Compare and contrast the political and social rights of the group that you have previously selected to examine with those of another disadvantaged group, as of 1924. As a reminder the groups that are examined in this class are: African Americans Native Americans Women Immigrants
compare and contrast the political and social rights of the group that you have previously selected to examine with those of another disadvantaged group, as of 1924. As a reminder the groups that are examined in this class are:
African Americans
Native Americans
Women
Immigrants
For example, if the group you are examining throughout the course is African Americans, you would compare and contrast their experiences regarding social and political rights with that of a different one of these groups, that is women, immigrants, or Native Americans.
attached are the instructions and the two other sources needed
Data compression is used mostly in data storage. Examples of compression tools are WINZIP and 7Zip. Explain which of the following is better for security purposes.
Instructions
Data compression is used mostly in data storage. Examples of compression tools are WINZIP and 7Zip. Explain which of the following is better for security purposes – Encrypt and Zip or Zip and Encrypt
Produce an example that demonstrates a worker who is a part of hidden unemployment or whose current employment status does not represent the state of the economy that is being portrayed by the unemployment rate.
Unemployment Rate and Misrepresentation
1. Produce an example that demonstrates a worker who is a part of hidden unemployment or whose current employment status does not represent the state of the economy that is being portrayed by the unemployment rate.
2. Using the framework of the unemployment rate, contrast what is going on in the economy compared to what the numbers tell us.
HINT: It may be helpful to visualize this using a very small economy, of say 10 people, and working off of that, rather than trying to imagine a real-world economy with millions of adults in the population.
Discuss relevant marketing concepts, that may be applied in a situation and elaborate their relevance.
1- Start by identifying the problem, or in other words what you think needs to be solved and discuss it in relevant detail.
2- List and discuss relevant facts from the case that are directly associated with the identified problem.
3- Discuss relevant marketing concepts, that may be applied in this situation and elaborate their relevance in this case.
4- Recommendation: After identifying the problem, and discussing the applicable marketing concepts, make two to three recommendations (or in other words the best course of action to deal with the problem).
5. Finish the discussion by choosing one course of action and explain why this is the best choice.
Identify the basic components of the information system: hardware, software, data, processes, and people, and how these components are used to support strategic decision making.
Concepts and Applications of Information Technology (IFSM201)
Class Project
Purpose of this Assignment
The Class Project is the most significant assignment in this course, Concepts and Applications of
Information Technology. As such, it accounts for 58% of the course points. This assignment is
comprised of two deliverables; a SWOT Analysis and a Presentation. The SWOT Analysis is due
in Week 4 (worth 33% of course grade), and the Presentation is due in Week 8 (worth 25% of
course grade).
This assignment gives you the opportunity to demonstrate your ability to research, evaluate,
and describe business strategy focused on information technology tools and services. This
assignment specifically addresses the following course outcomes:
Identify the basic components of the information system: hardware, software, data,
processes, and people, and how these components are used to support strategic
decision making.
Apply information technology tools for research, data gathering and information
analysis, problem-solving, decision-making, and communicating information that aligns
with business needs and objectives.
Start Here
The Class Project for this course focuses on the evaluation of a business or organization and
how they might strengthen their operations through technology, including their information
systems. There are two parts to the Class Project; the SWOT Analysis and the Presentation. You
will use the same business/organization for both parts; however, the grade received on the
SWOT Analysis will not affect the grade for the Presentation (they are separate assignments).
Step 1: Choose a Business or Organization
To begin, choose a business or organization that you would like to evaluate it can be where
you work, a school (UMGC), a place of worship, government entity (e.g., DMV, Secretary of
State, courthouse, etc.), or any other type of organization. Since the focus of the analysis will
involve information technology, the best type of organization to choose is one where you can
envision technology playing a key role in improving products, processes, or services.
*From this point on, the instructions focus on the first deliverable, the SWOT Analysis*
Step 2: The SWOT Analysis (due week 4)
Now that you have chosen a business or organization for your Class Project, it is time to
complete the first deliverable the SWOT analysis. A SWOT analysis is a framework for
identifying and analyzing an organization’s strengths, weaknesses, opportunities and threats —
SWOT stands for: Strength, Weakness, Opportunity, Threat. Commonly used by businesses, this
tool focuses on factors that are important to strategic decision making. These factors include
both internal and external influences on the viability of the organization.
