View Video link: https://lmscontent.embanet.com/Media/RC/NU665C/NU665C-w10-m05/. What important information is missing from the case study? Discuss normal developmental achievements and potential vulnerabilities.

  View Video link: https://lmscontent.embanet.com/Media/RC/NU665C/NU665C-w10-m05/. What important information is missing from the case study? Discuss normal developmental achievements and potential vulnerabilities.
3. What precipitating factors could be contributing to the current symptoms?
4. What is the differential diagnosis?
5. Describe the etiology of the primary diagnosis.
6. How should physiologic complications be monitored and assessed?
7. What are the usual nonpharmacologic therapies that would help?
8. What medications could help and why?
9. Identify safety risks and how they should be dealt with in the treatment plan.
Include current supportive evidence in your responses to the questions above using two required resources from this week’s materials and one new resource. National guidelines should also be considered with treatment plans.

What is the payback period for the following set of cash flows? (Round your answer to 2 decimal places, e.g., 32.16.) Year Cash Flow 0 –$ 5,800 1 1,450 2 1,650 3 2,050 4 1,550 Payback period years

Assignment Print View

What is the payback period for the following set of cash flows? (Round your answer to 2 decimal places,
e.g., 32.16.)

Year Cash Flow
0 –$ 5,800
1 1,450
2 1,650
3 2,050
4 1,550

Payback period years

References

Worksheet Difficulty: Basic Learning Objective: 09-02 The payback rule and some of its
shortcomings.

Assignment Print View

An investment project has annual cash inflows of $5,000, $3,300, $4,500, and $3,700, for the next four
years, respectively. The discount rate is 14 percent.

What is the discounted payback period for these cash flows if the initial cost is $5,100? (Do not round
intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.)

Discounted payback period years

What is the discounted payback period for these cash flows if the initial cost is $7,200? (Do not round
intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.)

Discounted payback period years

What is the discounted payback period for these cash flows if the initial cost is $10,200? (Do not round
intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.)

Discounted payback period years

References

Worksheet Difficulty: Basic Learning Objective: 09-03 The discounted payback rule and
some of its shortcomings.

Assignment Print View

3. Award: 9.09 points

A firm evaluates all of its projects by applying the NPV decision rule. A project under consideration has the
following cash flows:

Year Cash Flow
0 –$ 28,600
1 12,600
2 15,600
3 11,600

What is the NPV for the project if the required return is 11 percent? (Do not round intermediate
calculations and round your answer to 2 decimal places, e.g., 32.16.)

NPV $

At a required return of 11 percent, should the firm accept this project?

No
Yes

What is the NPV for the project if the required return is 25 percent? (Negative amount should be
indicated by a minus sign. Do not round intermediate calculations and round your answer to 2
decimal places, e.g., 32.16.)

NPV $

At a required return of 25 percent, should the firm accept this project?

Yes
No

References

Worksheet Difficulty: Basic Learning Objective: 09-01 The reasons why the net present
value criterion is the best way to evaluate proposed investments.

Assignment Print View

A project has an initial cost of $76,000 and a four-year life. The company uses straight-line depreciation to a
book value of zero over the life of the project. The projected net income from the project is $3,100, $2,400,
$2,800, and $4,500 a year for the next four years, respectively. What is the average accounting return?

4.21 percent

16.84 percent

8.42 percent

34.61 percent

11.88 percent

?

?

?

?

?

