lead levels before and after exposure at the end of the remediation service va ...
11Me Talk Pretty One Day # By David Sedaris From his bSantosConleyha
11
Me Talk Pretty One Day # By David Sedaris
From his book Me Talk Pretty One Day
At the age of forty-one, I am returning to school and have to think of myself as
what my French textbook calls Ba true debutant.D After paying my tuition, I was issued
a student ID, which allows me a discounted entry fee at movie theaters, puppet shows,
and Festyland, a far-flung amusement park that advertises with billboards picturing a
cartoon stegosaurus sitting in a canoe and eating what appears to be a ham sandwich.
IFve moved to Paris with hopes of learning the language. My school is an easy
ten-minute walk from my apartment, and on the first day of class I arrived early,
watching as the returning students greeted one another in the school lobby. Vacations
were recounted, and questions were raised concerning mutual friends with names like
Kang and Vlatnya. Regardless of their nationalities, everyone spoke what sounded to
me like excellent French. Some accents were better than others, but the students
exhibited an ease and confidence that I found intimidating. As an added discomfort,
they were all young, attractive, and well-dressed, causing me to feel not unlike Pa Kettle
trapped backstage after a fashion show.
The first day of class was nerve-racking because I knew IFd be expected to
perform. ThatFs the way they do it here # itFs everybody into the language pool, sink or
swim. The teacher marched in, deeply tanned from a recent vacation, and proceeded to
rattle off a series of administrative announcements. IFve spent quite a few summers in
Normandy, and I took a monthlong French class before leaving New York. IFm not
completely in the dark, yet I understood only half of what this woman was saying.
BIf you have not meimslsxp or lgpdmurct by this time, then you should not be in
this room. Has everyone apzkiubjxow? Everyone? Good, we shall begin.D She spread
out her lesson plan and sighed, saying, BAll right, then, who knows the alphabet?D
It was startling because (a) I hadnFt been asked that question in a while and (b) I
realized, while laughing, that I myself did not know the alphabet. TheyFre the same
letters, but in France theyFre pronounced differently. I know the shape of the alphabet
but had no idea what it actually sounded like.
BAhh.D The teacher went to the board and sketched the letter a. BDo we have
anyone in the room whose first name commences with an ahh?D
12
Two Polish Annas raised their hands, and the teachers instructed them to present
themselves by stating their names, nationalities, occupations, and a brief list of things
they liked and disliked in this world. The first Anna hailed from an industrial town
outside of Warsaw and had front teeth the size of tombstones. She worked as a
seamstress, enjoyed quiet times with friends, and hated the mosquito.
BOh, really,D the teacher said. BHow very interesting. I thought that everyone
loved the mosquito, but here, in front of all the world, you claim to ...
11Program analysis using different perspectivesSantosConleyha
11
Program analysis using different perspectives
Student's Name
Institution
Course
Professor
Date
TABLE OF CONTENTS
Introduction……………………………………………………………………………………
Program Description/ Analysis of a Classical Liberal perspective…………………………
Program Description/ Analysis of a Radical perspective……………………………………
Program Description/ Analysis of a Conservative perspective……………………………..
Program Description/ Analysis of a Mordern Liberal perspective...………………………
Comparisons of four perspectives……………………………………………………………
Assessment and modifications of the perspectives………………………………………….
Conclusion……………………………………………………………………………………..
Introduction
Program analysis using different perspectives
In a political economy, policies and programs are essential tools that assist in understanding the ongoing struggle for equality and social justice. Although both have an underlying difference, they serve an almost similar purpose. Essentially, understanding the goal of any program or policy can be achieved by analyzing the contending perspectives (Harvey, 2020). This involves the intentional bringing of different perspectives in contrast. They help examine core economic problems or concepts from an orthodox perspective, and others criticize it from a heterodox perspective. The perspectives are essential since both the heterodox and orthodox positions can be examined and reach a consensus.
In the United States, there has been a rise in spending on prescription drugs, which has led to the introduction of a Build Better Program. One proposal is driving down the cost of prescription drugs by allowing Medicare to negotiate with drugmakers over price; starting in 2025-ten drugs (plus insulin) would be on the table the first year, growing to 20 by 2028 (The White House, 2021). Although members of Congress have accepted the proposal, there is a need to analyze it using the different contending perspectives. This paper explores the proposal using the Classical Liberal, The radical, the Conservative Perspective, and the Modern Liberal Perspective. Individuals have the right to pursue their happiness, and proponents of the different political economy perspectives should work hand-in-hand to promote human development within society.
Analysis by Perspective
The Classical Liberal
The political philosophy and ideology belonging to liberalism emphasize securing citizens' freedom by limiting government power. Today, the proponents hold various thoughts and Perspectives, one being Neo-Austrian economics (Clark, 2016). Essentially, the program's main aim is to reduce the overall cost of prescription drugs. From the Perspective of Neo-Austrians, humans are self-interested. They can act autonomously by utilizing their capacity to discover an efficient means of satisfying their desires and basic needs (Harvey, 2020). Also, the government is created by the people to protect their natural rights. At the same time, justice requires safeguarding the people's rights established by the c ...
11Factors that Affect the Teaching and Learning ProcessSantosConleyha
11
Factors that Affect the Teaching and Learning Process
Lua Shanks
Dr. Thompson
Valley State University
10-6-2021
Factors that Affect the Teaching and Learning Process
Contextual Factors
The efficacious teaching and learning processes are important in generating the desired academic outcomes for students. Such processes entail the transformation and transfer of knowledge from the educators to students. It requires a combination of different elements within the procedure, in which an instructor determines and establishes the learning goals and objectives, and designs teaching resources. Thereafter, teachers implement the learning strategy that they will utilize to impart intellectual content into students. However, learning is a cardinal factor that an educator musty take into account while overseeing the process of knowledge acquisition and retention. Many factors play an important role in shaping the process of teaching and learning. Contextual factors, for instance, are associated with a particular context and characteristic that is distinct to a specific group, community, society, and individual. Such factors may take the form of a child’s educational, community, as well as classroom settings.
Community, District, and School Factors
Armstrong School District is a major public learning institution that occupies a geographical area of approximately 437 square miles. Located in Pennsylvania, it forms one of the 500 public school districts in the state, and hosts teachers and students from diverse racial, ethnic, and ethnic backgrounds. As a consequence, the institution partners with families, community leaders, and teachers to improve students’’ capacity to acquire knowledge ahead of their graduation. The community refers to the urban or rural environment in which both the teachers and learners operate. These may include the teacher and students’ ethnic, racial political or social affiliations that affect learning or knowledge acquisition. Additionally, parents and community members play an integral role in ensuring the quality of education in schools. They for, example, collaborate with teachers and school administrators to develop the most effective ways of improving their students’ learning outcomes. Indeed, community involvement in schooling issues is potentially a rich area for innovation that has immense benefits that far exceeds its limitations. Considering that governments are constrained in offering quality education due to contextual issues such as remoteness, bureaucracy, corruption, and inefficient management, community factors are pivotal in bridging the gap between government initiatives and community needs. This helps to adjust the child’s familial obligations to family interests, thereby shifting towards ways of mobilizing a sense of community by strengthening trust and relationships between community members, parents, governments, as well as teachers and school leaders. Other important community factors that af ...
