Monthly Archives: February 2017
MKT 402 – Market Pricing “ Week 7 ” Discussion Question 1:
MKT 402 – Market Pricing “ Week 7 ” Discussion Question 1:
“Understanding Costs” Please respond to the following:
- Compare incremental costs and avoidable costs. Incorporate the impact each has on prices in your response. Provide specific examples to support your comparison.
- Evaluate the best way for a small business (e.g., a dry cleaner, local café, housekeeping services) to handle a noticeable cost increase from a supplier, such as higher delivery costs due to an increase in fuel.
Psychological Disorders Of Childhood And Adolescence Are Organized Into Various Categories
Psychological disorders of childhood and adolescence are organized into various categories. One of these categories is emotional disorders. This category includes mood-related, depressive, and anxiety-related disorder. Please review four cases studies related to emotional disorders
Then, complete the following: Case
- Analyze the cases described in the provided document carefully, with a focus on the symptoms demonstrated by each child or adolescent.
- Select two cases from the list in the document.
- Identify which emotional disorder is the most likely diagnosis for each case you have selected. The list of possible disorders is below:
◦ Major depressive disorder
◦ Bipolar disorder
◦ Generalized anxiety disorder
◦ Posttraumatic stress disorder (PTSD)
◦ Separation anxiety disorder
◦ Panic disorder
- Do the following to explain your chosen diagnoses:
◦ Describe each chosen diagnosis by listing the symptoms and criteria required for that diagnosis and possible causes of that diagnosis.
◦ Evaluate how the selected cases illustrate those criteria and why that individual has developed that disorder.
Write your initial response in 350–500 words. Apply APA standards to citation of sources, including in-text citations and full references. Incorporate information from at least two academic sources to support your statements or ideas. Academic sources could include your textbook, required readings for this module, academic journal articles found in the AU online library, and the American Psychiatric Association Web site at the following:
- American Psychiatric Association. (2014). Mental health. Retrieved from: http://www.psychiatry.org/mental-health
By Saturday, February 18, 2017, post your response to the appropriate Discussion Area.
- Explain whether you agree with the peers’ analysis of the cases and recommendations for treatment. Provide reasons in support of your comments.
- Share additional information learned about the selected diagnosis while conducting the research.
- Provide interesting resources, Web sites, or references for academic research articles you found during your research. Summarize the researched information for your peers.
4 Emotional Disorders: Case Studies
Case A
Charlie is a four-year-old Caucasian boy. His mother had hoped to enroll him in preschool this year, but when she attempted to leave him at the school for the morning classes, he panicked and threw tantrums. He clung to her, screaming until she was able to comfort him by taking him out of the school building with her. Until this time, Charlie has spent brief periods of time under others’ care while his mother ran errands or visited with friends. He tended to become upset as she left the home on these occasions, as well. He does not usually throw tantrums; the tantrums seem to occur only when he anticipates being left by his mother at school.
Case B
Nyah is an eleven-year-old African-American girl beginning middle school. In August, just before school began, she started having difficulties sleeping at night. She reported to her parents that she was worrying about school—she was worrying about being assigned more homework and anticipating difficulties with making friends. She had also been biting her fingernails. Her parents describe Nyah as intelligent, hardworking, conscientious, and prone to worry. Apparently, she has always had more worries than other children. When her parents argue, she worries they will divorce. When her friends do not answer her calls, she worries that they are rejecting her. Throughout elementary school, she often feared that she would fail her spelling tests or math exams, despite regularly receiving strong grades.
Case C
Sindhu is a sixteen-year-old Indian-American girl. Her parents and friends describe her as quite serious most of the time and often sad. She is extremely talented in art; she paints and draws so well that she has been recommended to participate in the countywide gifted-and-talented art class every year since elementary school. She seems to express deep, intense emotions in her artwork. Her mother became quite concerned recently when she heard Sindhu tell a friend that “life is too hard,” and that she “can’t imagine how she will make it in college.” Her best friend admits that lately, Sindhu seems more sad, more tearful, and preoccupied with dark subjects of conversation, such as tragedy, war, and death. When Sindhu’s grades began to decline and she seemed increasingly sad, unmotivated, and lethargic, her parents sought help for her.
Case D
Asia is an eight-year-old Korean-American girl who has been having difficulty falling asleep. Once she falls asleep, she often wakes screaming from nightmares. At times, Asia seems quite distracted. When she is distracted, she seems fearful. Her mother reports that Asia describes fearful daydreams and memories related to a recent car accident the family experienced. The accident had been serious; a passenger in the other car was killed. Although Asia did not witness the death, she is haunted by the impact and events after the accident. The themes in her play are related to fear, accidents, sirens, and hospitals. Her parents report that Asia has only had the impaired sleep, fearfulness, and distraction since the accident; she did not have these symptoms prior to the accident.
