Category: uncategorised

  • Concentration: Change Management and Knowledge Management

    View the video (5:52min) by KnowledgeMT and answer the following questions.

    • After viewing the video, address the following in your discussion post:
      • Discuss the two reasons, according to the video, as to why knowledge management fails.
      • What is the difference between IT and the dominant business view?
      • What is the difference between explicit and tacit knowledge?
      • Do you agree with this video? Why or why not?

    Requirements: no AI

  • BO art 120 cd 131

    PART 1

    SketchesLines in Design Sketches

    Lines and directional forces are all around us. Look to SEE where you can find lines to enhance a design.

    Create 5 line based compositions of the same subject (a representational subject that is made of or suggests line) using any method you wish, drawing, photography, computer, etc. Be sure it is well designed employing line, value, positive/negative shapes rules of composition and balance.

    Explore the subject to its fullest potential. For example: How many different ways can you photograph a telephone pole and it’s wires? Poles and wires can represent lines in a composition, like branches, railings, etc. Get creative!

    Each composition should be different from the next. The more you work with one subject and get to know it the more you see it objectively. So you can do 10-20 photos or drawings and pick the best 5 to present. You should never just settle on the first composition you create. Always consider all the possibilities! At least 4 x 5″ or larger.

    Critique at least 2 other student’s sketches by Friday end of day of the same week so that the notes can be referenced while preparing the final art.

    Stairs1.pngStairs5.pngStaris3.pngStairs4.pngStairs2.png

    PART 2-

    This discussion board is part of your Attendance and Participation grade. To earn full credit, you must: **Reminder you can not make this discussion board up after Sunday 2/22

    • By Wednesday (2/18): Post your original response to the prompt (2 points)
    • By Friday (2/20): Reply with inquiry-based, constructive comments to all of your group mates posts (2 points)
    • By Sunday (2/22): Complete at least one discussion loop by responding back to a classmate who commented on your post (1 point)

    Discussion Prompt

    In Chapter 1 of the Berns text, you will begin to explore what makes the child. Development is shaped by many factors, brain development, temperament, family, culture, and the broader environment. Children both influence and are influenced by their surroundings, and this dynamic relationship is central to their growth.

    Traditionally, childrens environments are fairly stable and guided by parents and close relationships. However, in todays world, rapid social and technological changes, along with global events like the COVID-19 pandemic,have reshaped how children grow, learn, and socialize.

    For this discussion, reflect on:

    • How do you see todays changing world (technology, societal shifts, pandemic effects, etc.) impacting how children are socialized?
    • How might these changes influence major aspects of development such as:
      • Self-concept
      • Self-esteem
      • Self-image

    Use your readings, observations, and experiences to support your response.


    Group Discussion Expectations

    • You will be placed in a small group of about 68 classmates.
    • By Wednesday: Post your response to the prompt.
    • By Friday: Reply with inquiry-based comments to ALL your group mates posts to further their thinking.
    • By Sunday: Complete the discussion loop by replying back to your group mates comments on your own post.
    • If a group member does not post by Wednesday, you are not required to respond to their late entry but if you see it do not exclude from discussing either.

    Be a good group mate, post early so your peers have time to interact with your ideas. Early and thoughtful contributions help create deeper, richer discussions for everyone.

    To unlock the next page in this module you must view this page and check the “next” button at the bottom of this page.

    Requirements: Please place each part in a different attachment. NO AI USE.

  • Five Days at Memorial Project

    After reading Finks Five Days at Memorial Utilize the PowerPoint template. Each slide represents either an ethical principle or ethical questions about the Five Days book and how it relates to current events within health care. Provide 3 examples from the book on how the specific ethical principle was or was not upheld at Memorial during Hurricane Katrina. Be clear if it was upheld or violated on the slide. You should not reuse the same example over and over, you should have different examples for each ethical principle. You should use names and direct examples from the book. Focus on how the principles were violated in regard to the patients and their care. Provide discussion bullet points for the posed questions regarding lessons learned, similarities described in Five Days between Katrina and the COVID pandemic, and how Pou’s treatment by the legal system compares to the case of RaDonda Vaught. (3 key ideas/examples for each slide) Responses should be in bullet points and should show thought and evidence of reading the book. The bullet points should not be in paragraph form. They should be concise but with enough information to be understood by the reader. Use the criteria posted in the rubric to form your PowerPoint project. Make sure to use in-text citations. You should add a design and photos to the slides to increase the visual appeal of the PowerPoint project. Just make sure the slides are readable to the viewer (color scheme chosen allows for easy readability of text, font size is not extremely small). References should be cited on the slides. You are expected to create an original presentation in your own words. Do not copy from others. You may use outside materials to make your case, but you are expected to cite appropriately and analyze what you are citing with your own ideas. AI use is not appropriate for this assignment. PowerPoint Template Provided below are links with some information about the current RaDonda Vaught case: Overview of Vaught case ANA Response to Vaught verdict
  • Class Reflection

    Read the presentation and write a reflective essay with what you liked, what you didn’t like, what surprised you and any doubts or confusion.