11
Criminal Justice: Racial discrimination
Student’s Name:
Institutional Affiliation:
Instructor’s Name:
Course Code:
Due Date:
Racial discrimination
Abstract
When there is justice in society, every person feels satisfied with the way legal actions are carried out in the community. Unfortunately, there are several instances of racial discrimination in the United States. Most of the racial discrimination in the United States ate directed towards black people. Although everyone is required to have equal treatment in the United States, achieving zero discrimination has always been difficult.
Understanding racial discrimination in the USA is vital as it makes it easy for one to identify ways to eliminate the criminal injustices resulting from racial discrimination. This will be essential since it will help to eliminate racial discrimination in the criminal justice system.
Introduction
When there is justice in society, every person feels satisfied with the way legal actions are carried out in society. The criminal justice community is when people are not discriminated against based on their skin color. Laws applicable are carried out uniformly such that every person is treated equally. When the laws are applied equally to every individual, it increases the trust in the criminal justice system. However, when there are biases in applying the laws, the criminal justice system becomes compromised. According to Kovera (2019), there are many disparities in the criminal justice system as black people are discriminated against by police officers based on their race. As a result, black people suffer more as compared to white people when they violate similar laws.
There is a lot of disparity in the criminal justice system of the United States. Many people suffer as a result of racial discrimination in the United States. People are discriminated against a lot in the administration of the policies. According to Donnel (2017), there is racial inequality in how criminal justice is carried out in policymaking. The criminal justice system discriminates against people based on their race. For example, police officers harass black people for minor mistakes which white people are left to walk freely even after making similar mistakes. Black people suffer because of the color of their skin.
Hypothesis/Problem Statement/Purpose Statement
Racial discrimination affects the outcomes of the criminal justice system adversely. How does racial discrimination affect the judicial criminal justice system? The study aims to identify ways in which criminal justice racial discrimination is practiced in the United States. It will also provide insights on the racial discrimination cases, which are helpful in the development of policies that can be helpful in the elimination of racial discrimination in society hence promoting equality among the citizens.
Literature Review and Definitions included in the research
According to Hinton, Henderson, and Reed (2018), there is mu ...
11Communication Plan for Manufacturing PlantStudSantosConleyha
11
Communication Plan for Manufacturing Plant
Student’s Name
Institutional Affiliation
Instructor
Course
Date
Communication Plan of a Manufacturing Plant
Background
In manufacturing companies, organization employees are at the centre of an organization. Most of them are at the front lines with the ability to change strategy into results. At the culmination of the day, the plant employees have the responsibility of ensuring that the operations are conducted smoothly, a product reaches consumers timely, and quality products are manufacture with the appropriate specifications. However, despite the primary role they play, manufacturing plants are disjointed (Adejimola, 2008). That disengagement is embodied with a hefty price which is paying a negative role in the performance of manufacturing plants just as they are being challenged to increase their efficiency and effectiveness to the company compared to previous years. To realize rapid growth around the globe, the manufacturing industry is attempting to standardize operations and continuously leverage operations. Such kind of effort needs a company to possess highly invested employees (Obiekwe, O& Eke, 2019). For this reason, natural communication naturally is primary on the path to more highly engaged and motivated employees. However, it can sometimes be challenging to plant employees due to natural challenges that accompany workplace. Some may not frequently be on Smartphone’s or emails, or they may be having various shifts to manage, and the environment may be less conducive, which makes it challenging for them to have one-on-one conversations.
Policies for Oral, Written, and Non-Verbal Communications
Interpersonal communication in a manufacturing plant is the way employees or people communication with others. It may involve a group of p-people, another person or the members of the public. In some instances, it may encompass non-verbal, written or non-verbal communication. In the manufacturing industry, when an individual is communicating with others, they need to consider the person they are talking to, the type of information they want to deliver and the most appropriate and relevant form of communication change. In some instances, such issues may be determined by the information an individual wants to communication (Obiekwe, O& Eke, 2019). At all times, it is required that the staff members remain polite, respectful to both the clients and one another. At no time should they sear, raise their voice, speak in a way belittling another.
Cultural awareness is also another essential element when communicating in a cultural plant. All individuals working in the plant need to recognize that individuals emerge from varying backgrounds and cultures, and they also accompany various attitudes, different values and beliefs (Obiekwe, O& Eke, 2019). All staffs in the plant need to exercise non-judgmental communication remain respectful and are tolerant of the differences prevalence ...
11CapitalKarl MarxPART I. COMMODITIES AND MONEYCHAPTER I. SantosConleyha
11
Capital
Karl Marx
PART I. COMMODITIES AND MONEY
CHAPTER I. COMMODITIES
Section 1. The two factors of a commodity: use-value and value (the substance of value and the magnitude of value)
The wealth of those societies in which the capitalist mode of production prevails, presents itself as “an immense accumulation of commodities,”1 its unit being a single commodity. Our investigation must therefore begin with the analysis of a commodity.
A commodity is, in the first place, an object outside us, a thing that by its properties satisfies human wants of some sort or another. The nature of such wants, whether, for instance, they spring from the stomach or from fancy, makes no difference.2 Neither are we here concerned to know how the object satisfies these wants, whether directly as means of subsistence, or indirectly as means of production.
Every useful thing, as iron, paper, &c., may be looked at from the two points of view of quality and quantity. It is an assemblage of many properties, and may therefore be of use in various ways. To discover the various uses of things is the work of history.3 So also is the establishment of socially-recognised standards of measure for the quantities of these useful objects. The diversity of these measures has its origin partly in the diverse nature of the objects to be measured, partly in convention.
The utility of a thing makes it a use-value.4 But this utility is not a thing of air. Being limited by the physical properties of the commodity, it has no existence apart from that commodity. A commodity, such as iron, corn, or a diamond, is therefore, so far as it is a material thing, a use-value, something useful. This property of a commodity is independent of the amount of labour required to appropriate its useful qualities. When treating of use-value, we always assume to be dealing with definite quantities, such as dozens of watches, yards of linen, or tons of iron. The use-values of commodities furnish the material for a special study, that of the commercial knowledge of commodities.5 Use-values become a reality only by use or consumption: they also constitute the substance of all wealth, whatever may be the social form of that wealth. In the form of society we are about to consider, they are, in addition, the material depositories of exchange-value.
Exchange-value, at first sight, presents itself as a quantitative relation, as the proportion in which values in use of one sort are exchanged for those of another sort,6 a relation constantly changing with time and place. Hence exchange-value appears to be something accidental and purely relative, and consequently an intrinsic value, i.e., an exchange-value that is inseparably connected with, inherent in commodities, seems a contradiction in terms.7 Let us consider the matter a little more closely.
A given commodity, e.g., a quarter of wheat is exchanged for x blacking, y silk, or z gold, &c.—in short, for other commodities in the most different proportions. Ins ...
1
1
Criminal Justice System
Shambri Chillis
June 11, 2022
Criminal justice system
The criminal justice system is essential to identify and prevent crimes in the community. Various functions of the criminale system now adhere to the development of technology. Modern technology helps the criminal justice system in different ways. It has made the job easier and has assisted in the prevention of crimes.
