Need 1, 2 and 3 in different docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help

Need 1, 2 and 3 in different docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help. Need 1, 2 and 3 in different docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help.


(/0x4*br />

Question 1:

For the week eleven discussion board I would like you to take a look at a company website of your choice. The company must be publicly traded. Explore their website to learn more about the company. After researching the company answer the 4 questions listed below. Be sure to provide specific details in your post that you found on the website for the company you chose. Be sure to provide a link to the website of the company you chose to use for this assignment.

1. What do you think are the company’s overall, long term goals?

2. Develop a balanced scorecard. Include two to five measures in each of the scorecard’s perspectives.

3. How would the balanced scorecard affect the way managers develop the company’s strategy?

4. Explain the concept of lead and lag measures in the context of the scorecard you developed.

(400-450 words in word document with references 6 years or less old)(Please follow APA format) Please 3 references from journals or books will be appreciated.

Question 2:

Do you believe that all data should be encrypted? Many computing professionals think this is a good idea. But a small number of computing experts feel that no data should be encrypted—that all data and software should be openly available to anyone who wants it. Explain your answer (whether you believe all data should or should not be encrypted).

(400-450 words in word document with references 6 years or less old)(Please follow APA format) Please 3 references from journals or books will be appreciated.

Questioin 3:

In this module, you learned that random numbers (or, at least, pseudorandom numbers) are essential in cryptography, but it is extremely difficult even for powerful hardware and software to generate them. Go online and conduct research on random number generators. What are the different uses of these tools besides cryptography? How do they work? Explain your answer using your own words.

(900-1000 words in word document with references 6 years or less old)(Please follow APA format) Please 3 references from journals or books will be appreciated.

Also include abstract and conclusion in question 3

Need 1, 2 and 3 in different docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help[supanova_question]

Final assignment Business Finance Assignment Help

Aim

In this assignment you will begin to see the parts of this course as a connected whole. You will take elements from each assignment and re-analyse them from the perspective of the other assignments. In doing so you will begin to reflect on how the specifics of language and action are used to construct our identities and society. I expect 1200-2000 words not including transcripts.

Procedure

You will need to complete Jeffersonian transcription of the recordings from your ‘face threat’ assignment and your calling-in interaction. You will also include improved transcripts from your transcription assignment. You must view my specific feedback and rubric and understand the general principles of what needs to be improved. You will also transcribe at least thirty seconds from at least one other student for part 1.

In your written piece you will:

Begin with an introduction that provides an overview of the cases you use and the answers you will have. This should be about 200 words and cover the arguments/observations you will make.

PART 1

Find an examples of categories being used. You may not use your own recordings for this, it must be another student’s. This section should be 400-800 words. Do not share transcripts (plagiarism detection is on). Recalling that categorisation is not an action, address the following

  • What position is it in the adjacency pair? What conditions does the overall action create or satisfy?
  • What action is the turn in which the categorisation located doing? (repair? storytelling?complaining?)
  • What assumptions does the use of this category reveal that the speakers are making about people and the world?

You will present a brief 2 sentence introduction to the transcript, you will give the transcript a heading based on the file title used. You cannot embed audio, canvas deletes it. Expect to get 0 on transcription if I have no way of ascertaining which transcripts you’ve used. It is best to embed a hyperlink to the canvas/box file alongside giving the heading used in the recording assignment file.

After you introduce and present the first transcript you will address the details of the prompts above. The rubric rewards finding different actions and different categories.

PART 2

In this section you will provide a Jeffersonian transcription of you calling-in interaction. This section will be about 500 words. You will provide a brief introduction to the transcript (reminding me of the situation and who is who) and then address the following

  • Identify 2 kinds of pre-sequences, mitigations, or indirectness that were employed in your call-in
  • Relate these to the various face-threats involved in this interaction employing the relevant concepts
  • Discuss the ‘remedial work’ in the exchange

PART 3

In this section you will enter a dialogue with the ideas of this course and your identity and self. In around 500 words you will address

  • One element of social interaction you see in a new way
  • One example of how understanding gender, race, LGBTQI issues as issues of language will change how you act
  • Using the example of your ‘nice face threat’ describe how social rules and ethical conduct can clash. Using the transcript you make here will improve your grade.

