Joseph Sigmon
Classroom Mang. & Student Disc.
Dr. Swinehart-Held
December 7, 2020
Reflection Paper: Virtual Field Experience EDU 3263 Classroom Management
The teachers promoted engagement by displaying pictures that were familiar to students
and then she asked them questions. The classroom had boxes drawn on the floor to boost
understanding. Students were asked to physically stand in the boxes to boost understanding of
mathematics. The next step after physical demonstration was use of projectors to display
calculations.
The video “Literacy Lesson First Grade” was effective in student’s comprehension of
concepts since the teacher asked questions and influenced the learners to remember prior lessons.
Classroom engagement was boosted by the teacher as he told learners to divide themselves and
to discuss. His technique of regaining the students’ attention was effective since there was a
familiar phrase he called out. The video “Teacher Observation of Ms. Ainge” revealed effective
incorporation of technology in learning environments. The teacher’s strategy of changing
projector slides as she asked students questions was highly effective. Engagement was properly
applied in the classroom since she waited for feedback from students using a particular gesture.
Students’ assessment was properly applied by Ms. Angie.
The video “Teaching Character Traits | 3rd Grade Reading Comprehension” revealed
the teacher’s effective strategy of ensuring learners were properly prepared for the lesson. The
teacher distributed charts to every student so that there would be collaboration between her
This study source was downloaded by 100000778807132 from CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/105672283/fieldobservationhourspaperdocx/
https://www.coursehero.com/file/105672283/fieldobservationhourspaperdocx/
readings and questions listed on the charts. The teaching strategy was effective since learners
could analyze character traits based on simple phrases. The video “TPSD Kindergarten, Phonics
First, Lesson 16 Level 1” shows the effective strategy by the teacher where she begins the lesson
by asking students to recall concepts from previous lessons. The teacher had cards ensured
students could visually recall concepts. Engagement of three teachers for many students ensured
every student received proper attention. The videos by Peoria Unified C&I, Wow English, and
Teach4Life revealed that students’ engagement and application of projector technology was an
effective tactic of promoting learning.
Since a learning environment is the most important component of a student’s education, it
is important to create a conducive environment. The first strategy I would apply is greeting
students as soon they reach the class (Terada, 2019). This is highly effective in promoting
connection with students. I would ensure all students receive equal share of attention before the
begin ...
Assignment 2 Recipe for Success!Every individual approaches life .docxMerrileeDelvalle969
Assignment 2: Recipe for Success!
Every individual approaches life and situations differently. We all use communication as a means to express ourselves. However, communication is as much about listening as it is about talking. Communication is a mutual exchange.
Everyone has had a disagreement with someone in which the other person may respond with “You aren’t listening to me!” or “You don’t understand me!” The fact is, you are not validating the other person or are perceived as someone who is not providing validation. Validation can defuse a potentially explosive scenario.
Consider your personal experiences and communication skills.
What are the skills you use to communicate and how do they impact your interactions with others?
How do you plan to manage conflict communication?
Do you set a goal for the outcome you are seeking to achieve?
Do you consider your audience?
What point of view do you try to convey?
What is your message or argument in communication?
Have you ever applied the principles above? Have they worked for you? If not, what has worked for you?
Write your responses in two to three paragraphs
.
Assignment 2 Secure Intranet Portal LoginBackgroundYou are the.docxMerrileeDelvalle969
Assignment 2: Secure Intranet Portal Login
Background:
You are the security professional for a medium-sized manufacturing company. The organization would like to deploy a secure portal for in-house use only. The portal will be available from the company's intranet. The company is utilizing a Microsoft Internet Information Services (IIS) server to run the local intranet website. The portal will be created by in-house programming staff utilizing ASP.NET technology and scripting.
The management requires the login to be protected using Hypertext Transfer Protocol Secure (HTTPS). In addition, the management would like to use an integrated login so that users do not have to remember or create a separate username or password for this portal login. The company is using a Windows Server 2012 Active Directory infrastructure. All users logging on to the portal also have existing active directory user accounts. The company also has an in-house Windows Server that serves as a local certificate authority for other existing web applications and services.
Tasks:
Create a 4- to 5-page report that will be shared with the company's board of directors, providing guidance and recommendations on how to best secure the web portal. Your report should cover the following aspects:
Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.
Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).
Describe how Windows certificate services work. Recommend a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the new portal.
Explain how users can connect and log on to the portal in a secure fashion using secured socket layer (SSL) or HTTPS to ensure that all login credentials and activities on the portal are secure and encrypted.
Ensure that you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.
Submission Details:
Create your report in a Microsoft Word document.
Save the document as M4_A2_Lastname_Firstname.doc.
By
Wednesday, June 14, 2017
, submit your document to the
M4 Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Described what Windows-integrated authentication is and explained how it could potentially be used to provide secure access control to the portal.
20
Described the use of Windows security groups and how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).
20
Described how Windows certificate services work. Recommended a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the ne.
Assignment 2 Research proposal1)Introduce the issue a.docxMerrileeDelvalle969
Assignment 2: Research proposal
1)
Introduce the issue and then present it in question form.
2)
Explain briefly why you are interested in the issue (no need for details here since you have already discussed this in your personal experience paper)
3)
Describe what you already know about the issue. (its general context, history behind it, etc.)
4)
Explain what you need to learn to present an effective argument.
5)
Show your plans for conducting research about this topic.
read the attachment and wright two pages research proposal based on this steps above.
.
Assignment 2 Required Assignment 1—The FMLA in PracticeThe Family.docxMerrileeDelvalle969
Assignment 2: Required Assignment 1—The FMLA in Practice
The Family and Medical Leave Act (FMLA) was enacted in 1993 and entitles eligible employees of employers covered under it to take unpaid, job-protected leave for specific family and medical reasons. During this leave, group health insurance coverage continues under the same terms and conditions applicable if the employees had not taken leave.
You may access the latest rules covered under the FMLA at the following Web site:
U.S. Department of Labor. (n.d.)
Wage and Hour Division (WHD): Family Leave and Medical Act
. Retrieved from
http://www.dol.gov/whd/fmla/
In this assignment, you will analyze the FMLA policy of an organization to understand the policy's role and importance in employee management.
Tasks:
Click
here
to access and read a portion of the employee handbook of Widgets Inc. that outlines the company's FMLA policy statement. Analyze the handbook on the basis of FMLA guidelines. Identify a minimum of five errors or oversights that relate to the FMLA and list their solutions in a separate document.
In addition, in the same document, include answers to the following questions:
What are three alternative methods of calculating twelve weeks of leave within a twelve-month period? Which method do you believe is the best and why?
An employee should give as much notice as possible to his or her employer. The Department of Labor suggests a minimum notice of thirty days. What if an employee needs emergency FMLA leave? Is the employee still allowed to take FMLA leave, although he or she was unable to give the thirty-day notice?
What are the legal ramifications if the same position is not available to an employee on his or her returning from FMLA leave?
During an employee's FMLA leave, Widgets Inc. downsizes and closes the department in which the employee works. What will happen to the employee? What are the legal ramifications?
Submission Details:
Save your final document as M3_A2_Lastname_Firstname.doc and, by
Wednesday, February 1, 2017
, submit it to the
M3: Assignment 2 RA 1 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Identified a minimum of five errors or oversights on the basis of the FMLA policy and suggested practical solutions for each.
56
Evaluated alternative methods of calculating twelve weeks of leave within a twelve-month period.
32
Explained the stand of the FMLA policy if an employee needs emergency FMLA leave without giving the thirty-day notice.
24
Explained the legal ramifications if the same position is not available to an employee on his or her returning from FMLA leave.
24
Explained the legal ramifications if a company downsizes and closes the department in which the employee works during the employee’s FMLA leave.
24
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
40
Total:
200
WIDGETS FAMILY LEAVE HANDBOOK.
Assignment 2 Research ProjectThis assignment consists of two pa.docxMerrileeDelvalle969
Assignment 2: Research Project
This assignment consists of two parts. The first part consists of the third installment for the research paper and is worth 20 points out of the 200 points allotted for this assignment. The second part requires application of concepts learned in
Weeks 1–3
and is worth significantly more than previous assignments and more than the first part of the assignment.
Part I—Research Paper
This week, you will research laws or regulations related to the topic you selected. The information may require research of federal and/or state laws, as well as administrative agency laws. Compare the laws of two states, if applicable. For example, if you are writing about gender discrimination, compare the federal law with law from one of the states that also provides protection at the state level. State laws often provide more protection than the federal law. Summarize the information about the laws or regulations you found related to your topic.
Compile your response to Part I in a Microsoft Word document
Part II—Legal and Ethical Challenges in Business Organizations
Read the scenarios and the questions that follow. Identify the legal issue(s) and apply legal concepts and possible arguments for each question. After reading the scenarios, prepare a resolution for each question using laws, cases, examples, and/or other relevant materials. Consider using short headings (consult APA materials) to separate the topics. Summarize the facts; do not copy the scenarios into the paper. After you have answered the questions and before the conclusion, identify potential ethical issues and propose recommendations to help the organization avoid future occurrences of the legal and ethical issues discussed in the assignment. Support your answers with information from the textbook and at least five scholarly sources other than the text and course lectures.
Prepare an 8- to 12-page paper that identifies the legal issues and potential solutions and answers all questions presented, supported by relevant legal authority. Properly cite all sources using APA format. Do not exceed the page length by more than two pages, as the instructor is not required to read excess pages.
Compile your response to Part II in a Microsoft Word document
Overview
Famous Subs and Pizza Company (FSPC) is a publicly traded corporation headquartered in Tallahassee, Florida, operating restaurants in ten states. The company also owns a food processing and distribution facility in Jackson, Mississippi. Approximately 20% of the employees work full time; however, FSPC primarily hires part-time employees as delivery drivers, cooks, and sandwich makers. FSPC leases space for most of its restaurants in shopping centers, but the company owns a few of the properties, as well as its headquarters office and the distribution facility. The company has experienced explosive growth over the last three years, but the growth has been accompanied by an increase in legal issues. The CEO, C.
Assignment 2 Required Assignment 2—Implementation of Sustainability.docxMerrileeDelvalle969
Assignment 2: Required Assignment 2—Implementation of Sustainability in an Organization
All consumers and firms affect sustainability in different ways, either directly or indirectly. In practicing sustainability, a firm could create value for consumers, investors, and other stakeholders, such as the community in which the firm operates within its value chain. In addition, a firm engaging in good sustainable practices can fulfill the needs of its customers, earn a profit, and preserve the environment. This assignment will allow you, as a consumer, to explore how you can impact sustainability.
Tasks:
Propose a sustainability investment plan to improve the performance of your work group or organization or an organization you hope to work for. The investment can be made in human resources, in expansion of tangible or intangible assets toward new uses, or in capital equipment or new technology.
Analyze how the investment plan achieves the following:
Contributes to the mission of the company
Expands rewards for all major components of the value chain, which should include the company, employees, suppliers, and customers
Generates wealth or value and is sustainable over time
Evaluates and anticipates risks associated with the investment
Organize your work to create a 2- to 3-page professional memo in a Microsoft Word document outlining your investment plan to the director and an 8- to 10-slide Microsoft PowerPoint presentation script with complete endnotes explaining your recommendations to employees in your work group. Follow APA standards for citation of sources.
Submission Details:
.
Assignment 2: Required Assignment 1—Intercultural Employee Motivation and Rewards
Culture plays a major role in the motivation of employees. Consider that though you have a mix of ethnicities on your team, you also need to be aware of cultural differences including gender, generation, and other categories of human differences.
