1.Assess the main steps involved in developing an effective stra.docxKiyokoSlagleis
1.
Assess the main steps involved in developing an effective strategic plan. Discuss how the steps may differ for a health care organization compared to another industry.
2.
Evaluate the key factors involved in SHEEPED (socioeconomic factors, health care resources and utilization, epidemiological factors, economic factors, political factors, environmental factors, and demographic factors) and their important role in strategic planning. Discuss why it is important for one to consider and include each factor.
.
1.Choose one of the critical steps to building a secure organi.docxKiyokoSlagleis
1.
Choose one of the critical steps to building a secure organization. In 350- to 700-words, explain how and why this step is used in an organization to protect information assets.
2.
In 350- to 700-words, discuss the challenges that leaders and security professionals encounter when trying to balance policy, training, and technology to secure organization information systems.
APA Formatting
Please provide three scholarly references.
.
1.Briefly summarize the purpose of the implementation phase in SDLC..docxKiyokoSlagleis
1.Briefly summarize the purpose of the implementation phase in SDLC. Explain why it exists and what it contributes to the completion of the system.
3.Explain the role and interests of the project champion, organizational management, and end users regarding a new system project. How will each impact the organizational feasibility of the project?
4.What are the three fundamental analysis strategies? Compare and contrast the outcomes of each strategy.
5.What are the four types of use cases? When are each used?
6.Requirements’ gathering is an important phase in a project. Discuss requirements gathering techniques and some advantages and disadvantages of each.
7.Define “scope creep” and discuss how a project manager can avoid it.
9.Describe the following object-oriented programming terms:
Encapsulation
Inheritance
Polymorphism
.
1.Choose four standard corporate executive positions and des.docxKiyokoSlagleis
1.
Choose
four standard corporate executive positions and
describe
their roles on the IT Steering Committee.
2.
Explain the relationship
between the IT architecture and the IT Roadmap used in the IT Strategic Plan.
3.
Different kinds of personnel are required to staff an IT department depending on their IT strategy.
For the two organizations below
, identify four IT positions
that are most important in each organization and
why
.
a.
An organization whose IT strategy is to outsource as much of their IT as possible, and
b.
An organization whose IT strategy is to develop proprietary, in-house applications that directly support their business and operation.
4.
Explain
what business continuity planning is,
who should create the plan
, and the
role of IT
.
5.
Explain what it means to say that the “IT Strategic Plan is aligned to the business Strategic Plan”.
6.
Explain risk management
and
what it
means to the CIO.
7.
Give an example
of a tangible (quantifiable)
and
an intangible (qualitative) performance measure and
discuss the value of each
.
8.
The CIO is responsible for the business rules or requirements that generate a new system or changes to the existing system.
How is his/her role responsible for these changes
?
9.
What is change management and how does it relate to the IT organization?
.
1.An eassy talk about ethics by a ethics song. You can find a ethics.docxKiyokoSlagleis
1.An eassy talk about ethics by a ethics song. You can find a ethics song on youtube
2.
but please think deeply about meaning. I have attached an example. Notice that I used specific words to describe fairness in justice. You will recieve less than two points if you do not comprehend and use correctly words such as proportional fairness. doc
.
1.A school psychologist strongly believes a particular child is .docxKiyokoSlagleis
1.
A school psychologist strongly believes a particular child is in need of special services. What is the psychologist trying to control for if he or she uses the most recently normed test available?
2.
What are two benefits of the WASI?
3.
Identify three improvements of the WAIS-IV over the WAIS-III.
4.
Provide one advantage and one disadvantage of group-administered intelligence tests.
5.
Give three examples of extra-test behavior on an ability test.
6.
Name three recommended uses for the Woodcock-Johnson III.
7.
Name three things that would be included in the best approach to diagnosing a specific learning ability.
8.
What is the purpose of empirical criterion keying?
9.
Identify two functions of validity scales on personality tests.
10.
Identify a criticism of the MMPI that contributed to the need for developing the MMPI-2. Identify a criticism of the MMPI-2.What is the purpose of the inquiry stage of the administration of the Rorschach test?
11.
What is the purpose of the inquiry stage of the administration of the Rorschach test?
12.
Identify three criticisms of projective tests.
13.
What principle do assessors utilize when interpreting the TAT?
14.
Give an example of a behavioral assessment approach.
15.
What does a mental status exam assess?
16.
Give an example of the Barnum effect.
17.
Why is it recommended to utilize the BDI-II with other tests?
18.
What are three things that the Tower of Hanoi measures?
19.
Give an example of a performance assessment.
20.
What is an assessment center and what is it utilized for?
Essay Questions
The essay questions below are worth 10 points each.
1.
Compare and contrast two established personality assessments discussed in the course. Include in your discussion strengths and limitations of each measure.
2.
Throughout the course, issues related to cultural diversity have been addressed. Identify one intelligence, educational, or personality measure and describe its strengths and weaknesses as it relates to diversity.
3.
Identify and describe at least three ethical dilemmas or responsibilities a psychological assessor may face.
.
1.Choose one stanza from Aaron Abeytas thirteen ways of looking .docxKiyokoSlagleis
1.
Choose one stanza from Aaron Abeyta's "thirteen ways of looking at a tortilla", and explain how it parodies another poem. What do you notice about this particular stanza. What makes it humorous, or witty, or ambiguous, insightful, etc. (Note, just choose one stanza, not the whole poem.)
2.
Choose one poem from Chapter 14 that you identify with, or seem to have a connection to. Why do you like this poem? Explain in depth what you like or identify with, and include textual evidence from the poem.
3.
Your textbook authors put the terms
translation
and
parody
together in the same chapter (Chapter 15). Why do you think this is? What are the connections between translation and parody? How do they relate to each other?
the material is the peom from chapter 14
.
1.A psychologist is interested in learning more about how childr.docxKiyokoSlagleis
A psychologist wants to understand how children interact when unobserved during school. Observational research would allow the psychologist to directly see children's unwatched behavior, but it risks invading their privacy without consent. Gaining permission and ensuring anonymity would help address ethical concerns in observational research of children.
1.Assess the main steps involved in developing an effective stra.docxKiyokoSlagleis
1.
Assess the main steps involved in developing an effective strategic plan. Discuss how the steps may differ for a health care organization compared to another industry.
2.
Evaluate the key factors involved in SHEEPED (socioeconomic factors, health care resources and utilization, epidemiological factors, economic factors, political factors, environmental factors, and demographic factors) and their important role in strategic planning. Discuss why it is important for one to consider and include each factor.
.
1.Choose one of the critical steps to building a secure organi.docxKiyokoSlagleis
1.
Choose one of the critical steps to building a secure organization. In 350- to 700-words, explain how and why this step is used in an organization to protect information assets.
2.
In 350- to 700-words, discuss the challenges that leaders and security professionals encounter when trying to balance policy, training, and technology to secure organization information systems.
APA Formatting
Please provide three scholarly references.
.
1.Briefly summarize the purpose of the implementation phase in SDLC..docxKiyokoSlagleis
1.Briefly summarize the purpose of the implementation phase in SDLC. Explain why it exists and what it contributes to the completion of the system.
3.Explain the role and interests of the project champion, organizational management, and end users regarding a new system project. How will each impact the organizational feasibility of the project?
4.What are the three fundamental analysis strategies? Compare and contrast the outcomes of each strategy.
5.What are the four types of use cases? When are each used?
6.Requirements’ gathering is an important phase in a project. Discuss requirements gathering techniques and some advantages and disadvantages of each.
7.Define “scope creep” and discuss how a project manager can avoid it.
9.Describe the following object-oriented programming terms:
Encapsulation
Inheritance
Polymorphism
.
1.Choose four standard corporate executive positions and des.docxKiyokoSlagleis
1.
Choose
four standard corporate executive positions and
describe
their roles on the IT Steering Committee.
2.
Explain the relationship
between the IT architecture and the IT Roadmap used in the IT Strategic Plan.
3.
Different kinds of personnel are required to staff an IT department depending on their IT strategy.
For the two organizations below
, identify four IT positions
that are most important in each organization and
why
.
a.
An organization whose IT strategy is to outsource as much of their IT as possible, and
b.
An organization whose IT strategy is to develop proprietary, in-house applications that directly support their business and operation.
4.
Explain
what business continuity planning is,
who should create the plan
, and the
role of IT
.
5.
Explain what it means to say that the “IT Strategic Plan is aligned to the business Strategic Plan”.
6.
Explain risk management
and
what it
means to the CIO.
7.
Give an example
of a tangible (quantifiable)
and
an intangible (qualitative) performance measure and
discuss the value of each
.
8.
The CIO is responsible for the business rules or requirements that generate a new system or changes to the existing system.
How is his/her role responsible for these changes
?
9.
What is change management and how does it relate to the IT organization?
.
1.An eassy talk about ethics by a ethics song. You can find a ethics.docxKiyokoSlagleis
1.An eassy talk about ethics by a ethics song. You can find a ethics song on youtube
2.
but please think deeply about meaning. I have attached an example. Notice that I used specific words to describe fairness in justice. You will recieve less than two points if you do not comprehend and use correctly words such as proportional fairness. doc
.
1.A school psychologist strongly believes a particular child is .docxKiyokoSlagleis
1.
A school psychologist strongly believes a particular child is in need of special services. What is the psychologist trying to control for if he or she uses the most recently normed test available?
2.
What are two benefits of the WASI?
3.
Identify three improvements of the WAIS-IV over the WAIS-III.
4.
Provide one advantage and one disadvantage of group-administered intelligence tests.
5.
Give three examples of extra-test behavior on an ability test.
6.
Name three recommended uses for the Woodcock-Johnson III.
7.
Name three things that would be included in the best approach to diagnosing a specific learning ability.
8.
What is the purpose of empirical criterion keying?
9.
Identify two functions of validity scales on personality tests.
10.
Identify a criticism of the MMPI that contributed to the need for developing the MMPI-2. Identify a criticism of the MMPI-2.What is the purpose of the inquiry stage of the administration of the Rorschach test?
11.
What is the purpose of the inquiry stage of the administration of the Rorschach test?
12.
Identify three criticisms of projective tests.
13.
What principle do assessors utilize when interpreting the TAT?
14.
Give an example of a behavioral assessment approach.
15.
What does a mental status exam assess?
16.
Give an example of the Barnum effect.
17.
Why is it recommended to utilize the BDI-II with other tests?
18.
What are three things that the Tower of Hanoi measures?
19.
Give an example of a performance assessment.
20.
What is an assessment center and what is it utilized for?
Essay Questions
The essay questions below are worth 10 points each.
1.
Compare and contrast two established personality assessments discussed in the course. Include in your discussion strengths and limitations of each measure.
2.
Throughout the course, issues related to cultural diversity have been addressed. Identify one intelligence, educational, or personality measure and describe its strengths and weaknesses as it relates to diversity.
