+1 (909) 375-5650
4982 Parkway Street, Los Angeles, CA 90017
support@smartwritingservice.com
800-888

Coping with Stress; individual, community, and cultural approaches

Please write a 10-page paper on one of the topics below (single-spaced, 12-pt standard font—i.e., Times New Roman) in a Microsoft Word (or text) document file format. If you prefer to address a different topic, please choose the topic in consultation with your tutor. Your paper should be written in essay style, with an original title, a title page, an introduction, discussion, conclusion, citations, and a reference list that includes all the readings and sources cited in your paper. Your reference style must follow the American Psychological Association (APA) format.
Your paper will be graded for style as well as content. Please see the section of the Course Information titled “Tips on Essay Writing” for information about writing essays.
Note: Your assignment must be submitted online through the designated Assignment Drop Box.
Suggested Topic: Aboriginal health in the twenty-first century

References/Reading:
Obomsawin, R. (2007). Historical and scientific perspectives on the health of Canada’s First Peoples.

Medical Anthropology in Ecological Perspective
Ann McElroy and Patricia K. Townsend Sixth Edition

nursing care plan

Mr. Brown is a 32-year-old male who has been suffering from Ulcerative Colitis for 10 years. Over the past week he has been transfused with 4 units of whole blood for persistent bleeding from his large bowel. He has been in a lot of pain requiring high doses of Codeine Phosphate 30 mg. He is taking 80 mg of Prednisolone daily, 1000-2000 mg of Sulfasalazine 4 times a day and is not improving. He has lost 20k over the past few weeks. He is married with 3 small children. His wife works in the health care system. He is a computer specialist.
He presents with severe abdominal pain 9/10.
Bloody diarrhoea ++
T.38 P.128 & reg. BP100/60 R.32 O2 sats: 96% on room air.
Nausea & vomiting ++
Mr Brown is diagnosed with Fulminating Ulcerative Colitis & is taken to surgery for a total colectomy. His
surgery lasts 7 hours.
He returns to the ward & you are allocated as his primary nurse.
Mr Brown is screaming in pain for his wife.
LLQ sited Ileostomy, pink mucous membrane, long bag attached. Bloody drainage.
IV insitu: 6/24 Hartman’s
NGT insitu on free drainage
IDC insitu
T.38 P.120 & reg. R.26 BP.100/60 O2Sats. 98% on 8L O2 via face mask
Central abdominal suture line with dressing intact
Hb 9.0
ESR 40
Medications:
Hydrocortisione 100mg IV 4/24
Morphine 10mg IM 4/24
Maxalon 10mg IV 6/24
Vancomycin 500mg 6/24
Using the Clinical Reasoning Cycle:
• Consider the patient situation
• Collect the cues/information
• Process the information
• Formulate a care plan as instructed for 2 priority nursing diagnoses with 5 interventions with rationales & the expected outcomes
6 days later, Mr. Brown’s pain is under control. His NGT has been removed & his ileostomy is starting to work. He is having fluids as tolerated. IVT N/S 12/24.
• Formulate a care plan as instructed for 2 priority nursing diagnoses with 5 interventions with
rationales & the expected outcomes.
4 days later Mr Brown is going home. His weight is 65k & he is 182cm tall.
• Formulate a priority nursing diagnosis with 5 interventions with rationales & the expected outcome
relating to discharge management.
I WILL PROVIDE AN EXAMPLE TO EASE WITH CLINICAL REASONING CYCLE AND NURSING CARE PLAN.

Compare and contrast The Matrix

Plato, Descartes, and The Matrix
In this unit, we have been discussing how we “know.” The modern American philosopher, Hilary Putnam, popularized a well-known thought experiment highlighting the problem of skepticism and our knowledge of reality. To understand Putnam’s experiment, we need to consider how we normally obtain knowledge of reality. Our knowledge of reality usually begins with sensory input. While each of our five senses perceives the world according to their individual means, we will use seeing as an example. Light is reflected off of objects and enters through our eyes, which focus an image of these objects to the back of our eyeball, where it hits our optic nerve. Our nerve transforms this image into electrical/neural impulses that travel through the optic nerve up to where it is plugged into the brain. The brain then processes these impulses where they are transformed into an image in our mind. What our minds experience is an image of the outside world, similar to how a television projects an image captured by a television camera.

