Hot! psy discussion questions – theories of behavior

Discussion 1 How Reinforcing is My Reinforcer? – Discuss in 100 – 150 words with in text citations  In Chapter One, our author discusses a general rule that reminds us to make sure we have a true reinforcer before spending time trying to reinforce behavior.    Please share an example that illustrates the importance of this rule.   Have you ever attempted to use a reinforcer that did not truly act as a reinforcer?   Please explain.Discussion 2 The Nature of Reinforcement -– Discuss in 100 – 150 words with in text citations Reinforcement is typically thought of as a thing. Do you agree or disagree? Why? Can you think of a time when reinforcement can produce an undesired behavior? What is an example of this? Discussion 3 Positive Reinforcement vs. Negative Reinforcement -– Discuss in 100 – 150 words with in text citations How does positive reinforcement differ from negative reinforcement?    How are these concepts the same?   What are some examples of each?Discussion 4 Stimuli – Discuss in 100 – 150 words with in text citations Determine if a stimuli is functioning as a reinforcer.Discussion 5 – Reinforcing contingency – Discuss in 100 – 150 words with in text citations Explain the function of a reinforcing contingency. Discussion 6 Aversive Stimuli – Discuss in 100 – 150 words with in text citations Explain the relationship between aversive stimuli and negative reinforcement.

develop these diagrams:1. A domain model class diagram2. A list of uses cases and a use case diagram

A customer can order pizza’s on the system through a special Internet form. The form asks for all the pertinent information about the pizza: the pizza base, the base sauce, and the calculates the price. A customer may order as many pizza’s as desired. The system maintains an category of common pizza’s in the system so customers can use the search engine to search for their favorite pizza’s. People who want to buy pizzas come to the site and search for the pizza’s they want. When they decide to buy, they must open an account with a credit card to pay for the pizza’s. The system maintains all this information on secure servers.When a purchase is made, Pizza’sRUs.com sends an e-mail notice to the customer with the order choice as well as payment information. It also notifies the store of the oreder. The system maintains an open order until it receives notice that the pizza has been delivered.For this case, develop these diagrams:1. A domain model class diagram2. A list of uses cases and a use case diagram3. A fully developed description for two use cases: Allow Customers to Order Online and Process Credit Payment4. A System Sequence Diagram for each of the two use cases in question 3RationaleThis assignment is intended to enable you to start making the link between theory and practice. The tasks will also help you apply your understanding and knowledge to real-life business situations. Of particular importance is the intention of this assignment to improve your understanding of use cases which are initial medium for describing (in some detail) what a system is supposed to do. The assignment tasks also test your ability to apply your knowledge of, and skills at, to describes the data and processing requirements, develop domain model, list of use cases, detailed use case descriptions, and SSD.Marking criteriaThis case describes the data and processing requirements. Students are required to develop domain model, list of use cases, detailed use case descriptions, and SSD. This task will be marked based on the technical accuracy and originality. Each question carry equal marks and marks will be awarded on the basis of the followings:i. how well you can describe technical terms in formal way.ii. including relevant diagrams,iii. completeness of your descriptions,vi. logical flow of diagram

select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements tosecure its application software

