NURSING PICO QUESTION- Create a CONCEPT MAP

  

NURSING PICO QUESTION

  1. Formulate a PICO question for your “Design A Research Study” assignment. Use the following formulated question as PICO question to create the Concept Map:

Which form of oxytocin administration during the third stage of labor is most effective in reducing the risk of postpartum hemorrhage?

  1. Create a concept map for your PICO question, using the module resources on concept mapping. Using guidelines from the concept mapping topic of this module, create a new concept map based on your PICO question. See resources and guidelines attached below 
  2. The first step is in concept mapping to create boxes with the four pieces of your PICO.
  3. Then begin making connections between the population, intervention, comparison, and outcomes for your question. 
  4. Expand your map by including additional levels of concepts, ideas, and search terms (synonyms) for each subtopic. 
  5. You should have at least three levels of sub-concepts in addition to your main PICO concepts. This process will help you tremendously when you begin to search the databases for literature on your paper topic. 

PICO and Concept Map Assignment Grading Rubric: 

  

Possible Points

Points Given

Comments

 

PICO and Search   Query Worksheet attached and complete

5

 

Well-written   PICO of nursing relevance

5

  

PICO represented as main concept boxes on concept   map an Contains at   least 3 additional levels of concepts beyond the main boxes

5

 

Map Appears   thorough and neat

5

HCS 499 WEEK 4 REPLY 2

  

Reading the following reply below, what are your thoughts? Please be sure to meet the word count of 175 – 265. Absolutely no plagiarizing! This response is due 08/02/21. Thanks so much in advance.

 When seeking out the best outcome, it is important to ensure that you have the best strategic plan in place. When watching the videos in LinkedIn videos it is important to ensure that you take advantage of putting the correct employees in place and to use the proper and necessary resources, this is a step-by-step process. Laying out the plan and ensuring that the organization recognizes its strengths and weaknesses. These tools in the videos show how to recognize the skills that the organization and the members have working to further develop them. By working with the team and identifying the mission and the goal of the organization it will be easier to implement the strategic plan and ensure that it is successful. This would be useful for me to help with the organizational needs as I am working with my team on developing and recognizing their strengths. This skill set is important to ensure that the employees can develop their careers as well as the organization being successful. Taking the time to recognize individual strengths can ensure the success for everyone involved.

Discussion reply2

What is the difference between degenerative bone disease and osteoporosis? Explain the pathology of each.
Osteoporosis is porous bone (Huether & McCance 2018, p. 1437).  It is the most common bone disease characterized by low bond mineral density, impaired bond structural integrity, decreased bone strength, and risk of fracture (Huether & McCance 2018, p. 1437).  There is primary/idiopathic osteoporosis which is the most common.  Secondary osteoporosis is caused by other conditions such as endocrine diseases, medications, and other substances such as tobacco (Huether & McCance 2018, p. 1437).  Osteoporosis manifestations depend on the bones involved, but bone deformity is the most common (Huether & McCance 2018, p. 1437).  Pain usually accompanies a fragility fracture.  As bone lose volume, they become weak and brittle, causing collapse or become misshapen (Huether & McCance 2018, p. 1437).  The development of osteoporosis occurs when the remodeling cycle is disrupted.  The remodeling cycle is the process of bone formation and resorption (Huether & McCance 2018, p. 1437).  The disruption leads to an imbalance in the coupling process (Huether & McCance 2018, p. 1437).  Degenerative bone disease, such as osteoarthritis is more of a result from wear and tear on the bones destroying the structure.  OA is the loss and damage of articular cartilage and has been viewed as a mechanical problem (Huether & McCance 2018, p. 1445).

