Ethics in Psychology Humanities Assignment Help. Ethics in Psychology Humanities Assignment Help.
(/0x4*br />
To prepare:
- Review your state’s (Michigan) legal and ethical guidelines for psychologists.
- Compare these guidelines to the codes of ethics set forth by the APA and the AP-LS.
- Consider which specific guidelines within the codes of conduct seem most important or encompassing to you.
- Think about which guidelines might present the most challenge in your practice.
With these thoughts in mind:Post a description of a specific guideline within a code of conduct that you regard as crucial in relating to clients, and a description of a guideline that you think might present the biggest challenge in conducting assessment, diagnosis, or treatment. Explain why you selected each of the guidelines. Select one guideline from your state and one from AP-LS, or two guidelines from the APA Code of Conduct.
Be sure to support your postings and responses with specific references to the Learning Resources.
Ethics in Psychology Humanities Assignment Help[supanova_question]
Need a paper with intext citations and peer reviewed aricles Health Medical Assignment Help
The requirements for your Project include the following: TOPIC-HEART FAILURE.
- Must include an introductory paragraph that describes the entire project.
- The
project must have all of the following: identification of the
alteration in health (HEART FAILURE), the role nutrition plays in the
prevention of this disease, its etiology, progression, treatment,
recommended diet, type of nursing assessment and nursing interventions
needed with regard to nutrition, outline of what should be included in
client education and two strategies to help ensure adherence (overcome
barriers) to the recommended diet. - Must have a title page and an
APA Editorial formatted Reference page with at least three scholarly
peer reviewed references. There must also be appropriate APA Editorial
formatted in-text citations.
[supanova_question]
Defining a Computer System, computer science homework help Computer Science Assignment Help
A computer system is defined as: A system of interconnected computers that share a central storage system and various peripheral devices such as printers, scanners, or routers. Each computer may contain an operating system so that it can either operate independently or in conjunction with other computers. Based on the definition above please provide an example of a system, a system that you may have used before. Please answer the following based on your example:
- The Common Vulnerabilities and Exposures (CVE) database is available for researching vulnerabilities that have been identified and categorized in a system. Use the CVE database to search for your example and identify any recent (within 6 months) vulnerabilities that may exist.
- Additionally, research the vendor of the system to identify any solutions or fixes that may have been noted for the vulnerability identified. Please list your system and the vulnerabilities discovered for that system.
- Based on your research, you should also provide some comments on your findings
[supanova_question]
Business – Please read description Business Finance Assignment Help
You will use the critical thinking skills you have been developing to identify violations of the Universal Intellectual Standards and Logical Fallacies in the essay, “Sweatshirts from Sweatshops” on pages 406 – 407 of your textbook.
On pages 387-396 of your textbook, you will meet Tanya, Kevin, Elise, Dalton, and Hope. Tanya encounters a series of discussions first with Kevin, the second with Elise, and the third with Hope. The textbook describes how to critically assess the arguments in the first two discussions (Kevin and Elise and Dalton). Use these ONLY as examples for how to use critical thinking skills.
In addition, you will want to review the Universal Intellectual Standards on pages 335-347 and the Logical Fallacies on pages 396 – 399 in the textbook.
You are to assess the arguments made in the essay, “Sweatshirts Sweatshops,” found on pages 406 – 407.
Instructions:
Read “Sweatshirts from Sweatshops” on pages 406 – 407 and complete the following:
- Part 1 – Applying the Universal Intellectual Standards
- Provide specific examples from the essay that violate two of the Universal Intellectual Standards.
- Specify what is needed to correct the errors.
- Part 2 – Identifying Logical Fallacies
- Provide specific examples from the essay that are considered logical fallacies from the list provided on pages 394-397 of the textbook. List two fallacies that are violated.
- Explain WHY the essay is flawed by describing the logical fallacy by name and applying the fallacy to the statement.
[supanova_question]
Part B-Sales ONE PAGE Business Finance Assignment Help
Part B: You are a sales manager in the electronics industry. Your firm had a salesperson in the far western U.S. who everyone thought was a high performer. Every year he sent in his forecast, which was slightly higher than the year before, and every year he achieved that sales goal and received a nice evaluation and raise. Finally the salesperson retired and a replacement was reassigned. In the first year, he increased sales by 50 percent and in the second year he doubled the previous salesperson’s output. Based on this anecdote:
- List and describe five (5) pipeline analysis evaluation criteria that would have allowed you, the sales manager, to more accurately assess the salesperson’s performance.
- What would these evaluation criteria tell you about the previous and current sales reps?