Assignment Print View

Use the IRR and NPV functions in Excel (note that you don’t include the initial cash flow in the NPV function)

Attempt(s)

A1

Sheet1

10%READY

Calculating NPV, IRR, and the crossover rate – Excel

FILE

Clipboard

Paste

Font

Calibri 11

Alignment Number

Styles

Conditional
Formatting

Format as
Table

Cell
Styles

Cells Editing

INSERT PAGE LAYOUT FORMULAS DATA REVIEW VIEW Sign InHOME

References

Excel Simulation Difficulty: 1 Basic Section: 9.5 The Internal Rate of Return

Use the IRR and NPV functions in Excel (note that you don’t include the initial cash flow in the NPV function)

Attempt(s)

A1

Sheet1

10%READY

Calculating NPV, IRR, and the crossover rate – Excel

FILE

Clipboard

Paste

Font

Calibri 11

Alignment Number

Styles

Conditional
Formatting

Format as
Table

Cell
Styles

Cells Editing

INSERT PAGE LAYOUT FORMULAS DATA REVIEW VIEW Sign InHOME

References

Excel Simulation Difficulty: 1 Basic Section: 9.5 The Internal Rate of Return

Use the IRR and NPV functions in Excel (note that you don’t include the initial cash flow in the NPV function)

Attempt(s)

A1

Sheet1

20%READY

Calculating NPV and multiple IRRs – Excel

FILE

Clipboard

Paste

Font

Calibri 11

Alignment Number

Styles

Conditional
Formatting

Format as
Table

Cell
Styles

Cells Editing

INSERT PAGE LAYOUT FORMULAS DATA REVIEW VIEW Sign InHOME

References

Excel Simulation Difficulty: 1 Basic Section: 9.5 The Internal Rate of Return

Assignment Print View

Use the NPV function in Excel (note that NPV is convenient to use when calculating the profitability index)

Attempt(s)

A1

Sheet1

20%READY

Calculating profitability index and NPV – Excel

FILE

Clipboard

Paste

Font

Calibri 11

Alignment Number

Styles

Conditional
Formatting

Format as
Table

Cell
Styles

Cells Editing

INSERT PAGE LAYOUT FORMULAS DATA REVIEW VIEW Sign InHOME

References

Excel Simulation Difficulty: 1 Basic Section: 9.6 The Profitability Index

Light Sweet Petroleum, Inc., is trying to evaluate a generation project with the following cash flows:

Year Cash Flow
0 –$ 40,000,000
1 64,000,000
2 – 13,000,000

a-
1

What is the NPV for the project if the company requires a return of 10 percent? (Do not round
intermediate calculations and round your answer to 2 decimal places, e.g., 32.16.)

NPV $

a-2 Should the firm accept this project?

No
Yes

b.This project has two IRR’s, namely percent and percent, in order from
smallest to largest. (Note: One of the answers may be negative. If you can only compute one IRR value,
you should input that amount into both answer boxes in order to obtain partial credit.) (Negative amount
should be indicated by a minus sign. Do not round intermediate calculations. Enter your answers
as a percent rounded to 2 decimal places, e.g., 32.16.)

References

Worksheet Learning Objective: 09-05 The
internal rate of return criterion
and its strengths and
weaknesses.

Difficulty: Basic Section: 9.5 The Internal Rate of
Return

The Sloan Corporation is trying to choose between the following two mutually exclusive design projects:

Year Cash Flow
(I)

Cash Flow
(II)

0 –$ 60,000 –$ 18,400
1 28,300 9,900
2 28,300 9,900
3 28,300 9,900

a-
1

If the required return is 11 percent, what is the profitability index for both projects? (Do not round
intermediate calculations. Round your answers to 3 decimal places, e.g., 32.161.)

Profitability
Index

Project I
Project II

a-2 If the company applies the profitability index decision rule, which project should the firm accept?

Project I
Project Il

b-
1

What is the NPV for both projects? (Negative amounts should be indicated by a minus sign. Do not
round intermediate calculations and round your answers to 2 decimal places, e.g., 32.16.)

NPV
Project I $
Project II $

b-2 If the company applies the NPV decision rule, which project should it take?

Project I
Project II

References

Worksheet Learning Objective: 09-01 The
reasons why the net present
value criterion is the best way to
evaluate proposed investments.

Section: 9.6 The Profitability Index

Difficulty: Basic Learning Objective: 09-07 The
profitability index and its relation
to net present value.