3.
Identify and describe at least three ethical dilemmas or responsibilities a psychological assessor may face.
.
1.Choose one stanza from Aaron Abeytas thirteen ways of looking .docxKiyokoSlagleis
1.
Choose one stanza from Aaron Abeyta's "thirteen ways of looking at a tortilla", and explain how it parodies another poem. What do you notice about this particular stanza. What makes it humorous, or witty, or ambiguous, insightful, etc. (Note, just choose one stanza, not the whole poem.)
2.
Choose one poem from Chapter 14 that you identify with, or seem to have a connection to. Why do you like this poem? Explain in depth what you like or identify with, and include textual evidence from the poem.
3.
Your textbook authors put the terms
translation
and
parody
together in the same chapter (Chapter 15). Why do you think this is? What are the connections between translation and parody? How do they relate to each other?
the material is the peom from chapter 14
.
1.A psychologist is interested in learning more about how childr.docxKiyokoSlagleis
A psychologist wants to understand how children interact when unobserved during school. Observational research would allow the psychologist to directly see children's unwatched behavior, but it risks invading their privacy without consent. Gaining permission and ensuring anonymity would help address ethical concerns in observational research of children.
1.A school psychologist strongly believes a particular child i.docxKiyokoSlagleis
1.
A school psychologist strongly believes a particular child is in need of special services. What is the psychologist trying to control for if he or she uses the most recently normed test available?
2.
What are two benefits of the WASI?
3.
Identify three improvements of the WAIS-IV over the WAIS-III.
4.
Provide one advantage and one disadvantage of group-administered intelligence tests.
5.
Give three examples of extra-test behavior on an ability test.
6.
Name three recommended uses for the Woodcock-Johnson III.
7.
Name three things that would be included in the best approach to diagnosing a specific learning ability.
8.
What is the purpose of empirical criterion keying?
9.
Identify two functions of validity scales on personality tests.
10.
Identify a criticism of the MMPI that contributed to the need for developing the MMPI-2. Identify a criticism of the MMPI-2.What is the purpose of the inquiry stage of the administration of the Rorschach test?
11.
What is the purpose of the inquiry stage of the administration of the Rorschach test?
12.
Identify three criticisms of projective tests.
13.
What principle do assessors utilize when interpreting the TAT?
14.
Give an example of a behavioral assessment approach.
15.
What does a mental status exam assess?
16.
Give an example of the Barnum effect.
17.
Why is it recommended to utilize the BDI-II with other tests?
18.
What are three things that the Tower of Hanoi measures?
19.
Give an example of a performance assessment.
20.
What is an assessment center and what is it utilized for?
Essay Questions
The essay questions below are worth 10 points each.
1.
Compare and contrast two established personality assessments discussed in the course. Include in your discussion strengths and limitations of each measure.
2.
Throughout the course, issues related to cultural diversity have been addressed. Identify one intelligence, educational, or personality measure and describe its strengths and weaknesses as it relates to diversity.
3.
Identify and describe at least three ethical dilemmas or responsibilities a psychological assessor may face.
.
1.According to the NIST, what were the reasons for the collapse of.docxKiyokoSlagleis
1.
According to the NIST, what were the reasons for the collapse of the Twin Towers on September 11, 2001? List and explain a minimum of four of the reasons given in the NIST report.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
2.
Discuss the various collapse types and the indicators that firefighters must be aware of while operating on scene of an emergency. Include the dangers associated with each type of building construction and the importance of collapse zones during response and mitigation efforts.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations
.
1.5 page for thisPlease review the Case Study introduction present.docxKiyokoSlagleis
1.5 page for this
Please review the Case Study introduction presented below...and provide a one to two page input on your thoughts relative this event. Please submit your input as a word document format (.doc). Please remember to cite the sources for your research.
Case Study - "Hubble Trouble":
Some years ago work began on the development of the Hubble Space Telescope....which was placed into low earth orbit in 1990.
The capability provided by the Hubble Space Telescope is a historic prescedent for mankind.....vis a vis the advanced imaging of the cosmos.....from a vantage point in space....free from image distortion caused by the earth's atmosphere.
Considerable care and planning was associated with the development of this complex space based instrument.
Unfortunately, the Hubble Space Telescope experienced several delays and cost over-runs.
The deployment of the Hubble Space Telescope was further delayed due to the un-related loss of the Space Shuttle Challenger.
Once the Hubble Space Telescope was ultimately deployed it was discovered that the telescope suffered from a significant optics error in the development of it's primary reflecting mirror.
Fortunately, a team was able to develop a solution to address this error....at considerable additional expense....and opportunity loss (vis a vis...the re-allocation of space shuttle missions to implement the solution....).
Questions:
What went wrong in the development of the Hubble Space Telescope ?
What was the impact / consequences associated with this error ?
What actions did the Hubble Space Telescope development team employ to preclude the problem from happening ?
Why weren't the actions that the team employed sufficient to prevent this embarassing problem from occuring ?
What Systems Engineering processes / actions should the James Webb Space Telescope development team consider employing to preclude such a problem from occuring in this successor space telescope ?
1.5 pagr for sumurry and
use the calculations in your summary for case study in fracture
.
1.) What is Mills response to the objection that happiness cannot b.docxKiyokoSlagleis
1.) What is Mill's response to the objection that happiness cannot be the rational purpose of life?
2.) What is Mill's view on "all the grand sources…of human suffering?"
3.) What is Mill's view of self-sacrifice?
4.) Why would someone object that the disinterested character and promotion of general welfare that utilitarianism demands is unreasonable to expect?
5.) What is Mill's response to the objection that the disinterested character and promotion of general welfare that utilitarianism demands is unreasonable to expect?
6.) Explain the objection that utilitarianism renders men cold and unsympathizing. What is Mill's reponse?
7.) Explain the objection that utilitarianism is a doctrine of expediency. What is Mill's response?
8.) Why would someone object that utilitarianism is flawed because there is not time to calculate consequences?
.
1.Add an example or evidence for each reasons ( i listd )why the use.docxKiyokoSlagleis
1.Add an example or evidence for each reasons ( i listd )why the use of animals in research is good ,and also add a example or evidence for that is not good .And write more sentences to make it persuasively for the thesis.(explain why is imortant to society)
2.Change the APA style to MLA style.
3.Add more sentences in conclusion
.
1.1. Some of the most serious abuses taking place in developing .docxKiyokoSlagleis
1.
1. Some of the most serious abuses taking place in developing countries deal with child labor, human slavery, sweatshops, bad governance, and environmental degradation. Select one (1) developing country, and examine the extent to which two (2) of these five (5) issues are occurring. Support your response with specific examples.
2.
2.
Select one (1) developing country, and discuss the fundamental actions that the leadership of the selected country is — or is not — taking to improve the living standards of its people. Next, using this same country, cite one (1) specific example of progress or regress that its government is making in terms of the economy, the political system, and the environment.
.
1.A population of grasshoppers in the Kansas prairie has two col.docxKiyokoSlagleis
1.
A population of grasshoppers in the Kansas prairie has two color phenotypes, green and brown. Typically, the prairie receives adequate water to maintain healthy, green grass. Assume a bird that eats grasshoppers moves into the prairie. How will this affect natural selection of the grasshoppers? How might this change in a drought year?
2.
You are a writer for “Consumer Reports” magazine and you are asked to design an experiment to evaluate the effectiveness of three brands of whitening strips for teeth.
Describe how you would do this using the Scientific Method. Include all of the steps, controls and variables.
3.
Viruses are not considered to be living organisms.
Name 4 characteristics you could identify to distinguish living organisms from viruses.
4.
Explain the process of cell division in animals.
Include a description of
interphase, mitosis and cytokinesis.
5.
Suppose someone presented data from their research that showed the DNA of a newly discovered species was composed of: 30% adenine, 30% guanine, 20% thymine, 20% cytosine. Based on what you know about DNA structure, explain why these data do not make sense.
6.
What are the differences between a covalent bond and an ionic bond?
7
.
Water is crucial for life as we know it. One of the most important characteristics of water is its ability to act as a solvent.
Explain why water is such a good solvent for polar and charged molecules.
8.
Suppose you are taking a cruise from California to Hawaii. About halfway there, the ship begins to sink. You are able to board a lifeboat, but now you are floating in the ocean waiting to be rescued. After several days, you are so thirsty that you bend over the side of the boat and drink lots of salty seawater.
Explain what you think will happen to your body within a few hours of drinking the ocean water, and explain biological basis for your reaction.
9.
What is DNA fingerprinting and explain how this could be used in court or on a TV show such as CSI?
10.
DNA and RNA are similar yet distinct components of the cell. Describe three differences between RNA and DNA with respect to their chemical composition and structure. Provide a detailed description of each characteristic you chose
in your response.
11.
Why would you quickly die if not for the action of enzymes in your cells?
.
1.5 pages single spaced, include References and when necessary, imag.docxKiyokoSlagleis
This document provides guidelines for a 1.5 page single spaced summary assignment, noting that reputable scientific sources from databases and organizations like the CDC and WHO should be used to ensure scientific facts rather than opinions are presented. References and images with captions can be included as necessary, using primary literature if needed.
1.1- What are the real reasons behind the existence of Racism W.docxKiyokoSlagleis
1.
1- What are the real reasons behind the existence of Racism? Why does it still exist despite been illegal by law?
-
Each paragraph is explaining one reason. The reasons should be supported with examples and quotations from reliable sources.
-
List some forms of Racism, such as color, cultural, ethnic racism.
2.
2- Racism in developed countries, how do governments in these countries are standing against racism? Are there genuine efforts to end it forever? Is it real that there are some politicians who are behind this rejected act to get benefits?
3.
3- Human Rights, Civil Rights Movement and other organizations. What are they have done to help in this case?
4.
4- How is Racism existing in sports? Give some examples of that and how people reacted about them?
IMPORTANT NOTEs:
1- THE WRITING MUST BE AN INTERNATIONAL STUDENT LEVEL ( undergraduate Student )
2- please i need good word and something reasonable not too Academic,
No plagiarism
·
3-4 pages’ research.
·
At least you should use two reliable sources.
·
No plagiarism at all, I mean 0%.
·
The research should include: introduction which has clear thesis, paragraphs and conclusion.
·
Work cites.
·
Provide links for the sources if you can
.
1.) Connect 3 Due October 4th2.) Connect 4 Due Octob.docxKiyokoSlagleis
1.)
Connect 3
:
Due October 4th
2.)
Connect 4
:
Due October 16th
3.)
Research Paper: 8 Pages total
(Have Refernces already) APA Format,
Due October 16
4.)
Group Case Paper:
Due Oct 4
No exact lenght (see below points you must have in the paper APA Format).
What are the lessons that you think are important from the Madoff investment fraud as part of that overall meltdown?
