Advance nursing research (evidence-based practice)

Assignment: What’s Your Research Question? Evidence-Based Practice Project (EBP)
Based on your preliminary investigation of the literature and your discussion with the expert clinician interview (see attached clinician interview document.), complete the following on a Word document:
1. Submit a 350-word summary of your clinical research area of interest and explain why you are interested in it. (My clinical research area of interest is Mental Health)
2. Ensure you present your research questions that you started working on (see attached research questions document). 
You will now have more information from your expert clinician, as well as feedback from your instructor.
FREE OF PLAGIARISM: TURNITIN ASSIGNMENT !

Listen to door dash and answer these questions in about 200 words:

 
Listen to Door Dash and answer these questions in about 200 words:
1. What was the problem?
2. How did technology allow this product to exist?
3. Have you ever used Door-Dash? Why? 
4. Based on the founders plans for the future from the time Door-Dash was started do you think they have been able to realize that vision
the link to the podcast
https://www.npr.org/2018/11/09/666295686/doordash-tony-xu

Anatomy reflection 2 | Anatomy homework help

 
After reviewing and studying this module’s content, answer the following questions. Be sure to complete all lab activities and attend/watch all live lectures before completing this assignment. All of your answers should be written in your own words, using full sentences, correct terminology, and proper spelling and grammar.

Explain the anatomical concepts associated with the heart. Summarize this module’s key points in 5-6 sentences.
Explain the physiological concepts associated with the heart. Summarize this module’s key points in 5-6 sentences.
How will you apply the concepts you have learned about the heart in real life and in your future career?
Which topic within this module has been the most valuable to your learning experience and why?
Which topic(s) within this module did you struggle to understand and why?
(Optional) Do you have any suggestions for your instructor on how they could help you connect with the difficult topics you’ve noted? 

Discussions week 1 | Computer Science homework help

 
Security Control Frameworks
Actions for Security Control FrameworksMust post first.
IT controls come in a vareity of flavors. Some groups are described as People, Process, and Technology. Othe controls (safeguards) are defined by the standard with which they apply (e.g, Prevent, Detect, Deter, Respond). Research and select a control grouping framework then populate the framework with some examples of the actual control. Provide your rational as to why you selected your framework and what industry verticle your think it is most appropriate. 
Controlling the Uncontrollable
Actions for Controlling the Uncontrollable
Must post first.
What four (4) IT security controlls do you find the most important? Why? Do you consider anything related to process or policy a true safeguard? Why? Why not? 
Controlling the Insider Threat
Actions for Controlling the Insider Threat
Must post first.
We know from experience that the insider threat presents the biggest challenge to security professionals. With this area of control being nearly overwhelming what technologies do you recommend that will help the security team keep a near real-time view of the insider threat? Think automation, behavior detection, and correlation. 

Module 2-slp | Computer Science homework help

The Root Beer Game Simulation
 
Instructions for running The Root Beer Game simulation:
Forio Group. (2011). Root beer game demo. HBR. Retrieved from
http://forio.com/simulation/harvardrootbeergamedemo/login.htm
 
Running the simulation involves the following steps:
Review the Simulation Summary, Your Role, and How to Play sections under the
Prepare tab.
Go to the Analyze tab to run the simulation.
Submit your weekly order in the Enter Order field? At least 20 rounds are Necessary to get a good feel for the problems involved. When finished, review your performance under the Dashboard Overview, Inventory and Shipments, Orders and Backlog, and Cost Detail tabs.
 
Spend a maximum of 30 minutes working with the game. Then think about it in
conjunction with this modules readings for perhaps another 15-20
minutes.
 
Then, in 2-3 pages, address the following questions: APA FORMAT
1. What did you do in the simulation? What activities did you engage in? What
did you learn about whats going on?
2. What have you learned about supply chain management from your
participation in this simulation?
 