Mahjong, Inc., has identified the following two mutually exclusive projects:

Year Cash Flow (A) Cash Flow (B)
0 –$37,200 –$37,200
1 19,570 7,060
2 15,070 13,560
3 12,570 20,050
4 9,570 24,050

Required:
(a) What is the IRR for Project A?

(Click to select)

(b) What is the IRR for Project B?

(Click to select)

(c) If the required return is 12 percent, what is the NPV for Project A?

(Click to select)

(d) If the required return is 12 percent, what is the NPV for Project B?

(Click to select)

(e) At what discount rate would the company be indifferent between these two projects?

(Click to select)

rev: 09_18_2012

References

Worksheet Learning Objective: 09-01 The
reasons why the net present
value criterion is the best way to
evaluate proposed investments.

Section: 9.5 The Internal Rate of Return

Difficulty: Basic Learning Objective: 09-05 The
internal rate of return criterion
and its strengths and
weaknesses.

Assignment Print View

Consider the following two mutually exclusive projects:

Year Cash Flow
(A)

Cash Flow
(B)

0 –$ 347,000 –$ 49,500
1 48,000 24,300
2 68,000 22,300
3 68,000 19,800
4 443,000 14,900

Whichever project you choose, if any, you require a 15 percent return on your investment.

a-
1

What is the payback period for each project? (Do not round intermediate calculations and round
your answers to 2 decimal places, e.g., 32.16.)

Payback period
Project A years
Project B years

a-2 If you apply the payback criterion, which investment will you choose?

Project A
Project B

b-
1

What is the discounted payback period for each project? (Do not round intermediate calculations and
round your answers to 2 decimal places, e.g., 32.16.)

Discounted payback period
Project A years
Project B years

b-2 If you apply the discounted payback criterion, which investment will you choose?

Project A
Project B

c-
1

What is the NPV for each project? (Do not round intermediate calculations and round your answers
to 2 decimal places, e.g., 32.16.)

NPV
Project A $
Project B $

c-2 If you apply the NPV criterion, which investment will you choose?

Project A
Project B

d-
1

What is the IRR for each project? (Do not round intermediate calculations. Enter your answers as a
percent rounded to 2 decimal places, e.g., 32.16.)

IRR
Project A %
Project B %

d-2 If you apply the IRR criterion, which investment will you choose?

Project A
Project B

e-
1

What is the profitability index for each project? (Do not round intermediate calculations and round
your answers to 3 decimal places, e.g., 32.161.)

Profitability index
Project A
Project B

e-2 If you apply the profitability index criterion, which investment will you choose?

Project A

Assignment Print View
Project B

f.Based on your answers in (a) through (e), which project will you finally choose?

(Click to select)

References

Worksheet Learning Objective: 09-02 The
payback rule and some of its
shortcomings.

Learning Objective: 09-07 The profitability index and its relation
to net present value.

Difficulty: Basic Learning Objective: 09-03 The
discounted payback rule and
some of its shortcomings.

Learning Objective: 09-
01 The reasons why the
net present value
criterion is the best way
to evaluate proposed
investments.

Learning Objective: 09-05 The
internal rate of return criterion
and its strengths and
weaknesses.

Assignment Print View
Assignment Print View1
Assignment Print View2
Assignment Print View3
Assignment Print View4
Assignment Print View5
Assignment Print View6
Assignment Print View7
Assignment Print View8
Assignment Print View9
Assignment Print View10
Assignment Print View11

Analyze access controls used to secure information systems (IS).Explore best practices for controlling access to data and systems.

SEC 3302, Advanced IS Security 1

Course Learning Outcomes for Unit IV
Upon completion of this unit, students should be able to:
1. Analyze access controls used to secure information systems (IS).Explore best practices for controlling access to data and systems.

2. Examine encryption types used for the physical security protection of an organization.

2.1 Explain the general principles of security for a network.
Required Unit Resources
Chapter 4: Secure Networks
In order to access the following resource, click the link below. You can access the transcript for the video by
clicking on the three dots below the video on the right, then clicking “Open transcript.”
Professor Messer. (2021, April 7). Secure networking – SY0-601 CompTIA Security+ : 3.3 [Video]. YouTube.


