Reply 4-1 vt | Psychology homework help

Reply to:
 
Selective attention is defined as the ability to focus intentionally on a thought, stimulus or action while disregarding other stimuli. The state of attention influences the way the sensory information is processed, stored in memory, and acted upon. Because information processing has limitations at certain points, it can bottleneck; this happens particularly when there are competing stimuli and distractions attempting to be processed at the same time (Gazzaniga et al., 2019). As a result, the brain must be selective in which input is passed along the perceptual processing pathway.
There are two primary theories for how the brain decides what information will make it through both the primary and higher level processing of sensory input. Broadbent’s model of early selection proposed that irrelevant input would be sorted and disregarded in the primary and secondary processing stages, after the sensory input is processed (Gazzaniga et al., 2019). For example, in audition, the cochlear nerve may receive input and pass it along to the cochlear nuclei in the medulla, but only the most pertinent information. The prioritization of stimuli in this model is believed to be dictated by a top-down mechanism where the perception has already been formulated about what kind of information will be useful or pertinent for processing (Gazzaniga et al., 2019). This might occur in situations where an individual is primed to listen for a specific sound, or is expecting to hear words in a conversation. The early selection model was modified later to allow for the possibility that some of the irrelevant input may make it through these informational bottlenecks, but that the resulting data would be degraded or weaker by the time it reaches the cortex for perceptual integration (Gazzaniga et al., 2019).
From the other perspective, late selection theories propose that all sensory input is processed equally at the early stages, and prepared for integration in the thalamus and various parts of the cortex (Gazzaniga et al., 2019). The filtering then happens at this stage, where only the relevant stimulus will be sent to the higher levels of processing for the formation of memories, awareness, and a cognitive or physical response (Gazzaniga et al., 2019). This late selection model implies that all sensory information enters the mind and receives prioritization based on a bottom-up sequence; the brain forms perceptions based on the available sensory input, rather than selecting sensory input to process based on an expected perception (Gazzaniga et al., 2019). For example, a person standing in a crowded room would theoretically hear every conversation, and receive visual input from everything in their field of vision. Yet at the level of conscious perception, they may only be aware of the person standing in front of them and register the conversation they are having. Evidence of the bottom-up model may be demonstrated by the fact that in this same scenario, a person might catch snippets of another conversation or remember hearing someone say their name. In this way, all sensory input was processed, yet they only remember selective things that the brain prioritized as relevant.
Ultimately, both models demonstrate the power of attention in dictating what environmental stimuli are processed. Selective and voluntary intention enhances the possibility that stimuli will be successfully processed, while unattended stimuli may register in a primary sensory level, but may not receive conscious attention and therefore may be ignored in a sense (Gazzaniga et al., 2019).