For more explanations on a SWOT Analysis, go to:
YouTube How to Perform a SWOT Analysis
Forbes: What Is A SWOT Analysis?
SWOT Analysis: Strengths, Weaknesses, Opportunities, and Threats
Refer to the SWOT examples on Heineken and Walt Disney World (below)
You will use a SWOT analysis to help analyze the current health of your organization, and (in
week 8), you will identify possible ways the information technology could be used to make it
stronger.
The SWOT analysis offers a visual way of identifying both the positive attributes of an
organization, and areas that need to be recognized and addressed. Thinking of the organization
you chose, start by filling out a simple table listing its internal strengths and weaknesses, and
external opportunities and threats.
SWOT Table:
Task: List 2-3 Strengths and 2-3 Weaknesses
Strengths and weaknesses are associated with internal resources and experiences and include:
Characteristics of the business that give it an advantage over others in the industry.
Positive tangible and intangible attributes, internal to an organization. ▪ Human
resources – staff, volunteers, board members, target population
Physical resources – location, building, equipment
Financial products/services, other sources of income
Activities and processes programs and processes, online presence
Past experiences – building blocks for learning and success, your reputation in the
community
Task: List 2-3 Opportunities and 2-3 Threats
Opportunities and threats are factors outside of business operations that can contribute to
either the make the organization stronger or be troublesome. The ability of a business to
identify, control, and adapt to these external factors can make it more profitable:
Market expansion
Complacent/aggressive competition
Changing customer needs and tastes
Economic swings
Changing government deregulations
Step 3: Write the SWOT Analysis
Now that you have identified the organization you will analyze and completed a SWOT table
listing the strengths, weaknesses, opportunities, and threats for the organization, it is time to
write the analysis paper that will be submitted to your instructor/classroom.
The paper should include all of the following:
1. Title page – the title of paper, company/organization name, your name, course, and
date of submission.
2. Purpose briefly describe what the SWOT methodology is and the
business/organization you are focusing on.
3. SWOT Analysis include a SWOT Analysis table and describe each quadrant
(strengths, weaknesses, opportunities, threats) for your organization. Each quadrant
should be clearly identified in the analysis and the description should include the
importance of the attributes to the organization.
4. Conclusion synthesize the findings from the SWOT analysis.
5. References – cite at least two resources with APA formatted citation and reference.
Format
Double spaced. Any 11- or 12-point font.
Paper should be approximately 3-4 pages in length, excluding title page and
references.
Cite at least two resources with APA formatted citation and reference. Incorporate at
least two resources correctly; one reference should be from the course materials and
one reference should be external. An external resource is a resource other than those
provided in the class or textbook. Incorporate properly formatted APA citations in the
text of your document for each reference used. Then, place an APA style reference page
at the end of your document.
Consider your audience you are writing in the role of a business analyst and your
audience is upper management of the organization.
Compare your work to the Grading Rubric below to be sure you have met content and
quality criteria.
Submit your paper as a Word or PDF document to the appropriate folder under
Activities and Assessments > Assignments in the classroom.
SWOT Analysis Examples
Read the following: Heineken and Walt Disney World SWOT Analysis
Now, lets take the information from the article and create SWOT tables for Heineken and Walt
Disney World.
SWOT Table Heineken:
SWOT Table Disney World:
Discuss, in your own words, why critical infrastructure protection, security, and resilience are vital to the U.S. public confidence when considering the Nation’s safety, prosperity, and well-being.
Discussion Questions: 1) Discuss, in your own words, why critical infrastructure protection, security, and resilience are vital to the U.S. public confidence when considering the Nation’s safety, prosperity, and well-being.
2) Explain the consequences, as well as the impacts, of aging critical infrastructure failures. Be sure to summarize their ramifications for our nation’s citizens.
3) Identify and explain at least two key legislations, acts, and Presidential actions since 9/11, be sure to include one that occurred in the past five years. Do not write about the USA PATRIOT Act or the USA FREEDOM Act.
