psych question 2

1st discussion

While each of the following bears some responsibility, who/what is most responsible for epidemic levels of obesity in childhood?

  • Genetics
  • Parents
  • Economics and health/nutrition policies

In 2-3 paragraphs, argue your position using data from the textbook or any external sources. Be sure to provide page numbers or web link as applicable.

2nd discussion

A Moral Dilemma – Case Study

A man is sitting at home worrying about the fact that his daughter needs a major surgery in order to continue living, but he does not have the money to pay for it. He has asked family and friends to help with the cost of the surgery, but he only was able to raise about a quarter of what the surgery costs. He then remembers that he has power of attorney (i.e., control over someone else’s finances/legal issues) for his out-of-touch-with-reality, but otherwise very healthy, 85-year-old father. The man could, without anyone knowing, use his father’s money to pay for the surgery. However, this would leave his father with only one year of living expenses remaining. In the end, the man decides to take his father’s money for his daughter’s surgery.

In 2-3 paragraphs, respond to the following:

  • Should the man have done that? Why or why not?
  • What would Kohlberg say about your response? What “stage” of moral development can be applied to your response in this situation? (Note: we respond to situations on all different levels, even as adults. How you respond to one situation is not an indicator of your overall moral development.)

2 after your login with your student id search for the following case study improvement of the customer satisfaction through quality assurance matrix and qc story methods a case study from automotive industry g m sicoe1 n belu1 n rachieru1 and e v n

2.After your login with your student ID, search for the following case study:

Improvement of the customer satisfaction through Quality Assurance Matrix and QC-Story methods: A case study from automotive industry G M Sicoe1, N Belu1, N Rachieru1 and E V Nicolae2

In this case study, the authors discussed the impact of using Quality Assurance Matrix (QAM) and Quality Control Story techniques in the automotive industry field, and how it can increase the quality performance and customer satisfaction.

Download the article, read it carefully and answer the following questions in your own words:

  • In brief, explain the meaning of quality assurance matrix and quality control-story methods discussed in the case. ( Minimum of 200 words ) , [ 1.5 Mark }
  • Describe the tools that can be implemented in the application of Quality Assurance Matrix (QAM) and Quality Control Story. ( Minimum of 150 words ) , { 1.5 Mark }

Based on the described process and examples given of Quality Assurance Matrix (QAM) and Quality Control Story techniques create your own example using one of these techniques. (You are free to choose the industry field and the product or service type). (Minimum of 200), { 2 Marks}.

i need essay with covering all required

Purpose:

This essay assignment will allow you to locate, evaluate, and synthesize information from sources representing diverse perspectives in order to construct an argument about how you self-identify. Writing about the assumptions we make and forming arguments about our own connections to a culture will help us access larger ideas that will take us into more complex reading and writing this semester.

Skills:

The purpose of this assignment is to help you practice the following skills that are essential to your success in navigating arguments you’ll encounter in your academic, professional, and personal lives. In this assignment you will:

  • Demonstrate your current understanding of what an argument is, specifically the “Classical/Aristotelian” argument structure)
  • Avoid problems in logic through your argument
  • Incorporate sources of value to you
  • Compose an argument relevant to your own life

Knowledge:

This assignment will also help you to become familiar with the following important content knowledge in critical thinking and reasoning:

  • The relationship between what you observe/consume, the decisions you make, and your own expressions in writing
  • Specific rhetorical approaches to reach an audience via the Classical style of argument

Tasks:

To complete this assignment you should:

  1. Before you start writing, make a list of subcultures you feel connected to. Go over that list carefully, and think about the role you play in various communities. Doing so will help you craft a clear definition of how you see yourself, and the role you play in a specific context
  2. When you’ve drafted a clear statement about how you see yourself, and the role you play in a specific context, you can begin to work on an introduction where you make a statement about how you contribute to a specific community. One example might be something like this: “As a poet in San Diego, it’s my responsibility to promote and attend literary events in the area.”
  3. In body paragraphs, makes points that help you elaborate on the statement you’ve made (the statement is your argument/thesis). If we go with the example above, one point might be about what makes San Diego unique to other cities in terms of literary arts, another paragraph about the responsibility I feel writers have (this could be a couple of paragraphs), another paragraph about what attendance does, another about promotion, and then a paragraph about how these points build a case that my role is necessary
  4. Incorporate sources/evidence as needed and incorporate those in MLA format. Use at least two sources in your paper.
  5. In a conclusion, attempt to end in a different place than where you began, remembering that a paper is about a progression, where you move to a new place by the end of it, rather than merely restating the initial thesis.
  6. Cite all sources in a Work Cited page at the end of the paper
  7. Submit the final paper as a document here in Canvas

Criteria for Success:

You’ve written a paper about how you see yourself, and the contributions you make to a specific community; a heading is on the first page, along with a title; there’s a clear introduction that makes a statement/argument/thesis; body paragraphs are clearly structured to advance that point; a conclusion helps the reader end in a different place from where they began; sources/evidence are incorporated where necessary; MLA format is used both in text and also in a Work Cited page at the end; paper is double-spaced and follows other format criteria on the syllabus.

inter professional collaboration and patient outcomes

Interprofessional teams are part of practice trends we see developing in all aspects of care delivery. Consider you own work environment (or recent clinical setting).

  • For this assignment, consider the concept of inter-professional teamwork and patient outcomes.
  • Look to your current workplace as an example. (If you are not currently employed, look to a past workplace or clinical practice area.)
  • Apply the components of the iCARE concept to inter-professional teams in a short paper. (Body of the paper to be 3 pages, excluding the title page and references page)
  • iCARE components are:

C ompassion

A dvocacy

R esilience

E vidence-Based Practice (EBP)

  • How could you contribute to an inter-professional team and patient outcome through nursing actions of: compassion, advocacy, resilience, and evidence-based practice?
  • Select one scholarly nursing article from CINAHL as a resource for your paper. Additional scholarly sources can be used but are optional.
  • Use APA format throughout, particularly in citations and on the References page.
  • Please paraphrase throughout. One short quote is permitted.
  • The prepared paper template is RECOMMENDED for this assignment.

Download the assignment template here: iCare Assignment Template (Links to an external site.)

process control at polaroid case

this HW is based on OPERATIONS MANAGEMENT. with is belong to major: MBA.

I have 17 pages (include Exhibits ) case “Process Control at Polaroid (A)” . You need to write 4 parts about this case(“Case Analysis Guideline” ).

In your case write-up, I would like for you to provide both qualitative and

quantitative analysis with regard to the following questions.

1. Create and interpret SPC charts – Xbar and R charts for each work shift for

finger height and pod weight.

2. How does Polaroid address the four costs of quality? What could they do

differently?

3. What recommendations would you make to Rolfs in order to address both

near- and longer-term issues?

4. Use Demings 14 points where applicable in your recommendations.

three envelopes with different values you choose one would it be beneficial to trade or keep your envelope

I think this problem is harder than it seems? … I’ve been stuck on it for a while. Typed or handwritten is fine, as long as its clear… I’m trying to understand how to approach this problem in the future and the internet has not been much help.

“I put three marked envelopes on my desk. One contains a check for $1,000,000 and the other two contain a check for $1.00. I let you pick one envelope to hold. I select one of the two remaining envelopes and open it showing you a check for $1.00. Now, I ask you if you would like to keep your envelope to open or instead choose to open the remaining envelope on my desk. (a) What is the probability you’ll win if you keep the envelope in your hand, and (b) what is the probability you’ll win if you instead choose to open the remaining envelope on my desk? Explain in words, equations, or diagrams.”

Thanks!

invited for 101

e a doctor. That was when my grandmother died. My grandmother got a disease, the result went to the hospital, did not treat well. So at that time my grandmother died. Because of this, I want to be a very, very famous doctor, can treat any disease, then. No one in the family would ever get sick again. Even if you get sick, you can cure it. No one in the family gets sick, and it can be cured. Home is very good. When a doctor is not only to see family members sick, but also to help others, see a doctor for others, so that people are healthy.