Role of criminal justice practitioners in the technology development
The Ccriminal justice practitioners are responsible for identifying and analyzing different crimes in the community. They are responsible for developing and implementing the technology in the criminal justice system because they can use it for different purposes. They can introduce the new trends in the criminal justice system like the officers can collect and gather the data through the technology. Human error can be reduced through it. The dataset can be maintained, and it is also essential for criminal justice practitioners to develop the technology to locate the criminals and track their local places through GPS. The technology cannot be developed untill the criminal officers implement it in the routine. The criminal system now has to use robots and cameras that help them get information about the criminals. The practitioners can also implement the technology by guiding the juniors to use it. The training is needed to make them understand the use of advanced technologies and to ensure that they use them in the right direction. The high-performance computer and internet systems are also essential for developing the technology, and it has been seen that the future will be bright regarding implementing technology (John S. Hollywood, 2018).
Controversial issues criminal justice policymakers face when considering an expansion in the use of DNA in criminal justice
Tthere are various controversial issues that criminal justice policymakers must consider while using DNA in the criminal justice system. The first thing that is criticized during the use of DNA is the fundamental human error, and iIt has been observed that there can be errors in the investigation, and people have to suffer. The issue in technology is also referred to as the error in using DNA because it might be possible that the results do not come correct at the first attempt. It involves several people who are not linked to the crimes but have to go for the fingerprinting tests by courts. However, DNA technology in criminal justice is highly advanced and has multiple benefits compared to disadvantages, but it has always faced significant controversy in the criminal justice system. The criminal justice system has to make sure that if DNA technology is being used, it must be error-free. The controversy has two opinions. There are two schools of thought regarding the use of DNA. One of the classes of experts thinks that DNA can be used to catch the different criminals. It is helpful in the family c ...
11American Government and Politics in a Racially DividSantosConleyha
1
1American Government
and Politics in a Racially
Divided World
chap ter
In 2016, Gov. Jack Markell signed a long-awaited resolution officially apologizing for the state’s role
in slavery. The apology for slavery illustrates the long and sometimes painful history of the United
States’ struggle with race, from the time of Thomas Jefferson, a slave owner, to President Barack
Obama, the first Black president of the United States.
01-McClain-Chap01.indd 1 11/24/16 8:34 PM
08/20/2017 - RS0000000000000000000000562545 (Anthony Ratcliff) - American
Government in Black and White
2 CHAPTER 1: AmericAn Government And Politics in A rAciAlly divided World
intro
D
ecember 6, 2015, marked the 150th anniversary of the abolish-
ment of slavery, when the U.S. Congress ratified the Thirteenth
Amendment to the Constitution. There were numerous events
recognizing the end of slavery, including an official White House event
presided over by President Obama. On February 11, 2016, Delaware
joined eight other states to formally apologize for slavery when Gover-
nor Jack Markell (D) signed the state’s joint resolution. Delaware’s reso-
lution acknowledged its participation in 226 years of
slavery first of both Native Americans and Africans in
the mid-1600s; by the close of the 1700s its entire
slave population was of African descent. The resolu-
tion also included acknowledgments that Delaware
criminalized humanitarian attempts to assist slaves
and that in later times Delaware passed and enforced
Jim Crow laws to deny the rights of African American
citizens for much of the twentieth century.1
On July 29, 2008, the U.S. House of Representa-
tives passed a nonbinding resolution, introduced and
championed by Representative Steven Cohen (D-TN),
which offered a formal apology for the government’s
participation in African American slavery and the
establishment of Jim Crow laws. The resolution said, in part, “African
Americans continue to suffer from the consequences of slavery and Jim
Crow—long after both systems were formally abolished—through
enormous damage and loss, both tangible and intangible, including the
loss of human dignity and liberty, the frustration of careers and profes-
sional lives, and the long-term loss of income and opportunity.”2
On June 18, 2009, the U.S. Senate unanimously passed a similar reso-
lution apologizing to African Americans for slavery and Jim Crow. The
Senate resolution said explicitly that the apology could not be used in
support of reparations (or compensation for past wrongs).3
The story of apologies for slavery is a complex one that highlights some of the
underlying dilemmas that face the U.S. political system—how to reconcile its stated
principles of how individuals should be treated with how the government actually
treats and has treated individuals. The apologies are intended to acknowledge the
nation’s complicity in a destructive and immoral institution, at ...
11Cancer is the uncontrollable growth of abnormal cellsSantosConleyha
1
1
Cancer is the uncontrollable growth of abnormal cells in the human body. It is defined by a malfunction in cellular mechanisms that control cell growth. Cells evade checkpoint controls and begin growing uncontrollably which resulting in an increase in abnormal cells, cancer cells. These cancer cells form a mass tissue known as a tumor. In the United States of America, cancer has been determined to be among the leading causes of mortality rates after cardiovascular conditions, where one in every four deaths is caused by cancer. The most common types of cancer include prostate cancer, lung cancer, and breast cancer. Risk factors for cancer include excess smoking, radiation exposure, genetics, and environmental pollution. Colon cancer, or colorectal cancer, affects the distal third of the large intestine, the colon, as well as the rectum, chamber in which feces is stored for elimination. Colorectal cancer is the third leading cause of death in cancer-related issues in the United States in both males and females (Beadnell et al., 2018). This essay explores the physiology and pathophysiology of colon cancer.
Polyps are tissue growths that generally look like small, flat bumps and are generally less than half an inch wide. They are generally non-cancerous growths that can develop with age on the inner wall of the colon or rectum. There are several types of polyps, such as hyperplastic. They are common and have a low risk of turning cancerous. Hyperplastic polyps found in the colon will be removed and biopsied. Pseudo polyps also referred to as inflammatory polyps, usually occur in people suffering from inflammatory bowel disease and are unlike other polyps. This type of polyp occurs due to chronic inflammation as seen in Crohn's disease and ulcerative colitis. However, a polyp cells which can turn out to be malignant. Villous adenoma or tubulovillous adenoma polyps carry a high risk of turning cancerous. They are sessile and develop flat on the tissue lining the organs. They might blend within the organ, making polyps not easily identifiable and difficult to locate for treatment. Adenomatous or tubular adenoma polyps have a high chance of being cancerous. When a polyp is found, it must be biopsied, and then will regular screenings and polyp removal will follow.
An adenocarcinoma is a cancer formed in a gland that lines an organ. This cancer impacts the epithelial cells, which are spread throughout the human body. Adenocarcinomas of the colon and rectum make up ninety-five percent of all colon cancers (Chang, 2020). Colon adenocarcinomas usually begin in the mucous lining the spread to different layers. Two subtypes of adenocarcinomas are mucinous adenocarcinoma and signet ring cells. Mucinous adenocarcinomas contain about sixty percent mucus which can cause cancer cells to spread faster and become more hostile than typical adenocarcinomas. Signet ring cell adenocarcinoma is responsible for less than one percent of all colon cancer. It is g ...
