Entries by developer

Operations Management Open Question

   Open Response  Choose any 4 of these open response questions to answer. For each open response answer, include at least 4 concepts from the textbook and at least 1 reference to other required articles or videos. 1. Despite increases in diversity training programs, outcomes are not consistently leading to increases of diversity within upper […]

Mini Research Paper

Pick a topic relevant to the information we have covered to date, including this week.  It can cover information in Chapters 1,2,3, and 9, or any of the articles presented in the readings area.  The format of your paper will need to follow the following outline in APA format (include title page, abstract page, content […]

SOC-481 Action Research Project Proposal

Instructions: This is a three-part assignment, in which you develop a proposal for a viable action research project. The purpose of the proposal is to engage and inform potential “funders” of the project, as well as other key stakeholder groups invested in social change initiatives. The proposal should clearly and succinctly describe all aspects of […]

Reply with a comment to post 1, post 2, post 3 and post 4 with 2 reference below each reply.

POST 1 KELLY Utilizing conjoint analysis to explicate health care decision making by emergency department nurses: a feasibility study. The goal of this study was to study the feasibility of using clinical simulation to understand proxy decision making by emergency department (ED) nurses for individuals with intellectual disability (ID) (Fishner, Orkin, & Frazer, 2008). The […]

Discussion and 1 reply

 Discussion question 1.  One of the key reasons that businesses fail is due to improper capital  planning and a general lack of working capital (aka liquidity).  It also  happens to be one of the key reasons why people fail too.  In personal  finance, we know that you should have 3 to 6 months’ worth of […]

Cryptographic Algorithms & Information Protection at Large

Part 1: Cryptographic Algorithms This week reading focused on three types of cryptographic algorithms: (1) Secret key, (2) Public key, (3) Hash functions. Pick an algorithm for any one of these types (e.g., DES, AES, RSA, MD5) and describe how it works and where it is applied in network security. (For example SSL uses 3DES […]

Power point

Review the case studies of Colleen M. and Xander L. located in the Juvenile Offender Case Studies document. Compute the risk assessment score for each of these individuals using two of the risk assessment devices you located in your Collaborative Activity this week. Create a 10- to 12-slide Microsoft® PowerPoint® presentation with detailed speaker notes […]

Wooden on Leadership

In the current business world, team projects are commonplace. This assignment will use John Wooden’s Pyramid of Success, its different facets, how it relates to project management leadership, and how it is fulfilled in different circumstances. Visit John Wooden, Coach and Teacher (link below) to retrieve the information. Write an 8–10 page paper in which you: Describe […]

Competency 7: Assess Your Interview Skills

   Internship Applied Learning Activities in Response to COVID 19  The Business Internship program has developed a plan to address temporary disruption to students’ internship placements due to national or local events such as communicable diseases, natural disasters, and/or civil unrest.  • Students should contact their site sponsor at their internship location to work together […]