+1 (909) 375-5650
4982 Parkway Street, Los Angeles, CA 90017
support@smartwritingservice.com
800-888

nursing

Questions 1-60 of 60 | Page 1 of 1

 

Question 1

A patient receiving a seventh cycle of paclitaxel and carboplatin is assessed for:

aanorexia.
bflank pain.
cweakness.
dshortness of breath.

Question 2

To prevent hemorrhagic cystitis in a patient receiving ifosfamide, the nurse:

aadministers mesna at 60%–100% of the ifosfamide dose.
badministers amifostine at 60%–100% of the ifosfamide dose.
chas the patient drink 8 ounces of fluids every hour.
dchecks the creatinine level prior to each dose.

Question 3

A patient with CD20 positive, non-Hodgkin lymphoma is scheduled to begin rituximab. The nurse knows:

athe risk of infusion reactions is decreased since the patient is chemotherapy-naive.
binfusion-related side effects are reduced with subsequent infusions.
canother therapy is ordered if the patient has an infusion reaction.
dmost infusion-related reactions occur 24-48 hours after the infusion.

Question 4

A patient scheduled for a fifth cycle of oxaliplatin reports difficulty buttoning his shirts. What is the nurse’s next action?

aInstruct the patient to wear gloves.
bAdminister the agent as ordered.
cNotify the physician
dApply ice to the fingertips.

Question 5

A patient scheduled to receive a fourth cycle of paclitaxel and cisplatin reports burning and numbness in his feet. The nurse’s priority is to assess for:

acerebellar neurotoxicity.
bchemical arachnoiditis.
cmotor neuropathy.
dautonomic neuropathy.

Question 6

A patient receiving cycle four of doxorubicin, bleomycin, vincristine, and dacarbazine reports dyspnea, tachypnea, and exercise intolerance. The patient is prepared for a:

acomputed tomography scan
bmagnetic resonance imaging.
cchest tube insertion.
dpositron-emission tomography.

Question 7

Specialized white blood cells called lymphocytes mature from:

amyeloid precursors.
blymphoid precursors.
cagranulocytes.
dgranulocytes.

Question 8

High-dose cytarabine administration places a patient at risk for:

acerebellar toxicity.
bhand-foot syndrome.
cpulmonary fibrosis.
danaphylaxis reaction.

Question 9

Which of the following increases a patient’s risk for acute nausea and vomiting?

aAge greater than 60
bHistory of alcohol abuse
cHistory of tonsillectomy
dFemale gender

Question 10

Which of the following is a dose-limiting toxicity for vinorelbine?

aMyelosuppression
bNeurotoxicity
cHepatotoxicity
dNausea

Question 11

When spiking an IV bag containing a hazardous drug, the nurse should wear:

aa surgical mask.
ban isolation gown.
ca respirator.
da face shield.

Question 12

The nurse administering cetuximab to a patient who is receiving concurrent radiation therapy is vigilant in monitoring for:

athyroid storm.
benterocolitis.
ccardiopulmonary arrest.
dhemorrhage.

Question 13

Which of the following stages of the cell life cycle gives cells some protection from exposure to cell cycle-specific chemotherapy agents?

aGap 1
bSynthesis
cGap 0
dPremitotic

Question 14

How do malignant transformed cells differ from normal cells?

aThey are different in structure from others of the same type.
bThey are fully differentiated and encapsulated.
cThey are unable to sustain an adequate blood supply.
dThey are unable to move away from their usual location.

Question 15

Which of the following best describes the effect of biologic therapy in the treatment of cancer? Biologic therapy:

ainhibits hematopoietic cell growth.
binduces the apoptosis of cancer cells.
cenhances the host’s immune system.
dpotentiates the effects of chemotherapy.

Question 16

How are vesicants administered peripherally?

aIV push
bSyringe pump
cContinuous infusion
dIV pump

Question 17

A patient reports that there is leaking at the chemotherapy infusion site. After assessing and warning others, the nurse:

aconsults the pharmacist for instructions.
bcontacts the physician for additional orders.
cretrieves the hazardous drug spill kit.
drelocates the patient to another room.

Question 18

The risk of developing palmar-plantar erythrodysesthesia increases with combination therapy with:

acapecitabine and radiation therapy.
bfluorouracil and leucovorin.
cdocetaxel and capecitabine.
dfluorouracil and pegfilgrastim.

