Author: admin

  • icon Treatments for Gastrointestinal & Endocrine Disorders

    1. Describe diagnostic criteria for nausea and vomiting and treatment recommendations
    2. Discuss symptoms of GERD, complications, and drug management
    3. Compare and contrast Crohn’s disease and Ulcerative colitis
    4. Discuss Diabetes, its causes, symptoms, and treatment
    • APA style with support from at least 2 academic sources.
    • Each question must be answered individually as in bullet points. Not in an essay format.
    • Example: Question 1, followed by the answer to question 1; Question 2, followed by the answer to question 2; and so forth.
  • Letters

    Write two separate letters :

    Letter 1 – Write a FOIA request letter

    Letter 2 – Write Georgia Open Records Request Letter

    I’m going to upload examples of how to complete the letter , you can choose the topic you want to write the letters on. I will also provide the website to help give insight on how to complete the assignment.

    Attached Files (PDF/DOCX): About Your foia assignment.docx, What you need to know before submitting your FOIA and GA requests.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • February Job Log

    Hello,

    This is for a job search for my VA education program. You will be filling out the attached blank form utilizing indeed job search, and any other job platform online. Please fill out all appropriate fields and only include locations and addresses in the United States of America. Do this assignment as though you were personally going to enter the workforce as a Psychology Graduate Student. Also, for your reference see the filled out form that I did for January. You must do 25 job search entries. Start with an early date in February and go chronologically for the whole month of February.

    Attached Files (PDF/DOCX): blank job log document fillable (2) (1).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • CYBERCRIME PAPER Technical, Social, and Legal

    Paper Structure

    Introduction (1/2 – 3/4 page)

    • Hook the reader with a real-world example or statistic about your chosen cybercrime
    • Clearly define the specific form of cybercrime you will analyze
    • Preview the three analytical dimensions (technical, social, legal) that structure the paper
    • End with a thesis statement that frames your argument (e.g., “While [crime] may appear to be purely technical in nature, understanding its prevalence requires attention to the social motivations of offenders and the persistent limitations of legal enforcement mechanisms”)

    Technical Dimension (1 – 2 pages)

    • Explain how the cybercrime is technically executed in clear, non-technical language
    • Describe the tools, vulnerabilities, or techniques involved
    • If applicable, discuss the evolution of the crime (e.g., how techniques have become more or less sophisticated)
    • Avoid overly detailed “how-to” content; focus instead on the strategic aspects of how the crime works
    • Key question to address: What technical factors make this crime possible or attractive to perpetrators?

    Social Dimension (1 – 2 pages)

    • Identify and analyze the motivations, demographics, or social contexts of perpetrators
    • Consider both individual-level factors (psychology, skill, intent) and structural factors (economic opportunity, community norms, organizational pressures)
    • Discuss how the crime affects victims and communities
    • If relevant, analyze the role of online communities or subcultures in facilitating the crime
    • Key question to address: Who commits this crime, why do they commit it, and what social or organizational conditions enable it?

    Legal Dimension (1 – 2 pages)

    • Identify relevant federal and/or international laws that criminalize this activity
    • Discuss how law enforcement agencies attempt to investigate, prosecute, and prevent this crime
    • Analyze significant prosecutions, legal cases, or policy responses
    • Identify challenges in enforcement (e.g., jurisdiction, anonymity, attribution, international cooperation)
    • Consider gaps between the scope of the criminal activity and the capacity of legal systems to address it
    • Key question to address: How do legal systems attempt to control this crime, and what are the practical and jurisdictional obstacles to effective enforcement?

    Synthesis and Conclusion (1/2 – 3/4 page)

    • Bring together insights from the technical, social, and legal dimensions
    • Discuss how understanding all three dimensions provides a more complete picture than focusing on technology alone
    • Reflect on implications for policy, prevention, or future enforcement strategies
    • Conclude with a forward-looking statement about emerging challenges or changes in this form of cybercrime

    Citation and Source Requirements

    • Minimum of 8 scholarly sources (books, peer-reviewed journal articles, government reports, or credible investigative journalism)
    • At least 3 sources must be from peer-reviewed academic journals in criminology, computer science, law, or related fields
    • Use APA 7th Edition format for in-text citations and reference list
    • Acceptable sources include:
    • Academic books and journal articles
    • Government reports and law enforcement publications (FBI, DOJ, Secret Service, INTERPOL)
    • Industry reports and security research (e.g., from cybersecurity firms) when supplemented with academic sources
    • High-quality investigative journalism from reputable outlets
    • Not acceptable: Wikipedia, course lectures, personal blogs, or unattributed online sources

    References

    Chan, C.-k., Wang, X., & Yang, X. (2024). Prevalence and relationships of dating application usage, cyber-fraud and mental health among emerging adults in Hong Kong. Psychiatry Research Communications, 4, Article 100197.

    BBC News. (2025, January 29). How Tinder Swindler Simon Leviev scammed his way around the world.

    VG. (2019). Tindersvindleren [Special report in English].

    Garaad, N. (2023). The Tinder Swindler: Analyzing public sentiments of romance fraud using machine learning and artificial intelligence. Journal of Economic Criminology, 2, Article 100023.

    Lopez, K. (2022, February 3). The true story of the Tinder Swindler and where Simon Leviev is now. Esquire.

    Newsweek. (2022, February 16). LLD Diamonds Simon Leviev response: Netflixs Tinder Swindler exposes Shimon Hayut.

    Of, by and for the smartphone: Tinder Swindler investigation captures millions of readers. (n.d.). Global Investigative Journalism Network.

    Organized Crime and Corruption Reporting Project. (2025, February 3). Tinder Swindler arrested in Georgia, placed in extradition custody.