-
Examine what could be done to prevent others from pulling off such a scam in the future
-
Present whether or not this fiasco has changed the mentality of potential investors
-
Was there any “Silver Lining” to what happened with the fraud?
.
1. Write an equation in standard form of the parabola that has th.docxKiyokoSlagleis
1.
Write an equation in standard form of the parabola that has the same shape as the graph of f(x) = 2x
2
, but with the given point as the vertex (5, 3).
A. f(x) = (2x - 4) + 4
B. f(x) = 2(2x + 8) + 3
C. f(x) = 2(x - 5)
2
+ 3
D. f(x) = 2(x + 3)
2
+ 3
2 of 20
5.0 Points
Find the coordinates of the vertex for the parabola defined by the given quadratic function.
f(x) = 2(x - 3)
2
+ 1
A. (3, 1)
B. (7, 2)
C. (6, 5)
D. (2, 1)
3 of 20
5.0 Points
Find the vertical asymptotes, if any, and the values of x corresponding to holes, if any, of the graph of the following rational function.
g(x) = x + 3/x(x + 4)
A. Vertical asymptotes: x = 4, x = 0; holes at 3x
B. Vertical asymptotes: x = -8, x = 0; holes at x + 4
C. Vertical asymptotes: x = -4, x = 0; no holes
D. Vertical asymptotes: x = 5, x = 0; holes at x - 3
4 of 20
5.0 Points
"Y varies directly as the n
th
power of x" can be modeled by the equation:
A. y = kx
n
.
B. y = kx/n.
C. y = kx
*n
.
D. y = kn
x
.
5 of 20
5.0 Points
40 times a number added to the negative square of that number can be expressed as:
A.
A(x) = x
2
+ 20x.
B. A(x) = -x + 30x.
C.
A(x) = -x
2
- 60x.
D.
A(x) = -x
2
+ 40x.
6 of 20
5.0 Points
The graph of f(x) = -x
3
__________ to the left and __________ to the right.
A. rises; falls
B. falls; falls
C. falls; rises
D. falls; falls
Solve the following formula for the specified variable:
V = 1/3 lwh for h
7 of 20
Write an equation that expresses each relationship. Then solve the equation for y.
x varies jointly as y and z
A. x = kz; y = x/k
B. x = kyz; y = x/kz
C. x = kzy; y = x/z
D. x = ky/z; y = x/zk
8 of 20
8 times a number subtracted from the squared of that number can be expressed as:
A. P(x) = x + 7x.
B.P(x) = x
2
- 8x.
C. P(x) = x - x.
P(x) = x
2
+ 10x.
9of 20
Find the x-intercepts. State whether the graph crosses the x-axis, or touches the x-axis and turns around, at each intercept.
f(x) = x
4
- 9x
2
A. x = 0, x = 3, x = -3; f(x) crosses the x-axis at -3 and 3; f(x) touches the x-axis at 0.
B. x = 1, x = 2, x = 3; f(x) crosses the x-axis at 2 and 3; f(x) crosses the x-axis at 0.
C. x = 0, x = -3, x = 5; f(x) touches the x-axis at -3 and 5; f(x) touches the x-axis at 0.
D. x = 1, x = 2, x = -4; f(x) crosses the x-axis at 2 and -4; f(x) touches the x-axis at 0.
10 of 20
Find the domain of the following rational function.
f(x) = x + 7/x
2
+ 49
A. All real numbers < 69
B. All real numbers > 210
C. All real numbers ≤ 77
D. All real numbers
11 of 20
Write an equation in standard form of the parabola that has the same shape as the graph of f(x) = 3x
2
or g(x) = -3x
2
, but with the given maximum or minimum.
Minimum = 0 at x = 11
A. f(x) = 6(x - 9)
B. f(x) = 3(x - 11)
2
C. f(x) = 4(x + 10)
D. f(x) = 3(x
2
- 15)
2
12 of 20
Solve the following polynomial inequality.
3x
2
+ 10x - 8 ≤ 0
A. [6, 1/3]
B. [-4, 2/3]
C. [-9, 4/5]
D. [8, 2/7]
13 of 20
Find the coordinate.
1.A health psychologist in a northern climate wants to evaluate .docxKiyokoSlagleis
1.
A health psychologist in a northern climate wants to evaluate the claim that UV lamps help lower depressive symptoms in middle-aged women. She recruits volunteers who meet the criteria for clinical depression and assigns them to two groups: one group receives a standard treatment for depression and undergoes a half hour of UV lamp therapy each day; the other group receives the same standard treatment for depression but without UV lamp therapy. At the end of two months, she administers a depression inventory where lower scores indicate fewer depressive symptoms (lower levels of depression). Assume all other variables are controlled for in the study. Evaluate the claim that depression treatment plus the UV lamp results in
lower
depression scores than depression treatment alone. (16 pts)
Depression Treatment + UV
Depression
Treatment Only
34
29
43
31
29
25
12
14
31
17
22
19
27
32
39
29
13
41
26
23
47
31
25
14
24
37
41
42
a)
SPSS output
b)
SPSS graph
c)
Current APA-style Results section
.
1. You are a journalist in the present. You have just been assig.docxKiyokoSlagleis
1.
You are a journalist in the present. You have just been assigned to write a news story that evaluates the role of the United States during the Cold War era, specifically in Korea. Since your newspaper has a broad audience, you will need to include analysis of other shifts in this time period, including social, political, and economic changes in the Civil Rights movement as well as policies the U.S. takes that shape its role during the Cold War.
Your responses needs to be at least 200 words
2.
Evaluate the policies and doctrines that helped the United States shift from isolationism to a Superpower during the middle of the 20th century. Be certain to include specific events, doctrines, and people to make your point.
Your response needs to be at 150 words
.
1.) Defend which reform movement you feel was most successful in thi.docxKiyokoSlagleis
1.) Defend which reform movement you feel was most successful in this antebellum America; identify significant writings, leaders, methods, and obstacles faced when working towards this goal.
Your response must be at least 200 words in length.
2.) Identify the innovator from 1815-1860 you feel had the most significant impact on American culture and expansion, including which innovation(s) and why.
Your response must be at least 200 words in length.
3.)Take the perspective of an American citizen in 1837, and identify yourself: location, age, and occupation. Assuming this role with no future knowledge, describe your view of Andrew Jackson. Provide an opinion on at least three distinct issues that took place during his administrations (1829-1837). *I am female btw*
Your response must be at least 500 words in length
Everything must be cited in APA format and please use the textbooks as the main references:
Johnson, M. P. (2012). Reading the American past: Selected historical documents: Volume 1: To 1877 (5th ed.). Boston, MA: Bedford/St. Martin’s.
Roark, J. L., Johnson, M. P., Cohen, P. C., Stage, S., & Hartmann, S. M. (2014). The American promise: A concise history, volume 1: To 1877 (5th ed.). Boston, MA: Bedford/St. Martin’s.
.
1. What had the greater impact on bringing the US out of the Great .docxKiyokoSlagleis
1. What had the greater impact on bringing the US out of the Great Depression. President Franklin Roosevelt's New Deal or the second World War.
2. What qualities do you feel are essential to an effective governor? Explain why you feel they are essential. Use facts not opinions to support your claim.
Each question should be at least 200 words
.
1. Who was Robert Walpole and why was he important2. Wh.docxKiyokoSlagleis
This document contains 10 questions about important events and people leading up to the American Revolution, including Robert Walpole, colonial taxation policies like the Stamp Act and Townshend Acts, the Boston Massacre, and John Adams' defense of British soldiers involved. It asks about the relationship between Britain and its American colonies, reasons for increased taxation, protests in Massachusetts, and British assumptions and strategy entering the Revolutionary War.
1. a paper of at least 2 pages. This paper is based on A TRIP TO T.docxKiyokoSlagleis
1. a paper of at least 2 pages. This paper is based on A TRIP TO THE METROPOLITAN MUSEUM OF ART (main museum or Cloisters). Spend at least two hours in the museum and choose one work of art. The paper will examine 1) a brief history of the work and how it characterizes the period in which it was created, 2) for what (if any) purpose it was created, and 3) your reaction to the piece, including it's setting in the museum.
2. Symphonie fantastique
Please watch all five movements of "Symphonie fantastique" and write a reaction paper.
http://youtu.be/ l7chHNocFAc
This is the link to the 1st movement
3. Due Nov. 25
Please write a formal essay about your an "ism" (an art movement after Romanticism) of your choosings. Please use outside materials to write this paper, i.e. not only notes from class. Remember to use in-line citations and list work(s) cited at the end of the paper.
.
1. You are given only three quarterly seasonal indices and qua.docxKiyokoSlagleis
1. You are given only three quarterly seasonal indices and quarterly seasonally adjusted data for the entire year. What is the raw data value for Q4? Raw data is not adjusted for seasonality.
Quarter Seasonal Index Seasonally Adjusted Data
Q1 .80 295
Q2 .85 299
Q3 1.15 270
Q4 --- 271
(Points : 3)
[removed]
325
[removed]
225
[removed]
252
[removed]
271
Question 2.
2.
One model of exponential smoothing will provide almost the same forecast as a liner trend method. What are linear trend intercept and slope counterparts for exponential smoothing?
[removed]
Alpha and Delta
[removed]
Delta and Gamma
[removed]
Alpha and Gamma
[removed]
Std Dev and Mean
Question 3.
3.
Why is the residual mean value important to a forecaster?
(Points : 3)
[removed]
Large mean values indicate nonautoregressiveness.
[removed]
Small mean values indicate the total amount of error is small
.
[removed]
Large absolute mean values indicate estimate bias
.
[removed]
Large mean values indicate the standard error of the model is small.
Question 4.
4.
When performing correlation analysis what is the null hypothesis? What measure in Minitab is used to test it and to be 95% confident in the significance of correlation coefficient.
(Points : 3)
[removed]
Ho: r = .05 p < .5
[removed]
Ho: r = 1 p =.05
[removed]
Ho: r ≠ 0 p≤.05
[removed]
Ho: r = 0 p≤.05
Question 5.
5.
In decomposition what does the cycle factor (CF) of .80 represent for a monthly forecast estimate of a Y variable?
(Points : 3)
[removed]
The estimated value is 80% of the average monthly seasonal estimate
.
[removed]
The estimate is .80 of the forecasted Y trend value
.
[removed]
The estimated value is .80 of the historical average CMA values.
[removed]
The estimated value has 20% more variation than the average historical Y data values
.
Question 6.
6.
A Burger King franchise owner notes that the sales per store has fallen below the stated national Burger King outlet average of $1,258,000. He asserts a change has occurred that reduced the fast food eating habits of Americans. What is his hypothesis (H1) and what type of test for significance must be applied?
(Points : 3)
[removed]
H1: u ≥ $1.258,000 A one-tailed t-test to the left
.
[removed]
H1: u = $1.258,000 A two-tailed t-test.
