Author: admin

  • Bashar psych

    1. Then, take this
    2. Summarize your results and reflect on them For example, do you feel your results accurately captured your personality? Why or why not?
    3. How do you think personality is related to the study of social psychology?

    Requirements: Follow

  • Grief and loss counseling in later adulthood

    Hide Assignment Information TurnitinTM TurnitinTM enabledThis assignment will be submitted to TurnitinTM. Instructions Purpose This assignment helps you practice recognizing grief and loss in later adulthood and responding with appropriate counseling support rather than assumptions or timelines. Instructions You will be provided with a fictional scenario involving an older adult experiencing one or more losses. Identify the type or types of loss present in the scenario. Explain how these losses may affect the individual emotionally and psychologically. Discuss whether the response described reflects normal grief or raises concern for complicated grief. Describe one counseling approach or supportive strategy that would be appropriate in this situation. You are not expected to diagnose. Focus on understanding, ethical awareness, and supportive response. Submission Requirements 1 page (not including title page and reference page) Double-spaced APA 7th Edition format Minimum of 2 Peer Reviewed references (within the last 10 years) Microsoft Word document only (No google docs, PDFs, etc.) Times New Roman, 12-point font Use headings for clarity No diagnosis required or expected Academic Integrity and AI Use AI tools may be used to help clarify concepts or organize ideas. AI may not be used to write this assignment for you. All submitted work must reflect your own thinking and professional reasoning. Include the following statement at the end of your submission: I used AI as a learning aid, not as the author of this assignment.
  • Available orders

    Attached Files (PDF/DOCX): Diagnostic Analysis Paper Rubric(4).pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Bacterial Evolution

    In this activity, you will model how a bacteria population is affected by exposure to an antibiotic. Bacteria are single-celled, small, simple organisms and are often used to model life cycles and evolution because they go through many generations in a relatively short period of time. Normally, bacteria die when exposed to an antibiotic, such as penicillin. However, sometimes bacteria develop mutations that make them resistant to antibiotics. The bacteria with beneficial mutations will survive longer and reproduce more offspring (ie. Natural Selection!) We will use different colored paper clips to represent the two types of bacteria. Typical bacteria (plastic-coated paper clips) will die when exposed to antibiotics. Mutated bacteria (silver paper clips) are antibiotic resistant. Model Assumptions Typical bacteria have a 1-in-6 chance of surviving exposure to an antibiotic. Mutated bacteria have a 5-in-6 chance of surviving exposure to an antibiotic. Both typical and mutated bacteria produce offspring of the same type. This means that typical bacteria will produce typical bacteria and mutated bacteria will produce mutated bacteria. Procedure Start with a population of 20 bacteria (18 typical and 2 mutated). Record the starting bacteria population for both typical and mutated bacteria in Table 1.3 in the column labeled At start of generation. The entire population of bacteria will be exposed to an antibiotic. You will simulate this event by rolling the die for each individual bacterium (paper clip) to see if the bacterium survives antibiotic treatment. For typical bacteria, survival and reproduction happen only when a 1 is rolled. Any other roll (2-6) will result in death. For mutated bacteria, survival and reproduction occurs when 1-5 is rolled. Death only occurs when a 6 is rolled. Begin the experiment. For each individual bacterium, roll the die. Determine if the bacterium survives by consulting Table 1.2. When a bacterium dies, remove it from the population by setting it aside. Record the number of bacteria that died after antibiotic treatment in the Dead column in Table 1.3. Record the number of bacteria that survived after antibiotic treatment in the Survivors column in Table 1.3. The surviving bacteria reproduce. Bacteria divide in half when they reproduce, so each surviving bacterium becomes two bacteria. In the Reproduction column for each generation, use the number of survivors to calculate and record the total number of bacteria after each surviving bacterium reproduces (Hint: Multiply the number of surviving bacteria by two.) Copy the number of bacteria in your Reproduction column at the end of generation 1 into the column At start of generation for generation 2. Repeat steps 24, filling in Table 1.3 for another four generations.

    Attached Files (PDF/DOCX): Anth301-Activity2BacterialEvolution.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Protected Health Information (PHI): Privacy, Security, and C…

    Prepare an interprofessional staff update on HIPAA and appropriate social media use in health care.

    Collapse AllIntroduction

    Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care.

