peer review responces

(1) The two different methods name for evaluating evidence is Quantitative method, which is consist of a Systematic Review (SR) and Meta-Analysis. The qualitative method consists of data-Analysis. According to Sriganesh, Shanthanna & Busse, (2016).

A SR can be either qualitative, in which eligible studies are summarized, or quantitative (meta-analysis) when data from individual studies are statistically combined. Not all SRs may result in meta-analyses. Similarly, not all meta-analyses may have been preceded by a SR, though this element is essential to ensure that findings are not affected by selection bias.

Quantitative and qualitative researchers use different methods and have different goals. At the level of methods, quantitative researchers criticize qualitative researchers for not performing null hypothesis significance tests. However, reviewed literature shows that these are invalid, and so it is not particularly meaningful to criticize a lack of performance of something that should not perform anyhow. More generally, one has “suggested that there are strengths and limitations to the quantitative and qualitative methods” (Trafimow, 2014). The more interesting question pertains to goals, and quantitative and qualitative researchers differ there, too, and some limitations of the usual quantitative goal, which is to find causal mechanisms. However, a typical qualitative goal of describing personal or subjective experience also has limitations. Finally, when comparing both quantitative and qualitative social science research to physics, it shows that each has similarities and differences. There is much for quantitative and qualitative social science researchers to gain, not only by considering each other’s methods and goals carefully but also by going outside social science and considering the accomplishments in nonsocial sciences.

(2) There are different methods of evaluating evidence. The two common methods of evaluating evidence in the field of nursing are Systematic Reviews and Meta-Analyses. These two methods help in the determination of the relevance and validity of the evidence. The two methods of evaluating evidence are both similar and have got some differences as well.

Similarities and Differences of both the methods:

Both the Systematic Reviews and Meta-Analyses are considered the highest quality of evidence for clinical decision making and can be used above all the other methods of evaluating evidence. Both the methods for evaluating evidence are similar because they involve the collection of data from different sources and summarizing the all the evidence and results of the studies.

While systematic review collects and summarizes all the empirical evidence, the meta-analysis uses statistical methods to summarize the results of the studies. Meta-analysis is a statistical method used to combine the numerical results from such studies, if it is possible to do. On the other hand, systematic review is a formal, systematic and structured approach to review all the relevant literature on a topic. The other difference is, the rationale for Meta-analysis is that through the combination of samples from different studies the overall sample size is increased, while the rationale for systematic reviews is that when data is combined together from different sources a greater reliability would be gained.

When performing a systematic literature review or meta-analysis, if the quality of studies is not properly evaluated or if proper methodology is not strictly applied, the results can be biased and the outcomes can be incorrect. However, when systematic reviews and meta-analyses are properly implemented, they can yield powerful results.

(3) In some journals, you will see a ‘level of evidence’ assigned to a research article. Levels of evidence are assigned to studies based on the methodological quality of their design, validity, and applicability to patient care. What would be the benefit of having research with different levels of evidence when scholarly writing?

(4) Article one by Aldridge, Linford, & Bray (2017), reviewed previous research on Screening, Brief Intervention, and Referral to Treatment (SBIRT) which showed that patients decreased use of substances after SBIRT was performed (strength). Because the study looked at prior research, researchers were unable to verify if patients changed their behavior because of interventions or referrals for treatment, and they did not witness the patient receiving services, so there may have been other reasons for patients to decrease substance use (weakness). Because the researchers reviewed prior studies and results were consistent, this study should provide evidence that SBIRT does result in decreased substance use in substance abusers. “To feel most confident in the use of a particular intervention, a practitioner would want to be sure that study findings supporting this evidence were replicated or repeated in numerous studies by similar and different groups of researchers” (Reinhardt, 2010, p. 41). This study may help support practice changes since studies were repeated and had significant results.

Article two by Babor, Del Boca, & Bray (2017), looked at two different groups of SAMHSA’s grant recipients which had screened over a million patients over their funding period, and many patients were referred for intervention or treatment. The article states that “…SAMHSA programs were implemented with sufficient adherence to evidence-based practice to serve as a viable test of SBIRT effectiveness” (Babor et al., 2017, p. 113). This is a strength for this article. “Greater intervention intensity was associated with larger decreases in substance use” (Barbor et al., 2017, p. 110). Not all patients received the same type of intervention, so the researcher may not be able to compare patient outcomes in the same way (weakness). The study may help support practice changes since there was adherence to evidence-based practice.