Write an 8–10-page report on employee motivation, including a recommendation for an employee reward system that will meet the needs of the variety of cultural groups you manage based on the following motivation factors:
Job security
Professional development
Job performance
Goal setting
Employee recognition
Compensation
Discuss employee motivation as it relates to culture, and consider how you might develop a reward system that recognizes diversity and is equitable and legally sound. Support your recommendations with scholarly references.
Write an 8–10-page report in Word format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M3_A2.doc.
.
Assignment 2 Rape and PornographyA long-standing question in the .docxMerrileeDelvalle969
Assignment 2: Rape and Pornography
A long-standing question in the field of psychology concerns the relationship between exposure to sexually explicit material, pornography, and criminal behavior. One of the most significant issues focuses on the impact that pornography has on an individual’s propensity to commit rape.
Select
two
peer-reviewed journal articles to examine the correlation between rape and pornography.
Write a paper that includes the following:
Analyze the selected journal articles and identify any correlation between rape and pornography. Provide statistical information in support.
Synthesize your research and conclude, with reasons, whether pornography leads to sexual violence. If not, state the factors that contribute to sexual violence.
Analyze whether the regulation of pornography is warranted based on the evidence so far.
Give reasons for your responses. Support your statements with appropriate examples.
.
Assignment 2 Recipe for Success!Every individual approaches life .docxMerrileeDelvalle969
Assignment 2: Recipe for Success!
Every individual approaches life and situations differently. We all use communication as a means to express ourselves. However, communication is as much about listening as it is about talking. Communication is a mutual exchange.
Everyone has had a disagreement with someone in which the other person may respond with “You aren’t listening to me!” or “You don’t understand me!” The fact is, you are not validating the other person or are perceived as someone who is not providing validation. Validation can defuse a potentially explosive scenario.
Consider your personal experiences and communication skills.
What are the skills you use to communicate and how do they impact your interactions with others?
How do you plan to manage conflict communication?
Do you set a goal for the outcome you are seeking to achieve?
Do you consider your audience?
What point of view do you try to convey?
What is your message or argument in communication?
Have you ever applied the principles above? Have they worked for you? If not, what has worked for you?
Write your responses in two to three paragraphs
.
Assignment 2 Secure Intranet Portal LoginBackgroundYou are the.docxMerrileeDelvalle969
Assignment 2: Secure Intranet Portal Login
Background:
You are the security professional for a medium-sized manufacturing company. The organization would like to deploy a secure portal for in-house use only. The portal will be available from the company's intranet. The company is utilizing a Microsoft Internet Information Services (IIS) server to run the local intranet website. The portal will be created by in-house programming staff utilizing ASP.NET technology and scripting.
The management requires the login to be protected using Hypertext Transfer Protocol Secure (HTTPS). In addition, the management would like to use an integrated login so that users do not have to remember or create a separate username or password for this portal login. The company is using a Windows Server 2012 Active Directory infrastructure. All users logging on to the portal also have existing active directory user accounts. The company also has an in-house Windows Server that serves as a local certificate authority for other existing web applications and services.
Tasks:
Create a 4- to 5-page report that will be shared with the company's board of directors, providing guidance and recommendations on how to best secure the web portal. Your report should cover the following aspects:
Describe what Windows-integrated authentication is and how it could potentially be used to provide secure access control to the portal.
Describe the use of Windows security groups and explain how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).
Describe how Windows certificate services work. Recommend a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the new portal.
Explain how users can connect and log on to the portal in a secure fashion using secured socket layer (SSL) or HTTPS to ensure that all login credentials and activities on the portal are secure and encrypted.
Ensure that you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources; and display accurate spelling, grammar, and punctuation.
Submission Details:
Create your report in a Microsoft Word document.
Save the document as M4_A2_Lastname_Firstname.doc.
By
Wednesday, June 14, 2017
, submit your document to the
M4 Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Described what Windows-integrated authentication is and explained how it could potentially be used to provide secure access control to the portal.
20
Described the use of Windows security groups and how a connection to active directory could be performed using the existing technology (existing IIS server and Windows Server 2012 Active Directory).
20
Described how Windows certificate services work. Recommended a solution that would utilize the in-house Windows certificate authority server to provide a certificate to the ne.
Assignment 2 Research proposal1)Introduce the issue a.docxMerrileeDelvalle969
Assignment 2: Research proposal
1)
Introduce the issue and then present it in question form.
2)
Explain briefly why you are interested in the issue (no need for details here since you have already discussed this in your personal experience paper)
3)
Describe what you already know about the issue. (its general context, history behind it, etc.)
4)
Explain what you need to learn to present an effective argument.
5)
Show your plans for conducting research about this topic.
read the attachment and wright two pages research proposal based on this steps above.
.
Assignment 2 Required Assignment 1—The FMLA in PracticeThe Family.docxMerrileeDelvalle969
Assignment 2: Required Assignment 1—The FMLA in Practice
The Family and Medical Leave Act (FMLA) was enacted in 1993 and entitles eligible employees of employers covered under it to take unpaid, job-protected leave for specific family and medical reasons. During this leave, group health insurance coverage continues under the same terms and conditions applicable if the employees had not taken leave.
You may access the latest rules covered under the FMLA at the following Web site:
U.S. Department of Labor. (n.d.)
Wage and Hour Division (WHD): Family Leave and Medical Act
. Retrieved from
http://www.dol.gov/whd/fmla/
In this assignment, you will analyze the FMLA policy of an organization to understand the policy's role and importance in employee management.
Tasks:
Click
here
to access and read a portion of the employee handbook of Widgets Inc. that outlines the company's FMLA policy statement. Analyze the handbook on the basis of FMLA guidelines. Identify a minimum of five errors or oversights that relate to the FMLA and list their solutions in a separate document.
In addition, in the same document, include answers to the following questions:
What are three alternative methods of calculating twelve weeks of leave within a twelve-month period? Which method do you believe is the best and why?
An employee should give as much notice as possible to his or her employer. The Department of Labor suggests a minimum notice of thirty days. What if an employee needs emergency FMLA leave? Is the employee still allowed to take FMLA leave, although he or she was unable to give the thirty-day notice?
What are the legal ramifications if the same position is not available to an employee on his or her returning from FMLA leave?
During an employee's FMLA leave, Widgets Inc. downsizes and closes the department in which the employee works. What will happen to the employee? What are the legal ramifications?
Submission Details:
Save your final document as M3_A2_Lastname_Firstname.doc and, by
Wednesday, February 1, 2017
, submit it to the
M3: Assignment 2 RA 1 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Identified a minimum of five errors or oversights on the basis of the FMLA policy and suggested practical solutions for each.
56
Evaluated alternative methods of calculating twelve weeks of leave within a twelve-month period.
32
Explained the stand of the FMLA policy if an employee needs emergency FMLA leave without giving the thirty-day notice.
24
Explained the legal ramifications if the same position is not available to an employee on his or her returning from FMLA leave.
24
Explained the legal ramifications if a company downsizes and closes the department in which the employee works during the employee’s FMLA leave.
24
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
40
Total:
200
WIDGETS FAMILY LEAVE HANDBOOK.
Assignment 2 Research ProjectThis assignment consists of two pa.docxMerrileeDelvalle969
Assignment 2: Research Project
This assignment consists of two parts. The first part consists of the third installment for the research paper and is worth 20 points out of the 200 points allotted for this assignment. The second part requires application of concepts learned in
Weeks 1–3
and is worth significantly more than previous assignments and more than the first part of the assignment.
Part I—Research Paper
This week, you will research laws or regulations related to the topic you selected. The information may require research of federal and/or state laws, as well as administrative agency laws. Compare the laws of two states, if applicable. For example, if you are writing about gender discrimination, compare the federal law with law from one of the states that also provides protection at the state level. State laws often provide more protection than the federal law. Summarize the information about the laws or regulations you found related to your topic.
Compile your response to Part I in a Microsoft Word document
Part II—Legal and Ethical Challenges in Business Organizations
Read the scenarios and the questions that follow. Identify the legal issue(s) and apply legal concepts and possible arguments for each question. After reading the scenarios, prepare a resolution for each question using laws, cases, examples, and/or other relevant materials. Consider using short headings (consult APA materials) to separate the topics. Summarize the facts; do not copy the scenarios into the paper. After you have answered the questions and before the conclusion, identify potential ethical issues and propose recommendations to help the organization avoid future occurrences of the legal and ethical issues discussed in the assignment. Support your answers with information from the textbook and at least five scholarly sources other than the text and course lectures.
Prepare an 8- to 12-page paper that identifies the legal issues and potential solutions and answers all questions presented, supported by relevant legal authority. Properly cite all sources using APA format. Do not exceed the page length by more than two pages, as the instructor is not required to read excess pages.
Compile your response to Part II in a Microsoft Word document
Overview
Famous Subs and Pizza Company (FSPC) is a publicly traded corporation headquartered in Tallahassee, Florida, operating restaurants in ten states. The company also owns a food processing and distribution facility in Jackson, Mississippi. Approximately 20% of the employees work full time; however, FSPC primarily hires part-time employees as delivery drivers, cooks, and sandwich makers. FSPC leases space for most of its restaurants in shopping centers, but the company owns a few of the properties, as well as its headquarters office and the distribution facility. The company has experienced explosive growth over the last three years, but the growth has been accompanied by an increase in legal issues. The CEO, C.
Assignment 2 Required Assignment 2—Implementation of Sustainability.docxMerrileeDelvalle969
Assignment 2: Required Assignment 2—Implementation of Sustainability in an Organization
All consumers and firms affect sustainability in different ways, either directly or indirectly. In practicing sustainability, a firm could create value for consumers, investors, and other stakeholders, such as the community in which the firm operates within its value chain. In addition, a firm engaging in good sustainable practices can fulfill the needs of its customers, earn a profit, and preserve the environment. This assignment will allow you, as a consumer, to explore how you can impact sustainability.
Tasks:
Propose a sustainability investment plan to improve the performance of your work group or organization or an organization you hope to work for. The investment can be made in human resources, in expansion of tangible or intangible assets toward new uses, or in capital equipment or new technology.
Analyze how the investment plan achieves the following:
Contributes to the mission of the company
Expands rewards for all major components of the value chain, which should include the company, employees, suppliers, and customers
Generates wealth or value and is sustainable over time
Evaluates and anticipates risks associated with the investment
Organize your work to create a 2- to 3-page professional memo in a Microsoft Word document outlining your investment plan to the director and an 8- to 10-slide Microsoft PowerPoint presentation script with complete endnotes explaining your recommendations to employees in your work group. Follow APA standards for citation of sources.
Submission Details:
.
Assignment 2: Required Assignment 1—Intercultural Employee Motivation and Rewards
Culture plays a major role in the motivation of employees. Consider that though you have a mix of ethnicities on your team, you also need to be aware of cultural differences including gender, generation, and other categories of human differences.
Write an 8–10-page report on employee motivation, including a recommendation for an employee reward system that will meet the needs of the variety of cultural groups you manage based on the following motivation factors:
Job security
Professional development
Job performance
Goal setting
Employee recognition
Compensation
Discuss employee motivation as it relates to culture, and consider how you might develop a reward system that recognizes diversity and is equitable and legally sound. Support your recommendations with scholarly references.
Write an 8–10-page report in Word format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M3_A2.doc.
.