2.    What treatment options should be discussed with the patient?  Prevention of osteoporosis is important, but treatment is more common, and its focus is preventing fractures and maintaining optimal bone function (Huether & McCance 2018, p. 1437).  Calcium’s role to prevent and treat osteoporosis is controversial.  Yet, it is accepted that oral calcium intake to maintain normal balance of calcium is necessary during adolescence to ensure peak bone mass development (Huether & McCance 2018, p. 1437).  Diets deficient in calcium aggravates bone loss which is associated with aging and menopause.   Postmenopausal women should not increase calcium and vit d intake to prevent fractures (Huether & McCance 2018, p. 1437).  Higher fruit and vegetable take is correlated to a high BMD.  Other nutrients that appear to help include magnesium, vit k2, and docosahexaenoic acid (Huether & McCance 2018, p. 1437). 

3.    What lifestyle changes should be recommended to the patient?  The patient would be educated on stopping smoking and drinking.  Education would also include a diet stating that risk factors include low dietary calcium and vit d, low endogenous magnesium, excessive protein and sodium and high caffeine intake (Huether & McCance 2018, p. 1437).  Exercise would be encouraged, as a sedentary lifestyle is a risk factor.  
The risk of osteoporosis can be reduced through lifestyle changes (Rizzoli et al, 2014).  Adequate dietary intake of calcium, protein, and vit D is a lifestyle change needed along with exercise, smoking cessation, and alcohol reduction (Rizzoli et al, 2014).  

 

Deliverable 3 – Operations Management Challenges

Scenario

XYZ health clinic has operated in the local area for 10 years. Due to an economic decline as a result of the state’s increasing number of uninsured residents, XYZ health clinic must adjust its current service offerings in order to recoup lost revenue. The state has elected to opt out of the Medicaid expansion program; therefore, many of the residents remain uninsured. This has proven extremely problematic for XYZ as many of the patients in the area are low income, but do not qualify for traditional Medicaid. As a result, XYZ’s payer mix is unfavorable as 33% of the residents have public insurance, 12% are uninsured, and only 5% are covered by private insurance. XYZ would like to implement telehealth as part of a new strategy to reach a wider demographic of patients.

Instructions

You will conduct a case study analysis of the aforementioned case. Your case analysis will address XYZ’s health clinic challenges reflected in the scenario.

  • Utilizing a mind map or Root Cause Analysis, provide an assessment of the issues facing XYZ health clinic.
  • Assess the strategy by XYZ to implement a telehealth program in order to address current issues facing XYZ.
  • Develop a proposed solution to the issues facing XYZ.
  • Include a discussion on the staffing models necessary, technology requirements, and legal requirements of implementing telehealth.

rubric:

Mind Map/Root Cause Analysis provided a thorough and detailed assessment of issues facing the clinic with proper organization based on the selected method.

Assessed the strategy by XYZ to implement a telehealth program with strong, well-implemented supporting evidence.

Thoroughly developed a proposed solution to the issues facing XYZ that included a discussion on the staffing models necessary, technology requirements, and legal requirements of implementing telehealth.

Case study was cohesively organized, formatted, and professional in tone.

The Art of Stories:

DBQ 5.2 Forum: The Art of Stories:

11 unread reply.11 reply.

DBQ 5.2:  The Art of Stories:

Consider how self-understanding assists (or doesn’t assist) in self-transformation. For instance, how does authoring and/or voicing your own stories about who you are impact your presence and your experience in your community?

Also, consider the role of community not only in such self-understanding but in community-understanding? For instance, for people going into “helping professions” such as teaching, social work, or counseling, listening openly and compassionately to other people’s stories is important work. Paying thoughtful attention not only to how people narrate their lives but also to what individual experiences they have had will enable you to challenge your assumptions about people different from yourself. When considering that even professions not deemed “helping professions” involve working with others, is such ability also helpful to people working in most other professions?

Choose two or more of the pieces from this week’s reading in the text and discuss how you might use the insights the authors convey to you. What can you learn from listening to how someone tells her or his story? How might this help you in your later work helping others? Can this help even in professions not generally thought of as so-called “helping professions,” such as financial planning, accounting, advertising, media? What assumptions did you discover you needed to challenge when you read each author? How was each author challenging?

Finally, how might this benefit both individuals and communities?