1. Critical infrastructure protection is a key part in maintaining the publics confidence in the U.S. National Security apparatus for two key reasons. The first is the simple fact that one of the key things U.S. citizens pay taxes for is the protection of the homeland, one of the primary missions of the Department of Defense (DOD), more specifically U.S. Northern Command who maintains that primary mission. While protecting the homeland also includes deterring, and if necessary, defeating foreign threats it also encompasses protecting vital critical infrastructure from threats both domestic and abroad. The second key reason that maintaining the publics confidence in this effort is important is because that same critical infrastructure that needs to be protected and resilient enables each citizen to carry on with their day to day lives. Whether it is running water, electricity, or interstates, all of these are critical infrastructure that if destroyed or degraded would have far reaching impacts on citizens across the country.
The consequences of aging critical infrastructure have the same impacts on individual citizens as is described above. While there are threats to critical infrastructure that originate from malicious actors, the maintenance of critical infrastructure can be just as serious of a problem. The impact of a decaying roadway, water pipes, or hydroelectric dam is just as serious as that of a terrorist attack on any of these entities. The only difference is that the cause of this is entirely on the United States itself, and blame can not be placed on some external entity.
In the wake of 9/11, there was a series of laws and executive actions put into place to better protect the homeland and address some shortfalls in national security at the time. One of these was Executive Order 13231, put into place on 16 October 2001. Titled, Critical Infrastructure Protection in the Information Age this executive order directed the federal government to take appropriate action to identify and address vulnerabilities in information systems that would impact critical infrastructure. This ranged from the digital control switches for power grids, to the air traffic control systems that had become reliant on computers and the internet. Since 2001, the reliance on information systems has increased significantly, which also caused a sharp uptick in cyber vulnerabilities to these systems. This led to the Cybersecurity and Infrastructure Security Agency Act of 2018 (Public Law Number: 115-278) which amended the homeland security act of 2002 and established the aforementioned agency. This law took elements of the DHS and formally established it as an independent agency whose sole focus is to lead all cybersecurity and critical infrastructure security programs.
2. A critical infrastructure can be described as a virtual or physical asset or system vital to the US that if suffered disability or destruction would have a devastating effect on security, national economic security, national public health or safety, or any mixture of those elements (NIST, n.d.). This list includes but is not limited to the transportation system, water and wastewater management, energy sources, and national cyber-security. These lifeline functions are vital to every US citizens everyday life. We count on the reliability of these systems to function and complete our own personal and business objectives. Protecting, maintaining, and providing uninterrupted service of these systems is vital to public confidence. An example of this can be found in 2017 when the Election Infrastructure became a subsector of the Government Facilities sector supporting a free and fair democracy a foundation of the American way of life (Harrell & Sales, 2019). The partnerships built between the government and the private and public sectors are what maintain public confidence in the US critical infrastructure (Harrell & Sales, 2019).
An aging infrastructure does not only affect one sector of the framework of the American backbone. Each sector feeds off one another. For example, if the transportation sector is disrupted, the price of goods (the agriculture sector) may increase or even experience a slight influence. In turn, this can cause a strain on the US economic structure. In addition, an aging infrastructure has several consequences for US citizens. Not only does it impede our everyday activities, but it can possibly deteriorate, succumb to failure, and affect the health and well-being of us all. A decline in communication between friends and family can cause a decline in mental health of individuals. Without the publics confidence in the infrastructure, the possibility of civil unrest and economic turmoil may increase. This economic turmoil may lead to higher consumer prices, water usage restrictions, and/or power outages across the nation. With all this uncertainty, the call for leadership and government change increases due to the publics uncertainty and frustration (Little, 2012; p.7).
On November 5, 2021, congress entered legislation (US Code Chapter 53, Title 49) for the funding of programs for the Federal Transit Administration (FTA). Known as the Infrastructure Investment and Jobs Act, this program authorizes close to $108 billion for service transportation programs and other FTA programs. The focus of the legislation entails safety oversight programs, modernization of current infrastructure, addressing greener methods of transportation, and increasing the accessibility of transit service for more Americans (FTA, 2023).