Assignment 2 Rape and PornographyA long-standing question in the .docxMerrileeDelvalle969
Assignment 2: Rape and Pornography
A long-standing question in the field of psychology concerns the relationship between exposure to sexually explicit material, pornography, and criminal behavior. One of the most significant issues focuses on the impact that pornography has on an individual’s propensity to commit rape.
Select
two
peer-reviewed journal articles to examine the correlation between rape and pornography.
Write a paper that includes the following:
Analyze the selected journal articles and identify any correlation between rape and pornography. Provide statistical information in support.
Synthesize your research and conclude, with reasons, whether pornography leads to sexual violence. If not, state the factors that contribute to sexual violence.
Analyze whether the regulation of pornography is warranted based on the evidence so far.
Give reasons for your responses. Support your statements with appropriate examples.
.
Assignment 2 Rape and Pornography Due Tuesday January 3rd, 2.docxMerrileeDelvalle969
The document provides instructions for an assignment to analyze the relationship between rape and pornography. Students are asked to select two peer-reviewed journal articles on the topic and write a 3-4 page paper that analyzes any correlation found in the research, synthesizes whether pornography leads to sexual violence or other factors contribute, and analyzes if regulation of pornography is warranted based on evidence.
Assignment 2 RA 2 Case ScenarioBackgroundThe defendant is a f.docxMerrileeDelvalle969
Assignment 2: RA 2: Case Scenario
Background:
The defendant is a forty-year-old, single, black female charged with a first-degree assault. Specifically, she is alleged to have splashed liquid fire, a liquid drain cleaner, onto another woman's face, thus incidentally splashing five bystanders. Per the court order you received, Ms. Tyler was referred some time after the alleged crime for evaluation of her criminal responsibility. Her competency to stand trial (CST) was also at issue. At the time of the evaluation, Ms. Tyler was being held at the Southern County Detention Center. You met with Ms. Tyler. The defendant was informed that the results of the evaluation will be released to the court and that the results may be used against her in the court. Ms. Tyler gave her written consent to be evaluated.
Psychosocial History:
Only limited information is available regarding Ms. Tyler's background. She is a lifetime resident of the state. Her mother died of cancer at the age of seventy-nine years. Her father, L. Defendant, is eighty-four years old and is a retired farmer. Ms. Tyler has five living sisters, four living brothers, and two deceased siblings. Three of her sisters have received inpatient psychiatric treatment. One sister lives in Close Town, one in Europe with her husband who is in the military, and one sister died in a drowning accident. One brother committed suicide by hanging himself. There is no history of psychiatric problems among the other brothers.
Ms. Tyler has completed the tenth grade. She is literate. Ms. Tyler has worked on an assembly line for five years until 1988 when the factory closed. She then did an office-cleaning job. Her reasons for leaving this position are vague. She was unemployed for several years and was supported by her family. She lives in rent-free government housing. Her church pastor, A. Reverend, arranged for her to get employment at Helpful Industries through a vocational office at the State Psychiatric Hospital. She was employed at Helpful Industries for approximately two months prior to the incident. Ms. Tyler has never married. She has a thirteen-year-old son who lives with his father.
Psychiatric History:
Ms. Tyler denies any previous psychiatric treatment. Family members and individuals who know Ms. Tyler state that she has a long history of psychiatric symptoms such as loose associations and persecutory delusions. Ms. Tyler's sister, Ms. Sister, reports that Ms. Tyler has been violent in the past, threatening her niece with a knife. Her emotional difficulties were also apparently common knowledge among her congregation. As stated above, Ms. Tyler has a positive family history for psychiatric illness. Ms. Tyler is currently on haloperidol, an antipsychotic medication.
Ms. Tyler denies any alcohol or substance abuse. She states that she has one previous arrest for prostitution in 1975. She spent six months in jail for this offense.
Report of the Crime:
When asked to report what happened, Ms. Tyler st.
Assignment 2 RA 2 Characteristics of Effective Treatment Programs.docxMerrileeDelvalle969
Assignment 2: RA 2: Characteristics of Effective Treatment Programs
Several types of intervention and treatment approaches have been presented in your course textbook. In addition, evidence-based treatment programs are presented on the recommended government website,
http://www.crimesolutions.gov/
. The Office of Justice Programs' Crime
Solution
s.gov uses rigorous research to determine what works in criminal justice, juvenile justice, and crime victim services. On Crime
.
Assignment 2 Pay Increase Demands of EmployeesYou are an HR manag.docxMerrileeDelvalle969
Assignment 2: Pay Increase Demands of Employees
You are an HR manager with Spring Valley Laboratories. The organization pays its employees according to specific pay grades and ranges but maintains secrecy surrounding the specific numbers.
Nancy Lopez, a highly skilled medical technician, discovers that a male employee whose qualifications, experience, and job profile are similar to Nancy's is getting a considerably better package than she. Nancy serves a notice to the executive director, John Morrison, and threatens to resign if the organization does not grant her an immediate pay increase.
John does not want to lose Nancy because she is a skilled employee who has performed well in her eight-month career with the organization. John writes you an e-mail and seeks your advice on the case. You check Nancy's employment records and find that Nancy was given the compensation package that she had asked for during her final interview. You also find that Nancy's package is toward the lower limit of the pay range applicable for her job position. Nancy's salary is due for review after four months.
Based on this information frame your response to John. The response should answer the following:
Is Nancy's case a situation where a pay increase is called for? Why or why not? Justify your response with facts.
Is Nancy's case eligible as a pay inequity grievance? Why or why not? Explain.
How should Spring Valley Laboratories handle the situation? Provide John with a detailed plan of how the situation should be handled.
What impact would granting or not granting Nancy an immediate pay increase have on other employees? Why?
Articulate your response to John's e-mail. Your response should be in e-mail format and approximately two pages in MSWord. Use structured text (bolding, headings, bulleted lists, tables/charts) where appropriate to improve communicating your points. Send your email response to the
M4: Assignment 2 Dropbox
by
Wednesday, April 19, 2017
. Ensure that the tone of your response is formal and appropriate for the audience and use references to support your response.
.
Assignment 2 Policy and Client Impact DevelopmentFor this assig.docxMerrileeDelvalle969
Assignment 2: Policy and Client Impact Development
For this assignment
, you are expected to identify a sub-population within the field agency, then research and discuss with your field coordinator the state
(Idaho)
and federal policies that may impact the identified clients. Finally, discuss if there is a possibility for you to advocate on behalf of those clients.
The Assignment, submit a 2-3 page paper in which you:
o
Identify the subpopulation (Sexual Assault Victims)
o
Identify State and federal policies and discuss their impact on the clients identified
o
Provide suggestions for the agency
o
Discuss possibilities to advocate for the clients
References (use 3 or more)
Garthwait, C. L. (2017).
The social work practicum: A guide and workbook for students
(7th ed.). Upper Saddle River, NJ: Pearson.
.
Assignment 2 Public Health Administration Modern medical an.docxMerrileeDelvalle969
Assignment 2:
Public Health Administration
Modern medical and public health education was defined by two early 20
th
Century landmark documents: the
Flexner Report
and the
Welch-Rose Report
. These created two parallel and sometimes divergent systems. Review this 2008
NPR interview
about the Flexner Report and Pages 49-55 of the
Welch-Rose Report
. Then, expand your research to how (and if) medical care and public health intersect. Are they mutually supportive or do they operate in silos? Is there room for improvement?
Submit your critical analysis in a 4-5 page paper (not including your title page and references) with appropriate supporting references
.
Assignment 2 Nuclear MedicineNuclear medicine is a specialized br.docxMerrileeDelvalle969
Assignment 2: Nuclear Medicine
Nuclear medicine is a specialized branch of modern medicine that exploits the process of radioactivity for imaging, diagnosis, and treatment. Many imaging techniques inject small amounts of radioactive material into the body, which are then tracked by a sensing device specific to the type of radiation emitted from that material. Radiation has also been used to destroy diseased tissue, typically beyond the reach of standard surgical techniques.
Using the readings for this module, the Argosy University online library resources, and the Internet, write a paper on nuclear medicine. Address the following:
Explain the scientific and technical concepts related to nuclear medicine. Consider the following questions when you construct your response:
What type of radiation is typically exploited in most nuclear medicine procedures?
How are patients prepared for nuclear medicine procedures?
What are the advantages and limitations of nuclear medicine?
What ailments are typically diagnosed and treated via nuclear medicine procedures?
Evaluate a minimum of three applications of nuclear medicine relating to any of the following topics:
Positron Emission Tomography (PET) scans
Gallium scans
Indium white blood cell scans
Iobenguane scans (MIBG)
Octreotide scans
Hybrid scanning techniques employing X-ray computed tomography (CT) or magnetic resonance imaging (MRI)
Nuclear medicine therapy using radiopharmaceuticals
Support your statements with examples. Provide a minimum of three scholarly references.
Write a 2–3-page paper in Word format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M4_A2.doc.
By
Wednesday, April 19, 2017
, deliver your assignment to the
M4: Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Demonstrated an understanding of the basic scientific and technical concepts of nuclear medicine.
28
Evaluated current or future applications of nuclear medicine with three real-world examples.
32
Provided at least three reliable references to support examples of current and future nuclear medicine applications.
20
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
20
Total:
.
Assignment 2 RA 1 Human Service Needs Assessment ReportOver the .docxMerrileeDelvalle969
Assignment 2: RA 1: Human Service Needs Assessment Report
Over the past two decades, the terms "accountability" and "program evaluation" have become the focus within the human services arena. Due to budgetary constraints and decrease in availability of public funding, the competition for scarce resources has increased. This increased competition has subjected human services agencies to an intense examination where requests for resources are scrutinized carefully.
The first step to conducting a program evaluation is to conduct a
needs assessment
to determine and justify the reason for carrying out the evaluation of a particular program. A need can be defined as the gap between what is and what should be and can be experienced by an individual, a group, or an entire community.
Tasks:
Using at least 3–5 scholarly resources from the professional literature, research human service needs assessment. The literature may include the Argosy University online library resources, relevant textbooks, peer-reviewed journal articles, and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
Create a 7- to 9-page report in a Microsoft Word document, including the following:
Identify a program at a social agency or other human services program to which you have access and provide a description of the organizational context including the mission and objectives of the program and why an evaluation is being considered.
Conduct a
needs assessment
using concepts presented previously to confirm and explain the scope of the problem, the perceived versus actual gap in service, the affected population, whether the need is changing, and in what manner the need may be changing.
Identify possible resources to meet the perceived needs. Discuss what existing resources can be used, what additional information would be needed, and what sources for obtaining data you would use.
Identify the stakeholders who need to be included in the assessment and subsequent evaluation.
Analyze the interpersonal, political, and ethical considerations of interacting with decision makers and stakeholders who may have conflicting priorities and determine strategies for reconciling those priorities.
.
Assignment 2 Music Analysis 3 pages pleasePURPOSE The purp.docxMerrileeDelvalle969
Assignment 2: Music Analysis 3 pages please
PURPOSE:
The purpose of this assignment is to use content analysis to critically analyze how one social issue/problem is discussed and represented in popular culture through music lyrics.
BACKGROUND:
There are many agents of popular culture though which the messages, themes and symbols of popular culture are produced and consumed. Media is a key agent of popular culture, and within it music is one mode for the production and consumption of popular culture. The music of the 1960s marked a key period of transition in the United States as themes of social problems and dissidence started to fill the radio waves. This assignment will allow you to explore one social issue or problem in music today.
