Discussion and response: what is the purpose of technology? what is | BA 634 Current and Emerging Technology
Discussion Forum Topic: What is the Purpose of Technology? What is the role of technology in business solutions? Tell us about a technology your purchased for your home or work that did not work efficiently. Explain how it failed to meet the purpose & role of technology. What can you do or recommend to make the technology better?
Discussion post should be about 300 words with 2-3 APA (6th) citations and matching references. ONE needed response should be about 125 words with on citations, but greet classmate by first name.
Acct 346 managerial accounting ( devry ) week 7 dqs and course
ACCT 346 (Introduction to Managerial Accounting)
Week 7
Discussion 1-Evaluating Management Performance
Responsibility Centers (graded)
Compare and contrast the three types of responsibility centers. What is the best way to evaluate a manager’s performance in each type of center?
Discussion 2– Evaluating Management Performance
Financial Statement Analysis (graded)
Why do managers analyze financial statements? What are they looking for?
Week 7 Assignment: ACCT 346 Week 7 Course Project Part 6
Current events related to macroeconomics + infographic : interest
1. Current Events Related To Macroeconomics
150 words – summarize the article
150 words – summary to Macroeconomics. (use pdf to reference macroeconomic theory and concept related to article
Format : times new roman, 12 point pitch doble space
Emphasized spelling, grammar, punctuation
Do not copy the article. Follow grading rubric
Citation format: APA7 (article link)
2. Infographic : Interest Rates vs Inflation Rates
What is the relation between Interest Rates and Inflation Rates?
Create an infographic From your perspective what is the relation between Interest Rates (controlled by the Federal Reserve) and the Inflation Rate?
Tvm assignment | Management homework help
Acme Manufacturing, Inc. was originally a family owned operation that has been in business for several generations. It has grown steadily and is now listed on the stock exchange with family members still owning a substantial portion of the shares. Over the years, the company has acquired a reputation for exceptional quality and has won awards from major customers. The firm is 55% equity financed; shares currently trade at $37.00 and do not pay a dividend. Debt capital is provided by a single issue of bonds (20 year, $1,000 par value, $82.50 annual coupon) currently trading at $1,175. The firms beta is 1.25. Their traditional hurdle rate has been 12%, though the rate has not been reviewed in many years. Over the years, shareholders have come to expect a 10% return. Their corporate tax rate is 25%. Treasury securities are yielding 5.25%. The market rate of return on equities is 9.25%. The Machine Tool Division is considering the purchase of a piece of highly-automated, robotic production equipment. It would replace older machines and would offer improvements in quality, and some additional capacity for expansion. Because of the magnitude of the proposed expenditure, a careful estimate of the projects costs and benefits is needed. They are currently using several old-style machines that together had cost $700,000. Depreciation of $220,000 has already been charged against this total cost; depreciation charges are $80,000 annually. Management believes these machines will need to be replaced after six more years. They have a current market value of $250,000. The old machines require 12 workers per shift earning $13.50/hr plus 3 maintenance workers paid $14.50/hr. The plant operates day and afternoon shifts five days each week; maintenance workers are assigned to the afternoon shift only. Maintenance expenses have been running at $5,000 annually; the cost of electricity has been $26,600 per year. The production process is not only labor intensive, but also physically demanding. Workplace injuries are not uncommon and lately medical claims have increased. The new machine will have a total cost that includes shipping, installation and testing of $1.5 million. The plant will also need $350,000 in modifications to accommodate the new machine. These costs will be capitalized and depreciated over the six-year estimated life of the machine. The new machine would require only two skilled operators (one per shift) who would earn $20/hr. Maintenance will be outsourced and cost $90,000 per year. The annual cost of electricity is estimated to be $50,000. Certain aspects of the decision are difficult to quantify. Managements relationship with the union hasnt always been a smooth one and union leadership may not agree to the layoff of the redundant workers. Reassigning them to positions in other divisions might be easier but there are currently only a handful of suitable openings, some of which are not in the collective bargaining unit. The specs on the new machine indicate that even higher levels of product quality and lower scrap rates are possible. In light of ever-increasing competition, this might prove to be of enormous competitive advantage. The new machine has a maximum capacity 27% higher than the old semi-automated machines which are currently operating at 90% capacity.
Assignment Parts: a. Calculate the firms Weighted Average Cost of Capital. b. Identify and analyze the relevant cash flows for the two alternatives buying the new machine vs. continuing to use the old ones. c. List and describe briefly any areas of uncertainty or concern for this project beyond the obvious ones described in the narrative. What effect might they have? Bullet points are just fine. d. Based on your results in parts b c, explain why you would or would not proceed with the new machine.