In 2018, then President Donald Trump signed into legislation Americas Water Infrastructure Act. This act supports Americas competitive by increasing storage, protection from flood waters, deepening ports of interest, and maintaining the stability of inland waterways. The legislation further calls for an increase in local and stakeholder input while decreasing the red tape that has been experienced before (EPW, n.d
Discuss eyewitness procedure reforms and include an argument for and against the reforms. Using one of the cases from the text as an example, explain how implementation of the reform(s) would have resolved the defenses concerns.
Eye Witness Testimony
1. Mistaken eyewitness testimony is the single largest contributing factor to wrongful convictions. Pre-trial procedures utilized by law enforcement are not necessarily subject to suppression, even when the procedures are considered “unnecessarily suggestive.”
2.
Discuss eyewitness procedure reforms and include an argument for and against the reforms. Using one of the cases from the text as an example, explain how implementation of the reform(s) would have resolved the defense’s concerns.
One of the potentially beneficial reforms is adopting a double-anonymized lineup during identification to eliminate suggestive identification (Wells et al., 2020). Mandatory documentation of the identification procedures also helps avoid assumptions. Other reforms include but are not limited to adopting sequential lineup legislation to fill loopholes in the identification process that are often relied upon during suppression motions. In hindsight, a sequential lineup would have resolved the defense’s concerns in Foster v. California as it would have eliminated the possibility of relative judgment by the witness, especially with a limited suspect pool. Notably, these reforms will likely improve accuracy and fairness in the identification process, improve process documentation, and eliminate undue suggestibility. However, the reforms increase the procedural requirements and may impede the need for speedy trials (Wells et al., 2020). The reforms call for systemic changes, which may be costly and inconvenient.
1.
What must the defense establish to successfully suppress a suggestive identification? Use cases as examples.
The defense must prove due process or procedural flaws. This is evidenced in Coleman v. Alabama, where the police identification procedure was flawed. The defense must also prove the occurrence of a suggestive lineup during the identification process. This involves proving that a suspect stood out conspicuously, such as in the four-person lineup in the Foster v. California case. Thirdly, they must prove a violation of any constitutional amendment, such as the Fourth Amendment, in Young v. Conway.
1.
Despite the arguments in favor of eyewitness identification reform, is law enforcement motivated to implement such reforms when suppression is not ordinarily a viable option for the defense?
Yes. The continued adoption of community policing and other reforms that revolutionized the police force have inspired proactivity in law enforcement. Therefore, the police are likely to embrace eyewitness identification reforms despite the hurdles with suppression, given that it would help improve the accuracy and fairness in the criminal justice system, which is a crucial determinant of the success of the police reforms.
2.
How did the Court in United States v. Salerno reason that the Bail Reform Act of 1984, which permitted pre-trial detention without bail, was consistent with the 8th Amendment’s prohibition against “excessive bail?” How does pre-trial detention adversely impact the defendant’s ability to prepare a defense, and in what ways does pre-trial detention impact society?
The court reasoned that the Act did not impede speedy trial and was not intended as unusual punishment. It was only applicable in cases where the defendant posed a critical danger to society and had a high flight risk. Thus, it aligned with the 8th Amendment.
Pre-trial detention limits the defendant’s access to legal resources. Also, it subjects them to unwarranted psychological torture and stress and possible loss of employment during this period. Pre-trial detention also adversely impacts society as it increases the tax burden and leads to undue family separations, which has massive ripple effects (Digard & Swavola, 2019). It also perpetuates inequities in the justice system, given that it overshadows the value of the “innocent until proven guilty” principle.
You are stuck at Central Texas College Central Campus without transportation and need to get somewhere. You decide to take an Uber ride. You want to calculate the ride and then see if it is cost effective to use it a second time. Critically explain how to calculate the cost of the ride.
Linear Functions and Uber Fares
You are stuck at Central Texas College Central Campus without transportation and need to get
somewhere. You decide to take an Uber ride. You want to calculate the ride and then see if it is cost
effective to use it a second time. Critically explain how to calculate the ride.