    This assessment will require you to develop a staff update for an interprofessional team to encourage team members to protect the privacy, confidentiality, and security of patient information.

    Professional Context

    Health professionals today are increasingly accountable for the use of protected health information (PHI). Various government and regulatory agencies promote and support privacy and security through a variety of activities. Examples include:

    • Meaningful use of electronic health records (EHR).
    • Provision of EHR incentive programs through Medicare and Medicaid.
    • Enforcement of the Health Insurance Portability and Accountability Act (HIPAA) rules.
    • Release of educational resources and tools to help providers and hospitals address privacy, security, and confidentiality risks in their practices.

    Technological advances, such as the use of social media platforms and applications for patient progress tracking and communication, have provided more access to health information and improved communication between care providers and patients.

    At the same time, advances such as these have resulted in more risk for protecting PHI. Nurses typically receive annual training on protecting patient information in their everyday practice. This training usually emphasizes privacy, security, and confidentiality best practices such as:

    • Keeping passwords secure.
    • Logging out of public computers.
    • Sharing patient information only with those directly providing care or who have been granted permission to receive this information.

    Today, one of the major risks associated with privacy and confidentiality of patient identity and data relates to social media. Many nurses and other health care providers place themselves at risk when they use social media or other electronic communication systems inappropriately. For example, a Texas nurse was recently terminated for posting patient vaccination information on Facebook. In another case, a New York nurse was terminated for posting an insensitive emergency department photo on her Instagram account.

    Health care providers today must develop their skills in mitigating risks to their patients and themselves related to patient information. At the same time, they need to be able distinguish between effective and ineffective uses of social media in health care.

    This assessment requires you to develop a staff update for an inter-professional team to encourage team members to protect the privacy, confidentiality, and security of patient information. Technology has become so commonplace in our lives that organizations are now using it to reach their workforce. Gone are the days of paper flyers on the breakroom wall. Organizations are using intranets, workplace social media, or communications systems like Workplace, Slack, or Teams.

    Preparation

    As you begin to consider the assessment, it would be an excellent choice to complete the Breach of Protected Health Information (PHI) activity. The activity will support your success with the assessment by creating the opportunity for you to test your knowledge of potential privacy, security, and confidentiality violations of protected health information. The activity is not graded and counts towards course engagement.

    To successfully prepare to complete this assessment, complete the following:

    • Review the settings presented in the
    • resource and select one to use as the focus for this assessment.
    • Search the Internet for infographics about protecting PHI. These infographics should serve as examples of how to succinctly summarize evidence-based information about protecting the security, privacy, and confidentiality of patient data. Some examples of infographics are provided for you in the reading list .
    • Analyze these infographics and distill them into five or six principles of what makes them effective. As you design your interprofessional staff update, apply these principles. Note: In a staff update, you will not have all the images and graphics that an infographic might contain. Instead, focus your analysis on what makes the messaging effective.
    • Select from any of the following options, or a combination of options, as the focus of your interprofessional staff update:
    • Social media best practices.
    • What not to do: social media.
    • Social media risks to patient information.
    • Steps to take if a breach occurs.
    • Conduct independent research on the topic you have selected in addition to reviewing the suggested resources for this assessment. This information will serve as the source(s) of the information contained in your interprofessional staff update. Consult the for help in identifying scholarly and/or authoritative sources.

    Scenario

    In this assessment, imagine you are a nurse in one of the health care settings described in the following resource:

    Before your shift begins, you scroll through Facebook and notice that a coworker has posted a photo of herself and a patient on Facebook and described how happy she is that her patient is making great progress. You have recently completed your annual continuing education requirements at work and realize this is a breach of your organization’s social media policy. Your organization requires employees to immediately report such breaches to the privacy officer to ensure the post is removed immediately and that the nurse responsible receives appropriate corrective action.

    You follow appropriate organizational protocols and report the breach to the privacy officer. The privacy officer takes swift action to remove the post. Due to the severity of the breach, the organization terminates the nurse.

    Based on this incident’s severity, your organization has established a task force with two main goals:

    • Educate staff on HIPAA and appropriate social media use in health care.
    • Prevent confidentiality, security, and privacy breaches.

    The task force has been charged with creating a series of interprofessional staff updates on the following topics:

    • Social media best practices.
    • What not to do: Social media.
    • Social media risks to patient information.
    • Steps to take if a breach occurs.

