Author: admin

  • “The Power of Language: Exploring the Role of Words in Shaping Society and Individuals” Quote: “Words are, of course, the most powerful drug used by mankind.” – Rudyard Kipling (page 1) Question: How

    These are the 5 required elements for your journal: 
    Give at least one quote from the readings (cite author and page number). If there are multiple sources for readings it is fine to choose a quote from each or to use just one quote total. (However, you do need to bring all of the assigned readings into your response.) 
    Ask a question of clarification or analysis.
    Write a substantial 2-paragraph (meaning at least 7-10 sentences per paragraph as a minimum) response that engages with the ideas and examples, including giving your own supported perspective. Directly engage TWO assigned sources in the response section as you answer the question you posed. (The word count for the reflection portion needs to be approximately 450-475 words.)
    Word count following the paragraph (457 words).
    Include a works cited list formatted in MLA (or APA if you prefer).
    This should NOT be a summary of the texts but a thoughtful consideration of some ideas that emerged from the readings. Include full citations for works cited.
    Include your last name as part of the file name for the PDF or Word doc (Smith_Journal 7) you upload for grading. 
    Guidelines: Double-space your submission and attach it as a Word doc. (Do not submit a PDF.) Format it overall so it complies with MLA or APA. Make sure you have carefully used quotation marks as appropriate and cited the sources. All Journal assignments go through the Turnitin plagiarism software, and your attention to academic honesty is critically important. The maximum similarity score through Turnitin is 20%. If your score is higher than 20% you need to revise and resubmit it with the 20% or lower score. (Paraphrase more and use shorter/fewer quotes.)
    An example is provided in the file.

  • “Overconfidence in Nursing Practice: Impact on Ethical Decision Making and Strategies for Mitigation”

    Hello everyone. My name is Jani Rodriguez and today we are going to talk about overconfidence in judgment and nursing ethics.0:01
    According to Covax, due to being overconfident, doctors incorrectly diagnose 10% to 15% of their patients.0:10
    Overconfident practitioners are usually 26% less likely to correctly manage their patients health and care.0:18
    Hence, it is vital to explore and understand how overconfidence affects ethical decision0:25
    making in nursing and identify strategies for mitigating it and its impact.0:30
    Nurses who are overly confident may overlook critical details that lead to making catastrophic mistakes,0:39
    such as administering the wrong medication or using incorrect procedures.0:45
    Simple examples of overconfident in nursing include a nurse confidently performing a complex physical medical procedure without seeking assistance,0:50
    or a nurse ignoring the input of team members due to believing that their judgment is superior.0:59
    The consequence of her actions is that the patient’s condition worsens because they lie in the correct treatment.1:06
    This situation demonstrates the dilemma of balancing confidence in one’s skills with humility and being open to other professional insights.1:12
    Probation for obligates nurses to be accountable and responsible for their practice1:24
    by ensuring that their decisions and actions serve to promote optimal health care.1:29
    Overestimating their abilities and neglecting protocols.1:34
    Put patient safety at risk. In this situation, the nurse failed to make an informed decision.1:38
    Another impact of confidence in nursing practice is that it makes professionals believe1:47
    that their assessments and decisions are more accurate than they are in reality,1:53
    which can lead to overlooking vital information, dismissing critical cues and the failure to seek second opinions.1:58
    Hence, as a result, overconfidence in nursing practice compromises patient safety, team dynamics, and professional integrity.2:05
    Another strategy for mitigating overconfidence, which should be adopted at the organizational level,2:14
    is fostering a culture of open communication respect for diverse insights to promote team collaboration.2:20
    It is also vital for individual professionals to stick to using standardized protocols to guide practice and decision making.2:28
    So here we are looking at a case study, um,2:44
    addressing overconfidence and then a hypothetical situation when the nurse overestimates her diagnosis skills and and Nicklaus2:47
    theme advice and nurse can lessen the impact of the situation on the nurses practice by reporting to surveyors about this concern,2:54
    because it is also unethical to fail to speak, encouraging the nurse to always seek second opinions and consult with colleagues.3:03
    Advocating for a checklist for ensuring always adherence to standard protocols.3:10
    Establishing a culture of regularly engaging in reflective practice and feedback sessions.3:16
    These strategies for addressing this ethical problem include regular self-reflection,3:22
    continuous education, team collaboration, and utilizing checklists and protocols.3:29
    I thank you again for watching my presentations.3:34
    I am open to any questions. Good night.3:38

  • “Exploring the Importance of Ethics in All Occupations and the Different Ethical Theories in Law Enforcement”

    Lesson 1 Assignment
    Top of Form
    Bottom of
    Form
    Assignment
    Content
    Top of Form
    Chapter 1
    List
    and explain the reasons to be moral and integral regardless of the
    occupation.
    Explain
    how ethics can improve how we live.
    Is
    ethics important for citizens who do not aspire to be in law enforcement?
    Explain why?
    List
    and describe specific duties and responsibilities for which moral
    behavior is mandatory.
    Bottom of
    Form
    Lesson 2 Assignment
    Top of Form
    Bottom of
    Form
    Assignment
    Content
    Top of Form
    Chapter 2
    List
    and define the three categories of ethical theories.
    Explain
    how utilitarian theory assists law enforcement in moral dilemmas.
    List
    and describe the problems with the Utilitarian theory. 
    Name
    and describe the most complex of all theories of ethical systems. Who
    formulated this theory and when?