    Attached Files (PDF/DOCX): Lecture 5 Oral complications of cancer treatment Radiotherapy and Chemotherapy treatment complications.pdf

    Note: Content extraction from these files is restricted, please review them manually.

  • Managing Sales Territories Effectively to Improve Sales Outc…

    Write a 500- to 750-word essay that addresses the following:

    Time Management

    • Explain why time management skills are essential in the sales profession, what areas of the sales process take significant time (i.e., prospecting, scheduling, customer follow up) and how can improving your time management skills reduce wasted effort and lead to more productivity.

    Sales Territory Strategies

    • Describe common types of sales territories and the advantages of each (i.e., effective, geographic, account based, industry based, product based).
    • Pick the product or service from your industry scenario and explain the type of territory design used and why it is effective.
    • Which Christian worldview principles (human value and dignity, ethical decision making, for the common good, servant leadership, Christian concept of success, etc.) align with the concepts of managing sales territories?

    Technology Integration

    • Give at least two examples of how CRM systems, AI tools, and the internet can be used to manage both time and territory more efficiently.
    • Explain where AI excels to manage your territory more efficiently and where human judgment and relationship-building are still essential.

    Sales Outcome Improvement

    • Tie your ideas back to sales performance: how better time and territory management supported by technology can increase closing rates, customer satisfaction, and revenue.
  • Incident Response

    Obfuscation is frequently used to mask something important, like a URL. URL syntax is unique and often used when searching for suspicious sites and activity. By masking URLs, attackers can avoid detection, confuse users, and generate hidden functionality within payloads. Research some examples of obfuscation techniques. Why is Metasploit Framework (MSF) used by attackers?

    The primary response must be at least 300 words in length and fully address the topic, demonstrating critical thinking and understanding.

    Requirements: NO AI

  • Incident Response

    Obfuscation is frequently used to mask something important, like a URL. URL syntax is unique and often used when searching for suspicious sites and activity. By masking URLs, attackers can avoid detection, confuse users, and generate hidden functionality within payloads. Research some examples of obfuscation techniques. Why is Metasploit Framework (MSF) used by attackers?

    The primary response must be at least 300 words in length and fully address the topic, demonstrating critical thinking and understanding.

    Requirements: No AI use

  • English C1000 of 8 weeks

    Please put 55 days if you wnat bid to be selected

    Requirements: as above

  • IEEE journal article wiring


    Quantum-Accelerated Pattern Analysis for Signal Intelligence

    Applying quantum algorithms to pattern recognition in defense-relevant signals (e.g., radar, sonar, RF spectrum) to detect anomalies or threats more efficiently than classical methods, including quantum clustering and quantum support vector machines.

    Scope Alignment (Mandatory)

    Tell the writer:

    • The paper must focus on fundamental limits, not system implementation.
    • Core contribution must be new theorems, capacity bounds, or converse proofs.
    • Work must clearly extend classical network information theory into the quantum regime.
    • Avoid engineering optimization unless supported by new theoretical proofs.

    No simulation-only papers
    No architecture-only discussion
    No review/survey style


    2? Mathematical Depth Requirements

    Require:

    • Formal problem definition using Hilbert spaces and CPTP maps
    • Precise channel model (e.g., quantum MAC, broadcast channel, interference channel)
    • Clearly stated Theorems, Lemmas, and Corollaries
    • Complete proofs (no sketch-only arguments unless standard)
    • Converse + Achievability results if proposing capacity regions
    • Use of quantum entropy measures:
      • Von Neumann entropy
      • Coherent information
      • Holevo information

    The paper should look like classical Shannon theory but quantum.


