Forum 2: Consumer Genetic Testing (Graded Discussion)
Advances in genetic technology like genetic and genomic testing and gene editing are transforming human biological sciences, but are creating new ethical dilemmas. Here, we address the implications of direct-to-consumer genetic testing.**Note–link to NPR story below is now functionalFDA Approves Marketing of Consumer Genetic Tests (NPR, 4/7/17) (Links to an external site.)I had My DNA Picture Taken, With Varying Results (New York Times, 12/30/13) (Links to an external site.)Read the two articles (links below) and then address the following questions in your post.
In 2010 and 2011, some states scaled back their Medicaid
Question In 2010 and 2011, some states scaled back their Medicaid programs, or considered withdrawing, because: style=”color:rgb(73,76,78);”>Question 14 options:they found widespread fraud in the programs.physicians were refusing Medicaid clients.they found nursing home payments to be onerous.budget troubles made it difficult for them to pay their match.
explained the process LEGO used to implement ERM. Do you agree with the approach implemented and why? If you could change anything about the implementation of ERM in this case study what would that be and why?
Would you implement the same ERM in your current organization (or future organization)?Select AT LEAST 3 other students’ threads and post substantive comments on those threads, evaluating the pros and cons of that student’s recommendations. Your comments should extend the conversation started with the thread. Replies should be completed by Sunday.ALL original posts (4 in total) and comments must be substantive. (I’m looking for about a paragraph – not just “I agree.”).Notes:1.300 words2.no plagiarism
can can you help me with that assignment please? ATTACHMENT
Question can can you help me with that assignment please? ATTACHMENT PREVIEW Download attachment qa_attachment_1566947852385.jpg palmbeachstate.blackboard.com Pantherweb | PantherWeb Assignments – CTS1110 257351 MICROCOMP OPERAT SYS GB Youselaine St Pierre 135 CH STATE EGE Home Organizations AP OPERAT SYS GB Assignments Assignments P-1 Attached Files: Networking PLO 3 Measure.docx (18.403 KB) The student will Compare and contrast major functions and features of three operating systems including a minimum of one current network operating system. In the Functionality/Feature cell you will include whatever the functionality or feature being compared is. Then, in the adjacent cells that correspond to each OS being compared, discuss if the feature is present or to what capacity it may exist and any advantages or issues that may be associated with that functionality or feature in that particular OS.Form to be completed and uploaded is attached here.
1. DISCUSSION QUESTION: 1McGregor published Theory X and Theory Y over 30
1. DISCUSSION QUESTION: 1McGregor published Theory X and Theory Y over 30 years ago. So we still have X managers? Why or why not? How does Theory Z fit into McGregor’s theory?INSTRUCTIONS:a) Main discussion with 250 word lengthb) Response for the discussion with 150 word length(First response with 150 words length and second response with 150 word length)c) No plagarism and Three referencesd) double-spaced2. DISCUSSION QUESTION: 2Explain what are the five big models of personality that correlate with leadership? INSTRUCTIONS:a) Main discussion with 250 word lengthb) Response for the discussion with 150 word length(First response with 150 words length and second response with 150 word length)c) No plagarism and Three referencesd) double-spaced3. SUMMARY: QUESTIONINSTRUCTION:300 WORDS DISCUSSION
Document the following for the project sponsors:Present your summary as either:Submit your
Document the following for the project sponsors:Present your summary as either:Submit your assignment.
Describe and discuss at least two backup strategies. Discuss the use of
Describe and discuss at least two backup strategies. Discuss the use of cloud backup strategies, as well?APA format400 words minimum
and 1 (One Paragraph) peer response
In approximately 250 words, please respond to the following questions:Peer response 1From some TV talking shows, I know about the global climates change. The shows produced many videos to show the results of global warming. Since I was young, I am concerned about my impact on the environment. From daily recycling, reuse items, bring my own utensils when dinning out to turn off/unplug the electronic, all I did/do is for thinking about the impact on the environment. From the reading of 3 degrees, the content is matching the one I saw in my home country. It seems like every country care about the same thing- global climate change. We can know the news about the fire of amazon. It is exactly related to the article of ” Between two and three degrees the Amazon rainforest, whose plants produce 10 per cent of the world’s photosynthesis and have no evolved resistance to fire, may turn to savannah, as drought and mega-fires first destroy the rainforest, turning trees back into carbon dioxide as they burn or rot and decompose.” I feel like it is happening!I think my personal contribution is reducing the use of plastic. From the reading, I know plastics are made from fossil fuels like oil and natural gas, which release toxic emissions when extracted from the earth. These gas will leak during production, which causes even worse greenhouse effects than carbon dioxide. Industrialization causes massive amounts of disposable plastics began flowing into their economies—water bottles, bags, to-go containers and utensils—items that earmark a consumer culture. I am trying hard to use these things less to protect the environment. I know Starbucks start to use a better cap for drinking instead using straws. I know a lot of states prohibit using plastic bags for shopping. We can see a lot of big brands and governments are aware of it and starting to change their policy to help the global climate change. All I did is just very little for the earth. But once it is done by every body, it will contribute a lot for the earth.