Question 19

A patient receiving decitabine must have treatment delayed for which of the following?

aANC 1,200 neutrophils/mcL
bAspartate aminotransferase 6 U/L
cSerum creatinine 2.5 mg/dL
dDirect bilirubin 0.3 mg/dL

Question 20

Immune-related diarrhea for a patient being treated with pembrolizumab typically presents how many weeks after initiating therapy?

a6-18 weeks
b4-5 weeks
cMore than 19 weeks
dLess than 3 weeks

Question 21

Using the Calvert formula, calculate the carboplatin dose for a 65-year-old male patient who weighs 80.2 kg. The patient’s serum creatinine is 0.8 mg/dL with a target AUC of 4.

a517.6 mg
b519 mg
c455.1 mg
d397 mg

Question 22

Which of the following is primarily involved in acute nausea and vomiting?

aInhibition of the vagus nerve
bInhibition of the vestibular system
cSerotonin released from enterochromaffin cells
dSubstance P binding to neurokinin-1 receptors

Question 23

Which of the following agents is an irritant?

aEpirubicin
bDaunorubicin
cBleomycin
dDactinomycin

Question 24

A patient receiving nivolumab has a follow-up CT scan 12 weeks into therapy which shows a very slight increase in the size of his lung tumors. In the absence of any other significant changes in his condition, what is the expected treatment for the patient?

aContinue the current therapy with nivolumab.
bDiscontinue the drug.
cChange the treatment drug.
dIncrease the dosage of nivolumab.

Question 25

An example of an immune checkpoint inhibitor is:

acarfilzomib
bpembrolizumab.
crituximab.
dbortezomib.

Question 26

When assessing a patient who received treatment with high-dose busulfan one year ago, the nurse is most concerned about which of the following signs and symptoms?

aCough, dyspnea, and low-grade fever
bPapulopustular rash and urticaria
cWeakness, numbness, and tingling
dHeadache and decreased vision

Question 27

Which of the following personal protection equipment is worn for handling hazardous drugs?

aTwo pairs of sterile powder-free gloves
bDisposable gown made of a high permeability fabric
cStandard surgical face mask with a face shield
dTwo pairs of chemotherapy-tested gloves

Question 28

The nurse notes a loss of blood return while administering IV vinblastine. After stopping the infusion and aspirating any remaining drug from the catheter, the nurse’s priority is to:

ainfuse dexrazoxane as soon as possible.
binject sodium thiosulfate into the site.
capply a warm pack for 15-20 minutes.
dapply ice for 6-12 hours.

Question 29

The possible etiologies of venous irritation from chemotherapy administration include:

adiluted drugs.
ban agent pH equal to 9.1.
ca small-bore peripheral IV.
dhypotonic solutions.

Question 30

Which type of immune response includes skin and mucous membranes?

aAdaptive
bCell-mediated
cHumoral
dInnate

Question 31

A patient who is two months pregnant and diagnosed with an aggressive type of breast cancer refuses treatment. The nurse requests a consult with the:

amedication safety committee.
bethics committee.
ctumor board.
doncology department.

Question 32

The final step in developing a biosimilar is to:

atransfer the gene into a virus or an Escherichia coli vector
bremove the growth medium once the quantity is sufficient.
cpurify and stabilize the protein and place in the drug format.
didentify and clone the protein at the core of the biologic.

Question 33

A short-term outcome of patient education is:

adecreasing healthcare costs.
bimproving health-related quality of life.
cempowering active participation in health care.
dincreasing customer satisfaction.

Question 34

A hypersensitivity reaction to bleomycin is most likely to develop in a patient receiving treatment for which of the following diagnoses?

aTesticular cancer
bMalignant melanoma
cFollicular lymphoma
dCervical cancer

Question 35

A patient reports worsening of an extravasation site. The nurse will find which initial document most helpful?

aOsmolarity of the solution infused
bPhotographs of the site with date and time
cInitial dose of the chemotherapyation
dQuality of blood return before the infusion

Question 36

Which of the following small molecule inhibitors is indicated for the treatment of pancreatic cancer?

aErlotinib
bCarfilzomib
cBortezomib
dCabozantinib

Question 37

Which of the following drugs has the highest predicted risk of a hypersensitivity reaction?

aFluorouracil
bDactinomycin
cDacarbazine
dOxaliplatin

Question 38

Which of the following drugs is a nonanthracycline antitumor antibiotic?

aBleomycin
bIdarubicin
cEpirubicin
dDoxorubicin

Question 39

What is the mechanism of action of monoclonal antibodies?

aRemove immune cells from the body, and retrain them to identify and kill specific antigens
bTarget tumor-specific antigens on the surface of some cancer cells
cAccelerate and fully engage immune cells to create a robust immune response
dIntroduce the immune system to fragments of weakened or dead bacteria

Question 40

Hazardous drugs can be released into the environment when:

apriming tubing with a neutral solution.
bcompounding parenteral Schedule 1 agents.
cdiscarding syringes used to administer chemotherapy.
dadministering premedications in the infusion suite.

Question 41

Which of the following dose-limiting toxicities is attributed to cyclophosphamide?

aHemorrhagic cystitis
bHepatotoxicity
cPeripheral neuropathy
dNephrotoxicity

Question 42

Using a medication cup to administer an oral tablet form of chemotherapy:

aprevents aerosolization.
bassures an accurate dose is administered.
cavoids a hazardous drug spill.
dprotects the surfaces from contamination.