**answer each post 250 words min each post**** 1. discussion

 
**ANSWER EACH POST 250 WORDS MIN EACH POST****
1. DISCUSSION QUESTION- What are your views on the use of drones in our operations against terrorists?  Provide the short and long term costs and benefits of using drones against al Qaida targets.
2.  Discussion Questions: Beyond just its capability for mass means of communications and spreading fear, what are all the different ways that terrorist groups and violent extremist organizations are able to employ the internet? If you think about the terrorist attack cycle and the need to recruit, train, fund, resource, reconnoiter, plan, rehearse, and execute a terrorist attack – which of these can be done in part or in whole on the internet? What are your thoughts on the internet and social media as it relates to impacts on extremism through networks and relationships as described by Archetti (2015) – her alternative communication based framework to explain radicalization? 
****REPLY TO EACH POST 100 WORDS MIN EACH****
1.  While aerial reconnaissance during war has been leveraged since WWI, unmanned aerial systems (UAS) have afforded the United States (US) military and civilian population with numerous benefits. However, through continued use of this tool, the US has potentially become too reliant upon this capability, degrading overall combat effectiveness and global perception. This short forum post will outline the benefits and costs of this technology. 
Beginning with the benefits of US UAS, the number gain is reduction of risk to force. UAS afford combatant commanders a phenomenal tool in their toolbox to gain target fidelity. For the purposes of this forum the discussion will center around the United States Air Force (USAF) MQ1-B Predator. Armed with “infrared sensor, color/monochrome daylight TV camera, image-intensified TV camera, laser designator and laser illuminator”, the MQ1-B is a force multiplier. US military commanders can develop an Imagery Intelligence (IMINT) picture of a target location, and the collected intelligence can be layered with other intelligence disciplines. UAS’s offer military reach, ability to operate in previously denied, or untenable, areas. MQ-1Bs are armed with munitions, such as the Air-to-Ground (ATG) 114 Hellfire, offering the combatant commander an option for an operational end state. These UAS’s have been leveraged by the US military since 2004 and been utilized in several strikes to progress the US counterterrorism objectives. 
Collection bias, or satisficing, is the largest disadvantage to leveraging UAS’s. To further clarify, a UAS collection platform is only revealing one part of the actual ground truth. From an intelligence perspective, analysts can fall victim to collection bias, clouding the overall assessment of target importance, or contextually understanding what has been collected. This has led to several unfortunate civilian casualties when UAS airstrikes have been conducted.  The killing of civilians alone is terrible however, this completely counters the entire reason for the strike. By default, the local population is immediately pushed towards radicalization because of the inaccurate drone strike. This secondary effect of collection bias is the longest cost against leveraging UAS on the battlefield. 
2. Before we begin I suppose I should point out that my opinion is slightly biased considering I have been an MQ-9 Reaper aircrew member for a decade now and continue to work in the realm of Remotely Piloted Aircraft (RPA) or drones.
The biggest misnomer in the realm of RPAs is the terminology drone this gives way to the biggest misunderstanding that these aircraft are entirely autonomous and engage targets based on software parameters, which is entirely untrue. These aircraft are at all times controlled by US military personnel regardless of what level of autonomy the system is granted and never employ weapons without express permission by human authorities.
RPA use against terrorist targets however has been largely effective, their ability to provide a persistent overhead presence has been crucial to dealing with an insurgent adversary that does not utilize conventional tactics. Their precision guided munitions have limited collateral damage to an extreme degree and are some of the most precise weapons in the world. While we cannot say for sure what the battlespace would have looked like without their use, we can for sure say that they have had an incredible impact throughout the GWOT.
RPAs come with a multitude of both cost and benefit that is inherent to their nature and current design and technological limitations. First, RPAs excel at endurance, which is largely one of their greatest assets. With no requirement for life-support systems for aircrew members and no need to take in human factors considerations into their longevity on target, these assets can provide dozens of hours of ISR over hostile territory. The cost to this is that because they are unmanned, you lose a lot of situational awareness that a fighter aircraft might be able to gain during close air support (CAS) operations.
Another benefit is cost. The price of an MQ-9 system package is $56 million which includes four aircraft, equipped sensors, the ground control station (GCS) and a satellite antenna array. This compares to a fighter jet which alone can cost upwards of $100 million per jet. In addition to that, fuel costs are also entirely skewed as an MQ-9 can give 24+ hours on a fraction of what a fighter needs for 1+ hours of activity.
The largest cost is the one of the public eye and the extremely bad publicity the community has received from both the government and its civilian population. In all respects, an unmanned aircraft such as the MQ-9 is no different functionally than an F-16. Theyre controlled by pilots, are fueled by JP-8, and are powered by electricity. Their weapons are largely the same and tactics are shared to the extent the airframe allows. RPAs however receive terrible press and are accused of striking civilian targets intentionally or otherwise at a larger degree than other aircraft and are accused of being more prone to incurring civilian casualties. Most of this is due to an information war that the US has wholly lost to al Qaeda which has served to gain them public sympathy
3.  The advancements in internet and digital information networks have had a very fundamental change in how terrorists use these mediums to expand their influences and gain larger audiences. Aside from communications and fear mongering, terrorist organizations use the internet and digital networks to target vulnerable populations and recruit members, finance their activities through illegal cybercrimes, spread their propaganda, and provide training through manuals and illustrations. This week’s assignment talked about the vastness and unregulated space the internet provides. This new frontier provides extremists with a great deal of anonymity and safe haven from authorities. The internet allows terrorists to operate in their own domain without outside interferences or prying eyes. According to the United Nations (2012), “While the many benefits of the Internet are self-evident, it may also be used to facilitate communication within terrorist organizations and to transmit information on, as well as material support for, planned acts of terrorism, all of which require specific technical knowledge for the effective investigation of these offenses” (p.1). 
Regarding the use of the internet as part of the terrorist attack cycle, terrorists can achieve much of it using the world wide web. Terrorists can easily recruit vulnerable people through the dissemination of propaganda and radical content. They can also use the internet to fund their campaigns by employing hackers to commit cybercrimes like phishing scams and ransomware attacks. The internet, private domains (intranets), and systems networks also allow for groups of terrorists and affiliates to talk in real-time using simple html-based chat groups or discussion forums. Multi-media presentations such as videos and images can be shared to develop possible targets, present surveillance findings, and conduct preliminary rehearsals, roles, and assignments that lead up to a physical attack. A terrorist attack doesn’t have to be physical either, it can target critical infrastructure and come in the form of sophisticated malware.
I think Archetti accurately describes the impacts of social media and digital information platforms on extremism and radicalization. The current approach by many governments is to remove extremist content off the internet and monitor suspicious activity. But that concept is deeply flawed and misunderstood by our political leaders. Digital information networks are not made from a single pipeline where unwanted content can simply be shut off. The internet is made up of millions upon millions of interconnected private networks and systems, which are then interconnected with millions more pathways and routing systems that make it impossible to moderate and control. Therefore, the plan should not just be to remove, report, or moderate content but to also be pro active and create an environment in which vulnerable populations can understand the difference between real information and extremist misinformation. A place where religious scholars and civil leaders can have open discussions to help address concerns and put out the flames of hateful rhetoric and disassociate and shame extremist views and narratives. Or…they can disconnects everyones internet connection
4.  The internet and social media platforms allow a people in terrorist organizations the ability to reach out to people that were previously unreachable.  This is dangerous because anyone with a personal electronic device and a wifi connection can find or be susceptible to the information disseminated by these organizations. I think most of the terrorist attack cycle can be accomplished online and it would start with terror organizations flooding propaganda information through these online resources to reach and recruit those on the tittering point of extremist/radical behavior (Office of the Director of National Intelligence, n.d.). Funding can occur on the dark web with the use of cryptocurrency transactions through Litecoin and dash which remain largely unchallenged when it comes to illegal activities.  Training can be conducted with online tools like Youtube, or specific training videos for recruits which can be sent over the internet to specific people involved with the attack.  Reconnoiter and planning to find a soft target would be made easy through the use of the internet, however I think that in-person observations and surveillance of the target area is still needed to provide the best overall site picture for their attack.   Google could provide all the routes required, security measures, and any  other associated information related to their target of choice.  Rehearsal probably could be done online, but would be more effective if done in person in order to make sure everything is going according to planned, and obviously execution would need to be done in person, unless the attack is Cyber related like the malware attack on Colonial gas lines last year.   