    Technology has become so commonplace in our lives that organizations are now using it to reach their workforce. Gone are the days of paper flyers on the breakroom wall. Organizations are using intranets, workplace social media, or communications systems like Workplace, Slack, or Teams.

    Instructions

    First, select one of the health care settings described in the following resource:

    • .

    As a nurse in this setting, you are asked to create the content for a staff update. This staff update will be delivered using your organization’s internal communication platform and should be in the form of a social media post and should address one or more of these topics:

    • Social media best practices.
    • What not. to do: social media.
    • Social media risks to patient information.
    • Steps to take if a breach occurs.

    This assessment is not a traditional essay. It is a staff educational update about PHI. Staff are frequently overwhelmed with required trainings and often click through without learning. To catch the attention of your audience be creative. Create a social media post that delivers the information required in an easy-to-read fashion like an infographic, or a short (under 3 minute) narrated presentation or video where you use your creativity to make the staff update fun and engaging.

    The task force has asked team members assigned to the topics to include the following content in their updates in addition to content on their selected topics:

    • What is protected health information (PHI)?
    • Be sure to include essential HIPAA information.
    • What are privacy, security, and confidentiality?
    • Describe and provide examples of privacy, security, and confidentiality concerns related to the use of technology in health care.
    • Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.
    • What evidence relating to social media usage and PHI do interprofessional team members need to be aware of? For example:
    • What are some examples of nurses being terminated for inappropriate social media use in the United States?
    • What types of sanctions have health care organizations imposed on interdisciplinary team members who have violated social media policies?
    • What have been the financial penalties assessed against health care organizations for inappropriate social media use?
    • What evidence-based strategies have health care organizations employed to prevent or reduce confidentiality, privacy, and security breaches, particularly related to social media usage?

    Notes

    • Be selective about the content you choose to include. Include need-to-know information. Omit nice-to-know information.
    • Many times, people do not read staff updates, do not read them carefully, or do not read them to the end. Ensure your staff update piques staff members’ interest, highlights key points, and is easy to read/view. Avoid overcrowding the update with too much content.
    • Also, supply a separate reference page that includes two or three peer-reviewed and one or two non-peer-reviewed resources (for a total of 35 resources) to support the staff update content.

    Additional Requirements

    • Written communication: Ensure the staff update is free from errors that detract from the overall message.
    • Submission length: Maximum of two double-spaced content pages or a video under 3 minutes.
    • Font and font size: Use Times New Roman, 12-point.
    • Citations and references: Provide a separate reference page that includes 23 current, peer-reviewed and 12 current, non-peer-reviewed in-text citations and references (total of 35 resources) that support the staff update’s content. Current means no older than 5 years.
    • APA format: Be sure your citations and references adhere to APA format. Consult the page for an APA refresher.

    Competencies Measured

    By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and scoring guide criteria:

    • Competency 1: Describe nurses’ and the interdisciplinary team’s role in informatics with a focus on electronic health information and patient care technology to support decision making.
    • Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.
    • Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.
    • Competency 2: Implement evidence-based strategies to effectively manage protected health information.
    • Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.
    • Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.
    • Competency 5: Apply professional, scholarly communication to facilitate use of health information and patient care technologies.
    • Follow APA style and formatting guidelines for citations and references.
    • Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.

    Scoring Guide

    Use the scoring guide to understand how your assessment will be evaluated.

    Collapse AllCriterion 1

    Describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.

    Distinguished

    Provides a comprehensive and insightful description of confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team, giving examples.

    Proficient

    Describes the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.

    Basic

    Identifies the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.

    Non Performance

    Does not describe the security, privacy, and confidentially laws related to protecting sensitive electronic health information that govern the interdisciplinary team.

    Criterion 2

    Explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.

    Distinguished

    Explains in detail, and with professional insight, the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.

    Proficient

    Explains the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.

    Basic

    Explains interdisciplinary collaboration to safeguard sensitive electronic health information, but the explanation lacks detail or is missing critical information.

    Non Performance

    Does not explain the importance of interdisciplinary collaboration to safeguard sensitive electronic health information.

    Criterion 3

    Identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.

    Distinguished

    Identifies multiple appropriate and well-researched evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information, supported by examples.

