CNL-521 Topic 3: Vargas Case Study
Bob and Elizabeth arrive together for the third session. As planned, you remind the couple that the goal of today’s session is to gather information about their families of origin. Bob begins by telling you about his older sister, Katie, who is 36 and lives nearby with her three children. Katie’s husband, Steve, died suddenly last year at the age of 40 when the car he was driving hit a block wall. Elizabeth speculates that Steve was intoxicated at the time, but Bob vehemently denies this allegation. He warns Elizabeth to “never again” suggest alcohol was involved. You note Bob’s strong response and learn that his own biological father, whom his mother divorced when Bob was 3 and Katie was 5, had been an alcoholic. When asked about his father, Bob says, “His name is Tim, and I haven’t seen him since the divorce.” Bob shares that he only remembers frequently hiding under the bed with Katie to stay safe from his violent rages. He adds that 5 years after the divorce, his mother, Linda, married Noel who has been “the only dad I’ve ever known.” He insists that his sister married “a devout Christian who never touched alcohol” and attributed the 3:00 a.m. tragedy to fatigue. He adds that a few days before the accident, Katie had complained to him that her husband had been working many late nights and “just wasn’t himself.” Bob speaks fondly of his sister and confirms that they have always been “very close.”
From Elizabeth, who is 31 years old, you learn that she was adopted by her parents, Rita and Gary, who were in their late 40s at the time. They were first generation immigrants who had no family in the United States. Their biological daughter, Susan, had died 10 years earlier after Rita accidentally ran over the 5 year old while backing out of the driveway. Elizabeth surmises that her mother never fully recovered from this traumatic incident and remained distant and withdrawn throughout Elizabeth’s life. Elizabeth describes her father, Gary, as “a hard worker, smart, and always serious.” She shares that most of her family memories were of times spent with her dad in his study, surrounded by books. She states, “He could find the answer to all of my questions in one his many books.” Elizabeth describes herself as the “quiet, bookish type” and attributes her love for books to her father. Like her father in his study, Elizabeth remembers spending most of her adolescence alone in her room, reading, so she would not upset her mother. Looking back, Elizabeth tells you she recognizes her mother’s struggle with depression, “but as a kid, I thought it was me.”
You comment on the vastly different childhood experiences and normalize the potential for relationship challenges under these circumstances. Acknowledging the differences, Elizabeth remarks that Bob’s relationship with his family was one of the things that she was attracted to early in their relationship. Bob agrees with her and comments that Katie and Elizabeth.
Essays For Sale Online. Custom essays for saleErin Anderson
Essays for sale: the booming online industry in writing academic work .... Custom Written Essays for Sale. 400+ Essay for sale ideas in 2021 | essay, college essay, writing services. Buy essays online from successful essay education essay. Find the best essay for sale. School essay: Narrative essay for sale. Management essay for sale - Buy an Essay Online for Cheap 24/7 .... How to Write In College Essay Format | OCC NJ. Essays-for-Sale.org Review: Trustworthy Service to Get Your Paper Done at. Essay Samples for Sale - Writterly. Cheap Custom Essays Online: Write Essays Online. Online Purchase Essay! WHY YOU SHOULD AVOID PURCHASING ESSAY ONLINE. Buy original essays online qwehli.com. Sell your essays online - College Homework Help and Online Tutoring.. Buy cheap essays online by customassignments - Issuu. EssayForSale.net: Essays for Sale to Be the College Hero - Techicy. Bulevar 30 Using The Best Essays for Sale, Buy Essay for Money Online .... Buy pre written essay. Sensational Buy Essay Online ~ Thatsnotus.
Persuasive Essay On Exercise. Persuasive Writing Examples - Year 4-6 - Primar...Veronica Johnson
50 Free Persuasive Essay Examples (+BEST Topics) ᐅ TemplateLab. Business paper: Persuasive essay on exercise. Examples of persuasive writing for KS2/3 | Teaching Resources. Persuasive Writing Worksheet Pack - No Prep Lesson Ideas | Persuasive .... Contoh Essay Pendek – Ilustrasi. Persuasive Writing Examples - Year 4-6 - Primary Resource. (GCSE) Persuasive essay- "Exercise should be an important part of the .... How to Write Perfect Persuasive Essays in 5 Simple Steps. Persuasive essay: Essay writing exercise. Persuasive Essay Topics for Middle School Students | Persuasive essay .... Persuasive essay on importance of exercise - writefiction581.web.fc2.com. 48 Amazing Persuasive Essay Examples – RedlineSP. writing persuasive essay worksheet - Free ESL printable worksheets made .... Persuasive Texts - Ten Reading Samples with Comprehension | Persuasive .... Persuasive Writing Comprehension - Fun, Fantastic, Fabulous Fitness .... Write a persuasive essay using this structured exercise! Hook your .... Exercise Essay Writing - Importance of Exercise – Essay, Speech .... Persuasive Writing Handouts - No Prep Printables | Persuasive writing .... How to Write a Persuasive Essay - A Complete Guide. 10 persuasive essay samples to help students understand the features .... Persuasive essay examples for 6th graders – Help in writing an essay .... how to write persuasive essay - ESL worksheet by minerva88 Persuasive Essay On Exercise
Prof. Lawrence Haddad, Director of the Institute of Development Studies, Sussex, UK talks about how President Elect Obama may affect international development
Essay Modern Technology. Technology Essay - How to write an essay about techn...Janet Jackson
Technology Essay | Essay on Technology for Students and Children in .... 001 P1 Essay On Technology ~ Thatsnotus. Unforgettable Introduction About Technology Essay ~ Thatsnotus. An essay on modern technology.
Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docxmary772
Coding Notes
Improving
Diagnosis
By Jacquie zegan, CCS, wC
Specificity in ICD-IO Coding
VALID ICD-IO-CM/PCS (ICD-IO) codes have been required for claims reporting since October 1, 2015. But ICD-IO diagnosis coding to the correct level of specificity—a more recent requirement—continues to be a problem for many in the healthcare industry. While diagnosis code specificity has always been the goal, providers were granted a reprieve in order to facilitate implementation of ICD-IO. For the first 12 months of ICD-IO use, the Centers for Medicare and Medicaid Services (CMS) promised that Medicare review contractors would not deny claims "based solely on the specificity of the ICD-IO diagnosis code as long as the physician/practitioner used a valid code from the right family."l Commonly referred to as the "grace period," this flexibility was intended to help providers implement the ICD-IO-CM code set and was never intended to continue on in perpetuity. In fact, this CMS-granted grace period expired on October 1, 2016.2
Unfortunately, nonspecific documentation and coding persists. This is an ongoing problem, even though the official guidelines for coding and reporting require coding to the highest degree of specificity. Third-party payers are making payment determinations based on the specificity of reported codes, and payment reform efforts are formulating policies based on coded data. The significance of overreporting unspecified diagnosis codes cannot be understated. In the short term, it will increase claim denials, and in the long term it may adversely impact emerging payment models.3•4 Calculating and monitoring unspecified diagnosis code rates is critical to successfully leverage specificity
44/Journal of AHIMA April 18
in the ICD-IO-CM code set.
An ICD-IO-CM code is considered unspecified if either of the terms "unspecified" or "NOS" are used in the code description. The unspecified diagnosis code rate is calculated by dividing the number of unspecified diagnosis codes by the total number of diagnosis codes assigned. Health information management (HIM) professionals should be tracking and trending unspecified diagnosis code rates across the continuum of care.5
Acceptable use of Unspecified Diagnosis Codes Unspecified diagnosis codes have acceptable, even necessary, uses. The unspecified code rate is not an error rate, but rather an indicator of the quality of clinical documentation and a qualitative measure of coder performance and coding results. Even CMS explicitly recognizes that unspecified codes are sometimes necessary. "When sufficient clinical information is not known or available about a particular health condition to assign a more specific code, it is acceptable to report the appropriate unspecified code."6 It's also important that coding professionals use good judgment to avoid unnecessary queries for clarification of unspecified diagnoses. The official coding guidelines provide explicit guidance for appropriate uses of unspec.
Cognitive and Language Development Milestones Picture Book[WLO .docxmary772
Cognitive and Language Development Milestones Picture Book
[WLO: 1] [CLO: 1]
Prior to beginning work on this assignment,
Review Chapters 6, 7, and 9 of your text.
Review the cognition and language development milestones from the Centers for Disease Control and Prevention on the web page
Basic Information (Links to an external site.)
.
Identify one age-group that you will discuss:
Infancy: Birth to 12 months
Toddler: 1 to 3 years
Early childhood: 4 to 8 years
Review and download the
Cognitive and Language Development Milestones Picture Book Template.
The purpose of this assignment is to creatively demonstrate an understanding of developmental milestones as they pertain to cognition and language development.
Part 1:
Based on the required resources above, create a children’s picture book using
StoryJumper (Links to an external site.)
that tells a story about a child’s typical day. Your story must incorporate at least four cognitive and four language development milestones for the age-group you have selected. Your story can be about a fictional child or can be based on a real child. Watch the video,
StoryJumper Tutorial (Links to an external site.)
, for assistance in using StoryJumper.
To complete this assignment, you must
Create a children’s picture book using StoryJumper.
Identify at least four cognitive development milestones appropriate to the age-group selected.
Distinguish at least four language development milestones appropriate to the age-group selected.
Discuss a typical day appropriate to the age-group selected.
Part 2:
Open the
Cognitive and Language Development Milestones Picture Book Template
and complete the following items:
Provide the link to the StoryJumper picture book you created in Part 1.
Indicate which age-group your picture book will discuss.
List at least four cognitive development milestones that are included in your picture book.
List at least four language development milestones that are included in your picture book.
Submit your Word document to Waypoint.
The Cognitive and Language Development Milestones Picture Book:
Must be eight to 10 pages of text in length (not including title page, images, and references page) and formatted according to APA style as outlined in the Ashford Writing Center’s
APA Style (Links to an external site.)
Must include a separate title page with the following:
Title of picture book
Student’s name
Course name and number
Instructor’s name
Date submitted
Must document any information used from sources in APA style as outlined in the Ashford Writing Center’s
Citing Within Your Paper (Links to an external site.)
Must include a separate references page or slide that is formatted according to APA style as outlined in the Ashford Writing Center. See the
Formatting Your References List (Links to an external site.)
resource in the Ashford Writing Center for specifications.
CHAPTER 6 SUMMARY
Piaget’s Cognitive-Developmental Theory.
Codes of (un)dress and gender constructs from the Greek to t.docxmary772
Codes of (un)dress and gender constructs
from the Greek to the Roman world
he
By 6th c. BC: Greek male and female dress codes firmly established
Archaic kouros
and kore statues
demonstrate how
the body was
used in the
naturalization of
gender
constructs
The naked male
body in the
classical period:
the Doryphoros as
a heroic athlete-
warrior citizen
Male sexuality: conditions by the patriarchal ideology of
domination, it restricted sexual expression and freedom
in homosexual
relations
and heterosexual
relations
In the classical
period,
while the naked
male body was
idealized and
heroized,
the female naked
body was always
sexualized and
objectified.
Centauromachy (late 5th c.
Bassae): the Greek female is
defenseless and sexualized
(must be defended by Greek
men).