11SENSE MAKING Runze DuChee PiongBUS 700 LSantosConleyha
1
1
SENSE MAKING
Runze Du
Chee Piong
BUS 700 Leadership and Creative
Solution
s Implementation
Feb 14th 2021
SENSE MAKING
Sensemaking refers to an action or a process of making sense where meaning is given to something. Sensemaking is a process through which individuals give meaning to their collective experiences. Sensemaking is also a process of structuring the unknown by inserting stimuli into some framework kinds to enable individuals to understand or comprehend, attribute, to extrapolate and predict the meaning of something. Sensemaking is an activity that allows people to turn the ongoing complexity in the entire world into a situation that can be understood. Sensemaking Therefore, Sensemaking requires articulating the unknown because, in many cases, trying to put meaning to something strange is the only means by which one can understand it. For instance, the occurrence or the origin of COVID-19 in the entire world has been a phenomenon that has disturbed the heads of many trying to understand what it is, where it came from, who caused it, how it can be prevented and how it can be cured. In attempting to understand COVID 19, people came up with the explanations of what it is, what caused it, and that is where the scientists realized that this is a disease that is caused by a virus known as Coronavirus, since the condition merged in the year 2019, the virus was given the name coronavirus 19, and the disease it caused known as COVID 19. This is how sensemaking enables individuals to give meaning to something that can be understood easily by individuals.
The organization that I am familiar with that has experienced a current change in its operations is Starbucks. Starbucks is an American company that is known for its production and sell of coffee products. It was started in 1971 as a coffee selling company where it was majorly involved in roasting, marketing and selling coffee globally. It has more than 300 stores all over the world selling coffee. This organization has sold coffee within its stores since its initiation. However, because of the corona's onset, the management of this organization decided to change its operation to accommodate the changes in the environment depending on the restrictions imposed on businesses by the ministries of health all over the world. Starbucks company reacted to the industry changes brought about by COVID 19, where businesses were required to close their doors to enhance the measures of curbing the spread of coronavirus disease. Thus, the company embraced technology where it introduced Starbucks-pick up only stores that replaced the over 300 stores globally. The new stores required that no one could sit in as they take their coffee. Instead, everyone would be allowed only to take their orders from the store and to avoid congesting people in one place. Starbucks introduced Starbucks pick-up stores that use technology to supply coffee to customers. The business submitted a mobile app ...
119E ECUTIVE BAR AININ CEOS NE OTIATIN THEIR PAWITH EMSantosConleyha
119
E ECUTIVE BAR AININ : CEOS NE OTIATIN THEIR PA
WITH EMPLO EES OR CORPORATE E ICIENC
By Nathan Witkin
I INTRODUCTION
Rising executive pay is a significant problem that points to a structural
flaw in American corporations. This article presents a solution to that flaw
through which Chief Executive Officers (CEOs) negotiate their pay in
company resources with lower-paid employees. Exploring this solution also
unearths an explanation for capitalism s apparent drive toward inequality and
examines the historical development of corporations and trade unions in the
United States.
The problem is that managers and corporate directors will raise pay at the
top so long as that pay-setting process does not consider the pay of average-
and low-wage workers. The solution is that CEOs and other top executives
negotiate their pay in company resources with employees in a process that
determines the pay and bonuses of both sides. Microeconomic theory indicates
that confronting the tradeoffs of raising executive compensation with other
potential corporate expenditures—by negotiating this compensation with
workers from different parts of the company—will make executive
compensation more efficient.1 Also, historical analysis indicates a pattern in
which executive compensation became aligned with public interest only during
the period in which workers had significant power to negotiate their wages and
Master of Public Policy Candidate at eorgetown University s McCourt School of Public
Policy J.D., The Ohio State Moritz College of Law. The Author is an independent researcher,
originator of a variety of social innovations (co-resolution, interest group mediation, consensus
arbitration, dependent advocacy, the popular tax audit, the hostile correction, a partnership
between citizen review boards and community policing, and a two-state/one-land solution to the
Israeli-Palestinian conflict), and author of several ambitious theories (the shift in sovereignty
from land to people under international treaties, the use of impact bonds as a solution to climate
change, and resistance to the accelerating expansion of the universe as the cause of gravitation).
He is also a former solo-practitioner in criminal and family law.
1 N. RE OR MAN IW, PRINCIPLES O MICROECONOMICS ( th ed. 2012) (describing the first
principle of microeconomics as centered on trade-offs). Many basic microeconomic models
involve trade-offs between potential allocations of resources to achieve efficiency. See DAVID
BESAN O RONALD R. BRAEUTI AM, MICROECONOMICS 20 07 (5th ed. 201 ).
120 KAN. J.L. & P B. POL’Y Vol. I :1
benefits. This is not to say that the solution to executive compensation is a
return to unions, which developed as a separate organizational structure with
their own flaws and inefficiencies. Rather, a corporation that synthesizes the
inputs of all its employees will be able to maximize efficiency and
productivity, producing profits for shareholders and growth for the overall
econ ...
11CALIFORNIA MANAGEMENT REVIEW VOL. 51, NO. 4 SUMMER 2009 CMR.BERKELEY.EDU
The Emergence and
Evolution of the
Multidimensional
Organization
J. Strikwerda
J.W. Stoelhorst
“In terms of its impact, not just on economic activity, but also on human life as a
whole, the multidivisional organizational design must rank as one of the major
innovations of the last century.”—John Roberts1
T
he multidivisional, multi-unit, or M-form, is widely acknowledged
as the most successful organization form of the twentieth century.2
Firms that employ the M-form organize their activities in separate
business units and delegate control over the resources needed to
create economic value to the managers of these units. This organization form is
widespread, is central to the “theory in use” of managers, and serves as the basis
of most accounting systems. However, the organization of productive activities
in many contemporary firms violates the principle that is central to the M-form:
that business units are self-contained. The quest for synergies that has been high
on the corporate agenda since the late 1980s has resulted in the widespread
adoption of corporate account management, shared service centers, and matrix
organizations. As a result, most business units now depend at least in part on
resources that are controlled by other units. This raises fundamental questions
about the status of the M-form in contemporary firms.
Questioning the status of the M-form is not merely a theoretical fancy,
but is high on the agenda of managers as well. In this article, we report on
research that was commissioned by the Foundation for Management Stud-
ies, a Dutch organization of management executives. These practical men and
women shared a fundamental uneasiness about structuring their organizations.
On the one hand, many of them experienced problems with the M-form: high
employee costs, internal battles over resources, lack of standardization, lack of
cooperation, and loss of market opportunities. On the other hand, they did not
The Emergence and Evolution of the Multidimensional Organization
UNIVERSITY OF CALIFORNIA, BERKELEY VOL. 51, NO. 4 SUMMER 2009 CMR.BERKELEY.EDU12
see any viable alternatives to the multi-unit organization form. The need to
exploit synergies across business units was widespread, but it was unclear which
organizational designs are most appropriate to achieve this. This led to a research
project to explore the ways in which leading Dutch organizations, including
subsidiaries of foreign multinationals, have adapted the M-form to better exploit
synergies across business units.
As we expected, the results of the study vividly illustrate the fundamen-
tal tension between the need for contemporary firms to exploit synergies and
their need for clear accountability. However, an additional and unexpected
finding was that a number of firms in the study have evolved an organiza-
tional form that signals a new way of res ...
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
How to Create Map Views in the Odoo 17 ERPCeline George
The map views are useful for providing a geographical representation of data. They allow users to visualize and analyze the data in a more intuitive manner.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
1. Watch the video a. Episode 9 Munchausen by Proxy Dying fo
1. 1. Watch the video a. Episode 9: Munchausen by Proxy: Dying
for Attention (13:16)
https://www.youtube.com/watch?v=RGw3d6dzHuM
2. Search one of the cases mentioned in this video and
answer the following questions:
a) Name 3 legal and/or ethical issues- refer to your
course materials for this information.
b) Provide an explanation of how this case applies to the issues
you chose
c) If you were the nurse caring for the patient and was involved
in the case, what would you do? Find one journal article to
support your action(s).
d) Complete your activity on this page
i.
ii.