As with the other sections (see below) you must include citations and quotes in this section, even though it will include your opinion also.

Then you will provide a conclusion in 100-200 words summarizing the key points of the assignment.

Data

You may not take new recordings.

If other students recordings sound scripted, concocted, or awkward, this will reduce your grade, avoid recordings that sound like that.

If you did not obtain recordings for assignment 5 see me. This may cost you some points in some cases.

Citations

You must cite the Stokoe text extensively in section 1 and 2. You must cite relevant course readings also (Garcia, Zhang-Waring). Cite the Gergen text and anything relevant from Shrikant/bailey or goodwin etc in section 3.

NEW CITATIONS FROM OUTSIDE THE COURSE

As discussed in week 5 I am also grading you on gathering and using citations from outside of the course. Do not use google. Follow the instructions from week 5. You must gather 4 citations and use at lease one ‘out of course’ citation per section. You may use other Gergen texts (Links to an external site.) in section 3 in addition to the wiki. Keep quotes under 1 sentence. Never end a paragraph on a quote.

Variations

If you find a PRACTICE or a device, you may consult me about describing that. In those cases I may give leeway on certain elements.

[supanova_question]

Protected Health Information (PHI): Privacy, Security, and Confidentiality Best Practices Health Medical Assignment Help

Prepare a 2-page interprofessional staff update on HIPAA and appropriate social media use in health care.

As you begin to consider the assessment, it would be an excellent choice to complete the Breach of Protected Health Information (PHI) activity. The will support your success with the assessment by creating the opportunity for you to test your knowledge of potential privacy, security, and confidentiality violations of protected health information. The activity is not graded and counts towards course engagement.

Health professionals today are increasingly accountable for the use of protected health information (PHI). Various government and regulatory agencies promote and support privacy and security through a variety of activities. Examples include:

  • Meaningful use of electronic health records (EHR).
  • Provision of EHR incentive programs through Medicare and Medicaid.
  • Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) rules.
  • Release of educational resources and tools to help providers and hospitals address privacy, security, and confidentiality risks in their practices.

Technological advances, such as the use of social media platforms and applications for patient progress tracking and communication, have provided more access to health information and improved communication between care providers and patients.

At the same time, advances such as these have resulted in more risk for protecting PHI. Nurses typically receive annual training on protecting patient information in their everyday practice. This training usually emphasizes privacy, security, and confidentiality best practices such as:

  • Keeping passwords secure.
  • Logging out of public computers.
  • Sharing patient information only with those directly providing care or who have been granted permission to receive this information.

Today, one of the major risks associated with privacy and confidentiality of patient identity and data relates to social media. Many nurses and other health care providers place themselves at risk when they use social media or other electronic communication systems inappropriately. For example, a Texas nurse was recently terminated for posting patient vaccination information on Facebook. In another case, a New York nurse was terminated for posting an insensitive emergency department photo on her Instagram account.

Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care.

This assessment will require you to develop a staff update for the interprofessional team to encourage team members to protect the privacy, confidentiality, and security of patient information.

Demonstration of Proficiency

By successfully completing this assessment, you will demonstrate your proficiency in the course competencies through the following assessment scoring guide criteria:

  • Competency 1: Describe nurses’ and the interdisciplinary team’s role in informatics with a focus on electronic health information and patient care technology to support decision making.
    • Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.
    • Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.
  • Competency 2: Implement evidence-based strategies to effectively manage protected health information.
    • Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.
    • Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.
  • Competency 5: Apply professional, scholarly communication to facilitate use of health information and patient care technologies.
    • Follow APA style and formatting guidelines for citations and references.
    • Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.