The stories being referred to are from page 428 to page 467 from Deirdre Mullane’s anthology book entitled “Crossing The Danger Water: Three Hundred Years of African American Writing

subneetting

 

As robust as the IP protocol is, it does not perform the actual transmission of the data. In this step, you will investigate the network protocol called Transmission Control Protocol (TCP), responsible for creation, reliability of delivery, and proper assembling of data packets. 

In addition to IP, TCP is also widely used on the internet, especially for any network communication where it is essential to confirm receipt of the transmission. Many of the network protocols used to implement cloud computing use both TCP and IP. You will review TCP’s workings and discuss them in your final technical report. 

In general, there is no guarantee that a data packet will reach its destination. Packets can get lost or corrupted during transmission, and there are network applications where you need assurance that the packets have reached their destination. To achieve reliability, TCP establishes connections between communicating hosts, using port numbers to refer to applications on these hosts. Then, packets are created, sequenced, transmitted, acknowledged, and retransmitted if missing or containing errors. Finally, at the destination, they are reassembled into the original messages. 

To synchronize the flow of packets between sender and receiver, and avoid packet congestion in case of varying speeds, TCP uses sliding windows for packets remaining in processing at a given time, at both the sender and receiver ends. 

In the next step, you will look into subnetting BallotOnline’s IP addresses.

 

One of the drawbacks of IPv4 is the maximum number of network devices it can support. IPv4 addressing uses a 32-bit network address. This allows for 232,, or a little over 4 billion devices. However, today there are significantly more devices on the internet. Even though the more robust IPv6 version has been introduced and efforts are under way to assure wide adoption, IPv4 is still widely used.

One method used to more efficiently use the IPv4 network addresses is a technique to optimize the addresses by splitting them into network addresses and host addresses within designated networks. You will need to take advantage of IP address splitting so that you can efficiently use and allocate the IPv4 network addresses that have been assigned to BallotOnline.

For a given large network, rather than addressing all the hosts using the host part of the address, subnetting allows for splitting the network into several smaller ones by borrowing the host part bits and adding them to the network bits. It supports efficient management of local networks composed of multiple LANs. In this step, you will investigate subnetting conventions and discuss them in your final report in order to lay ground for the use of subnets by BallotOnline.

As the network engineer for BallotOnline, you know that subnetting a network into several smaller and variable-sized networks will be best for the organization’s needs. BallotOnline has been assigned a network address block by the Internet Assigned Numbers Authority (IANA).

Because BallotOnline has several offices around the world, you will need to subnet this network address to assign just the right number of addresses to each office location based on the number of systems at that office location (the network address assigned by IANA and the number of offices along with their sizes will be provided in the announcement section of this class at the beginning of Week 2).

Your task is to create the appropriate number of subnets with the right size to optimize the network.

Your technical report should include Classless Interdomain Routing (CIDR) notation, which allows for specifying a variable-length network as part of the IPv4 address, leaving the rest for addressing hosts within the network.

Submit the network information in the submission box below.

 

Classless Interdomain Routing (CIDR)

Classless Interdomain Routing (CIDR) is a method to use IP addressing without being restricted to the original grouping of IPv4 (Class A, B, and C).  Using CIDR, you can create a network (or subnetwork) and size it appropriately based on the needs. 

For example, without CIDR, if you have a network with 500 hosts or systems, you cannot use a Class C network because Class C is limited to 254 hosts, so you are forced to use a Class B network, which leads to a waste of IP addresses.

Also, prior to CIDR, when specifying a network address, you will need to also provide the subnet mask. For example: 

  • Network address: 192.168.1.0
  • Subnet mask: 255.255.255.0

You need both to inform the size of the network.

With CIDR notation, instead of specifying the subnet mask, you note the number of bits used for the network hosts. For example, the same network as above would be written as:

  • Network address: 192.168.1.0/24

For more information, review the following article:

https://opensource.com/article/16/12/cidr-network-notation-configuration-linux

White Paper – Secretary of Homeland Security

For this assignment, assume you are the new Secretary of Homeland Security. You are drafting a Policy Document referred to as a “White Paper” for the Biden Administration to highlight the impact of open/closed borders in the age of COVID-19 on migration, asylum seekers, and economic recovery. In this white paper, consider the following to frame your paper. 