Question 43

A patient receiving a checkpoint inhibitor experiences a dose-limiting toxicity. What does the nurse anticipate the physician will order?

aDecrease the next dose.
bSlow the rate of infusion.
cAdminister the next dose.
dHold the next dose.

Question 44

Which is a nursing action for a patient with chronic lymphocytic leukemia who is scheduled to receive bendamustine?

aAdminister seizure prophylaxis.
bEncourage frequent voiding.
cInfuse the agent over 240 minutes.
dEvaluate serum calcium and potassium.

Question 45

The goal of adjuvant therapy is to:

adecrease the immune response prior to transplantation.
bshrink the primary tumor to improve the effectiveness of surgery.
ctarget minimal disease for a patient at high risk of recurrence.
deliminate residual disease prior to receiving a stem cell transplant.

Question 46

Which of the following drugs when given in its pegylated liposomal form reduces the risk of cardiotoxicity and allows for a significantly higher cumulative dose?

aDaunorubicin
bEpirubicin
cIdarubicin
dDoxorubicin

Question 47

The nurse is exposed to a hazardous drug through ingestion by:

apushing chemotherapy through an implanted port.
bsplashing chemotherapy into the eyes.
cdrinking in an area that chemotherapy is administered.
dbreathing in aerosolized particles from a chemotherapy spill.

Question 48

A patient with a VAD which has a good blood return reports pain and burning close to the access site shortly after idarubicin is started. The nurse expects to:

aelevate the affected extremity until the pain subsides.
badminister hyaluronidase in multiple SQ injections.
capply warm packs for 15 minutes four times daily.
dadminister the dexrazoxane infusion through an alternate site.

Question 49

During an initial infusion of trastuzumab, a patient begins to shake and reports chills, nausea, and a headache. The nurse should:

astop the infusion, manage the reaction, and then restart the infusion.
bpermanently discontinue the infusion after managing the reaction.
cstop the infusion, administer epinephrine, and then restart the infusion.
dslow the infusion and administer diphenhydramine and methylprednisolone.

Question 50

Which of the following is the final level of protection in the hierarchy of hazard controls?

aPersonal protective equipment
bHazard elimination
cAdministrative controls
dEngineering controls

Question 51

Which of the following interventions is an example of utilizing evidence-based practice?

aUsing honey as an oral rinse for mucositis
bApplying emollients to manage skin toxicities
cUsing reverse isolation routinely for patients with neutropenia
dEncouraging individual aerobic exercise activities for fatigue

Question 52

Biotherapeutic agents work by:

adestroying rapidly dividing cells.
benhancing the immune response.
ckilling slowly dividing cells.
dweakening cell transformation.

Question 53

Which of the following toxicities is associated with rituximab?

aRenal
bOphthalmologic
cPulmonary
dGonadal

Question 54

The nurse caring for a patient with colon cancer that has metastasized to the liver is concerned that stricture can be caused by:

acisplatin.
bcarboplatin.
cfluorouracil
dfloxuridine.

Question 55

Calculate the ANC for a patient with the following laboratory values: WBC 1.7 x 109/L, neutrophils 14%, bands 20%, and hemoglobin 10 g/dL.

a3400 neutrophils/mcL
b238 neutrophils/mcL
c578 neutrophils/mcL
d5780 neutrophils/mcL

Question 56

The signs and symptoms of a peripheral extravasation include:

apain and swelling along the IV site
bulceration and blistering along the IV site.
cblotches and streaking at the IV site.
dtightness and aching at the IV site.

Question 57

A patient with relapsed non-Hodgkin lymphoma is receiving ibritumomab tiuxetan. The nurse understands that:

athe patient will be placed on isolation and radiation precautions for three days after the drug is given.
bthe drug is bound to a diphtheria toxin which targets the lymphoma cells and kills them.
cthe patient’s platelet count should be greater than 100,000/mm3 before starting the therapy.
dthe medication should be given in combination with an antiplatelet therapy.

Question 58

A patient receiving chemotherapy is unable to retain liquids and has vomited nine times over the past day. What is the grade of these adverse events according to the NCI’s Common Terminology Criteria for Adverse Events?

a1
b2
c4
d3

Question 59

The physician calls to give the nurse verbal chemotherapy orders. Which of the following nursing actions is appropriate?

aRequest that the physician provide the order to the pharmacist.
bHave a second nurse listen to the physician’s order to verify the dosage.
cNotify the physician that telephone orders are unacceptable.
dObtain the chemotherapy name and dosage and read the order back to the physician.

Question 60

Infusion-related hypotension is associated with which of the following drugs?

aVinblastine
bEtoposide
cVinorelbine
dPaclitaxel

 

 

Quantitative Critique

Quantitative Critique Assignment

 

Grading Rubric (100):

Use this document as a fill-in template for your answers. Do not change or alter this form; leave it in its entirety. Avoid typos, misspellings, contractions, inappropriate match of nouns and pronouns or subject and verbs, incomplete sentences, idiomatic language. Use sentence structure that reflects graduate level writing (10). Fill in your well-crafted answers below each subheading, use 12 font. The quantitative study to critique is in the supplemental reader; work individually and independently. Use the critique power point (quantitative slides) to guide your critical thinking.