Assignment RequirementsSecuring Windows applications requires hardening each application to prevent vulnerabilities from beingexploited. Your job is to select an appropriate control to address each anticipated vulnerability. Youhave been given the task of reviewing security policies and recommending appropriate security controlsto respond to vulnerabilities identified by the security team in the new ERP software.You will be provided a list of security controls to detect or prevent each stated threat. For eachvulnerability, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements tosecure its application software.Submission Requirements Format: Microsoft Word Font: Arial, Size 12, Double-Space Citation Style: APA Style Length: 1–2 pagesSelf-Assessment Checklist I have properly selected the best security control that best satisfies each ERP vulnerability. I have provided a proper justification of choosing each security controls.Required Resources Text Sheet: Case Scenario for Rationale: Importance of Windows Access Control andAuthentication (see below) Worksheet: Security Controls and Vulnerabilities (see below)Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7Windows Limited carries a variety of Windows and related products. It supplies builders with all of thetools and supplies to install finished Windows in any type of building.Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software packageto help control costs and increase both quality and customer responsiveness. The ERP software collectsand stores information including:• Raw material costs• Labor costs• Materials and labor requirements for products• Purchasing requirementsKen 7 Windows Limited has identified six basic roles for users in the new ERP software:• Administrators—maintain ERP data and system operation.• Planners—run planning software and generate requirements reports.• Shop Floor users —enter operational data (receiving, shipping, and product progress duringmanufacturing).• Managers—manage department personnel.• Purchasing users—generate purchasing documents based on planning requirements.• Accounting users—maintain cost and accounting data.Access controls limit what users or roles can do with different types of data. For example, consider thefollowing types of data:• Cost information—raw materials and labor costs, including the cost of finished goods.• Manufacturing details—cost, amount of labor, and time required to produce finished goods.• Purchasing requirements—rules for determining when raw materials, components, or suppliesshould be purchased.Through access control:• Cost information can be viewed only by Accounting users.• Manufacturing details can be viewed only by Shop Floor users.• Purchasing requirement can be viewed only by Purchasing users.During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns aboutusers being able to access restricted data.• Accounting users are able to login to shop floor computers.• Purchasing users are able to access human resource (HR) applications and data.The ERP implementation team suggested the following access control measures to protect restricteddata.• Create an organizational unit (OU) in Active Directory for shop floor computers.• Deploy Group Policy Objects (GPOs) to restrict shop floor users to the shop floor OU.• Define data access controls in the ERP software to deny access for all non-HR users to restricteddata.Implementation of several access control measures helped Ken 7 Windows Limited to restrict the dataaccess. Hence access control and authentication is important, as it helped Ken 7 Windows Limited inreducing costs and increasing profits.Worksheet: Security Controls and VulnerabilitiesYou can select from a short list of security controls to detect or prevent each stated threat. For eachvulnerability, select the best control to ensure Ken 7 Windows Limited fulfills the stated requirements tosecure its application software.Select from these security controls:a. Place a firewall between the Internet and your Web server.b. Place a firewall between your Web server and your internal network.c. Remove the mail server service.d. Require encrypted connections for all remote ERP clients.e. Apply the latest security patches.f. Use a packet sniffer to view the contents of network packets.g. Require all personnel attend a lunch and learn session on updated security policies.Identified ERP software vulnerabilities:1. The ERP software vendor reports that some customers have experienced denial-ofservice(DoS) attacks from computers sending large volumes of packets to mail serverson the Web server computers.2. Users that leave their workstations logged in during long durations of inactivity couldallow attackers to hijack their session and impersonate them in the application.3. Attackers with packet sniffers and proxy software could potentially intercept exchangesof private data.4. Four software vulnerabilities in previous ERP software versions could allow attackers toescalate their permissions and assume administrator privileges.5. Incorrect Web server configuration may allow unencrypted connections to exchangeencrypted information.

What are the total finance costs on this loan?

  1. You have a stock mutual fund in which you put $3,000 per year. How much will you accumulate in the account in 25 years if the interest rate is 10%?What if instead you have $4,000 to deposit in the mutual fund earning 10%? If you add $2,000 to that account annually, how much will you have accumulated in 15 years? (Calculate the answer for each option. Show all work.) 2. Dick and Jane have just purchased a house and are calculating how much money they will need when the closing day rolls around. The purchase price is $200,000. They will make a 20% down payment, and they must pay two points on the loan. Closing costs should be 3% of the purchase price. What is the total dollar amount they will need at closing? (Show all work.) 3. Lindsey has a job with monthly take-home pay of $3,500. Using the suggested maximum debt safety ratio, what maximum debt burden per month can she assume? (Show all work.) 4. Joe is purchasing a new truck for $30,000. Joe is making a $2,000 down payment, and he will make 60 monthly payments of $541 each. What are the total finance costs on this loan?  

Will you heed the call for action and join an organization like Nurses on Boards or become engaged with the National Nurse Campaign?