Article three by Glass, Hamilton, Powell, Perron, Brown, & Ilgen (2015), discussed how their research used a systematic review of randomized controlled trials (RCTs) to see how brief interventions impacted alcohol use. “The RCT is considered a true experiment and one of the most powerful tools in clinical research because it provides the potential to show a causal relationship between the treatment variable and the outcome…” (Reinhardt, 2010, p. 38). This article did have weaknesses because researchers were not sure if they missed unpublished studies that could have impacted the outcome of this study. In addition, results lacked information on whether “…referral to and receipt of specialty alcohol treatment improved clinical outcomes among brief alcohol intervention recipients” (Glass et al., 2015, p. 1412). This study may not support practice changes because the study lacked information.

Article four by Hargraves, White, Frederick, Cinibulk, Peters, Young, & Elder (2017), looked at a high number of patients who were screened for SBIRT, and used quantitative and qualitative data to look at barriers and facilitators when using SBIRT in practice (this could be a strength or weakness). “Quantitative research often utilizes widely accepted measures with established reliability and validity, and data are subject to more rigorous statistical analyses compared to qualitative data” (Reinhardt, 2010, p. 40). Qualitative data are used to show what works or does not work, so a facility can use it to make practice changes (strength) (Reinhardt, 2010). A weakness in this study is that it looked a all different types of practices using SBIRT, and looked are a variety of conditions instead of just drugs and alcohol. This study could support practice change because it looks at best practices for using SBIRT, and does include primary care facilities and federally qualified health centers which is similar to this nurse’s practice.

Article five by Hodgson, Stanton, Borst, Moran, Atherton, Toriello, & Winter (2016), used qualitative data to study barriers and facilitators for SBIRT. The results demonstrated themes that were compared to past research. One strength in this study “…is that it sought input from all levels of providers” (Hodgson et al., 2016, p. 56). The study used focus groups so there could be bias, which is considered a weakness. At Indian Health, all levels of providers perform screenings, so this study could support this nurse’s practice change because of similar practice settings.

The impact of screening, brief intervention and referral for treatment in emergency department patients’ alcohol use: a 3-, 6- and 12-month follow-up(2010), article six, used a control and intervention group to see if SBIRT made an impact on substance use after three, six, and twelve months. The study was strong based on the control groups being similar. The study’s weakness was impacted by patients being lost to follow up after one year. This study may not support practice changes unless patients who receive SBIRT have follow up at three, six, and twelve-month periods. With time, the patients may go back to using substances.

Minimum of 60 words per responses with proper citations and references

Lab 1: Develop System Administration Procedures for Windows 8.1 Security Configuration

Lab #1: Develop System Administration Procedures for Windows 8.1 Security Configuration

Purpose: Develop systems administration procedures to implement systems security configuration guidance and best practices.

Objectives

1.  Develop a Windows system restore point systems administration procedure to implement an industry recognized best practice for maintaining system integrity and availability.

2.  Develop a Windows system administration procedure to manage programs and features.

3.  Develop a systems administration procedure to implement configuration rules fromsystems security technical guidance issued by a vendor or government organization.

Overview

In this lab, our focus is upon developing a set of procedures which can be incorporated into an organization’s security implementation guidance and documentation. For each procedure, you will develop, test, and document the steps required to implement the selected best practices and security configuration guidance (as provided in the lab instructions and notes).

Your deliverables for this lab will become part of the final project for this course (System Administration Manual).

Deliverables

(a)  Step-by-Step System Administration Procedure for Creating, Using, Removing System Restore Points for Windows 8.1

(b)  Step-by-Step System Administration Procedure for Managing Windows 8.1 Programs and Features 

(c)  Step-by-Step System Administration Procedure for Implementing Security Configuration Rules for Windows 8.1 

Submit your deliverables in a SINGLE FILE in MS Word format (.docx or .doc file types) using the corresponding assignment folder entry (in LEO). (Use the Deliverable Template file from Course Resources > Sample Files > CSIA 310 Lab Deliverable Template.docx.) Every deliverable must use the format shown below. (Replace [Section Name] with the heading for the section, e.g. Creating a System Restore Point).

Title:

Operating Environment:

1. Hardware

2. Software

Description:

Notes, Warnings, & Restrictions:

Resources (Further Reading):

1. 

2. 

3. 

Procedures:

[Section Name]

Brief Introduction Paragraph

1. 

2. 

3. 

[Section Name]

Brief Introduction Paragraph

1. 

2. 

3. 