See below (NOTE THAT THERE ARE TWO OPTIONS: OPTION 1 AND OPTION 2) for a detailed assignment description.
Option 1 Instructions:
1) Choose one social issue or social problem (i.e. drugs, the environment, war, teenage pregnancy, hate crimes, etc.).
2) Find at least 5 songs with lyrics that address your chosen social issue/problem. You will need to cite these songs using proper APA formatting (see below).
3) Analyze the songs for similarities and differences in how they address the social issue/problem. You may:
- look for themes within and among the songs (i.e. songs about war that talk about ‘ending war’
- consider the year the songs were copyrighted
- consider the genre the song fits in
- is the song directed at a particular audience? (think socio-demographic characteristics: age, race/ethnicity, gender, socio-economic status (SES), and sexuality)
- what type of vocabulary, words, grammar, euphemisms, vernacular is used for the lyrics?
- Consider the actual production of the song as well: tempo, emotion, male/female singer, individual singer/band, etc.
4) Find at least two sources that address music and your social problem (i.e. the sources are providing similar analysis or commentary on how your social problem is addressed through music). These may be popular sources (i.e. magazine articles or websites), but Wikipedia is not acceptable.
5) Find at least one peer-reviewed article (see attached Finding Peer Reviewed Journals guidelines) that discusses your social issue problem and how it is portrayed by the media (ideally this would be focused on your social issue and problem, but this may be difficult to find – so an article on TV, radio, internet, movies is OK).
6) Write-up your paper
a) Cover Page
b) Clearly identify your chosen social issue/problem.
a. Why are you interested in studying this?
c) Write-up your analysis of how this social issue/problem is addressed in the 5 songs you chose
a.
NOTE:
this is the majority of your paper. It is a ‘comparative critical’ analysis of how your chosen social issue/problem is addressed in these songs. It is NOT a summary of each song, and it should not include cutting and pastin.
Assignment 2 Methods of InquiryThe principle methods of inquiry.docxMerrileeDelvalle969
Assignment 2:
Methods of Inquiry
The principle methods of inquiry are divided into two broad, distinct categories: those that reconstruct the past and those that discover or create new knowledge. Based on your reading answer the following questions:
What are methods of inquiry and how are they used in criminal investigation?
Describe the steps to reconstruct a case and use an example to illustrate the concepts.
Describe how reconstructing a crime scene can aid in understanding the fundamentals of criminal investigations. Keep in mind the fundamentals are identifying witnesses, offenders, connecting evidence from the scene to the offender and victim, and but not limited to apprehending the offender(s).
Requirements
APA format and Style
5 pages, include Title and Reference page
1 resource, can include textbook
Standard American English Grammar, sustained point of view throughout the writing
.
Assignment 2 Legislator Communication Friday 01072 Tasks.docxMerrileeDelvalle969
Assignment 2: Legislator Communication Friday 01/07
2
Tasks:
This written assignment requires the student to investigate his/her local, state and federal legislators and explore their assigned committees and legislative commitments. The student is expected to investigate current and actual legislative initiatives that have either passed or pending approval by the house, senate or Governor’s office. The student will draft a letter to a specific legislator and offer support or constructive argument against pending policy or legislation. The letter must be supported with a minimum of 3 evidence based primary citations.
My state is Florida
.
Assignment 2 Last MileThe last mile is a term that is used to e.docxMerrileeDelvalle969
Assignment 2: Last Mile
The "last mile" is a term that is used to explain how the end user ultimately connects to a network. Regardless of which Internet service provider (ISP) a business or an individual uses, a network's connectivity, signal, noise ratios, and other network components are often determined by the last mile provider. Usually, there is only one, which makes it nearly impossible to have any form of true redundancy. It is an important element to understand while you study networking.
In this assignment, you will research and study the concept of the last mile and T1 communications.
Tasks:
Develop a 4- to 5-page paper and address the following:
Evaluate the last mile connection in terms of a link that is used between an end user and an ISP.
Explain the last mile link options that are typically available to most end users (such as cable and digital subscriber line [DSL] services). Keep in mind that these options are usually missing in small rural communities.
Identify two to three of the more common connections and summarize their associated data rates, typical uses, and approximate costs. Obtain the exact cost information from at least one of the service providers.
Examine the role that T1 communications lines play in long-distance communications in conjunction with repeaters.
Compare different carriers used by service providers (such as a telecommunication company versus a cable service provider). Also, differentiate the types of equipment used as carriers by these service providers.
Note
: Your paper should utilize at least three scholarly or professional sources (beyond your textbook). Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.
Submission Details:
By
Wednesday, March 1, 2017
, save your paper as M4_A2_Lastname_Firstname.doc and submit it to the
M4 Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Evaluated the last mile connection.
20
Explained the last mile link options that are typically available to most end users.
20
Identified two to three of the more common connections and summarized their associated data rates, typical uses, and approximate costs.
20
Examined the role that T1 communications lines play in long-distance communications in conjunction with repeaters.
12
Compared different carriers used by service providers.
8
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
20
Total:
100
.
Assignment 2: LASA 2: Dropbox Assignment
This assignment comprises of four parts. All parts should be compiled into one Word document and submitted to the
M5 Assignment 2 Dropbox
.
Part 1: Case Study 1: Textbook Chapter 2: "Security of Technical Systems in Organizations: An Introduction"
Many of the technical controls put into place can be circumvented with a simple phone call. Recently, famed hacker Kevin Mitnick demonstrated this, by breaking into Sprint's backbone network. Rather than mounting a buffer overrun or denial-of-service (DoS) attack, Mitnick simply placed a call posing as a Nortel service engineer and persuaded the staff at Sprint to provide log-in names and passwords to the company's switches, under the guise that he needed them to perform remote maintenance on the system. Once the password information had been obtained, Mitnick was able to dial in and manipulate Sprint's networks at will.
Many people believe this was an isolated incident, and they would not fall for a similar act of social engineering, but Mitnick gained notoriety during the 1980s and 1990s, by performing similar techniques on computer networks around the world. Mitnick's more notorious crimes included accessing computer systems at the Pentagon and the North American Defense Command (NORAD), and stealing software and source code from major computer manufacturers. Kevin Mitnick was arrested six times. He has been working as a consultant, specializing in social engineering techniques, having gone straight after serving a five-year sentence for his most recent crime. He has authored several books regarding social engineering, including
The Art of Intrusion
and
The Art of Deception
.
Create a 2- to 3-page report in a Microsoft Word document that includes responses to the following:
Analyze what procedures could help prevent a similar breach of security at your organization.
Phishing (the practice of luring unsuspected Internet users to fake Web sites by using authentic looking email) is usually associated with identity theft. Analyze whether this tactic could also be used to gain information needed to circumvent security controls. Why or why not?
Many social engineering breaches involve using what is believed to be insider information to gain the trust of individuals in an effort to obtain confidential information. Test your ability to obtain what some might consider insider information using a search engine to find contacts or other useful information referencing your organization. Report your findings.
Part 2: Case Study 2: Textbook Chapter 5: "Network Security"
A recent network security breach at Tucson, Arizona–based CardSystem
Solution
s Inc. has exposed 40 million credit card customers to possible fraud, and is considered one of the largest card-information heists ever. CardSystem
.
Assignment 2 LASA 1The Value of a Quality Assurance Departm.docxMerrileeDelvalle969
Assignment 2: LASA 1
The Value of a Quality Assurance Department
Incrisis hospital has been concerned with the increased number of calls from patients regarding their quality of care from a variety of departments, including its emergency room, and its surgery, oncology, and X-ray/lab departments.
Incrisis is a 100-bed acute facility and was established in 2006. The human resource department hired you as a consultant to review the quality of care issue and make a recommendation on creating a quality assurance department.
Develop a 10- to 15-slide PowerPoint presentation to provide to the board of directors.
The presentation should cover the following topics:
The link between cost and quality in healthcare. Cite at least two studies conducted in the past five years supporting your response.
The role health insurance plays in cost, quality, and healthcare consumer expectations.
The various customers (e.g., patients, families, providers, insurance companies) and the healthcare quality from their perspective.
At least three current business initiatives driving healthcare quality.
The role that national policy plays on the quality of healthcare.
A clear explanation of why the quality assurance department should be created.
.
Assignment 2 LASA 1 Create Your Own Political PartyScenarioYou.docxMerrileeDelvalle969
Assignment 2: LASA 1 Create Your Own Political Party
Scenario:
Your family has always been very politically active. From a young age, you have been politically aware. When you were young, you worked with your parents as they supported their political party and you even helped during campaigns for the candidates your parents supported. In college, you were a leader of the organization on campus that was part of the political party you supported. This could have been the Young Democrats or the Young Republicans or any college group that supported the political party of your choice. Until your exposure at college, you always supported the same political party as your parents, but then your views began to change and you developed your own ideas, ideals and expectations. While you continued to remain politically active, you have become more and more disillusioned with the current major and third parties and movements on the political scene, having studied all thoroughly. You have come to be completely discouraged by the state of the political process as it pertains to political parties. In your opinion, none of the major or third parties truly represents the best interests of the citizens, and you have decided to create your own political party.
Directions. In a 4-5 page Microsoft Word document, include the following:
Name your political party and evaluate why you have chosen that name.
Create a symbol for your political party and explain why you have chosen that symbol.
Create a slogan for your political party and justify why you have chosen that slogan.
Develop a platform for your political party. A platform is a written outline and explanation of what your party believes in and why. Your party can be a single-issue party, an ideological party, a splinter party, or a regular broad based political party. Your platform must have at least four positions under the following topics. Summarize each platform position.
Social Issues
Domestic Issues
Foreign Policy
Design a brochure or one-page flyer for your political party that you would hand out to voters to introduce and explain your party. In this flyer you want to include the essentials of what your party stands for, points of your platform, and the benefits of joining your party.
Project what demographic groups would vote for your political party and why. What demographic groups will your political party reach out to and seek support from?
Predict what regions of the country will support your political party and why? Or, what regions of country will your party win? Justify your claims.
Compare the areas of support with those of other political parties.
What main idea or belief is your political party based upon? Why? For example, in the 2008 election, the Democrats focused a lot on the economy and the war in Iraq.
Some links that may help you understand and assess current political parties, which in turn may help you to create your political party.
The Democratic Party Web site
htt.
Assignment 2 LASA 1 A Drug Deal Gone BadThis assignment aims for.docxMerrileeDelvalle969
Assignment 2: LASA 1: A Drug Deal Gone Bad
This assignment aims for you to evaluate the criminal investigations process.
Here’s What Happened . . .
Around 12:00 p.m. on September 13, 2004, Fred Smith walked across the road to Bill Jones's house to ask for a ride. Although it was almost fall, it was still very hot outside and Smith needed to pick up money in a neighboring town. Smith didn't want to walk from Centervale to Roan County, so he offered to pay Jones $20.00 for gas and his time to drive Smith to pick up his money. Jones accepted Smith's offer; however, Jones told Smith that he had to pick up a friend at a car repair shop along the way. Jones and Smith drove to Thrifty Repair Shop and picked up Jones's friend, Roger Fish. Fish was not in a hurry that day, so he agreed to ride with the pair to pick up Smith's money.
The trio arrived at 200 S. Railroad Street, Brysonton, Roan County, AnyState. Smith exited the car and told Jones and Fish to wait in the car. As Smith walked toward the front of the residence, he yelled to the occupants inside, "You got some weed?" "Yeah," Raynard Jenkins replied from inside the residence. Jenkins greeted Smith at the door and asked him, "What you got?" Smith pulled out a Ruger SP101 .357 Magnum and shot Jenkins in the chest at point-blank range.