In Putnam’s thought experiment, you imagine that your brain has been severed from the nerves connecting it to your senses (eyes, ears, nose, etc.) and has been removed from your skull and placed in a vat filled with the nutritional fluid necessary to keep your brain alive and functioning. Electrical wires have been spliced into your sensory nerves that are connected to the sensory inputs in your brain. The other ends of these wires are connected to the outputs of a giant super computer. A man sits at the keyboard of this super computer, inputting data. This data is transformed into electrical/neural impulses that travel through the spliced wire/sensory nerves and into your brain. The brain processes this information as if it were from your senses. Hence, you have whatever image the man at the keyboard wants you to have. Suppose he inputs data that you are sitting in a café in France, drinking an espresso. He includes all the usual sensory data, including the smell and taste of the coffee, the hardness of the chair and table, the cool breeze blowing by, the sounds of the traffic, and the view of the Eiffel Tower. You experience all of this exactly as if you are really there. In such a situation, you would have no idea that you (or at least your brain) are actually sitting in some vat in some laboratory.

In 1999, Putnam’s thought experiment became the basis of a megahit movie, The Matrix. However, Putnam was not the first to suggest that there may be a problem with perceiving and knowing reality. A number of philosophers have wrestled with this problem. This brings us to your assignment, described below.

In Module/Week 5’s Reading & Study folder, there are 3 short readings. Your assignment is to read them and then write an essay of at least 600 words (in current MLA, APA, or Turabian format) addressing some of the questions listed below (in the “Questions to Consider” section). You must address the first question; then, choose 1 of the other questions to address also.

While you are free to quote from sources, quotations will not count towards the minimum word count. Plagiarism of any kind will result in a 0 for the assignment and may result in being dropped from the course.

A note about the readings: The first reading is a synopsis of The Matrix. If you have seen the movie, this will function as a review for you. If you have not seen the movie, you may choose to do so. However, you should know that the movie is rated R for language and violence. It is not necessary to view the movie to fulfill the assignment, as the synopsis is enough to consider the questions. The second reading comes from Plato’s classic work, The Republic. It is in the form of a dialogue between Socrates and Glaucon, a brother of Plato, and contains the famous cave allegory. The third and final reading is a section from Meditation I, from Meditations on First Philosophy by Rene Descartes, who offers some reasons to doubt his senses.

Questions to Consider

1. Compare and contrast The Matrix with the readings from Plato and Descartes. What are some similarities and differences?

2. Can we prove that the world we are experiencing is real? How do we know we are not dreaming, living in a Platonic cave, or trapped in some sort of matrix?

3. At the end of the cave allegory, Socrates implies that most men would want to escape the cave and see reality as it really is. However, in his betrayal of Morpheus, Cypher implies that it is better to live in the artificial world of the Matrix. Which is better: the harshness of reality, or the “ignorance is bliss” of illusion? Defend your answer.

4. Since much of our knowledge is based on sensory experience, and since our senses are imperfect and can be deceived, can we ever be certain that our beliefs are true? Defend or explain your answer.

Again, you must address the first question, followed by 1 of the others from the list.

Submit this assignment by 11:59 p.m. (ET) on Monday of Module/Week 5. Your assignment will be checked for originality via the SafeAssign plagiarism tool.

Cybersecurity

For this assignment you will post your answers to the questions in each thread prior to 11:55 p.m. ET on Wednesday. You are required to respond to at least two of your classmates post by 11:55 on Sunday. Please do not be late with this post because your classmates will be relying on you to post on time. Your follow-up posts can add additional insight to a classmate’s opinions or can challenge their opinions. Use examples from the readings, or from your own research, to support your views, as appropriate. For your follow-up posts this week, you may wish to visit a couple of the web sites contributed by your classmates and share your opinion of these sites with the class. Be sure to read the follow-up posts to your own posts and reply to any questions or requests for clarification. You are encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end of your post. References must be in APA citation format. All posts must be a minimum of 250-300 words. All follow-up posts to your classmates must be a minimum of 150 words for each required post. Peer responses will not be accepted after the due date.