[supanova_question]
[supanova_question]
Ethical Issues Facing Psychologist in Michigan, psychology homework help Humanities Assignment Help
Legal and Ethical Issues
What would you do if your family was starving and you could discretely steal a loaf of bread to feed them? This is a legal and ethical dilemma. As you saw in the Learning Resources this week, legal and ethical dilemmas do occur in diagnosis and assessment, and they are intimately related; however, they do not always rest comfortably together. Although there may not always be clear answers to ethical and legal dilemmas, your ability to address them is a key factor in providing clients with the best possible care.
To prepare:
- Focus on the APA ethics codes and the AP-LS specialty guidelines for forensic psychologists’.
- Go to your state (Michigan) website and review its legal and ethical guidelines.
- Consider any legal guidelines that may be in conflict with the ethical guidelines.
- If you noted differences between legal, ethical, and specialty guidelines, think about how would you reconcile them.
With these thoughts in mind:
Post by Day 3 your thoughts about how various legal guidelines, ethics codes, and specialty guidelines influence diagnosis and assessment in general. Reference at least one potential conflict between laws in your state, ethical guidelines, or specialty guidelines and explain how you might address the conflict. Make sure you cite specific legal codes straight from Michigan regulations! APA is a MUST
Ethical Issues Facing Psychologist in Michigan, psychology homework help Humanities Assignment Help[supanova_question]
Haskell Programming, computer science homework help Programming Assignment Help
I need the following exercise’s completed in the programming language “Haskell”.
Put all the exercise’s into a file called “ps.hs” to run it.
A Makefile is also uploaded, however it is in the form of a “.doc” file, remove it and you should be able to run it.
There is also a Test file uploaded along with it. However to use the Test file you must make it a “.t” file by renaming it and putting it at the end.
#1: Write a function “zeroIsNothing” which
–> converts 0 to Nothing, and any other number to Just that number
–> also write its type signature
zeroIsNothing z
| otherwise = 1
#2: Write a function “nothingIsZero” which
— converts Nothing to 0, and (Just a) to the number a
— also write its type signature
nothingIsZero a = a
#3: Create a typeclass called NumOrString that can contain either an Integer or String object.
— make sure your NumOrString class includes “deriving (Show)” so that
— it may be printed
— write a function makeNum
— which accepts an Integer and produces a NumOrString object that
— encapsulates its value
— also write its type signature
makeNum a = a
#4: Write a function getNum which accepts a NumOrString object
— produces a Maybe object, where
— if the NumOrString object is a number, it should be “Just <that
— number>”
— otherwise, Nothing
— also write its type signature
getNum a = a
#5: Write a function makeString
— which accepts an String and produces a NumOrString object that
— encapsulates its value
— also write its type signature
makeString a = a
#6: Write a function getString which accepts a NumOrString object
— produces a Maybe object, where
— if the NumOrString object is a String, it should be “Just <that
— string>”
— otherwise, Nothing
— also write its type signature
getString a = a
#7: Write a function named “makeNumList” which accepts a numeric argument
— and outputs a list of that many NumOrString objects, counting up
— from 1 to the argument
— e.g. “makeNumList 5” should produce:
— [<NumOrString object with numeric 1>, <NumOrString object with numeric 2>, <NumOrString object with numeric 3>, <NumOrString object with numeric 4>, <NumOrString object with numeric 5>]
— and where
— map getNum <that list> should be [Just 1,Just 2,Just 3,Just 4,Just 5]
— to get the list in the right order, you may need to use Haskell’s append operator, which is ++
— note the type signature of (++) is
— (++) :: [a] -> [a] -> [a]
makeNumList n = [1, 2, 3]
#8: Let’s write bucket in Haskell
— it takes a list of numbers and outputs a list of lists-of-numbers,
— where like numbers are grouped together.
— e.g. bucket [1,1,3,3,3,5,4,4] is
[[1,1],[3,3,3],[5],[4,4]]
— use foldr (fold from the right)
— think about the base case; in this example,
— you’re combining 4 and [] (and you should output [[4]])
— then next you’ll be combining 4 and [[4]]
— and you should output [[4,4]]
— then next you’ll be combining 5 and [[4,4]]
— and you should output [[5],[4,4]]
— define the bucket op fcn first
— name it bucket_op, and write its type signature
bucket_op n l = []
— now write the main bucket (which must use foldr and bucket_op)
bucket l = []
[supanova_question]
cybersecurity / analysis of cyber security tools Computer Science Assignment Help
Word length – body : 3000
Assignment : Apply analytical framework to cybersecurity capabilities, in order to bridge the gap between available technologies and desirable security properties. In doing so, understand and grasp the concepts and terminologies in this field, and gain experience in exploiting existing knowledge bases toward specific control objectives.