XYZ Bank Software Test Plan
Student Name
Student ID
2
Date
Software Test Plan
2. Project Name: XYZ Bank Software Test Plan
Purpose of Project: To prepare an effective software test plan
for testing the organization software components and
functionalities.
Features To Be Tested/Not To Be Tested
The features to be tested in this project include;
i. Software application units
ii. Software system
iii. Software integration
iv. Software performance and stress
v. Software user acceptance
vi. Software automatic regression
vii. Software beta requirements
On the other hand, the following feature will not be tested
i. Software batch. This feature will not be tested since it has
low risk based on the previous risk assessment conducted.
Testing Pass/Fail Criteria
Feature
Pass/Fail Criteria (Pass definition)
Software application units
All test cases completed
All codes covered
Software system
All test cases completed
All codes covered
Software integration
All test cases completed
All codes covered
Software performance and stress
All test cases completed
Software user acceptance level
All test cases completed
Software automatic regression
All test cases completed
Software beta requirements
3. All test cases completed
Testing Approach
Execution of this project applied the box approach. This is a
hybrid method combing the two traditional approaches. White-
box and black-box testing are two types of software testing
methods. These two methodologies are applied in the
description of tester's point of view when creating test cases.
Grey-box testing is a hybrid approach to software testing
methodology that can be used. The above "arbitrary distinction"
among black- and white-box testing has faded somewhat as the
concept of grey-box testing—which develops tests from specific
design elements—has gained traction.
White-box testing verifies a program's internal structures or
workings rather than the functionali ty that is visible to the end
user. In white-box testing, test cases are created using an
internal perspective of the system (the source code) and
programming skills. The tester selects inputs in order to
exercise code paths and determine appropriate outputs. It
includes API testing, code coverage, fault injection among
others.
On the other hand, black-box testing looks at the program as if
it were a "black box," assessing functionality without knowing
how it works inside or viewing the source code. The testers only
know what the program should do, not how it should do it. Use
case testing, exploratory testing, equivalence partitioning, state
transition tables, among others are all examples of black-box
testing techniques.
Testing Cases
This project implementation requires implementation of the
following use cases;
Test Case
Test Case Description
Test Data
4. Expected Result
Actual Result
Pass/Fail
1
Launch application
www.google.com
Google.com
Google.com
Pass
2
Enter valid email and password
Email: [email protected]
Password: ******
The password entered is incorrect, forgotten password?
The password entered is incorrect, forgotten password?
Pass
3
Login
Email: [email protected]
Password: ******
Login needs to be successful
Login successful
Pass
4
Verify user settings page
N/A
User preference page should be displayed
User preference page is displayed
Pass
Testing Materials (Hardware/Software Requirements)
Hardware requirements:
i. Modems
ii. Computers
Software requirements:
5. i. Workstation
ii. Mainframe
iii. Operating system
Testing Schedule
Testing Activity
Duration
Resource
Comments
Test Plan Creation
5 days
Test Manager
Planning entails preparation details to carry out the identified
tests
Test Specification Creation
10 days
Test Leads
This phase entail identification of specific tests to be carried
out.
Test Specification Team Review
5 days
Project Team
The team is selected and reviewed by defining specific roles of
each member.
Component Testing
20 days
Component Testers
Individual components are tested
Integration Testing
20 days
Component and System Testers
The integration of different components is tested.
System Testing
15 days
System Testers
The complete system is tested
6. Performance Testing
5 days
System Testers
The performance of the system is tested.
Use Case Validation
10 days
System Testers
All the use cases defined validated.
Alpha Testing
5 days
Product Managers/Analysts
The product release details are tested
Beta Testing/Pilot Program
20 days
Pilot Program End-Users
The end user’s capability to use the software is tested.
Risks and Contingencies Matrix
Risk
Probability
Risk Type
Owner
Contingencies/Mitigation Approach
Do not have enough skilled workers to test components as they
are ready for testing.
25%
Project Resources
Testing Manager
Testing schedule will be adjusted based on available resources.
Testing team member turnover
10%
Project Resources
Testing Manager
Adjust testing schedules. Make sure testing team members are
cross-trained on testing techniques in case a team member
leaves the organization.
7. Software hacking
50%
Project resources
Security Manager
Training of end users.
Implementing data and information security techniques and
procedures.
Inaccurate estimations
30%
Project resources
Project Manager
Consider uncertainty while estimating
Allocate duties to different team leaders.
Effective communications.
End user engagement
25%
Project resources
Testing Manager
Ensure end users are involved in all necessary phases of the
project.
Poor quality code
8%
Project resources
Testing Manager
Code reviews.
Clear coding standards and policies
Testing all the codes
8
8. XYZ Bank Software Test Plan
Student Name: powede yingi
Software Test Plan
Project Name: XYZ Bank Software Test Plan
Purpose of Project: To prepare an effective software test plan
for testing the organization software components and
functionalities.
Features To Be Tested/Not To Be Tested
The features to be tested in this project include;
i. Software application units
ii. Software system
iii. Software integration
iv. Software performance and stress
v. Software user acceptance
vi. Software automatic regression
vii. Software beta requirements
On the other hand, the following feature will not be tested
i. Software batch. This feature will not be tested since it has
low risk based on the previous risk assessment conducted.
9. Testing Pass/Fail Criteria
Feature
Pass/Fail Criteria (Pass definition)
Software application units
All test cases completed
All codes covered
Software system
All test cases completed
All codes covered
Software integration
All test cases completed
All codes covered
Software performance and stress
All test cases completed
Software user acceptance level
All test cases completed
Software automatic regression
All test cases completed
Software beta requirements
All test cases completed
Testing Approach
Execution of this project applied the box approach. This is a
hybrid method combing the two traditional approaches. White-
box and black-box testing are two types of software testing
methods. These two methodologies are applied in the
description of tester's point of view when creating test cases.
Grey-box testing is a hybrid approach to software testing
methodology that can be used. The above "arbitrary distinction"
among black- and white-box testing has faded somewhat as the
concept of grey-box testing—which develops tests from specific
design elements—has gained traction.
White-box testing verifies a program's internal structures or
workings rather than the functionality that is visible to the end
user. In white-box testing, test cases are created using an
10. internal perspective of the system (the source code) and
programming skills. The tester selects inputs in order to
exercise code paths and determine appropriate outputs. It
includes API testing, code coverage, fault injection among
others.
On the other hand, black-box testing looks at the program as if
it were a "black box," assessing functionality without knowing
how it works inside or viewing the source code. The testers only
know what the program should do, not how it should do it. Use
case testing, exploratory testing, equivalence partitioning, state
transition tables, among others are all examples of black-box
testing techniques.
Testing Cases
This project implementation requires implementation of the
following use cases;
Test Case
Test Case Description
Test Data
Expected Result
Actual Result
Pass/Fail
1
Launch application
www.google.com
Google.com
Google.com
Pass
2
Enter valid email and password
Email: [email protected]
Password: ******
The password entered is incorrect, forgotten password?
The password entered is incorrect, forgotten password?