    3? Expected Structure (TIT Standard)

    Instruct them to follow this structure:

    1. Introduction
      • Clear gap in existing quantum network literature
      • Why classical results do not directly extend
      • Summary of contributions
    2. System Model
      • Mathematical channel definitions
      • Assumptions
    3. Main Results
      • Theorem statements
      • Capacity region expressions
    4. Proof Sections
      • Achievability proof
      • Converse proof
    5. Special Cases / Extensions
      • Reduction to classical case
      • Entanglement-assisted version
    6. Discussion (Short and Technical)
      • Implications for quantum internet

    4? Novelty Requirement (Very Important)

    Tell them:

    The manuscript must contribute at least one of:

    • New quantum network capacity region
    • New outer bound tighter than existing literature
    • New coding scheme (quantum superposition coding, etc.)
    • Non-asymptotic bounds
    • Strong converse theorem

    Incremental extensions of known results will be rejected.


    5? Literature Benchmarking

    They must compare against major quantum information results and show how this work advances beyond:

    • Multi-user classical information theory
    • Known quantum Shannon theory results
    • Existing quantum MAC/broadcast papers

    Explicit comparison section required.


    6? Writing Style Requirements

    Tell them:

    • No informal explanations dominating the paper
    • No marketing language
    • No buzzwords (AI, blockchain, etc.) unless mathematically formalized
    • Clear notation table
    • Consistent symbols throughout

    7? Technical Quality Checks (Before Submission)

    Ask the writer to verify:

    All entropy identities are correct
    All inequalities are justified (data processing, strong subadditivity, etc.)
    No unproven assumptions
    All proofs logically complete
    All claims mathematically supported


    8? Formatting Compliance

    Follow IEEE TIT guidelines:

    • Two-column IEEE format
    • Proper theorem environments
    • Correct reference style
    • Page limit respected

    9? What Reviewers Will Look For

    Tell the writer the reviewers will ask:

    • Is this fundamentally new?
    • Is the math correct and non-trivial?
    • Does this generalize classical theory meaningfully?
    • Is the capacity region tight?

    If the answer to any is weak rejection likely.


    Golden Rule for Acceptance

    For IEEE Transactions on Information Theory, the paper must answer:

    “What new fundamental limit of quantum information transmission does this work establish?”

    If it cannot answer that clearly it will not be accepted.

    Requirements: 100000

  • Comparative Rhetorical Prcis: Debates and Hearings for MWA 2…

    For this assignment, I am asking you to:

    1. watch one of the following debates/hearings below to write about for your second essay
    2. take time stamped notes on your chosen debate/hearing in MLA formatting (header, page numbers, title, 12pt TNR double spaced)
    3. create a comparative rhetorical prcis for the debate hearing

    These are rather long debates/hearings. If you’re choosing one of the 4 hour debates/hearings and plan on tapping out before it ends, I’m telling you to watch at least an hour and a half + the end of the debate/hearing you chose.

    Here are the debates/hearings you may choose from:

    • note that this debate features Mamdani, Cuomo, and Curtis Sliwa, but you are only be asked to analyze current Mayor Mamdani & former Mayor Cuomos argumentation/performancesnot Sliwa]
    • Bondi & Committee supporters vs. Epstein survivors & Committee opponents
      note that this hearing was set to focus on the Epstein Files and Bondis handling of the Epstein situation
    • The Palestinian Debate: v.
      note that this debate between these two former co-hosts was set to focus on Palestine
      (in the case that you cant hear a speaker at a given point, I have provided you with both streams – the Piker stream allows for better audio of both sides, but the Klein stream has the full debate)

    Here is the outline for the comparative rhetorical prcis

    In the [title of debate, hearing, or texts], A argues that A while B argues that B. A supports their argument through [2 strategies] while B supports their argument through [2 fallacies]. While [identification of appeals for strategies of each party], A is [value statement – who is more successful] in their argumentation as As argument is based in A while B bases their argumentation on B.

    Here is a comparative rhetorical prcis based on the silly video ” if you need an example:

    In the video Wow, Everyones Flirting with Me, Marovitch argues that everyone wants her while The Boys argue the opposite. Marovitch supports her argument through false equivalency & slippery slope conclusions while The Boys support their argument through the use of direct statements and physical avoidance. While Marovitch attempts to appeal to her audiences pathos, The Boys attempt to appeal to their audiences ethos. Marovitch is less successful in her argumentation as her argument is based in delusion and lack of proof, while The Boys base their argumentation on personal experience with Marovitch in their storied history of friendship.

    If you can’t remember rhetorical fallacies, take a look at the list here:

    Requirements: as much as the directions is asking for