 

Background/Significance for the Clinical Problem (5)

  • Explain why this study is important to nursing knowledge validation. Use the 6 step knowledge generation/validation process (C & K) to support your answer.

 

 

Literature Review (5)

  • Explain how the literature review demonstrates the rationale for conducting the study, identifying the gaps in the current knowledge, and the quality indicators for the literature reviewed.

 

Purpose Statement (5)         

  • State the purpose and explain how the purpose is related to the significance of the clinical problem and the gap.

 

Research Question (5)

  • State the express or implied question and explain how it addresses the purpose, and if answered, will fill the gap in knowledge, and provide clinically important practice implications and research recommendations.

 

Theoretical/Operational Framework and Diagram (10)

  • Create a computer generated diagram of the theoretical/operational framework as you understand it that explains the horizontal and vertical linkages between concepts, variables (EI) under study, and values, and linkages to the elements of the metaparadigm.

 

 

Project 2

 Project 2: Part 1

 

NOTE:  Discussion is allowed but each person is expected to write their own, using resources and information from class, the library etc.

 

 

Question 1: (18 points)

There are 10 students in a classroom. The following table shows students’ names, their final scores, and two items of the final test (Items 1 and 2). Use this dataset to summarize students’ performance and to conduct an item analysis.

 

Student NameFinal ScoreItem 1Item 2
Cassie88YesNo
Jeremy78NoYes
Mary Lou92NoYes
Ricardo87YesYes
Sing-Hie75NoYes
Terry66NoYes
Tomeka82YesYes
Tony64NoYes
Travis88YesNo
Wanda80NoYes

 

Regarding summarizing test scores:

  1. Given the dataset above, compute the following statistics: Range, Mean, Mode, Median, Variance, and Standard Deviation? (6 points)

 

  1. Decide whether the shape of the distribution is symmetrical, positively skewed, or negatively skewed (explain how your decision is made and provide statistical evidence, such as mean, median, and mode) and use the shape of distribution to describe how students perform on their final exam. (2 points)

 

Regarding conducting item analysis:

  1. Given the dataset above, compute the difficulty (p) and discrimination index (D) for Items 1 and 2 (Construct a table for high and low performing groups and show all your computational processes in details). (6 points)

 

  1. Provide a short explanation about what these results are telling you regarding items 1 and 2 (i.e., use these statistical item properties, such as item difficulty and discrimination, to explain the quality of Items 1 and 2). (4 points)

 

To answer the next set of questions in #2, you will need to carefully study the Power Point on the Normal Curve and Standardized Scores. Be sure to view the notes that go with each slide in the Power Point presentation as the notes provide information that is essential to understanding the slides. Your text also has very helpful information in Chapter 14. Here are a few resources I have compiled to help jog your memory.

 

0.13%
Approximately 2% of the scores are higher than two standard deviations above the mean
0.13%
Approximately 2% of the scores are lower than two standard deviations below the mean

Z-score formula:

Z = (X –M)/SD

For example, a student score on the GRE quantitative exam (X) minus the mean on the GRE quantitative (M). Divide that difference by the standard deviation (SD)

(see pages 273-276 in your book, 11th edition)

 

T-score formula:

T = 10z + 50

Multiply the z-score (z) by 10 and add 50 to this value to obtain the equivalent T-score (T).

(see page 277 in your book, 11th edition)

 

 

 

 

 

Question 2: (26 points)

The National Center for Educational Statistics report that in the year ending 2009 400,000 students took the Graduate Record Examination (GRE). For this set of examinees, the observed mean Verbal score was 560 with a standard deviation (SD) of 90, and the observed mean Quantitative score was 490 with a standard deviation (SD) of 100.

 

Assuming that the distribution of scores on the 2009 GRE was normal, answer the following questions regarding both tests (Verbal and Quantitative): (Show all your computations and use statistical evidence to interpret your answer). Number your responses and circle your final answers.

 

(1 point for each item from 1-4)

Note: please notice that one of these questions ask for a percent and the others ask for the number of students. Respond appropriately.

 

  1. What percent of student scores were below the mean?
  2. How many student scores were above the mean?
  3. How many student scores fall between 1 SD below the mean (-1SD) and 1 SD above the mean (+1SD).
  4. How many students scores were higher than 2 SD above the mean.