Preparation

To successfully prepare to complete this assessment, complete the following:

  • Review the infographics on protecting PHI provided in the resources for this assessment, or find other infographics to review. These infographics serve as examples of how to succinctly summarize evidence-based information.
    • Analyze these infographics, and distill them into five or six principles of what makes them effective. As you design your interprofessional staff update, apply these principles. Note: In a staff update, you will not have all the images and graphics that an infographic might contain. Instead, focus your analysis on what makes the messaging effective.
  • Select from any of the following options, or a combination of options, the focus of your interprofessional staff update:
    • Social media best practices.
    • What not to do: Social media.
    • Social media risks to patient information.
    • Steps to take if a breach occurs.
  • Conduct independent research on the topic you have selected in addition to reviewing the suggested resources for this assessment. This information will serve as the source(s) of the information contained in your interprofessional staff update.

In this assessment, assume you are a nurse in an acute care, community, school, nursing home, or other health care setting. Before your shift begins, you scroll through Facebook and notice that a coworker has posted a photo of herself and a patient on Facebook. The post states, “I am so happy Jane is feeling better. She is just the best patient I’ve ever had, and I am excited that she is on the road to recovery.”

You have recently completed your annual continuing education requirements at work and realize this is a breach of your organization’s social media policy. Your organization requires employees to immediately report such breaches to the privacy officer to ensure the post is removed immediately and that the nurse responsible receives appropriate corrective action.

You follow appropriate organizational protocols and report the breach to the privacy officer. The privacy officer takes swift action to remove the post. Due to the severity of the breach, the organization terminates the nurse.

Based on this incident’s severity, your organization has established a task force with two main goals:

  • Educate staff on HIPAA and appropriate social media use in health care.
  • Prevent confidentiality, security, and privacy breaches.

The task force has been charged with creating a series of interprofessional staff updates on the following topics:

  • Social media best practices.
  • What not to do: Social media.
  • Social media risks to patient information.
  • Steps to take if a breach occurs.

You are asked to select one of the topics, or a combination of several topics, and create the content for a staff update containing a maximum of two content pages. When distributed to interprofessional team members, the update will consist of one double-sided page.

The task force has asked team members assigned to the topics to include the following content in their updates in addition to content on their selected topic(s):

  • What is protected health information (PHI)?
    • Be sure to include essential HIPAA information.
  • What are privacy, security, and confidentiality?
    • Define and provide examples of privacy, security, and confidentiality concerns related to the use of the technology in health care.
    • Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.
  • What evidence relating to social media usage and PHI do interprofessional team members need to be aware of? For example:
    • How many nurses have been terminated for inappropriate social media usage in the United States?
    • What types of sanctions have health care organizations imposed on interdisciplinary team members who have violated social media policies?
    • What have been the financial penalties assessed against health care organizations for inappropriate social media usage?
    • What evidence-based strategies have health care organizations employed to prevent or reduce confidentiality, privacy, and security breaches, particularly related to social media usage?
Notes
  • Your staff update is limited to two double-spaced content pages. Be selective about the content you choose to include in your update so that you are able to meet the page length requirement. Include need-to-know information. Leave out nice-to-know information.
  • Many times people do not read staff updates, do not read them carefully, or do not read them to the end. Ensure your staff update piques staff members’ interest, highlights key points, and is easy to read. Avoid overcrowding the update with too much content.
  • Also supply a separate reference page that includes 2–3 peer-reviewed and 1–2 non-peer-reviewed resources (for a total of 3–5 resources) to support the staff update content.
Additional Requirements
  • Written communication: Ensure the staff update is free from errors that detract from the overall message.
  • Submission length: Maximum of two double-spaced content pages.
  • Font and font size: Use Times New Roman, 12-point.
  • Citations and references: Provide a separate reference page that includes 2–3 current, peer-reviewed and 1–2 current, non-peer-reviewed in-text citations and references (total of 3–5 resources) that support the staff update’s content. Current mean no older than 5 years.
  • APA format

Rubric

-Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team: Provides a comprehensive and insightful summary of confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.

Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information: Explains in detail, and with professional insight, the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.

Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information: Identifies multiple appropriate and well-researched evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.

-Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage:
Develops a comprehensive, professional, and effective staff update that educates interprofessional team members with flawless exposition about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.

-Follow APA style and formatting guidelines for citations and references.

-Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.