Week 3 Assignment;
Assignment 2: LASA 1: Case Study of Behavioral Disorders
In this assignment, you will analyze a fictional scenario and identify the possible disorders involved. All the information needed for this assignment can be found in the textbook. Review the following vignettes:
Behavioral Disorder—Male VignetteJoe, a thirteen-year-old Asian-American boy, is enrolled in ninth grade at a public high school located in the inner city of a large metropolitan area. Since kindergarten, his teachers have reported increasing levels of concern about his behavior. In elementary school, he was described by his teachers as immature and argumentative with authority figures. In middle school, his behavior escalated to include verbal and physical aggression toward classmates.
Recent reports indicate that he disrupts the classroom often by arguing with his teacher, talking excessively and loudly, and disobeying classroom rules. During breaks or when outside the classroom, Joe associates with a group of boys who tend to get into trouble. He tends to become angry often and easily and has gotten into many fights. Some of his classmates have reported that Joe has threatened them. He does not seem to feel guilty when he gets into trouble. He rarely finishes his schoolwork and is getting poor grades. Beginning this year, Joe’s teacher has reported that he seems easily distracted. Testing completed by the school psychologist indicates that Joe is intelligent and creative. Results do not support the presence of a learning disability or a developmental disability. The school psychologist indicates that Joe lacks sufficient motivation or desire to complete his work thoroughly or carefully. Joe’s parents report that he refuses to follow rules at home, is often angry, and tends to blame his siblings when he gets into trouble. Behavioral Disorder—Female Vignette Maria is an eight-year-old daughter of Mexican-American parents who recently immigrated to the United States. They speak some English, and Maria is fluent in both English and Spanish. She is enrolled in third grade at the local public elementary school. Since second grade, her parents have reported concerns about her difficulty in paying attention or maintaining her concentration. They indicate that she has significant difficulty in completing her homework because she daydreams and is easily distracted by sounds and activities in the home. Maria has the same problem in the classroom, so she often has to bring unfinished classroom work home to complete. Maria gets frustrated at school and during homework time, often stating that she “can’t do” the work and referring to herself as “dumb” or “not smart enough.” Maria’s frustration with her schoolwork has led to some irritability lately, as well as some desire to avoid school. She tends to have more of a temper at home recently and expresses hopelessness at times. She is most content playing soccer or video games. She tends to concentrate very well during those activities. Standardized testing completed by all children in the third grade indicates that Maria is of average intelligence. Screening by the school psychologist indicated that she most likely does not have a learning disability. |
Select one of the above vignettes and analyze it in the following manner:
- Identify and describe two possible behavioral disorders one might consider as DSM diagnoses. Make sure you support those choices with specific symptoms observed in the vignettes.
- Compare and contrast the two diagnoses and select one that you consider as the most appropriate DSM diagnosis. Explain why one is more likely than the other.
- After reviewing recent research studies, readings in your textbook, and other academic sources, provide a thorough description of the following:
◦ The symptoms required for a diagnosis of that disorder
◦ At least two possible causes of that disorder, incorporating at least one developmental factor and at least one multicultural factor that may be involved in the cause(s) of the disorder
◦ At least three of the most effective treatments available for that disorder
◦ At least one controversy, cultural bias, or ethical issue related to treatments available for that disorder
◦ At least one controversy, cultural bias, or ethical issue related to the practice of diagnosis or “labeling” children, in general
Write an 8–10-page paper in Word format. Add an APA style title page and references page and cite your sources according to current APA standards. Cite information from at least two academic sources to support your ideas. These may include your textbook, and/or peer-reviewed research articles from the AUO library.
Make sure you write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources, and display accurate spelling, grammar, and punctuation.
Use the following file naming convention: LastnameFirstInitial_M3_A2.doc.
Assume That The Low-Calorie Frozen, Microwavable Food Company From Assignments 1 And 2 Wants To Expand And Has To Make Some Long-Term Capital Budgeting Decisions
Assume that the low-calorie frozen, microwavable food company from Assignments 1 and 2 wants to expand and has to make some long-term capital budgeting decisions. The company is currently facing increases in the costs of major ingredients.
Use the Internet and Strayer databases to research government policies and regulation.
Write a six to eight (6-8) page paper in which you:
Outline a plan that managers in the low-calorie, frozen microwaveable food company could follow in anticipation of raising prices when selecting pricing strategies for making their products response to a change in price less elastic. Provide a rationale for your response. Examine the major effects that government policies have on production and employment. Predict the potential effects that government policies could have on your company. Determine whether or not government regulation to ensure fairness in the low-calorie, frozen microwavable food industry is needed. Cite the major reasons for government involvement in a market economy. Provide two (2) examples of government involvement in a similar market economy to support your response. Examine the major complexities that would arise under expansion via capital projects. Propose key actions that the company could take in order to prevent or address these complexities. Suggest the substantive manner in which the company could create a convergence between the interests of stockholders and managers. Indicate the most likely impact to profitability of such a convergence. Provide two (2) examples of instances that support your response. Use at least five (5) quality academic resources in this assignment. Note: Wikipedia does not qualify as an academic resource. Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:
Propose how differences in demand and elasticity lead managers to develop various pricing strategies. Analyze the economic impact of contracting, governance and organizational form within organizations. Use technology and information resources to research issues in managerial economics and globalization. Write clearly and concisely about managerial economics and globalization using proper writing mechanics.