    People Staff. (2025, January 14). Where is Simon Leviev now? People.

    Redling, E. (2023). Modern dating and performance: Creative blendings of practices and platforms. Journal Name, Volume(Issue).

    Times of Israel. (2022, February 7). Tinder Swindler seduces way to top of Netflix charts.

    Delano Cole van der Linde, LLB LLM LLD. (Year). Online Dating Fraud Under the Common Law and the Cybercrimes Act. Obiter, 45(2).

  • 30 Week 1

    Peruse the Office of Disease Prevention and Health Promotion (ODPHP)

    including HP2020 and HealthFinder to gain a better understanding of their role in health promotion and disease prevention.

    Then answer the following questions from Option 1 or Option 2 in your initial post.

    Please review the Discussion Rubric for detailed requirements of your posts. When you click Reply, change the subject line to read either Option 1 or Option 2. ALL INITIAL RESPONSES ALWAYS REQUIRE CONTENT FROM THE TEXT AND A NURSING JOURNAL ARTICLE PARAPHRASED, CITED, AND REFERENCED TO APA

    Option 1:

    From the ODPHP website link above, choose one of the topics listed on the tab under Our Work (Food and Nutrition, Physical Activity, or Health Literacy). Present a summary of the initiatives and guidelines presented for that topic.

    How can this information be used to educate the public on health promotion/disease prevention?

    Based on your response, which individual theory or model would be most useful to change behavior? Explain.

    Option 2:

    What role does health literacy and cultural competence play in health promotion and disease prevention?

    What strategies and resources can be utilized by a nurse to assist vulnerable populations in self-care and self-management opportunities for better health?

    Based on your response, which individual theory or model would be most useful to change behavior? Explain.

    Ogrodnick, M., OConnor, M., & Feinberg, I. (2021). Health literacy and intercultural

    competence training. Health Literacy Research and Practice, 2021;5(4), e283e286.

    Article provided

    Instructions for discussion provided

    Title page must only say institution

    Attached Files (PDF/DOCX): Guidelines for writing a scholarly discussion post.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • AI governance

    The Question Imagine it is Monday morning. You just became CEO. Your organization uses AI in multiple places. You have a team, a budget, and one week to implement real governance. You cannot do everything at once. What is the single rule you would implement first? Your Options A Human Review Rule AI never makes final decisions alone. Humans stay in the loop for all high-stakes decisions. A Transparency Rule Everything AI does has to be explainable. You can understand how it reached its conclusions. An Audit Rule Regular third-party checks on AI systems. External validation that governance is actually happening. A Deployment Rule No new AI goes live without formal approval. Every new system requires sign-off before launch. Your Response Should Include Pick one rule. (Only one. You cannot do everything in a week.) Explain why you chose it. What does this rule prevent or catch that the others do not? Give a concrete example. Use a case from class (State Farm, Watson, Sports Illustrated, Progressive Insurance, Hiring, Education detectors) or an example from your own experience. Show the tradeoff. What does your choice NOT address? What vulnerability remains? Why This Matters There is no single right answer. But your answer helps shape how you think about risk. Some of you will choose prevention (stop bad things before they deploy). Others will choose detection (catch problems early). Others will choose accountability (know who is responsible). All of those are legitimate governance moves. But notice what you are not doing. You are not waiting. You are not hoping the model works out. You are not trusting the data scientist alone. You are making a deliberate choice about how to control a risky technology. That is exactly what governance is. The Bigger Picture In your careers, whether you are running a company, leading a team, sitting on a board, or advising an organization, you will face this exact question. Please post your response by the end of day Sunday so that everyone has time to read and engage with one anothers thinking. You are expected to read at least two classmates responses and comment thoughtfully on each. In your comments, explain whether you agree or disagree with their choice, or how you would prioritize their rule differently, and why. This discussion is not graded, but the quality of your engagement will directly support your understanding of these governance concepts and prepare you for future applications.
  • Music Reports Tiffani

    Remember to write at least 150-200 words into the responses for them to be considered for full points.

    Attached Files (PDF/DOCX): Response 2-5.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Letters

    Write two separate letters :

    Letter 1 – Write a FOIA request letter

    Letter 2 – Write Georgia Open Records Request Letter

    I’m going to upload examples of how to complete the letter , you can choose the topic you want to write the letters on. I will also provide the website to help give insight on how to complete the assignment.

    Attached Files (PDF/DOCX): About Your foia assignment.docx, What you need to know before submitting your FOIA and GA requests.docx

    Note: Content extraction from these files is restricted, please review them manually.

  • Discussion Thread: Summarize Company Shareholder Letter

    Company Name: 3M Company (MMM)

    Write a brief summary of your companys letter to shareholders. Examples of potential items to discuss are as follows. What does the CEO or Board Chairman focus on? What is your overall assessment of the letter? Is the letter positive or negative? Does the letter discuss issues unrelated to the company? If so, why do you think the CEO or Board Chairman chose to do so?

    For each thread, you must support your assertions with at least two (2) scholarly/professional sources

    (note that Investopedia and Wikipedia are not scholarly/professional sources). Your sources

    MUST be cited at the end of your post using current APA format.

    Chapter 10-12 if needed for reference

  • Unit 9 Discussion- ADR

    Jay Pitchfork has a problem with his business. His employees have a union represented by his son, Mitchell Pitchfork. The head of the union is none other than his other son-in-law, Erin Stonehenge, who quit teaching and coaching to work at Pitchforks Closets & Blinds. Erin wants to use the company email to contact his fellow employees regarding wages, hours, working conditions, and union issues during work time. Jay counter offers that according to the National Labor Relations Board (NLRB) decisions, such work email can only be used during non-working hours. He retains you to research this issue and provide him with an opinion. Who is right?