JNU Cyberlaw New York State Government Discussion

DiscussionIn the discussion forum, describe an instance where the New York state government has taken some legislative action that has negatively influenced economic activity in the state of New York. Minimum 250 words. Reply 1:-As issues of financial disparity, sex segregation and environmental change picked up footing with voters in 2018, neighbourhood governments passed aspiring laws mirroring the moving political climate. New York’s constitution endorses the appropriation of forces among the parts of state government just as the arrangement of nearby government all through the state. The leaders of the rest of the offices, who each organize approach and exercises for a particular concern, are commonly delegated by the Governor with the exhortation and assent of the Senate. The primary special case is the Commissioner of Education, who is chosen by the Regents of the University of the State of New York.While these progressions unquestionably added to the critical 61 percent decrease in New York’s welfare caseload somewhere in the range of 1994 and 2004, a great arrangement of contention stays over the achievement of these strategies in lessening destitution and advancing long haul independence for the most helpless populaces. The Government of the State of New York, headquartered at the New York State Capitol in Albany, incorporates the authoritative structure of the U.S. territory of New York, as set up by the state’s constitution. Similarly to the US government, it is made out of three branches: official, authoritative, and legal.The leader of the official is the Governor. The Legislature comprises of the Senate and the Assembly. A solid and powerful administrative general wellbeing foundation is fundamental not exclusively to react to emergencies, for example, these yet in addition to address continuous difficulties, for example, avoiding or overseeing interminable ailments, controlling irresistible maladies, and checking the security of sustenance and water.Reply 2:-In this discussion, I am giving a brief overview of the “convenience of the employer” ruling by New York state that creates negative influence to telecommuters who were working from home from a non-New York state. In the modern world of advanced technology and communication using the latest smartphones and quicker internet speed combined with better leadership in organizations has allowed workers to telecommute. The number of employees telecommuting in the US has gone up drastically to 63 million by the year 2016 (Craig, 2013). This has led to questions on the taxation laws on the income of nonresidents. If a person resides in one state and is working in another state, it might be necessary to pay income tax in both states. This is true even when the person is at the work location for only part of the whole year. The reasoning for this is that a person might be availing all the public services at his or her home state where the home is, whereas his or her company is in a different state. This can lead to double taxation. An example is a person who lives in Connecticut and is a writer and writes from his home. If this person is officially employed in an organization in New York, it is possible that the person is taxed both by Connecticut and New York. This is, however, not the case for a person living in New Jersey and telecommuting for a job in New York. However, this person might be paying a higher tax in New Jersey even though it is not as high as double taxation. This extraterritorial taxation by New York for non-residents is an example where state government laws hurt the economic activities in the state of New York (Zelinsky, 2016).

JNU Business Intelligence Real-World Application of BI Discussion

DiscussionHow would one define business intelligence (BI)? Identify and briefly discuss a real-world application of BI. Reply 1:-Business intelligence (BI) uses programming ANd administrations to vary data into vital insight that develop an organization’s key and strategic business selections. Business intelligent practicality gets to and investigate information sets and to gift analytical findings in reports, synopses, dashboards, diagrams, graphs and maps to furnish shoppers with purpose by purpose data concerning the condition of the business. Despite of the actual factthat business intelligence doesn’t guide business shoppers or what is going to occur on the off probability that they take a selected step, neither is Business intelligencewith regards to making reports. Maybe, Business intelligenceoffers a path for people to seem at data to understand patterns and infer bits of information. within the current market we’ve excess of vendors United Nations agency area unit providing Business intelligencetools, from thatorganizations will opt for what they require. Microsoft, Qlik and Tableau Business intelligence tools area unit thought-about because the leaders and area unit principally employed by several corporations. Moreover Seattle-based coffee chain Starbucks is one in every of the foremost outstanding users of Business intelligence tools. Through its outstanding Loyalty Card program, Starbucks will hoard personalised get data on an enormous variety of shoppers. Utilizing this information and business data programming, the massive coffee organization would then be ready to anticipate what buys and offers a private shopper is perhaps progressing to be keen on. Apparently, the corporate advises the shoppers of all the offers, that they believe the client are inquisitive about. BI technology revolutionized and created tons of impact on however the organizations operate and fostered the expansion by anticipating the trends. Reply 2:-Many organizations use the technology of Business Intelligence (BI) which is a technology driven process in order to analyze the data to present the data with the actionable details. These information will help the managers, executives and corporate end users to view the information and make certain decision over the business (Moreno, Silva, Ferreira, Filardi, 2019). Thera re wide variety of tools includes for the BI and also the applications and other methodologies which allow companies to retrieve data from the internal processors. The data which has been retrieved from the internal systems and also the external sources will prepare the analysis (Kretzer Maedche, 2018). The analysis done by developing queries and run queries against the retrieved data which allows the implement the reports, data visualizations, and dashboards. These data visualizations give analytical results for the companies to take decisions and also use for operational workers. The companies able to use combine the data sets along with the BI tool such as querying, ad hoc analyzes, enterprise reporting, OLAP, operational BI, Mobile BI, SAAS, location intelligence, etc.As an example of the companies who uses the Business Intelligence technology is Starbucks. It’s a Seattle-based coffee chain who uses the BI via the program of loyalty card. They were able to collect the data which is related to individualized purchases on million customers. The information helped them to predict what items been purchased and offers a customers are mostly interested in. By getting this information, Starbucks able to give offers to the customers for them to take advantage of the offer more and also by using their mobile devices. This attracts the new customers also the customers who are already registered. It helps draw the customers more to stores very frequently and also helps the business to higher the sales. The Starbucks uses the CRM system and the company has combined the CRM system along with the BI to have the more effective information out of their data.