Compare The Main Strengths And Weaknesses Of The Gantt Chart And PERT For Project Management,
.Compare the main strengths and weaknesses of the Gantt chart and PERT for project management, and give your opinion on which you believe is the most effective for project management.
2.Diagnose the key factors which can influence the riskiness of projects (investments) in health care organizations. Justify your response.
Share this:
Introduction: Linux Is Open Source Operating System That Will Keep Running On Parts And Heaps Of Diverse Hardware, Including Most Machines That Windows XP Will Still Work
Introduction: Linux is open source operating system that will keep running on parts and heaps of diverse hardware, including most machines that Windows XP will still work. It cannot run any Windows programs without virtual machines. So Windows virus can’t influence it in the scarcest. Most distros of Linux have free firewall programming, and are effortlessly overhauled with free fixes for security. Furthermore, when another version of distributions will turn out, its upgrades will totally be free. We can likewise expect heaps of free software to supplant the larger part of what we may have been paying for on Windows. In any case, following a large portion of it is finished by specialists, open source gatherings, and small software organizations; a number of the most major projects like (Microsoft Office, Adobe Photoshop etc.) will not have local Linux forms. On the other hand, free versions of the programs such as Libre Office or GIMP, can satisfy their part well, if not flawlessly.
Notwithstanding this, numerous distros have taken awesome steps to be easier to understand than past ones, so we can expect a superior affair than could have even a couple short years back. While it’s not Windows, it is secure, free, and an extraordinary approach to peruse and appreciate the web practically inconvenience free. Multitasking comparison between Ubuntu and Windows XP is shown below: [1]
Linux Distribution: Linux based PCs machines have an improved client interface and require the same or less equipment strength than Windows XP. Furthermore, they are much less expensive, both for equipment and programming reasons. The Linux interface can be redone, and each organization offering a Linux based machine modifies the look and feel. Some go for straightforwardness trusting the machine can be utilized by youngsters and non-techies.
Ubuntu 15.04 is a complete OS and can be utilized generally as Canonical has proposed, however some exceptionally intriguing alternatives and elements are covered up inside the OS and mostly not available, unless we install more applications. Ubuntu is for the most part an exceptionally adjustable OS and various changes can be made, however huge numbers of these alternatives are not open as a matter of course and clients need to introduce no less than a few applications. Ubuntu gives a strong, all around kept up programming construct that functions admirably with respect to installed hardwares, and its Live bootable CD is a breeze to get up and start running. Consolidate that with Ubuntu’s loaded Software Center—which highlights a single tick application introduces and it’s a self-evident, simple answer for moving XP evacuees.[2]
Hardware Specification: The system requirement for the installation of Ubuntu 15.4 is as following:
- Processor: 1 GHz processor or better.
- RAM: 1.5 GB RAM (system memory).
- Hard disk: 7 GB of free hard drive space for installation.
As this is the minimum requirement for installing Ubuntu 15.4, therefore the existing computer hardware can be used for Linux. [3]
Migration from Windows XP to Ubuntu: Up gradation to another OS is very good change. Up gradation will be less demanding than we might suspect – and in the event that we change to a Linux distribution. We’ll delineate that it is so natural to move an old XP PC over to the most recent adaptation of the easy to use Ubuntu Linux OS – and propose which projects to use in Linux for the regular undertakings.
Accepting Ubuntu is suitable for us, the easiest approach to approach the upgrade is too situated up a dual boot system, leaving XP in place. We don’t prescribe that we make a propensity for booting up our old Windows XP establishment, since this will open to security dangers. Be that as it may, we’ll have the capacity to specifically get to every one of Windows organizers inside Ubuntu, so doing it along these lines implies we won’t need to stress over losing any individual information in switching. The major problem with Ubuntu is if some assignment could not be possible in Ubuntu (or on another PC).
Since XP and Ubuntu will both need to crush onto the hard disk, we prescribe having a somewhat of an unmistakable out to make space for the Ubuntu. We can utilize the Windows Disk Cleanup apparatus to evacuate unneeded interim documents and uninstall any undesirable vast applications. This is likewise a decent time to dispose of any substantial individual documents we needn’t bother with: utilize a device, for example, WinDirStat to recognize what’s gobbling up the most space on our circle. Bear in mind that Recycle Bin should be empty when we’re done. On the off chance that we can’t free up more than 10GB, consider wiping Windows installation to give Ubuntu space. This is anything but difficult to do amid the establishment process, yet in the event that we plan to take this course, go down our records to an outer circle first – and be extremely watchful not to miss any. [4]
Installation Options: The general technique to introduce Ubuntu (or Ubuntu flavor, Kubuntu, Lubuntu) from a USB flash drive is:
- Obtain the right Ubuntu establishment records (‘the ISO’).