  • Title: “Effective Communication and Person-Centred Care: Enhancing Quality of Care in Healthcare Settings”

    Main topics to reflect on is communication and person centred care.To intext citations and 25 references to match. Line spacing should be 1.5 that was not available in the option provided. Font style arial and font style 11. 
    Pages numbered and Harvard style referencing.

  • “The Complexities of Military Masculinity: Exploring Themes of Gender, Power, and Identity in Course Readings”

    Instructions: Students will write a literary essay or create a powerpoint presentation discussing 2 (or more) of the course readings (including poems, films, novels)  that we’ve read or viewed over the course of the term. Your essay should focus on a theme that connects the texts together. The choice of texts should be from different Units of Study and your essay topic should be different from previous essays.
    Your essay write-up or presentation slides must include a thesis statement, evidence/quotations from the primary texts, supporting evidence from 1-3 secondary sources, a conclusion, and a Reference page in MLA or APA style. Please make sure all sources are referenced through in-text citations and a reference page. 
    Here are some suggestions for topics/ themes, but feel free to develop your own theme/topic: 
    Military masculinity (pros and cons, or key characteristics)
    Loss of innocence (Loss of masculinity?)
    Hegemonic Masculinity, Complicit Masculinity, Subordinate Masculinity, Marginalized Masculinity (R.W. Connell)
    Duality of Man
    Internal Conflict vs. External Conflict
    Courage/ Heroism
    Cowards vs. Heroes
    Misogyny in the military (& treatment of women) 
    Homophobia in the military 
    Racism in the military
    The Tough Guise (tough guy persona) & suppression of emotions
    Peer pressure & conformity 
    Women in the military 
    Corrupt Powers/ Military Authority
    “The Other”

  • “Implementing and Evaluating a Health Promotion Plan: A Hypothetical Educational Session”

    Build a slide presentation (PowerPoint preferred) of the hypothetical health promotion plan you developed in the first assessment. Then, implement your health promotion plan by conducting a hypothetical face-to-face educational session addressing the health concern and health goals of your selected group. How would you set goals for the session, evaluate session outcomes, and suggest possible revisions to improve future sessions?
    Please be advised that there are attachments which detail the criteria and instructions for this assignment
    any questions please reach out

  • “Preventing Plagiarism: Properly Citing Online Sources in Academic Writing”

    18% of this paper can be found online and is not in quotation marks. Check the sources and make sure that every word that comes straight from the text is in quotes. Otherwise, this is plagiarism and will get a zero on the final. The proper nouns and dates cannot be changed and do not count as plagiarism- but all the other phrases need to be in quotes, or the words need to be changed.

  • The Most Pressing Problems in the U.S. and the Middle East: A Policy Analysis and Assessment Introduction: The relationship between the United States and the Middle East has been complex and multifaceted, with a long history of political, economic

    We have now had several modules about the “U.S. and the Middle East” Topic. What are the three most important problems that face the community of nations in the region concerning this, in your best reasoned judgment? Rank the three problems in order of importance from first most important to third in a clear way, citing both relevant factual information and your own arguments to show their relative importance. Also, describe what is the policy of the U.S. (and its allies) toward these problems, and give an assessment of how successful it is at present, and has been in the past decade or so, in addressing each of these problems. You should clearly draw upon all the assigned materials (e.g. readings, discussion forum posts by students and instructor, etc.) that are relevant to your points. You need not use any non-assigned sources, but if you do, you must cite them thoroughly, including authors, titles, publication information, Urls, and pages (as relevant), indicating also where you use them in your essay, according to accepted academic principles of citation.

  • “Securing Wireless and Mobile Technologies: Identifying Vulnerabilities and Mitigating Threats for Alliah Company” Title: Mitigating WLAN and Mobile Vulnerabilities for Small Businesses: A Case Study of Alliah’s Company