(2 point for each item from 5-14)

  1. Ann has a score of 380 on the Verbal exam. What is her z-score?
  2. What is Ann’s percentile rank?
  3. How was Ann performing relative to her peers?
  4. What is the z-score of Sam who scores 760 on the Quantitative exam?
  5. What is Sam’s percentile rank?
  6. How was Sam performing relative to his peers?
  7. Betty’s score on the Verbal exam is 1 SD above the mean. What is her score?
  8. John scores 500 on the Verbal exam. What is his z-score?
  9. Convert John’s score above to a T-score.
  10. If Nicole had a Quantitative score of +1.5 SD’s what was her raw (numerical) score?
  11. If a student had to score at or above the 84th percentile for both tests to be considered for a full scholarship at USF, what would be the minimum score needed on Verbal and Quantitative exams?

 

 

Question 3: (6 points)

You have a student, Tej, entering your school from India. You need to know which math class you should place him in. The scores you normally use are SAT scores (mean=500 and standard deviation=100). The rules you use for placement are:

700-800 Calculus
500-699 Trigonometry
300-499 Geometry
100-299 Algebra

However, this student did not take the SAT, but instead took the AAT (Academic Aptitude and Achievement Test). Scores for the AAT are reported with a mean of 80 and a standard deviation of 4. Tej received a raw score of 92 on the math portion of the AAT. Convert his scores to a metric so that they are comparable to SAT scores, then decide in which math class Tej should be placed. (Hint: you could begin by converting his AAT to a z-score).

Your answer should include at least 2 paragraphs:

  1. Explain (using words and numbers) which course Tej should be placed in, and why. Make sure to include a thorough explanation. (5 points)
  2. Find and provide some background information on the AAT and include an explanation of why this might be an appropriate score to use for this purpose. Include the reference you used for information on the AAT. (1 point)

 

 

The operating system (OS)

The operating system (OS) of an information system contains the software that executes the critical functions of the information system. The OS manages the computer’s memory, processes, and all of its software and hardware. It allows different programs to run simultaneously and access the computer’s memory, central processing unit, and storage. The OS coordinates all these activities and ensures that sufficient resources are applied. These are the fundamental processes of the information system and if they are violated by a security breach or exploited vulnerability it has the potential to have the biggest impact on your organization.

 

Security for operating systems consists of protecting the OS components from attacks that could cause deletion, modification, or destruction of the operating system. Threats to an OS could consist of a breach of confidential information, unauthorized modification of data, or unauthorized destruction of data. It is the job of the cybersecurity engineer to understand the operations and vulnerabilities of the OS (whether it is a Microsoft, Linux, or another type of OS), and to provide mitigation, remediation, and defense against threats that would expose those vulnerabilities or attack the OS.

 

There are six steps that will help you create your final deliverables. The deliverables for this project are as follows:

Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

Nontechnical presentation: This is a set of 8-10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.

In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

When you submit your project, your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission.

 

1.1: Organize document or presentation clearly in a manner that promotes understanding and meets the requirements of the assignment.

2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

5.4: Identify potential threats to operating systems and the security features necessary to guard against them.

 

 

 

 

 

 

 

Step 1: Defining the OS

The audience for your security assessment report (SAR) is the leadership of your organization, which is made up of technical and nontechnical staff. Some of your audience will be unfamiliar with operating systems (OS). As such, you will begin your report with a brief explanation of operating systems fundamentals and the types of information systems.

 

Click on and read the following resources that provide essential information you need to know before creating a thorough and accurate OS explanation:

 

operating systems fundamentals

the applications of the OS

The Embedded OS

information system architecture

cloud computing

web architecture

After reviewing the resources, begin drafting the OS overview to incorporate the following:

 

Explain the user’s role in an OS.

Explain the differences between kernel applications of the OS and the applications installed by an organization or user.

Describe the embedded OS.

Describe how the systems fit in the overall information system architecture, of which cloud computing is an emerging, distributed computing network architecture..

Include a brief definition of operating systems and information systems in your SAR.

 

Step 2: OS Vulnerabilities

You just summarized operating systems and information systems for leadership. In your mind, you can already hear leadership saying “So what?” The organization’s leaders are not well versed in operating systems and the threats and vulnerabilities in operating systems, so in your SAR, you decide to include an explanation of advantages and disadvantages of the different operating systems and their known vulnerabilities.

 

Prepare by first reviewing the different types of vulnerabilities and intrusions explained in these resources:

 

Windows vulnerabilities

Linux vulnerabilities

Mac OS vulnerabilities

SQL PL/SQL, XML and other injections

Based on what you gathered from the resources, compose the OS vulnerability section of the SAR.  Be sure to:

 

Explain Windows vulnerabilities and Linux vulnerabilities.

Explain the Mac OS vulnerabilities, and vulnerabilities of mobile devices.

Explain the motives and methods for intrusion of the MS and Linux operating systems;

Explain the types of security awareness technologies such as intrusion detection and intrusion prevention systems.

Describe how and why different corporate and government systems are targets.

Describe different types of intrusions such as SQL PL/SQL, XML, and other injections

You will provide leadership with a brief overview of vulnerabilities in your SAR.