  • Define what YOU believe an “OPEN” vs “CLOSED” border means especially when dealing with those seeking asylum. Reminder that you can provide your opinion without using “I think” or something similar.
  • How do you believe illegal migrants can be treated humanely and with dignity/inclusion?
  • How does an “open” vs a “closed” border impact the United States economy?
  • What are your recommendations for the next 12-24 months on specific steps that the new administration needs to take? 

DO NOT answer this as if it is a four Question Exam. This is a WHITE PAPER and is a single narrative framed by these questions, but do NOT use first person (I statements). 

The typical format for a White Paper is: 

  • Define the issue
  • Analyze it
  • Summarize your findings and recommendations 

Technical Requirements

  • Paper must be at a minimum of 5-7 pages (the Title and Reference pages do not count towards the minimum limit).
  • Scholarly and credible references should be used. At least 5 sources are required for this assignment.
  • Type in Times New Roman, 12 point and double space.
  • APA Style as the sole citation and reference style used in written work submitted as part of coursework. 
  • Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.

Turnitin report required. 

Cyber Defense Responses

Provide (2) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

I can think of a few different web based firms that offer online security checks. I personally do trust these types of services. Of course I would only ever use well known software like Norton or MacAfee. I’ve never heard about anything going wrong with utilizing services like these and I have definitely seen things go wrong while operating on a PC or laptop without protection. 

Norton Security offers different security options that range from Plus ($19.99), Standard ($25.99), Deluxe ($29.99), and Select ($99.48). These different options which vary by price also vary by what the plan covers. Mainly, the less expensive options have less levels of protection versus the more expensive plans which get additional benefits or areas of security. Looking at the most expensive plan, the Select Plan, the coverage options seem pretty extensive, it’s a plan I would go with if I chose to use this service. There is security for 5 different devices, PC Cloud Backup, Virus Protection, Parental Controls, Private Browsing with VPN, Stolen Funds Reimbursement, etc. This plan and coverage is pretty in depth. I would say that this type of software is one that I would trust and I would recommend to people, especially with windows computers. There have been many issues over the years with flaws in windows security allowing for data breaches via way of hackers gaining access to networks and devices. I wouldn’t want to risk something like that and I feel that most people have a lot of information stored on their devices these days, probably more information than ever before as the world continues to transform to an all electric operating system. These days most people have thousands of pictures on their devices, important scanned documents, school and medical related documents and paperwork, etc. This puts us all in a very vulnerable position because if anyone were to gain access to these devices they can steal the information, they can lock it, and they can destroy it all together. 

¹ Norton. Cyber Safety. 2021. 

Felicia 

RESPONSE 2:

There have been times in the past were I had to restore to using one of these free services to scan my system. Free tools such as Avast antivirus have been a great help in detecting some of the standard malicious software; however, this protection is limited in its capacity. If you want those additional features, it will cost you. There are many free security options out on the web, but there are even more that have been found to be malicious. Some of these rogue security applications will take names similar to those of respected developers or official-sounding names such as BitDefender 2011 or Windows XP Recovery, which will be used to trick unsuspecting users into installing them on their systems (Prakash & Parameswari, 2016). Typically deployed after a user visits a questionable website which will alert the user to possible infection and offer a link to download the free security software. Once on the system, the user will be bombarded with phony alerts stating that their system has been compromised further and would require a higher level of protection at a cost to the user. Already at this point, the user has opened themselves up to the installation of all forms of nasty malware, including rootkits, trojans, and ransomware. 