Week 8 ha tickets
Week 8 HA ticketsOn completion of this course you are hired by the company Tickets R Us. Part of your first project is to develop an application to assist with the selling of tickets. After discussing with your client, you identify that each ticket requires two attributes: a serial number and a price. You also identify that three types of tickets are sold: counter tickets, Web tickets, and discount tickets. Following are the specifications: 1. Counter tickets are sold on the day of the event at a ticket counter. They cost £50. 2. Web tickets are purchased on the internet. Web tickets purchased a week in advance of the event are £30 and those purchased less than a week in advance are £40. 3. Discount tickets are a type of Web tickets. They are available for students and senior citizens. They are 50 percent off normal Web ticket prices, i.e. if purchased a week or more in advance they are £15 and if purchased less than a week in advance they are £20. To purchase a discount ticket you either need to be a student or a senior citizen. Proper identification will be needed at the time the ticket is collected. The reason for the discount (student or senior) will be printed on the ticket. For this assignment implement the following:a. A class called Ticket which will be the superclass of both types of tickets (CounterTicket and WebTicket). All common fields and operations (methods) need to be implemented for this class. Following are additional specifications for this class 1. each time a ticket is made, a serial number is incremented. 2. A constructor Ticket() 3. a method public int getPrice() to return the tickets price 4. a method public String toString() returns a String. This return value can be used to print a ticket b. The class WebTicket inherits from Ticket. o A constructor WebTicket(int days) c. The class DiscountTicket inherits from WebTicket. o A constructor DiscountTicket(int days, String type) o Since discount tickets indicate the type of discount (i.e. student or senior), you will need to override the toString() method. d. Pricing information about the various tickets need to be given in the form of static variables as shown below: public static int COUNTER_TICKET_PRICE = 50;public static int WEB_TICKET_PRICE = 30;public static int WEB_TICKET_LT_WEEK_PRICE = 40;public static double DISCOUNT = 0.5;Please note that you have to place the static variables mentioned above in the appropriate classes (for example, Web ticket pricing information would be in WebTicket).To guide your development efforts as part of this assignment description you are provided a TicketsTst class and a test method. Include this class in your BlueJ project (easiest way would be to create a new TicketsTst class within BlueJ and then cut and paste the code you have been provided). For convenience, the test method is static. Hence, you do not need to create an instance of TicketsTst. Just right click on Ticketstst and run the test method. On running the test method your output should look like the following:Ticket: [ serial#: 0 Price: 30]Ticket: [ serial#: 1 Price: 40]Ticket: [ serial#: 2 Price: 50]Ticket: [ serial#: 3 Price: 20 Type: Student]Ticket: [ serial#: 4 Price: 15 Type: Senior]Total sales: 155Create a new project in BlueJ by clicking on the menu option Project New project. This will create a folder with the project name (see below). All BlueJ project related files for this project will be stored in this folder. Create new classes by clicking on the [New Class] button. All Java class files that you create (.java files) will be stored in the BlueJ project folder. The project folder will contain other files as well. After completing and testing your assignment, zip the entire BlueJ folder and submit it. Since your instructor will need all files in the project folder, make sure you zip the entire folder. For this assignment the names of the BlueJ project, Java class files, and the zip file you submit are given below: 1. BlueJ project: tickets 2. Java classes: Ticket.java, CounterTicket.java, WebTicket.java, DiscountTicket.java 3. Submit: tickets.zip
Interpersonal process recording | Nursing homework help
This assignment will help prepare you for conversations with clients with a mental health condition.
Course Competency
Describe the foundations of mental health nursing.
Transferable Skill
Communication: Displaying capability in writing, reading, and oral communication; understanding of non-verbal language.
Instructions
It will be carried out with two students working together. This is a role play exercise, in which one student is the student nurse, and the other will role play as a client. In this assignment, the nursing student will be demonstrating the therapeutic nurse-client relationship and analyzing the therapeutic and nontherapeutic techniques used. You will take turns in the roles.
This is not about always having therapeutic responses. It is about learning from practice and review. It is expected that you will think of other ways to respond or interact with the client that may be more therapeutic after the interaction is terminated. After the conversation is over, you will complete in IPR form.