- Put Ubuntu onto USB flash drive.
- Design our PC to boot initially from USB drive and start the system from it.
- Attempt Ubuntu (Kubuntu, Lubuntu) before introducing it
- Install Ubuntu to the internal hard drive.
Ubuntu can be introduced from a USB flash drive. This may be important for netbooks and different PCs without CD drives and is helpful for others on the grounds that a USB flash drive is so advantageous. Likewise, we can design Ubuntu on the USB flash drive to spare changes we make that is dissimilar to a read-just CD-ROM. To boot the system from a USB flash drive made with usb-maker false name Startup Disk Creator and mkusb will carry on generally as though we had booted from the introduce CD. It will demonstrate the dialect choice and afterward the introduce menu, from which we can introduce Ubuntu onto the PC’s hard drive or dispatch the LiveCD environment. Different utilities, e.g. Unetbootin, may make somewhat distinctive boot drives or if on UEFI may not work at all with Debian iso file because of a bug.
Requirements: 1. A 2 GB USB streak gadget/drive/stick. On the off chance that the iso document size is very small than 1 GB, it is required to utilize a 1 GB USB drive to all systems. Files on this USB drive would be eradicated, so reinforce the files which we need to keep before making the drive bootable. Verify this USB drive and mount it. A Ubuntu flavor ISO record
Installation Options: Uproot all USB drives which are no longer required, yet keep the network cable joined. Insert the bootable drive that simply made in objective PC and then restart it again. More current PCs can boot from a USB drive. On the off chance if PC doesn’t naturally do as such then we need to alter the BIOS settings.
Restart the PC, and look for a message letting us know which key should be pressed to enter the BIOS settings. Press the required function keys while PC is booting to alter BIOS settings.
As opposed to altering BIOS settings, pick a boot device from the boot menu in BIOS settings. Now, press the function key to enter the boot menu when PC is booting. The boot screen shows which key have to be pressed. It can be F12 or F10. Note: some exceptions are there. There are some motherboards where we need to choose ‘hard plate/USB-HDD0’ to pick the USB flash disk. It may work like this on the grounds that the system sees the USB drive ‘a mass stockpiling gadget’ as a hard disk drive, and it ought to be at the highest point of the boot request rundown. So we have to alter the Boot Order. Move this to the highest priority on the rundown to make the PC endeavor to boot from the USB gadget before booting from the hard disk. [5]
Steps By which users can Logon to the System:
- During the installation of Ubuntu OS, the installer will check the installation CD or USB, hardware, and will configure the network with DHCP if there is a DHCP server in the network.
- Then enter the hostname of the computer. eg, if our server name is server1.example.com, so we will enterserver1.example.com as server name.
- Linux Ubuntu will not let us login as root user directly. Therefor we need to create a new user for the initial login of OS. Hence, we will create a user with the name Administratorand username administrator (don’t ever use the username as admin because admin is reserve word in Ubuntu Linux). [6]
Configuring IP Address to the System: The setup of TCP/IP arrange on the Linux system is actualized utilizing a set of network configuration files. A significant number of these files can be overseen utilizing system instruments like NetworkManager which is on desktop. We can likewise utilize more specific projects, for example, netstat, ifconfig, Wireshark and course. Some setup records are anything but difficult to change ourselves by utilizing the tool. The ifconfig utility guides us to design the system interfaces which may include new ones and changing others. The ifconfig and course utilities are lower level projects that require more particular information of the system to utilize viably. The netstat utility guides us with data about the status of our system associations. Wireshark is a system convention analyzer that lets us to catch bundles as they are transmitted over the system, selecting those we need to check.
For provisional system arrangements, we can utilize standard commands like ip, ifconfig and route etc, which are additionally found on most other GNU/Linux Operating systems. These charges permit to design settings which produce results quickly; nonetheless they are not determined and will be lost after a reboot. To configure our server to utilize DHCP for dynamic address task, add the dhcp strategy to the inet address family explanation for the proper interface in the file /etc/network/interfaces. To configure the system to utilize a static IP address task, we can add static strategy to the inet address family explanation for the suitable interface in the file /etc/network/interfaces. The illustration underneath expect we are designing our first Ethernet interface distinguished as eth0. Change the location, netmask, and passage qualities to meet the prerequisites of our network. [7]
Accessing DNS: DNS (domain name system)’ server handles the undertaking of gazing upward the real numerical IP address of the URLs that we are attempting to get to and along these lines it join. Annoyingly it is this which can frequently end up being the worst thing about our web presence. Case in point, our default DNS server is given by ISP and in the event that it turns out to be moderate then time it takes to “determine” the web location we’re attempting to get to will effect on the general stacking time of the site. The progressions for getting to DNS are as taking after:
- Right-tap on ‘Network Icon’ (situated at upper right board naturally) and tap on ‘Edit Connections’ to open Network Connections Manager
- Pick the kind of connection we have. As I interface through Wi-Fi my screenshots allude to show “Remote” however the dialog for “Wired” connections have the same choices required for this in the same spots.