Unit Lesson
Principles of Secure Networks
Today, employees bring their own electronic devices to work, use personal hot spots, and tether their
cellphones to laptops. How do you keep your corporate network secure in light of all this?
It should be noted that network security, like information technology (IT) security, has to constantly adapt in
response to challenges such as these. As attackers learn more ways of exploiting weaknesses, security has
to learn ways to protect its infrastructure. Basically, as technology improves, security has to keep up. Chapter
4 covers some of the attacks that occur on networks. It also discusses defenses against these attacks. We
cannot cover them all in this lesson, but they are important to learn, so please read the chapter. You are also
encouraged to research further into the topic to learn more.
While the previous unit addressed protecting communications through the use of cryptography, this unit is
more concerned with how networks themselves are maliciously attacked. Messages in modern
telecommunications can be attacked both through their means of conveyance and through the route they
take. A secure network environment must be created that will prevent these attacks. The principles of
availability, confidentiality, functionality, and access control should be utilized to effectuate this security, as
described in the textbook.
UNIT IV STUDY GUIDE
Securing Networks

SEC 3302, Advanced IS Security 2

UNIT x STUDY GUIDE
Title
Because access control is so important, we will return to that subject in Chapter 5. For now, let’s jump right
into some of the attacks that networks encounter and how they work.
Denial-of-Service (DoS) Attacks
One consideration when securing a network is that security involves more than just intruders. Securing a
network requires a balance between keeping your system and data secure and allowing users the access
they need. As mentioned above, the first goal of a secure network is availability. Authorized users have to be
able to access their data, services, and applications. Availability can be affected by conditions like poor
coding or the complications that arise when a large site links to a small site and overwhelms the smaller site.
But there are also intentional attacks that impact access. One of the most well-known is the DoS attack, which
can grind a system to a halt and cause an enormous amount of financial damage.
DoS attacks operate by stopping a service, such as a web service, or by degrading service. A service-
degrading attack can be especially damaging because it cannot be easily identified. A slow degradation of
services may not even be immediately recognized as an attack and may cause damage for a long time before
being discovered. Even worse, the entity who is attacked may spend valuable resources upgrading systems
unnecessarily when they see that their service is not allowing sufficient and reliable access to customers.
DoS attacks can be direct or indirect. They may utilize tactics such as flooding, spoofing, or backspatter, and
they may do their damage through the use of intermediaries, bots, and handlers. These concepts are covered
in your readings and should be reviewed.

SEC 3302, Advanced IS Security 3

UNIT x STUDY GUIDE
Title

Unlike other system attacks, DoS and distributed DoS (DDoS) attacks do not focus on stealing

information or other assets. Instead, these attacks are intended to prevent legitimate users from
accessing servers and services by flooding the servers with more traffic than they are set up to

handle so that they become more and more sluggish until they are either unable to respond or they
crash from the overload. DoS attacks may originate from one machine or system; for DDoS attacks,

multiple systems attack the target, as illustrated in the graphic above.
Defending against DoS attacks can be tricky, even when the attacks are detected. We have some tactics that
can get the system out of trouble, though each tactic has its strengths and weaknesses. One defense, known
as blackholing, drops all of the Internet Protocol (IP) packets from an attacker. While this will stop traffic, the
attacker can simply change IP addresses and restart the attack. Even worse, if an attacker knows blackholing
will be done automatically, they can spoof the attack packets from a known, legitimate corporate partner—
which will cut off that desired traffic.
Other tactics to fight DoS attacks include validating the handshake and rate limiting, which involves limiting a
certain type of traffic to a reasonable amount. Unfortunately, rate limiting can have the unintended impact of
limiting legitimate as well as illegitimate traffic.
Address Resolution Protocol (ARP) Poisoning
ARP poisoning is an attack that is specific to local area network (LAN) traffic. For the attack to work, the
attacker must have a computer on the local network. ARP tables are manipulated to reroute LAN traffic, which
effectuates an attack on both network confidentiality and functionality. In contrast, remember that DoS attacks
are an attack on the availability of a network.
The attack works by taking advantage of the fact that hosts on the same network have to know each other
before they can start exchanging packets using IP addresses. Hosts thereby build ARP tables, and after
validation, the hosts trust all ARP replies. This opens the door for spoofing, allowing the attacker to
manipulate the tables and create false entries for internal hosts and gateways. The stream of spoofed ARP
replies have to be continuous to keep the tables from self-correcting.
ARP poisoning can be prevented using methods like static ARP tables, which involves manually setting tables
that cannot be dynamically updated. A weakness with this method is that business changes will require a
huge amount of work to manage static ARP and IP tables. Another method would simply be to limit local
access by preventing foreign hosts from operating on the LAN. This is a form of network access control,
which we will now discuss further.