 

Step 3: Preparing for the Vulnerability Scan

You have just finished defining the vulnerabilities an OS can have. Soon you will perform vulnerability scanning and vulnerability assessments on the security posture of the organization’s operating systems. But first, consider your plan of action. Read these two resources to be sure you fully grasp the purpose, goals, objectives, and execution of vulnerability assessments and security updates:

 

Vulnerability assessments

Patches

Then provide the leadership with the following:

 

Include a description of the methodology you proposed to assess the vulnerabilities of the operating systems. Provide an explanation and reasoning of how the methodology you propose, will determine the existence of those vulnerabilities in the organization’s OS.

Include a description of the applicable tools to be used, and the limitations of the tools and analyses, if any. Provide an explanation and reasoning of how the applicable tools to be used, you propose, will determine the existence of those vulnerabilities in the organization’s OS.

Include the projected findings from using these vulnerability assessment tools.

In your report, discuss the strength of passwords, any Internet Information Services’ administrative vulnerabilities, SQL server administrative vulnerabilities, and other security updates and management of patches, as they relate to OS vulnerabilities.

 

 

tep 4: Vulnerability Assessment Tools for OS and Applications

Note: You will use the tools in Workspace for this step. If you need help outside the classroom, register for the CLAB 699 Cyber Computing Lab Assistance (go to the Discussions List for registration information). Primary lab assistance is available from a team of lab assistants. Lab assistants are professionals and are trained to help you.

 

Click here to access the instructions for Navigating the Workspace and the Lab Setup.

 

Enter Workspace and complete the lab activities related to operating system vulnerabilities.

 

Click here to access the Project 2 Workspace Exercise Instructions. Explore the tutorials and user guides to learn more about the tools you will use.

 

You’ve prepared for your assessment; now it’s time to perform.

 

Security and vulnerability assessment analysis tools, such as Microsoft Baseline Security Analyzer (MBSA) for Windows OS and OpenVAS for Linux OS, are stand-alone tools designed to provide a streamlined method for identifying common security misconfigurations and missing security updates for the operating systems and applications. These tools work on layers 5-7 of the Open System Interconnection (OSI) model.

 

Your leadership will want to understand the differences and commonalities in the capabilities of both tools and will want this included in the SAR.

 

Use the tools’ built-in checks to complete the following for Windows OS (e.g., using Microsoft Baseline Security Analyzer, MBSA):

 

Determine if Windows administrative vulnerabilities are present.

Determine if weak passwords are being used on Windows accounts.

Report which security updates are required on each individual system.

You noticed that the tool you used for Windows OS (i.e., MBSA) provides dynamic assessment of missing security updates. MBSA provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping.

Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment. In this case, a tool such as MBSA will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML.

You will also complete a similar exercise for Linux OS (e.g., using the OpenVAS tool). Select the following links to learn more about OpenVAS and computer networks:

 

OpenVAS

Computer Networks

Utilize the OpenVAS tool to complete the following:

 

Determine if Linux vulnerabilities are present.

Determine if weak passwords are being used on Linux systems.

Determine which security updates are required for the Linux systems.

You noticed that the tool you used for Linux OS (i.e., OpenVAS) provides dynamic assessment of missing security updates. MBSA provides dynamic assessment of missing security updates. Scan one or more computers by domain, IP address range, or other grouping.

Once complete, provide a detailed report and recommendations on how to make your system a more secure working environment

 

Knowledge acquired from this Workspace exercise and capability of this tool will help your company’s client organizations secure the computer networks’ resources and protect corporate data from being stolen.

 

Validate and record the benefits of using these types of tools. You will include this in the SAR.

 

Step 5: The Security Assessment Report

By utilizing security vulnerability assessment tools, such as MBSA and OpenVAS, you now have a better understanding of your system’s security status. Based on the results provided by these tools, as well as your learning from the previous steps, you will create the Security Assessment Report (SAR).

 

In your report to the leadership, emphasize the benefits of using a free security tool such as MBSA. Then make a recommendation for using these types of tools (i.e., MBSA and OpenVAS), including the results you found for both.

 

Remember to include these analyses and conclusions in the SAR deliverable:

 

After you provide a description of the methodology you used to make your security assessment, you will provide the actual data from the tools, the status of security and patch updates, security recommendations, and offer specific remediation guidance, to your senior leadership.

You will include any risk assessments associated with the security recommendations, and propose ways to address the risk either by accepting the risk, transferring the risk, mitigating the risk, or eliminating the risk.

Include your SAR in your final deliverable to leadership.

Step 6: The Presentation

Based on what you have learned in the previous steps and your SAR, you will also develop a presentation for your company’s leadership.

 

Your upper-level management team is not interested in the technical report you generated from your Workspace exercise. They are more interested in the bottom line. You must help these non­technical leaders understand the very technical vulnerabilities you have discovered. They need to clearly see what actions they must either take or approve. The following are a few questions to consider when creating your non­technical presentation:

 

How do you present your technical findings succinctly to a non­technical audience? Your Workspace exercise report will span many pages, but you will probably not have more than 30 minutes for your presentation and follow-up discussion.