The client roles are:
Mr. Jones is a 69-year-old retired engineer. He was admitted to the in-patient psychiatric unit the previous day. His daughter had called the police when he locked himself in his bathroom and refused to come out. She thought he was suicidal. He was brought to the hospital by the police and was admitted on involuntary status. He has been reticent since admission but told his daughter he had no reason to live since his wife died.Diagnosis: MajorDepressive DisorderNursing Diagnosis: Risk for suicide.
Mrs. Alvarez is a 34-year-old female who has lived in this country for the past 10 yrs. She is a stay at home mom with three small children. Her husband works two jobs to support the family. Lately, she has been extremely anxious and fears that her children will become ill or injured. This seems to be an unrealistic concern, but she has been unable to sleep well and has lost 15 lbs. in the past month. She is a voluntary admission and states she knows she needs help.Diagnosis: Generalized Anxiety DisorderNursing Diagnosis: Ineffective coping
You will select the role you wish as a client and take turns switching roles. After the conversation, you will document the interactions using the form provided and following the guidelines instructions for each column.
IPR Form Explanation
The IPR is completed with the form to guide you, and the rubric to explain the grading process for content.
The IPR Form is linked here.
The first column is for you, the nursing students, comments/ questions, and responses. You may want to include the introduction process. It is understandable if the initial conversation is more superficial to establish rapport. You may not want to include all of this but move on to the more focused interaction. Your nonverbal communication is included here.
Then, the conversation will move to a focus on the clients feelings, concerns, issues as he/she has identified them. After the introduction, it may be beneficial to establish with the client a short- term goal for the interaction.
The second column is for the clients comments, questions, responses. Also, the nonverbal reactions of the client are included in this column.
The middle column is for you to write what you are thinking or feeling.
The last two columns are for you to document the technique that you used in that portion of the conversation. If it is a nontherapeutic response, you are to write the response and think of how you could revise to more therapeutic response. You can change any response if you think of how you could have responded differently but, identify and change all nontherapeutic responses.
Remember, this is an assignment that will assist you in all communication with others.
Explanation of the Rubric Criteria for Interpersonal Process Recording (IPR)
Communication (20 verbal entries, ten nonverbal, ten techniques)
Criteria 1 Nursing Interaction (verbal and nonverbal)Nursing statements and questions demonstrate a positive, caring approach and show insight into the client needs. These interchanges will include the introduction process, but not the more superficial interchanges. Nonverbal communication techniques are also recognized. Thoughts and feelings are identified and documented.
Criteria 2The client verbal statements and questions are documented. Nonverbal communication is also observed and interpreted. You may also identify defense mechanism(s) used by the client.
Criteria 3All communication techniques used are identified (using titles previously reviewed).
Criteria 4All non-therapeutic techniques to be identified and changed to a therapeutic method. If in the review of the interaction, a more appropriate or therapeutic approach (verbal or nonverbal) is identified, document how this response/ statement would be changed
ISSC 341 Central Texas College Intro to Networking Discussion
Hello,I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.Questions:Routing protocols use metrics to decide on the best path on the network. Name two different metrics and explain how routing protocols use these metrics to decide on the best path. Student one:Hello and good Morning Class,For this weeks forum I have chosen to discus OSPF (Open Shortest Path Frist) and EIGRP (Enhanced Interior Gateway Routing Protocol). Starting with OSPF first it is most commonly used in large enterprise network and is a link state routing protocol. OSPF uses the Dijkstra algorithm and sends update out on the network to look for network changes to automatically update the routing table. OSPF areas are a group of router on the network and when one area gets to large you simply would just add a new area to the current and area Zero is the backbone area that all other area must use to send data to other areas within the network. Another aspect of OSPF is the dead time when a router dead time gets to zero it is presumed dead and the link will be removed from the SPF calculations.The next routing protocol would like to discuss is EIGRP, which uses every little network resources during normal operation only sending hello packets out on a stable network hello packet are sent to check status of the other connect routers and the timers or interval can be adjust to meet your given requirements. This helps when you have a link go down the redundant link will failover almost instantaneously and service interruption should not be noticeable. EIRGP will chose its path to another location on the network by counting the number of hops it take to get to the other router if one path as 3 and the other 2 it will choose the path that only has two. Within a cisco router you can use command like show ip eirgp neighbors to see what other routers are connect to interface within the router you are currently log in to. Both of these protocols are good and are in common use today. I hope you all have a great week. -RandyStudent two:Routing protocols use metrics to decide on the best path on the network. Name two different metrics