    Proficient

    Identifies evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.

    Basic

    Identifies approaches to mitigate risks to patients and health care staff related to sensitive electronic health information; however, omissions and errors exist, or the approaches are not evidence-based.

    Non Performance

    Does not identify evidence-based approaches to mitigate risks to patients and health care staff related to sensitive electronic health information.

    Criterion 4

    Develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.

    Distinguished

    Develops a comprehensive, professional, and effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.

    Proficient

    Develops a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.

    Basic

    Develops a staff update that educates interprofessional team members about protecting the security of patient data.

    Non Performance

    Does not develop a professional, effective staff update that educates interprofessional team members about protecting the security, privacy, and confidentiality of patient data, particularly as it pertains to social media usage.

    Criterion 5

    Follow APA style and formatting guidelines for citations and references.

    Distinguished

    Follows flawless APA style and formatting guidelines for citations and references.

    Proficient

    Follows APA style and formatting guidelines for citations and references. Academic citations and references are largely error-free.

    Basic

    Partially adheres to APA style and formatting guidelines for citations and references. Formatting inhibits effective communication or detracts from good scholarship.

    Non Performance

    Does not follow APA style and formatting guidelines for citations and references.

    Criterion 6

    Create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.

    Distinguished

    Creates a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling. Adheres to all applicable disciplinary and scholarly writing standards.

    Proficient

    Creates a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.

    Basic

    Creates a staff update that contains errors in grammar, punctuation, and spelling that distract from good scholarship. Staff update is more than two pages of content.

    Non Performance

    Does not create a clear, concise, well-organized, and professional staff update that is generally free from errors in grammar, punctuation, and spelling.

  • analytical writing the wages of fear

    Analytical Writings
    This should always be in response to the film you watch outside of class for that week and the
    accompanying essay you read about the film. It should follow the parameters below, be printed

    out, and handed in at the beginning of the class period in which we discuss it.

    1 single-spaced page with 1 margins; 10 or 12 point standard font, such as Times New
    Roman. May exceed one page if necessary.
    Divided into three sections:
    1.
    An analytical paragraph on at least one theme, scene, character, composition,
    technique, etc. of the film. Provide detail and explanation to inform and
    convince the reader of your observation.
    2.
    A paragraph explaining the purpose of the essay written on the film then
    summarizing the main points and highlights.
    3.
    Did the essay allow you to see something new about the film or reinforce what
    you already thought? Explain in depth.
    Avoid just writing plot summary. Assume that the reader has seen the film, so that you
    can reference characters and events to illustrate your claims and make your point.

    Refer to the events in present tense, as if the plot is always in motion: On his deathbed,
    Kane whispers Rosebud then drops a snow globe to the floor. When Cleo sings the
    tune, she begins to cry. The camera cranes forward on a scene from ancient Babylon.This is the article and the movie name is the wages of fear I want you to watch it and read the article and then write the paper, follow the requirments

    Requirements: 1 page

  • Criminal Justice Question

    Choose 2 discussion questions from the list of prompts below and use content from the lectures and readings to answer them. Also, include evidence from at least two of the videos on the to support your answers.

    b. Write one to two paragraphs in response to each discussion question that you select. Provide examples of research findings, legal cases, or other evidence to support your responses. Each paragraph should have at least 4 to 5 sentences.

    1. How did the adoption of the 14th Amendment impact criminal procedure in the States?
    2. What is the “presumption of regularity”? Does the claim of “selective prosecution” provide sufficient limits on a prosecutors’ discretion to charge crimes?
    3. Do you think that the Eighth Amendment’s protections against “excessive fines” should be incorporated into the 14th Amendment?
    4. Should the Supreme Court have the power of “judicial review”? Why or why not?