[supanova_question]

CRJ320 STRAYER WEEK2 to write an effective report, you must organize your notes and adhere to some basic standards Law Assignment Help

Please respond to the following:

According to your textbook, Criminal Investigation, to write an effective report, you must organize your notes and adhere to some basic standards of written English regarding content and form. Departments use either written narrative reports, written in chronological order, or they use box-style law enforcement report forms for specific offenses and incidents.

  • Compare the narrative style reports to the box-style shown in Figure 3.2 of your text, and classify each piece of information as being either important or generalized.
  • Provide a rationale for your classification of the information.
  • Which style do you believe is the most effective in capturing information that is relevant to the investigation—narrative or box-style?
  • Provide a rationale to support your response and respond to no less than one of your peers.

[supanova_question]

Statistical data is used to solve crime and find patterns of behavior. This is especially relevant when working to develop new policies. You have been asked to submit a proposal to your local city council in support of a community or proactive policing. I Mathematics Assignment Help

Research a program in community policing or proactive policing that you support.

Write a 700- to 1,050-word proposal in which you:

  • Explain the issues surrounding the collection of data of the selected program.
  • Share an example of the analysis of that data and explain if you feel it is reliable. Why or why not?
  • Describe how the use of that data matters as it relates to the interpretation of the data. Explain how that relates to the policy you selected.
  • Explain how statistical data be utilized in criminal justice policy making.

Include at least two peer reviewed references.

Format your paper consistent with APA guidelines.

[supanova_question]

[supanova_question]

Need question 1 word docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help

question 1:

Using the guidelines provided in this week’s chapter (and other resources as needed), create a step-by-step IT security policy for handling user accounts/rights for a student who is leaving prematurely (drops, is expelled, and so on).

You will need to consider specialized student scenarios, such as a student who works as an assistant to a faculty member or as a lab assistant in a computer lab and may have access to resources most students do not.

(900-1000 words in word document with references 6 years or less old)(Please follow APA format) Please 3 references from journals or books will be appreciated.

Also include abstract and conclusion in question 3

Need question 1 word docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help[supanova_question]

Geog writing -02 Writing Assignment Help

The country I chose to write is : South Republic Africa

Word count at least 550

Choose one of the three prompts below. As usual, follow the assignment guidelines and post a draft (including images, links, and citations) on your discussion thread. You should incorporate your images (and map!) into your text, they should not be random images tacked on at the end. Remember the Our World in Data. (Links to an external site.) It will be a good resource this week!

Remember, when you make your map, you can use your own data that you find on the web (though you need to cite that source as well). In many cases, it will be faster to go this route than searching in the ArcGIS Online database. Look at the tutorial posted on canvas to see how.

Remember: Your map will not change the world or even be that groundbreaking. Just make a simple map that fits with your topic. Make sure you share it properly so that when you copy the link to your assignment, we can access it.

Prompt 1

Where does your state or region fall on global rankings of development and urbanization? Consider the core-periphery model. Where would your state or region fall or be categorized in this model? In other words, where is it in the core-periphery relationship? How has the spread of globalization influenced your region’s position in the dependency theory model? Use evidence to back this up and use the terms as defined in your text.

Prompt 2

Look up 6 indices of development for your region (if your region has multiple states, pick one). Include economic, HDI, and well-being as discussed in your text. Find 3 others. (eg. Happiness, literacy, gender equality)? Where does your country fall on each of these indices? What does this tell you about the development of your region? Compare these with other countries and see if the pattern matches what you’d expect to find in similarly developed countries. Finally, frame the development of your region in a positive light if it’s generally considered a peripheral region and if it’s a core region, define it as a problem or what it lacks.

Prompt 3

What is the primary city in your region (usually economic or political capitals)? How is this city usually framed (Progressive? Developed? Modern? Backwards? Dangerous? others?). Why is your city framed this way? Find ways of telling an alternative story of your city (if it’s seen as a modern city, tell a story of how it is not using examples or stories or data you can find to tell an alternative story). Use data to back up your answers.