Gendered
nakedness in
mythological
scenes:
the Greek
male is
always
heroized
Amazonomachy (4th c.
Halikarnassos): the non-
Greek female is wild and
sexualized (must be
dominated by Greek men).
Aphrodite (Roman Venus): at first fully dressed
The gradual disrobing of Aphrodite in monumental statues, late 5th to
4th c. BC (Roman copies)
“Venus Genetrix”,
original late 5th c. BC
“Venus of Capua”,
original 4th c. BC
Aphrodite of Knidos,
original 4th c. BC
Late 5th c. onwards: minor goddesses were also represented sexualized in
statues, but only Aphrodite appeared entirely naked by the 4th c. BC.
Nike (Victory), late
5th c., Olympia.
Aphrodite of Knidos by
Praxiteles, 4th c. (Roman copy)
Aphrodite “Beautiful
Buttocks”, Roman
copy (Greek ca. 300).
Doryphoros and
Aphrodite of Knidos
(Knidia or Knidian
Aphrodite), Roman
copies.
What main
differences do you
observe?
Was her nakedness
really threatening to
patriarchy (Andrew
Stewart)?
Or, in what ways
was her nakedness
aligned with
patriarchal ideology?
Could she have been
empowering for
women?
The traditional visual
presence of a divine
statue at the far end of
a rectangular temple
was very different
(Olympian Zeus)
Aphrodite of Knidos was displayed in an unusual temple (round plan), so as to
be seen from all sides, like a beautiful object.
The original
Aphrodite of
Knidos is lost.
Numerous
Roman copies
of the Knidian
Aphrodite exist
(with variations
in details).
“Colonna
Venus” Vatican
Museums.
“Ludovisi
Venus”,
Palazzo
Altemps, Rome
(only the torso
is ancient, the
rest is 17th-c,
restoration.)
Capitoline Venus, Rome
Medici Venus, Florence
Variations on the
“Venus pudica” type,
Greek Hellenistic
originals, Roman
copies.
Are they more modest
or also more shamed?
Latin pudore: modesty,
chastity, shame.
Greek aidos: shame,
modesty
(aidion=vagina)
There is no male “pudicus”
type in Greco-Roman
sculpture.
These unequal gender
constructs are still around
today,
to the detriment of all of us!
There is no male
“pudicus” type in Greco-
Roman sculpture.
An effec.
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docxmary772
Coding Assignment 3
CSC 330: Advanced Data Structures, Spring 2019
Released Monday, April 15, 2019
Due on Canvas on Wednesday, May 1, at 11:59pm
Overview
In this assignment, you’ll implement another variant of a height-balancing tree known as a
splay tree. The assignment will also give you an opportunity to work with Java inheritance;
in particular, the base code that you’ll amend is structured so that your SplayTree class
extends from an abstract class called HeightBalancingTree, which gives a general template
for how a height-balancing tree should be defined.
As always, please carefully read the entire write-up before you begin coding your submission.
Splay Trees
As mentioned above, a splay tree is another example of a height-balancing tree — a binary
search tree that, upon either an insertion or deletion, modifies the tree through a sequence
of rotations in order to reduce the overall height of the tree.
However, splay trees differ from the other height-balancing trees we’ve seen (AVL trees,
red-black trees) in terms of the type of guarantees that they provide. In particular, recall
that both AVL trees and red-black trees maintain the property that after any insertion or
deletion, the height of the tree is O(log n), where n is the number of elements in the tree.
Splay trees unfortunately do not provide this (fairly strong) guarantee; namely, it is possible
for the height of a splay tree to become greater than O(log n) over a sequence of insertions
and deletions.
Instead, splay trees provide a slightly weaker (though still meaningful) guarantee known as
an amortized bound, which is essentially just a bound on the average time of a single opera-
tion over the course of several operations. In the context of splay trees, one can show that
over the course of, say, n insertions to build a tree with n elements, the average time of each
of these operations is O(log n) (but again, keeping in mind it is possible for any single one
of these operations to take much longer than this).
Showing this guarantee is beyond the scope of this course (although the details of the analy-
sis can be found in your textbook). Instead, in this assignment, we will just be in interested
1
r splay:
N
root
root
2
1
1
2
l splay:
N
1
2
rr splay:
N
N
N
ll splay:
rl splay:
1
2
N
lr splay:
Figure 1: Illustration of the six possible cases for on a given step of a splay operation.
in writing an implementation of a splay tree in Java that is structured using inheritance.
Splay Tree Insertions and Deletions
To insert or delete an element from the tree, splay trees use the same approach as the other
height-balancing trees we’ve discussed in class — first we insert/deletion an element using
standard BST procedures, and then perform a “height-fixing” procedure that rebalances the
tree. Thus, what distinguishes each of these height-balancing trees from one another is how
they define their height-fixing procedures.
To fix the tree after both inser.
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docxmary772
CodeZip/ButtonDemo.javaCodeZip/ButtonDemo.java// Demonstrate a push button and handle action events.
import java.awt.*;
import java.awt.event.*;
import javax.swing.*;
publicclassButtonDemoimplementsActionListener{
JLabel jlab;
JTextField jtf;
ButtonDemo(){
// Create a new JFrame container.
JFrame jfrm =newJFrame("A Button Example");
// Specify FlowLayout for the layout manager.
jfrm.setLayout(newFlowLayout());
// Give the frame an initial size.
jfrm.setSize(220,90);
// Terminate the program when the user closes the application.
jfrm.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
// Make two buttons.
JButton jbtnUp =newJButton("Up");
JButton jbtnDown =newJButton("Down");
// Create a text field.
jtf =newJTextField(10);
// Add action listeners.
jbtnUp.addActionListener(this);
jbtnDown.addActionListener(this);
// Add the buttons to the content pane.
jfrm.add(jbtnUp);
jfrm.add(jbtnDown);
jfrm.add(jtf);
// Create a label.
jlab =newJLabel("Press a button.");
// Add the label to the frame.
jfrm.add(jlab);
// Display the frame.
jfrm.setVisible(true);
}
// Handle button events.
publicvoid actionPerformed(ActionEvent ae){
if(ae.getActionCommand().equals("Up")){
jlab.setText("You pressed Up.");
FileClock clock1=newFileClock(jtf);
Thread thread1=newThread(clock1);
thread1.start();
}
else
jlab.setText("You pressed down. ");
}
publicstaticvoid main(String args[]){
// Create the frame on the event dispatching thread.
SwingUtilities.invokeLater(newRunnable(){
publicvoid run(){
newButtonDemo();
}
});
}
}
CodeZip/CBDemo.javaCodeZip/CBDemo.java// Demonstrate check boxes.
import java.awt.*;
import java.awt.event.*;
import javax.swing.*;
publicclassCBDemoimplementsItemListener{
JLabel jlabSelected;
JLabel jlabChanged;
JCheckBox jcbAlpha;
JCheckBox jcbBeta;
JCheckBox jcbGamma;
CBDemo(){
// Create a new JFrame container.
JFrame jfrm =newJFrame("Demonstrate Check Boxes");
// Specify FlowLayout for the layout manager.
jfrm.setLayout(newFlowLayout());
// Give the frame an initial size.
jfrm.setSize(280,120);
// Terminate the program when the user closes the application.
jfrm.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
// Create empty labels.
jlabSelected =newJLabel("");
jlabChanged =newJLabel("");
// Make check boxes.
jcbAlpha =newJCheckBox("Alpha");
jcbBeta =newJCheckBox("Beta");
jcbGamma =newJCheckBox("Gamma");
// Events generated by the check boxes
// are handled in common by the itemStateChanged()
// method implemented by CBDemo.
jcbAlpha.addItemListener(this);
jcbBeta.addItemListener(this);
jcbGamma.addItemListener(this);
// Add checkboxes and labels to the content pane.
jfrm.add(jcbAlpha);
jfrm.add(jcbBeta);
jfrm.add(jcbGamma);
jfrm.add(jlabChanged);
jfrm.add(jlabSelected);
// Display the frame.
jfrm.setVisible(true);
}
// This is the handler for the check boxes..
CoevolutionOver the ages, many species have become irremediably .docxmary772
Coevolution
Over the ages, many species have become irremediably linked. Whether in the context of an arms race or cooperation to conquer new ecosystems, they have no choice but to evolve together . According to Paul Ehrlich and Peter Raven, who introduced the term in 1964, "Coevolution is the evolution of two or more entities caused by the action between these entities of reciprocal selective factors. Organizations must therefore influence each other (Thompson, 1989). Coevolution relates to this week’s theme by the how natural selection affects the ecosystem. The book compares coevolution to an ecological arm race (Bensel & Turk, 2014). One example is a case of bats as stated in the book and their use of echolocation to be able to find insects. One insect that tries to outsmart it is a tiger moth which blocks out and jam’s the bats signal with a high frequency clicks and the bat fly’s erratically to confuse the moth. This is important in adaptation and of evolution of any new biological species. There are two kinds of interactions that happen that can lead to competitive coevolution. One interactions is predation in which one organism kills another organism. The second one is parasitism in which one organism benefits by damaging but not killing another organism.
This term affects living things and the physical world because if we didn’t have the natural selection all our ecosystem who would be extinct including human beings. Many recent studies state that environmental changes have messed with the balance between interacting species and leading to their extinction. When we use the three models of coevolution such as competition, predation, mutualism in organizing and synthesizing ways to modify species interaction when there is climate change in favoring one species over another. Coevolution reduces the effects of climate change and leads to lowering chances in extinction. By getting an understanding of our nature of coevolution in how they interact with different species and our communities interact and respond to the changing climate.
We as human kind must take action and not let our natural system and ecosystem suffer because of our greed for economic growth (Cairns, 2007). We must also be careful of our matriac consumption and forget about ecological and sustainability ethics. (Cairns, 2007). Humans need to take action to better take care of our ecosystem and environment. Morowitz (1992) stated in this journal, “Sustained life is a property of an ecological system rather than a single organism or species.” There are no species that can exist without the ecological life support system even humans (Cairns, 2007). We need to put more effort in taking care of our environment by creating more organizations in getting our communities involved. In achieving sustainability they must guide through ecological and sustainability ethics. There are many challenges that will come but with achieving sustainable use of our planet our environment will .
Coding Component (50)Weve provided you with an implementation .docxmary772
Coding Component (50%)
We've provided you with an implementation of an unbalanced binary search tree. The tree implements an ordered dynamic set over a generic comparable type T. Supported operations include insertion, deletion, min, max, and testing whether a value is in the set (via the exists method). Because it's a set, duplicates are not allowed, and the insert operation will not insert a value if it is already present.
We have implemented the BST operations in a recursive style. For example, inserting a value into a tree recurses down the tree seeking the correct place to add a new leaf. Each recursive call returns the root of the subtree on which it was called, after making any modifications needed to the subtree to perform the insertion. Deletion is implemented similarly.
Your job is to add the functionality needed to keep the tree balanced using the AVL property. In particular, you will need to
· augment the tree to maintain the height of each of its subtrees, as discussed in Studio;
· compute the balance at the root of a subtree (which is the height of the root's left subtree minus that of its right subtree);
· implement the AVL rebalancing operation, along with the supporting rotation operations; and
· call the height maintenance and rebalancing operations at the appropriate times during insertion and deletion.