- Under “Remote” or “Wired” highlight the association we utilize and tap on ‘Edit’.
- Inside the altering window that opens tap on the ‘IPv4 Settings’ tab
- Under ‘IPv4 Settings’, change the “Strategy” to ‘Programmed (DHCP) addresses just’
6 put any name server addresses as ‘DNS Servers’
- Click “OK” and reboot. [8]
Accessing Shared Files: We can let other individuals view and control our desktop from another PC with a desktop seeing application. Configure Desktop Sharing to permit others to get to our desktop and set the security inclinations. In the Dash, open Desktop Sharing. To give others a chance to view our desktop, select Allow different users to view the desktop. This implies that other individuals will have the capacity to endeavor to unite with our PC and perspective what’s on our screen. To give others a chance to interact with our desktop, select Allow different users to control the desktop. This may permit the other individual to move our mouse, run applications, and scan records on our PC, contingent upon the security settings which we are at present utilizing.
We can join with a server or network offer to peruse and perspective records on that server, precisely as though they were all alone PC. This is a helpful approach to download or transfer documents on the web, or to share files to other individuals on the nearest system. In order to search the records over the system we can open the Files application from the Dash, and snap Browse Network in the sidebar. The file manager will discover any PCs on our neighborhood that promote their capacity to serve documents. In the event that we need to interface with a server on the web, or in the event that we don’t see the PC that we’re searching for, then we should physically join with a server by writing in its web/network address. [9]
Securely Sharing Files: 1. To begin, right-click on the folder we need to share and pick the “Neighborhood Network Share” option. In the event that we don’t see this choice, look for and introduce nautilus-share in Ubuntu Software Center and restart Nautilus by running nautilus -q or simply log out and back in.
- At the point when the ‘File Sharing’ dialog opens, tap the crate to empower ‘Share this Folder’ choice. Click the “Install service” catch in the event that it asks. Once the installation procedure completes, log out and back in.
- Re-do step 1 to open the ‘File Sharing’ dialog for any folder. Relies on upon our need, empower compose consent and/or estimate access. Share folder
- In the event that we need client machines to get to this offer with a username and password. Then disable Guest access and start the following steps:
- Hunt down and install system config-samba in Ubuntu Software Center.
- Begin Samba (graphical apparatus) from the Dash or menu.
- Explore to menu Preferences -> Samba Users
- Click ‘Include User’ in next window and afterward select our username, sort in a Windows username and password.
- At last we can get to this organizer in a nearby system machine utilizing the username and password. [10]
Printing: Verify the printer is turned on. Connect the printer to our system by means of the proper link. We may see action on the screen as the system hunt down drivers, and we may be requested that confirm to introduce them. A message will show up when the system is done introducing the printer. Select Print Test Page to print a test page, or Options to roll out extra improvements in the printer setup. In the event that our printer was not situated up naturally, we can include it in the printer settings. Click the symbol at the most distant right of the menu bar and select System Settings. Open Printers. Snap Add and select the printer from the Devices window. Click forward and sit tight while it searches drivers. We can tweak the printer’s name, portrayal, and area in the event that we like. At the point when completed, snap Apply. We can now print a test page or snap Cancel to skip the step. [11]
Data Encryption: It is unequivocally suggested that we encrypt our swap space. Clients introducing from Ubuntu 15.6 and selecting the Encrypted Home choice will consequently have encrypted swap space. Different clients can run sudo ecryptfs-setup-swap. This is critically essential, on the grounds that our home catalog information will show up as clear text in the memory, as the kernel peruses the encrypted information. On the off chance that the kernel swaps this information to circle, it could possibly release our decoded information back, absolutely that crush our Encrypted Home. Encoded Swap tackles this issue.
Hibernation won’t work. Really, hibernation will work fine and dandy. In any case, we can’t continue. There are courses around this, however it includes picking a watchword to use for our swap encryption, and entering that secret word each time we boot our framework, and offering that secret word to any other person that may need to resume the system. [12]
Conclusion: This isn’t fundamentally a feedback of the stage overall. Ubuntu is as competent and available as it ever seemed to be, and pretty much as free. However, it’s hard not to feel a touch of disappointment at the obvious absence of advancement on show, particularly in light of the considerable number of aspiring talk that has been leaving Canonical in the previous years. Initially Ubuntu might be utilizing the fresh out of the box new touch-accommodating Unity 8 desktop at this point, running on Canonicals’ home-developed Mir server. Be that as it may, long postpones have deserted both overhauls years plan; the new front-end isn’t presently anticipated that would be appropriately prepared for a steady desktop.