and explain how routing protocols use these metrics to decide on the best path.Before looking at the two routing protocol metrics I wanted to quickly touch on the administrative distance (AD) for routing information which I thought was interesting. AD distinguishes the trustworthiness received on one router from its neighboring router. It is illustrated using a number range from 0 to 255, where 0 is the most trusted and 255 is the least. The AD is one of the first things the router checks and whichever path has the lower value is included on the routing table. Each routing protocol has a default AD value and the router will automatically trust a connected interface, known as a static route (Lammle, 2012).The two protocols I chose to further discuss are Routing Information Protocol (RIP (AD-120)) and Enhanced Interior Gateway Routing Protocol (EIGRP (AD-90)). Note that the highest default AD is 255 which our texts says will never be used (Lammle, 2012). RIP works by sending its complete routing table to all active interfaces every 30-seconds and makes the best route determination through use of what is called the hop count only. RIPs maximum hop count is 15, meaning a hop count of anything higher would be unreachable. A hop count is the number of additional devices the information has to travel though before reaching its destination.With EIGRP, it uses an autonomous system concept to share routing information and also includes subnet mask information in its routing updates, unlike its predecessor IGRP. EIGRP is considered a hybrid protocol because it shares similarities of distance vector and link state based protocols in how it functions. EIGRP, being a hybrid holds several advantages over some of the other protocols such as IP/IPv6 support, more efficient neighbor discovery, and best path selection thru use of Diffusing Update Algorithm (DUAL). Through use of DUAL, EIGRP prevents data looping by calculating the both the best and alternate [best] path for travel. Works CitedLammle, T. (2012). CompTIA Network+ Study Guide, Second Edition (Exam N10-005). Indianapolis, IN: Wiley & Sons, Inc.
Nursing. discussion: using competency sets to critique lesson plans
Nursing. Discussion: Using Competency Sets to Critique Lesson Plans
Graduate nursing education advances innovation and strengthens the leadership needed to improve healthcare delivery. Education at this level incorporates the foundational knowledge, skills, and competencies needed to thrive in increasingly complex clinical environments. Nursing education is undergoing major change as the profession conceptualizes masters education and transitions advanced practice education to the doctoral level via Doctor of Nursing Practice (DNP) programs. Calls to reduce healthcare costs, persistent concerns about patient safety and the quality of care, and dramatic increases in diagnostic, therapeutic, and educational technologies all demand new thinking around the nature of graduate nursing education.
American Association of Colleges in Nursing
Though the above quote focuses specifically on graduate nursing education, Schools of Nursing around the United States are adapting both undergraduate and graduate programs to emphasize a stronger focus on evidence-based nursing competencies. At the departmental level, this process takes much time and collaboration. Curriculum teams comprised of nurse educators, field experts, and instructional design professionals meet with schools of nursing to revamp existing curriculum plans to the competencies needed of todays and tomorrows nursing students.
On a smaller scale, nurse educators are also implementing quick and effective strategies to align their current courses to evolving nursing competencies. By critiquing lessons before, during, and after instruction, nurse educators are able to assess their alignment to competency sets.
In this Discussion, you critique one of your own Lesson Plans to a competency set of your choosing.
To prepare
Review the article, Integrating the Institute of Medicine Competencies in a Baccalaureate Curricular Revision: Process and Strategies. Consider how and why the nursing program adapted its curriculum to emphasize Institute of Medicine competencies.
Review the competencies presented in this weeks Learning Resources. In addition, reflect on the competencies that you might be familiar with through your own studies and professional background. How do competencies help to guide academic and professional practice?
Review the Lesson Plans that you have developed in this course. Select one to further investigate for this Discussion.
Critique your lesson using a competency set. For example, if your Lesson Plan addresses interprofessional collaboration and your intended audience of learners is Masters students, you might critique your Lesson Plan using QSEN indicators. As you conduct your critique, identify specific competencies addressed in your lesson. Then, consider ways that you might modify your lesson to prompt a deeper understanding of nursing competencies.
Questions to be addressed in my paper:
1. A brief description of your lesson (Pulmonary Edema) and the competency set (patient-centered care, evidence-based practice and quality improvement) that you selected.
2. Explain how your lesson engaged learners in one or more competencies.
3. Explain whether your lesson should be modified to include a deeper understanding of these competencies and why.
4. Support your response by including references to your lesson, your own experiences, and this weeks Learning Resources.
Reminders:
1. At least 2 pages
2. Put citation and references 2011-2016.
3. Check my uploaded pulmonary edema lesson plan.
Required Readings
Hickey, M. T., Forbes, M., Greenfield, S. (2010). Integrating the Institute of Medicine competencies in a baccalaureate curricular revision: Process and strategies. Journal of Professional Nursing, 26(4), 214222. Retrieved from the Walden Library databases.