Instructions

PART (A): IMPLEMENTING SYSTEM RESTORE POINTS

1.  Investigate the System Restore tool (used to manage system restore points). To access the tool, open the System tool from Control Panel (Control Panel > System and Security > System). Then, click on System Protection (left menu).

2.  Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Windows 8.1 System Restore Point capability. Using those sources, research the procedures required to perform the following tasks:

a.  Create a system restore point for a Windows 8.1 system

b.  Use a system restore point to roll-back changes made to a Windows 8.1 system

c.  Remove system restore points from a Windows 8.1 system (some and all)

3.  Develop a systems administration procedure which can be used to perform tasks related to item #1 (management and use of system restore points).

4.  Test your draft procedures using the virtual machine provided in the online lab environment (UMUC’s VDA) or using a locally installed Virtual Machine (VM) running Microsoft Windows 8.1 Professional. As you run your tests, collect screen snapshots to illustrate key steps in your procedures. Insert these snapshots at the appropriate points in your procedure.

PART (B): MANAGING PROGRAMS AND FEATURES FOR WINDOWS 8.1

1.  Investigate the Programs and Features tool (used to manage installed programs and optional features / capabilities). To access the tool, open Programs and Features from the Windows Control Panel. 

2.  Identify appropriate sources of information (e.g. Windows Help, Microsoft Technet, etc.) for instructions for using the Programs and Features tool. Using those sources, research the procedures required to perform the following tasks:

a.  Turn Windows Features On or Off

b.  Modify, Repair, or Uninstall a program from a Windows 8.1 system

c.  Select and Install Updates for Windows and Windows Applications, Find an installed Update, Remove an installed update

3.  Develop a systems administration procedure which can be used to perform tasks related to item #2. Provide examples for each of the required tasks. (Select a specific feature, program, or update and use that as an example in your procedure.)

4.  Test your draft procedures using the virtual machine provided in the online lab environment (UMUC’s VDA) or using a locally installed Virtual Machine (VM) running Microsoft Windows 8.1 Professional. As you run your tests, collect screen snapshots to illustrate key steps in your procedures.

PART (C): IMPLEMENTING SECURITY CONFIGURATION RULES USING THE LOCAL GROUP POLICY EDITOR

Note: you are NOT implementing the DISA / DoD STIG in this section. You are implementing a set of security configuration rules that your “company” has selected from industry accepted sources.

1.  Investigate the Local Group Policy Editor tool (Windows Key + R then type gpedit.msc). Pay particular attention to the menu tree in the left hand pane (expand and review the categories of settings which can be changed using this tool).

2.  Research the security configuration rules listed in Table 1. These rules were developed from the Department of Defense Security Technical Implementation Guidance for Windows 8.1.  

3.  Group related security configuration rules and then develop a step by step procedure for each category of rules. See the “Suggested Procedure Group” column in Table 1 for suggested categories. Your groupings should allow for inclusion of additional, related rules at a later date. (For example, there are two “energy saving” rules in the table; an organization may wish to add additional rules to this category at some point in the future.)

4.  For each category of rules, develop step-by-step written procedures for systems administrators. Your written procedures must implement the “remediation” guidance as listed in Table 1[i].

5.  Test your draft procedures using the virtual machine provided in the online lab environment (UMUC’s VDA) or using a locally installed Virtual Machine (VM) running Microsoft Windows 8.1 Professional. As you run your tests, collect screen snapshots to illustrate key steps in your procedures.

6.  Incorporate your screen snapshots for key steps into the draft procedures. Each snapshot should be placed UNDER (after) the step to which it applies. Captions are not required.

7.  Make any additional changes required to address issues found during testing of the step-by-step procedures.

FINALIZE YOUR DELIVERABLE

1.  Using the grading rubric as a guide, refine your step-by-step procedures. Your final products should be suitable for inclusion in an organization’s Systems Administrator’s Handbook. Remember that you are preparing multiple system administration procedures which must be presented separately.

2.  As appropriate, cite your sources using footnotes or another appropriate citation style.

3.  Use the resources section to provide information about recommended readings and any sources that you cite. Use a standard bibliographic format (you may wish to use APA since this is required in other CSIA courses). Information about sources and recommended readings, including in-text citations, should be formatted consistently and professionally.

4.  At a minimum, each systems administration procedure document must include the following sections: 

a.  Title

b.  Operating Environment

c.  Description

d.  Notes, Warnings, & Restrictions

e.  Resources (format as Bibliography or Reference list)

f.  Procedures

5.  Each procedure document should be placed in the listed order in a SINGLE FILE (see deliverables list above). Each file should start with a title page which lists the following information:

· Lab Title and Number

· Procedure Name

· Date

· Your Name

6.  The CSIA 310 Template for Lab Deliverable.docx file is set up to provide the required title page and three lab procedure templates.  