[removed]
H1: u < $1.258,000 A one-tailed t-test to the left.
[removed]
H1: p < $1.258,000 A one-tailed test to the right
.
Question 7.
7.
The CEO of Home Depot wants to see if city size has any relationship to the current profit margins of the company stores. What data type will he likely use to determine this?
(Points : 3)
[removed]
Time series data of profits by store.
[removed]
Recent 10 year sample of profits by store.
1. Which of the following is an advantage of a corporationA.docxKiyokoSlagleis
1.
Which of the following is an advantage of a corporation?
A.
Permanence
B.
Dilution of ownership
C.
Elimination of double taxation
D.
Ease of formation
2.
A firm's sales increased by 50 percent and inventory was $100,000. According to the percent of sales
method of forecasting, what will the new inventory be?
A.
$150,000
B.
$175,000
C.
$100,000
D.
$120,000
3.
Which of the following is a
correct
statement about operating leverage?
A.
Operating leverage results from use of fixed instead of variable cost.
B.
Operating leverage is affected by the demand for the product.
C.
Operating leverage is associated with less risk and more certainty.
D.
Operating leverage results from using debt financing.
4.
If a firm produces 50,000 widgets and sells each unit for $20.50, what is the total revenue generated by
this production?
A.
$10,250,000
B.
$100,250
C.
$10,250
D.
$1,025,000
5.
If a firm substitutes fixed for variable costs, which of the following will occur?
A.
The use of financial leverage will be increased.
B.
The profits will always be higher.
C.
The break-even level of output will be reduced.
D.
The degree of operating leverage will be increased.
6.
Which of the following is an advantage of the sole proprietorship?
A.
Limited liability
B.
Ease of formation
C.
Joint ownership
D.
Ease of transfer of ownership
7.
Which of these situations offers the
best
rationale for organizing a business as a limited partnership?
A.
You want your small new business, which is operating out of your garage, to pay you and your partner (your spouse)
dividends for which income tax will only be paid by you or your business, not both.
B.
Management needs to raise money through a stock offering, but does not want to relinquish control of the business to
stockholders.
C.
You're an entrepreneur and you want two others' expertise, former business partners, to help execute your business plan.
D.
Management rejects the idea of personally assuming liability for the business.
8.
Which of the following statements about fixed costs is
correct?
A.
Fixed costs don't change with the size of the firm.
B.
Fixed costs are greater than variable costs.
C.
Fixed costs are paid before variable costs.
D.
Fixed costs don't change with the level of output.
9.
A product sells for $5 per unit. If fixed costs are $1,000 and variable costs are $2 per unit, what is the
degree of operating leverage at 2,000 units?
A.
2.0
B.
1.2
C.
1.0
D.
0.83
10.
Which of the following events would be
most likely
to increase the quantity breakeven point, assuming
other factors remain constant?
A.
Reduced marketplace competition enables LMN Corporation to raise its selling price for finance textbooks.
B.
The city council has finally been persuaded: Your taxi business will pay lower water and sewer rates.
C.
The pressure has subsided: The property owner, who rents space to your small manufac.
1. write about 500 words about a watching response to The bicycle.docxKiyokoSlagleis
1. write about 500 words about a watching response to “ The bicycle chief”.
2. write about 500 words about “The Southern Question” in Italy.
The Southern Question” refers to the social and economic disparities (duality) that exist between the Northern and Southern regions of Italy. These differences, as well as their causes, have been the subject of research from a number of disciplines: anthropology, sociology, politics and economics.
please due on time. 1/20 19:00 (about 23 hours)
.
1.A school psychologist strongly believes a particular child i.docxKiyokoSlagleis
1.
A school psychologist strongly believes a particular child is in need of special services. What is the psychologist trying to control for if he or she uses the most recently normed test available?
2.
What are two benefits of the WASI?
3.
Identify three improvements of the WAIS-IV over the WAIS-III.
4.
Provide one advantage and one disadvantage of group-administered intelligence tests.
5.
Give three examples of extra-test behavior on an ability test.
6.
Name three recommended uses for the Woodcock-Johnson III.
7.
Name three things that would be included in the best approach to diagnosing a specific learning ability.
8.
What is the purpose of empirical criterion keying?
9.
Identify two functions of validity scales on personality tests.
10.
Identify a criticism of the MMPI that contributed to the need for developing the MMPI-2. Identify a criticism of the MMPI-2.What is the purpose of the inquiry stage of the administration of the Rorschach test?
11.
What is the purpose of the inquiry stage of the administration of the Rorschach test?
12.
Identify three criticisms of projective tests.
13.
What principle do assessors utilize when interpreting the TAT?
14.
Give an example of a behavioral assessment approach.
15.
What does a mental status exam assess?
16.
Give an example of the Barnum effect.
17.
Why is it recommended to utilize the BDI-II with other tests?
18.
What are three things that the Tower of Hanoi measures?
19.
Give an example of a performance assessment.
20.
What is an assessment center and what is it utilized for?
Essay Questions
The essay questions below are worth 10 points each.
1.
Compare and contrast two established personality assessments discussed in the course. Include in your discussion strengths and limitations of each measure.
2.
Throughout the course, issues related to cultural diversity have been addressed. Identify one intelligence, educational, or personality measure and describe its strengths and weaknesses as it relates to diversity.
3.
Identify and describe at least three ethical dilemmas or responsibilities a psychological assessor may face.
.
1.According to the NIST, what were the reasons for the collapse of.docxKiyokoSlagleis
1.
According to the NIST, what were the reasons for the collapse of the Twin Towers on September 11, 2001? List and explain a minimum of four of the reasons given in the NIST report.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations.
2.
Discuss the various collapse types and the indicators that firefighters must be aware of while operating on scene of an emergency. Include the dangers associated with each type of building construction and the importance of collapse zones during response and mitigation efforts.
Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations
.
1.5 page for thisPlease review the Case Study introduction present.docxKiyokoSlagleis
1.5 page for this
Please review the Case Study introduction presented below...and provide a one to two page input on your thoughts relative this event. Please submit your input as a word document format (.doc). Please remember to cite the sources for your research.
Case Study - "Hubble Trouble":
Some years ago work began on the development of the Hubble Space Telescope....which was placed into low earth orbit in 1990.
The capability provided by the Hubble Space Telescope is a historic prescedent for mankind.....vis a vis the advanced imaging of the cosmos.....from a vantage point in space....free from image distortion caused by the earth's atmosphere.
Considerable care and planning was associated with the development of this complex space based instrument.
Unfortunately, the Hubble Space Telescope experienced several delays and cost over-runs.
The deployment of the Hubble Space Telescope was further delayed due to the un-related loss of the Space Shuttle Challenger.
Once the Hubble Space Telescope was ultimately deployed it was discovered that the telescope suffered from a significant optics error in the development of it's primary reflecting mirror.
Fortunately, a team was able to develop a solution to address this error....at considerable additional expense....and opportunity loss (vis a vis...the re-allocation of space shuttle missions to implement the solution....).
Questions:
What went wrong in the development of the Hubble Space Telescope ?
What was the impact / consequences associated with this error ?
What actions did the Hubble Space Telescope development team employ to preclude the problem from happening ?
Why weren't the actions that the team employed sufficient to prevent this embarassing problem from occuring ?
What Systems Engineering processes / actions should the James Webb Space Telescope development team consider employing to preclude such a problem from occuring in this successor space telescope ?
1.5 pagr for sumurry and
use the calculations in your summary for case study in fracture
.
1.) What is Mills response to the objection that happiness cannot b.docxKiyokoSlagleis
1.) What is Mill's response to the objection that happiness cannot be the rational purpose of life?
2.) What is Mill's view on "all the grand sources…of human suffering?"
3.) What is Mill's view of self-sacrifice?
4.) Why would someone object that the disinterested character and promotion of general welfare that utilitarianism demands is unreasonable to expect?
5.) What is Mill's response to the objection that the disinterested character and promotion of general welfare that utilitarianism demands is unreasonable to expect?
6.) Explain the objection that utilitarianism renders men cold and unsympathizing. What is Mill's reponse?
7.) Explain the objection that utilitarianism is a doctrine of expediency. What is Mill's response?
8.) Why would someone object that utilitarianism is flawed because there is not time to calculate consequences?
.
1.Add an example or evidence for each reasons ( i listd )why the use.docxKiyokoSlagleis
1.Add an example or evidence for each reasons ( i listd )why the use of animals in research is good ,and also add a example or evidence for that is not good .And write more sentences to make it persuasively for the thesis.(explain why is imortant to society)
2.Change the APA style to MLA style.
3.Add more sentences in conclusion
.
1.1. Some of the most serious abuses taking place in developing .docxKiyokoSlagleis
1.
1. Some of the most serious abuses taking place in developing countries deal with child labor, human slavery, sweatshops, bad governance, and environmental degradation. Select one (1) developing country, and examine the extent to which two (2) of these five (5) issues are occurring. Support your response with specific examples.
2.
2.
Select one (1) developing country, and discuss the fundamental actions that the leadership of the selected country is — or is not — taking to improve the living standards of its people. Next, using this same country, cite one (1) specific example of progress or regress that its government is making in terms of the economy, the political system, and the environment.
.
1.A population of grasshoppers in the Kansas prairie has two col.docxKiyokoSlagleis
1.
A population of grasshoppers in the Kansas prairie has two color phenotypes, green and brown. Typically, the prairie receives adequate water to maintain healthy, green grass. Assume a bird that eats grasshoppers moves into the prairie. How will this affect natural selection of the grasshoppers? How might this change in a drought year?
2.
You are a writer for “Consumer Reports” magazine and you are asked to design an experiment to evaluate the effectiveness of three brands of whitening strips for teeth.
Describe how you would do this using the Scientific Method. Include all of the steps, controls and variables.
3.
Viruses are not considered to be living organisms.
Name 4 characteristics you could identify to distinguish living organisms from viruses.
4.
Explain the process of cell division in animals.
Include a description of
interphase, mitosis and cytokinesis.
5.
Suppose someone presented data from their research that showed the DNA of a newly discovered species was composed of: 30% adenine, 30% guanine, 20% thymine, 20% cytosine. Based on what you know about DNA structure, explain why these data do not make sense.
6.
What are the differences between a covalent bond and an ionic bond?
7
.
Water is crucial for life as we know it. One of the most important characteristics of water is its ability to act as a solvent.
Explain why water is such a good solvent for polar and charged molecules.
8.
Suppose you are taking a cruise from California to Hawaii. About halfway there, the ship begins to sink. You are able to board a lifeboat, but now you are floating in the ocean waiting to be rescued. After several days, you are so thirsty that you bend over the side of the boat and drink lots of salty seawater.
Explain what you think will happen to your body within a few hours of drinking the ocean water, and explain biological basis for your reaction.
9.
What is DNA fingerprinting and explain how this could be used in court or on a TV show such as CSI?