Distinguish between full content data (including collection tools), session data (including collection tools) and statistical data (including collection tools).

Forum Grading Rubric (100 Points)
Synthesis of Concepts 55
Clear Citations using APA format 10
Writing Standards 10
Timeliness 10
Peer Reviews (minimum of 2) 15
This assignment is a formative assessment for Course Objective 3.

Here are the two posts I need the replies to in additional to the main post:

Class,

Just like any form of data, in any form of occupation or organization, there are various types.

Full content data is defined as, “It is a rich form of evidence offering detail and opportunities seldom found elsewhere(Bejtlich, 2005)”. But what does that really mean? To me it simply means that it has the most important information needed within the security realm which allow analysts to dig deeper into some form of incident or concern.

Session data is the information/data that is being exchanged between two parties(Bejtlich, 2005). I guess you could look at it like 2 people who were in a car accident, sharing their information. There are various pieces within like source ip, port, destination ip, port, timestamp, amount of info transferred. Each piece of data has its role within network investigation.

Statistical Data allows intrusions to be identified and validated(Bejtlich, 2005). Compare this to a puzzle, each piece may be the start of something but until enough data is collected, the true picture to what may be identified cannot be shown until enough pieces are put together. They talk about baseline in our text, we know what normal looks like but as you continue to monitor and look deeper into something you may find a trend that doesn’t seem correct. Maybe a system is normally only reaching out to X and over time you identify that Y is being reached to more frequently for no reason. Enough data will show you a sign and by further research you find what may not be as normal as it seems with a sampling of data.

Data is only data until you bring it together. With the proper understanding of each, an analyst can quickly identify what may be a cause for concern or something normal.

References
Bejtlich, R. (2005). The Tao of Network Security Monitoring. Boston: Addison-Wesley. Retrieved from Vitalsource: https://online.vitalsource.com/#/books/9781269650335/cfi/6/2!/4/16/6@0:91.2

In computer forensics, you have various ways to collect digital information in a network security setting. They are full content, session and statistical data.

This first category we will communicate falls under the full content section. In respect to this aspect, TCPDump is quite frankly the main go-to collection tool. It may seem antique, but it is a very stable tool. The tool collects data in an unfiltered way that allows for tremendous elasticity for analysis. This means that simply implementing this tool to operate and get the traffic, there will be a high chance in catching your perpetrator. Overall, this tool in collecting full content gives your intruder very little chance to evade from leaving a footprint. It allows you the most amount of ability to develop an incident handling process.

In session data collection a popular tool to use is Argus. Session tools, allow to gather information for particular transfers and transmissions in information interactions. This tool integrates various protocols and summarizes traffic in a session format. It generates tables without storing it with full content and analyzing it on the back end. It does not function properly in the midst of application data, and can be bypassed by intruders through covert pathways to fool it. However, Argus is quite good in other ways. It works well with UDP. It keeps track of traffic coming in ICNP. Using Argus requires practice to get familiar with.

In the final category, one particular tool in the statistical category is Snort. It is an event data detection machine. It has the ability to modify and add signatures in a rapid fashion that allows for great flexibility. This type of categorical tool is used to compare and analyze traffic to common baseline traffic.

In conclusion, full content data reveals the full extent of traffic on a network. Session data, summarizes data transmissions between two entities(Bejtlich,2004), and statistical data does particular analysis of the data and traffic.

Reference

Bejtlich, R. (2004), The Tao Of Network Security Monitoring: Beyond Intrusion Detection. Pearson Education Inc. MA.

Course Material stuff:
Chapter 7. Session Data

Session data represents a summary of a conversation between two parties. It’s so important I devote all of Chapter 15 to a case study using this form of information. Here I explain multiple ways to collect session data. Once you see how easy it is to collect and work with it, I expect you will be anxious to try any one of the methods explained here.

A session, also known as a flow, a stream, or a conversation, is a summary of a packet exchange between two systems. Connection-oriented protocols like TCP are most suited to representation in session form because there is usually a clear beginning, middle, and end to a TCP session. Connectionless protocols like UDP and ICMP are not as structured as TCP, but those in request-response format can be approximated in session format as well. Even one-way “conversations,” such as a series of SYN packets sent to multiple hosts during a reconnaissance sweep, can be recognized as a certain type of conversation.