References
- Introduction – Why Linux is good platform? [ONLINE] Available at –http://www.howtogeek.com/96541/the-painless-way-to-ditch-your-old-windows-xp-for-a-more-secure-linux/ [Accessed on – 1st July 2015]
- Linux Distribution – Which Linux distribution is good for migration? [ONLINE] Available at –https://www.linux.com/news/software/applications/825906-hidden-options-in-ubuntu-1504-can-make-it-much-better [Accessed on – 1st July 2015]
- Hardware Specification – Which distribution is good for enterprise? [ONLINE] Available at –https://wiki.ubuntu.com/VividVervet/ReleaseNotes/UbuntuGNOME [Accessed on – 1st July 2015]
- Migration from Windows XP to Ubuntu – How to migrate from Windows XP to Ubuntu? [ONLINE] Available at – http://www.alphr.com/features/388261/how-to-upgrade-from-windows-xp-to-ubuntu-the-cheapest-way-to-upgrade-from-xp [Accessed on – 1st July 2015]
- Installation Options – How to install Ubuntu into the system? [ONLINE] Available at –https://help.ubuntu.com/community/Installation/FromUSBStick [Accessed on – 1st July 2015]
- Steps By which users can Logon to the System – What are different steps by which user can logon to the Ubuntu System? [ONLINE] Available at –https://www.howtoforge.com/tutorial/ubuntu-15.04-vivid-vervet-server/ [Accessed on – 1st July 2015]
- Configuring IP Address to the System – How to configure IP address to the system? [Book] Available at – Ubuntu 15.04 Server with systemd: Administration and Reference By Richard Petersen [Accessed on – 1stJuly 2015]
- Accessing DNS – How to access DNS server? [ONLINE] Available at –http://www.omgubuntu.co.uk/2010/09/how-to-switch-to-opendns-in-ubuntu-for-faster-browsing [Accessed on – 1st July 2015]
- Accessing Shared Files – How to access shared files? [ONLINE] Available at –https://help.ubuntu.com/stable/ubuntu-help/nautilus-connect.html [Accessed on – 1st July 2015]
- Securely Sharing Files – How user can securely share files in Ubuntu? [ONLINE] Available at –http://ubuntuhandbook.org/index.php/2015/02/share-a-folder-in-ubuntu-14-04/ [Accessed on – 1st July 2015]
- Printing – How printer can be installed in Ubuntu system? [ONLINE] Available at –https://help.ubuntu.com/stable/ubuntu-help/printing-setup.html [Accessed on – 1st July 2015]
- Data Encryption- How data can be encrypted? [ONLINE] Available at –https://help.ubuntu.com/community/EncryptedHome [Accessed on – 1st July 2015]
Share this:
Write A 1,400- To 1,750-Word Paper That Integrates And Synthesizes The Key Concepts, Thoughts, And Ideas Of The Key Theorists And Experts Regarding The Future Of Teaming And The Technology Drivers Of Team Performance. Discuss The Following Points In Your Paper
Write a 1,400- to 1,750-word paper that integrates and synthesizes the key concepts, thoughts, and ideas of the key theorists and experts regarding the future of teaming and the technology drivers of team performance. Discuss the following points in your paper:
Compare and contrast the major theorists and their theories regarding agility and speed on how teams and teaming must support decision making across organizational boundaries in the future
Examine the risks and uncertainties that teams will face as databases become more ubiquitous and the tools to access them become available on a wide and global scale
Assess collaboration and corroboration strategies and approaches for teaming (such as using global alliance and teaming) strategies to ameliorate risk and reduce the uncertainties from possible technological disruption due to revolutionary advancements
Include a problem and purpose statement regarding one topic for future dissertation research.
Consider including a chart to summarize the differences and similarities among the theorists and their ideas and thoughts.
Include at least six references to support your position.
Format your paper according to APA guidelines.
Assignment 3: Legal Ethics, Patients’ Rights, And HIV / AIDS
As the head health care administrator at USA Community Hospital, you are required to review compliance reports on issues relating to the ethical conduct of the professional staff at your hospital, patient review registries, and standard procedures surrounding the ethical treatment of patients with HIV / AIDS. Intermittently, complaints surface from patients with HIV / AIDS concerned with ethical treatment and denial of services.
Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.
Write a six to eight (6-8) page paper in which you:
1.Devise a plan to investigate the validity of patients’ claims of denial of services. This plan should include, but not be limited to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures. 2.Analyze the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Justify your position. 3.Formulate a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients. 4.Devise a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted. 5.Use at least five (5) quality academic resources in this assignment. Note: Wikipedia and other Websites do not quality as academic resources. Your assignment must follow these formatting requirements:
•Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. •Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:
•Examine the various applications of the law within the health care system. •Identify the principles and legalities of ethical issues within the health care system. •Identify a plan that addresses legal and ethical issues in a health care policy. •Use technology and information resources to research issues in health care policy, law, and ethics. •Write clearly and concisely about health care policy, law, and ethics using proper writing mechanics.