245 – Children and Family
Below is the instruction for the two questions. Each question has its own reading material. I have uploaded the reading material for each question below (Reading Material Q1 is for Question 1, Reading Material Q2 is for Question 2)Below is Question 1 (Q1):Considering the many theoretical alternatives to the traditional, long-standing models, how do you think the newer theories meet a need in understanding child development and parenting?Below is Question 2 (Q2):The short answer assessment portion of each module will incorporate all of the pieces you have worked with throughout the previous sections. You will be expected to use information from our course resources in order to answer the questions presented here. You are discouraged from simply Googling the prompts as you may be directed to information that is off-topic, without appropriate context, or out-of-date. Your first resources should be our course resources!These questions will require more advanced thinking and consideration to earn full credit. Make sure to support your answers with detail, data and facts presented in the resources, along with ties to cultural and societal influences. You should also include theoretical perspectives as appropriate. You should NOT quote anything directly from any resources. Instead, you should paraphrase using your own words, and cite the source appropriately (APA citation preferred, but other citation methods will be accepted). When paraphrasing, think about how you would explain the concept or idea to a classmate or parent. Show me through your writing that you understand the ideas, not just that you can locate the concept in a reading.Question:9-month-old Aro (male), born in Bangladesh, has just been adopted by an American couple and is moving to the United States. Explain how Aro’s heredity, environment, and individual difference will play a role in determining his development. Also include a theoretical perspectives to help explain what Aro might be going through.
Open Word and locate the templates that are available to you in
Open Word and locate the templates that are available to you in WORD 2019. Locate 3 that you could see yourself using…. make sure to make note of the name of each of the three selected. Provide us with the following information: What was the name of the three templates you selected, why you selected them? how do you plan to use them? Have ever used templates before? Why or Why not?Post your answer to the question, with at least 150-200 words, by Wednesday 11:00 PM EST. Additionally, reply to at least three others with at least a paragraph of content, by Sunday.
following Discussion post in about 150 words
ISS Cyber SecurityTaraka SeerumCampbellsville UniversityEvery organization must know the critical importance of regular backing up computer systems and data and of being able to restore any or all of them in the event of a system outage, hardware failure, natural disaster or other data loss. Creating a backup plan for your data before such an event occurs can help you to avoid such disasters.Some of the backup strategies areExternal Hard Drives One of the most important data backup strategies we can take as a preventive measure against loss of data is to copy all the content from CPU to an external hard disk drive (Lewis, 2019). In order to make this possible, we can purchase an external drive at any store and the prices of these drives usually depends on the amount of data they can hold (Lewis, 2019).Online Data Backups Another effective way to backup data is to use online services. We can avail these services through yearly or monthly basis payments (Lewis, 2019). The advantage of using this data backup plan is that it allows us to have an additional place to store our data in addition to an external hard drive (Lewis, 2019).Use of Cloud Backup Strategies Businesses are increasingly using IT services and it is essential to use a cloud backup that will keep your data safe and protected (Edwards, 2019). Without a safeguard, your company can lose valuable data through a natural disaster or malicious software (Edwards, 2019). Fortunately, data backup and recovery has never been simpler (Edwards, 2019). Cloud is generally considered as a safe and reliable place to store data. Storage in cloud usually do not lose or damage files (Idealstor, 2019). Using cloud backup strategies, organizations can have reliability, security in file transfer, reduced costs, better management of IT resources, improves compliance safeguards and eliminates tape backups (Idealstor, 2019).ReferencesEdwards, J. (2019). Why is a cloud backup strategy necessary? Retrieved from https://searchdatabackup.techtarget.com/answer/Why-is-a-cloud-backup-strategy-necessaryIdealstor. (2019). Seven Benefits of Cloud Backup. Retrieved from http://www.idealstor.com/2017/08/02/seven-benefits-of-cloud-backup/Kay, R. (2006). Backup Strategies. Retrieved fromhttps://www.computerworld.com/article/2554469/backup-strategies.htmlLewis, J. (2019). Data Backup Strategies. Retrieved from https://smallbusiness.chron.com/data-backup-strategies-26027.html
the following discussion in about 150 words
Differential Backup The differential backup is a backup of all of progressions built since the last full support. With differential backups, one full backup does indeed initial, and consequent backup works are the sequences realized since the previous full backup. The outcome is really a considerably speedier backup than a full backup regarding every backup run. Storage devices space applied is really a great deal not about a full backup, nevertheless, more compared to Incremental backups. Reestablishes are usually more slowly compared to a full backup nevertheless ordinarily quicker compared to Incremental backups (Ray Rankins, 2013).Our setup a differential backup employment or errand being performed nightly out of Wednesday for you to Friday. Expect an individual play out a person’s first backup on Monday. That first backup will possibly be a full backup considering that you haven’t performed every back-ups previous this. About Tuesday, the differential backup will just backup the