There are many advantages to being a doctor. If there are no doctors in the world, more people will get sick. A doctor is like a magician who can refresh and improve a person who is seriously ill. Want to realize this great wish, is also difficult, to accumulate over a long period of time, good good study these medical skills. You can’t rise to the top in one fell swoop.

please provide a detailed answer to the following question 37

1.) Tommy Teenager (TT) is an enthusiastic, new employee at a local grocery store, Food Fetch (FF). His boss is Mary Manager (MM). One day, while accepting a shipment of food from Dandy Distributor (DD), Mary tells the DD driver about TT. She exclaims in front of TT what a great job he is doing, and that she would not be surprised if he ended up running the place someday.

One very busy Saturday, before a blizzard is forecast to hit the area, TT is the backroom working when DD pulls up with a delivery. DD is in a hurry to get unloaded and get on the road to beat the weather, and DD remembers what MM told him when he sees TT; DD asks TT to sign for the shipment. TT does not have any idea what he is doing. Still, he realizes how rushed MM is and how FF is running low on groceries on this busy, snowy Saturday. TT just wants to help, and signs for the shipment. TT puts the invoice on MM’s desk but forgets to tell her about it.

Three months later, DD calls MM to ask when she is going to pay for the shipment. MM knew nothing about TT signing for it and did not see the invoice on her messy desk.

Please explain why FF might be liable to pay.

MLA cite all sources.

2.) Big Business (BB) employs Oscar Outspoken (OO). OO has worked in the warehouse at BB for years. He is not management, but due to his experience and political savvy, he has become a de facto leader of the warehouse workers.

BB has grown tired of OO’s complaints, and BB believes OO’s continued employment at BB will result in workers complaining like him. To stop further trouble, BB fires OO without giving a reason. OO sues BB for his firing.

Pretend you’re a lawyer representing BB, discuss the strengths and weaknesses of your client’s position on their dispute


MLA cite all sources (In-text citations)

suma and kar discussion replies 1

Read below student posts reply each in 150 words.There are 4 student posts ,please check the names

shalini – The main thought is the security of the organizations network. Another thought is loss of organizational data by a gadget being taken. Extra thought is for the advancement of security policies for BYOD is the threat of malware. Additionally, the possibility to have unapproved access into various regions of an organizations network. Notwithstanding the choice made by the relationship on technique structure, all around, existing methodologies ought to be changed in accordance with ensure that proper refinements are drawn among individual and organization had devices and that present plans are not finished or under extensive concerning tending to BYOD issues (Eslahi et al, 2014).

  • BYOD and the Personal Device Use Policy Implementation Process
  • Personal Device Use Policy Provisions
  • Key Definitions
  • Personal Device System Requirements, Configuration and Limitations
  • Personal Device Security Requirements
  • Investigations and Incident Response
  • Liability and Damages (Eslahi et al, 2014).

The risks related to BYOD must be tended to by an organization before actualizing it. One risk related with BYOD is if the personal devices are lost or taken the organization will most likely be unable to stop any information in the devices from being undermined. An organization not having a BOYD strategy is a significant risk. Practically 60% have no personal gadget approach set up, and, among those with policies, 24% make special cases for officials, who may handle considerably progressively delicate data; accordingly, these organizations are increasingly vulnerable to data loss and genuine consistency issues. Another risk is when representatives access the network that has been prohibited by their organization. “Organizations that confine certain devices from network access may discover representatives utilizing a workaround to integrate with corporate assets; certain mobile applications can empower workers to deceive network access control checks.” Failure to update security software by BYOD users is a risk and organizations need to have policies set up to guarantee the BYOD users are made mindful of the requirements for their allowed use of their devices (Disterer & Kleiner, 2014).

The significant challenges of enforcing policies concerning BYOD, portable and mobile devices.

  • Long-period vendor plans
  • Lost devices
  • Data possession
  • Corporate end-user device policy
  • Application deployment into severs
  • Patches and updates (Disterer & Kleiner, 2014).