Additional Requirements for this Lab

1.  Given the large number of security configuration rules which must be implemented, you must group the rules into categories or sub-sections within your step-by-step procedures.

2.  Your step-by-step procedures should tell the reader where to find and how to launch the systems administration tools used to change security configuration settings for the Windows 8.1 operating system.

3.  It is not necessary to specify every step that a system administrator must take to implement the security rules. But, you must address each security configuration rule separately and include enough detail that your reader will understand how to perform the required steps to implement the security configuration changes.

4.  Use screen snapshots to cue the reader to important steps or provide information required to complete check points for proper completion of a step or set of steps (e.g. including a snapshot which shows the “after” state for a group of security settings).

5.  Make sure that your snapshots will enhance the reader’s understanding of the procedure and required configuration changes. Too many snapshots or illustrations can make a procedure difficult to use.

6.  All snapshots must be created by you for this lab using screen captures showing how you personally performed (tested) the systems administration procedure as written by you. You may not copy and paste images from help pages, manuals, or the Internet.

7.  Images (screen snapshots) should be cropped and sized appropriately.

8.  A screen snapshot belonging to a specific procedure step does not require a caption.

9.  Your procedures must be submitted to Turn It In for originality checking. You are encouraged to consult existing configuration instructions, guidance, and procedures for both content and format. Your work must be substantially your own, however, which means you should paraphrase whenever possible. Credit the sources of information used via footnotes and in your “Resources” section.

10.  Make sure that the sources you cite or recommend (additional reading) are authoritative and are the best ones available.

11.  Your Operating Environment section should identify the hardware, operating system, and/or software applications to which the procedure applies. For this lab, your procedures will apply to:

a.  Hardware: Laptop or Desktop Computers

b.  Operating System: Windows 8.1 Professional

Your Notes, Warnings & Restrictions section should include important information that is not found elsewhere in the procedures document. For example, this section could include information about alternatives to the selected security configuration settings. Or, this section could include information about related security procedures or policies. If this procedure implements controls relevant to an external security requirement, e.g. the HIPAA Security Rule, then that information should be included in the notes section. Consult the 
Windows 8.1 STIGto see what types of information you may need to include in your document. This section should also include important information about harm or risk that could occur if the procedure is not correctly followed or implemented. If there are no such warnings then this section should so


[i] Table 1 was adapted from the Department of Defense Security Technical Implementation Guidance (STIG) for Windows 8/8.1. Available from:http://iasecontent.disa.mil/stigs/zip/Apr2015/U_Windows_8_and_8-1_V1R9_STIG.zip

Theory and Practice

Topic: Ethical Treatment of Animals

 In this paper you will identify, specifically, the issue and the ethical problems
it presents. Drawing on various sources, explain how one of the classical
theories (utilitarianism, deontology, virtue ethics) would resolve the problem.
Then, contrast this response with the perspective brought to the issue by
relativism, emotivism, or ethical egoism, Finally, state which of these views
is closer to your own, supporting your response with clearly presented and well
supported argument. It must be original not plagiarized.

Paper needs to 8 pages not including title and reference page

APA formatted and It must original

Due June 30,2013

Criminal justice

Research and report the homicide statistics of a city of your choice for the last 5 years. Has the city homicides increased, decreased, or remain the same. Then discuss in the paper if you believe the police played a role in reducing the homicides, or were other factors more important in reducing the number of homicides in the city you chose. After discussing the factors, what efforts would you take to reduce homicides in the city you chose for this assignment. Make sure you cite your sources. One page double spaced.

ENG096 Argosy English Future Goals & Course Reflection Discussion

Assignment 1: Discussion—Final Reflection

In this assignment, you will have the chance to look back and analyze your experience in this course. Much as you did when you were writing your conclusion, you can look back at each point you covered and restate your experience. Congratulate yourself on a job well done and recognize the goals you have as you move into ENG101!

Reflect on what you have learned in this course. Answer the following:

  • What do you wish you had known at the start of the course that you know now? What seemed difficult and what seemed easy?
  • What skills did you improve? What do you still need to work on?
  • How will you apply what you have learned to other classes or to your workplace or future workplace setting?

Write your initial response in one to two paragraphs.

Polling Organization

Polling Organizations: Polling agencies claim to provide accurate readings of the pulse of America. They give the public a percentage of the population who are likely to vote for a particular candidate or a company the probability that their customers may purchase their product. Polling organizations sample the population and use a proportion to predict the results during an election or the likelihood a customer will buy. 