information which may have transformed considering that Wednesday as well as completely new paperwork combined with the backup organizers. About Wednesday, the records transformed, along with elements included considering that Monday’s full backup will probably be replicated again (Heng, 2009).Mirror Backup Mirror backups are generally as the name states a reflection of the source planning down. Using reveal copies, if a document in the source erases, that will record can be in the end moreover taken out in the mirror backup. Combined these lines, reveal copies must made use of having a stern warning since folders that will erases coincidentally or via infection might moreover make the mirror copies be erased as well Several never contemplate a mirror to be a backup. A number of online backup administration’s offer a mirror backup with a 30-day erase. This signifies whenever you get rid of accurate documentation for your origin, that will document can be continued the capacity remote computer with regard to at least 40 days to weeks before its in the long run erased (Heng, 2009).References:Heng, D. G. (2009). A Manager’s Guide to Implement Your IT Disaster Recovery Plan. GMH Continuity Architects.Ray Rankins, P. B. (2013). Microsoft SQL Server 2012 Unleashed. Sams Publishing.
Below is the instruction for the two questions. Those two question are
Below is the instruction for the two questions. Those two question are separated, and no connection. Each question has its own reading material. I have uploaded the reading material for each question below (Reading Material Q1 is for Question 1, Reading Material Q2 is for Question 2)Below is Question 1 (Q1):Considering the many theoretical alternatives to the traditional, long-standing models, how do you think the newer theories meet a need in understanding child development and parenting?Reflect upon the additional resources about theoretical perspectives (Feminist, Gilligan’s Stages of Moral Development, Intersectionality, Racism framework).What theory makes the most sense to you or was the most interesting?Briefly explain the theory as part of your explanationHow can you relate your own experience or that of someone close to you to one of these theories?Share an example from either the child or parent perspective.Below is Question 2 (Q2):The short answer assessment portion of each module will incorporate all of the pieces you have worked with throughout the previous sections. You will be expected to use information from our course resources in order to answer the questions presented here. You are discouraged from simply Googling the prompts as you may be directed to information that is off-topic, without appropriate context, or out-of-date. Your first resources should be our course resources!These questions will require more advanced thinking and consideration to earn full credit. Make sure to support your answers with detail, data and facts presented in the resources, along with ties to cultural and societal influences. You should also include theoretical perspectives as appropriate.You should NOT quote anything directly from any resources. Instead, you should paraphrase using your own words, and cite the source appropriately (APA citation preferred, but other citation methods will be accepted). When paraphrasing, think about how you would explain the concept or idea to a classmate or parent. Show me through your writing that you understand the ideas, not just that you can locate the concept in a reading.Question:9-month-old Aro (male), born in Bangladesh, has just been adopted by an American couple and is moving to the United States. Explain how Aro’s heredity, environment, and individual difference will play a role in determining his development. Also include a theoretical perspectives to help explain what Aro might be going through.5pts for heredity (biological components, genetics)5pts for environment (home, country, society, culture)5pts for individual difference (Aro as a unique person)5pts for incorporating theor
This assignment has you being introduced to working with Excel in a
This assignment has you being introduced to working with Excel in a basic way, and using concepts in class to interpret scenarios and assess consequences.The assignment has 3 files: 1) the Excel spreadsheet, 2) the text questions, and 3) an answer sheet.Answer Excel questions in Excel. Answer text questions asked in the answer sheet.You will submit two files for this assignment: 1) completed Excel sheet, and 2) completed answer sheet.Please be aware the Excel sheet has two tabs: one for computations, the other for plotting.Submissions will only take .doc, .docx, .xlsx, and .xls files. Convert from Google or Mac format to submit. Excel help at bottom. Google is your friend for using software: “How to plot xy plot in Excel 365″Microsoft software is also available for free through USF (Microsoft 2016
Go to this link and answer the question bellow. https://www.sciencedaily.com/releases/2018/08/1808…-Why were the
Go to this link and answer the question bellow. https://www.sciencedaily.com/releases/2018/08/1808…-Why were the researchers interested in this topic? What does studying this topic do for the society at large?-List the experimental procedure in point form. Please try to include all the pieces of the experiment.-What is the independent variable in this experiment? (Remember, it’s the one the researchers manipulated)-What is the dependent variable in this experiment? (Remember, it’s the one that is usually measured by the resulting data)-What is the Hypothesis for this experiment? Remember, as best you can make a statement of cause and effect between the two variables listed above.-What were the key data or results they found in the experiment? Don’t list how those results were interpreted here. Save that for the conclusion.-What is the larger interpretation of this study? What new understanding on this topic was formed from this study?-What technology was used to gather the results? *Hint: the technology may be implied by the type of observations made to get the data. Try to infer what the technology was if it wasn’t stated explicitly.