Pass
3
11. Login
Email: [email protected]
Password: ******
Login needs to be successful
Login successful
Pass
4
Verify user settings page
N/A
User preference page should be displayed
User preference page is displayed
Pass
Testing Materials (Hardware/Software Requirements)
Hardware requirements:
i. Modems
ii. Computers
Software requirements:
i. Workstation
ii. Mainframe
iii. Operating system
Testing Schedule
Testing Activity
Duration
Resource
Comments
Test Plan Creation
5 days
Test Manager
Planning entails preparation details to carry out the identified
tests
Test Specification Creation
10 days
Test Leads
12. This phase entail identification of specific tests to be carrie d
out.
Test Specification Team Review
5 days
Project Team
The team is selected and reviewed by defining specific roles of
each member.
Component Testing
20 days
Component Testers
Individual components are tested
Integration Testing
20 days
Component and System Testers
The integration of different components is tested.
System Testing
15 days
System Testers
The complete system is tested
Performance Testing
5 days
System Testers
The performance of the system is tested.
Use Case Validation
10 days
System Testers
All the use cases defined validated.
Alpha Testing
5 days
Product Managers/Analysts
The product release details are tested
Beta Testing/Pilot Program
20 days
Pilot Program End-Users
The end user’s capability to use the software is tested.
13. Risks and Contingencies Matrix
Risk
Probability
Risk Type
Owner
Contingencies/Mitigation Approach
Do not have enough skilled workers to test components as they
are ready for testing.
25%
Project Resources
Testing Manager
Testing schedule will be adjusted based on available resources.
Testing team member turnover
10%
Project Resources
Testing Manager
Adjust testing schedules. Make sure testing team members are
cross-trained on testing techniques in case a team member
leaves the organization.
Software hacking
50%
Project resources
Security Manager
Training of end users.
Implementing data and information security techniques and
procedures.
Inaccurate estimations
30%
Project resources
Project Manager
Consider uncertainty while estimating
Allocate duties to different team leaders.
Effective communications.
End user engagement
25%
Project resources
14. Testing Manager
Ensure end users are involved in all necessary phases of the
project.
Poor quality code
8%
Project resources
Testing Manager
Code reviews.
Clear coding standards and policies
Testing all the codes
BSA/425 v1.3
Project Proposal Template
BSA/425 v1.3
Page 2 of 7
Banking E-Services Project Proposal
Fill out each of the sections below with information relevant to
your project and add your company’s name.
Company Name: XYZ Bank
Project Proposal: Internet Banking System
Project Scope Statement
Project Title
Banking e-Services
Project Sponsor(s)
XYZ Bank
Business Context for the System
The proposed internet bank project needs to implement accounts
and deposits, credit, debit and travel cards, insurance, tax
services, investment as well as insurance services.
Project Scope Description
15. IT infrastructure, Data and system security, network,
applications among others.
Date Prepared
13th July, 2021.
Prepared By
Student Name
Problems/Issues/Opportunities the Proposed System Expected to
Solve
Problems
Issues
Opportunities
Network problem
Hacking
Security
Malicious activities
It makes the system more secure and up to date with installation
of antivirus, firewall and applying data encryption.
Project Objectives
Project Objective Name
Project Objective Description (In terms of Issues and
Opportunities)
Transactions, Balances, Statements, Accounts
Issues:
Security, Technical difficulties, sometimes difficult to access,
network glitches.
Opportunities:
Time saving, user-friendly, safe, time-saving, and password and
id-based authentication
Objective definition:
Clients' data is fed into the system, and it provides as much
information and services as it can, such as maintaining
accounts, balances, and records of deposits and withdrawals, all
while maintaining a highly secure infrastructure and fewer
network issues. The technical infrastructure should be robust
16. and easy to use.
Project Deliverables
Project Deliverable Name
Project Deliverable Description (In terms of Issues and
Opportunities)
ATM, servers, infrastructure, applications as well as other
devices
Issues:
Occasionally they stop working, or there is an issue with
accessibility, such as a slow internet connection or poorly
designed applications that are not user friendly.
Opportunities:
It can give the people an opportunity to learn new technical
ideas hence saving time and cost
Project Acceptance Criteria
Project Acceptance Criteria Name
Project Acceptance Criteria Description (In terms of Issues and
Opportunities)
User name, mobile number, account number, address, additional
codes
Issues:
A user can miss to fill some important information due to
misunderstanding, or others just prefer manual work
Opportunities:
It gives the users an opportunity to enhance the computer
knowledge by working using their smartphones and laptops.
Project Exclusions
Project Exclusion Name
Project Exclusion Description
Hardware requirements
This project will not build the hardware needed for the
implementation. However, it will focus on the integration and
17. configuration of the hardware with the software.
Project Constraints
Project Constraint Name
Project Constraint Description (In terms of Issues and
Opportunities)
Assistance, network, security, inflexibility
Issues:
People may want help while doing online transactions, for
instance, when operating an ATM machine. Even though
network brokerage is a regular occurrence, security measures
might be poor sometimes, thus banks should employ antivirus
and firewalls in their systems.
Opportunities:
It makes the system more transparent by making information
more readily available, and it may be made more scalable by
emphasizing the significance of online banking to the public.
Project Assumptions
Project Assumption Name
Project Assumption Description (In terms of Issues and
Opportunities)
Service oriented, Customer driven
Issues:
While there are interruptions when providing services, it totally
meets the demands of the population. As a result, meeting client
needs should be a top priority.
Opportunities:
It can acquire a better understanding of what customers require
in order to meet their needs, and it can install all of their
services on their website, making work easier.
Project Methodology
i The website should be simple to use. Develop a vision and
work on it, such as what all consumer demands you can meet
with the website, and so on.
ii Design as many templates as possible, and align the website
18. creation and success methods.
iii It should be adaptable as well as simple to use even
remotely and at any time.
iv It is highly scalable and can meet the demands of a large
number of employees, as well as feed consumer data into the
system.
v Available 24 hours a day, 7 days a week.
vi It should be customer-focused.High-Level Work Schedule:
Project Scope
Description of Work
Assumptions and Constraints
Build a system that allows one to make payments as well as
other type of transactions online.
Basic computer knowledge
System requirements met
Assistance
Security
Network
Infrastructure
Milestones
Due Dates
Project approval
Requirements review
Design approval
Planning
Requirement’s definition
Designing
Development and implementation
Final approval
Deployment
Maintaining
20th July, 2021
31st July, 2021
5th August, 2021
11th August 2021
19. 17th August 2021
20th August 2021
30th August 2021
21st September 2021
30th September 2021
15th October 2021
ID
Activity
Resource
Labor Hours
Labor Rate (USD)
Labor Total
Material Units
Material Cost
(USD)
Material Total
Total Cost
1
Deposit and withdraw money
ATM, software, computer
80
400
32000
10
1000
10000
42000
2
Make online payments
Mobile application, software
50
300
15000
5
500
21. Acceptance Criteria
Clear project mission, Client consultation, Clear
communication, Adequate resources, Monitoring and feedback
mechanisms, committed project personnel, Top management
support.
Technical Information
Technical Issues: Performance, Reliability and Availability
Software Requirements: Best programming language, Operating
system
Agreement Information
The Recipient undertakes not to use the Confidential
Information for any purpose except the Purpose, without first
obtaining the written agreement of the Discloser.