Code Outline
There are two main source code files you need to consider, both in the avl package:
· TreeNode.java implements a class TreeNode that represents a node of a binary search tree. It holds a value (the key of the node) along with child and parent pointers. It has a height data member that is currently not used for anything. You should not modify this file, but you need to understand its contents.
· AVLTree.java implements an ordered set as a binary search tree made out of TreeNode objects.
The AVLTree class provides an interface that includes element insertion and deletion, as well as an exists() method that tests whether a value is present in the set. It also offers min() and max() methods. These methods all work as given for (unbalanced) BSTs, using the algorithms we discussed in lecture.
To implement the AVL balancing method, you will need to fill in some missing code to maintain the height of each subtree and perform rebalancing. Look for the 'FIXME' tags in AVLTree.java to see which methods you must modify.
Height Maintenance
You'll need to set the height data member each time a new leaf is allocated in the tree. You can then maintain the height as part of insertion or deletion using the incremental updating strategy you worked out in Studio 10, Part C.
The update procedure updateHeight() takes in a node and updates its height using the heights of its two subtrees. It should run in constant time.
You'll need to call updateHeight() wherever it is needed – in insertion, deletion, and perhaps elsewhere.
Rebalancing
You must implement four methods as part of AVL rebalancing:
· getBalance() computes the balance fact.
Codes of Ethics Guides Not Prescriptions A set of rules and di.docxmary772
Codes of Ethics: Guides Not Prescriptions A set of rules and directives that would result in efficient and ethical professional practice would be something clearly welcomed by student and professional alike. However, as should be clear by now, such prescriptions or recipes for professional practice do not exist, nor does every client and every professional condition provide clear-cut avenues for progress. Professional practice is both complex and complicated. The issues presented are often confounded and conflicting. The process of making sense of the options available and engaging in the path that leads to effective, ethical practice cannot be preprogrammed but rather needs to be fluid, flexible, and responsive to the uniqueness of the client and the context of helping. The very dynamic and fluid nature of our work with clients prohibits the use of rigid, formulaic prescriptions or directions. Never is this so obvious as when first confronted with an ethical dilemma. Consider the subtle challenges to practice decisions presented in Case Illustration 7.1. The case reflects a decision regarding the release of information and the potential breach of confidentiality. The element confounding the decision, as you will see, is that the client was deceased and it was the executrix of the estate providing permission to release the information to a third party.
Case Illustration 7.1 Conditions for Maintaining Confidentiality While all clinicians have been schooled in the issue of confidentiality and the various conditions under which confidentiality must be breached (e.g., prevention of harm to self or another), the conditions of maintenance of confidentiality can be somewhat blurred when the material under consideration is that of a client who is now deceased. Consider the case of Dr. Martin Orne, MD, PhD. Dr. Orne was a psychotherapist who worked with Anne Sexton, a Pulitzer Prize winner. Following the death of Ms. Sexton, an author, Ms. Middlebrook, set out to write her biography. In doing her research, Ms. Middlebrook discovered that Dr. Orne had tape-recorded a number of sessions with Ms. Sexton in order to allow her to review the sessions, and he had not destroyed the tapes following her death. Ms. Middlebrook approached Linda Gray Sexton, the daughter of the client and the executrix of the estate, seeking permission to access these tapes of the confidential therapy sessions as an aid to her writing. The daughter granted permission for release of the therapeutic tapes. A number of questions could be raised around this case, including the ethics of tape-recording or the ethics of maintenance of the tapes following the death of the client. However, the most pressing issue involves the conditions under which confidentiality should be maintained. The challenge here is, should Dr. Orne release the tapes in response to the daughter’s granting of permission, or does his client have the right to confidentiality even beyond the grave? As noted, t.
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docxmary772
Codecademy: Monetizing a Movement? 815-093
815-093 Codecademy: Monetizing a Movement?
Codecademy: Monetizing a Movement? 815-093
9-815-093
RE V : OCT OB E R 1 4 , 2 0 1 5
JEFFREY J. BU SSGANG
LISA C. MA ZZANTI
Codecademy: Monetizing a Movement?
We’re a movement to make education more of a commodity. We’re not just a for-profit company. Our mission would get tainted if we charged consumers for content. We need to be authentic.
— Zach Sims, Cofounder and CEO
Zach Sims and Ryan Bubinski sat in the Codecademy headquarters, an exposed-brick fourth-floor office near Madison Square Park in New York City. In 2011, while in their early twenties, the two had founded Codecademy, an open-platform, online community to teach users to code. By 2014, they had a total of 24 million unique users and a library of over 100,000 lessons. The company had raised a total of $12.5 million in funding and was, on many fronts, an overwhelming success. However, there were still no revenues. The company’s website stated, “Codecademy is free and always will be.”1
The founders, along with the board, had decided that 2014 would be a year of experimentation with different monetization strategies. By June, the cofounders had preliminarily tested two monetization models. The first charged companies for training employees offline on coding skills, a service that the training departments of these companies paid an annual fee to receive. The second monetization model focused on a labor marketplace to match Codecademy users with jobs that corporations and recruiters were seeking to fill.
But 2014 had also been busy in other arenas for the 25-employee company. In April, the company launched a redesign of its website, because, as the Codecademy blog announced, “it quickly became apparent that if we wanted to grow and mature as a brand, we required a thorough redesign of our entire product.”2 The next month, the company announced that they were opening an office in London to work with the British education system and also had forged partnerships with foundations and government bodies in Estonia, Argentina, and France.
As Sims and Bubinski huddled in their glass-walled conference room, they tried to focus on the task at hand—to narrow down their ideas and eventually decide on a viable business model. The two reviewed early results from both experiments to prepare for the upcoming board meeting where they planned to present their findings and propose next steps. The employee-training experiments had yielded promising initial results but would require hiring a sales force, offline instructors, and some content customization to scale. The labor marketplace model promised less friction in scaling but represented a more crowded market opportunity.
Senior Lecturer Jeffrey J. Bussgang and Case Researcher Lisa C. Mazzanti (Case Research & Writing Group) prepared this case. It was reviewed and approved before publication by a company designate. Funding for the develo.
More Related Content
Similar to CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
Essays For Sale Online. Custom essays for saleErin Anderson
Essays for sale: the booming online industry in writing academic work .... Custom Written Essays for Sale. 400+ Essay for sale ideas in 2021 | essay, college essay, writing services. Buy essays online from successful essay education essay. Find the best essay for sale. School essay: Narrative essay for sale. Management essay for sale - Buy an Essay Online for Cheap 24/7 .... How to Write In College Essay Format | OCC NJ. Essays-for-Sale.org Review: Trustworthy Service to Get Your Paper Done at. Essay Samples for Sale - Writterly. Cheap Custom Essays Online: Write Essays Online. Online Purchase Essay! WHY YOU SHOULD AVOID PURCHASING ESSAY ONLINE. Buy original essays online qwehli.com. Sell your essays online - College Homework Help and Online Tutoring.. Buy cheap essays online by customassignments - Issuu. EssayForSale.net: Essays for Sale to Be the College Hero - Techicy. Bulevar 30 Using The Best Essays for Sale, Buy Essay for Money Online .... Buy pre written essay. Sensational Buy Essay Online ~ Thatsnotus.
Persuasive Essay On Exercise. Persuasive Writing Examples - Year 4-6 - Primar...Veronica Johnson
50 Free Persuasive Essay Examples (+BEST Topics) ᐅ TemplateLab. Business paper: Persuasive essay on exercise. Examples of persuasive writing for KS2/3 | Teaching Resources. Persuasive Writing Worksheet Pack - No Prep Lesson Ideas | Persuasive .... Contoh Essay Pendek – Ilustrasi. Persuasive Writing Examples - Year 4-6 - Primary Resource. (GCSE) Persuasive essay- "Exercise should be an important part of the .... How to Write Perfect Persuasive Essays in 5 Simple Steps. Persuasive essay: Essay writing exercise. Persuasive Essay Topics for Middle School Students | Persuasive essay .... Persuasive essay on importance of exercise - writefiction581.web.fc2.com. 48 Amazing Persuasive Essay Examples – RedlineSP. writing persuasive essay worksheet - Free ESL printable worksheets made .... Persuasive Texts - Ten Reading Samples with Comprehension | Persuasive .... Persuasive Writing Comprehension - Fun, Fantastic, Fabulous Fitness .... Write a persuasive essay using this structured exercise! Hook your .... Exercise Essay Writing - Importance of Exercise – Essay, Speech .... Persuasive Writing Handouts - No Prep Printables | Persuasive writing .... How to Write a Persuasive Essay - A Complete Guide. 10 persuasive essay samples to help students understand the features .... Persuasive essay examples for 6th graders – Help in writing an essay .... how to write persuasive essay - ESL worksheet by minerva88 Persuasive Essay On Exercise
Prof. Lawrence Haddad, Director of the Institute of Development Studies, Sussex, UK talks about how President Elect Obama may affect international development
Essay Modern Technology. Technology Essay - How to write an essay about techn...Janet Jackson
Technology Essay | Essay on Technology for Students and Children in .... 001 P1 Essay On Technology ~ Thatsnotus. Unforgettable Introduction About Technology Essay ~ Thatsnotus. An essay on modern technology.
Similar to CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx (13)
Coding NotesImproving Diagnosis By Jacquie zegan, CCS, w.docxmary772
Coding Notes
Improving
Diagnosis
By Jacquie zegan, CCS, wC
Specificity in ICD-IO Coding
VALID ICD-IO-CM/PCS (ICD-IO) codes have been required for claims reporting since October 1, 2015. But ICD-IO diagnosis coding to the correct level of specificity—a more recent requirement—continues to be a problem for many in the healthcare industry. While diagnosis code specificity has always been the goal, providers were granted a reprieve in order to facilitate implementation of ICD-IO. For the first 12 months of ICD-IO use, the Centers for Medicare and Medicaid Services (CMS) promised that Medicare review contractors would not deny claims "based solely on the specificity of the ICD-IO diagnosis code as long as the physician/practitioner used a valid code from the right family."l Commonly referred to as the "grace period," this flexibility was intended to help providers implement the ICD-IO-CM code set and was never intended to continue on in perpetuity. In fact, this CMS-granted grace period expired on October 1, 2016.2
Unfortunately, nonspecific documentation and coding persists. This is an ongoing problem, even though the official guidelines for coding and reporting require coding to the highest degree of specificity. Third-party payers are making payment determinations based on the specificity of reported codes, and payment reform efforts are formulating policies based on coded data. The significance of overreporting unspecified diagnosis codes cannot be understated. In the short term, it will increase claim denials, and in the long term it may adversely impact emerging payment models.3•4 Calculating and monitoring unspecified diagnosis code rates is critical to successfully leverage specificity
44/Journal of AHIMA April 18
in the ICD-IO-CM code set.