Comment jovanna | Nursing homework help

 
 I NEED A POSITIVE COMMENT BASED IN THIS ARGUMENT. BETWEEN 150-200 WORDS
 
Most of the elderly at their end-of-life stage do not die at home as it is their desire. Despite the development of palliative care programs, it has remained a challenge to ensure that most of the elderly die in their homes. One of the main reasons that have made it difficult is the absence of a family caregiver who is willing to take care of an elderly patient. A patient who is at the end-of-life stage is supposed to have a person that is close to him or her so as to give them the attention they require. For elderly, having a committed family member would be significant because it gives them a sense of belonging and satisfaction, even as they near their death. However, it is hard to find such family caregivers, because most of them prefer taking their elderly relatives to a hospital where they can receive professional assistance. Moreover, few home caregivers have been trained to provide healthcare service properly; all these factors make it hard for attention to be given to elderly patients in their homes (Hudson, 2003).
As a nurse, one can support their clients during the end-of-life treatment by approaching the family member that is recommended by a patient and explain the need of having home-based care. It would be a key factor in ensuring that the family members understand the dynamics of providing care to the elderly from home. It would also be a way of ensuring that family members agree to take care of a patient, since they would be convinced from a professional point of view. Moreover, as a nurse, I would do my best to assist these family members in any way to ensure the comfort of a patient. For instance, a nurse can constantly visit a patient and provide the necessary care at home (Hudson, 2003).
 