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Points: 200 | Assignment 3: Legal Ethics, Patients’ Rights, and HIV / AIDS | |||
Criteria | UnacceptableBelow 70% F | Fair70-79% C | Proficient80-89% B | Exemplary90-100% A |
1. Devise a plan to investigate the validity of patients’ claims of denial of services. This plan should include, but not be limited to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures.Weight: 20% | Did not submit or incompletely devised a plan to investigate the validity of patients’ claims of denial of services. Did not submit or incompletely included, but did not limit to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures. | Partially devised a plan to investigate the validity of patients’ claims of denial of services. Partially included, but did not limit to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures. | Satisfactorily devised a plan to investigate the validity of patients’ claims of denial of services. Satisfactorily included, but did not limit to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures. | Thoroughly devised a plan to investigate the validity of patients’ claims of denial of services. Thoroughly included, but did not limit to, establishing mechanisms to address service denial claims, a human resources component, and a review of related policies and procedures. |
2. Analyze the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Justify your position. Weight: 15% |
Did not submit or incompletely analyzed the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Did not submit or incompletely justified your position. | Partially analyzed the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Partially justified your position. | Satisfactorily analyzed the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Satisfactorily justified your position. | Thoroughly analyzed the primary way in which different staffing levels may play pivotal roles in upholding ethical conduct, including treating patients with dignity. Thoroughly justified your position. |
3. Formulate a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients.Weight: 20% | Did not submit or incompletely formulated a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients. | Partially formulated a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients. | Satisfactorily formulated a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients. | Thoroughly formulated a plan to relate the primary legal ramifications to the professional staff regarding ethical treatment of the hospital’s HIV / AIDS patients. |
4. Devise a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted.Weight: 20% | Did not submit or incompletely devised a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted. | Partially devised a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted. | Satisfactorily devised a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted. | Thoroughly devised a community relations plan that tout’s the hospital’s unique ways of serving persons with HIV / AIDS, including a focus on de-stigmatizing those afflicted. |
5. 5 referencesWeight: 5% | No references provided | Does not meet the required number of references; some or all references poor quality choices. | Meets number of required references; all references high quality choices. | Exceeds number of required references; all references high quality choices. |
6. Writing Mechanics, Grammar, and FormattingWeight: 5% | Serious and persistent errors in grammar, spelling, punctuation, or formatting. | Partially free of errors in grammar, spelling, punctuation, or formatting. | Mostly free of errors in grammar, spelling, punctuation, or formatting. | Error free or almost error free grammar, spelling, punctuation, or formatting. |
7. Appropriate use of APA in-text citations and reference sectionWeight: 5% | Lack of in-text citations and / or lack of reference section. | In-text citations and references are provided, but they are only partially formatted correctly in APA style. | Most in-text citations and references are provided, and they are generally formatted correctly in APA style. | In-text citations and references are error free or almost error free and consistently formatted correctly in APA style. |
8. Information Literacy / Integration of SourcesWeight: 5% | Serious errors in the integration of sources, such as intentional or accidental plagiarism, or failure to use in-text citations. | Sources are partially integrated using effective techniques of quoting, paraphrasing, and summarizing. | Sources are mostly integrated using effective techniques of quoting, paraphrasing, and summarizing. | Sources are consistently integrated using effective techniques of quoting, paraphrasing, and summarizing. |
9. Clarity and Coherence of WritingWeight: 5% | Information is confusing to the reader and fails to include reasons and evidence that logically support ideas. | Information is partially clear with minimal reasons and evidence that logically support ideas. | Information is mostly clear and generally supported with reasons and evidence that logically support ideas. | Information is provided in a clear, coherent, and consistent manner with reasons and evidence that logically support ideas. |
Do you want a similar Paper? Click Here To Get It From Our Writing Experts At A Reasonable Price.
This Assignment Consists Of Four (4) Sections: An Internal IT Audit Policy, A Management Plan, A Project Plan, And A Disaster Recovery Plan
This assignment consists of four (4) sections: an internal IT audit policy, a management plan, a project plan, and a disaster recovery plan. You must submit all four (4) sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and /or assume all necessary assumptions needed for the completion of this assignment.
Imagine you are an Information Security Manager for a large national retailer. You have been hired to be directly responsible for the planning and oversight of IT audits. At the request of the Board of Directors, the CEO has tasked you with developing a plan for conducting regular audits of the IT infrastructure. The planning and management aspects of IT audit are critical to the overall success of the audit, and as a result, the overall success of the systems implemented within the organization. You must develop a policy for conducting IT audits and develop a project plan for conducting two week IT audits. In addition to the typical networking and Internetworking infrastructure of a medium-sized organization, the organization has the following characteristics:
They have a main office and 268 stores in the U.S. They utilize a cloud computing environment for storage and applications. Their IT infrastructure includes Cisco workgroup and core switches, Cisco routers, Cisco firewalls and intrusion prevention systems, and servers running Microsoft Windows Server 2012. They have over 1000 desktops and approximately 500 organization-owned laptops in the main headquarters. They allow employees to bring their own devices into the organization; however, they are subject to being searched upon entry and exit from the building. They enable remote access to corporate information assets for employees and limited access to extranet resources for contractors and other business partners. They enable wireless access at the main office and the stores. They process an average of 67.2 credit card transactions per hour every day at each location and via their corporate Website. Section 1: Internal IT Audit Policy Write a three to four (3-4) page paper in which you:
1. Develop an Internal IT Audit Policy, which includes at a minimum:
a. Overview b. Scope c. Goals and objectives d. Compliance with applicable laws and regulations e. Management oversight and responsibility f. Areas covered in the IT audits g. Frequency of the audits h. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Section 2: Management Plan Write a four to six (4-6) page paper in which you:
2. Explain the management plan for conducting IT audits, including:
a. Risk management b. System Software and Applications c. Wireless Networking d. Cloud Computing e. Virtualization f. Cybersecurity and Privacy g. BCP and DRP h. Network Security i. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Section 3: Project Plan Use Microsoft Project or an Open Source alternative, such as Open Project to:
3. Develop a project plan which includes the applicable tasks for each of the major areas listed below for each element of the IT audit mentioned above; plan for the audit to be a two (2) week audit.
