describe the manner in which your own theories of instructional design and development have matured or changed since the beginning of this course.
Now that you have completed your project and are in the last week of the course, reflect on your experience and growth by addressing the following:
- Reflect on your time in the course and provide two examples that describe the manner in which your own theories of instructional design and development have matured or changed since the beginning of this course.
Explain how one or more of the currently available COVID19 vaccines work to reduce the incidence and/or severity of COVID19 infections.
For this week’s discussion, you will select a topic related to the immunology or pathophysiology of COVID19. Your post must be at least 120 words of your own (please make sure to use your own words- do not just copy and paste from other resources). Make sure to post a link to the resources you use. You should also reply to at least 2 other post with 35 words or more and at least one follow up question. You may select one of the topics below or a different topic related to COVID19 immunology of your choice. You do NOT have to answer every question listed for each topic- these are just suggestions for some of the topics to research from an immunological perspective. Initial post is due by Thursday (6 points) and two replies with at least one follow-up question (2 points each) by Sunday.
For one bonus point on this discussion, reply to a classmate’s question with an additional post of at least 35 words or more. Make sure to cite the source for your answer.
1. Briefly discuss treatment of COVID19 with one or more of the following:
- monoclonal antibodies, e.g., Eli Lilly’s bebtelovimab, Astra Zeneca’s Evusheld (tixagevimab and cilgavimab)
- antiviral medications, e.g., Pfizer’s Paxlovid (the drug administered to President Biden and Dr. Anthony Fauci when they contracted Covid summer 2022), Gilead’s remdesivir(administered to former President Trump in October 2020), Merck’s molnupiravir
Some of the questions you might consider are: For which patient populations are these treatments indicated? How does each treatment work to reduce the incidence and/or severity of COVID19? At what point in the illness is each specific treatment effective and why? What is Paxlovid Covid rebound? Which monoclonal antibody products are currently recommended for treatment and/or prevention of COVID19? Which antigenic epitopes of the SARS-CoV-2 virus do these monoclonal antibodies target? Why has treatment with some formerly effective monoclonal antibodies been discontinued, e.g., Regeneron’s REGEN-COV (casirivimab and imdevimab; administered to former President Trump in October 2020) and Glaxo Smith Kline’s Xevudy (sotrovimab)?
OR
2. Explain how one or more of the currently available COVID19 vaccines work to reduce the incidence and/or severity of COVID19 infections. Some of the questions you might consider are: Which antigenic epitopes do the current vaccines target? Based on current evidence, how long do SARS-CoV-2 antibodies persist after the primary series compared to a booster dose? Are there differences in immune response depending on how much time elapses between vaccinations? Are there differences in immune responses of patients with immune suppressing conditions? Is there any evidence if cell-mediated immunity, i.e., T cells, is also affected by vaccination? How have new variants, e.g., omicron, been able to partially evade the immune response inducted by the vaccines? How do the recently authorized new bivalent boosters by Moderna and Pfizer work to specifically target current omicron strains more effectively?
OR
3. Healthcare workers will likely be taking care of patients with post acute COVID 19 infection AKA “long COVID” for possibly many years to come. What do we know about the incidence, manifestations, and pathophysiology of post acute coronavirus infection? What mechanisms are thought to be responsible for the development of long COVID syndrome? Which risk factors increase a patient’s risk for long COVID? Which organ systems may be affected? What treatment options are being developed for these conditions?
Since the research on COVID19 is always being updated, bear in mind that much of the information you find may change in the next few months, as we continue to learn more about this condition. Make sure to cite high-quality sources based on peer reviewed scientific research. Here is a partial list of suggested sites for info on the vaccines:
Medline Plus COVID vaccine info https://medlineplus.gov/covid19vaccines.html (Links to an external site.)
CDC COVID vaccine info https://www.cdc.gov/vaccines/covid-19/index.html (Links to an external site.)
WHO COVID vaccine info https://www.who.int/emergencies/diseases/novel-coronavirus-2019/covid-19-vaccines (Links to an external site.)
NIH Treatment Guidelines for COVID https://www.covid19treatmentguidelines.nih.gov/ (Links to an external site.)
NIH Therapeutic management of adults with COVID https://www.covid19treatmentguidelines.nih.gov/therapeutic-management/
Compare and contrast the beliefs on healing of the five religions noted.
- Read pages 15-34 in textbook.
- Compare and contrast the beliefs on healing of the five religions noted.
- Complete this assignment in 2-3 paragraphs using proper spelling, grammar, and APA format. Use of citations and references as needed.
Can protein diets be related to disease like, such as kidney disease osteoporosis or others?
Can protein diets be related to disease like, such as kidney disease osteoporosis or others? How do our choices in protein foods increase or decrease our health risk?
then reply separately to these two student and have a question in it .
Describe four proven data protection strategies a company can use to protect their data stored in the cloud.
Describe four proven data protection strategies a company can use to protect their data stored in the cloud. Use your textbook and quality external resources for your writing assignment. Remember to cite your sources. APA format is preferred. However, MLA or Chicago (Turabian) would be fine as well. The important part to me is that you cite your sources consistently. This assignment should be 3-5 pages in length. You can go longer if you need more space to properly cover the topic.
Write a dialog in which each woman attempts to persuade the other to change their mind on the issue of suffrage.
write a letter exchange or spoken dialog between two women in 1920 on opposite sides of the women’s suffrage issue. Creatively explain who the women are and how they are related. Perhaps they are a mother and daughter, two friends, pen pals, or sisters. Regardless of their relationship, they are on opposite sides of this issue. Write a dialog in which each woman attempts to persuade the other to change their mind on the issue of suffrage. Write either at least 4 short letters (1 paragraph each) or 300-400 words of dialog.
