Patient surrogate decision maker | Nursing homework help

ÿ
The Patient Self-Determination Act (PSDA) was implemented to allow patients to state “Do Not Resuscitate” (DNS), or to assign a surrogate decision maker in the event that the individual is unable to make the decision. What relationship does an ethics committee have in enforcing the advance directives of the patients in their care? Support your analysis minimum of one peer-reviewed article.

Problems in benefitting & avoiding harm to patients

View the unit video, and take careful notes, utilizing the pause button when appropriate. In your main post apply some of the ideas of Robert Veatchÿfrom the video and thoughtfully comment on Grabenstein’sÿessay on religiousÿobjections to vaccinations and the anti-vaccination movement.
Robert Veatch ? Revisiting Foundational Concepts: Benefitting & Avoiding Harm to Patients: https://www.youtube.com/watch?v=R4pQObao3Mo(47:00)ÿ
.ÿÿ What the World?s religions teach, applied to vaccines and immuneÿglobulins – JohnÿD.ÿGrabenstein ÿhttp://www.childrenshealthcare.org/wp-content/uploads/2012/01/Vaccine-Grabenstein-article.pdf
(1) “Main Post” – one post should address the discussion topic. (2) “Response Post” – one post should be a response to another person`s post. Each post needs to beÿ15 – 20ÿsentences in length. Also, make sure that you read all or almost all of the posts of your classmates. You are reminded that in your discussion posts you will be expected to show that you are integrating ideas from the assigned unit readings and the other resources provided (articles from newspapers, magazines, journals, and videos) into your posts. Failure to do this will result in a lower discussion grade and a successful discussion post that refers to specific readings and videos will receive a higher discussion grade.

Pay structures & alternative pay structures

“Pay Structures”ÿPlease respond to the following:
Argue for or against the argument that pay grades limit a company?s ability to achieve competitive advantage. Support your position.Argue for or against the argument that merit pay grids have the potential to undermine employee motivation. Support your position.
ÿ
“Alternative Pay Structures”ÿPlease respond to the following:From the e-Activity, determine how a person-focused pay program could benefit your current (or future) place of employment. Provide specific examples to support your response.Determine ways that broadbanding or two-tier wage plans could benefit your current (or future) place of employment. Provide specific examples to support your response.
ÿ
ÿ

Project 3 | Ancient history homework help

ÿ
Similarities and Differences in Architecture
Use the template provided to prepare aÿreport that details similarities and differences between religious buildings: A Greek temple, a Roman temple, an Early Christian church, and a Byzantine church. Follow these instructions to complete the assignment:

Download the Word document worksheet for completing this assignment here.
Complete Part 1, Comparison Chart:

From the list of examples provided in the worksheet, choose one example from each: A Greek temple, a Roman temple, an Early Christian church, and a Byzantine church.
Carefully examine each building and read about it in your textbook, course lectures, and through reliable internet resources.
Then, note in the chart the visual characteristics for each type of religious building that are similar and different.

Complete Part 2, Historical and Social Context: In a paragraph of at least 8-10 sentences, highlight key similarities and differences between the four structures, and any social, historical, religious, and/or political factors that may have contributed to these similarities and differences. Explain the use and function of each structure, and provide any additional details that help us understand its full meaning.

Pcn 500 week 8 benchmark – major counseling theories comparison paper

Throughout the course, you have studied and written about a number of counseling theories that are used as the basis for the counseling profession. In this paper, choose a theory and compare it against each of the following three theories:

Cognitive behavior therapy (CBT)
Solution-focused
Psychoanalysis

Choose a theory that you have studied in this course. Do not choose one of the three theories listed above.
ÿ
Compare your selected theory against the three theories listed above.
ÿ
Write a 1,500-2,000-word paper discussing your theory comparisons. Include the following in your paper:
ÿ
Part 1: Selected Theory

Founding theorist(s) for the selected theory
Standard interventions for the selected theory
At least three main concepts of the selected theory

Part 2: Cognitive Behavior Theory (CBT)

Founding theorist(s) for CBT
Standard interventions for CBT
Similarities and differences between your selected theory and CBT

Part 3: Solution-Focused Theory

Founding theorist(s) for solution-focused theory
Standard interventions for solution-focused theory
Similarities and differences between your selected theory and solution-focused theory

Part 4: Psychoanalysis

Founding theorist(s) for psychoanalysis
Standard interventions for psychoanalysis
Similarities and differences between your selected theory and psychoanalysis

Include at least three scholarly references in your paper in addition to the course textbook.
ÿ
Prepare this assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center.
ÿ
This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
ÿ
You are required to submit this assignment to Turnitin. Refer to the directions in the Student Success Center.
ÿ
This assignment measures the following competency: Competency 1.1:ÿDemonstrate an understanding of the major counseling theories and principles.