Did you know? hardware and software (discussion)

 
Initial Post: Respond to each prompt below.

Describe one hardware component that are essential to YOU as a consumer. Provide three options (brand, style, etc.) for the component.
Offer two new or interesting details about hardware and software from the consumer report. Write one question that you have about technology after reading the consumer report.

Example:
 
1.A hardware that I find very important and that we tend to forget is a printer. Especially the all –in-one printer that we can generally see in most electronic stores. Even though the trend is to go paperless, the majority of us cannot follow it. As a student, I need to print and scan papers few times a week, therefore an all-in-one printer is very essential for me.
Brand:There are too many brands out there that produce an all-in-one printer, but the most popular ones are: Canon, HP, Brother, and Samsung. I personally go with Brother, because compared to the other brands, Brother focuses in producing printers. Canon, HP, and Samsung all produce other electronic products.
Price:I take a quick look on Brother’s Website and an all-in-one printer’s price varies from $79.99 to $599.99. Of course, students or households don’t need to buy an expensive one. The $79.99 one is more than perfect and will last long if well taking care of. Also, many retail store may sell them at a lower price.
Features:An all-in-one printer gives you not only the possibility to print, but also to scan and to fax. Most them can print on different types of paper and also recto-verso. Scanning on these machines can be made by deposing the paper on the top tray or by placing the paper in the glass flatbed inside of the printer. Faxing is not as popular as it was before because of emails, but it can be something useful depending on the situation. To fax, paper has to be placed on the top tray and a phone number has to be entered on the keypad. One important feature that many people forget about is the possibility to connect the printer to Wi-Fi. This option is a must in today’s world because it let’s use print or scan from anywhere and from any device as long as we are connected to the same Wi-Fi. For example, I can print a document from my smartphone or tablet wirelessly.
2.After reading the Consumer Report about the all-in-one printers, I learned that it used a certain type of printing and I found out that an application to let us print from our smartphone or tablet is already downloaded in our devices.
Printing type:There are different types of printing and this product uses a a printing type named “Inkjet”. Inkjet prints paper by deposing droplets of ink on the paper instead of speaking it like other printers. It was interesting to see that this method of printing is very efficient. It takes less time for the ink to dry and it uses less ink than other printing procedures.
App:Imagine that we are reading an interesting article on your tablet and that we decide we want to print it. Normally, we would send the link of the article to our email, open the link from a computer, and then print the article. With the applications Apple AirPrint and Google Cloud Print already installed in our iOS or Android device, we can simply click on a button and our article gets printed. We don’t need to deal with the struggle of downloading the app or go through a third party application.
Question:After reading the Consumer Report and people reviews, I realized that printers are becoming less used with time. I wonder if it will stay among us or if it will join the floppy dick and the DVD player?

Discussion board: religion and work

RELIGION AND WORK by Carol  P. Harvey
Assumption College
In todays global society, it is useful to learn more about the religions that may be practiced by coworkers. Without some knowledge, individuals may attribute incorrect meanings to others behaviors. In addition, organizations may have policies and practices that inadvertently conflict with their employees religious beliefs. For example, some organizations do not allow vacation time to be accrued, thus preventing pilgrimages that may require a month of leave. Others require all workers to take Christian holidays and do not capitalize on the opportunity to have non-Christians work on days that have no significance to them. Jewish employees, for example may choose to work on Christmas Eve in exchange for having Yom Kippur off with pay. Because many individuals may be reluctant to discuss their religion or to explain its practices in a work setting, misunderstanding of behavior can result.
The following scenarios depict workplace incidents in which others are not aware of the religious basis for the individuals behavior. In each case, the employee is put in the limelight because of his/her religion. The supervisor or coworker, who has little or no knowledge of the religious practices that are at the root of these actions, may attribute an incorrect reason for the behavior that they see. These scenarios illustrate that lack of knowledge can lead to conflict, decreased productivity, and diminished motivation for workers as well as managers.
DIRECTIONS      
Each scenario illustrates the intersection between religion and the work­place. Pick one scenario,  conduct additional research if needed, and share your answers to the following questions with your classmates on the discussion board. Each question is worth 4 points totaling 16 points for Part A of the assignment.  For Part B, elaborate on another students post worth another 4 points.  The total assignment is worth 20 points.