10.
DNA and RNA are similar yet distinct components of the cell. Describe three differences between RNA and DNA with respect to their chemical composition and structure. Provide a detailed description of each characteristic you chose
in your response.
11.
Why would you quickly die if not for the action of enzymes in your cells?
.
1.5 pages single spaced, include References and when necessary, imag.docxKiyokoSlagleis
This document provides guidelines for a 1.5 page single spaced summary assignment, noting that reputable scientific sources from databases and organizations like the CDC and WHO should be used to ensure scientific facts rather than opinions are presented. References and images with captions can be included as necessary, using primary literature if needed.
1.1- What are the real reasons behind the existence of Racism W.docxKiyokoSlagleis
1.
1- What are the real reasons behind the existence of Racism? Why does it still exist despite been illegal by law?
-
Each paragraph is explaining one reason. The reasons should be supported with examples and quotations from reliable sources.
-
List some forms of Racism, such as color, cultural, ethnic racism.
2.
2- Racism in developed countries, how do governments in these countries are standing against racism? Are there genuine efforts to end it forever? Is it real that there are some politicians who are behind this rejected act to get benefits?
3.
3- Human Rights, Civil Rights Movement and other organizations. What are they have done to help in this case?
4.
4- How is Racism existing in sports? Give some examples of that and how people reacted about them?
IMPORTANT NOTEs:
1- THE WRITING MUST BE AN INTERNATIONAL STUDENT LEVEL ( undergraduate Student )
2- please i need good word and something reasonable not too Academic,
No plagiarism
·
3-4 pages’ research.
·
At least you should use two reliable sources.
·
No plagiarism at all, I mean 0%.
·
The research should include: introduction which has clear thesis, paragraphs and conclusion.
·
Work cites.
·
Provide links for the sources if you can
.
1.) Connect 3 Due October 4th2.) Connect 4 Due Octob.docxKiyokoSlagleis
1.)
Connect 3
:
Due October 4th
2.)
Connect 4
:
Due October 16th
3.)
Research Paper: 8 Pages total
(Have Refernces already) APA Format,
Due October 16
4.)
Group Case Paper:
Due Oct 4
No exact lenght (see below points you must have in the paper APA Format).
What are the lessons that you think are important from the Madoff investment fraud as part of that overall meltdown?
-
Examine what could be done to prevent others from pulling off such a scam in the future
-
Present whether or not this fiasco has changed the mentality of potential investors
-
Was there any “Silver Lining” to what happened with the fraud?
.
1. Write an equation in standard form of the parabola that has th.docxKiyokoSlagleis
1.
Write an equation in standard form of the parabola that has the same shape as the graph of f(x) = 2x
2
, but with the given point as the vertex (5, 3).
A. f(x) = (2x - 4) + 4
B. f(x) = 2(2x + 8) + 3
C. f(x) = 2(x - 5)
2
+ 3
D. f(x) = 2(x + 3)
2
+ 3
2 of 20
5.0 Points
Find the coordinates of the vertex for the parabola defined by the given quadratic function.
f(x) = 2(x - 3)
2
+ 1
A. (3, 1)
B. (7, 2)
C. (6, 5)
D. (2, 1)
3 of 20
5.0 Points
Find the vertical asymptotes, if any, and the values of x corresponding to holes, if any, of the graph of the following rational function.
g(x) = x + 3/x(x + 4)
A. Vertical asymptotes: x = 4, x = 0; holes at 3x
B. Vertical asymptotes: x = -8, x = 0; holes at x + 4
C. Vertical asymptotes: x = -4, x = 0; no holes
D. Vertical asymptotes: x = 5, x = 0; holes at x - 3
4 of 20
5.0 Points
"Y varies directly as the n
th
power of x" can be modeled by the equation:
A. y = kx
n
.
B. y = kx/n.
C. y = kx
*n
.
D. y = kn
x
.
5 of 20
5.0 Points
40 times a number added to the negative square of that number can be expressed as:
A.
A(x) = x
2
+ 20x.
B. A(x) = -x + 30x.
C.
A(x) = -x
2
- 60x.
D.
A(x) = -x
2
+ 40x.
6 of 20
5.0 Points
The graph of f(x) = -x
3
__________ to the left and __________ to the right.
A. rises; falls
B. falls; falls
C. falls; rises
D. falls; falls
Solve the following formula for the specified variable:
V = 1/3 lwh for h
7 of 20
Write an equation that expresses each relationship. Then solve the equation for y.
x varies jointly as y and z
A. x = kz; y = x/k
B. x = kyz; y = x/kz
C. x = kzy; y = x/z
D. x = ky/z; y = x/zk
8 of 20
8 times a number subtracted from the squared of that number can be expressed as:
A. P(x) = x + 7x.
B.P(x) = x
2
- 8x.
C. P(x) = x - x.
P(x) = x
2
+ 10x.
9of 20
Find the x-intercepts. State whether the graph crosses the x-axis, or touches the x-axis and turns around, at each intercept.
f(x) = x
4
- 9x
2
A. x = 0, x = 3, x = -3; f(x) crosses the x-axis at -3 and 3; f(x) touches the x-axis at 0.
B. x = 1, x = 2, x = 3; f(x) crosses the x-axis at 2 and 3; f(x) crosses the x-axis at 0.
C. x = 0, x = -3, x = 5; f(x) touches the x-axis at -3 and 5; f(x) touches the x-axis at 0.
D. x = 1, x = 2, x = -4; f(x) crosses the x-axis at 2 and -4; f(x) touches the x-axis at 0.
10 of 20
Find the domain of the following rational function.
f(x) = x + 7/x
2
+ 49
A. All real numbers < 69
B. All real numbers > 210
C. All real numbers ≤ 77
D. All real numbers
11 of 20
Write an equation in standard form of the parabola that has the same shape as the graph of f(x) = 3x
2
or g(x) = -3x
2
, but with the given maximum or minimum.
Minimum = 0 at x = 11
A. f(x) = 6(x - 9)
B. f(x) = 3(x - 11)
2
C. f(x) = 4(x + 10)
D. f(x) = 3(x
2
- 15)
2
12 of 20
Solve the following polynomial inequality.
3x
2
+ 10x - 8 ≤ 0
A. [6, 1/3]
B. [-4, 2/3]
C. [-9, 4/5]
D. [8, 2/7]
13 of 20
Find the coordinate.
1.A health psychologist in a northern climate wants to evaluate .docxKiyokoSlagleis
1.
A health psychologist in a northern climate wants to evaluate the claim that UV lamps help lower depressive symptoms in middle-aged women. She recruits volunteers who meet the criteria for clinical depression and assigns them to two groups: one group receives a standard treatment for depression and undergoes a half hour of UV lamp therapy each day; the other group receives the same standard treatment for depression but without UV lamp therapy. At the end of two months, she administers a depression inventory where lower scores indicate fewer depressive symptoms (lower levels of depression). Assume all other variables are controlled for in the study. Evaluate the claim that depression treatment plus the UV lamp results in
lower
depression scores than depression treatment alone. (16 pts)
Depression Treatment + UV
Depression
Treatment Only
34
29
43
31
29
25
12
14
31
17
22
19
27
32
39
29
13
41
26
23
47
31
25
14
24
37
41
42
a)
SPSS output
b)
SPSS graph
c)
Current APA-style Results section
.
1. You are a journalist in the present. You have just been assig.docxKiyokoSlagleis
1.
You are a journalist in the present. You have just been assigned to write a news story that evaluates the role of the United States during the Cold War era, specifically in Korea. Since your newspaper has a broad audience, you will need to include analysis of other shifts in this time period, including social, political, and economic changes in the Civil Rights movement as well as policies the U.S. takes that shape its role during the Cold War.
Your responses needs to be at least 200 words
2.
Evaluate the policies and doctrines that helped the United States shift from isolationism to a Superpower during the middle of the 20th century. Be certain to include specific events, doctrines, and people to make your point.
Your response needs to be at 150 words
.
1.) Defend which reform movement you feel was most successful in thi.docxKiyokoSlagleis
1.) Defend which reform movement you feel was most successful in this antebellum America; identify significant writings, leaders, methods, and obstacles faced when working towards this goal.
Your response must be at least 200 words in length.
2.) Identify the innovator from 1815-1860 you feel had the most significant impact on American culture and expansion, including which innovation(s) and why.
Your response must be at least 200 words in length.
3.)Take the perspective of an American citizen in 1837, and identify yourself: location, age, and occupation. Assuming this role with no future knowledge, describe your view of Andrew Jackson. Provide an opinion on at least three distinct issues that took place during his administrations (1829-1837). *I am female btw*
Your response must be at least 500 words in length
Everything must be cited in APA format and please use the textbooks as the main references:
Johnson, M. P. (2012). Reading the American past: Selected historical documents: Volume 1: To 1877 (5th ed.). Boston, MA: Bedford/St. Martin’s.
Roark, J. L., Johnson, M. P., Cohen, P. C., Stage, S., & Hartmann, S. M. (2014). The American promise: A concise history, volume 1: To 1877 (5th ed.). Boston, MA: Bedford/St. Martin’s.
.
1. What had the greater impact on bringing the US out of the Great .docxKiyokoSlagleis
1. What had the greater impact on bringing the US out of the Great Depression. President Franklin Roosevelt's New Deal or the second World War.
2. What qualities do you feel are essential to an effective governor? Explain why you feel they are essential. Use facts not opinions to support your claim.
Each question should be at least 200 words
.
1. Who was Robert Walpole and why was he important2. Wh.docxKiyokoSlagleis
This document contains 10 questions about important events and people leading up to the American Revolution, including Robert Walpole, colonial taxation policies like the Stamp Act and Townshend Acts, the Boston Massacre, and John Adams' defense of British soldiers involved. It asks about the relationship between Britain and its American colonies, reasons for increased taxation, protests in Massachusetts, and British assumptions and strategy entering the Revolutionary War.
1. a paper of at least 2 pages. This paper is based on A TRIP TO T.docxKiyokoSlagleis
1. a paper of at least 2 pages. This paper is based on A TRIP TO THE METROPOLITAN MUSEUM OF ART (main museum or Cloisters). Spend at least two hours in the museum and choose one work of art. The paper will examine 1) a brief history of the work and how it characterizes the period in which it was created, 2) for what (if any) purpose it was created, and 3) your reaction to the piece, including it's setting in the museum.
2. Symphonie fantastique
Please watch all five movements of "Symphonie fantastique" and write a reaction paper.
http://youtu.be/ l7chHNocFAc
This is the link to the 1st movement
3. Due Nov. 25
Please write a formal essay about your an "ism" (an art movement after Romanticism) of your choosings. Please use outside materials to write this paper, i.e. not only notes from class. Remember to use in-line citations and list work(s) cited at the end of the paper.
.