PreviousNext

[supanova_question]

Philosophy of Counseling Paper Humanities Assignment Help

Write a 10-15 page paper in which you will reflect on your philosophy of counseling. Your philosophy will include characteristics you think are necessary of counselors, your view of the role as a counselor, how you view the role of the client, and how your relationships, spirituality, and counseling practice will interact as a career in counseling is pursued. In the paper, the student should reflect on:

1) How your current and past relationships might impact your practice of counseling.

2) How your own spirituality, theology, and worldview may impact your practice of counseling.

3) How other life experiences may impact counseling practice.

4) How this class has impacted your understanding of counseling.

5) What strengths do you have that may help for future counseling.

6) What weaknesses/issues need to be addressed by you as you pursue a career in counseling?

7) How you will implement self-care strategies.

8) Evaluate how your background and personality influence the helping relationship.

9) Discuss how you will (or will not) use technology in counseling, and address the role of technology on the counseling process.

You should extensively reference a minimum of five scholarly sources in the paper without using block quotes. The paper will follow APA format for title page, reference page, double space, one-inch margins, and Times New Roman. The paper will also be graded on grammar and punctuation.

Title:

Counseling and Therapy Skills

Author(s):

D.G. Martin

ISBN 13:

978-1-4786-2875-0

Edition/Year Published:

4th ed, 2016

Publisher:

Waveland Press

Title:

Interviewing and change strategies for helpers

Author(s):

Cormier, S., Nurius P.S., & Osborn, C.J.

ISBN 13:

9781305271456

Edition/Year Published:

8th, 2017

Publisher:

Cengage Learning

Is Access Code Required?

No

[supanova_question]

Payroll Accounting 2018 Edition Bieg Toland Chapter 7 Payroll Project Business Finance Assignment Help

Hello, I was wondering if I could get some help with the Payroll Accounting project in the 2018 version of the Bieg, Toland Payroll Accounting book. I have completed the Payroll portion (which I have provided), as well as the journals and ledgers, and the 941 tax portion. I have just hit a wall when it comes to the rest of the tax tasks which are listed to complete on pages 7-20 and 7-21. I am willing to provide any more information that is needed.

I have attached all of the Chapter 7 Project, so with the Payroll excel spreadsheet you should have everything I have regarding the project. I have also attached on the end of the 2nd PDF the 3 page handout that my teacher provided which is the “Audit Test” which is needed to be filled out because that’s what she’s going to be using to grade the project. Please let me know if you have any problems or if you need anything else! Thank You very much!

[supanova_question]

One Accounting Question Business Finance Assignment Help

The Davis Corporation is authorized to issue 3,000 shares of 8%, $50 par value preferred stock and 10,000 shares of no-par value common stock with a stated value of $20 per share. On December 31, 2018, 1,000 shares of preferred stock and 3,000 shares of common stock are issued and outstanding.

The corporation’s transactions affecting stockholders’ equity during 2019 are given below. Record the transactions on page 8 of the general journal. Omit explanations.

January 15 Repurchased 300 shares of outstanding preferred stock for $37,500 in cash. The stock is to be held as treasury stock.

March 1 Declared a 2-for-1 stock split of common stock. Each shareholder is to receive one new share for each share held. Record the entry for the date of record on March 15 and for the issuance of the stock on April 1.

July 15 Declared a cash dividend of 8% on preferred stock and $.25 per share on common stock to be paid on August 1 to stockholders of record on July 31.

August 1 Paid the cash dividend declared on July 15.

October 5 Accepted title to a tract of land with a fair market value of $15,000 from the city of Fairview. The land is to be used as a building site for a new warehouse.

November 8 The Board of Directors appropriated $40,000 of retained earnings for the construction of a new warehouse.

December 15 Declared a stock dividend (payable January 15, 2020) to common stockholders of record on December 28, at the rate of one new share of common stock for each ten shares held. The estimated market value of the common stock is $12 per share.

[supanova_question]

Need 1, 2 and 3 in different docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help

Need 1, 2 and 3 in different docs with 3-4 references each in APA citation format – No Plagiarism please Engineering Assignment Help

× How can I help you?