Project 6: global approaches to cybersecurity step 3: project

ÿ
In this step, you should continue to explore the scenarios within SIMTRAY, “Cyber Policy for a Small World.” If you have not already, you will most likely encounter the following topics in this exercise: EMP Attack, the role of state actors, and attacks using technologies such as botnets.
Document events that you experience in the exercise that might affect the global cybersecurity policy. Think about threats brought about by new technologies and how these threats are or could be handled by global policy.
The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need in order to have a firm grasp of the concepts. Compile your recorded scores, lessons learned and documented technologies and policies into a one-page report.

Pcn-520 week 8 brief personal reflection paper

Brief Personal Reflection Paper
Write a personal reflection paper (400-750 words) summarizing the following:

Most significant things you learned about group counseling in this course.
Most significant things you learned about yourself as a potential group leader.
Specific skills and experiences that you believe you need to develop in order to be a competent group counselor, based on your current strengths, weaknesses, and prior experience.
Your areas of greatest confidence and lack of confidence when you think about leading counseling groups.
Types of groups you might enjoy leading in your future career as a counselor.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
You are required to submit this assignment to Turnitin. Please refer to the directions in the Student Success Center.
ÿ
ÿ

Project and discussion | Computer Science homework help

Q1.) Operation security Individual project
Department of Defense (DoD) Readyÿ
Purpose
This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.
Learning Objectives and Outcomes
You will be able to develop draft IT security policies for an organization and apply learning constructs from the course.
Required Source Information and Tools
Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on June 16, 2014.
The following tools and resources will be needed to complete this project:

Course textbook
Internet access
DoD instructions or directiveshttp://www.dtic.mil/whs/directives/
Risk Management Framework (RF) for Department of Defense Information Technology (IT) http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf ÿand ÿhttp://www.rmf.org/images/stories/rmf_documents/850001_2014.pdf
Department of Defense Information Security Programhttp://www.fas.org/irp/doddir/dod/5200-1r/ÿ
Department of Defense Internet Services and Internet-Based Capabilitieshttp://www.dtic.mil/whs/directives/corres/pdf/855001p.pdf
Department of Defense Proposes New Information Security Requirements for Contractors: http://www.hldataprotection.com/2010/03/articles/cybersecurity-data-breaches/department-of-defense-proposes-new-information-security-requirements-for-contractors/
School/public library (optional)

Deliverables
Scenario
You work for a high-tech company pproximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.
This course project will require you to form a team of 2 to 3 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the ?Tasks? section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.
Your firm’s computing environment includes the following:

12 servers running Microsoft Server 2012 R2, providing the following:

Active Directory (AD)
Domain Name System (DNS)
Dynamic Host Configuration Protocol (DHCP)
Enterprise Resource Planning (ERP) application (Oracle)
A Research and Development (R&D) Engineering network segment for testing, separate from the production environment
Microsoft Exchange Server for e-mail
Symantec e-mail filter
Websense for Internet use

Two Linux servers running Apache Server to host your Web site
390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks
You should:

Create policies that are DoD compliant for the organization?s IT infrastructure.
Develop a list of compliance laws required for DoD contracts.
List controls placed on domains in the IT infrastructure.
List required standards for all devices, categorized by IT domain.
Develop a deployment plan for implementation of these polices, standards, and controls.
List all applicable DoD frameworks in the final delivery document.
Write a professional report that includes all of the above content-related items.