1. You are given only three quarterly seasonal indices and qua.docxKiyokoSlagleis
1. You are given only three quarterly seasonal indices and quarterly seasonally adjusted data for the entire year. What is the raw data value for Q4? Raw data is not adjusted for seasonality.
Quarter Seasonal Index Seasonally Adjusted Data
Q1 .80 295
Q2 .85 299
Q3 1.15 270
Q4 --- 271
(Points : 3)
[removed]
325
[removed]
225
[removed]
252
[removed]
271
Question 2.
2.
One model of exponential smoothing will provide almost the same forecast as a liner trend method. What are linear trend intercept and slope counterparts for exponential smoothing?
[removed]
Alpha and Delta
[removed]
Delta and Gamma
[removed]
Alpha and Gamma
[removed]
Std Dev and Mean
Question 3.
3.
Why is the residual mean value important to a forecaster?
(Points : 3)
[removed]
Large mean values indicate nonautoregressiveness.
[removed]
Small mean values indicate the total amount of error is small
.
[removed]
Large absolute mean values indicate estimate bias
.
[removed]
Large mean values indicate the standard error of the model is small.
Question 4.
4.
When performing correlation analysis what is the null hypothesis? What measure in Minitab is used to test it and to be 95% confident in the significance of correlation coefficient.
(Points : 3)
[removed]
Ho: r = .05 p < .5
[removed]
Ho: r = 1 p =.05
[removed]
Ho: r ≠ 0 p≤.05
[removed]
Ho: r = 0 p≤.05
Question 5.
5.
In decomposition what does the cycle factor (CF) of .80 represent for a monthly forecast estimate of a Y variable?
(Points : 3)
[removed]
The estimated value is 80% of the average monthly seasonal estimate
.
[removed]
The estimate is .80 of the forecasted Y trend value
.
[removed]
The estimated value is .80 of the historical average CMA values.
[removed]
The estimated value has 20% more variation than the average historical Y data values
.
Question 6.
6.
A Burger King franchise owner notes that the sales per store has fallen below the stated national Burger King outlet average of $1,258,000. He asserts a change has occurred that reduced the fast food eating habits of Americans. What is his hypothesis (H1) and what type of test for significance must be applied?
(Points : 3)
[removed]
H1: u ≥ $1.258,000 A one-tailed t-test to the left
.
[removed]
H1: u = $1.258,000 A two-tailed t-test.
[removed]
H1: u < $1.258,000 A one-tailed t-test to the left.
[removed]
H1: p < $1.258,000 A one-tailed test to the right
.
Question 7.
7.
The CEO of Home Depot wants to see if city size has any relationship to the current profit margins of the company stores. What data type will he likely use to determine this?
(Points : 3)
[removed]
Time series data of profits by store.
[removed]
Recent 10 year sample of profits by store.
1. Which of the following is an advantage of a corporationA.docxKiyokoSlagleis
1.
Which of the following is an advantage of a corporation?
A.
Permanence
B.
Dilution of ownership
C.
Elimination of double taxation
D.
Ease of formation
2.
A firm's sales increased by 50 percent and inventory was $100,000. According to the percent of sales
method of forecasting, what will the new inventory be?
A.
$150,000
B.
$175,000
C.
$100,000
D.
$120,000
3.
Which of the following is a
correct
statement about operating leverage?
A.
Operating leverage results from use of fixed instead of variable cost.
B.
Operating leverage is affected by the demand for the product.
C.
Operating leverage is associated with less risk and more certainty.
D.
Operating leverage results from using debt financing.
4.
If a firm produces 50,000 widgets and sells each unit for $20.50, what is the total revenue generated by
this production?
A.
$10,250,000
B.
$100,250
C.
$10,250
D.
$1,025,000
5.
If a firm substitutes fixed for variable costs, which of the following will occur?
A.
The use of financial leverage will be increased.
B.
The profits will always be higher.
C.
The break-even level of output will be reduced.
D.
The degree of operating leverage will be increased.
6.
Which of the following is an advantage of the sole proprietorship?
A.
Limited liability
B.
Ease of formation
C.
Joint ownership
D.
Ease of transfer of ownership
7.
Which of these situations offers the
best
rationale for organizing a business as a limited partnership?
A.
You want your small new business, which is operating out of your garage, to pay you and your partner (your spouse)
dividends for which income tax will only be paid by you or your business, not both.
B.
Management needs to raise money through a stock offering, but does not want to relinquish control of the business to
stockholders.
C.
You're an entrepreneur and you want two others' expertise, former business partners, to help execute your business plan.
D.
Management rejects the idea of personally assuming liability for the business.
8.
Which of the following statements about fixed costs is
correct?
A.
Fixed costs don't change with the size of the firm.
B.
Fixed costs are greater than variable costs.
C.
Fixed costs are paid before variable costs.
D.
Fixed costs don't change with the level of output.
9.
A product sells for $5 per unit. If fixed costs are $1,000 and variable costs are $2 per unit, what is the
degree of operating leverage at 2,000 units?
A.
2.0
B.
1.2
C.
1.0
D.
0.83
10.
Which of the following events would be
most likely
to increase the quantity breakeven point, assuming
other factors remain constant?
A.
Reduced marketplace competition enables LMN Corporation to raise its selling price for finance textbooks.
B.
The city council has finally been persuaded: Your taxi business will pay lower water and sewer rates.
C.
The pressure has subsided: The property owner, who rents space to your small manufac.
1. write about 500 words about a watching response to The bicycle.docxKiyokoSlagleis
1. write about 500 words about a watching response to “ The bicycle chief”.
2. write about 500 words about “The Southern Question” in Italy.
The Southern Question” refers to the social and economic disparities (duality) that exist between the Northern and Southern regions of Italy. These differences, as well as their causes, have been the subject of research from a number of disciplines: anthropology, sociology, politics and economics.
please due on time. 1/20 19:00 (about 23 hours)
.
2. work security breaches are a common
method for taking sensitive information
from companies. The confidential infor-
mation can then be sold on the deep web
market, used to steal identities to open up
fake credit card accounts, or to blackmail
an individual or group (TrendMicro,
2018).
The first data breach of 2019 was
reported fewer than 24 hours into the new
year (Targett, 2019). Large corporations
dominate the news concerning incurred
Y
Jennifer Reeves,
Nova Southeastern University, Abraham S.
Fischler College of Education and School of
Criminal Justice, 3301 College Avenue,
Fort Lauderdale, FL 33314.
Email: [email protected]
Maureen McDermott,
Nova Southeastern University, Abraham S.
Fischler College of Education and School of
Criminal Justice, 3301 College Avenue,
Fort Lauderdale, FL 33314.
Email: [email protected]
Volume 16, Issue 3 Distance Learning 17
4. information is vulnerable and could end
up being shared with unintended recipi-
ents. Future breaches are predicted to be
even more creative and impactful, focusing
in on biometrics, mobile phones, cloud-
based storage, and gamers (Bayern, 2018).
Forbes contributor Kyle Torpey (2019) attri-
butes this seemingly endless cycle of data
breaches to the consumer’s desire for con-
venience overriding concerns about secu-
rity, and the willingness of malicious
hackers waiting for these opportunities.
DATA BREACHES BEFORE
THE INTERNET
Data breaches are not a new phenome-
non; breaches of paper records in the
United States have been traced back
almost 70 years. According to Solove
(2004), most centralized record keeping at
the national level in the United States was
done on paper for the Census. In the
1950s, the Social Security Administration
of the U.S. government assigned citizens
nine digit numbers and required strin-
gent reporting and record keeping of
Gabriela Mendez,
Nova Southeastern University, Abraham S.
Fischler College of Education and School of
Criminal Justice, 3301 College Avenue,
Fort Lauderdale, FL 33314.
Email: [email protected]
6. ital dossier” in the early 1980s. However,
the invasion of the digital dossier did not
pervade tech jargon rapidly. It reemerged
as “digital footprint” during the time
when the term “carbon footprint” per-
vaded mass media. In the mid 1990s, com-
mercial companies and private individuals
transformed websites into cyberspace
shopping experiences, thus opening the
Internet information superhighway for
business and cybercrime (Sommer, 1998).
BREACHING EDUCATION
With these recent revelations of breaches
involving social media applications, pri-
vacy and security concerns have emerged
for administrators, faculty, staff, students,
and parents. Academia is far from safe as
there has been noted cases of hacking and
data loss. In March of 2019, private colleges
Grinnell, Hamilton, and Oberlin reported
breaches (Smith, 2019). Grinnell and Ham-
ilton reported that applicants received
emails from someone who claimed to have
unauthorized access to their database con-
taining personally identifiable information.
These emails, which came from official col-
lege addresses, offered to sell them their
completed admission file which included
comments from admissions officers and
tentative decisions (M. Smith, 2019). A
spokesperson from Oberlin said their
applicants and students who enrolled
during or after the fall of 2014 did not
receive emails like the ones at Grinnell and
Hamilton; however, their names,
7. addresses, birthdays, emails, and Social
Security numbers were possibly exposed.
Oberlin suggested that fraud alerts should
be added to victim’s credit card reports. All
three colleges use software system Slate to
manage this information, and all three col-
leges reported this breach to Slate and the
Federal Bureau of Investigation (Smith,
2019).
In 2010, the Social Security numbers of
43,000 Yale affiliates became publicly avail-
able on Google because they had been
stored on servers that were also used to
hold open-source materials (Fuchs, 2018).
In July 2018, Yale notified about 119,000
faculty, staff, and alumni that their names
and Social Security numbers had been
compromised between the years of 2008
and 2009. This breach also compromised
some of the victims’ dates of birth, physical
addresses, and email addresses. The
breach occurred in September 2011 when
the university was clearing out unnecessary
personal data, and was not discovered by
Yale until June 2018. Yale offered to pay
Jason Karp,
University of North Carolina at Charlotte,
9201 University City Blvd.,
Charlotte, NC 28223.
Email: [email protected]
9. Even though parents may be able to
monitor what educational apps their chil-
dren use at home, they have little input
about what happens at school. The Elec-
tronic Freedom Foundation, a nonprofit
organization that defends digital privacy,
free speech, and innovation, identified
school-issued devices and education tech-
nology platforms as the most vulnerable
for data breaches. For these reasons, par-
ents should be asked for consent or given
the option to opt-out of education technol-
ogy.
On December 1, 2015, the Electronic
Frontier Foundation filed a lawsuit against
Google for data mining student’s personal
information and internet search histories
in Google Apps for Education and Google
Chromebook (Alim, Cardozo, Gebhart,
Gullo, & Kalia, 2017). Between December
15, 2015 and January 2017, the Electronic
Frontier Foundation posted a survey about
student privacy on their website and dis-
seminated links on their other social
media sources. Over 1,000 responses from
students, parents, teachers, and adminis-
trators were compiled into the report “Spy-
ing on Students” (Alim et al., 2017). It
raised concerns about technology usage
that tracks online student’s behavior
before they are old enough to understand
the implications of digital footprints, pri-
vacy, and security and addressed issues of
10. federal law, state law, and industry self reg-
ulation.