Decide on a location in Killeen, Copperas Cove, or Harker Heights, TX that you need to get to from
campus. If you are an online student and are unfamiliar with the area, try the post office, civic center, or
google places to visit in Killeen, TX. Please pick a location that is at least one mile from campus. Go to
Google Maps (https://maps.google.com) and get directions from Central Texas College (on West Central
Texas Expressway) to the location you have chosen. You need to hit Alt-Print Screen or some other
method to get a screenshot. When you complete the assignment in Blackboard you will upload your
screenshot. If you are unfamiliar with Google Maps, you will need to click on the blue street sign with
the arrow on it to get directions.
The distance for the trip is the part we will use moving forward.
Distance of trip: miles
Go to Ubers website (https://www.uber.com/global/en/price-estimate/) and get a fare estimate by
typing in the same address you did on Google Maps. The website often updates so you need to find
where you can get an estimate of the price. DO NOT order an actual uber ride. When you have done
this, it will give you a range of possible prices for the two different types of Uber rides you can take. We
are going to use and Uber X since we dont have a group and we are trying to keep cost down. To the
right of this price, there is a question mark in a circle. Click on that symbol, and it will open up a price
breakdown for the ride.
Write down the Base Fare, the Booking Fee, and the price Per Mile.
Base Fare: $ ___________ Booking Fee: $ ___________ Per Mile: $ ___________
For simplicity, we are going to ignore the other options there. Since we are going at least a mile, we will
meet the minimum fare. We are not going to cancel, and we are not going to make the car wait for us
since we are not going to book the ride until we are stepping out the door to catch the ride.
We now want to create a cost function for the ride. will be the distance for the trip in miles, and will
be the cost of the fare. What is the price of the ride before the car starts moving? What part of the
equation of a line in slope-intercept form does this represent? What is the rate per mile? What does
this represent in the equation of a line? If x is the amount of miles for the trip and y is the cost, write an
equation for the line that describes the cost of Uber rides in the Killeen area.
Equation of line for fare price: = _____________________________________________
Plug in your distance for x and see if your y value is in the range of prices given in your estimate. They
give a range in case they have to take a longer router because of an accident, construction, etc.
For = distance from Google Map above, = ____________________ .
Lets Check Your Equation
Choose a second location that you need to go to in the same area, again at least a mile away from CTC.
We want to be able to know ahead of time without using the Uber website what the second ride would
cost. Go to Google Maps again (https://maps.google.com) and get directions to the second location.
Get a screenshot like you did the first time and upload that one as well. Make note of the distance.
Make sure that all screenshots show the starting
and ending address before you upload the
screenshots for grading.
Distance of second trip: miles
Use your equation from above and plug in your distance for the second trip for x to estimate the fare.
For = distance of second trip, = ____________________ .
If you go to Ubers website and get a price estimate, is your calculation in the range of values they give?
With your equation, you can now price any Uber ride in the area if you know the distance.
Write a paper about the patient experiencing low back pain, compare and contrast the two different ways of treating the problem with either acupuncture or pharmacotherapeutics Analyze the options and choose the most appropriate plan for patient based on their unique and individual health needs and desires
·
Topic: Acupuncture vs pharmacotherapeutics for a patient with chronic low back pain
Write a paper about the patient experiencing low back pain, compare and contrast the two different ways of treating the problem with either acupuncture or pharmacotherapeutics
Analyze the options and choose the most appropriate plan for patient based on their unique and individual health needs and desires
Include:
· Introduction: Introduce the patient demographics, complaints, and discuss key concepts related to the topic
· Setting and social dynamics (community clinic in New Jersey)
· INCLUDE Subjective information: Chief complaint, HPI, PMH, PSH, FH, SH, ROS
· INCLUDE Objective information: Physical exam and any known results
· Medical decision-making and clinical impression (diagnosis)
· Introduction of two different evidence-based, peer-reviewed articles or treatment guidelines for the chosen diagnosis
chronic low back pain
· Compare and contrast the two treatment options or approaches-
Acupuncture vs pharmacotherapeutics
· Assess and include analysis of the merit and soundness of research (i.e. discuss which treatment has more research or better research)
· INCLUDE which treatment option was chosen for the patient scenario and provide justification on why it was better for them
· Include specific plans or interventions, recommendations, education, health promotion, and follow-up as needed for the case
· Discuss possible or real cultural and socioeconomic considerations or how you would ensure equitable, inclusive care for your patient
· Conclusion: Include a summary of the case study and lessons learned
Respond to two colleagues by providing feedback on their choice of population, sample, and sampling technique concerning whether veterans more likely to become homeless over non-veterans?