SEC 3302, Advanced IS Security 4

UNIT x STUDY GUIDE
Title
Access Controls
Corporate LANs require protection to ensure confidentiality of data sent across the network, but they must
also provide access controls so that only authorized users are allowed on the network. In modern companies,
an intruder can access wired LANs from a wall jack or Ethernet wires, and wireless LANs can be accessed by
radio through an unprotected wireless access point. After gaining this access, an intruder can use a packet
sniffer to detect, intercept, and read traffic. To prevent this from happening, access controls must be utilized in
both wired (Ethernet) networks and wireless networks.
Ethernet LAN security utilizes standards such as 802.1X (port-based access control), extensible
authentication protocol (EAP), and radius servers—each of which functions in different ways and contains
different authorization, audit, and authentication features. These standards and protocols are detailed in your
Chapter 4 readings.
Wireless networks are often attacked using one of three major attack forms:
1. unauthorized access to the network;
2. an attack using an “evil twin,” which is also known as a man-in-the-middle attack; or
3. wireless DoS attacks, which are similar to the DoS attacks we discussed earlier in that their main aim

is to negatively impact the availability of a network.
These attacks prevent the host from accessing a wireless network by utilizing tactics such as flooding the
frequency with electromagnetic interference (EMI) or radio frequency interference (RFI). These tactics make
data packets unreadable due to “noise,” or disturbances in the electrical signal. Another method is to flood the
access point (AP), which would result in the AP using all of its resources to send and receive attack packets
and thereby effectively deny access to any other host. Lastly, attack commands can be sent to APs or clients
that result in a continuous stream of spoofed messages, request-to-send (RTS) frames, or clear-to-send
(CTS) frames that prevent clients from connecting to the AP.
Conclusion
As we stated at the beginning of the lesson, there are clear goals that must be determined when considering
how to secure a networking environment. These goals consist of availability, confidentiality, access control,
and functionality. When dealing with common attacks, such as DoS, ARP poisoning, and attacks on wired and
wireless LANs, one must keep these goals in mind.

Course Learning Outcomes for Unit IV
Required Unit Resources
Unit Lesson

Principles of Secure Networks

Denial-of-Service (DoS) Attacks
Address Resolution Protocol (ARP) Poisoning

Access Controls
Conclusion

Explain the characteristics and complexities associated with assessment and treatment of co-occurring disorders. 

 

Explain the characteristics and complexities associated with assessment and treatment of co-occurring disorders. 
Describe challenges associated with the case of Elena. 
If you were creating a 30-day treatment plan for Elena, identify two short-term goals based on challenges that Elena is facing. Include an action step that you would include in her treatment plan. 
Post your completed Treatment Plan.