An ICD-IO-CM code is considered unspecified if either of the terms "unspecified" or "NOS" are used in the code description. The unspecified diagnosis code rate is calculated by dividing the number of unspecified diagnosis codes by the total number of diagnosis codes assigned. Health information management (HIM) professionals should be tracking and trending unspecified diagnosis code rates across the continuum of care.5
Acceptable use of Unspecified Diagnosis Codes Unspecified diagnosis codes have acceptable, even necessary, uses. The unspecified code rate is not an error rate, but rather an indicator of the quality of clinical documentation and a qualitative measure of coder performance and coding results. Even CMS explicitly recognizes that unspecified codes are sometimes necessary. "When sufficient clinical information is not known or available about a particular health condition to assign a more specific code, it is acceptable to report the appropriate unspecified code."6 It's also important that coding professionals use good judgment to avoid unnecessary queries for clarification of unspecified diagnoses. The official coding guidelines provide explicit guidance for appropriate uses of unspec.
Cognitive and Language Development Milestones Picture Book[WLO .docxmary772
Cognitive and Language Development Milestones Picture Book
[WLO: 1] [CLO: 1]
Prior to beginning work on this assignment,
Review Chapters 6, 7, and 9 of your text.
Review the cognition and language development milestones from the Centers for Disease Control and Prevention on the web page
Basic Information (Links to an external site.)
.
Identify one age-group that you will discuss:
Infancy: Birth to 12 months
Toddler: 1 to 3 years
Early childhood: 4 to 8 years
Review and download the
Cognitive and Language Development Milestones Picture Book Template.
The purpose of this assignment is to creatively demonstrate an understanding of developmental milestones as they pertain to cognition and language development.
Part 1:
Based on the required resources above, create a children’s picture book using
StoryJumper (Links to an external site.)
that tells a story about a child’s typical day. Your story must incorporate at least four cognitive and four language development milestones for the age-group you have selected. Your story can be about a fictional child or can be based on a real child. Watch the video,
StoryJumper Tutorial (Links to an external site.)
, for assistance in using StoryJumper.
To complete this assignment, you must
Create a children’s picture book using StoryJumper.
Identify at least four cognitive development milestones appropriate to the age-group selected.
Distinguish at least four language development milestones appropriate to the age-group selected.
Discuss a typical day appropriate to the age-group selected.
Part 2:
Open the
Cognitive and Language Development Milestones Picture Book Template
and complete the following items:
Provide the link to the StoryJumper picture book you created in Part 1.
Indicate which age-group your picture book will discuss.
List at least four cognitive development milestones that are included in your picture book.
List at least four language development milestones that are included in your picture book.
Submit your Word document to Waypoint.
The Cognitive and Language Development Milestones Picture Book:
Must be eight to 10 pages of text in length (not including title page, images, and references page) and formatted according to APA style as outlined in the Ashford Writing Center’s
APA Style (Links to an external site.)
Must include a separate title page with the following:
Title of picture book
Student’s name
Course name and number
Instructor’s name
Date submitted
Must document any information used from sources in APA style as outlined in the Ashford Writing Center’s
Citing Within Your Paper (Links to an external site.)
Must include a separate references page or slide that is formatted according to APA style as outlined in the Ashford Writing Center. See the
Formatting Your References List (Links to an external site.)
resource in the Ashford Writing Center for specifications.
CHAPTER 6 SUMMARY
Piaget’s Cognitive-Developmental Theory.
Codes of (un)dress and gender constructs from the Greek to t.docxmary772
Codes of (un)dress and gender constructs
from the Greek to the Roman world
he
By 6th c. BC: Greek male and female dress codes firmly established
Archaic kouros
and kore statues
demonstrate how
the body was
used in the
naturalization of
gender
constructs
The naked male
body in the
classical period:
the Doryphoros as
a heroic athlete-
warrior citizen
Male sexuality: conditions by the patriarchal ideology of
domination, it restricted sexual expression and freedom
in homosexual
relations
and heterosexual
relations
In the classical
period,
while the naked
male body was
idealized and
heroized,
the female naked
body was always
sexualized and
objectified.
Centauromachy (late 5th c.
Bassae): the Greek female is
defenseless and sexualized
(must be defended by Greek
men).
Gendered
nakedness in
mythological
scenes:
the Greek
male is
always
heroized
Amazonomachy (4th c.
Halikarnassos): the non-
Greek female is wild and
sexualized (must be
dominated by Greek men).
Aphrodite (Roman Venus): at first fully dressed
The gradual disrobing of Aphrodite in monumental statues, late 5th to
4th c. BC (Roman copies)
“Venus Genetrix”,
original late 5th c. BC
“Venus of Capua”,
original 4th c. BC
Aphrodite of Knidos,
original 4th c. BC
Late 5th c. onwards: minor goddesses were also represented sexualized in
statues, but only Aphrodite appeared entirely naked by the 4th c. BC.
Nike (Victory), late
5th c., Olympia.
Aphrodite of Knidos by
Praxiteles, 4th c. (Roman copy)
Aphrodite “Beautiful
Buttocks”, Roman
copy (Greek ca. 300).
Doryphoros and
Aphrodite of Knidos
(Knidia or Knidian
Aphrodite), Roman
copies.
What main
differences do you
observe?
Was her nakedness
really threatening to
patriarchy (Andrew
Stewart)?
Or, in what ways
was her nakedness
aligned with
patriarchal ideology?
Could she have been
empowering for
women?
The traditional visual
presence of a divine
statue at the far end of
a rectangular temple
was very different
(Olympian Zeus)
Aphrodite of Knidos was displayed in an unusual temple (round plan), so as to
be seen from all sides, like a beautiful object.
The original
Aphrodite of
Knidos is lost.
Numerous
Roman copies
of the Knidian
Aphrodite exist
(with variations
in details).
“Colonna
Venus” Vatican
Museums.
“Ludovisi
Venus”,
Palazzo
Altemps, Rome
(only the torso
is ancient, the
rest is 17th-c,
restoration.)
Capitoline Venus, Rome
Medici Venus, Florence
Variations on the
“Venus pudica” type,
Greek Hellenistic
originals, Roman
copies.
Are they more modest
or also more shamed?
Latin pudore: modesty,
chastity, shame.
Greek aidos: shame,
modesty
(aidion=vagina)
There is no male “pudicus”
type in Greco-Roman
sculpture.
These unequal gender
constructs are still around
today,
to the detriment of all of us!
There is no male
“pudicus” type in Greco-
Roman sculpture.
An effec.
Coding Assignment 3CSC 330 Advanced Data Structures, Spri.docxmary772
Coding Assignment 3
CSC 330: Advanced Data Structures, Spring 2019
Released Monday, April 15, 2019
Due on Canvas on Wednesday, May 1, at 11:59pm
Overview
In this assignment, you’ll implement another variant of a height-balancing tree known as a
splay tree. The assignment will also give you an opportunity to work with Java inheritance;
in particular, the base code that you’ll amend is structured so that your SplayTree class
extends from an abstract class called HeightBalancingTree, which gives a general template
for how a height-balancing tree should be defined.
As always, please carefully read the entire write-up before you begin coding your submission.
Splay Trees
As mentioned above, a splay tree is another example of a height-balancing tree — a binary
search tree that, upon either an insertion or deletion, modifies the tree through a sequence
of rotations in order to reduce the overall height of the tree.
However, splay trees differ from the other height-balancing trees we’ve seen (AVL trees,
red-black trees) in terms of the type of guarantees that they provide. In particular, recall
that both AVL trees and red-black trees maintain the property that after any insertion or
deletion, the height of the tree is O(log n), where n is the number of elements in the tree.
Splay trees unfortunately do not provide this (fairly strong) guarantee; namely, it is possible
for the height of a splay tree to become greater than O(log n) over a sequence of insertions
and deletions.
Instead, splay trees provide a slightly weaker (though still meaningful) guarantee known as
an amortized bound, which is essentially just a bound on the average time of a single opera-
tion over the course of several operations. In the context of splay trees, one can show that
over the course of, say, n insertions to build a tree with n elements, the average time of each
of these operations is O(log n) (but again, keeping in mind it is possible for any single one
of these operations to take much longer than this).
Showing this guarantee is beyond the scope of this course (although the details of the analy-
sis can be found in your textbook). Instead, in this assignment, we will just be in interested
1
r splay:
N
root
root
2
1
1
2
l splay:
N
1
2
rr splay:
N
N
N
ll splay:
rl splay:
1
2
N
lr splay:
Figure 1: Illustration of the six possible cases for on a given step of a splay operation.
in writing an implementation of a splay tree in Java that is structured using inheritance.
Splay Tree Insertions and Deletions
To insert or delete an element from the tree, splay trees use the same approach as the other
height-balancing trees we’ve discussed in class — first we insert/deletion an element using
standard BST procedures, and then perform a “height-fixing” procedure that rebalances the
tree. Thus, what distinguishes each of these height-balancing trees from one another is how
they define their height-fixing procedures.
To fix the tree after both inser.
CodeZipButtonDemo.javaCodeZipButtonDemo.java Demonstrate a p.docxmary772
CodeZip/ButtonDemo.javaCodeZip/ButtonDemo.java// Demonstrate a push button and handle action events.
import java.awt.*;
import java.awt.event.*;
import javax.swing.*;
publicclassButtonDemoimplementsActionListener{
JLabel jlab;
JTextField jtf;
ButtonDemo(){
// Create a new JFrame container.
JFrame jfrm =newJFrame("A Button Example");
// Specify FlowLayout for the layout manager.
jfrm.setLayout(newFlowLayout());
// Give the frame an initial size.
jfrm.setSize(220,90);
// Terminate the program when the user closes the application.
jfrm.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
// Make two buttons.
JButton jbtnUp =newJButton("Up");
JButton jbtnDown =newJButton("Down");
// Create a text field.
jtf =newJTextField(10);
// Add action listeners.
jbtnUp.addActionListener(this);
jbtnDown.addActionListener(this);
// Add the buttons to the content pane.
jfrm.add(jbtnUp);
jfrm.add(jbtnDown);
jfrm.add(jtf);
// Create a label.
jlab =newJLabel("Press a button.");
// Add the label to the frame.
jfrm.add(jlab);
// Display the frame.
jfrm.setVisible(true);
}
// Handle button events.
publicvoid actionPerformed(ActionEvent ae){
if(ae.getActionCommand().equals("Up")){
jlab.setText("You pressed Up.");
FileClock clock1=newFileClock(jtf);
Thread thread1=newThread(clock1);
thread1.start();
}
else
jlab.setText("You pressed down. ");
}
publicstaticvoid main(String args[]){
// Create the frame on the event dispatching thread.
SwingUtilities.invokeLater(newRunnable(){
publicvoid run(){
newButtonDemo();
}
});
}
}
CodeZip/CBDemo.javaCodeZip/CBDemo.java// Demonstrate check boxes.
import java.awt.*;
import java.awt.event.*;
import javax.swing.*;
publicclassCBDemoimplementsItemListener{
JLabel jlabSelected;
JLabel jlabChanged;
JCheckBox jcbAlpha;
JCheckBox jcbBeta;
JCheckBox jcbGamma;
CBDemo(){
// Create a new JFrame container.