Using only the information provided in the scenario, list the possible attributions (i.e., explanations of why this person is behaving as he/she is without knowing the real reasons behind the behavior) that coworkers and managers in the case might use to explain the persons behavior without understanding that person’s religion.
Discuss the negative and/or positive effects of these attributions on the work organization.
What should a manager do in this situation?
Explain the religious significance of this workers behavior. (NOTE: It is important to this exercise that this is the last step in the discussion.)

SCENARIOS

Mary Ellen comes to work with a dark spot on her forehead. Several times during the day, coworkers tease her about forget­ ting to wash her face and suggest that she visit the ladies room. 
David sits with his coworkers at a luncheon provided during a meeting. Chicken, with a creamy sauce, salad, and rice are served but he declines to eat and only sips water. People at the table ask him if he is feeling well. He keeps assuring them that he is fine.
Kaleen never attends any company informal or formal social events (drinks after work, trips to a nearby casino, holiday parties, etc.). In addition, in an organization where open doors are a strong cultural norm, his door is often closed for short periods of time. During his performance appraisal, his boss tells Kaleen that he needs to become more sociable and accessible if he expects to move into a management position.
Tyler works full time as an assistant manager in a large retail chain store that is open 12 hours a day, 7 days a week. It is company policy that all managers must rotate working on weekends. Tyler has been using many different excuses to avoid working on Saturdays. Although Tyler is a good worker, his boss no longer believes Tylers stories and will be noting this behavior in his next performance review.

UC Computer Science Network Security Management Discussion Responses

provide replies to below two Discussions:main que:What are three network security management best practicesAs most of the companies and organizations use internet, Information systems security. Computer and network security, it has become complex system and changes occur every day. It is important to develop a strong security strategy involves keeping one eye on the reality of Internet-speed changes in threats and technology, and the other on the reality of the corporate environment. It is necessary that the companies should know how and what to protect and what controls to put in place. This includes planning, policy development and the design of procedures. According to the January 2000 Internet Software Consortium’s Internet Domain Survey (www.isc.org/ds), there are more than 72 million hosts on the Internet. Given that many organizations do not advertise their internal name spaces, we know that many more computers are connected in some fashion to the Internet. Changes in network and security architectures, network security management is far more challenging and complex than just a few years ago (Bodhe, Masuti Umesh, 2016).Three network security management best practicesSecuring Hardening, preparing are three best practices in networkNetwork attacks are developing, and former resolutions might not be adequate to prevent future risks and attacks. This is the reason for one of the vital parts where network security best practices came into picture and having antivirus up to date in the system. Software updates should be installed, having effective anti-virus in the system will almost protect over 90 percent of instances. Installing patches is also an important aspect to be considered. System should be always secure and up-to-date. Logging should be enabled to track how is doing what, who logged into the system. Giving access on need base and eliminating privileges and access rights should be implemented as top network security standard. System administrators and network administrators should be able to identify the weaknesses.Hardening helps in solving known as well as predictable while preparing provides solution for unknown and unpredictable solutions. Always update the procedures and policies according to the trend. Implementing and exploring new tools to update configurations, policies and procedures as required.Best security management practices should me focused on four fields. They are when planning and executing the deployment on systems. Integrity maintenance. Providing awareness to the employees on security issues.Security teams support compliance mandates internally and externally, permit new facilities, improve routine, confirm obtainability, and provision the capability to troubleshoot professionally on mandate with no scope for mistake. That is a portion for steadiness when handling network security.Prevention is top network security practice.By the period to determine that the association has suffered a data breach, the damage will have already been done. Therefore, it’s so important to prepare ahead of time. After all, in terms of network security, an ounce of prevention is worth far more than a pound of cure. Computers should be configured in a way that they should be less vulnerable to any kind of malicious attacks. Integrity is an important aspect to be considered for deployments. Employees should be aware of all the security issues that’s are taking place in recent times. They should be trained to follow compliance and regulations. Disaster recovery and incident report are the best practices for a company to keep them in a place.Securing networks according to the requirements and categories of data must be handled with proper care on computers. Building servers on a tight security system and they should be dedicated for solitary purpose. Multifactor Authentication is the best practice for login system to attain a token-based authentication. Encryption should be implemented to protect certain assets. Recognize the security apprehensions associated to daily administration. Traffic monitoring should be done on an isolated network and network traffic should be captured on internal hosts.