Professor say: you’ve gained important skills in political advocacy to help lead healthcare reform at the local and national levels. Through your advanced knowledge and skills, you are prepared to advocate for healthcare policy that aims for safe, effective, patient-centered, timely, efficient, and equitable care. With these skills, you’re empowered to advance nursing practice and protect the welfare of patients,  developing your political competency.]Review the Nurses on Boards and the National Nurse Campaign. As you reflect on what you have learned over the last 8 weeks: https://www.healthleadersmedia.com/nursing/campaign-national-nurse*I include some ideas in the questions that maybe you can use.*1.  What are your plans for the future? I plan to continue professional nursing collaboration to influence policy changes that offer solutions for my community health problems. I want to apply what I had learned to get more involved in local and national organizations.   2.  Will you heed the call for action and join an organization like Nurses on Boards or become engaged with the National Nurse Campaign?3.  Will you join a professional nursing organization?4.  Do you have other ideas that would work to benefit your community or an organization that is important to you? I’m currently working in a clinic specializing in an STDs prevention and treatment program. I plan to be more involved in the process of bringing direct attention to the most vulnerable population in my community.5.  Share with the class what your plans are now that you have a new awareness of your abilities and capabilities to provide advocacy beyond the beside.6.  Compose your final Tweet about this class. Remember to be concise as Twitter only allows 140 characters. Share your Tweet in the discussion. (done): # Hey DNPs, use your political competency to advocate for healthcare policy improvements for your communities!#Instructions:Use an APA 7 style and a minimum of 250 words. Provide support from a minimum of at least three (3) scholarly sources. The scholarly source needs to be: 1) evidence-based, 2) scholarly in nature, 3) Sources should be no more than five years old (published within the last 5 years), and 4) an in-text citation. citations and references are included when information is summarized/synthesized and/or direct quotes are used, in which APA style standards apply. Include the Doi or URL link.• Textbooks are not considered scholarly sources. • Wikipedia, Wikis, .com website or blogs should not be used

Calculate marginal revenue and marginal cost for each quantity.

Consider the total cost and the total revenue given in the table below:Quantity01234567Total cost (in €)89101113192737Total revenue (in €)08162432404856a) Calculate profit for each quantity. How much should the firm produce to maximize profit?b) Calculate marginal revenue and marginal cost for each quantity.

identify and discuss the issue(s) surrounding their chosen themes/topics and propose a program, initiative, or activity that will address those issues.

The Final Project Proposal is a written submission in which students identify and discuss the issue(s) surrounding their chosen themes/topics and propose a program, initiative, or activity that will address those issues. For example, a student from a previous semester chose the theme of Climate Change and Natural Disasters for his project package. For the Final Project Product Proposal, he discussed how climate change affects agriculture in South and Central America. Within the proposal, he identified the issue and causes, prior attempts and deficiencies in addressing the issue, and proposed the solution of enhancing global awareness through art (making information pertaining to climate change more appealing and interesting for a targeted audience). I have added the book and samples of the assignment.Potential theme/topics/global health problems include, but will not necessarily be limited to:COVID-19 (highly recommended)ZikaHIV/AIDSObesity & Heart DiseaseFood/Water Insecurity, Hunger, & PovertyMedical TourismClimate Change & Natural DisastersAbortion & Family PlanningUniversal Healthcare vs. Private Sector Insurance-based PayersHealth & Wellbeing for Nations at War/UnrestVaccinations, Genetic Testing, Autism & Developmental DisabilitiesGlobal Health Security & Preparedness for Aggressive Communicable DiseasesLGBT Community HealthCancerEuthanasia / Death & DyingWhite, Skinny/Thin, Heterosexual, United Statesian Privilege***Students are also welcome and encouraged to propose topics of study they would like to pursue beyond this list.

explain which country may be appropriate for foreign direct investment and which country might be better for outsourcing.

Given that outsourcing is a viable alternative to Foreign Direct (FDI), what issues should be considered before a firm decides between the two? Provide advantages or disadvantages for each. Then, for a business of your choice, explain which country may be appropriate for foreign direct investment and which country might be better for outsourcing. Explain your reasons. (Approximate length 200-250 words).   