Chapter 8. Statistical Data

So far we’ve discussed two forms of network-based information used to identify and validate intrusions. First we explored full content data, in which every element of a packet is available for analysis. In some cases we care about header details, but more often the application content is what we need. Next we looked at session data, where conversations between parties are summarized to include IP addresses, ports, protocols, timestamps, and counts of data transferred. Analyzing session data is the easiest way to track the timing and movements of some intruders. Collection of both forms of data is content neutral; we generate full content or session data regardless of the information conveyed by those forms.

We can limit the field of view of full content or session data tools through BPFs and other configuration mechanisms. Such limitations are imposed in high-traffic environments or used to focus attention on a specific IP address, port, or protocol. Even within those constraints, collection is still a content-neutral affair. A BPF of udp and port 53 to Tcpdump will catch a port 53 UDP-based back door and also collect normal DNS traffic.

Project Proposal

The majority of time in this course will be spent developing your own project proposal to apply, as far as possible, the knowledge and skills developed in this course. This will involve a number of related steps.

Clearly identify a human service project of your choosing: for example, you might choose to explore a project idea developed from discussions with the agency where you are undertaking field education, or you might prefer to explore a call for tenders from a Government website of ‘real world’ project consultancies; or you might use Government or NGO websites (national, local government, from the newspapers etc.) to build project ideas from; or you might choose a project which is required in or relevant to your workplace (if a Human Service organisation); or you could create a projects concept from an example in the literature/ readings and or negotiated in discussion with Course Facilitators. Students will then develop a full document which will incorporate:
1. Project Title
2. Your role and organisation
3. Scope – Project Summary
4. Scope – Goal, Objectives
5. Rationale
6. Time Schedule – Gnatt Chart
7. Stakeholder Identification and Analysis
8. Project Budget and Project Procurement
9. Project Risks, Contingencies and Ethical Issues
10. Communication and Monitoring Methods
11. Handover and Evaluation
Reference List

Please note steps 1 to 6 relate to assignment 1 whereas steps 7 to 11 to assignment 2. When submitting Assignment 2 – Assignment 1 is included but not counted in the word count nor is it remarked.

Africa American history

To complete this project
Choose from one of the topics below and analyze its history from 1877 to the present.
Select four specific events or developments that span the years covered by this course, based on their impact on the topic. Two of the events must be from before 1945 and two events must be from after 1945. You must assess how the events in relationship to the topic changed over time and explain how the changes occurred. Please refer back to your Week 3 Assignment, consider your instructor’s comments and make any necessary revisions.
Write an introduction with a thesis. Your thesis should summarize the main conclusions that you discovered while researching your topic and that you will support with a logical argument based on evidence (sources). Please refer back to your Week 3 Assignment, consider your instructor’s comments, and make any necessary revisions to your thesis statement.
Connect each of the events or developments you have chosen back to your main thesis. The information presented must be organized and in chronological order.
You must use at least four sources in your paper other than the textbook, with at least two primary sources and at least two secondary sources. Please refer back to your Week 3 Assignment, consider your instructor’s comments, and make any necessary revisions.
Choose one of the following topics:
Native Americans/American Indians
African Americans
Immigrants
Women
For example, a student writing a paper about the topic African Americans might choose the Harlem Renaissance and the Black Power Movement as two of their events. In that case, the paper would provide a description of the two movements. It would explain what each one revealed about the role of African Americans in broader American society in, respectively, the 1920s and the late 1960s, explain how and why the roles of African Americans in the 1920s differed from their roles in the late 1960s, and explain how events in the 1920s may have contributed to developments in the later decade.
Writing the Final Project
The Final Project
Must include a separate title page with the following:
Title of project
Student’s name
Course name and number
Instructor’s name
Date submitted
Must begin with an introductory paragraph that has a succinct thesis statement.
Must address the topic of the paper with critical thought.
Must end with a conclusion that reaffirms your thesis.
Must use at least four scholarly resources other than the textbook, including a minimum of two primary sources. Your secondary sources must come from the Ashford University Library. For help locating primary sources refer to the HIS206: Primary Sources Research Guide
Must document all sources, including images, in APA style as outlined in the Ashford Writing Center.
Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.