I have since moved on to other antivirus options such as McAfee since the service was free through the military. However, McAfee offers a subscription-based service, with multiple tiers, with prices ranging from $19.99 to $39.99. The standard features provided with this security solution range from its standard antivirus protection, VPN licenses, encrypted storage, and password management. Some of these services are unnecessary, such as the 128-bit encryption for storage, which encrypts data on a hard drive to protect against unauthorized viewing. The encrypted storage feature can be found on any modern system. Another feature offered is the password manager, which stores all your passwords in a single repository. It also suggests sufficiently solid passwords and automatically holds them for you. Although this makes password management a breeze, a compromise in this area could reveal all your passwords to an adversary. Luckily all this information is protected with encryption, and if the anti-malware protection is being used, it should block any malware that would capture this data. 

-Joshua

Prakash, G., & Parameswari, M. (2016). On reviewing the implications of rogue antivirus. Journal of Information Ethics, 25(2), 128-139. Retrieved from https://www-proquest-com.ezproxy2.apus.edu/scholarly-journals/on-reviewing-implications-rogue-antivirus/docview/2064887596/se-2?accountid=8289

McAfee. (n.d.). McAfee Total Protection 2021: Beyond Antivirus. McAfee. 

Slave Religion 2 pages/ Asap

1. Discuss the role religion played in the lives of enslaved African American during the antebellum period. Include the origins of the religious ceremonies practiced and the focus of their teachings.

http://www.inquiriesjournal.com/articles/372/slavery-and-religion-in-the-antebellum-south

A. Slave Religion

1. By the early 1800s, many enslaved communities had embraced evangelical Christianity; they favored the emotional styles of worship permitted in Methodist and Baptist revival churches. However, most of their religious training occurred in the slave quarters. Blacks in rural areas often did not have access to churches, and slave owners did not always allow their slaves to attend church.

2. Slaves who worshipped alongside whites or received religious instruction from them did not trust Christianity; white ministers who stressed the obedience and humility expressed in scriptural passages such as “Servants be obedient to their masters” fueled black suspicion.

3. Blacks developed their own brand of Christian ideology and practice, which historians have termed the “invisible church.” Enslaved blacks gathered in secrecy and stressed biblical values like justice, freedom, love, and equality. They favored the Old Testament stories about Moses liberating the children of Israel from slavery in Egypt.

4. Slaves also gathered in their homes or in “hush harbors” in the woods to attend religious ceremonies that incorporated African religious practices officiated by slave elders; juju and voodoo rituals were an important part of some slave communities. The “ring shout” tradition, in which congregants moved counterclockwise in a circle while shuffling their feet, singing, and clapping, is evidence that West African traditions survived in America.

READ BEFORE BIDDING

1. Please define the obfuscation process in detail.

2. Using http://www.dependencywalker.com please explain the components involved within the .dll GetCurrentProcess.dll along with how the process works. Please provide a snapshot of your findings.

3. Answer the questions relating to Lab1-2:

Q: 1. Upload the Lab01-02.exe file to http://www.VirusTotal.com/ . Does it match any existing antivirus

definitions? 

Q: 2. Are there any indications that this file is packed or obfuscated? If so, what are these

indicators? If the file is packed, unpack it if possible. 

Q: 3. Do any imports hint at this program’s functionality? If so, which imports are they

and what do they tell you? 

Q: 4. What host-or network-based indicators could be used to identify this malware on infected

machines? 

________________________________________

In this assignment, you will need to setup a virtualized environment. See the following:

https://www.osboxes.org

http://www.heaventools.com/download.html

https://www.fireeye.com/mandiant.html

https://www.wireshark.org/download.html

https://regshot.en.softonic.com

Please provide a complete writeup on how this malware could be installed on your machine. NOTE: You will need to disable any anti-virus protection as this contains live malware. It will not install onto your system. 

Analyze the malware found in the file Lab03-02.dll using basic dynamic

analysis tools. 

How can you get this malware to install itself?

How would you get this malware to run after installation? 

How can you find the process under which this malware is running?

Which filters could you set in order to use procmon to glean information? 

What are the malware’s host-based indicators? 

Are there any useful network-based signatures for this malware? 

How could you prevent this type of malware from installing on your machine?

PLEASE COPY AND PASTE QUESTIONS IN DOCUMENT AND ANSER THEM ACCORDINGLY.