JFrame jfrm =newJFrame("Demonstrate Check Boxes");
// Specify FlowLayout for the layout manager.
jfrm.setLayout(newFlowLayout());
// Give the frame an initial size.
jfrm.setSize(280,120);
// Terminate the program when the user closes the application.
jfrm.setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
// Create empty labels.
jlabSelected =newJLabel("");
jlabChanged =newJLabel("");
// Make check boxes.
jcbAlpha =newJCheckBox("Alpha");
jcbBeta =newJCheckBox("Beta");
jcbGamma =newJCheckBox("Gamma");
// Events generated by the check boxes
// are handled in common by the itemStateChanged()
// method implemented by CBDemo.
jcbAlpha.addItemListener(this);
jcbBeta.addItemListener(this);
jcbGamma.addItemListener(this);
// Add checkboxes and labels to the content pane.
jfrm.add(jcbAlpha);
jfrm.add(jcbBeta);
jfrm.add(jcbGamma);
jfrm.add(jlabChanged);
jfrm.add(jlabSelected);
// Display the frame.
jfrm.setVisible(true);
}
// This is the handler for the check boxes..
CoevolutionOver the ages, many species have become irremediably .docxmary772
Coevolution
Over the ages, many species have become irremediably linked. Whether in the context of an arms race or cooperation to conquer new ecosystems, they have no choice but to evolve together . According to Paul Ehrlich and Peter Raven, who introduced the term in 1964, "Coevolution is the evolution of two or more entities caused by the action between these entities of reciprocal selective factors. Organizations must therefore influence each other (Thompson, 1989). Coevolution relates to this week’s theme by the how natural selection affects the ecosystem. The book compares coevolution to an ecological arm race (Bensel & Turk, 2014). One example is a case of bats as stated in the book and their use of echolocation to be able to find insects. One insect that tries to outsmart it is a tiger moth which blocks out and jam’s the bats signal with a high frequency clicks and the bat fly’s erratically to confuse the moth. This is important in adaptation and of evolution of any new biological species. There are two kinds of interactions that happen that can lead to competitive coevolution. One interactions is predation in which one organism kills another organism. The second one is parasitism in which one organism benefits by damaging but not killing another organism.
This term affects living things and the physical world because if we didn’t have the natural selection all our ecosystem who would be extinct including human beings. Many recent studies state that environmental changes have messed with the balance between interacting species and leading to their extinction. When we use the three models of coevolution such as competition, predation, mutualism in organizing and synthesizing ways to modify species interaction when there is climate change in favoring one species over another. Coevolution reduces the effects of climate change and leads to lowering chances in extinction. By getting an understanding of our nature of coevolution in how they interact with different species and our communities interact and respond to the changing climate.
We as human kind must take action and not let our natural system and ecosystem suffer because of our greed for economic growth (Cairns, 2007). We must also be careful of our matriac consumption and forget about ecological and sustainability ethics. (Cairns, 2007). Humans need to take action to better take care of our ecosystem and environment. Morowitz (1992) stated in this journal, “Sustained life is a property of an ecological system rather than a single organism or species.” There are no species that can exist without the ecological life support system even humans (Cairns, 2007). We need to put more effort in taking care of our environment by creating more organizations in getting our communities involved. In achieving sustainability they must guide through ecological and sustainability ethics. There are many challenges that will come but with achieving sustainable use of our planet our environment will .
Coding Component (50)Weve provided you with an implementation .docxmary772
Coding Component (50%)
We've provided you with an implementation of an unbalanced binary search tree. The tree implements an ordered dynamic set over a generic comparable type T. Supported operations include insertion, deletion, min, max, and testing whether a value is in the set (via the exists method). Because it's a set, duplicates are not allowed, and the insert operation will not insert a value if it is already present.
We have implemented the BST operations in a recursive style. For example, inserting a value into a tree recurses down the tree seeking the correct place to add a new leaf. Each recursive call returns the root of the subtree on which it was called, after making any modifications needed to the subtree to perform the insertion. Deletion is implemented similarly.
Your job is to add the functionality needed to keep the tree balanced using the AVL property. In particular, you will need to
· augment the tree to maintain the height of each of its subtrees, as discussed in Studio;
· compute the balance at the root of a subtree (which is the height of the root's left subtree minus that of its right subtree);
· implement the AVL rebalancing operation, along with the supporting rotation operations; and
· call the height maintenance and rebalancing operations at the appropriate times during insertion and deletion.
Code Outline
There are two main source code files you need to consider, both in the avl package:
· TreeNode.java implements a class TreeNode that represents a node of a binary search tree. It holds a value (the key of the node) along with child and parent pointers. It has a height data member that is currently not used for anything. You should not modify this file, but you need to understand its contents.
· AVLTree.java implements an ordered set as a binary search tree made out of TreeNode objects.
The AVLTree class provides an interface that includes element insertion and deletion, as well as an exists() method that tests whether a value is present in the set. It also offers min() and max() methods. These methods all work as given for (unbalanced) BSTs, using the algorithms we discussed in lecture.
To implement the AVL balancing method, you will need to fill in some missing code to maintain the height of each subtree and perform rebalancing. Look for the 'FIXME' tags in AVLTree.java to see which methods you must modify.
Height Maintenance
You'll need to set the height data member each time a new leaf is allocated in the tree. You can then maintain the height as part of insertion or deletion using the incremental updating strategy you worked out in Studio 10, Part C.
The update procedure updateHeight() takes in a node and updates its height using the heights of its two subtrees. It should run in constant time.
You'll need to call updateHeight() wherever it is needed – in insertion, deletion, and perhaps elsewhere.
Rebalancing
You must implement four methods as part of AVL rebalancing:
· getBalance() computes the balance fact.
Codes of Ethics Guides Not Prescriptions A set of rules and di.docxmary772
Codes of Ethics: Guides Not Prescriptions A set of rules and directives that would result in efficient and ethical professional practice would be something clearly welcomed by student and professional alike. However, as should be clear by now, such prescriptions or recipes for professional practice do not exist, nor does every client and every professional condition provide clear-cut avenues for progress. Professional practice is both complex and complicated. The issues presented are often confounded and conflicting. The process of making sense of the options available and engaging in the path that leads to effective, ethical practice cannot be preprogrammed but rather needs to be fluid, flexible, and responsive to the uniqueness of the client and the context of helping. The very dynamic and fluid nature of our work with clients prohibits the use of rigid, formulaic prescriptions or directions. Never is this so obvious as when first confronted with an ethical dilemma. Consider the subtle challenges to practice decisions presented in Case Illustration 7.1. The case reflects a decision regarding the release of information and the potential breach of confidentiality. The element confounding the decision, as you will see, is that the client was deceased and it was the executrix of the estate providing permission to release the information to a third party.
Case Illustration 7.1 Conditions for Maintaining Confidentiality While all clinicians have been schooled in the issue of confidentiality and the various conditions under which confidentiality must be breached (e.g., prevention of harm to self or another), the conditions of maintenance of confidentiality can be somewhat blurred when the material under consideration is that of a client who is now deceased. Consider the case of Dr. Martin Orne, MD, PhD. Dr. Orne was a psychotherapist who worked with Anne Sexton, a Pulitzer Prize winner. Following the death of Ms. Sexton, an author, Ms. Middlebrook, set out to write her biography. In doing her research, Ms. Middlebrook discovered that Dr. Orne had tape-recorded a number of sessions with Ms. Sexton in order to allow her to review the sessions, and he had not destroyed the tapes following her death. Ms. Middlebrook approached Linda Gray Sexton, the daughter of the client and the executrix of the estate, seeking permission to access these tapes of the confidential therapy sessions as an aid to her writing. The daughter granted permission for release of the therapeutic tapes. A number of questions could be raised around this case, including the ethics of tape-recording or the ethics of maintenance of the tapes following the death of the client. However, the most pressing issue involves the conditions under which confidentiality should be maintained. The challenge here is, should Dr. Orne release the tapes in response to the daughter’s granting of permission, or does his client have the right to confidentiality even beyond the grave? As noted, t.
Codecademy Monetizing a Movement 815-093 815-093 Codecademy.docxmary772
Codecademy: Monetizing a Movement? 815-093
815-093 Codecademy: Monetizing a Movement?
Codecademy: Monetizing a Movement? 815-093
9-815-093
RE V : OCT OB E R 1 4 , 2 0 1 5
JEFFREY J. BU SSGANG
LISA C. MA ZZANTI
Codecademy: Monetizing a Movement?
We’re a movement to make education more of a commodity. We’re not just a for-profit company. Our mission would get tainted if we charged consumers for content. We need to be authentic.
— Zach Sims, Cofounder and CEO
Zach Sims and Ryan Bubinski sat in the Codecademy headquarters, an exposed-brick fourth-floor office near Madison Square Park in New York City. In 2011, while in their early twenties, the two had founded Codecademy, an open-platform, online community to teach users to code. By 2014, they had a total of 24 million unique users and a library of over 100,000 lessons. The company had raised a total of $12.5 million in funding and was, on many fronts, an overwhelming success. However, there were still no revenues. The company’s website stated, “Codecademy is free and always will be.”1
The founders, along with the board, had decided that 2014 would be a year of experimentation with different monetization strategies. By June, the cofounders had preliminarily tested two monetization models. The first charged companies for training employees offline on coding skills, a service that the training departments of these companies paid an annual fee to receive. The second monetization model focused on a labor marketplace to match Codecademy users with jobs that corporations and recruiters were seeking to fill.
But 2014 had also been busy in other arenas for the 25-employee company. In April, the company launched a redesign of its website, because, as the Codecademy blog announced, “it quickly became apparent that if we wanted to grow and mature as a brand, we required a thorough redesign of our entire product.”2 The next month, the company announced that they were opening an office in London to work with the British education system and also had forged partnerships with foundations and government bodies in Estonia, Argentina, and France.
As Sims and Bubinski huddled in their glass-walled conference room, they tried to focus on the task at hand—to narrow down their ideas and eventually decide on a viable business model. The two reviewed early results from both experiments to prepare for the upcoming board meeting where they planned to present their findings and propose next steps. The employee-training experiments had yielded promising initial results but would require hiring a sales force, offline instructors, and some content customization to scale. The labor marketplace model promised less friction in scaling but represented a more crowded market opportunity.
Senior Lecturer Jeffrey J. Bussgang and Case Researcher Lisa C. Mazzanti (Case Research & Writing Group) prepared this case. It was reviewed and approved before publication by a company designate. Funding for the develo.
Code switching involves using 1 language or nonstandard versions of .docxmary772
Code switching involves using 1 language or nonstandard versions of a language instead of another language due to setting, conversational partner, topic, and other factors.
Respond to the following in a minimum of 175 words:
When was a time that you engaged in code switching?
Why did you engage in code switching?
What were the potential benefits and potential consequences of code switching in that scenario?
What was the result of your actions?
.
Code of Ethics for the Nutrition and Dietetics Pr.docxmary772
Code of Ethics
for the Nutrition and Dietetics Profession
Effective Date: June 1, 2018
Preamble:
When providing services the nutrition and dietetics practitioner adheres to the core values of customer focus,
integrity, innovation, social responsibility, and diversity. Science-based decisions, derived from the best available research
and evidence, are the underpinnings of ethical conduct and practice.
This Code applies to nutrition and dietetics practitioners who act in a wide variety of capacities, provides general
principles and specific ethical standards for situations frequently encountered in daily practice. The primary goal is the
protection of the individuals, groups, organizations, communities, or populations with whom the practitioner works and
interacts.