Note: This assignment includes documents with complex images or text that are not accessible when utilizing assistive technology. Should you require accommodation, please reach out to your instructor via Canvas message at least one week in advance so that we can work out alternate sources.
Describe guidelines for making concessions with examples during a negotiation process.
NEGOTIATION TECHNIQUES, LSM 422
Homework 2, Fall 2022
Due Monday, September 09, 2022
Q1. Describe the following by a scenario, showing seller’s view and buyer’s view:
a. Initial offer/asking price
b. Target points
c. Resistance points
d. Walk-away points
e. Conditions for making a deal or not making a deal
You need to take a scenario or example different from the one given in the textbook. (40)
Q2. Describe guidelines for making concessions with examples during a negotiation process. (10)
Create a plan for project oversight that includes identifying the project’s greatest challenges and mitigation recommendations.
Assignment – Project Proposal: Execution, Control, and Closure
Overview
Note: This is the third of three assignments that, as a whole, cover all aspects of the project life cycle relevant to your selected project. Now, it is time for you to discuss your project’s challenges (e.g., risks), performance management plan (e.g., earned value management), and proposed plan for closing the project when it is done.
Instructions
Write a 4–6 page paper in which you define the execution, control, and closure aspects of your chosen project. In your paper you must:
- Create a plan for project oversight that includes identifying the project’s greatest challenges and mitigation recommendations. The plan should also include rationale for why the selected challenges are the greatest challenges and why the chosen mitigation recommendations were made.
- Provide specific and detailed information on how you will measure project performance. Define how the project will be measured and include at least three key EVM metrics that will be used to determine progress and performance success. This should also include rationale on why those specific metrics were chosen.
- Create a plan for closing the project properly that includes details on how that closure will be coordinated with any necessary stakeholders.
- Create a performance evaluation to measure project effectiveness that includes scope, cost, time, and quality.
- Use at least three sources to support your writing. Choose sources that are credible, relevant, and appropriate. Cite each source listed on your source page at least one time within your assignment. For help with research, writing, and citation, access the library or review library guides.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment is:
- Develop a process for measuring the progress of a project, providing oversight, coordinating project closure, and determining project effectiveness.
Explain a minimum of two techniques you currently utilize to protect your valuable data from being a target of cyber crime.
Protection from Cybercrime
Prior to beginning work on this discussion, please read all of the required resources for this week. Review the instructions below and research a minimum of five additional articles in the UAGC Library that were published within the last 10 years to help support your statements. Be sure to include a reference list for your articles at the end of your post in APA format as outline by the UAGC Writing Center (Links to an external site.).
Cybersecurity is not only an issue for governments and large corporations, it also impacts us as individuals. From a criminal justice professional perspective, provide a professional opinion about the issues related to security and protection from cybercrime.
From a personal perspective, address the following.
Required Resources
Articles
Finklea, K. & Theohary, C. A. (2015). Cybercrime: Conceptual issues for congress and U.S. Law Enforcement (Links to an external site.). Congressional Research Service. Retrieved from https://www.fas.org/sgp/crs/misc/R42547.pdf
- This article provides a comprehensive overview about issues for congress and national law enforcement to consider in the security and protection of cybercrime.
Accessibility Statement does not exist
Privacy Policy (Links to an external site.)
Kelly, B. B. (2012). Investing in a centralized cybersecurity infrastructure: Why “hacktivism” can and should influence cybersecurity reform (Links to an external site.). Boston University Law Review, 92(5), 1663-1711.
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article provides a comprehensive overview and analysis about the need for cybersecurity reform.
Lohr, S. (2010, January 17). Companies fight endless war against computer attacks (Links to an external site.). New York Times. Retrieved from http://www.nytimes.com
- This article explores how Google and other companies are attempting to prevent and respond to cyber-attacks.
Accessibility Statement does not exist
Privacy Policy (Links to an external site.)
Macmanus, S. A., Caruson, K., & McPhee, B. D. (2013). Cybersecurity at the local government level: Balancing demands for transparency and privacy rights (Links to an external site.). Journal of Urban Affairs, 35(4), 451-470. http://dx.doi.org/10.1111/j.1467-9906.2012.00640.x
- The full-text version of this article can be accessed through the EBSCOhost database in the UAGC Library. This article examines what is needed to better balance privacy protection and transparency in cybersecurity policy making.
Verini, J. (2010, November 10). The great cyberheist (Links to an external site.). New York Times Magazine. Retrieved from http://www.nytimes.com
- This article provides a real-world example of one criminal’s cybercrimes and the aftermath.
Accessibility Statement does not exist
Privacy Policy (Links to an external site.)
Recommended Resource
Website
MSCJ Professional Sources (Links to an external site.). (http://ashford-mscj.weebly.com/)
- This resource site will provide assistance in researching additional sources for the assessments within this course.
- Describe the data you currently have that you consider important.
- Explain a minimum of two techniques you currently utilize to protect your valuable data from being a target of cyber crime.
- Describe what you could do to better protect yourself from cyber crime.
From a professional, evidence-based perspective, address the following.
- Explain the basic legal rights of individuals and companies who are affected by cyber crime.
- Explain the ways in which questions about cybersecurity are out of your hands. (In other words, what can’t you do to protect yourself?)
- Analyze the risks inherent to corporations that cannot be controlled or limited through any protective actions.
What forms are required to be filed with the SEC?
What is the mission of the SEC?
What forms are required to be filed with the SEC?
What financial statements must be filed with them quarterly and annually?
please provide sources