The Recipient undertakes to keep the Confidential Information
secure and not to disclose it to any third party [except to its
employees [and professional advisers] who need to know the
same for the Purpose, who know they owe a duty of confidence
to the Discloser and who are bound by obligations equivalent to
those in clause 2 above and this clause 3.
Signed and Delivered as a Deed by: [name of Recipient] in the
presence of: ____________________
Signature ______________________________
Signature of witness _____________________
Name of Witness _________________________
Address of the witness _________________________
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
22. Page 9 of 9
LEWIN’S INTERNET BANKING COMPANY
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Company Name: XYZ BankNetwork Technology
Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points IN a Scale of 10)
LAN
It connects a number of computers or low-voltage devices
across a short distance.
5
WAN
Long distance computer connection
5
WLAN
Does not require the physical devices as it operate like Wi -Fi
8
VWLAN
Decreases network resources wasted by acting LAN segments
and reduce collisions
9
Network Technology Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
23. Cisco
Very fast, best customer service
Expensive
Heavy network in the organization
IOs optimization better experience and great mobile experience
9
Alloys
Cheap, better customer service
Poor network
Encryption of user data
5
Aruba
Cheap, superb network
Poor network
Software for organizational services
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Physical vs logical deployment
The appliances in physical networks are connected via
protocols, but in logical networks, other traffics are used which
are indifferent to physical networks and must be run.
Scalability and automatic deployment
Not only must the networks be automated, but they must also be
scalable.
Bringing separate own network
When installing a network in a data center architecture, an
automated and quicker deployment is preferable.
Technology Adoption Methods
Method Name
Method Description
24. Strategy and Technology Alignment
The proposed technology must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed technology
Training of employees
Organization employees’ needs be trained on the internet and
how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$3000
High productivity
Construction of new block
$50000
Installation of the proposed system and componentsDatabase
System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Terms of reference definition
The purpose of the project
5
Products shortlisting
Selecting the best database management system (DBMS)
8
Products evaluation
Thorough analysis of the selected DBMS
4
Recommendation
Findings and analysis of the right organization
9
25. Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Desktop
Entering and logical storage of user data
High speed in data processing
4
Relational
Tables arranged in schemas in a particular server
Storage of multiple data
5
Normalization
Processing and breaking up of data
Ais in sorting of database documents based on defined criteria
7
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
5
Security
Data must be well protected from attacks
9
Convenience
Data must be utilized without previous errors
7
Database System Recommended Vendors
Vendor Name
Vendor Strengths
26. Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
Support cloud services, very powerful
Oracle database may not be ideal because it is complexity and
users need high technical ability to operate
Cloud database management as well as employee training
8
Microsoft SQL
Widely used globally
Complicated licensing and expensive
Easily integrated with Microsoft products such as Word, Excel
etc
6
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data and information security
Currently there are numerous cyber security attacks
Performance
The performance of the system can face issues
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed database must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed database technology
Training of employees
Organization employees’ needs be trained on the database
management and how to use it so that they can accept it more
quickly.
27. Cost/Benefit Considerations
Benefits
Costs
Considerations
Purchase of the new database system
$5000
It will assist the firm in better storing and retrieving its
expanding volumes of data.Software Application
Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Industry and business expertise
This is the proportion of employees having IT expertise in the
firm.
8
Program management
The program and project must be complicated, and the
organization must be competent to handle it.
5
Understanding the market
Our program must be compatible with our business's market.
7
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
Browsers
Such as Chrome
Accessing the internet
7
28. Microsoft office suite
Consist of Ms Word, Excel, PowerPoint, Access among others
Management of organization documents
6
Mobile application
Like Skype
Communication
7
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Broad needs definition
Type of the required application is checked
5
Report capabilities checking
The selected software has to define the company summary well
8
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all kind of software products revenue
Other service revenue not included
It supplies advanced software for the firm.
9
SUN GUARAD
Revenues from FIS worldwide are supported
Maintenance of the software is not included
The transactions are computed using a derived value that is the
same as a direct software license.
29. 8
Salesforce
Includes all kind of sales service software
Other service revenue not included
It includes revenue-generating marketing apps and a cloud app.
7
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The software can be attacked by cyber criminals
Performance
The performance of the software can face issues
Insufficient knowledge
The users of the software may not have sufficient knowledge on
their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the
organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed software applications
Training of employees
Organization employees’ needs be trained on software control
and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
30. New computers buying
$2000
The new computers will be installed the new software
applications
Employing new staff
$3000
The new employees will make sure that the software is properly
utilized.Cloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
4
Security
The software applications must be well protected from attacks
9
Convenience
The software applications must be utilized without previous
errors
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Google Drive
15GB capacity
Best in team collaborations
10
Dropbox
2GB limit
Best in small devices like smartphones
31. 8
Box
10GB limit
Best in enterprise solutions
7
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Standard compliance
The cloud service providers must comply with the government
set standards
8
Data security
The service providers must ensure the user data is protected
9
Service roadmap
The organization objectives must be met through project
implementation
7
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all additional computer and database storage
N/A
Business integration is made easier for users
9
Google cloud
Famous worldwide
N/A
32. Best in google searches and YouTube services
8
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The cloud servers can be attacked by cyber criminals
Performance
The performance of the cloud servers can face issues
Insufficient knowledge
The users of the cloud services may not have sufficient
knowledge on their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the
organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed software applications
Training of employees
Organization employees’ needs be trained on software control
and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$1000
The new employees will be responsible for controlling the cloud
33. services.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Plan Draft
BSA/425 v1.3
Page 9 of 9
Project Plan Draft
Fill out each of the sections below with information relevant to
your project. Be sure to include the company name associated
with your project.
Company Name: XYZ Bank
Network Technology Recommendations
Network Technology Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points IN a Scale of 10)
LAN
It connects a number of computers or low-voltage devices
across a short distance.
5
WAN
Long distance computer connection
5
WLAN
Does not require the physical devices as it operate like Wi-Fi
8
Network Technology Recommended Vendors
Vendor Name
34. Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Cisco
Very fast, best customer service
Expensive
Heavy network in the organization
9
Alloys
Cheap, better customer service
Poor network
Encryption of user data
5
Aruba
Cheap, superb network
Poor network
Software for organizational services
4
Network Technology Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Physical vs logical deployment
The appliances in physical networks are connected via
protocols, but in logical networks, other traffics are used which
are indifferent to physical networks and must be run.
Scalability and automatic deployment
Not only must the networks be automated, but they must also be
scalable.
Bringing separate own network
When installing a network in a data center architecture, an
automated and quicker deployment is preferable.
35. Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed technology must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed technology
Training of employees
Organization employees’ needs be trained on the internet and
how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Increase the number of employees
$3000
High productivity
Construction of new block
$50000
Installation of the proposed system and components
Database System Recommendation
Database System Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Terms of reference definition
The purpose of the project
5
Products shortlisting
Selecting the best database management system (DBMS)
8
Products evaluation
Thorough analysis of the selected DBMS
36. 4
Recommendation
Findings and analysis of the right organization
9
Database System Recommendation
Recommended Database System
Description
Benefits
Aggregate Selection Criteria Score
Desktop
Entering and logical storage of user data
High speed in data processing
4
Relational
Tables arranged in schemas in a particular server
Storage of multiple data
5
Normalization
Processing and breaking up of data
Ais in sorting of database documents based on defined criteria
7
Database System Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
5
Security
Data must be well protected from attacks
9
Convenience
Data must be utilized without previous errors
7
37. Database System Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Oracle
Support cloud services, very powerful
N/A
Cloud database management as well as employee training
8
Microsoft SQL
Widely used globally
N/A
Easily integrated with Microsoft products such as Word, Excel
etc
6
Database System Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data and information security
Currently there are numerous cyber security attacks
Performance
The performance of the system can face issues
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed database must meet the organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed database technology
Training of employees
38. Organization employees’ needs be trained on the database
management and how to use it so that they can accept it more
quickly.
Cost/Benefit Considerations
Benefits
Costs
Considerations
Purchase of the new database system
$5000
It will assist the firm in better storing and retrieving its
expanding volumes of data.
Software Application Recommendations
Software Application Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Industry and business expertise
This is the proportion of employees having IT expertise in the
firm.
8
Program management
The program and project must be complicated, and the
organization must be competent to handle it.
5
Understanding the market
Our program must be compatible with our business's market.
7
Software Application Recommendation
Recommended Software Application
Description
Benefits
Aggregate Selection Criteria Score
39. Browsers
Such as Chrome
Accessing the internet
7
Microsoft office suite
Consist of Ms Word, Excel, PowerPoint, Access among others
Management of organization documents
6
Mobile application
Like Skype
Communication
7
Software Application Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Broad needs definition
Type of the required application is checked
5
Report capabilities checking
The selected software has to define the company summary well
8
Software Application Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all kind of software products revenue
Other service revenue not included
It supplies advanced software for the firm.
9
SUN GUARAD
40. Revenues from FIS worldwide are supported
Maintenance of the software is not included
The transactions are computed using a derived value, that is the
same as a direct software license.
8
Salesforce
Includes all kind of sales service software
Other service revenue not included
It includes revenue-generating marketing apps and a cloud app.
7
Software Application Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The software can be attacked by cyber criminals
Performance
The performance of the software can face issues
Insufficient knowledge
The users of the software may not have sufficient knowledge on
their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the
organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed software applications
Training of employees
Organization employees’ needs be trained on software control
and how to use it so that they can accept it more quickly.
41. Cost/Benefit Considerations
Benefits
Costs
Considerations
New computers buying
$2000
The new computers will be installed the new software
applications
Employing new staff
$3000
The new employees will make sure that the software is properly
utilized.
Cloud Services Recommendations
Cloud Services Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Cost
Cost effectiveness must be considered
4
Security
The software applications must be well protected from attacks
9
Convenience
The software applications must be utilized without previous
errors
8
Cloud Services Recommendation
Recommended Cloud Services
Description
Benefits
Aggregate Selection Criteria Score
Google Drive
42. 15GB capacity
Best in team collaborations
10
Dropbox
2GB limit
Best in small devices like smartphones
8
Box
10GB limit
Best in enterprise solutions
7
Cloud Services Vendor Selection Criteria
Selection Criteria Name
Selection Criteria Description
Selection Criteria Value (Weighting in Points)
Standard compliance
The cloud service providers must comply with the government
set standards
8
Data security
The service providers must ensure the user data is protected
9
Service roadmap
The organization objectives must be met through project
implementation
7
Cloud Services Recommended Vendors
Vendor Name
Vendor Strengths
Vendor Weaknesses
Products/Services Provided to Project
Aggregate Selection Criteria Score
Amazon Web Services
Includes all additional computer and database storage
43. N/A
Business integration is made easier for users
9
Google cloud
Famous worldwide
N/A
Best in google searches and YouTube services
8
Cloud Services Deployment Challenges
Deployment Challenge
Deployment Challenge Description
Data security
The cloud servers can be attacked by cyber criminals
Performance
The performance of the cloud servers can face issues
Insufficient knowledge
The users of the cloud services may not have sufficient
knowledge on their usage
Technology Adoption Methods
Method Name
Method Description
Strategy and Technology Alignment
The proposed software applications must meet the
organizational needs
Analysis of the present system
This will help the management to determine the need of the
proposed software applications
Training of employees
Organization employees’ needs be trained on software control
and how to use it so that they can accept it more quickly.
Cost/Benefit Considerations
44. Benefits
Costs
Considerations
Increase the number of employees
$1000
The new employees will be responsible for controlling the cloud
services.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Project Implementation Plan Example
BSA/425 v1.3
Page 2 of 2
Project Implementation Plan Example
Replace the italicized information with information relevant to
your project.
Project Name:
Implementation Phase:
Project Plan:
Task
Activity Name
Resource
Schedule Start Date
Schedule Finish Date
Schedule Comments
Prepare for Implementation
Identify the implementation team
CIO/Project Sponsor
6/4/2018
6/8/2018
Order server hardware for production environment and test/QA
45. environment
IT Manager/CIO
6/4/2018
6/29/2018
Order client hardware for production environment and test/QA
environment
IT Manager/CIO
6/4/2018
6/29/2018
Order Cloud Computing Services and software subscriptions
IT Manager/CIO
6/4/2018
6/29/2018
Obtain on premise software applications
IT Manager/CIO
6/4/2018
6/29/2018
Create user IDs and groups for on premise technology
System Admin
7/2/2018
7/13/2018
Create security infrastructure for production and test/QA
environment
System Admin
7/2/2018
7/13/2018
46. Prepare Test Environment
Install test/QA servers and software
System Admin
7/16/2018
7/20/2018
Install test/QA client machines and software
System Admin
7/16/2018
7/20/2018
Configure test/QA environment
System Admin
7/16/2018
7/20/2018
Prepare Production Environment
Install production servers and software
System Admin
7/23/2018
7/27/2018
Install production client machines and software
System Admin
7/23/2018
7/27/2018
Configure production environment/ integrate with cloud service
architecture
System Admin
7/23/2018
47. 7/27/2018
Data Conversions
Perform data conversions and loading into the test/QA
environment
Data Specialists
7/13/2018
8/10/2018
Perform data conversions and loading into the production
environment
Data Specialists
7/13/2018
8/10/2018
Documentation
Ensure all documentation applicable to implementation is
available
Documentation Specialists/Technical Writers
6/11/2018
8/17/2018
Training
Provide administrator training
Trainers
8/13/2018
8/17/2018
Provide support training
Trainers
8/13/2018
8/17/2018
48. Provide end-user training
Trainers
8/13/2018
8/17/2018
Go-Live
Production Go-live
CIO/Project Sponsor
8/27/2018
8/27/2018
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.
BSA/425 v1.3
Post-Mortem
BSA/425 v1.3
Page 2 of 2
Post-Mortem
Use the table tolist the things that went well during the
completion of this 5-week project and the things that didn’t go
well.
Date:
Project Manager (your name):
Project Name:
5 Things that Went Well During the Project
5 Things that Could Have Been Done Better
49. Below, discuss all 10 things from the list above in detail. As a
project manager, or participant, what processes might you put in
place to ensure the same things go well on future projects
you’re involved in? What processes can you put in place to
improve the not-so-great things on future projects? Be specific.
Copyright 2020 by University of Phoenix. All rights reserved.
Copyright 2020 by University of Phoenix. All rights reserved.