Instructions:
1. Understand technical characteristics. Pick two open-source tools for security assessment and control from different categories, e.g.:
a. Network Intrusion Detection System (Snort, Bro, etc.)
b. Host Intrusion Detection System (OSSEC, etc.)
c. Web Application Firewall (mod_security, etc.)
d. Honeypot (Kippo, etc.)
e. Security Information and Event Management (Cyberoam iView, etc.)
f. Network Vulnerability Scanner (nessus, etc.)
and understand their technical characteristics – i.e., what is the input and output, how they interact with, analyze, or aggregate input, and how they interact with operators. Use publicly available resources to help your understanding, e.g., manuals, white papers, slides, source code, and configuration examples.
Install and use these tools in your environment if possible. Confine the use of vulnerability scanner or other potentially offensive software within your own environment, e.g., by using virtual machines or physical separation.
2. Analyze cybersecurity capabilities. Based on the understanding of technical characteristics, discuss and analyze where they are effective (vulnerabilities, threats, risks), their limits, and identify residual risks (Note that we will introduce these concepts and terminologies in the class). You may combine or contrast the two tools that you have chosen, in order to develop unique views. In order to elaborate the discussion and analysis, use existing threat models (e.g., STRIDE) and existing risk management standard (ISO/IEC 27001). You may also use CVE, CWE and CAPEC to derive examples in your discussion. In your analysis, identify requirements to people (administrators, operators) and process (e.g., reporting duties, periodicity) in order to develop cybersecurity capabilities at organization level.
3. Report Writing. Prepare a comprehensive report which incorporates results of investigation, discussion and analysis from previous steps. Your ability to correctly use terminologies, existing models, knowledge base standards and risk management standards will be evaluated during our review. Organize your report for readability and integrity, and create Appendices wherever appropriate.
[supanova_question]
DUE TODAY! 200-250 word American Lit discussion post Humanities Assignment Help
Tutor needs to be familiar with the play “Death of a Salesman” by Arthur Miller. Following 1 of the prompts below write a strong thesis statement and a supporting paragraph for the thesis.
- In what ways is this story timeless, and in what ways does it relate specifically to the time in which it
was written? For this prompt, be certain to research the historical, social, and cultural time period in
which the play was written, and in addition, consider how the play relates to the human experience
more generally. See Chapter 31 (pages 1565-1567) of Literature by DiYanni for more information. 2. Examine three of the play’s main characters. How are they different, how are they alike, and how does
each relate to the play’s overarching themes? For more information, see Chapter 24 (pp. 922-925) of
Literature by DiYanni. 3. What is typically “American” about Miller’s play? What cultural attitudes and values displayed by the
characters make it “feel” American? How does the theme relate to the American experience of the
American Dream? See Chapter 31 (pages 1565-1567) of Literature by DiYanni for more information. 4. What is the overarching theme of the play, and how does Miller express that theme using the elements
of drama (characterization, setting, staging, imagery, etc.)? For more information, see Chapter 24 of
Literature by DiYanni.
[supanova_question]
Explain how Master Data Management is successful, computer science homework help Computer Science Assignment Help
please read the link very clearly and answer the question below effectively https://www.wsj.com/articles/why-cios-arent-prepar… Your Discussion Board Post is to be formatted as an email to your organization’s Board of Directors. Write as if you are the CIO in the same industry as that mentioned in the article(s) and had been considering doing the same thing they did.
Explain what happened.
Stick to the facts. If you speculate, say that you are speculating.
Explain how Master Data Management was successful or how it failed.
What did management do correctly or fail to do?
If they were successful, was that because of a plan or were they just lucky?
If they failed, what would you do to correct the procedure to avoid failures in the future?
Will the information in this article encourage you to do the same thing or make you reconsider? Why? How to collect and use sensor data. The new Airbus has 70,000 sensors.will be worked
Very important to Find at least two additional articles that address the same facts. Typically, several sources will report on the same event. You might find facts that I missed!
Be sure to identify (and provide an APA formatted link to) the article you select. and its is mandatory. This is just good manners.
Make sure you made all question very effectively and no plagiarism and all references must be in APA format and minimum 3 references and please add the link in APA format that your are using to make this questions.
Example of APA format for links.please make APA reference as shown below
Journal, H. (2017). Mailing Error Sees 1,126 Letters Sent to Patients’ Previous Addresses. HIPAA Journal. Retrieved 28 January 2017, from http://www.hipaajournal.com/mailing-error-sees-1126-letters-sent-to-patients-previous-addresses-8665/
[supanova_question]