One legal measure is the federal law
Children’s Online Privacy Protection Act
which requires technology providers to
acquire parental consent before collecting
student’s personal information. Enforced
by the Federal Trade Commission, this law
includes consent requirements for technol-
ogy providers that are utilizing student
data for anything other than disclosed to
the school district. Verifiable parental con-
sent is required for any collection of identi-
fiable student information for students
younger than 13. The Federal Trade Com-
mission also offers a Student Privacy
Pledge voluntarily signed by ed tech com-
panies, but the Electronic Frontier Founda-
tion identified glaring loopholes in what
constitutes student information (Alim et
al., 2017).
DEVELOPING DIGITAL CITIZENS
Resulting from increased technology inte-
gration in brick and mortar classrooms and
the pervasiveness of distance education,
the International Society for Technology in
Education asserts that educators who use
applications to engage students must
“Model and promote management of per-
sonal data and digital identity and protect
student data privacy” (International Soci-
ety for Technology in Education, 2017,
para. 3). International Society for Technol-
ogy in Education (2019) encourages the
12. active and passive. A passive digital foot-
print is a data trail users unintentionally
leave online. When connecting to the
Internet, websites detect IP addresses and
locations and download cookies, and
search engines save users’ histories auto-
matically with no detection. In the past few
years, many websites have eliminated this
potential for passive footprints by adding
pop-up boxes that ask users to read the
terms of service and acknowledge agree-
ment by simply checking a box before
entering the site (McDermott, 2018).
Active footprints, on the other hand,
refer to the data trail users know they are
leaving—including signing into social
media sites such as Facebook, YouTube,
Twitter, Pinterest, Instagram, Snapchat,
and various educational learning manage-
ment systems such as Google Classroom,
Canvas, and Blackboard. Even “liking”
pages, posts, or photos on social media or
commenting with an icon to a classmate’s
discussion board posting contributes to a
user’s digital footprint.
These active footprints generate when
users retrieve email for work and school, as
well as when accessing company websites
and learning management systems.
Regardless of whether digital footprints
are active or passive, privacy and security
are areas for concern. Although privacy
and security are not synonymous, what
13. they have in common is that people don’t
usually know there is a problem until it has
happened already and is broadcast over
the news (McDermott, Reeves, Capo, Men-
dez, & Karp, 2019). Even when users select
the most stringent privacy options involv-
ing how their data are displayed, stored,
used, and shared—this does not guarantee
security from data hackers. Security
involves how companies protect informa-
tion users agree to share, so when some-
thing is hacked both security and privacy
are compromised.
EVALUATING SECURITY
Before generating digital footprints, con-
sumers and educators should understand
a company’s security policy. According to
Smith (2018), one of the strongest security
indicators of a website is the first few let-
ters on the browser address bar. Early web-
site addresses started with HyperText
Transfer Protocol (HTTP), the procedure
that allowed network administrators to
share information. Unfortunately, inter-
cepting the information was almost as sim-
ple as it was to share it, so an encryption
encoding system was developed called
HyperText Transfer Protocol Secure
(HTTPS). Computers using HTTPS send
and receive messages through the Secure
Sockets Layer or the Transport Layer Secu-
rity protocol which validates security cer-
tificates (Sheldon, 2017). Both Sheldon
(2017) and P. Smith (2018) recommend con-
sumers verify five important things prior
15. tistics, 2019). Malicious outsiders were
responsible for more than half of all
breaches in 2018, followed by accidental
loss. When looking at the loss by industry,
social media accounts for more than half of
the industry breaches in 2018 with
2,739,445,349 records stolen (Data
breach statistics, 2019). Breach Line also
reported that education had the second
lowest number of data breaches at 0.27%;
however, this still includes 12,984,701
compromised records in 2018 alone!
Sheldon (2017) reported that the high-
est threats to mobile app security come
from broken cryptography, unintended
data leakage, weak server side controls, cli-
ent side injection, and poor authorization
and authentication. P. Smith (2018) sug-
gested making good choices in regard to
safety such as not disclosing too much
online, not accepting friend requests or
personal messages from strangers, and
blocking people who write or display inap-
propriate things. When evaluating for
security, users should investigate if websites
scan for robots. There are many types of
“bots” which scan websites that save the
contents of every page in the search index.
Bots can also be detected when users share
networks with others on proxy services,
work or school networks, virtual private
networks, and websites such as Amazon,
EC2, and Google App Engine. Chat bots
monitor for appropriate language and
“chatterbots” respond to messages appear-
16. ing to be an actual person. However, some
bots contain malware that raid email
address books to link them to spam mail-
ing lists. Other bots raid entire computer
systems, duplicate content, and then infect
them with viruses (Christensson, 2014).
The security section from Pinterest
(2019) entitled “We protected your
account” provides examples of some secu-
rity concepts users should know. It advises
users to save Pins from original sources,
and use full links instead of using a redi-
rect like bit.ly or other link shorteners. Pin-
terest’s security features enable account
blocking when it detects a bot or if users do
one or any of the following: log in fre-
quently, comment or save Pins quickly, and
follow several people rapidly.
Additionally, Pinterest’s first require-
ment compels users to verify they are at
least 13. Other security tips (from their
website) include activating two-factor
authentication, connecting the account to
Google or Facebook, verifying current
email, and changing passwords regularly.
Pinterest also retains the rights to suspend
accounts if they believe users have violated
the website’s acceptable use policy. Pinter-
est also has a user-friendly contact page if
users have been blocked and not restored
within 24 hours.
EVALUATING PRIVACY POLICIES
18. evaluate companies’ privacy policies
regarding personal data. The questions
address numerous topics such as definition
of terms to examining data sharing prac-
tices and individuals’ rights and legal
recourse. They also recommend inquiring
about companies with which personal data
will be shared, whether these companies
are prevented from using advertising or
selling data, and the reasons for disclaim-
ers of liability.
The Education Privacy Resource Center
of FERPA/Sherpa (2019) offers recommen-
dations for using applications in the class-
room. This set of best privacy practices
recommends using products and apps
approved by the school district, given that
school districts need to evaluate the tools
for privacy and security prior to adoption.
FERPA/Sherpa also include a list of 10
questions to help individuals evaluate
whether apps and other online products
protect students’ information. The ques-
tions focus on the collection of personally
identifiable data, vendor’s commitment
not to share information, the inclusion of
advertisement within the learning product,
and claims regarding change of privacy
policies.
FERPA/Sherpa (2019) also recommend
websites that can be used to evaluate com-
pany privacy policies. One designated as
very useful is commonsense.org, devel-
oped by Common Sense, a nonprofit orga-
19. nization dedicated to making the
technological world a better place for chil-
dren. Commonsense.org has three main
areas: (a) a parent portal with a plethora of
information about current technology and
popular apps, movies, books, games, and
TV shows; (b) an educator portal with les-
sons, games, and resources on digital citi-
zenship; and education technology
reviews, videos, and privacy evaluations;
and (c) an advocacy area for those wanting
to help keep our kids safe.
Common Sense determines some of its
recommendations based on App Triage, a
detailed privacy evaluation workflow (Fitz-
gerald, 2016). Staff members review the
privacy terms present, create sample
accounts, use app data to verify privacy
information provided, and verify that
terms of privacy and service policies are
linked correctly when users are logged in.
They also evaluate social app sharing poli-
cies by testing them from accounts created.
When evaluating websites termed “https”
the staff verifies the same site cannot be
found with just “http.” Fitzgerald said the
information is freely available and can be
used by anyone. However, these steps are
time-consuming and the policies are diffi-
cult to read. Therefore, Common Sense
compiled an easily searchable database of
app evaluations. Because policies change
over time (Kelly, 2019), Common Sense
developed a tool which uses an open
source software (named Wdiff) into its pol-
20. icy annotator to scan the policies and
determine the actual policy changes. Then
they update the original app’s policy eval-
uation in the database (Kelly, 2019).
In order to use this evaluation tool,
users simply enter the name of the app,
game, or website in the search area at
https://privacy.commonsense.org/ (Com-
mon Sense, n.d.-a) and click enter. The
results provide a synthesis of the evalua-
tion that includes a recommendation for
use (i.e., use responsibly, use with caution, not
recommended); an overall score of the app
(ranging from 0 to 100 and based on
answers to the Common Sense’s evaluation
questions); whether advertising is dis-
played; and whether the company sells or
rents data to third parties, shares data for
advertising or marketing, uses data to tar-
get advertisements, or allows third parties
to use the data for advertising. Figure 1
presents the privacy evaluation of ABC-
mouse.com, which has a use responsibly rec-
ommendation. In contrast, Figure 2
illustrates the privacy evaluation of Pinter-
est, which has a use with caution recommen-
Volume 16, Issue 3 Distance Learning 23
IAP
PR
OO
23. nology in Education, 2019).
The growth of educational technology
will always outpace legal and ethical
understanding concerning digital foot-
prints, privacy and security; therefore,
the implications seem insurmountable.
Ironically, one of the best ways to stay
ahead of the curve is to educate oneself by
reviewing the nonprofit websites devel-
oped by International Society for Technol-
ogy in Education, Common Sense, and
Electronic Frontier Foundation. These
websites provide digital tips for adult usage
as well as parental guidance for minors.
The websites also advocate professional
development for teachers and offer online
training modules, but it is up to the
administration to provide professional
development time.
Developing digital citizenship through
this type of education has the capacity to
empower everyone to avoid unnecessary
risks concerning digital footprints, privacy,
and security. However, the risks are too
high to leave the solution to isolated indi-
viduals. Consistent review of these non-
profit websites and other resources should
be a part of multiple strategies imple-
mented. Schools need an organized
approach to include not only professional
development, but also a curriculum that
integrates digital citizenship as necessary
knowledge that is essential for digital liter-
25. Christensson, P. (2014, February 14). Bot defini-
tion. Retrieved from https://techterms.com
Data breach statistics. (2019). Retrieved from
https://breachlevelindex.com/
Common Sense. (n.d.). Privacy evaluations.
Retrieved from https://privacy.common-
sense.org/
Common Sense. (2019a). Privacy evaluation for
ABC Mouse. (Infographic). Retrieved from
https://privacy.commonsense.org/evalua-
tion/ABCmouse.com
Common Sense. (2019b). Privacy evaluation for
Pinterest. (Infographic). Retrieved from
https://privacy.commonsense.org/evalua-
tion/Pinterest Copyright 2019.