Strategic Human Resources Management Paper

To gauge the effectiveness of a business or department, measurements must be taken and progress must be tracked. There are several models that can be used to measure success. In this part of the course project, you will focus on Key Performance Indicators (KPIs) and Management by Objectives (MBOs).A Key Performance Indicator (KPI) is a measurable value that demonstrates how effectively a company is achieving key business objectives. Organizations use KPIs to evaluate their success at reaching targets. Management by Objectives (MBOs) are the “objectives” of the organization and the company, or department goals that must be achieved to reach the objectives. The management’s focus and concentration is on reaching the objectives–hence the term Management by Objectives.The KPIs and MBOs work hand in hand. For a sales team, the KPI might be the volume of monthly sales and the MBO might be to sell 1,000 widgets a month.For this project piece, you will create a systematic approach that the new operations manager can use to measure a department’s effectiveness and outline the KPIs. Create four MBOs for the new operations department and set goals for “Exceeding expectations,” “Meeting Expectations,” and “Below Expectations.” An example follows.Exceeding expectationsMeeting ExpectationsBelow ExpectationsSell an average 1,000 widgets per month in a calendar yearSell an average of 1,100 widgets per month in a calendar yearSell an average of 991 – 1,099 widgets per month in a calendar yearSell an average of 900 widgets per month in a calendar yearTo complete this assignment, use at least two credible sources to prepare a 4-5-page document that you will present to the new operations manager. Include the following in your paper:Provide an example of how HR measures the effectiveness of a department or team member.Discuss the benefits of KPIs.Explain how you would go about measuring and evaluating employee engagement, turnover, community involvement, and profit margins for this company. State your ideas for an evaluation plan in these areas.Discuss the benefits of Management By Objectives (MBOs).Create four MBOs for the new operations department and set goals for “Exceeding expectations,” “Meeting Expectations,” and “Below Expectations.”Evaluate how these measurements align with Chip’s Widgets, Inc.’s business objectives.

I need a assignment done for week 10 for my strategic partnering w | Strategic Partnering w C-Suite

 Assignment 4: CEO Meeting Managing Conflicts and Confidences Due: Sunday, Midnight of Week 10 (12% of total grade) Overview HR leaders frequently find themselves in situations that require tact and diplomacy. While most business decisions are made in ways that balance potential conflicts, occasionally, there are serious ethical and legal challenges that must be navigated. C-Suite leaders must be able to deal with situations that do not have an obviously “right” solution, that involve power struggles and confidences and that sometimes pit the interests of individuals against one another, and the interests of the business. HR leaders must also understand the role they play both as advocates for employees and strategic partners to the C-Suite. Having a seat at the table frequently requires a delicate and nuanced approach to conflict management, while still demanding that HR be clear in its message. It also, frequently, requires that decisions must be made about if, when and how to bring a problem to the CEO and when the issue should be dealt with at a lower level. Instructions • This assignment is based on the attached scenario which presents a complex ethical and (potentially) legal challenge. • Information has surfaced that may involve an ethical and/or legal violation, but a fellow employee has asked that this concern be kept confidential. • While the discussion was after hours and private, because of the potential seriousness of the situation you determine you must address this with the CEO. As part of this discussion you must not just update the CEO, but give a recommendation and rationale for your CEO to consider. You can’t simply leave CEO with the problem. Your recommendation should address: o Stakeholders and impact o Explanation of the legal issues and/or regulations involved o Risk-reward assessment based on alternatives being considered o Outline of proposed actions o How the situation and decision should be communicated to employees and the public • You may organize your presentation as you wish, but you should imagine yourself walking into the CEO’s office, closing the door and beginning your conversation with, “Something important has just come to my attention that I need to discuss with you… 