Logical reasoning

Write half page of each following questions:

1)Logic is shown through truth tables and used when finding whether an argument is valid or invalid. Logical reasoning can be used to solve puzzles as well. Below is a logic puzzle. Read it and respond to this discussion with your answer and a logic puzzle of your own. Be sure to post your answer after guesses have been made about the answer to your puzzle.
You live on an island where there are only two kinds of people: the ones who always tell the truth (truth tellers) and those who always lie (liars). You are accused of crime and brought before the court, where you are allowed to speak only one sentence in your defense. What do you say in each of the following situations?

If you were a liar (the court does not know that) and you were innocent. And it is an established fact that a liar committed the crime.
If you were a truth teller (the court does not know that) and you were innocent. And it is an established fact that a truth teller committed the crime.
If you were innocent and it is an established fact that the crime was not committed by a “normal” person. Normal people are that new immigrant group who sometimes lie and sometimes speak the truth. What sentence, no matter whether you were a truth teller, liar, or normal, can prove your innocence?

2) Throughout this module you have learned about numerical systems that are different from what you use day to day. Find another numerical system, research it, and share your findings with classmates. Include any information about what base is used, the symbols used, is it an additive or positional system, any special ways the users performed mathematical operations, and any other interesting facts you may discover.

3) This math problem circulated on Facebook, and may still be doing so. Facebook users were asked to post their answers in the comments, and after reviewing the posts, it was found that 74% of Facebook users got it wrong. Give your answer and discuss how you arrived at it. Explain where you think the 74% of Facebook respondents went wrong.
7 – 1 x 0 + 3 / 3 = ?

4) Word problems are created to model a real life scenario. Unfortunately, many times students cannot connect with the situations presented. Think of a time when you had to use your math skills outside of a math class. Create a word problem based on that situation. Be sure your situation is more difficult than counting change, or anything similar to that.

5) If a manufacturer can produce a certain item for $7 and sell the item for x dollars, the profit per item will be x – 7 dollars. If it is then estimated that consumers will buy 25 – x items per month, the total profit will be:
Total Profit = (number of items sold)(profit per item) = (25 – x)(x – 7)

Use this information to create a quadratic equation. Then graph your equation, and based on the graph, what value of x will create the greatest profits? What will that profit be? What part of the graph did you use to find this information? Explain how this process could be useful in other scenarios.

6) First, create a scenario that would require a permutation. Second, alter the situation in such a way that would then cause a combination to be used.

7) Read the following scenario and responses. Respond to the original question of “When would you take your turn?” and give your reasoning.
Ask Marilyn
Parade Magazine, 3 January 1999, p. 16
Marilyn vos Savant

In an earlier column (Parade, 29 November 1998, p. 26) Marilyn responded to the following question:

You’re at a party with 199 other guests when robbers break in and announce they’re going to rob one of you. They put 199 blank pieces of paper in a hat, plus one marked “you lose.” Each guest must draw a piece, and the person who draws “you lose” gets robbed. The robbers think you’re cute, so they offer you the option of drawing first, last or any time in between. When would you take your turn?

Marilyn said she would choose to draw first, explaining that “It would make no difference to my chances of losing–any turn is the same–but at least I’d get to leave this party as soon as possible.” Not all of her readers agreed, and the present column contains responses from some of them.

One letter argues for drawing first: “You said any turn is the same, but I believe that would be true only if the partygoers all had to replace the papers they drew before another selection was made. But if they keep the papers (the scenario intended by the question), wouldn’t the odds of losing increase as more blanks were drawn? If so, drawing first is best.”

Another reader argued for drawing last: “Though you have a 1-in-200 chance of getting a blank paper and not being robbed if you go first, the odds are 199 in 200 that the drawing will end with a loser (other than you) before you draw if you go last. You should go last.”

Marilyn restates her original position that it makes no difference where in the process you draw. She argues that the answer would be the same as if everyone drew simultaneously, in which case it would be more intuitive that everyone has the same 1-in-200 chance. She offers another argument based on people buying tickets for a church raffle, explaining that it makes no difference whether you buy your ticket immediately when you arrive or wait until just before the drawing.