The nutrition and dietetics practitioner supports and promotes high standards of professional practice, accepting
the obligation to protect clients, the public and the profession; upholds the Academy of Nutrition and Dietetics (Academy)
and its credentialing agency the Commission on Dietetic Registration (CDR) Code of Ethics for the Nutrition and Dietetics
Profession; and shall report perceived violations of the Code through established processes.
The Academy/CDR Code of Ethics for the Nutrition and Dietetics Profession establishes the principles and ethical
standards that underlie the nutrition and dietetics practitioner’s roles and conduct. All individuals to whom the Code
applies are referred to as “nutrition and dietetics practitioners”. By accepting membership in the Academy and/or accepting
and maintaining CDR credentials, all nutrition and dietetics practitioners agree to abide by the Code.
Principles and Standards:
1. Competence and professional development in practice (Non-maleficence)
Nutrition and dietetics practitioners shall:
a. Practice using an evidence-based approach within areas of competence, continuously develop and enhance
expertise, and recognize limitations.
b. Demonstrate in depth scientific knowledge of food, human nutrition and behavior.
c. Assess the validity and applicability of scientific evidence without personal bias.
d. Interpret, apply, participate in and/or generate research to enhance practice, innovation, and discovery.
e. Make evidence-based practice decisions, taking into account the unique values and circumstances of the
patient/client and community, in combination with the practitioner’s expertise and judgment.
f. Recognize and exercise professional judgment within the limits of individual qualifications and collaborate
with others, seek counsel, and make referrals as appropriate.
g. Act in a caring and respectful manner, mindful of individual differences, cultural, and ethnic diversity.
h. Practice within the limits of their scope and collaborate with the inter-professional team.
2. Integrity in personal and organizational behaviors and practices (Autonomy)
N.
Code of Ethics for Engineers 4. Engineers shall act .docxmary772
Code of Ethics for Engineers
4. Engineers shall act for each employer or client as faithful agents or
trustees.
a. Engineers shall disclose all known or potential conflicts of interest
that could influence or appear to influence their judgment or the
quality of their services.
b. Engineers shall not accept compensation, financial or otherwise,
from more than one party for services on the same project, or for
services pertaining to the same project, unless the circumstances are
fully disclosed and agreed to by all interested parties.
c. Engineers shall not solicit or accept financial or other valuable
consideration, directly or indirectly, from outside agents in
connection with the work for which they are responsible.
d. Engineers in public service as members, advisors, or employees
of a governmental or quasi-governmental body or department shall
not participate in decisions with respect to services solicited or
provided by them or their organizations in private or public
engineering practice.
e. Engineers shall not solicit or accept a contract from a governmental
body on which a principal or officer of their organization serves as
a member.
5. Engineers shall avoid deceptive acts.
a. Engineers shall not falsify their qualifications or permit
misrepresentation of their or their associates’ qualifications. They
shall not misrepresent or exaggerate their responsibility in or for the
subject matter of prior assignments. Brochures or other
presentations incident to the solicitation of employment shall not
misrepresent pertinent facts concerning employers, employees,
associates, joint venturers, or past accomplishments.
b. Engineers shall not offer, give, solicit, or receive, either directly or
indirectly, any contribution to influence the award of a contract by
public authority, or which may be reasonably construed by the
public as having the effect or intent of influencing the awarding of a
contract. They shall not offer any gift or other valuable
consideration in order to secure work. They shall not pay a
commission, percentage, or brokerage fee in order to secure work,
except to a bona fide employee or bona fide established commercial
or marketing agencies retained by them.
III. Professional Obligations
1. Engineers shall be guided in all their relations by the highest standards
of honesty and integrity.
a. Engineers shall acknowledge their errors and shall not distort or
alter the facts.
b. Engineers shall advise their clients or employers when they believe
a project will not be successful.
c. Engineers shall not accept outside employment to the detriment of
their regular work or interest. Before accepting any outside
engineering employment, they will notify their employers.
d. Engineers shall not attempt to attract an engineer from another
employer by false or misleading pretenses.
e. Engineers shall not promote their own interest at the expense of the
dignity and integr.
Coder Name: Rebecca Oquendo
Coding Categories:
Episode
Aggressive Behavior
Neutral Behavior
Virtuous Behavior
Aggressive Gaming
Neutral Gaming
Virtuous Gaming
An older peer began using slurs or derogatory language
An older peer suggested that the team should cheat
The child witnessed an older peer intentionally leave out another player
An older player suggested that they play a different game
The child lost the game with older players on their team
The child witnessed an older player curse every time a mistake was made
Index:
· In this case aggressive behavior would constitute as mimicking older members undesired behaviors or becoming especially angry or agitated in game. A neutral behavior would be playing as they usually would not mimicking older player’s behaviors or trying to fit in to their more aggressive styles. A virtuous behavior would be steering the game away from aggression, voicing an opinion about the excessive aggression, or finding a way to express their gaming experience in a positive way. The same can be applied for the similar categories in “gaming”.
· Each category can be scaled from 1-7 in which way the child’s dialogue tended to be behavior and gaming wise with a 1 indicating little to no effort in that direction and a 7 indicating extreme effort in that category.
1. What are the different types of attributes? Provide examples of each attribute.
2. Describe the components of a decision tree. Give an example problem and provide an example of each component in your decision making tree
3. Conduct research over the Internet and find an article on data mining. The article has to be less than 5 years old. Summarize the article in your own words. Make sure that you use APA formatting for this assignment.
Questions from attached files
1. Obtain one of the data sets available at the UCI Machine Learning Repository and apply as many of the different visualization techniques described in the chapter as possible. The bibliographic notes and book Web site provide pointers to visualization software.
2. Identify at least two advantages and two disadvantages of using color to visually represent information.
3. What are the arrangement issues that arise with respect to three-dimensional plots?
4. Discuss the advantages and disadvantages of using sampling to reduce the number of data objects that need to be displayed. Would simple random sampling (without replacement) be a good approach to sampling? Why or why not?
5. Describe how you would create visualizations to display information that describes the following types of systems.
a) Computer networks. Be sure to include both the static aspects of the network, such as connectivity, and the dynamic aspects, such as traffic.
b) The distribution of specific plant and animal species around the world fora specific moment in time.
c) The use of computer resources, such as processor time, main me.
Codes of Ethical Conduct A Bottom-Up ApproachRonald Paul .docxmary772
Codes of Ethical Conduct: A Bottom-Up Approach
Ronald Paul Hill • Justine M. Rapp
Received: 18 January 2013 / Accepted: 12 December 2013 / Published online: 1 January 2014
� Springer Science+Business Media Dordrecht 2013
Abstract Developing and implementing a meaningful
code of conduct by managers or consultants may require a
change in orientation that modifies the way these precepts
are determined. The position advocated herein is for a
different approach to understanding and organizing the
guiding parameters of the firm that requires individual
reflection and empowerment of the entire organization to
advance their shared values. The processes involved are
discussed using four discrete stages that move from the
personal to the work team and to the unit to the full
company, followed by the board of directors’ evaluation.
The hoped-for end product is dynamic, employee-driven,
codes of conduct that recognize the systemic and far-
reaching impact of organizational activities across internal
and external stakeholders. Operational details for and some
issues associated with its implementation are also provided.
Keywords Code of conduct � Employee-driven
approaches � Bottom-up development
Corporation, Be Good! Frederick (2006)
That managers and employees are capable of both ethical
and unethical behaviors due to individual and internal
corporate culture factors cannot be denied (Ashforth and
Anand 2003; Treviño and Weaver 2003; Treviño et al.
2006). Over the last decade, as diverse organizational
stakeholders began exerting more pressure on firms to
eliminate unethical conduct, the field of management has
witnessed a proliferation of research on ethics and ethical
behavior in organizations (Elango et al. 2010; Gopala-
krishnan et al. 2008; O’Fallon and Butterfield 2005; Tre-
viño et al. 2006).
However, recent ethical failures, as well as continuous
ethical challenges that organizations face, have led scholars
to conclude that predicting ethical dilemmas is difficult a
priori: ‘‘It is only, when we look back on our conduct over
the long run that we may find ourselves guilty of moral
laxity’’ (Geva 2006, p. 138). What underlies this particular
situation is the inability of organizational elites to monitor
and implement initiatives within today’s complex business
entities (Martin and Eisenhardt 2010; Uhl-Bien et al.
2007). Accordingly, more dynamic approaches to business
ethics is needed, one that spans ‘‘both the individual and
organizational levels’’ of concern (Gopalakrishnan et al.
2008, p. 757).
As a consequence and in reaction to neoclassical eco-
nomics, managers and their employees are expected to go
beyond dictates imposed by the law and marketplace to
fulfill larger responsibilities (Stark 1993). This expectation
is accomplished through adoption of a stakeholder per-
spective that is infused with empathy for people, groups,
and communities that may be impacted by the actions of
business.
Code#RE00200012002020MN2DGHEType of Service.docxmary772
Code#RE00200012002020MN2DGHE
*****************
Type of Service
Presentation task- Attack Vector
Solution
s Step 14: Submit the Presentation
Project Title/Subject
Attack Vector
.
CODE OF ETHICSReview the following case study and address the qu.docxmary772
CODE OF ETHICS
Review the following case study and address the questions that follow:
General Hospital’s staff aggregated its infection rate data for comparison purposes with four other hospitals in the community. The staff members were aware that the data was flawed. They presented a false perception that General Hospital’s postoperative infection rates were lower than those of peer hospitals. The comparison data was published in the local newspaper. The Jones family, believing the data to be correct and concerned about the number of deaths related to hospital-acquired infections, relied on the data in selecting General Hospital as their preferred hospital.
Tasks:
Describe how organizational and professional codes of ethics were violated in this case.
Describe what role an organization’s ethics committee could play in addressing this or similar issues.
400 words APA format
.
cocaine, conspiracy theories and the cia in central america by Craig.docxmary772
cocaine, conspiracy theories and the cia in central america by Craig Delaval
Delaval is a freelance writer and filmmaker and was a production assistant for "Drug Wars." This article was edited by Lowell Bergman, series reporter for "Drug Wars."
Since its creation in 1947 under President Harry Truman, the CIA has been credited with a number of far-fetched operations. While some were proven - the infamous LSD mind-control experiments of the 1950s - others, like the assassination of John F. Kennedy and the crash of the Savings and Loans industry, have little or no merit.
In 1996 the agency was accused of being a crack dealer.
A series of expose articles in the San Jose Mercury-News by reporter Gary Webb told tales of a drug triangle during the 1980s that linked CIA officials in Central America, a San Francisco drug ring and a Los Angeles drug dealer. According to the stories, the CIA and its operatives used crack cocaine--sold via the Los Angeles African-American community--to raise millions to support the agency's clandestine operations in Central America.
The CIA's suspect past made the sensational articles an easy sell. Talk radio switchboards lit up, as did African-American leaders like U.S. Rep. Maxine Waters, D-Los Angeles, who pointed to Webb's articles as proof of a mastermind plot to destroy inner-city black America.
One of the people who was accused in the San Jose Mercury-News of being in the midst of the CIA cocaine conspiracy is one of the most respected, now retired, veteran D.E.A. agents, Robert "Bobby" Nieves.