This article describes how a School of Nursing retailored its curriculum to include the Institute of Medicine competencies.
American Association of Colleges of Nursing. (n.d.). Essential series. Retrieved from http://www.aacn.nche.edu/education-resources/essential-series
At this resource, you can review the curriculum content and expected competencies of students pursuing nursing degrees. In addition, you can examine the critical changes that the AACN is taking to ensure that nursing curriculum mirrors the evolving needs of todays and tomorrows patients.
National Council of State Boards of Nursing. (2013). 2013 NCLEX-RN test plan. Retrieved from https://www.ncsbn.org/2013_NCLEX_RN_Test_Plan.pdf
Aligning learning experiences with NCLEX competencies can provide nursing students with the background that they will need to successfully pass the NCLEX. Browse this document to view the overarching competencies tested on the NLCEX examination.
National League for Nursing. (2011). Faculty programs resources: Nurse educator core competencies. Retrieved from http://www.nln.org/facultyprograms/competencies/educator_core_competencies.htm
Use this website to view NLN core competencies and nurse educator certification documents.
Quality and Safety Education for Nurses. (2012). Graduate KSAS. Retrieved from http://qsen.org/competencies/graduate-ksas/
Use the links provided at this website to review QSEN competencies.
CSS 410 Creation of The Internet Has Changed the World Discussion
Respond to at least three classmates by taking and defending the opposing position.The creation of the internet has changed the world. Not only do Americans have access to limitless libraries of information and content, but their ability to purchase goods and services from online businesses has grown exponentially. The jaw dropping expansion of internet enterprisesas well as the inexpensive products and services they providecan be attributed to the freedom the internet has enjoyed from government regulations over a majority of the past two decades. But this all changed in 2015 when the Federal Communications Commission (FCC)under order from the previous Administrationinstituted a policy called the Open Internet Order. The policy, commonly referred to as net neutrality, overturned decades of precedent that treated the internet as a realm where private individuals and groups could freely act and express ideas without the presence of government interventionharming innovation and thwarting the ability of businesses to freely compete for consumer dollars. While the term, net neutrality, conveys ideas of individual and business equity, the misleading phrase actually means government regulation of the internet.The previous Administrations decision to apply the same rules to the internet as they did to the telecommunications industry of the early twentieth century was a mistake. The internet is quite different than traditional utilitiessuch as electricity or water. The expensive upfront investments that lead to monopolies in these industries dont apply to internet service providers (ISP). In fact, while there are only a handful of traditional utility providers, there are roughly 4,400 ISPs across the country. When this level of competition is naturally present, government involvement will only impede internet consumers and businesses alike.But theres good news. The new FCC chairman has taken a hard stance on the issuevowing to open up the internet to pure free market competition once again. By removing the policy of net neutrality, the Trump Administration and his FCC chairman will not only remove government barriers from internet commerce, but will allow internet companies to thrive and consumer needs to be met more efficiently. (informationstation.org)2.The government regulating access would create a more effective internet. In Chapter 16-4i under “Does Information Want to Be Free” it states that giant media corporations who take advantage of their market power and hardball tactics to enrich themselves at our expense. Social media like Facebook treat their users like unpaid laborers, profiting from the content that users upload, without sharing the profits from advertisers with Internet users. Corporations use copyrights and patents to control the internet. (Chapter 16-4i) Under these references, it sounds to me like the free market regulation really is paid for by the users not corporations. If the government were regulating the effectiveness of the internet they would want to tax for what they control. This would be regulated the same for all internet users, not price varying like corporations manages. If we are focusing on “effectiveness of the internet” it is referenced in Chapter 16-4i under “Government: Hands Off or Hands On?” that government involvement could limit freedoms of privacy, safety and morality. (Chapter 16-4i) But this is at least being ran in a regimented fashion. What would large corporations do for internet crimes like terrorism or identity theft for internet users? They don’t have the authority to police these types of crimes. The government does, making it a more efficient option for the cost of taxation and internet freedoms.3. I would not usually take this particular side, but in this case, I would side with Government regulation. Because more damage could potentially be done with the free market. America is not restricted, like other countries when it comes to web browsing. All though I am entirely for the freedom we have by this. I still think this opens up to many dangers, and as the textbook references, we should take our responsibility to protect our-self online. Some people may not be capable of doing this or have the common sense or knowledge to protect themselves. Also, even though it is common knowledge that the government can and does track web traffic. I do not see any harm in this. As long as you are not committing a crime, there should not be an issue with the Government knowing what you are up to. Again this just increases our, safety if you are not doing anything wrong what difference does it make if the Government see what you google and what website you visit. The free market will always have the same common core at the bottom line, which is money. Therefore, public safety is not their main concern and may not be a concern at all. Also, allowing a few multi-billion dollar companies run everything will again in some way end up with a strain on the people financially. As well as some of the most significant profits to be made are typically doing dangerous and unethical things.