    VIDEOS:

    Requirements: 4 Paragraphs total

  • Evaluation Cash Flow Budgeting

    Evaluating Cash Budgets of an Organization Submit the assignment by 11:59 PM PT Sunday of Module 4. Cash budgets serve as critical tools for analyzing cash flow and ensuring adequate liquidity throughout the year. Executives rely on this analysis for strategic decision-making. In this assignment, you will conduct a financial analysis of an organizations cash budget with provided information. You will analyze cashflow management and provide evidence-based recommendations in a 3- to 4-page memo for executive decision makers. Although you are not composing an APA-formatted essay, you must still demonstrate the application of research. Apply APA format for in-text citations and your reference list. Use creativity to develop something that mirrors what you would produce in the workplace. Include a reference page at the end of your document. Step 1 Review the module readings, videos, discussion, and ACE LibraryLinks to an external site. to understand key principles of cash flow management, working capital strategies, and financial decision-making frameworks. Imagine you are the financial manager of Peachey’s Furniture Company. Download and examine the following financial information: Peacheys Furniture Cash Budgeting Information Resource Peacheys Furniture Cash Budget Consider how the concepts discussed this week apply to Peachey’s specific market position and operational challenges. Step 2 Assess the organizations cash flow patterns, operational efficiency, and financial management strategies using the provided cash budget. Consider the impact of industry trends, competitive pressures, and strategic initiatives on the companys cash position. Use these questions to guide your thinking: What patterns do you observe in the cash inflows and outflows, and what might be causing these patterns? Based on the cash budget data, what potential challenges or opportunities can you identify for improving the company’s cash position? Step 3 Compose your memo. Include the following: summary of key findings analysis of current cash flow management strategies evaluation of strengths and weaknesses in financial operations discussion of market conditions and competitive factors affecting cash flow minimum of three evidence-based recommendations for improvement implementation considerations and potential impacts Incorporate at least three APA-formatted citations within your memo and include an APA-formatted reference list at the end. Step 4 Submit your 3- to 4-page memo and reference page (not included in the required page count). Please read the Assignment GuidelinesLinks to an external site. before you begin working. Master’s Assignment Rubric v.3 Master’s Assignment Rubric v.3 Criteria Ratings Points Demonstrates a Conceptual Understanding Mastery A. Clearly addressed all elements of the assignment. B. Demonstrated real-world application. 17 to 20 pts Marginal A. Addressed most of the elements of the assignment. B. Demonstrated marginal real-world application. 13.1 to 16.9 pts Needs Improvement A. Somewhat addressed the elements of the assignment. B. Demonstrated little to no real-world application. 0.1 to 13 pts No submission 0 to 0 pts /20 pts Analysis and Evaluation of Issues/Problems Mastery A. Clearly addressed the issue/problem. B. Exhibited scholarly analysis and evaluation. C. Established a solid connection to theory and/or research. D. Demonstrated critical thinking surrounding the issue/problem with depth and breadth. E. Formulated deep conclusion and/or implications. 25.5 to 30 pts Marginal A. Addressed most of the issue/problem. B. Somewhat exhibited scholarly analysis and evaluation. C. Established some connection to theory and/or research. D. Demonstrated a superficial understanding of the issue/problem. E. Formulated surface-level conclusion and/or implications. 21 to 25.4 pts Needs Improvement A. Many issues/problems not addressed. B. Exhibited little to no scholarly analysis and evaluation. C. Established little to no connection to theory and/or research. D. Demonstrated limited evidence of understanding the problem/issue. E. Formulated limited evidence of conclusion and/or implications. 0.1 to 20.9 pts No submission 0 to 0 pts /30 pts Use of Evidence Mastery A. Displayed a variety of scholarly references as evidence. B. Demonstrated use of scholarly literature and research beyond sources provided in the course. 25.5 to 30 pts Marginal A. Displayed a marginal use of references. B. Demonstrated a marginal use of literature and research provided in the course. 21 to 25.4 pts Needs Improvement A. Displayed little to no use of references. B. Demonstrated little to no use of literature and research provided in the course. 0.1 to 20.9 pts No submission 0 to 0 pts /30 pts Scholarly Writing Mastery A. Exceeded or met formal writing standards. B. Demonstrated correct grammar, usage, mechanics, and spelling. 8.5 to 10 pts Marginal A. Met or marginally met a basic level of formal writing. B. Demonstrated inconsistent use of grammar, usage, mechanics, and spelling. 7 to 8.4 pts Needs Improvement A. Basic formal writing skills limited or not present. B. Demonstrated difficulty with grammar, usage, mechanics, and spelling. 0.1 to 6.9 pts No submission 0 to 0 pts /10 pts APA Format Mastery A. Demonstrated near- perfect APA formatting. 8.5 to 10 pts Marginal A. Demonstrated marginally correct APA formatting. 7 to 8.4 pts Needs Improvement A. Demonstrated limited correct APA formatting. 0.1 to 6.9 pts No submission 0 to 0 pts /10 pts Drag a file here, or click to select a file to upload Drag a file here, orChoose a file to upload or I agree to the tool’s End-User License Agreement Students at ACE are expected to demonstrate appropriate professional writing skills and follow the academic integrity policy. By checking this box, I acknowledge that I have read and understand the Academic Integrity Policy and writing expectations for the college. View the Policies page within your course for additional resources provided on the Academic Integrity Policy and plagiarism. *
  • Week 5 Discussion Question 1 & 2 and Week 5 Homework