    As wireless and mobile technologies continue to grow in presence and popularity, the world is becoming more and more connected. Unfortunately, this also means that devices and networks are becoming more and more vulnerable to outside threats. Businesses must identify and mitigate these vulnerabilities and threats in order to protect employees’ personal information and ensure the organization is secure from passive leaking of proprietary information.
    In this task you will assume the role of an IT professional who is responsible for identifying wireless and mobile vulnerabilities, as outlined in the scenario below. You will then present your findings and recommend solutions to mitigate these risks and prevent future threats.
    SCENARIO
    You are a network professional on the IT team at Alliah Company, a new but fast-growing social media provider. One year ago, Alliah launched a social media website aimed at young professionals. The company also released a mobile app for accessing the site from cellular devices. Alliah was able to launch its website with money generated by a crowd-funded campaign, but most of the funds were spent on the site and app development, with relatively little money (and time) devoted to the internal office network infrastructure.
    Alliah has 35 full-time employees, all of whom have offices or shared work spaces in a three-story building that serves as the company headquarters. The building is an old warehouse that was converted for office use and is approximately 10,000 square feet. Currently, the employees occupy only two floors; the third floor is vacant and available for expansion.
    The Alliah WLAN has a gigabit managed switch, a multiservice wireless LAN controller, and seven wireless access points strategically located to provide coverage to office staff. One access point services a large back patio area for employee use. The network is protected by a firewall. The Alliah website servers are located in a data center 100 miles from Alliah headquarters.
    Five employees are account representatives who are on the road at least 80 percent of the time, and each rep has a company-issued laptop, tablet, and smartphone. They use a large, shared office in the headquarters building when they are not traveling.
    Employees use company-owned computers that connect to the WLAN, and, in an effort to control costs during the launch, Alliah has a bring your own device (BYOD) policy.
    The IT staff consists of five employees; three are devoted to website maintenance, one manages the headquarters’ computers and network, and another employee assists with the website and the office network. IT staff uses wired Ethernet connections to remotely access the website servers.
    The Alliah website is successful, attracting more and more visitors each month. Jennifer, the CEO, anticipates hiring more employees and is considering a strategy that would take the company public within a few years. In preparation, she wants to ensure that Alliah’s wireless networking infrastructure is highly secure, especially because it may need to grow quickly in a short period of time, and she wants to understand the security risks the company faces. She also wants to decide if Alliah should continue allowing BYOD or restrict network access to company-owned devices only, or if a compromise solution is available.
    REQUIREMENTS
    Your submission must be your original work. No more than a combined total of 30% of the submission and no more than a 10% match to any one individual source can be directly quoted or closely paraphrased from sources, even if cited correctly. An originality report is provided when you submit your task that can be used as a guide.
    You must use the rubric to direct the creation of your submission because it provides detailed criteria that will be used to evaluate your work. Each requirement below may be evaluated by more than one rubric aspect. The rubric aspect titles may contain hyperlinks to relevant portions of the course.
    A.  Describe two WLAN vulnerabilities that present risks for Alliah, based on the details in the scenario.
    B.  Describe two mobile vulnerabilities that present risks for Alliah, based on the details in the scenario.
    C.  Summarize the steps for mitigating each  identified WLAN and mobile vulnerability, including the specific tools or documentation that will be needed for mitigation.
    D.  Recommend preventive measures to maintain the security posture of WLAN and mobile environments in a small business, such as Alliah. Reference federal, state, or industry regulations that justify these measures.
    E.  Recommend a solution for the company’s BYOD approach, including research to justify your recommendation.
    F.  Acknowledge sources, using in-text citations and references, for content that is quoted, paraphrased, or summarized.
    G.  Demonstrate professional communication in the content and presentation of your submission.

  • Title: Analyzing a News Article Using Concepts from the Course

    Project Overview:
    As the submission deadline for the project approaches, please find the detailed guidelines below. This individual project requires you to analyze a news article in relation to the concepts learned in this course.
    Objective:
    The goal of this project is to explain and analyze the main points of a chosen news article using one or more concepts developed throughout the semester.
    Instructions:
    Article Selection:
    Choose a news article from any reputable news source (e.g., The Economist, Wall Street Journal, NY Times).
    Ensure the article pertains to topics discussed in this course and is no older than two years.
    Analysis:
    Discuss the main points presented in the article.
    Illustrate these points using one or more concepts learned in class.
    Submission Requirements:
    Length:
    Your submission should be a minimum of 3 pages and a maximum of 5 pages of text.
    Format:
    Use 12-point Times New Roman font.
    Apply 1.5 line spacing.
    Set 1-inch margins on all sides.
    Submit your work in Word or PDF
    Bibliography:
    A bibliography should include all the sources you referenced in your project. This typically consists of books, journal articles, newspaper or magazine articles, websites, and any other relevant documents. Each entry should provide enough detail for readers to locate the source themselves. 
    Bibliography does not count towards the 3-page minimum.
    Appendix:
    If applicable, include tables, statistics, or graphs in an appendix, which also does not count towards the 3-page minimum.
    Submission Details:
    Deadline:
    June 17 by 11:59 PM EST.
    Submission Method:
    Only submissions via Canvas will be accepted. Please do not email your work.
    Attempts:
    You will have only one attempt to submit your work.
    Ensure you follow these guidelines closely to meet the project requirements. Please note – Your project will be checked for plagiarism using a detection service. Good luck!
    I do not know how many references I need but please try to add a few to the references page which does not count in the page count. Make sure you add some quotations with in text citations. Thank you!