Are the due process procedures for a short-term and a long-term suspension of a student the same or different?

Review the school board policy and student handbook of your local public school site or district for information regarding their policies on short- and long-term suspensions of students. You may also obtain this information by interviewing an administrator at your chosen site.  Based on the information that you gather, write a 500-750-word essay summarizing:  The due process requirements prior to a short-term and a long-term suspension of a student at your local site or district. Are the due process procedures for a short-term and a long-term suspension of a student the same or different? Are these requirements consistent with Goss v. Lopez? Support your position with examples from case law, the U.S. Constitution, or other readings.

which out of the four cultural contributions has contributed to the greatest social and cultural impact on human civilization?

 On this assignment answer part 1 and 2 separately.Part 1: Review the following four cultural contributions that you studied this sThe Law Code of HammurabiThe Illiad and Odyssey of HomerThe Roman ColosseumCarolingian Minuscule Script. Part 2: Answer the following question in relation to one of the above cultural contributions to human history:The Question: In your own opinion, which out of the four cultural contributions has contributed to the greatest social and cultural impact on human civilization? (Make sure to back up your answer with three specific examples as explained in Part 3 of the assignment.)Part 3: There is no required length for this essay, but you need to back up your answer by finding three specific examples from scholarly sources. These sources cannot include Wikipedia. You can use your course text, other books, videos, academic websites, and journal articles from the library. Particularly good library databases  for this project are Academic Search Complete and World History in Context. You can access them here:   Remember to cite your sources in your essay and create a Work Cited Page using MLA format.  If you need help with MLA format contact a librarian or visit the guide on the . It is highly recommended that you contact a librarian for help. You can do that on-campus in the Center for Learning Resources (2nd floor). From off-campus, you can contact the library here: Part 4: Please use Microsoft Word to write your Mini-Essay assignment. Use the following “Rubric” as a guide to writing and answering the Mini Critical Thinking Essay: Part 5: Once you completed the Mini-Essay assignment you will need to: Part 6: Remember that there are no right or wrong answers. You will be graded for how well you back up your personal opinion with sources. (Warning: Unlike the Humanities Quizzes 1-10 and the students only have one attempt to submit their answers for the Final Exam.)Essay Assignment 2: (Worth 20 Points!) Your Humanities Final Exam will consist of two Critical Thinking Essays, which will focus on a student’s ability to use their Critical Thinking skills in evaluating the impact of some specific past human cultural contributions that were covered in this course. Read the following instructions to prepare for the Critical Thinking Essay on your Final Exam. Warning: Unlike the Humanities Quizzes 1-10 and the students only have one attempt to submit their answers for the Final Exam.Instructions:Step 1: View and read the following Primary and Seconday source materials:Primary Sources:Secondary Sources: Part 2: Answer the following Question:The Question: In your own opinion, how did Emperor Augustus use works of culture, such as the Augustus Primaporta, the Aeneid and the Res Gestae as forms of propaganda to legitimize his reign as Rome’s emperor? How do political leaders today use forms of culture, like Augustus, to legitimize their own role in government? (Give three specific examples to back your argument.)Part 3: There is no required length for this essay, but you need to back up your answer by finding three specific examples from scholarly sources. These sources cannot include Wikipedia. You can use your course text, other books, videos, academic websites, and journal articles from the library. Particularly good library databases  for this project are Academic Search Complete and World History in Context. You can access them here:   Remember to cite your sources in your essay and create a Work Cited Page using MLA format.  If you need help with MLA format contact a librarian or visit the guide on the . It is highly recommended that you contact a librarian for help. You can do that on-campus in the Center for Learning Resources (2nd floor). From off-campus, you can contact the library here: Part 4: Please use to write your Mini-Essay assignment. Use the following “Rubric” as a guide to writing and answering the Mini Critical Thinking Essay:Part 5: Once you completed the Mini-Essay assignment you will need to:

× How can I help you?