"You have to understand Central America at that time was a haven for the conspiracy theorists. Christic Institute, people like Gary Webb, others down there, looking to dig up some story for political advantage," Nieves said. "No sexier story than to create the notion in people's minds that these people are drug traffickers."
But in the weeks following publication, Webb's peers doubted the merit of the articles. Fellow journalists at the Washington Post, New York Times and Webb's own editor accused him of blowing a few truths up into a massive conspiracy.
Amongst Webb's fundamental problems was his implication that the CIA lit the crack cocaine fuse. It was conspiracy theory: a neat presentation of reality that simply didn't jibe with real life. Webb later agreed in an interview that there is no hard evidence that the CIA as an institution or any of its agent-employees carried out or profited from drug trafficking.
Still, the fantastic story of the CIA injecting crack into ghettos had taken hold. In response to the public outcry following Webb's allegations--which were ultimately published in book form under the title Dark Alliance--the CIA conducted an internal investigation of its role in Central America related to the drug trade. Frederick Hitz, as the CIA Inspector General-- an independent watchdog approved by Congress--conducted the investigation. In October 1998, the CIA released a declassifie.
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
Acetabularia Information For Class 9 .docxvaibhavrinwa19
Acetabularia acetabulum is a single-celled green alga that in its vegetative state is morphologically differentiated into a basal rhizoid and an axially elongated stalk, which bears whorls of branching hairs. The single diploid nucleus resides in the rhizoid.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
Introduction to AI for Nonprofits with Tapp Network
CNL-521 Topic 3 Vargas Case StudyBob and Elizabeth arrive.docx
1. CNL-521 Topic 3: Vargas Case Study
Bob and Elizabeth arrive together for the third session. As
planned, you remind the couple that the goal of today’s session
is to gather information about their families of origin. Bob
begins by telling you about his older sister, Katie, who is 36
and lives nearby with her three children. Katie’s husband,
Steve, died suddenly last year at the age of 40 when the car he
was driving hit a block wall. Elizabeth speculates that Steve
was intoxicated at the time, but Bob vehemently denies this
allegation. He warns Elizabeth to “never again” suggest alcohol
was involved. You note Bob’s strong response and learn that his
own biological father, whom his mother divorced when Bob was
3 and Katie was 5, had been an alcoholic. When asked about his
father, Bob says, “His name is Tim, and I haven’t seen him
since the divorce.” Bob shares that he only remembers
frequently hiding under the bed with Katie to stay safe from his
violent rages. He adds that 5 years after the divorce, his mother,
Linda, married Noel who has been “the only dad I’ve ever
known.” He insists that his sister married “a devout Christian
who never touched alcohol” and attributed the 3:00 a.m. tragedy
to fatigue. He adds that a few days before the accident, Katie
had complained to him that her husband had been working many
late nights and “just wasn’t himself.” Bob speaks fondly of his
sister and confirms that they have always been “very close.”
From Elizabeth, who is 31 years old, you learn that she was
adopted by her parents, Rita and Gary, who were in their late
40s at the time. They were first generation immigrants who had
no family in the United States. Their biological daughter,
Susan, had died 10 years earlier after Rita accidentally ran over
the 5 year old while backing out of the driveway. Elizabeth
3. Nike versus New Balance: Trade Policy in a World of Global
Value
Chains
Case prepared by Simon BRODEUR1 and Professor Ari VAN
ASSCHE2
United States Trade Representative (USTR) Michael Froman
closed the door of his new office,
walked to his window, and admired the glimmering Washington
D.C. skyline. During his
illustrious career as a government official, Froman had never
wielded such power as he did now:
he had just been nominated by President Obama to be the 11th
USTR, serving as the president’s
principal advisor, negotiator, and spokesperson on matters
pertaining to international trade and
investment. One of his main responsibilities would be to
complete negotiations on the Trans-
Pacific Partnership (TPP), an Asian-Pacific trading bloc built
upon the pre-existing Trans-Pacific
Strategic Economic Partnership Agreement between Brunei,
Chile, New Zealand, and Singapore.
As of 2013, numerous nations had participated in the TPP
negotiations, namely the United States,
Australia, Brunei, Canada, Chile, Japan, Malaysia, Mexico, New
Zealand, Peru, Singapore and
Vietnam (Exhibit 1).
The TPP was the most promising trade liberalization initiative
since the Doha round of world
trade talks, which stalled in 2008, and would cover
approximately 40% of the world’s GDP.3 The
multilateral talks could potentially deliver huge benefits for the
5. The International Journal of Case Studies in Management is
published on-line (http://www.hec.ca/en/case_centre/ijcsm/),
ISSN 1911-2599.
This case is intended to be used as the framework for an
educational discussion and does not imply any judgement on the
administrative situation presented. Deposited under number 9 00
2014 001 with the HEC Montréal Case Centre, 3000, chemin de
la Côte-Sainte-Catherine, Montréal (Québec) Canada H3T 2A7.
HEC087
For the exclusive use of Z. Chen, 2020.
This document is authorized for use only by Zhuo Chen in The
Global Economic Environment-1-1-1-1 (A) taught by ROBERT
COSCARELLO, Pepperdine University from Mar 2020 to Apr
2020.
http://www.hec.ca/en/case_centre/ijcsm/
http://www.economist.com/blogs/banyan/2011/11/free-trade-
agreements
http://www.worldbank.org/content/dam/Worldbank/document/E
AP/eap-update-april-2013.pdf
http://www.worldbank.org/content/dam/Worldbank/document/E
AP/eap-update-april-2013.pdf
Nike versus New Balance: Trade Policy in a World of Global
Value Chains
When negotiating the TPP, it was therefore imperative for
Froman to find the right balance
between promoting American business interests abroad and
protecting American interests at
6. home.
In recent months, industry activists and politicians had focused
on the downside risks of the TPP
negotiations for the American footwear industry. U.S. footwear
manufacturing had contracted by
almost a third in the last decade due to increased import
competition from China and Vietnam,
and tariff reductions on Vietnamese imports would likely
accelerate this decline.
Froman was aware that the footwear industry would be a major
sticking point in the TPP
negotiations. After consulting with various U.S. footwear lobby
groups earlier that day, he knew
that even among American companies, there was disagreement
on the position the U.S. should
adopt. The divide was especially wide between two major
footwear companies: Nike Inc. and
New Balance. On the one hand, New Balance was strongly
opposed to the removal of tariffs on
shoes from Vietnam, as they believed this would endanger
footwear manufacturing activities in
the U.S. On the other hand, Nike Inc. was adamant that the
tariffs on footwear imports from
Vietnam were detrimental to the U.S. economy. According to
Nike, tariffs have led to higher
footwear prices, which harm U.S. consumers and reduce the
competitiveness of U.S. firms. If
tariffs were eliminated, U.S. footwear manufacturers would be
able to save on production costs
and reinvest those savings in modern, high-value-added jobs in
America.1
When he was sworn in as USTR, Froman had promised to use
every tool at his disposal to level
7. the playing field so that Americans could compete and win in
the global economy.2 Yet
discussions with representatives from New Balance and Nike
had shown him that identifying the
best negotiating strategy would be complex and require in-depth
analysis of the impact of tariff
elimination on the various footwear industry stakeholders. His
stance on the TPP footwear
dilemma required urgent deliberation, as the president had
summoned all of his advisors to a
conference call later that evening and expected them to advise
him on the position the United
States should adopt during the TPP negotiations.
The U.S. footwear industry
Froman had to first consider the U.S. footwear market and
industry to determine the impact of the
TPP on the domestic economy. The challenges facing the
footwear manufacturing industry were
similar to those of the U.S. manufacturing sector as a whole.
Rising wages and heavy competition
from low-cost countries were putting a strain on U.S. shoe
factories. In 2012, only 13,290 people
were employed in the footwear manufacturing industry, down
from 19,440 in 2003. This
decrease was due largely to a 41% decline in the number of
production workers (Exhibit 3). In
comparison, office and administrative support occupations in
the footwear industry had dropped
by just 25%, and management occupations had almost returned
to 2003 levels.
1 Eric Martin, “New Balance Wants Its Tariffs. Nike Doesn’t,”
BloombergBusinessWeek, May 3, 2012 (accessed October 17,
9. The main reason for America’s manufacturing decline is
growing import competition from low-
wage countries. Currently, almost 99% of the footwear sold in
the United States is imported from
low-cost manufacturing locations, especially in East and
Southeast Asia.1 China alone accounted
for 71.9% of U.S. footwear imports in 2012, while TPP
negotiating partner Vietnam, a rapidly
developing footwear behemoth, accounted for 10.1% of those
imports (Exhibit 5). The pace of
Vietnam’s growth in the footwear market is staggering: exports
to the U.S. jumped an astounding
23.8% annually between 1997 and 2012, and that trend is
expected to continue over the short
term as wages in China continue to rise.
Vietnamese footwear industry
Ever since Vietnam signed the U.S.-Vietnam Bilateral Trade
Agreement in 2001 establishing
“normal trade relations,”2 it has been an increasingly important
source of footwear products. In
just fifteen years, Vietnam grew into America’s second largest
supplier of footwear imports
(Exhibit 5). In 2012, about 13% of its exports to the U.S. were
footwear products, making this a
strategic industry for Vietnam.3
Vietnam has a clear footwear production cost advantage over
the U.S. A New Balance
spokesperson estimated that producing a pair of shoes in the
U.S. costs 25-35% more than in
Vietnam,4 while a Nike representative estimated that it costs
around US$20-25 to produce a pair
of Nike running shoes in a Vietnamese factory.5
10. Low wages are a key driver of this production cost advantage.
Earnings in Vietnam are more than
20 times lower than in the U.S. A study by the Congressional
Research Service concluded that
wages in Vietnam’s footwear and apparel manufacturing sector
averaged US$0.51 an hour in
2012.6 This is significantly lower than in China.7
In addition to low wages, low labour and environmental
standards help Vietnamese companies
keep their production costs down. Vietnam has ratified eighteen
conventions with the
1 Timothy Aeppel, “New Balance Sweats Push to End U.S. Shoe
Tariffs,” The Wall Street Journal, February 27, 2013, (accessed
October 17, 2013).
2 Embassy of the United States, Hanoi, Vietnam, “The U.S.-
Vietnam Bilateral Trade Agreement (BTA) – Resources for
Understanding,” n.d. (accessed October 17, 2013).
3 United States Census Bureau, “U.S. Imports from Vietnam by
5-digit End-Use Code, 2003 – 2012,” 2012 (accessed October
17,
2013).
4 See Aeppel, op. cit.
5 Jim Landers, “Vietnam Trade Deal Sparks a Running Battle
on Shoe Tariffs,” The Dallas Morning News, December 27,
2012
(accessed October 17, 2013).
6 Michaela D. Platzer, U.S. Textile Manufacturing and the
Trans-Pacific Partnership Negotiations, Congressional Research
Service, October 5, 2012 (accessed October 17, 2013).
12. still a problem in Vietnam as the
government struggles to enforce laws prohibiting such working
conditions.2
Government support of the country’s strategic footwear sector
also strengthens Vietnamese firms.