HRD Manchester College Semi-Structured or Unstructured Interviews Methodology Paper
Chapter 3: Methodology 1000 words. (exclude references)The dissertation should attempt to build upon the material covered in the literature review through a programme of further desk-based analysis, or possibly the collection of data in the field. This might take the form, for example, of: a short programme of structured, semi-structured or unstructured interviews (e.g. face-to- face, or by email); the collation of data from published sources such as via published case studies or other government or industry surveys. the collation of relevant policy documents, both published and unpublished (e.g. consultants reports, donor reports, again the list is endless); a structured questionnaire survey (again, face-to-face, by telephone or by email). You can structure this into Chapter 3 in the following way: Research questions and/or hypotheses Building on the key areas of interest you have identified in the literature review, the first part of Chapter 3 would normally contain a question or set of questions to be addressed by your dissertation, a particular issue to be explored, or a set of hypotheses to be tested. It is vital that you set out in detail the research questions, hypotheses, issues or problems your study addresses. This could take the form of either of the following: research questions, e.g. in what ways are organisations in developing countries formulating strategies for outsourcing information systems, what form do these strategies take in different types of organisations, and to what extent do strategies differ according to sector and country location? hypotheses to be tested, e.g. Cash transfers have led to greater expenditure by men than women within low-income households. The veracity of this hypothesis would be tested, possibly by using appropriate quantitative methods, or through qualitative interviews with relevant sources. However, you should bear in mind that it is not always possible to develop such research hypotheses for certain topics; and it may not be possible to collect the type of primary data that is required to test them effectively. A detailed description of the research question(s) may be more appropriate. In addition, it is vital that you devise hypotheses which are not over-ambitious: remember that your study is limited in both time and in the length of the final dissertation. Aims and objectives The second part of chapter 3 could show the aims and objectives for your study: Aims: these set out the overall purpose of the study. They are broad statements which explain what you are trying to achieve to a non-expert reader who may not be familiar with your topic area. Objectives: these are the specific operational targets which will assist in meeting the broad aims of the study. Since these objectives are clearly set out, they will be used to judge what you have been able to achieve at the end of your dissertation. It is thus unwise to be over- ambitious by setting objectives which are not realistically achievable. At the same time, devising clear objectives at the outset of your research will ensure that the work is sufficiently focused, and avoid the work being too generalised. Throughout your programme of research, you should constantly refer back to your objectives to ensure that what you are doing or writing is relevant, and to ensure that it will help to meet those objectives. For both aims and objectives, these should be stated as succinctly as possible, and should be revised, if necessary, as work progresses. Therefore it is quite possible that your questions, aims and objectives will all be covered in quite a short amount of text. Note, in outlining aims and objectives, you need to build on the conclusions of your literature review, the purpose of which in essence is to explain and justify the focus of your research. Research design Thirdly, having generated relevant research questions and/or hypotheses, you have to explain clearly how you will go about answering or testing these. In other words, you must give details of the research methods to be used, outlining the overall research design including any conceptual framework or model that you are using, and (in relevant cases) specifying methods of data collection (e.g. sources of published data that have been used, semi-structured interviews which have been conducted). You must attempt to justify the choice of your particular methodology, in light of the chosen research topic: you have to try to demonstrate why the methods selected are appropriate to answering a particular question, or investigating a given hypothesis. Why, for example, is a programme of interviews useful in investigating your topic? Why are particular data sources useful? Why have you chosen to collate a series of policy documents? Why have you selected particular case study areas? And how have you gone about investigating a particular case study? Example One: the use of a case study approach. You should explain briefly: Example Two: the use of interviews. You should explain briefly: I told my professor that I will interview 5 people who worked at Tencent China. The first interviewee is working at Tencent for 1 year, the other four interviewees are 2-3 years, 6 years, and one is more than 10 years. You can also choose one more form.And I will post the feedback from my professor for the research question you had last time.