Submission Requirements

Format: Microsoft Word
Citation Style: APA
Length: 5 pages

Q2.) Cryptography Discussionÿ
Write 500 words that respond to the following questions:ÿÿ

Read the (Yahoo Data Leak Article from csoonline.com) online article at https://www.csoonline.com/article/3123496/security/yahoo-s-compromised-records-likely-hidden-within-encrypted-traffic-vendor-says.htmlÿ
Write a 400-600 words summary about what did you understand from it.

Please note:

Be in APA format including your references.
Be 500 words long (not including title and references).
Do not re-state the questions.
Include two sources (i.e. two references).

Q3.) Operation Security Discussion ÿ
Assignment Requirements
Participate in a discussion on the importance of separation of duties for personnel. Discuss examples of roles you would separate and why. For example, an administrator has full administrative server login access, and a network technician has limited administrative access but can view system login details. Payroll has access to employee financial records, but only payroll managers can approve raises.

Peer response due today | Psychology homework help

Each response to another must be at least 175 words in length.
If asked to post your opinion or reaction/reflection as part of an initial discussion post, you must still incorporate reference support. While opinions and reactions are personal and subjective in nature, they need references and citations for support. This approach reflects knowledge acquisition as well as application and synthesis of content. In other words, always support your work with resources. This is also applies to article reviews and/or reflection exercises?you still must have at least two references?.one of which will always be your textbook.
(Cohen, R. J., & Swerdlik, M. E. (2018). Psychological testing and assessment: An introductionÿto tests and measurement (9th ed.). New York, NY: McGraw-Hill)
(Peer response)
1. ÿDescribe what these scores mean.
Internal consistency reliability coefficient of .92 means that excellent reliability and it is an acceptable test to give. Our textbook defines reliability as, ?the proportion of the total variance attributed to true variance? (Cohen & Swerdlik, 2018 p. 142). Without reliability tests lack consistency therefore they become less useful because they also lack validity (Drummond & Jones, 2006).Tests are considered reliability if they produce the same results each time the test is used. Alternate forms of reliability coefficient .82 means the test is still reliable because the score is considered high, however, the test is not as reliable as the test with the internal consistency reliability coefficient .92 (Cohen & Swerdlik, 2018). Lastly, test-retest reliability coefficient .50 tests the average of the two scores of the test that were given and that is considered a low score.
2. ÿSynthesize all of these interpretations into a final evaluation about this test utility or usefulness & Synthesize all of these interpretations into a final evaluation about this test’s utility or usefulness.
The internal consistency reliability coefficient .92 means 92 % of the time this test produces accurate results, that leaves only a chance for error 8% of the time. The alternate forms reliability coefficient .82 means that 82% of the time this test produces accurate results, that score is still high enough for reliability however, not as high as the internal consistency reliability coefficient. Lastly, the test-retest reliability coefficient .50 means that 50% of the time this test produces accurate results, which is the least reliability of the 3 test types (Cohen & Swerdlik, 2018). All and all, each of these tests would be useful however, in my field of Applied Behavior Analysis I find the test-retest score to be most interesting because I would like to see growth and this test is given in two separate parts. Test 1 and then later, Test 2, allowing to see improvement in the test participate. It sounds as thought test-retest is made to show growth, and that is what we shrive for in my field.
3. ÿExplain whether these data are acceptable
Internal consistency reliability coefficient .92 alternate forms reliability coefficient .82 is an extremely reliable data point, however. The test-retest .50 is less reliable (Cohen & Swerdlik, 2018).
4. ÿExplain under what conditions they may not be acceptable and under what conditions, if any, they may be appropriate.
Test-retest reliability coefficient may not always be the best test to use because it shows change over time and sometimes that is not what we need. Alternate forms reliability coefficient may not be appropriate sometimes because it becomes difficult to develop two equivalent tests to administer. Lastly, internal consistency reliability coefficient is only good in instances where the test is homogenous, if the test is not the data may not be acceptable (Drummond & Jones, 2006).

Perceived crises influencing addiction | Psychology homework help

ÿIn a 2 ? 3 page APA-formatted paper, address the following:

Provide a description of at least two factors outside an individual?s control that could result in a perceived crisis and explain how that perception might affect propensity toward addiction.
Describe a model of crisis intervention that might be most effective in addressing these factors and explain why.
Explain why that model might be more successful than other models.

Please use the attachments to complete the assignmentÿ