Analysis and application: procedures in a criminal trial

Case Study:
Jones, Walsh, and Bert have been arrested on suspicion of rape and criminal assault of a 14-year-old girl. As the police investigation unfolds they locate and obtain the statement of Bland, who provides them additional information about Jones. The evidence the police uncover reveals that there have been three separate assault and rapes of juveniles over a 3-day period.
The prosecutor in the case files charges against Jones, Walsh, and Bert for their acts. Bert hires an attorney to defend him. Bert tells his defense attorney that he did not commit any of the rapes and that he was only present one time with Jones and all he did was hit one of the girls. Bert explains that he can prove this because at the times the other rapes are alleged to have occurred, he was with Mook. Mook is currently out of the country on a mountain climbing trip and will not return for 2 months.
Shortly after the prosecutor files charges in the case, Bland contacts the prosecutor’s office and provides a written statement to the prosecutor that Walsh was not present during any of the rapes.
 
 
In a 2 page paper (excluding the title page and reference page), discuss the following questions, explaining your answers in detail by analyzing the facts presented and other factors you consider relevant; defining and explaining key legal terms and principles; and citing legal authority (your text and other legal authority) to support your conclusions.
 

How should the court rule on Bert’s motion for severance in the case?
What should the prosecutor do following the statement Bland after charges had been filed against Walsh?
How should the court rule on Bert’s motion to continue regarding Mook?

Note: This Assignment will require outside research. Use at least two credible sources beyond the text material, and discuss how you evaluated the credibility of the resources used. You may consult the Kaplan Online Library, the internet, the textbook, course material, and any other outside resources in supporting your task. Use proper citations in APA style.

The paper should contain a cover page and a list of references in APA format.
All internal citation of outside sources plus the listing of all references should also adhere to APA format.

Stat 121: writing assignment 1 confidence intervals

 
STAT 121: Writing Assignment 1 Confidence Intervals
 
 
 
Directions: Read the following article and answer each question completely but concisely. Be sure to save a copy of your work, and see the syllabus for submission details.  (The spacing between the questions is not necessarily an indication of the expected response length.)
 
Journal                                                                                                                          March 26, 2010
 
Resting Heart Rates of American Adults
 
A normal resting heart rate for adults ranges from 60 to 100 beats a minute, reports Dr. Edward Laskowski of the Mayo Clinic. Lower resting heart rates are generally associated with higher cardiovascular fitness. With the marked increase in obesity in America, there is rising concern that the average resting heart rate of American adults is trending towards the higher end of the accepted range. A recent study conducted by the Statistical Health Association of America validates this concern. Results were based on a sample of 1587 American adults (ages 18 and older). The mean resting heart rate from this sample was calculated at 87 beats per minute (bpm). The study concludes, with 95% confidence, that the true mean resting heart rate of American adults is in the interval (80, 94).
 
                       
 
 
 
1. (1 point) What is the population that the confidence interval in the article is making an inference about? Be specific.  
 
2. (1 point) What is the parameter of interest for the confidence interval in context?
 
3. (2 points) Give the confidence interval as reported in the article. Is the reported interval in the form of an interval or is it in the form of estimate ± margin of error? If it is not in interval form, give it in interval form.  
 
4. (2 points) What confidence level is associated with the given interval? Is the choice of confidence level reasonable? Why or why not?  
 
5. (2 points) Interpret the confidence LEVEL given in your previous answer in your previous answer in the context of the problem. 
 
6. (2 points) How was the sample collected? Does this allow us to infer things about the population? If the article does not state how it was collected, how SHOULD it have been collected?
 
7. (3 points) Interpret your calculated interval in context. Make sure to include all three parts of a confidence interval interpretation.
 
 
 

× How can I help you?