 
References
Hudson, P. (2003). Home-based support for palliative care families: Challenges and recommendations. Medical Journal of Australia, 179(6), S35.
 
 
           
 

Using the self-assessment survey outcomes you received from the

Professionalism is a continuous process throughout your career. The workplace continues to evolve and change depending on many factors. Therefore, professional behavior and requirements that were in place in the past may not be required or they may change in the future. When you can better understand your own needs as a professional, you can better focus on the areas to improve.
 
Topic 1:
Using the Self-Assessment Survey outcomes you received from the Self-Assessment Learning Activity, respond to the following areas in your discussion prompt: include your survey score and determine two areas that you feel you should work on during this course. What are these two areas? How will these areas be important to your profession?  Comment on how you might use this information to develop your professional presence.
 
My self- Assessment survey outcomes Below:
 

Learning Outcomes

Title

Description

Score

GEL-1.1

Demonstrate college-level communication through the composition of original materials in Standard American English.

4/5

GEL-8.4

Use principles of sound reasoning within the field of study.

4/5

HI300_1504A_-1

Describe the phases and activities in the systems development life cycle.

4/5

HI300_1504A_-2

Classify database technologies and healthcare information systems used to manage data and information.

3/5

HI300_1504A_-3

Determine appropriate health information standards and regulations for specific organizations.

4/5

HI300_1504A_-4

Formulate a secure storage and retrieval process for healthcare data.

4/5

HI300_1504A_-5

Identify current federal initiatives aimed at promoting electronic health information exchange.

4/5

HI300_1504A_-6

Describe the use of electronic health records in patient care.

4/5

PC-3.2

Interact with others in a professional manner using appropriate communication and presentation skills.

3/5

 
 
Paper need 200-300 words, original, well detailed paper. No PHARGIARISM! With 1-2 scholar references.

HUMN 100 Description of a Painting Question

The “Notice and Focus” is a common tool used in the Humanities and other Cultural Studies fields. It allows one to take a more in depth look at the details in a text/artwork. The goal here is to delay judgments, not make assumptions or rush to conclusions about meaning. By taking these essential first steps of observing/noticing, before assessing, you ultimately form more plausible conclusions.The exercise consists of 3 steps, each of which you will record (typed) and submit all parts together at the end. Submitted assignments that are missing any of the steps, cannot earn full points.You can work with any of the art forms covered in Unit 1: Painting, Print (photograph or digital), Sculpture, or Architecture. If you are interested in working with music instead – please check with me first (need a music background).Step 1) Ask yourself, “What do you notice?” and come up with a list of nonjudgmental observations. These should be straightforward observations and not involve any interpretation or analysis. List as many things as you can, even if they seem odd or out of place (need at least 10).For instance, one might look at a painting and say “this piece is scary,” which would be jumping to assumptions and interpretation – analysis. Instead one would list the elements they see/hear/etc. that would give you that impression of “scary” – dark shapes, use of shadows, color choice, lighting, setting – these would all be elements that contribute to a general feeling. These are the list of observations.As you work on this list, you’ll notice patterns arise, these are usually connected to the meaning and/or the significance of a work.Step 2) Rank the features that you noticed – from most to least important/significant.You may find in this step, if you have a lot of observations, that sorting them into categories helps you rank them – this is fine, go with what makes sense and feels right to you. There are no wrong answers here, different people might rank the same observations differently and that’s normal. Understanding why you chose that ranking is the most important part.Step 3) The third and final step is to say why – explain only the top three things you listed in your ranking. What made these items so important to your understanding of the work as a whole?

Child life theory and practice forum due asap

instructions
You may remember as a child, watching Sesame Street and listening to “People in Your Neighborhood.” This week you and your classmates are going to rewrite this song with the title “People at the Hospital.” Each of you will contribute one verse in which you describe services and resources of other professionals and identify their roles and functions in caring for young patients in the hospital setting. Your instructor has begun the People at the Hospital thread and it is up to each of you to add your verse to hers. When complete, you will have a fun memory of this course and your classmates, and you will also have a groovy prep song to put into your CCLS tool bag.
This forum will be graded on participation only. Have fun everyone!

 
 
 
 
Hi Class! Ill get us started with our first verse. Add your creativity and have some fun!
 
Oh who are the people in your hospital, in your hospital, in your hospital
Say who are the people in your hospital, the people that you meet each day. 
Oh the child life specialist makes it easy to be away from home when Im queasy
She makes sure I understand, to get through my tests as planned. 
Cause a child life specialist is a person in your hospital, in your hospital, shes in your hospital
A child life specialist is a person in your hospital, a person that you meet each day..