Respond to two colleagues by providing feedback on their choice of population, sample, and sampling technique concerning whether How do their choices fit with the research question and research methodological approach?
Please use the Learning Resources and the NASW Code of Ethics to support your response (i.e., cite and reference).
1 SE-
My research question is “Are veterans more likely to become homeless over non-veterans?” A population is the entire group that you want to draw conclusions about. A sample is the specific group that you will collect data from. The size of the sample is always less than the total size of the population. In research, a population doesn’t always refer to people .The population in my study would be homeless individuals. My research includes a study on both homeless veterans and homeless non-veterans. My sample group would include veterans and non-veterans because we’re working to determine if there are more homeless veterans or non-veterans that are homeless.
A cross-sectional analysis would help with obtaining the necessary data. Based on my study of the homeless population, this could be supplemented by an ethnographic study, which we closely observe the homeless and interact with them. One sure way to identify the homeless population is by observing those who are seen sleeping on the streets, in cars or just out in the open.
2 SO-
My research question is: What is the Impact of Domestic Violence on Young Males who are exposed to it Within Parental Relationships?
Population:
The population for this study comprises young males who have been exposed to domestic violence within parental relationships. These individuals should be in their adolescent or teenage years, typically between the ages of 12 and 18, and have experienced or witnessed domestic violence between their parents or caregivers.
Sample:
The sampling technique employed in this research would be purposive sampling. Since accessing a population that has been exposed to domestic violence within parental relationships can be challenging due to the sensitive nature of the topic, purposive sampling allows for the deliberate selection of participants who fit the specific criteria for the study. To identify potential participants, researchers may collaborate with local shelters, support groups, counseling centers, or social service agencies that cater to families experiencing domestic violence. Additionally, referrals from therapists, school counselors, and other professionals working with this population could also be valuable in identifying suitable participants.
Ethical and Cultural Considerations:
Informed Consent: Before involving any participants in the study, researchers must ensure that proper informed consent is obtained. This should include a clear explanation of the research objectives, procedures, potential risks, and benefits. Participants should also be informed about their rights, including the right to withdraw from the study at any time without consequences.
Confidentiality: Maintaining confidentiality is of utmost importance when studying a sensitive topic like domestic violence. Researchers must take necessary precautions to protect the identity of participants and ensure that their responses and personal information are kept confidential and not disclosed to unauthorized individuals.
Cultural Sensitivity: It is essential to acknowledge and respect cultural differences and nuances when conducting research on domestic violence. Different cultural norms, beliefs, and attitudes may influence how individuals perceive and respond to domestic violence. Researchers should be mindful of these cultural factors to avoid misinterpretations and ensure a nuanced understanding of the impact of domestic violence on young males within parental relationships.
Avoiding Harm: Researchers must be aware of the potential emotional distress or re-traumatization that participants may experience when discussing their exposure to domestic violence. Adequate support services and resources should be available to participants, and researchers should be prepared to provide referrals for counseling or other appropriate interventions if needed.
The best sampling technique for my research would be multi-phase sampling. Multi-phase sampling collects basic information from a large sample of units and then collects more detailed information for a subsample of these units. The most common form of multi-phase sampling is two-phase sampling (or double sampling), but three or more phases are also possible. Multi-phase sampling would be best because of my research on homeless would be broken down into two units of veterans and non-veterans that are homeless.
Homelessness would be considered an ethical issue. Homelessness harms peoples health and well-being, homelessness harms the health system and health professionals; and, finally, homelessness is a result of inequitable policies, practices, and choices our society has made. The health effects of homelessness are grave, with higher incidence and severity of illness and injury among people experiencing homelessness. VA is a beneficiary system: the government and people of the United States have made a moral commitment to care for the health needs of those who served in the military. In several cases, that moral commitment is not being carried out when it comes to out veterans.