Preetham – BYOD Security Policies

BYOD involves the practice of allowing employees to bring along their devices to work for use with the organization systems, software, network or information. In the recent world, BYOD has risen as a trend in most organizations with an increased number of employees using their own devices in the workplace. BYOD has proved beneficial to organizations in that it has led to improved productivity, minimized IT and operational costs, and provided the flexibility of the employees and a higher appeal in terms of hiring and retaining of staff in an organization (Downer, & Bhattacharya, 2015). There is, therefore, a need for BYOD policy creation in the establishment of BYOD security policies. The BYOD policy should, therefore, ensure that it addresses the basic considerations which include the goals of the program, specific employees that can bring their own devices, which devices are allowed for use in the organization and the access levels that the employees are granted to access when in possession of the personal devices.

It is also important to dictate who is responsible for paying for the devices and the data coverage that is needed. It is also crucial to take into consideration the regulations that must be adhered to when using employee devices in the organization. It is also important to outline the effects of violations of the BYOD policy by the employees. An organization also needs to take into account the support that it will offer to the BYOD users which may include troubleshooting, software updates, and maintenance of the BYOD devices (Vignesh, & Asha, 2015). There is also a need that the organization seeks to provide the methods that are going to be used in securing the BYOD devices before they are sold or disposed of to third parties in an effort to ensure that the organization’s information remains secure and is not exposed to interference.

Most organizations however are still finding it difficult in allowing their employees to use their own mobile devices to access the organization IT systems following the security challenges that are presented by BYOD. They include physical theft of the devices, hacking issues, fired employees, lost or stolen devices, malware protection, policy enforcement, and IT support and employee education.

Mukesh – Access controls and data protection

Being a known and well-established company, Sony is vulnerable and a good hit for hackers today. Access controls and data protection helps in regulating the computing environment used by the firm. There are various types of data control and stability that the Sony company is recommended to use to ensure the computing environment is safe and secure.

The establishment of identification and authentication is an important step that should be established in the organization to secure the computing systems. The use of passwords and security tokens are examp0le of how this step should be found in the organization. Management of the security procedure set through identification and authentication can be managed in the company making it easier to monitor the intruders (Fontijn, Talstra, Newton & Holtman, 2015). The same license can be established to all the workers to make all the groups of the entrepreneurship obtain access.

The establishment of access control techniques is a recommendable mechanism to the Sony company. The techniques help in maintaining the complex computing environment. It is used to work towards securing the cloud data. For adequate data protection in any organization, the nature of the information to be used should be understood before putting it into practice. The established mechanism used in the access control helps in the identification and categorization of the security strategies needed for the protection to be adequate (Jakimoski, 2016). Management of this information should be implemented for a manageable process in protecting sensitive information. The encryption of confidential information is also a recommendable way of improving data protection security. Data encryption in the organization will help to maintain the integrity of the information and the confidence in the data.

Jay – Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.

The first consideration is the security of the organizations network. Another consideration is loss of organizational data by a device being stolen. Additional consideration is for the development of security policies for BYOD is the threat of malware. Also, the potential to have unauthorized access into different areas of an organizations network.

List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

The risks associated with BYOD has to be addressed by an organization prior to implementing it. One risk associated with BYOD is if the personal device is loss or stolen the company may not be able to stop the any information in the devices from being compromised. A company not having a BOYD policy is a major risk. Almost 60% have no personal device policy in place, and, among those with policies, 24% make exceptions for executives, who may handle even more sensitive data; as a result, these organizations are more vulnerable to data loss and serious compliance issues (NetworkWorld Asia, 2013). Another risk is when employees gain access to the network that have been banned by their organization. According to Westervelt (2013), “organizations that restrict certain devices from network access may find employees using a workaround to tie into corporate resources; certain mobile apps can enable employees to trick network access control checks.” Failure to update security software by BYOD users is a risk and companies need to have policies in place to ensure the BYOD users are made aware of the requirements are for their allowed use of their devices.