    Below are 2 discussion post and a homework assignment

    discussion post needs 150 words minimum for each and are to be answered separately with references if needed.

    Week 5 Discussion Question 1

    You have the task of identifying a question and creating 2 to 3 variables to complete a mini study. In this mini study, you will have a question, and you will collect the data for these 2 to 3 variables that answer the question you identified.

    1. The adults who are invested in you should have an official role: professor, coach, counselor, pastor, parents or similar position of support. If you have difficulty reaching 6 adults to collect data from, you can use accountability partners.

    2. The goal of this mini study is to identify how these invested adults use data about you to determine how they feel about the variable you selected.

    3. Also determine how they measure movement in the data.

    3. You will need to collect this data in a table or an Excel spreadsheet, then upload it directly into the discussion post so everyone can see it. There is no exception to this requirement.

    4. You will need at least 6 participants.

    5. In addition, you will identify whether the invested adults’ comments can be grouped into one of four psychological mindsets. This means: are they identifying behaviors in you that reflect your God-given ability, your belief in yourself, your attitude about life, and the things you need to do, or your motivation to do them?

    6. Youre using this information to provide a psychological hypothesis about the framing of your participants for this mini study. You do not need to analyze this data in this upload, but all required information must be included for full credit, with 2 replies to classmates. Half credit will be given to student that do not have interaction with classmates.

    Week 5 Discussion Question 2

    Analyze the data uploaded in Discussion 1 from this week. You need to provide:

    1. A null and alternative hypothesis using the proper notation.

    2. You need to determine: a. central tendency, frequency, relative frequency, variance, standard deviation, of your data in a table that allows others to both see and understand your data. You will need at least 1 table per variable.

    3. You will need to graph this analysis using both descriptive and inferential statistics. Spend some time selecting the most appropriate approach.

    4. You will provide a narrative of this analysis results that follow the MEAL plan: M-main idea, E-evidence, A-analysis of the meaning of the results to your and your future career and life. L-link to the way you can use this information in your Christian worldview in support of data analysis results.

    Week 5 Homework

    book info: Textbook(s):

    Title: Basic Statistics for Behavioral Sciences, 7th Edition

    Author: W. Heiman, Gary W.

    Publisher: Wadsworth Publishing, Cengage Advantage Books

    Edition: 7th (2013)

    ISBN: 978-1285054865

    • Chapter 9 and Chapter 10 Homework
    • Answer the following Review/Application Questions at the end of each chapter as well as the additional question(s) listed:
    • Chapter 9
    • Part 1 Chapter 9 Application Questions # 14, 16, 18
    • Part 2 – Use this online dice roller (
    • ) to roll a 6 sided die 20 times and record the numbers. What is the empirical probability of rolling a 4? What is the theoretical probability of rolling a 1?
    • Chapter 10
    • Part 1 Chapter 10 Application Questions # 14 (references number 13, not 11), 16, 18
    • Part 2 Why can no statistical result prove that changing the independent variable causes the dependent variable to change? What one thing does a significant result prove?
  • Final exam

    Western Civilization – A Concise History II (Brooks) Western Civilization – A Concise History III (Brooks) those are the textbooks if needed. history 002 Final exam Answer at least two out of the four questions. You may consult your notes but you may not use AI under any circumstances. This is an essay test so compose college level essays of multiple paragraphs. 1. Was the cold war between the USA & USSR inevitable or avoidable? Why? 2. Has modern technology and globalization made the distinction between Western and other civilizations obsolete? Is there still a Western Civilization? 3. How effectively has the United States used military power following the collapse of the U.S.S.R. in 1991? 4. How did Europe avoid major imperial conflict between the 1870 1914?