As Jenkins was falling toward the ground, Bob Marshall, a local drug dealer, jumped up from the corner of the couch, dropped a large bag of cocaine on the floor, and ran into the kitchen and out the back door. Smith chased Marshall, shot at him twice, but missed him. Smith ran back to the car and yelled to Jones, "Punch it! He tried to smoke (kill) me." The group sped away in a brown Ford Taurus, but were pulled over by Deputy R. W. Dunn approximately five miles from the scene. After coming to a complete stop, Jones threw the gun onto the rear floorboard of the car, next to Fish.
Deputy Dunn approached the car, asked the men to exit the car, and detained them to await another officer's arrival. When the officer was brought to the location where the men were being detained, a witness who saw the shooting identified Jones as the shooter. Smith, Jones, and Fish were arrested, transported to the Roan County Sheriff's Office for additional questioning, and booked into jail on first-degree murder charges.
The Investigation . . .
State Bureau of Investigation (SBI) Special Agent (SA) Pete Moss arrived at the scene at 200 S. Railroad Street, Brysonton, Roan County, AnyState, with CSI and SBI SA April Pearson at 1:03 p.m. to assist the Sheriff's Office with investigating the murder of Jenkins and the attempted murder of Marshall. SA Pearson interviewed key witnesses who lived in the immediate area within proximity of the crime scene, while SA Moss began drafting a search warrant. Although the Sheriff's Office had secured the scene around the house, SA Pearson secured an additional larger area that extended into the street. Both the interior and exterior barriers were secu.
Assignment 2 LASA 1The Value of a Quality Assurance DepartmentI.docxMerrileeDelvalle969
Assignment 2: LASA 1
The Value of a Quality Assurance Department
Incrisis hospital has been concerned with the increased number of calls from patients regarding their quality of care from a variety of departments, including its emergency room, and its surgery, oncology, and X-ray/lab departments.
Incrisis is a 100-bed acute facility and was established in 2006. The human resource department hired you as a consultant to review the quality of care issue and make a recommendation on creating a quality assurance department.
Develop a 10- to 15-slide PowerPoint presentation to provide to the board of directors.
The presentation should cover the following topics:
The link between cost and quality in healthcare. Cite at least two studies conducted in the past five years supporting your response.
The role health insurance plays in cost, quality, and healthcare consumer expectations.
The various customers (e.g., patients, families, providers, insurance companies) and the healthcare quality from their perspective.
At least three current business initiatives driving healthcare quality.
The role that national policy plays on the quality of healthcare.
A clear explanation of why the quality assurance department should be created.
Include Speaker Notes.
Submit the PowerPoint presentation to the
M3: Assignment 2 Dropbox
by
Wednesday, July 26, 2017
.
Assignment 2 Grading Criteria
Maximum Points
Discussed the link between cost and quality in healthcare and cited two studies.
28
Described the role health insurance plays in cost, quality, and healthcare consumer expectations.
24
Identified the customers and defined healthcare quality from their perspective.
32
Identified three business initiatives driving healthcare quality.
24
Articulated the impact of national policy on the quality of healthcare.
24
Demonstrated an understanding of the principles and practices of healthcare quality by making a recommendation to create a quality assurance department.
24
Style
(4 points): Tone, audience, and word choice
Organization
(12 points): Introduction, transitions, and conclusion
Usage and Mechanics
(12 points): Grammar, spelling, and sentence structure
APA Elements
(16 points): In-text citations and references, paraphrasing, and appropriate use of quotations and other elements of style
44
Total:
200
.
Assignment 2 LASA 1 Crime and Ethical StandardsSince you have .docxMerrileeDelvalle969
Assignment 2: LASA 1: Crime and Ethical Standards
Since you have demonstrated your knowledge about criminal justice so well, the chief of police has another assignment for you. Chief Draper wants you to review a specific case and assess the arresting officer's conduct. To prepare your report, you consider certain factors, such as the societal factors that may have influenced the suspect's behavior, the role of the government in terms of protecting both society and an individual's rights, and the ethical standards that govern law enforcement.
Here’s What Happened . . .
Centervale police officer Lance Marconi responded to a call for service from a high-end retailer, who reported that an unkempt woman wearing disheveled, dirty, and torn clothing left the store without paying for items she selected while shopping in the Misses Clothing Department. The store manager reported that the woman failed to respond to any verbal prompts made to her by store associates.
As Officer Marconi drove toward the store, he noticed a woman matching her description walking along the side of the road, carrying what appeared to be clothing. Once the officer reached the location of the woman, he recognized her—Mary Jones—as being an individual he had arrested several times before for public drunkenness, resisting arrest, possession of a controlled substance, felony larceny, and prostitution. Officer Marconi anticipated that this could be a very challenging situation because Jones did not like law enforcement, tended to be aggressive, and had, in the past, run as soon as she saw a police cruiser. Marconi called for backup and asked Jones to stop as he stepped out of his vehicle. She started to run, but he caught up with her very quickly.
Jones struggled with Officer Marconi on the ground, although he managed to humanely subdue her and place her in handcuffs. Officer Marconi called the incident into Communications and placed the suspect in his cruiser. He then gathered the clothing items dropped by the suspect along the side of the road. He noticed the items had price tags displaying the name of the retailer who reported the initial incident to law enforcement. During transport, Jones yelled and became very agitated.
When she arrived at the police department, Jones was very upset. She tried to hurt herself by banging her head on the desk as the officer tried to interview her about the alleged larceny report. It was clear to Officer Marconi that Jones was under the influence of drugs, so he discontinued the interview process. Marconi requested emergency medical services, and Jones was taken by ambulance to the hospital.
Here’s What You Need To Do . . .
After carefully reviewing the case details, prepare a 2- to 3-page report assessing whether the procedures (both legal and ethical) were followed appropriately. Use the Argosy University Online Library resources to find articles that support your assessment. You may also use your textbook. Your report should address t.
Assignment 2 Issues in NeuroscienceIn the Visual Ability test, a .docxMerrileeDelvalle969
Assignment 2: Issues in Neuroscience
In the Visual Ability test, a split-brain patient was shown an image in the left visual field but could not name the object. Explain why and identify the specialized functions that were discovered with regard to hemispheric lateralization. Consider some of the difficulties the split-brain operation causes and the strategies you would recommend to help a patient manage them. Was it ethical to do this study? Was it right to trade the suffering experienced by participants for the knowledge gained by the research?
.
Assignment 2 Introduction to Crime and CausesWrite an analysi.docxMerrileeDelvalle969
Assignment 2: Introduction to Crime and Causes
Write an analysis of each article or news story addressing the following:
Describe the crime depicted in the article.
How is criminal justice system portrayed?
What feelings or reactions are evoked in you by the article?
How would you explain the reported criminal behavior using at least two theories from the psychological perspectives to each article or news story?
Give a complete citation for the selected article and include a digital copy, if possible.
Write a 2–3-page log entry in Word format
.
Assignment 2 Rape and Pornography Due Tuesday January 3rd, 2.docxMerrileeDelvalle969
The document provides instructions for an assignment to analyze the relationship between rape and pornography. Students are asked to select two peer-reviewed journal articles on the topic and write a 3-4 page paper that analyzes any correlation found in the research, synthesizes whether pornography leads to sexual violence or other factors contribute, and analyzes if regulation of pornography is warranted based on evidence.
Assignment 2 RA 2 Case ScenarioBackgroundThe defendant is a f.docxMerrileeDelvalle969
Assignment 2: RA 2: Case Scenario
Background:
The defendant is a forty-year-old, single, black female charged with a first-degree assault. Specifically, she is alleged to have splashed liquid fire, a liquid drain cleaner, onto another woman's face, thus incidentally splashing five bystanders. Per the court order you received, Ms. Tyler was referred some time after the alleged crime for evaluation of her criminal responsibility. Her competency to stand trial (CST) was also at issue. At the time of the evaluation, Ms. Tyler was being held at the Southern County Detention Center. You met with Ms. Tyler. The defendant was informed that the results of the evaluation will be released to the court and that the results may be used against her in the court. Ms. Tyler gave her written consent to be evaluated.
Psychosocial History:
Only limited information is available regarding Ms. Tyler's background. She is a lifetime resident of the state. Her mother died of cancer at the age of seventy-nine years. Her father, L. Defendant, is eighty-four years old and is a retired farmer. Ms. Tyler has five living sisters, four living brothers, and two deceased siblings. Three of her sisters have received inpatient psychiatric treatment. One sister lives in Close Town, one in Europe with her husband who is in the military, and one sister died in a drowning accident. One brother committed suicide by hanging himself. There is no history of psychiatric problems among the other brothers.
Ms. Tyler has completed the tenth grade. She is literate. Ms. Tyler has worked on an assembly line for five years until 1988 when the factory closed. She then did an office-cleaning job. Her reasons for leaving this position are vague. She was unemployed for several years and was supported by her family. She lives in rent-free government housing. Her church pastor, A. Reverend, arranged for her to get employment at Helpful Industries through a vocational office at the State Psychiatric Hospital. She was employed at Helpful Industries for approximately two months prior to the incident. Ms. Tyler has never married. She has a thirteen-year-old son who lives with his father.
Psychiatric History:
Ms. Tyler denies any previous psychiatric treatment. Family members and individuals who know Ms. Tyler state that she has a long history of psychiatric symptoms such as loose associations and persecutory delusions. Ms. Tyler's sister, Ms. Sister, reports that Ms. Tyler has been violent in the past, threatening her niece with a knife. Her emotional difficulties were also apparently common knowledge among her congregation. As stated above, Ms. Tyler has a positive family history for psychiatric illness. Ms. Tyler is currently on haloperidol, an antipsychotic medication.
Ms. Tyler denies any alcohol or substance abuse. She states that she has one previous arrest for prostitution in 1975. She spent six months in jail for this offense.
Report of the Crime:
When asked to report what happened, Ms. Tyler st.
Assignment 2 RA 2 Characteristics of Effective Treatment Programs.docxMerrileeDelvalle969
Assignment 2: RA 2: Characteristics of Effective Treatment Programs
Several types of intervention and treatment approaches have been presented in your course textbook. In addition, evidence-based treatment programs are presented on the recommended government website,
http://www.crimesolutions.gov/
. The Office of Justice Programs' Crime
Solution
s.gov uses rigorous research to determine what works in criminal justice, juvenile justice, and crime victim services. On Crime
.
Assignment 2 Pay Increase Demands of EmployeesYou are an HR manag.docxMerrileeDelvalle969
Assignment 2: Pay Increase Demands of Employees
You are an HR manager with Spring Valley Laboratories. The organization pays its employees according to specific pay grades and ranges but maintains secrecy surrounding the specific numbers.
Nancy Lopez, a highly skilled medical technician, discovers that a male employee whose qualifications, experience, and job profile are similar to Nancy's is getting a considerably better package than she. Nancy serves a notice to the executive director, John Morrison, and threatens to resign if the organization does not grant her an immediate pay increase.
John does not want to lose Nancy because she is a skilled employee who has performed well in her eight-month career with the organization. John writes you an e-mail and seeks your advice on the case. You check Nancy's employment records and find that Nancy was given the compensation package that she had asked for during her final interview. You also find that Nancy's package is toward the lower limit of the pay range applicable for her job position. Nancy's salary is due for review after four months.