How do you describe the most serious risks factually but without sounding too temperamental? No one likes to hear that their entire network has been hacked, data has been stolen, and the attackers have won. You will need to describe the seriousness of your findings while also assuring upper-level management that these are not uncommon occurrences today.

How do your Workspace exercise results affect business operations? Make sure you are presenting these very technical results in business terms that upper-level management will understand.

Be very clear on what you propose or recommend. Upper-level management will want to not only understand what you discovered; they will want to know what you propose as a solution. They will want to know what decisions they need to make based on your findings.

Your goal for the presentation is to convince the leadership that adopting a security vulnerability assessment tool (such as MBSA) and providing an extra security layer is a must for the company.

 

The deliverables for this project are as follows:

 

Security Assessment Report (SAR): This report should be a 7-8 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

Nontechnical presentation: This is a set of 8-10 PowerPoint slides for upper management that summarizes your thoughts regarding the findings in your SAR.

In a Word document, share your lab experience and provide screen prints to demonstrate that you performed the lab.

Submit your deliverables to the assignment folder.

 

 

 

 

 

Price Quotes and Pricing Decisions Applied Problems

Price Quotes and Pricing Decisions Applied Problems

Please complete the following two applied problems:

Problem 1:

Jessica Alba, a famous actress, starts the baby and family products business, The Honest Company, with Christopher Gavigan. Alba and Gavigan set up their site so families can choose what kinds of non-toxic, all-natural products they’d like to use and get them in a bundle. Families can choose all kinds of products from food to hygiene necessities and cleaning supplies. Suppose they are thinking of expanding their business into five domestic markets: Phoenix, Dallas, Chicago, New York, and Atlanta. Assume their primary goal of business is to maximize economic profits, although they want to do business honestly.

Show all your calculations and process. Describe your answer for each question in three- to five-complete sentences.

  1. You are a business adviser for Alba and Gavigan. Describe a skimming price and a penetration price, and advise them whether they should charge a skimming price or a penetration price, with supportive reasoning for and against each pricing alternative.
  2. Are they likely to make economic profits initially? Can they continue to make economic profits in the long term? Why or why not? Discuss.
  3. What advice would you give to Alba and Gavigan to help them make more profit in the long term?

Problem 2:

You operate your own small building company and have decided to bid on a government contract to build a pedestrian walkway in a national park during the coming winter. The walkway is to be of standard government design and should involve no unexpected costs. Your present capacity utilization rate is moderate and allows sufficient scope to understand this contract, if you win it. You calculate your incremental costs to be $268,000 and your fully allocated costs to be $440,000. Your usual practice is to add between 60% and 80% to your incremental costs, depending on capacity utilization rate and other factors. You expect three other firms to also bid on this contract, and you have assembled the following competitor intelligence about those companies.

IssueRival ARival BRival C
Capacity UtilizationAt full capacityModerateVery low
Goodwill ConsiderationsVery concernedModerately concernedNot concerned
Production FacilitiesSmall and inefficient plantMedium sized and efficient plantLarge and very efficient plant
Previous Bidding PatternIncremental cost plus 35-50% Full cost plus 8-12% Full cost plus 10-15%
Cost StructureIncremental costs exceed yours by about 10%Similar cost structure to yoursIncremental costs 20% lower but full costs are similar to yours
Aesthetic FactorsDoes not like winter jobs or dirty jobsDoes not like messy or inconvenient jobsLikes projects where it can show its creativity
Political FactorsDecision maker is a relative of the buyerDecision maker is seeking a new jobDecision maker is looking for a promotion

Show all of your calculations and processes. Describe your answers in three- to five-complete sentences.

  1. What price would you bid if you must win the project?
  2. What price would you bid if you want to maximize the expected value of the contribution from this contract?
  3. Defend your answers with discussion, making any assumptions you feel are reasonable and/or are supported by the information provided.

 

Policy Research Proposal

Policy Research Proposal PowerPoint Instructions

This assignment is a culmination of your Discussion Board Forums. You will create a PowerPoint presentation that proposes a research project on a policy topic. Your presentation must have slides that cover all of the following information:

 

  • Purpose Statement
  • Research Questions/Hypotheses/Null Hypothesis
  • Research Design
  • Significance of the Study
  • Problem Statement
  • Sample
  • Setting/Site
  • Data Collection Methods
  • Data Analysis Methods
  • Trustworthiness/Reliability/Validity
  • Ethical Considerations

 

In this presentation, you must elaborate on what you wrote in your Discussion Board Forums regarding the items above. Presentations may make use of bullet points, but you must include explanatory paragraphs in the notes section of PowerPoint. What must be included in the notes section is what you would say if you were presenting this research proposal to a boss, educator, or the interested public sponsoring the research. The goal of this presentation is to communicate your policy research proposal to an audience. It must be long enough to cover the subject, but short enough to keep the attention of the audience. Please take into account any and all constructive criticisms offered by your classmates and instructor throughout the Discussion Board Forums.