Vietnam is officially still a communist country, and its footwear
sector is dominated by large
state-owned enterprises that enjoy large government subsidies
and extensive support. For
example, Vinatex, the state-owned textile and apparel
consortium, is the tenth largest garment
producer in the world and currently accounts for 40% of the
country’s apparel production, 60%
of its textile production, and close to 20% of its total apparel
and textile exports.3 According to
the National Council of Textile Organizations, Vinatex benefits
from eleven different
government subsidy programs that include low-cost loans and
free land.4
A final advantage of Vietnam’s footwear industry is its heavy
reliance on cheap imported yarn
from China. Like Vietnamese footwear, Chinese yarn is
predominantly produced by large state-
owned enterprises that receive dozens of direct and indirect
subsidies from the government. The
allegedly unfair practices of Chinese yarn producers has led
many countries, including those in
the European Union, to impose antidumping tariffs on yarn
originating from China.5
U.S. trade protectionism
Compared to other industries, the U.S. footwear sector is highly
protected by import tariffs.
13. While U.S. import tariffs on consumer goods average about
1.5%, the average tariff on imported
footwear is approximately 10%.6 Moreover, they can run as
high as 48% of the “free on board”
(FOB) value of imported shoes, that is, the commercial value of
the shoes before transportation
costs are added to the price (Exhibit 6). These tariff rates
substantially affect production costs; for
instance, of their US$20-25 overall production costs, current
tariffs on athletic shoes add US$3 to
US$5 to the cost of midrange running shoes from Vietnam,
increasing production costs by as
much as 25%.7
While the United States has signed numerous free trade
agreements (FTA) over the years, it has
generally been reluctant to completely eliminate tariffs on
footwear and has systematically
1 International Labour Organization, “International Labour
Standards,” n.d. (accessed October 17, 2013).
2 Embassy of the United States, Hanoi, Vietnam, “International
Labor Standards – Critical To Successful Economic
Development
– Workers’ Rights and Labor Standards,” n.d. (accessed October
17, 2013).
3 See Platzer, op. cit.
4 National Council of Textile Organizations, “Fact Sheet –
Trans-Pacific Partnership Negotiations,” 2012 (accessed
October 17,
2013).
5 Jonathan Steams, “China Faces Five-Year EU Tariffs on
Automotive Yarn,” Bloomberg, November 29, 2010 (accessed
October
15. origin requires that the yarn used in
shoe manufacturing be produced within the FTA countries to
qualify for the reduced duties
agreed upon in the trade agreements.1 This serves to protect the
U.S. textile industry, a battered
yet significant component of the manufacturing sector. Textiles
are a US$53 billion industry that
employed almost 240,000 workers in 2011. However, its
prominence has declined steadily in
recent years, with almost 300,000 fewer people working in the
textile industry than in 2001.2
New Balance versus Nike Inc.
While Vietnam was pressuring the U.S. to reduce tariffs on
imported footwear, interest groups
inside the country were also pressuring Froman and the U.S.
negotiators. Froman’s meetings with
various lobby groups revealed that the widest divide was
between American footwear companies
New Balance and Nike Inc. On the one hand, New Balance
argued that reductions in import
tariffs would be detrimental to U.S. footwear workers and
smaller footwear manufacturing
companies. On the other hand, Nike Inc. contended that
reducing tariffs on footwear would
strengthen U.S. companies, create high-value footwear jobs in
the United States, and lower
consumer prices. Froman was particularly intrigued by this
disagreement: which of the two
companies was really defending American economic interests?
New Balance Athletic Shoe, Inc.
New Balance, an American firm headquartered in Boston,
16. Massachusetts, has been a player in the
footwear industry for many years.3 It was founded in 1906
under the name New Balance Arch
Support Company by William J. Riley, a British immigrant who
had the idea of designing arch
supports shaped like a chicken’s three-clawed foot to maximize
comfort, mostly for policemen
and waiters. He later added ancillary products, and, in 1938,
designed his first athletic shoe made
of lightweight kangaroo leather with crepe soles for the Brown
Bag Harriers Running Club in
Belmont, MA. The company continued to grow and was bought
in 1972 by Jim Davis, an
entrepreneur and marathoner who still owns the firm. By 2012,
his business acumen had led New
Balance to becoming the fourth largest athletic footwear and
apparel company in the world with
annual sales of $2.4 billion in over 120 countries. In addition to
its eponymous footwear and
clothing brand, the New Balance family also includes the brands
Avaron, Cobb Hill, Dunham,
PF-Flyers, Brine, and Warrior.
Throughout its history, New Balance has focused on footwear
innovation, resulting in a number
of industry firsts: the first athletic shoe available in multiple
widths; the first running shoe made
exclusively for women; and the first shoe to incorporate flared
heels for stability. More recently,
the company has focused on custom shoes and its “Made in
America” businesses. For US$115, a
consumer can order a custom pair of shoes that is made in the
United States, choosing any
combination of twenty-six leather colours and five fabric
colours for nine different shoe parts.
And the company is taking customization much further than just
18. Over the years, this focus on innovation has consolidated New
Balance’s reputation: in 1976, the
New Balance 320 was voted the best running shoe by Runner’s
World, and the 990 “Made in the
USA” series, produced in the company’s five U.S. factories, has
been increasingly popular
among U.S. consumers ever since it was launched in 1982. In
2008, New Balance inaugurated a
state-of-the-art research lab next to its Lawrence, MA, factory
that is exclusively dedicated to
research into athletic footwear.
Unlike most of its competitors, New Balance does not outsource
all of its footwear production to
foreign contractors. Rather, it uses a hybrid system of
insourcing and outsourcing. In New
England, for example, New Balance owns five manufacturing
plants that primarily produce for
local markets: 90% of their output is for American consumers,
accounting for about a quarter of
the company’s total U.S. sales.1 While New Balance is
currently the sole U.S. athletic footwear
manufacturer to produce a portion of its shoes in the United
States, it also relies heavily on
foreign contractors in China, Indonesia, and Vietnam.2
New Balance has a number of U.S. suppliers for parts it does
not manufacture itself, such as
embroidery thread or the leather used in certain shoes (see
Exhibit 7 for the various shoe parts).
These suppliers, for which New Balance is a major client,
employ an estimated 7,000 people in
the U.S.3 Moreover, its factories in small U.S. cities are vital to
local economies: for instance, in
Skowhegan, Maine, a town of 8,500, it is the largest employer
in the region and its presence
20. Global Economic Environment-1-1-1-1 (A) taught by ROBERT
COSCARELLO, Pepperdine University from Mar 2020 to Apr
2020.
http://www.newbalance.com/Made-in-the-
USA/made_in_usa,default,pg.html
Nike versus New Balance: Trade Policy in a World of Global
Value Chains
Nike Inc.
Nike Inc. is a public company headquartered in Beaverton,
Oregon, and the largest athletic
footwear and athletic apparel company in the world in terms of
sales,1 with over $24 billion in
revenues for a total gross profit of over US$10 billion in 2012.2
Its high profit margins (43.4% in
2012) have been reflected in the price of its shares, whose value
increased an average of 17%
annually between 2003 and 2013.3 Nike Inc. offers a wide
variety of products in seven key
categories: running, basketball, soccer, men’s training, women’s
training, action sports, and Nike
Sportswear.4 In addition to the Nike brand, it also owns a few
other highly popular apparel and
sporting equipment brands such as Hurley, Converse, and Bauer
Nike Hockey. Nike Inc. directly
employs 37,715 people worldwide, but indirectly employs a
much larger workforce in factories
owned by contractors who may manufacture products for
numerous companies including Nike
Inc.5
21. Nike Inc. was founded in 1964 as Blue Ribbon Sports by two
partners, Phil Knight and Bill
Bowerman. They started as distributors of Japanese-made Tiger
(now Asics) running shoes, but
as the relationship between the firm and its Japanese supplier
began to sour in the early 1970s,
Knight and Bowerman decided it was time to start
manufacturing their own shoes. The new line
of Nike shoes debuted in 1972 for the U.S. Track & Field
Trials, where Bowerman’s innovative
design – a very light outsole with waffle-type nubs for traction
– was a great success. Then, in
1979, Nike Inc. innovated once more by introducing its Nike
Air technology in running shoes,
paving the way for its IPO a year later. The firm quickly grew
to become the industry leader;
however, unlike New Balance, Nike Inc. didn’t position itself in
the booming fitness sector and
thus lost ground to its competitors.
These difficulties were overcome by major marketing campaigns
in the mid-eighties − first in
1985, when Michael Jordan, a young NBA rookie at the time,
endorsed the company, and then in
1987, when the iconic Air Max commercial featuring the
Beatles song Revolution was aired. By
the end of the eighties, Nike Inc. had regained its title of largest
footwear company in the world.
Marketing then became a large part of Nike Inc.’s business
strategy: in 1995, the firm sponsored
the Brazil National Soccer Team and supplied its uniforms. One
year later, a young golfer named
Tiger Woods was signed for a reported annual compensation of
$5 million. The company
continued to expand, innovate, and skilfully market its products
throughout the next decade. In
23. 2020.
http://finance.yahoo.com/q/ks?s=NKE+Key+Statistics
https://www.google.com/finance?cid=25670
http://www.nyse.com/listed/nke.html
http://www.nikeresponsibility.com/report/
http://nikeinc.com/pages/history-heritage
http://www.nikebiz.com/crreport/content/charts/chart-7-2.php
Nike versus New Balance: Trade Policy in a World of Global
Value Chains
most U.S. footwear companies (with the notable exception of
New Balance), shoe manufacturing
has been almost completely outsourced to foreign contractors in
Mexico, Brazil, Argentina, Italy,
Bosnia, India, China, South Korea, Japan, Indonesia, Taiwan,
and Vietnam.1 In August 2013, it
was estimated that Nike’s external contractors employed more
than a million people in
774 factories in 42 countries. Vietnam supplies the most
workers to Nike, with over 310,000
people producing footwear, apparel, and sporting equipment,
followed by China and Indonesia,
where contractors employ about 260,000 and 175,000 people
respectively. Three quarters of
Nike’s global workforce is located in these three countries (see
Exhibit 8).
Contrary to New Balance, Nike Inc. was a strong supporter of
reducing import tariffs, predicting
that U.S. footwear manufacturers would be able to save on
production costs and reinvest their
savings in modern, high-value-added jobs in the United States.
24. As Erin Dobson, a Nike Inc.
spokesperson said, “The question comes down to, is one kind of
job more important than
another? What are the jobs for the 21st century? They’re not
necessarily jobs that existed 30 years
ago.”2
Nike Inc. also argued that being able to offshore footwear
production without being penalized by
tariffs would help to offset rising foreign labour and material
costs, which would in …
Nike vs. New Balance Case Questions
S
Nike New Balance Case Questions
In this case, Nike wishes the tariffs on shoes from Vietnam to
be eliminated. Please defend their position citing the reasons
stated in the case and any others that you can think of.
OR
Likewise, New Balance wishes the tariffs to remain; please
defend their position citing the reasons stated in the case and
any others you can think of
SO CHOOSE TO ANSWER EITHER QUESTION 1 OR
QUESTION PLUS:
EXTRA 0.2 (ADDED TO YOUR GRADE) Let’s assume that
the TPP is implemented and that tariffs from Vietnam in
question are eliminated: as an advisor to New Balance, what
alternative actions would you have them consider (use your
creativity---the possible answers are not necessarily addressed
in the case).