Based on this information frame your response to John. The response should answer the following:
Is Nancy's case a situation where a pay increase is called for? Why or why not? Justify your response with facts.
Is Nancy's case eligible as a pay inequity grievance? Why or why not? Explain.
How should Spring Valley Laboratories handle the situation? Provide John with a detailed plan of how the situation should be handled.
What impact would granting or not granting Nancy an immediate pay increase have on other employees? Why?
Articulate your response to John's e-mail. Your response should be in e-mail format and approximately two pages in MSWord. Use structured text (bolding, headings, bulleted lists, tables/charts) where appropriate to improve communicating your points. Send your email response to the
M4: Assignment 2 Dropbox
by
Wednesday, April 19, 2017
. Ensure that the tone of your response is formal and appropriate for the audience and use references to support your response.
.
Assignment 2 Policy and Client Impact DevelopmentFor this assig.docxMerrileeDelvalle969
Assignment 2: Policy and Client Impact Development
For this assignment
, you are expected to identify a sub-population within the field agency, then research and discuss with your field coordinator the state
(Idaho)
and federal policies that may impact the identified clients. Finally, discuss if there is a possibility for you to advocate on behalf of those clients.
The Assignment, submit a 2-3 page paper in which you:
o
Identify the subpopulation (Sexual Assault Victims)
o
Identify State and federal policies and discuss their impact on the clients identified
o
Provide suggestions for the agency
o
Discuss possibilities to advocate for the clients
References (use 3 or more)
Garthwait, C. L. (2017).
The social work practicum: A guide and workbook for students
(7th ed.). Upper Saddle River, NJ: Pearson.
.
Assignment 2 Public Health Administration Modern medical an.docxMerrileeDelvalle969
Assignment 2:
Public Health Administration
Modern medical and public health education was defined by two early 20
th
Century landmark documents: the
Flexner Report
and the
Welch-Rose Report
. These created two parallel and sometimes divergent systems. Review this 2008
NPR interview
about the Flexner Report and Pages 49-55 of the
Welch-Rose Report
. Then, expand your research to how (and if) medical care and public health intersect. Are they mutually supportive or do they operate in silos? Is there room for improvement?
Submit your critical analysis in a 4-5 page paper (not including your title page and references) with appropriate supporting references
.
Assignment 2 Nuclear MedicineNuclear medicine is a specialized br.docxMerrileeDelvalle969
Assignment 2: Nuclear Medicine
Nuclear medicine is a specialized branch of modern medicine that exploits the process of radioactivity for imaging, diagnosis, and treatment. Many imaging techniques inject small amounts of radioactive material into the body, which are then tracked by a sensing device specific to the type of radiation emitted from that material. Radiation has also been used to destroy diseased tissue, typically beyond the reach of standard surgical techniques.
Using the readings for this module, the Argosy University online library resources, and the Internet, write a paper on nuclear medicine. Address the following:
Explain the scientific and technical concepts related to nuclear medicine. Consider the following questions when you construct your response:
What type of radiation is typically exploited in most nuclear medicine procedures?
How are patients prepared for nuclear medicine procedures?
What are the advantages and limitations of nuclear medicine?
What ailments are typically diagnosed and treated via nuclear medicine procedures?
Evaluate a minimum of three applications of nuclear medicine relating to any of the following topics:
Positron Emission Tomography (PET) scans
Gallium scans
Indium white blood cell scans
Iobenguane scans (MIBG)
Octreotide scans
Hybrid scanning techniques employing X-ray computed tomography (CT) or magnetic resonance imaging (MRI)
Nuclear medicine therapy using radiopharmaceuticals
Support your statements with examples. Provide a minimum of three scholarly references.
Write a 2–3-page paper in Word format. Apply APA standards to citation of sources. Use the following file naming convention: LastnameFirstInitial_M4_A2.doc.
By
Wednesday, April 19, 2017
, deliver your assignment to the
M4: Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Demonstrated an understanding of the basic scientific and technical concepts of nuclear medicine.
28
Evaluated current or future applications of nuclear medicine with three real-world examples.
32
Provided at least three reliable references to support examples of current and future nuclear medicine applications.
20
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
20
Total:
.
Assignment 2 RA 1 Human Service Needs Assessment ReportOver the .docxMerrileeDelvalle969
Assignment 2: RA 1: Human Service Needs Assessment Report
Over the past two decades, the terms "accountability" and "program evaluation" have become the focus within the human services arena. Due to budgetary constraints and decrease in availability of public funding, the competition for scarce resources has increased. This increased competition has subjected human services agencies to an intense examination where requests for resources are scrutinized carefully.
The first step to conducting a program evaluation is to conduct a
needs assessment
to determine and justify the reason for carrying out the evaluation of a particular program. A need can be defined as the gap between what is and what should be and can be experienced by an individual, a group, or an entire community.
Tasks:
Using at least 3–5 scholarly resources from the professional literature, research human service needs assessment. The literature may include the Argosy University online library resources, relevant textbooks, peer-reviewed journal articles, and websites created by professional organizations, agencies, or institutions (.edu, .org, or .gov).
Create a 7- to 9-page report in a Microsoft Word document, including the following:
Identify a program at a social agency or other human services program to which you have access and provide a description of the organizational context including the mission and objectives of the program and why an evaluation is being considered.
Conduct a
needs assessment
using concepts presented previously to confirm and explain the scope of the problem, the perceived versus actual gap in service, the affected population, whether the need is changing, and in what manner the need may be changing.
Identify possible resources to meet the perceived needs. Discuss what existing resources can be used, what additional information would be needed, and what sources for obtaining data you would use.
Identify the stakeholders who need to be included in the assessment and subsequent evaluation.
Analyze the interpersonal, political, and ethical considerations of interacting with decision makers and stakeholders who may have conflicting priorities and determine strategies for reconciling those priorities.
.
Assignment 2 Music Analysis 3 pages pleasePURPOSE The purp.docxMerrileeDelvalle969
Assignment 2: Music Analysis 3 pages please
PURPOSE:
The purpose of this assignment is to use content analysis to critically analyze how one social issue/problem is discussed and represented in popular culture through music lyrics.
BACKGROUND:
There are many agents of popular culture though which the messages, themes and symbols of popular culture are produced and consumed. Media is a key agent of popular culture, and within it music is one mode for the production and consumption of popular culture. The music of the 1960s marked a key period of transition in the United States as themes of social problems and dissidence started to fill the radio waves. This assignment will allow you to explore one social issue or problem in music today.
See below (NOTE THAT THERE ARE TWO OPTIONS: OPTION 1 AND OPTION 2) for a detailed assignment description.
Option 1 Instructions:
1) Choose one social issue or social problem (i.e. drugs, the environment, war, teenage pregnancy, hate crimes, etc.).
2) Find at least 5 songs with lyrics that address your chosen social issue/problem. You will need to cite these songs using proper APA formatting (see below).
3) Analyze the songs for similarities and differences in how they address the social issue/problem. You may:
- look for themes within and among the songs (i.e. songs about war that talk about ‘ending war’
- consider the year the songs were copyrighted
- consider the genre the song fits in
- is the song directed at a particular audience? (think socio-demographic characteristics: age, race/ethnicity, gender, socio-economic status (SES), and sexuality)
- what type of vocabulary, words, grammar, euphemisms, vernacular is used for the lyrics?
- Consider the actual production of the song as well: tempo, emotion, male/female singer, individual singer/band, etc.
4) Find at least two sources that address music and your social problem (i.e. the sources are providing similar analysis or commentary on how your social problem is addressed through music). These may be popular sources (i.e. magazine articles or websites), but Wikipedia is not acceptable.
5) Find at least one peer-reviewed article (see attached Finding Peer Reviewed Journals guidelines) that discusses your social issue problem and how it is portrayed by the media (ideally this would be focused on your social issue and problem, but this may be difficult to find – so an article on TV, radio, internet, movies is OK).
6) Write-up your paper
a) Cover Page
b) Clearly identify your chosen social issue/problem.
a. Why are you interested in studying this?
c) Write-up your analysis of how this social issue/problem is addressed in the 5 songs you chose
a.
NOTE:
this is the majority of your paper. It is a ‘comparative critical’ analysis of how your chosen social issue/problem is addressed in these songs. It is NOT a summary of each song, and it should not include cutting and pastin.
Assignment 2 Methods of InquiryThe principle methods of inquiry.docxMerrileeDelvalle969
Assignment 2:
Methods of Inquiry
The principle methods of inquiry are divided into two broad, distinct categories: those that reconstruct the past and those that discover or create new knowledge. Based on your reading answer the following questions:
What are methods of inquiry and how are they used in criminal investigation?
Describe the steps to reconstruct a case and use an example to illustrate the concepts.
Describe how reconstructing a crime scene can aid in understanding the fundamentals of criminal investigations. Keep in mind the fundamentals are identifying witnesses, offenders, connecting evidence from the scene to the offender and victim, and but not limited to apprehending the offender(s).
Requirements
APA format and Style
5 pages, include Title and Reference page
1 resource, can include textbook
Standard American English Grammar, sustained point of view throughout the writing
.
Assignment 2 Legislator Communication Friday 01072 Tasks.docxMerrileeDelvalle969
Assignment 2: Legislator Communication Friday 01/07
2
Tasks:
This written assignment requires the student to investigate his/her local, state and federal legislators and explore their assigned committees and legislative commitments. The student is expected to investigate current and actual legislative initiatives that have either passed or pending approval by the house, senate or Governor’s office. The student will draft a letter to a specific legislator and offer support or constructive argument against pending policy or legislation. The letter must be supported with a minimum of 3 evidence based primary citations.
My state is Florida
.
Assignment 2 Last MileThe last mile is a term that is used to e.docxMerrileeDelvalle969
Assignment 2: Last Mile
The "last mile" is a term that is used to explain how the end user ultimately connects to a network. Regardless of which Internet service provider (ISP) a business or an individual uses, a network's connectivity, signal, noise ratios, and other network components are often determined by the last mile provider. Usually, there is only one, which makes it nearly impossible to have any form of true redundancy. It is an important element to understand while you study networking.
In this assignment, you will research and study the concept of the last mile and T1 communications.
Tasks:
Develop a 4- to 5-page paper and address the following:
Evaluate the last mile connection in terms of a link that is used between an end user and an ISP.
Explain the last mile link options that are typically available to most end users (such as cable and digital subscriber line [DSL] services). Keep in mind that these options are usually missing in small rural communities.
Identify two to three of the more common connections and summarize their associated data rates, typical uses, and approximate costs. Obtain the exact cost information from at least one of the service providers.
Examine the role that T1 communications lines play in long-distance communications in conjunction with repeaters.
Compare different carriers used by service providers (such as a telecommunication company versus a cable service provider). Also, differentiate the types of equipment used as carriers by these service providers.
Note
: Your paper should utilize at least three scholarly or professional sources (beyond your textbook). Your paper should be written in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., in APA format); and display accurate spelling, grammar, and punctuation.
Submission Details:
By
Wednesday, March 1, 2017
, save your paper as M4_A2_Lastname_Firstname.doc and submit it to the
M4 Assignment 2 Dropbox
.
Assignment 2 Grading Criteria
Maximum Points
Evaluated the last mile connection.
20
Explained the last mile link options that are typically available to most end users.
20
Identified two to three of the more common connections and summarized their associated data rates, typical uses, and approximate costs.
20
Examined the role that T1 communications lines play in long-distance communications in conjunction with repeaters.