Common Sense. (2019c). EdTech review of Pin-
terest. (Infographic). Retrieved from https://
www.commonsense.org/education/app/pin-
terest
Davis, J. (2019, January 23). Massive data breach
exposes 773 million emails, 21 million pass-
words. Retrieved from https://
securitytoday.com/articles/2019/01/23/
massive-data-breach-exposes-773-million-
emails-21-million-passwords.aspx
Dennen, V. P. (2015). Technology transience and
learner data: Shifting notions of privacy in
online learning. The Quarterly Review of Dis-
26. tance Education, 16(2), 45–49.
FERPA/Sherpa. (2019). Best privacy practices for
using apps in the classroom. Retrieved from
https://ferpasherpa.org/educators/using-
apps-in-the-classroom/
Fitzgerald, B. (2016, July 20). Evaluating apps,
step by step. Retrieved from https://
www.commonsense.org/education/privacy/
blog/evaluating-apps-step%20-by-step
Francis, J. (2018, September 3). Hoopeston area
school district hacked. Retrieved from https:/
/foxillinois.com/news/local/hoopeston-
school-district-hacked
Fuchs, H. (2018, August 2). A decade later, Yale
discovers major data breach. Retrieved from
https://yaledailynews.com/blog/2018/08/02/
a-decade-later-yale-discovers-major-data-
breach/
Haimson, L. (2017, August 31). Parents rebel
against Summit/Facebook/Chan-Zuckerberg
online learning platform. Retrieved from
https://www.studentprivacymatters.org/
parents-rebel-against-summitfacebookchan-
zuckerberg-online-learning-platform/
International Society for Technology in Educa-
tion. (2017). Standards for education.
Retrieved from https://www.iste.org/stan-
dards
27. International Society for Technology in Educa-
tion. (2019). Digital citizenship in education.
Retrieved from https://www.iste.org/learn/
digital-citizenship
Kelly, G. (2019, April 11). Our privacy evalua-
tion process keeps track of policy changes so
you do not have to. Retrieved from https://
www.commonsense.org/education/articles/
how-we-keep-track-of-privacy-policy-
changes
Luke, S., & Stuckney, R. (2018, December 21).
Data breach might impact 500,000 San Diego
Unified School District students, former stu-
dents, and some staff. Retrieved from https://
www.databreaches.net/data-breach-might-
impact-500000-san-diego-unified-school-
district-students-former-students-and-some-
staff/
Mariwala, J., & McCooey, S. (2018, October 22).
Second data breach lawsuit filed against
Yale. Retrieved from https://yaledaily-
news.com/blog/2018/10/22/second-data-
breach-lawsuit-filed-against-yale/
McDermott, M. (2018). Digital footprints: Cre-
ation, implication, and higher education.
Distance Learning, 15(1), 51–54.
McDermott, M., Reeves, J. L, Capo, B., Mendez,
G., & Karp, J. (2019, January). Digital foot-
prints, privacy, and security: I know what
you did last summer! Presentation at the
meeting of the Florida Distance Learning
28. Association, Orlando, FL.
Pinterest. (2019). We protected your account.
Retrieved from https://help.pinterest.com/
en/article/we-protected-your-account
Sheldon, R. (2017, December). A mobile app
security checklist for developers. Retrieved
from https://searchmobilecomputing
.techtarget.com/tip/A-mobile-app-security-
checklist-for-developers
Copyright of Distance Learning is the property of Information
Age Publishing and its content
may not be copied or emailed to multiple sites or posted to a
listserv without the copyright
holder's express written permission. However, users may print,
download, or email articles for
individual use.
Task #2: Thesis & Summary Worksheet
The purpose of this task is to determine which evaluative
criteria you will be utilizing and to prepare for the Article
Review assignment. The worksheet will be divided into two
parts – Thesis and summary. Please answer the following
questions.
Part 1: Evaluative Thesis
1.
Which article have you chosen to use for your Article Review
assignment? Remember that it needs to be at least 5 pages long
and have a credibility rating of 4 or higher. Please write
the reference for the article in proper APA format:
29. 2.
1.
Bearing in mind the 3 Es (Education, Experience, and
Expertise), please list the credentials of the author.
2.
1.
From the credentials, do you feel the author may have
any bias towards a certain topic or a group? Why or why not?
2.
1.
What is the main argument/thesis of the article (What is the
author trying to prove)?
2.
1.
From what perspective(s) do you think the author is trying to
prove this point?
2.
1.
Do you believe this article is effective (+) orIneffective (-)?
Please highlight one.
2.
1.
Please list two evaluative criteria supporting your overall
evaluation.
2.
1.
______ : Why do you think so?
2.
2) _______: Why do you think so?
30. 1.
Please list one criterion that goes against your overall
evaluation:
2.
1.
_______: Why do you think so?
2.
Finally, based on the above information, try writing the thesis
statement for your article review here, following this formula:
Thesis Pattern:
POSITIVE (+) evaluation
NEGATIVE (-) evaluation
Although (-) evaluative criterion #1,
[Author’s last name (year)] writes an effective article
because (+) evaluative criteria #2 and (+) evaluative criteria #3.
Although (+) evaluative criterion #1,
[Author’s lastname (year)] writes an ineffective article
because (-) evaluative criteria #2 and (-) evaluative criteria #3.
Part 2: Summary
Explain how the author unfolds the main argument using
effective time-transition words and
reporting verbs: begins, continues, asserts, explains, illustrates,
suggests, concludes, compares, contrasts, adds to, expands…
Example Pattern:
Author’s last name (year) states/explains/illustrates ... [general
main argument]
To start/ At first, Rapaport begins/refers that ….
Then, the author asserts/elaborates/expands that ….
After that, Rapaport continues/describes/adds that …
31. In the end/Finally, the author suggests/concludes ….
Based on the above information, please write a summary for
your article review here. (150 words)
1
3
A Review of “From the middle to the margins: addressing job
insecurity, income inequality and social fragmentation”: Article
Review
Jinrong Zhao
International Degree Completion, Trinity Western University
ENGL 101: Introduction to Writing
Professor Jean Jeon
February 12, 2021
A Review of “From the middle to the margins: addressing job
insecurity, income inequality and social fragmentation”: Article
Review
32. Lafferty, G. (2015). From the middle to the margins: addressing
job insecurity, income
inequality and social fragmentation. SAGE Journals, 29(2), 354-
360. https://doi.org/10.1177%2F0950017015569833
Introduction
In the article “From the middle to the margins: addressing job
insecurity, income inequality and social fragmentation”, George
Lafferty (2015) explains that why income equality is a
significant problem that the gap between the poor and the rich
keeps increasing in the society by reviewing two books, the
Squeezed middle and worker marginals, with sociological
perspective. George Lafferty has a bachelor's degree in politics
and sociology at Griffith University and holds a Ph.D. in
political theory at the University of Queensland. Lafferty
previously worked at the University of Queensland and Griffith
University as a senior lecturer. He was also a professor and
director of the Industrial Relations Centre, Victoria University
of Wellington, New Zealand. Lafferty has published on political
topics in international journals and books, and has also
participated in various government policy bodies rel ated to
employment and industrial relations. Although the main
argument of the writing does not consider different
perspectives, Lafferty (2015) writes an effective article
because the organization is legible and the writing style used
fits the purpose of the writing.
Summary
Lafferty (2015) states that the books, worker marginals and the
squeezed middle, are addressing the same issues, which are job
insecurity, income inequality and social fragmentation. To start,
Lafferty begins that the U.S. has a failure in solving economic
inequality because the U.S. government implements an incorrect
economic policy that favors the rich than the poor. Then, the
author elaborates that the living standard of the middle class in
both the U.S. and the UK is dropping by mentioning that the
middle-class family incomes have grown slow behind economic
growth rates since the 1970s. After that, the author continues
33. with evaluating the book of Worker Marginals that workers’
rights are currently not protected very well. He adds that non-
citizens immigrants are often discriminated by employers with
poor working condition and lower pay. In the end, the author
concludes that labor rights remain a challenging issue in the
current U.S. society.
Body Paragraph
Although the article is effective, the main argument of the
writing does not consider different perspectives. In more detail,
the author is only focusing on proving his own argument that he
does not consider other points of view. In the article, Lafferty
(2015) compares those two book that “[…] they concentrate on
the USA and the UK, the issues raised and the strategies
developed are relevant for other developed nations in the era of
neoliberal globalization” (p.354). Clearly, the author explains
the issues mentioned in the books also apply to other developed
countries. He does not consider that every country has different
culture backgrounds and social structures. This reveals that the
author is not taking the full consideration of other perspectives.
In addition, the article also highlights the key of solving income
inequality is that “A social-democratic agenda of progressive
taxation and public spending no doubt remains valid and indeed
urgently necessary in policy terms” (Lafferty, 2015, p.359).
This suggests that the author argues progressive taxation and
public spending will be the solution to the issue of income
inequality. In fact, there are politicians convey that progressive
taxation may cause a new issue which is capital flight. Based on
the author’s background, he has bias on the poor, so he ignores
that the rich are the economic engine. Therefore, although the
article is effective, the author does not take full consideration
on other points of view.
However, the article is effective because of the legible
organization. More specifically, the author divides the essay
into four sub-headings. At the beginning and the end of the
article, the author writes the sub-heading like “Introduction”
and “Conclusion”. Clearly, these two sub-heading are making
34. the structure clear for the reader to read. At the same time, they
are also making this article more logical that the reader will be
easy to follow. Not only this, the author also writes two sub-
headings “Retrieving the middle” and “Contesting the margins”
to clarify the structure of the body. With this in mind, this
suggests the author is explaining the books “The Squeezed
Middle” and “Marginal Workers” separately. He introduces the
theme of those two books with thorough sub-headings. It will
lead to a clear interpretation for the reader. Thus, this essay is
effective because it expresses a legible organization to the
reader through clear sub-headings.
The article is also effective because writing style used fits
the purpose of the writing. In more detail, the author writes
academic vocabulary that can be understood by the intended
reader. In the article, the author explains the theme of the book
“The Squeezed Middle” that “The second theme examines the
policy lessons drawn from analysis of declining ‘middle-class’
family living standards in both countries” (Lafferty, 2015, p.
355). Clearly, the author tends to demonstrates the relationship
between the middle class and economic policy. In this sentence,
there is no economic jargon used, but they are all academic
vocabularies frequentl y used in academic writing. In addition,
Lafferty (2015) mentions the unfair treatment of foreign
workers that “Non-citizen immigrants formally possess almost
as many legal protections as citizens” (p.357). With this in
mind, the author conveys that foreign workers are not treated
fairly although they have the same legal protection. The writing
style is concise and can be interpreted by the intended readers.
Moreover, this articles is written professionally in a way that it
contains university-level words. Therefore, this article uses the
effective writing style that fits the purpose of the writing.
Conclusion
In conclusion, this article is effective because of legible
organization and professional writing style. Overall, it is an
effective and influential essay even though it has weakness in
its main argument. This article would be useful for politicians
35. who wish to study income inequality because it explores deeply
on the issue of income inequality by comparing two academic
books.