a. Risk management b. System software and applications c. Wireless networking d. Cloud computing e. Virtualization f. Cybersecurity and privacy g. Network security
Section 4: Disaster Recovery Plan Write a five to seven (5-7) page paper in which you:
4. Develop a disaster recovery plan (DRP) for recovering from a major incident or disaster affecting the organization.
a. The organization must have no data loss. b. The organization must have immediate access to organizational data in the event of a disaster. c. The organization must have critical systems operational within 48 hours. d. Include within the DRP the audit activities needed to ensure that the organization has an effective DRP and will be able to meet the requirements stated above. e. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Respond To Two Or More Of Your Colleagues In One Or More Of The Following Ways:
Respond to two or more of your colleagues in one or more of the following ways:
Share with a colleague an insight you have gained about the importance of a manager being aware of the legal and ethical risks that may occur in the work environment. Share whether you think such awareness could have avoided the ethical dilemma posted by your colleague. Share with a colleague some specific resources you know of that can assist managers in the situation described in his or her original post. Discuss how to access or utilize resources, such as, human resources managers, legal/regulatory departments, or outside assistance.
Ethan:
In a recently published article by Fortune Magazine, Maryam K. explained how Wells Fargo acted unethically, specifically at the management level, to create a number of fake bank accounts with real customer money. When speaking about this specific scandal, Kouchaki states “Instead of a select few employees doing bad things, the unethical behavior was widespread at the bank” (pp. 1). The managers at Wells Fargo elected to turn away from the unethical behavior conducted by their employees, and ultimately took part in the crimes. As a result of the behavior, more than 5,300 Wells Fargo employees were fired. Banaji states “Often, people have difficulty recognizing when they may be compromising their own personal ethics. This does not mean that they are unethical people, per se. Unconscious prejudices and unintended biases can taint a manager’s decisions, choices, and actions to the detriment of employers, employees, partners, and clients (pp. 4). In this case, it does not appear that management unintentionally let this happen, which makes it much worse.
If I were a manager in this type of role, the first order of business would be to weed out those that do not have the companies best interested in mind, find out why and look to create a solution. Bazerman states “the vast majority of managers mean to run ethical organizations, yet corporate corruption is widespread” (pp. 3). I would find a way to single out where the events started from and look to other managers that were deemed to not be involved to utilize their ethical behavior as an example to other potential hires and current staff members. Bazerman states “part of the managerial challenge is that employees and organizations require goals in order to excel” (pp. 6). As manager I would implement some sort of positive goal or incentive program for the employees who work hard to get the organization back to a place of ethical business practices. My one concern as the manager would be to make sure the changes are felt company wide, and that all success would be shared the same way. Banaji states “In business, claiming too much credit can destabilized alliances” (pp. 6). The worst thing you could do is damage the alliances remaining at the company. In business you do develop closer relationships and friendships. Unfortunately, there is the possibility that you would be faced with an ethical dilemma interacting with a friend who is not conducting themselves in the appropriate fashion. As a manger, I would need to set all feelings aside and have a very honest conversation as manager and employee, keeping the emotions out of it. If it were a matter of breaking the law, there is no option for me but to report my manager or my employee to an internal source or external if need be.
References:
Banaji, M. R., Bazerman, M. H., Chugh, D. (2003). How unethical are you? Harvard business review, 81(12), 56-64.
Retrieved from: hbsp.harvard.edu/cmpb/pl/53437748/53439086/1d58d7b32410224ea361be108f0a6556
Bazerman, M., H., & Tenbrunsel, A., E. (2011). Ethical Breakdowns. Harvard Business Review, 89(4), 58-65.
Retrieved from: hbsp.harvard.edu/cmpb/pl/53437748/53438596/9b1c02422819ee41a0f6049d5ce0c500
Kouchaki, M. (2016). How Wells Fargo’s fake account scandal got so bad. Fortune 1-4.
Retrieved From: http://fortune.com/2016/09/15/wells-fargo-scandal/