  
Elena is a 44-year-old hearing-impaired Latina female who was admitted to the inpatient treatment facility for alcohol dependence where you are a counselor working with people with addictions. During her admission, Elena expressed reluctance to undergo treatment, stating that her family did not approve of counseling or psychiatric services because they see it as a sign of weakness. During her admission, she began crying and had difficulty stopping. She stated that her husband left her and that her two teenage children were home alone. Elena was inebriated, under emotional distress, and ended up being carried to her assigned room by two staff members.
Your psychosocial intake assessment revealed Elena is also manifesting signs and symptoms of a major depressive disorder. You know that Elena needs help with her alcohol addiction, but you also know that her depression might be a cause or an effect of alcoholism.
Addressing the needs of diverse populations and co-occurring disorders can be a challenging aspect of addiction counseling. This week, you evaluate strategies for addressing the complexities of co-occurring disorders, also known as co-morbid disorders, and you create a 30-day addiction treatment plan for Elena as presented in the case study above.

Write a white paper on a company of your choice and discuss the market segmentation within that industry along with the target market for the company and the selection process for that target market. 

Write a white paper on a company of your choice and discuss the market segmentation within that industry along with the target market for the company and the selection process for that target market. 
COMPANY CHOSEN IS CHIPOTLE MEXICAN GRILLE 
Required Elements:

Include demographic, psychographic, geographic, and behavioral characteristics for the selected company.
A positioning statement for the company with careful consideration of their brand and strategy
es.

Describe Allport?s concept of functional autonomy

Murray:Murray made a list of 20 needs (primary, secondary, reactive, and proactive needs) that people have in their lives.  Design a list of five (5) secondary needs you believe people need.  Now justify your decision on why you would include each need you listed.Murray outlined in his research the need for affiliation and the need for achievement.  Describe and outline what would be two advantages and two disadvantages in having a high need for affiliation and a high need for achievement?Murray had an interesting take on the issue of the role of tension in life?describe what Murray said about the role of tension in the development of personality.  Why should we or should we not desire a life free of tension?Erikson:Give a real-life example of a person who is having an identity crisis.  What kind of confusion of roles would this person have?  What would this person need to do to have a positive identity resolution rather than a negative resolution?Why was the quality of the parent-child relationship so important to Erikson?  Discuss at least five (5) things that Erikson would have said a parent should do to encourage the basic strengths in children younger than 11 years of age.Define Erikson?s concepts of maldevelopment and malignancy.  Why are these bad for your personality?  How can these conditions be corrected (be specific)?Think about Erikson?s theory in terms of cultural bias.  What aspects of his theory are cultural-specific versus universal to all cultures?  What aspects of his theory relate to culture-specific child rearing practices that may not be shared across all cultures?  You may need to use web resources for this question.Think about Erikson?s theory in terms of gender bias.  Is his theory equally pertinent to both genders?  Be specific?are there any of his stages or crises that might have different crises or might be resolved differently for males versus females? You may need to use web resources for this question.Allport:Describe four characteristics of a trait.  How do traits differ from attitudes?Describe Allport?s concept of functional autonomy.  What role does it play in the development of personality?  What is the relationship between our motivation (work motivation, love motivation, exercise motivation, etc.) and our different levels of functional autonomy?Allport listed several components that must be present for a person to attain psychological maturity (his term for mental health) as follows:1. Specific, enduring extensions of self2. Dependable techniques for warm relating to others3. Emotional security and self-acceptance4. Habits of realistic perception5. Problem-centeredness and the development of problem-solving skills.6. Self-objectification (such as insight into your own behavior)7. A unifying philosophy of lifeIn your opinion, what is missing from this list of characteristics necessary for mental health and why?

What is the difference between Pain and suffering? Explain

ÿÿ
1. Uniform Determination of Death Act (UDDA):
o How this law was created
o Legal definition of death, describe
2. Define dying within context of faith, basic principle about human life
3. Bioethical Analysis of Pain Management – Pain Relief
4. What is the difference between Pain and suffering? Explain
5. Diagnosis / Prognosis: define both.
6. Ordinary / Extraordinary means of life support. Explain the bioethical analysis.
7. Killing or allowing to die? Define both and explain which one is ethically correct and why?
8. Catholic declaration on life and death; give a summary of this document: https://ecatholic-sites.s3.amazonaws.com/17766/documents/2018/11/CDLD.pdf (Links to an external site.)
9. What is free and informed consent from the Catholic perspective?
10. Define Proxi, Surrogate
11. Explain:
o Advance Directives
o Living Will
o PoA / Durable PoA
o DNR

Discuss the difficulties in measuring the intelligence of machines.