12
Compared different carriers used by service providers.
8
Wrote in a clear, concise, and organized manner; demonstrated ethical scholarship in accurate representation and attribution of sources; displayed accurate spelling, grammar, and punctuation.
20
Total:
100
.
Assignment 2: LASA 2: Dropbox Assignment
This assignment comprises of four parts. All parts should be compiled into one Word document and submitted to the
M5 Assignment 2 Dropbox
.
Part 1: Case Study 1: Textbook Chapter 2: "Security of Technical Systems in Organizations: An Introduction"
Many of the technical controls put into place can be circumvented with a simple phone call. Recently, famed hacker Kevin Mitnick demonstrated this, by breaking into Sprint's backbone network. Rather than mounting a buffer overrun or denial-of-service (DoS) attack, Mitnick simply placed a call posing as a Nortel service engineer and persuaded the staff at Sprint to provide log-in names and passwords to the company's switches, under the guise that he needed them to perform remote maintenance on the system. Once the password information had been obtained, Mitnick was able to dial in and manipulate Sprint's networks at will.
Many people believe this was an isolated incident, and they would not fall for a similar act of social engineering, but Mitnick gained notoriety during the 1980s and 1990s, by performing similar techniques on computer networks around the world. Mitnick's more notorious crimes included accessing computer systems at the Pentagon and the North American Defense Command (NORAD), and stealing software and source code from major computer manufacturers. Kevin Mitnick was arrested six times. He has been working as a consultant, specializing in social engineering techniques, having gone straight after serving a five-year sentence for his most recent crime. He has authored several books regarding social engineering, including
The Art of Intrusion
and
The Art of Deception
.
Create a 2- to 3-page report in a Microsoft Word document that includes responses to the following:
Analyze what procedures could help prevent a similar breach of security at your organization.
Phishing (the practice of luring unsuspected Internet users to fake Web sites by using authentic looking email) is usually associated with identity theft. Analyze whether this tactic could also be used to gain information needed to circumvent security controls. Why or why not?
Many social engineering breaches involve using what is believed to be insider information to gain the trust of individuals in an effort to obtain confidential information. Test your ability to obtain what some might consider insider information using a search engine to find contacts or other useful information referencing your organization. Report your findings.
Part 2: Case Study 2: Textbook Chapter 5: "Network Security"
A recent network security breach at Tucson, Arizona–based CardSystem
Solution
s Inc. has exposed 40 million credit card customers to possible fraud, and is considered one of the largest card-information heists ever. CardSystem
.
Assignment 2 LASA 1The Value of a Quality Assurance Departm.docxMerrileeDelvalle969
Assignment 2: LASA 1
The Value of a Quality Assurance Department
Incrisis hospital has been concerned with the increased number of calls from patients regarding their quality of care from a variety of departments, including its emergency room, and its surgery, oncology, and X-ray/lab departments.
Incrisis is a 100-bed acute facility and was established in 2006. The human resource department hired you as a consultant to review the quality of care issue and make a recommendation on creating a quality assurance department.
Develop a 10- to 15-slide PowerPoint presentation to provide to the board of directors.
The presentation should cover the following topics:
The link between cost and quality in healthcare. Cite at least two studies conducted in the past five years supporting your response.
The role health insurance plays in cost, quality, and healthcare consumer expectations.
The various customers (e.g., patients, families, providers, insurance companies) and the healthcare quality from their perspective.
At least three current business initiatives driving healthcare quality.
The role that national policy plays on the quality of healthcare.
A clear explanation of why the quality assurance department should be created.
.
Assignment 2 LASA 1 Create Your Own Political PartyScenarioYou.docxMerrileeDelvalle969
Assignment 2: LASA 1 Create Your Own Political Party
Scenario:
Your family has always been very politically active. From a young age, you have been politically aware. When you were young, you worked with your parents as they supported their political party and you even helped during campaigns for the candidates your parents supported. In college, you were a leader of the organization on campus that was part of the political party you supported. This could have been the Young Democrats or the Young Republicans or any college group that supported the political party of your choice. Until your exposure at college, you always supported the same political party as your parents, but then your views began to change and you developed your own ideas, ideals and expectations. While you continued to remain politically active, you have become more and more disillusioned with the current major and third parties and movements on the political scene, having studied all thoroughly. You have come to be completely discouraged by the state of the political process as it pertains to political parties. In your opinion, none of the major or third parties truly represents the best interests of the citizens, and you have decided to create your own political party.
Directions. In a 4-5 page Microsoft Word document, include the following:
Name your political party and evaluate why you have chosen that name.
Create a symbol for your political party and explain why you have chosen that symbol.
Create a slogan for your political party and justify why you have chosen that slogan.
Develop a platform for your political party. A platform is a written outline and explanation of what your party believes in and why. Your party can be a single-issue party, an ideological party, a splinter party, or a regular broad based political party. Your platform must have at least four positions under the following topics. Summarize each platform position.
Social Issues
Domestic Issues
Foreign Policy
Design a brochure or one-page flyer for your political party that you would hand out to voters to introduce and explain your party. In this flyer you want to include the essentials of what your party stands for, points of your platform, and the benefits of joining your party.
Project what demographic groups would vote for your political party and why. What demographic groups will your political party reach out to and seek support from?
Predict what regions of the country will support your political party and why? Or, what regions of country will your party win? Justify your claims.
Compare the areas of support with those of other political parties.
What main idea or belief is your political party based upon? Why? For example, in the 2008 election, the Democrats focused a lot on the economy and the war in Iraq.
Some links that may help you understand and assess current political parties, which in turn may help you to create your political party.
The Democratic Party Web site
htt.
Assignment 2 LASA 1 A Drug Deal Gone BadThis assignment aims for.docxMerrileeDelvalle969
Assignment 2: LASA 1: A Drug Deal Gone Bad
This assignment aims for you to evaluate the criminal investigations process.
Here’s What Happened . . .
Around 12:00 p.m. on September 13, 2004, Fred Smith walked across the road to Bill Jones's house to ask for a ride. Although it was almost fall, it was still very hot outside and Smith needed to pick up money in a neighboring town. Smith didn't want to walk from Centervale to Roan County, so he offered to pay Jones $20.00 for gas and his time to drive Smith to pick up his money. Jones accepted Smith's offer; however, Jones told Smith that he had to pick up a friend at a car repair shop along the way. Jones and Smith drove to Thrifty Repair Shop and picked up Jones's friend, Roger Fish. Fish was not in a hurry that day, so he agreed to ride with the pair to pick up Smith's money.
The trio arrived at 200 S. Railroad Street, Brysonton, Roan County, AnyState. Smith exited the car and told Jones and Fish to wait in the car. As Smith walked toward the front of the residence, he yelled to the occupants inside, "You got some weed?" "Yeah," Raynard Jenkins replied from inside the residence. Jenkins greeted Smith at the door and asked him, "What you got?" Smith pulled out a Ruger SP101 .357 Magnum and shot Jenkins in the chest at point-blank range.
As Jenkins was falling toward the ground, Bob Marshall, a local drug dealer, jumped up from the corner of the couch, dropped a large bag of cocaine on the floor, and ran into the kitchen and out the back door. Smith chased Marshall, shot at him twice, but missed him. Smith ran back to the car and yelled to Jones, "Punch it! He tried to smoke (kill) me." The group sped away in a brown Ford Taurus, but were pulled over by Deputy R. W. Dunn approximately five miles from the scene. After coming to a complete stop, Jones threw the gun onto the rear floorboard of the car, next to Fish.
Deputy Dunn approached the car, asked the men to exit the car, and detained them to await another officer's arrival. When the officer was brought to the location where the men were being detained, a witness who saw the shooting identified Jones as the shooter. Smith, Jones, and Fish were arrested, transported to the Roan County Sheriff's Office for additional questioning, and booked into jail on first-degree murder charges.
The Investigation . . .
State Bureau of Investigation (SBI) Special Agent (SA) Pete Moss arrived at the scene at 200 S. Railroad Street, Brysonton, Roan County, AnyState, with CSI and SBI SA April Pearson at 1:03 p.m. to assist the Sheriff's Office with investigating the murder of Jenkins and the attempted murder of Marshall. SA Pearson interviewed key witnesses who lived in the immediate area within proximity of the crime scene, while SA Moss began drafting a search warrant. Although the Sheriff's Office had secured the scene around the house, SA Pearson secured an additional larger area that extended into the street. Both the interior and exterior barriers were secu.
Assignment 2 LASA 1The Value of a Quality Assurance DepartmentI.docxMerrileeDelvalle969
Assignment 2: LASA 1
The Value of a Quality Assurance Department
Incrisis hospital has been concerned with the increased number of calls from patients regarding their quality of care from a variety of departments, including its emergency room, and its surgery, oncology, and X-ray/lab departments.
Incrisis is a 100-bed acute facility and was established in 2006. The human resource department hired you as a consultant to review the quality of care issue and make a recommendation on creating a quality assurance department.
Develop a 10- to 15-slide PowerPoint presentation to provide to the board of directors.
The presentation should cover the following topics:
The link between cost and quality in healthcare. Cite at least two studies conducted in the past five years supporting your response.
The role health insurance plays in cost, quality, and healthcare consumer expectations.
The various customers (e.g., patients, families, providers, insurance companies) and the healthcare quality from their perspective.
At least three current business initiatives driving healthcare quality.
The role that national policy plays on the quality of healthcare.
A clear explanation of why the quality assurance department should be created.
Include Speaker Notes.
Submit the PowerPoint presentation to the
M3: Assignment 2 Dropbox
by
Wednesday, July 26, 2017
.
Assignment 2 Grading Criteria
Maximum Points
Discussed the link between cost and quality in healthcare and cited two studies.
28
Described the role health insurance plays in cost, quality, and healthcare consumer expectations.
24
Identified the customers and defined healthcare quality from their perspective.
32
Identified three business initiatives driving healthcare quality.
24
Articulated the impact of national policy on the quality of healthcare.
24
Demonstrated an understanding of the principles and practices of healthcare quality by making a recommendation to create a quality assurance department.
24
Style
(4 points): Tone, audience, and word choice
Organization
(12 points): Introduction, transitions, and conclusion
Usage and Mechanics
(12 points): Grammar, spelling, and sentence structure
APA Elements
(16 points): In-text citations and references, paraphrasing, and appropriate use of quotations and other elements of style
44
Total:
200
.
Assignment 2 LASA 1 Crime and Ethical StandardsSince you have .docxMerrileeDelvalle969
Assignment 2: LASA 1: Crime and Ethical Standards
Since you have demonstrated your knowledge about criminal justice so well, the chief of police has another assignment for you. Chief Draper wants you to review a specific case and assess the arresting officer's conduct. To prepare your report, you consider certain factors, such as the societal factors that may have influenced the suspect's behavior, the role of the government in terms of protecting both society and an individual's rights, and the ethical standards that govern law enforcement.
Here’s What Happened . . .
Centervale police officer Lance Marconi responded to a call for service from a high-end retailer, who reported that an unkempt woman wearing disheveled, dirty, and torn clothing left the store without paying for items she selected while shopping in the Misses Clothing Department. The store manager reported that the woman failed to respond to any verbal prompts made to her by store associates.