 

 

 

IRAC

Frances has lived in an apartment for ten years when she decides to buy a house. Her one-year lease will end on May 1.  On April 15, she orally contracts to buy Frank’s house for $100,000, with the closing (transfer of the deed) to take place on June1.  Frank’s lawyer, who is out of town on vacation, is to draft a written contract of sale on his return to his office on May 15. Because Frances’s lease is terminating, Frank agrees to let her take possession of the house on May 1 if Frances gives him a down payment on the house of $5,000.  Frances agrees and gives Frank the $5,000.  She moves into the house on May 2, and the following weekend plants trees in the back yard.  On May 10, Frank receives a written offer from Green to buy Frank’s house for $120,000. Frank accepts Green’s offer, asks Frances to move out of the house, and tries to return the $5,000 to Frances.  Frances claims that she has an enforceable contract to buy the house. Frank claims that any such contract must be in writing to be en­forceable under the Statute of Frauds.

Analyze using IRAC

Question 2

Breach 100 pts

Use IRAC

Stacey contracts to buy six cases of vintage Stomp Valley wine from Twisted Winery for $1,200. The contract states that delivery is to be made at Stacey’s residence “on or before May 1, to be used for daughter’s wedding reception on May 2.” On May 1, Twisted’s delivery van is involved in an accident, and no wine is delivered that day. A message was left for Stacy telling her of the accident.   On the morning of May 2, Stacey buys the wine from Happy Hill Winery for $1,800, and her staff prepares for the reception. That afternoon, just before the reception, Twisted tenders delivery of the wine at Stacey’s residence. She refuses tender. Twisted sues Stacey for breach of contract, Stacy files a counter claim.

Use IRAC to analyze Stacey’s position.

 

Concept Analysis

Assignment 2: Phase A of Concept Analysis Paper (25 points/5% of final grade)

  1. Identify a concept of one or two words that conveys meaning, understanding or feelings between or among individuals within the profession of nursing.
  2. Choose a concept that represents an area/problem of interest to you in your clinical practice
  3. Some concepts relevant to nursing and advanced practice nursing include: health, nursing, managed care, coping, parenting, hardiness, attachment, separation, stress, crisis, pain, grief, hope, self-efficacy, wellness, integrity, growth, adaptation, caring, mentorship, chronicity, family, self-care, fatigue, caregiving, anxiety, collaboration, continuity of care, etc.
  4. Write a short introductory paragraph expressing what the concept is and why it is significant to you and to nursing.
  5. Write down all the words you can think of that relate to or express the concept.
  6. Ask colleagues to share their understandings of your concept. Summarize their responses.
  7. Look up the concept in a collegiate dictionary and list the definitions you believe most closely describe your feelings or thoughts on the concept. The collegiate dictionary is on reserve in the computer lab and is also found in public libraries
  8. Be sure to obtain the proper citation
  9. Internet-based dictionaries are NOT acceptable for this paper

 

  1. List synonyms and antonyms of the concept. You may use a thesaurus (on reserve in the computer lab) as well as a dictionary to identify these.
  2. Submit the 2-3 page paper (not counting cover page and reference list) in APA format by the deadline.

 

global warming

 

Read about global warming at sites on the Internet. Write a 500-800 word (~2 pages, double spaced) paper that answers the following questions: • How much have global temperatures increased over the last century? • Why do scientists suspect man-made carbon dioxide is responsible? • Do scientists agree that global warming is an inevitable consequence of carbon dioxide production? • What efforts, if any, are currently underway to address the problem? These efforts could be governmental (US government, state governments, international/UN based, etc.) or run by other organizations such as Greenpeace, the Sierra Club, or even by businesses? You only need to address two or three efforts at a maximum. • Which of these efforts, if any, do you think are likely to succeed?   Alternatively, you may choose ONE result of global warming to write about in detail, with accompanying charts and discussion.  Suggestions include  • Sea level rise • Land and sea ice loss • The changing climate of Ohio • The migration of diseases and pests • The real and potential impact on human conflict and migration.

 

Include at least one well-explained, up to date graph of data.   Papers should be typed, double spaced, and submitted in .docx or .pdf format through the Blackboard SafeAssign portal for this assignment. Check your papers for correct grammar and spelling before submission.  Material not your own must be cited within the text to a bibliography entry at the end. References should be cited using a common citation style— APA, MLA, or Chicago.  See examples on the next page.  Use only original scientific material- do NOT cite Internet blogs or media (reputable media cite material with references; these sources may be used).  Your paper should include at least three sources.   Plagiarism will not be tolerated. Here are some places to start: NOAA  National Geographic  Science Daily  American Institute of Physics