Assignment 1:Complete the following assignment 1 in one MS word document:Chapter 1 ?discussion question #1 & exercise 15 (limit to one page of analysis for question 15)[ Discussion question – Survey the literature from the past six months to find one application each for DSS, BI, and analytics. Summarize the applications on one page, and submit it with the exact sources.] – 1 page[Exercise 15 – Find information about IBM Watson?s activities in the healthcare field. Write a 1 page report. ] – 1 pageChapter 2 ? discussion question #1 & exercises 4, 5, and 15 (limit to one page of analysis for question 15)[ Discussion question 1 – Discuss the difficulties in measuring the intelligence of machines. ] – 1 page[ Exercise 4 – Describe the difference between machine vision and computer vision. ]  – .5 page[ Exercise – 5 – How can a vacuum cleaner be as intelligent as a six year- old child? ] – .5 page[ Exercise – 15 – Distinguish between dumb robots and intelligent ones. ] – 1 pageWhen submitting work, be sure to include an APA cover page and include at least two APA formatted references (and APA in-text citations) to support the work this week.All work must be original (not copied from any source).=====================================================Assignment 2  – Discussion 1Discussion 1 (Chapter 1): Compare and contrast predictive analytics with prescriptive and descriptive analytics. Use examples.Note: The first post should be made by Wednesday 11:59 p.m., EST. Your response should be 250-300 words.  Respond to two postings provided by your classmates. [ My initial post – 25 ] [ Student response 1 – 1 paragraph / .5 page ] Student response 2 – 1 paragraph / .5 page ] There must be at least one APA formatted reference (and APA in-text citation) to support the thoughts in the post.  Do not use direct quotes, rather rephrase the author’s words and continue to use in-text cit

You will focus on the description of the current policy, a description of key stakeholders, and a description of key factors or multidisciplinary impacts for the policy. Describe the key stakeholders who have a significant interest in the problem being addressed by the policy

You will focus on the description of the current policy, a description of key stakeholders, and a description of key factors or multidisciplinary impacts for the policy. This section should demonstrate a good understanding of the policy. The overview of the current policy should provide details about the policy being analyzed as well as a description of the target audience for the policy. Describe the key stakeholders who have a significant interest in the problem being addressed by the policy. The key factors, or multidisciplinary impacts, are those factors that affect stakeholder viewpoints that need to be considered when analyzing the policy problem. These factors can include:Part 2 will include the following components in a narrative:VII. Key Factors/Multidisciplinary Impacts 

Load manually College data aboveÿ in Excel Sheet and manipulate the data to address the following: 1. Summarize the data using Excel Descriptive Statistics 2. Create a pie-chart for Year in College

Download Week 4-College – Data.pdf

Load manually College data aboveÿ in Excel Sheet and manipulate the data to address the following:

1.
Summarize the data using Excel Descriptive Statistics

2.
Create a pie-chart for Year in College

3.
Create a Histogram for IQ, include Normal distribution density curve.

4.
Make a scatter plot with IQ and x-axis and Exam Grade on y-axis, include trend line.ÿWhat can you conclude?

5.
Make a scatter plot with sex (gender) on the x-axis and IQ on the y-axis, include trend line.ÿWhat can you conclude?

Problem Guide:

1. You will manipulate and analyze data using Excel or SPSS.
2. You will copy charts, graphs, tables, from Excel or SPSS into a Word document.
3. Write a report on your findings in the Word document referencing the charts, graphs, and tables from Excel or SPSS.
The original questions must be typed out as headings, with follow up answers + charts, graphs, and tables in paragraph format, and a summary or conclusion at the end of the paper. Problems have no references limit and must be in APA format.

× How can I help you?