As Officer Marconi drove toward the store, he noticed a woman matching her description walking along the side of the road, carrying what appeared to be clothing. Once the officer reached the location of the woman, he recognized her—Mary Jones—as being an individual he had arrested several times before for public drunkenness, resisting arrest, possession of a controlled substance, felony larceny, and prostitution. Officer Marconi anticipated that this could be a very challenging situation because Jones did not like law enforcement, tended to be aggressive, and had, in the past, run as soon as she saw a police cruiser. Marconi called for backup and asked Jones to stop as he stepped out of his vehicle. She started to run, but he caught up with her very quickly.
Jones struggled with Officer Marconi on the ground, although he managed to humanely subdue her and place her in handcuffs. Officer Marconi called the incident into Communications and placed the suspect in his cruiser. He then gathered the clothing items dropped by the suspect along the side of the road. He noticed the items had price tags displaying the name of the retailer who reported the initial incident to law enforcement. During transport, Jones yelled and became very agitated.
When she arrived at the police department, Jones was very upset. She tried to hurt herself by banging her head on the desk as the officer tried to interview her about the alleged larceny report. It was clear to Officer Marconi that Jones was under the influence of drugs, so he discontinued the interview process. Marconi requested emergency medical services, and Jones was taken by ambulance to the hospital.
Here’s What You Need To Do . . .
After carefully reviewing the case details, prepare a 2- to 3-page report assessing whether the procedures (both legal and ethical) were followed appropriately. Use the Argosy University Online Library resources to find articles that support your assessment. You may also use your textbook. Your report should address t.
Assignment 2 Issues in NeuroscienceIn the Visual Ability test, a .docxMerrileeDelvalle969
Assignment 2: Issues in Neuroscience
In the Visual Ability test, a split-brain patient was shown an image in the left visual field but could not name the object. Explain why and identify the specialized functions that were discovered with regard to hemispheric lateralization. Consider some of the difficulties the split-brain operation causes and the strategies you would recommend to help a patient manage them. Was it ethical to do this study? Was it right to trade the suffering experienced by participants for the knowledge gained by the research?
.
Assignment 2 Introduction to Crime and CausesWrite an analysi.docxMerrileeDelvalle969
Assignment 2: Introduction to Crime and Causes
Write an analysis of each article or news story addressing the following:
Describe the crime depicted in the article.
How is criminal justice system portrayed?
What feelings or reactions are evoked in you by the article?
How would you explain the reported criminal behavior using at least two theories from the psychological perspectives to each article or news story?
Give a complete citation for the selected article and include a digital copy, if possible.
Write a 2–3-page log entry in Word format
.
Assignment 2 Introduction to Crime and CausesWrite an analysi.docx
Joseph SigmonClassroom Mang. & Student Disc.Dr. Swin
1. Joseph Sigmon
Classroom Mang. & Student Disc.
Dr. Swinehart-Held
December 7, 2020
Reflection Paper: Virtual Field Experience EDU 3263
Classroom Management
The teachers promoted engagement by displaying pictures that
were familiar to students
and then she asked them questions. The classroom had boxes
drawn on the floor to boost
understanding. Students were asked to physically stand in the
boxes to boost understanding of
mathematics. The next step after physical demonstration was
use of projectors to display
calculations.
The video “Literacy Lesson First Grade” was effective in
student’s comprehension of
concepts since the teacher asked questions and influenced the
learners to remember prior lessons.
2. Classroom engagement was boosted by the teacher as he told
learners to divide themselves and
to discuss. His technique of regaining the students’ attention
was effective since there was a
familiar phrase he called out. The video “Teacher Observation
of Ms. Ainge” revealed effective
incorporation of technology in learning environments. The
teacher’s strategy of changing
projector slides as she asked students questions was highly
effective. Engagement was properly
applied in the classroom since she waited for feedback from
students using a particular gesture.
Students’ assessment was properly applied by Ms. Angie.
The video “Teaching Character Traits | 3rd Grade Reading
Comprehension” revealed
the teacher’s effective strategy of ensuring learners were
properly prepared for the lesson. The
teacher distributed charts to every student so that there would
be collaboration between her
This study source was downloaded by 100000778807132 from
CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/10567228 3/fieldobservationho
urspaperdocx/
https://www.coursehero.com/file/105672283/fieldobservationho
3. urspaperdocx/
readings and questions listed on the charts. The teaching
strategy was effective since learners
could analyze character traits based on simple phrases. The
video “TPSD Kindergarten, Phonics
First, Lesson 16 Level 1” shows the effective strategy by the
teacher where she begins the lesson
by asking students to recall concepts from previous lessons. The
teacher had cards ensured
students could visually recall concepts. Engagement of three
teachers for many students ensured
every student received proper attention. The videos by Peoria
Unified C&I, Wow English, and
Teach4Life revealed that students’ engagement and application
of projector technology was an
effective tactic of promoting learning.
Since a learning environment is the most important component
of a student’s education, it
is important to create a conducive environment. The first
strategy I would apply is greeting
students as soon they reach the class (Terada, 2019). This is
highly effective in promoting
connection with students. I would ensure all students receive
4. equal share of attention before the
beginning of any lesson since this boosts their confidence. This
tactic would build relationships
between learners and me. The students would be more
comfortable when asking questions since
they would view me as an agreeable teacher. Classroom sessions
would feel like family
experiences.
The next strategy I would apply is to anticipate if any issues
would occur during learning
sessions (Finley, 2017). A learning environment is filled with
students from diverse cultural
backgrounds. As such, it is imperative to realize that there
could be moments of conflicts when
different learners engage. The most applicable technique is to
maintain authority so that learners
would respect any directives. I would ensure the method I use to
enforce authority is not harsh.
Shouting would be unheard of during any of my teaching
sessions so that learners would avoid
This study source was downloaded by 100000778807132 from
CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
5. https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
improper conflict management tactics. I would resolve issues by
talking to learners so that they
would open up.
The next suitable strategy is to give praise after noticing any
positive behavior (Terada,
2019). After analyzing the videos, I realized that learners
enjoyed answering questions. This was
an indicator that they understood concepts taught in class. I
would ensure to praise learners after
they answered any questions correctly. Learner engagement and
collaboration is another action I
would praise. Classrooms usually contain learners with varying
cognitive capacities. Whenever
gifted learners help other students, I would praise such actions.
This would increase capability of
slow learners to understand concepts I would teach based on
how their peers understood.
The classroom management strategies that have learned in this
class, from my own
experience as a Para-Professional and the observations that I
have made prior by visiting a
6. classroom or Face Timing a classroom, I will definitely be using
some of those strategies as well
as come up with some of my own. In my most observation with
Ms. Hubbard’s class, she tried to
keep the class engaged by asking them questions about the test
on last Friday and how was their
weekend. The student was reluctant to answer but once one
student did, then the rest followed. I
am sure if the students were in a classroom setting, I am sure
this would have gone over a lot
better. I also noticed that the students looked tired. Not saying
that they did not get enough sleep
but tired of the learning from home and not enacting with their
friends and the teachers. I like
giving incentives to students that do well and even to those who
have made great strides because
I think students need motivation and praise when it is
warranted. I feel that it makes a student
more confident in their learning and they will continue to do
better. Lastly, the strategy that I
think is most important than all of them is that the students
know who is in charge and that the
teacher must show it every day. This can be shown by who the
teacher interacts with the class,
7. This study source was downloaded by 100000778807132 from
CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
how discipline is handled and discussing the class rules on day
1. By doing these things, will
make me an effective teacher and my classroom management
will be second to none.
This study source was downloaded by 100000778807132 from
CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
Reference
Dulude, L. (2013). 1st Grade Math Lesson-find the missing part
of 10 [Image]. Retrieved from
https://www.youtube.com/watch?v=UoQzv4wxmUE
Finley, T. (2016). 19 Big and Small Classroom Management
Strategies. Retrieved 25 November
8. 2020 from https://www.edutopia.org/blog/big-and-small-
classroom-management-
strategies-todd-finley
luvbuggl3. (2015). Teacher Observation of Ms. Ainge [Image].
Retrieved from
https://www.youtube.com/watch?v=KRgIxK0WNis
Mr A. (2016). Literacy Lesson First Grade [Video]. Retrieved
from
https://www.youtube.com/watch?v=NkxJSwa_b3A
OfficialTPSD. (2016). TPSD Kindergarten, Phonics First,
Lesson 16 Level 1 [Video]. Retrieved
from https://www.youtube.com/watch?v=cjNv2dQCFEk
Peoria Unified C&I. (2017). Jean Cole 4th Grade Frontier
Elementary Classroom Observation
[Video]. Retrieved from
https://www.youtube.com/watch?v=nKxAyy0MBiQ
Revolve Learning. (2017). Teaching Character Traits | 3rd
Grade Reading Comprehension
[Video]. Retrieved from
https://www.youtube.com/watch?v=BL_p-6UQDZQ
Teach4Life. (2016). Wonders Day 1 Lesson 1st Grade [Video].
Retrieved from
9. https://www.youtube.com/watch?v=eR1rZ71ZKcA
Terada, Y. (2019). 8 Proactive Classroom Management Tips.
Retrieved 25 November 2020 from
https://www.edutopia.org/article/8-proactive-classroom-
management-tips
This study source was downloaded by 100000778807132 from
CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
Wow English. (2013). How to teach Kids | from a Prague
kindergarten, part 1 | English for
Children [Video]. Retrieved from
https://www.youtube.com/watch?v=NIk1-ck4c6Q
This study source was downloaded by 100000778807132 from
CourseHero.com on 09-26-2022 10:54:22 GMT -05:00
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
Powered by TCPDF (www.tcpdf.org)
https://www.coursehero.com/file/105672283/fieldobservationho
urspaperdocx/
http://www.tcpdf.org
14. – It is assumed that the destination knows the public key of the
source
• Confidentiality can be provided by encrypting the entire
message plus
signature with a shared secret key
– It is important to perform the signature function first and then
an outer
confidentiality function
– In case of dispute some third party must view the message and
its
signature
• The validity of the scheme depends on the security of the
sender’s private key
– If a sender later wishes to deny sending a particular message,
the sender
can claim that the private key was lost or stolen and that
someone else
forged his or her signature
– One way to thwart or at least weaken this ploy is to require
every signed
message to include a timestamp and to require prompt reporting
of
compromised keys to a central authority
22. issues as a way of the learning process.
After watching the videos and interviewing a teacher or visiting
a classroom, you should have enough information to write your
final paper. Your final paper will include responses to the
following questions:
1. Describe any observations in the classrooms or in the videos
that highlighted specific classroom management
rules/strategies. Make sure to identify the video(s) in your
response.
2. If you were the teacher in these classes, identify at least two
classroom management strategies that you would use. Be clear.
3. Finally, based on your personal experiences in-classroom
observation and discussions with teachers, share your thoughts
about how the classroom management strategies from this
course will help you to teach all students in your future
teaching assignments. Also, include some ways you could
avoid possible ineffective management strategies you may have
encountered or viewed in the videos.
To submit your response, you should develop a response in a
Word document and attach it.
There is a limit of words for this assignment. You must write a
response in no more than 1000 words. Quality of response is
important. You must complete the attached timesheet and
submit it with your final paper.
Good Luck!
https://www.youtube.com/watch?v=KRgIxK0WNis Second
Grade Lesson on Fractions
https://www.youtube.com/watch?v=NkxJSwa_b3A First
Grade Literacy Lesson
https://www.youtube.com/watch?v=eR1rZ71ZKcA First
Grade Wonders Day Lesson
https://www.youtube.com/watch?v=NIk1-ck4c6Q Prague
Kindergarten – English Lesson