own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.
Do a bit of research on the hearsay rule in legal proceedings. In your own words, explain the hearsay rule and describe how it relates to the concept of an expert witness.Write a short paper, 250-300 words, using WORD and submit here.
Developing quality learning environments is an important consideration for any early childhood
Developing quality learning environments is an important consideration for any early childhood educator or caregiver. In order to effectively prepare an environment for infants and toddlers, it is important to understand how theory and application come together. As Bullard (2014) states, “examining the theorists and approaches assists us in understanding the historical and philosophical foundations for designing learning environments” (p. 10).For this discussion post, you will describe how one of the following approaches best supports a quality learning environment. Choose one of the following approaches that interest you the most:Develop a cohesive and research-based argument in favor of the approach that interests you. Be sure to include the principles that guide your assigned approach with specific focus on learning environments, as well as how this approach compares to one of the others listed.
Malware has been around for a long time. You are asked to
Malware has been around for a long time. You are asked to investigate a particular malware and answering the following questions (in complete sentences) based on Internet research:List each question with its respective answer. Include at least three resources (or links) as the references (APA format is required). Your malware is assigned as below:CrashOverride.
Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in
Red Clay Renovations is an internationally recognized, awarding winning firm that specializes in the renovation and rehabilitation of residential buildings and dwellings. The company specializes in updating homes using “smart home” and “Internet of Things” technologies while maintaining period correct architectural characteristics. Please refer to the company profile (file posted in Week 1 > Content > CSIA 413 Red Clay Renovations Company Profile.docx) for additional background information and information about the company’s operating environment.
is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.
Background:No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.Attack Analysis:After collecting evidence and analyzing the attack, the third party was able to recreate the attack.No-Internal-Controls, LLC has a number of PCs configured for employee trainingThese training computers use generic logins such as “training1”, “training2”, etc. with passwords of “training1”, “training2”, etc.The generic logins were not subject to lock out due to incorrect loginsOne of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employeesDue to high employee turnover and lack of documentation, none all of the IT staff were aware of the legacy remote access The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connectionsThe internal network utilized a flat architectureAn attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computersThe attacker ran a script on the compromised machine to elevate his access privileges and gain administrator accessThe attacker installed tools on the compromised host to scan the network and identify network sharesThe attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting filesCritical accounting files were backed up and were recovered, but some incidental department and personal files were lostInstructions:You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.
help on human development paper/ 2 pages long
You are a human services worker meeting with 16-year-old Kathy who is seven months pregnant. You are trying to educate Kathy on the benefits of attending a series of childbirth and baby care classes that you have arranged for her to take. Baby Audrey will be born in approximately eight weeks, and Kathy has attended only half of one session, which comprised one and a half of the 18 hours of required class time. After you meet with Kathy, she still refuses to attend the classes, so you decide to provide her with a pamphlet that will provide education on pregnancy self-care and newborn care essentials.Create a set of case notes that you will go over with Kathy and other young mothers in similar circumstances, describing information and other sources that will help mothers through the prenatal stage and facilitate proper knowledge of, and attention to, their care and safety and those of the newborn babies.Your case notes do not need to be structured like a traditional written paper, but should be 2 pages in length. Include at least two scholarly references i
The post Forum 2: Consumer Genetic Testing (Graded Discussion) appeared first on Smashing Essays.