8) Graphical representations of data are used to share information. Think of a time when you used graphical data to make a decision or share information with others. Describe this time and explain how you believe the graphical representation helped or hindered you.

Stress Prevention or Reduction Program

There are many online prevention programs for children who are living in stressful situations. One of those was a web-based program presented by Boring et al. (2015). There are other programs as well, such as the eight-session program provided by Lester et al. (2013). For this assignment, you are expected to develop a face-to-face, six-session program. While you may adapt elements from published programs including those listed above, you are expected to develop your own program. The more concise your audience is, the more defined your program will be. For example, you may choose a specific age range to develop your program, like teenagers.

For this assignment, you are going to select a specific age, gender, ethnic group, or occupation to create a six-session program to develop and enhance selected coping skills and reduce stress. You will be providing a short handout for the participants in your program incorporating the coping skills on which you are focused.

The goal is to incorporate much of the information you have learned in the course so that you will be able to provide definitions, problem- and emotional-focused coping techniques, and desired outcomes. For this assignment, you need to present an annotated outline and a handout. The annotated outline must include the steps/techniques of your program and cited sources supporting the use of the selected techniques. If for example, you chose to adapt relaxation as a technique from the Boring et al. protocol, you would need to cite support for the efficacy of each of the techniques including teaching relaxation and positive cognitive restructuring. The handout must provide participants with definitions and techniques they can use when they get home. They must be written at a level appropriate for your target population. The handout should be visually attractive and organized well.

Length: 1-2 page annotated outline and a 2-3-page handout for participants

Your assignment should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect graduate-level writing and APA standards.

rewriting book manuscrip

I am working on an academic book project with a major British publisher. (I selected “Doctorate” level in the menu because of no other relevant options, but it is for publication.) My book proposal had been accepted, and I signed a contract with them for publication pending acceptance of my final manuscript. However, my first manuscript submitted was very poorly evaluated. I have been given a chance to rewrite the entire manuscript by November.

The topic of the proposed book is about politics and religion in Japan.

Do you think you could help?

*For your information, the following is the negative feedback I received from the publisher:

“I’m sorry to say that we have received a review of Religion, State and Political Culture in Japan: Implications for the Post-Secular World, and unfortunately it is largely negative.
The reviewer feels that the manuscript lacks any theoretical framework, fails to engage with contemporary texts on the topic, and is, overall, poorly written and researched. Another major concern is the frequent references to Soka Gakkai, which could be construed as propaganda.
Unfortunately, we do not feel that the manuscript is publishable in its current state. Giorgio and Mustapha have worked hard to establish Critical Perspectives on Religion in International Politics and are reluctant to accept titles which they feel may harm the reputation of the series.
The reviewer has compiled a list of recent publications which he recommends reading to gain a wider perspective on the subject-matter:
– Maxey, Trent. The “Greatest Problem”: Religion and State Formation in Meiji Japan. Cambridge, MA: Harvard University Asia Center, Harvard University Press, 2014.
– Helen Hardacre, Shinto A History, OUP, 2017
Breen and Teeuwen, A New History of Shinto, Wiley, 2011
– Teeuwen and Breen, A Social History the Ise Shrines, Bloomsbury, 2017
– Teeuwen and Rots, Formulations of the Secular in Japan, Japan Review, 2017

WESTGATE BRIDGE

This assignment requires you firstly to identify a real world case: either a successful project or a failed project, and then based on the criteria you identified [from the literature] explain why the project either succeeded or failed. There are many references on the theme of project success or failure, and hence you will need to do some research to set up your criteria. The following references will help you start the process.

You can select a case from secondary data available in the public domain or from within your own organisation. The report should include the following information:

¥ Background of the company and the project case that you have selected.

¥ Discussion of standard criteria, such as those emerging in the reference section.

¥ Critical identification and justification of the criteria you think appropriate.

¥ Critical analysis of the case based on the criteria chosen.

¥ Presentation of appropriate conclusions.

¥ Provision of suggestions or recommendations in the event that the project should be re-run in the future.