Choose a polling organization and look up a current sampling situation. Discuss the poll, sample size, margin of error, and inferences. 

Explain the importance of this data and what you find interesting about the results.

at least a page.

SYG2000 Rasmussen College Breaking a Norm Experience Assignment

Deviance is the label sociologists use to describe behavior that violates cultural norms. Norms include the expectations and rules that guide our behavior, appearance, manners, gestures, body language, conduct, et cetera. For this assignment, your task is to break a norm and write about your experience, as follows:

  • Choose one norm to break as long as it is within the guidelines for legal behavior. Examples of acceptable norm violations include dressing in a manner that would be considered eccentric or inappropriate for a given social situation or invading someone’s personal space.

In a 2- to 3-page paper, double-spaced, include the following:

  • Explain which norm you broke and why you chose it. Discuss what the appropriate behavior for the situation you chose would typically require (for example, if you are violating a dress code, discuss what you would normally wear in that situation).
  • Discuss why your behavior violated those norms and the reaction you received upon breaking them.
  • Apply one sociological theory of deviance to interpret the response to your behavior. Begin by briefly discussing the key aspects of the theory you have chosen and then explain why that theory is useful for understanding your norm-breaking experiment. The Why Are People Deviant? lecture provides an overview of the major sociological theories of deviance.

Submissions should be in APA format, with a title page and reference page.

How to evaluate, use historical fiction, biographies, and informational books for K to 3rd grade?

Read two historical fiction, two biographies, and two informational books for K to Age 8/Grade 3.

Write a 750-1,000 word evaluation that includes the following:

  1. Evaluation of each book based on the rich details of the setting, character descriptions, and fiction or nonfiction materials
  2. Description of how to use each genre in the classroom setting
  3. Age appropriateness

Include resources and in-text citations

Prepare this assignment according to the guidelines found in the APA Style Guide. An abstract is not required.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

Business Communication

I am needing help with this please .. 

Part 1

Prepare a one-page description of your plans to solve the problem for one of the following research studies. Use the following headings for the problem:

  1. Statement of the Problem
  2. Research Method and Sources of Information (BE SECIFIC)
  3. Nature of Data to Be Gathered and Analyzed
  4. Hypothesis or Hypotheses to Be Proved or Disproved (if feasible)

Here are some ideas to get you started:

  • a. Investigate a problem occurring on your campus (e.g., declining enrollment in some majors, increasing tuition, delayed financial aid payments, high cost of textbooks, or closed classes) or in a job or student organization position you hold.
  • b. Superior Foods, Inc., is considering adding organic versions of its frozen vegetables in an effort to establish itself as a leader in this fast-growing market. To increase its available supply of organic produce, management recognizes the need to assist local growers in adopting organic farming methods. The first step in this process is to recruit experts in organic farming to design and implement training.
  • c. Rainbow Pool and Spas initiated a website to provide answers to frequently asked questions and product-update information. Customer response has been outstanding, freeing up the company’s toll-free telephone lines for calls about more technical, nonrecurring problems—a primary goal of the service. As marketing manager, you are considering the possibility of starting a corporate blog and a microblogging site on Twitter to strengthen your relationship and communication with customers.
  • d. As branch manager of a bank, you are faced with the task in a sagging economy of reassuring customers of the solvency of your institution. Your current strategies for casting a positive light on negative performance indicators don’t seem to be effective.

Part 2

Select the most effective graphic means of presenting the following data. Justify your decision.

  • a. Data showing the growth in the number of companies offering employees paid time for volunteerism over a five-year period
  • b. Data showing the number of downloads from iTunes by media type (music, books, and TV segments) for the past quarter
  • c. Data showing percentage of organizational projects that are delayed, on time, or ahead of schedule
  • d. Growth in credit card debt over the past four years by state
  • e. Data showing the relationship of the functional areas of a company from the CEO to the vice presidents to the line supervisors
  • f. Predicted unemployment rate in regions of the U.S. for the year 2015
  • g. Instructions for conducting interrogations of employees suspected of committing fraud
  • h. Figures comparing the percentage of warranty claims of a company’s three product lines for the past four quarters
  • i. Data showing the number of people utilizing the portfolio option of a financial investment firm’s website. The data should depict the number of portfolios opened by investors in five age categories during each of the past four quarters.
  • j. Graphic tracking the progress of a product development team working on a new refrigeration product for a 2013 launch date