What is the title of the photograph? Why did you choose it? How was it photographed? Describe any techniques that were used?

Other

Make a power point, with 15 images based on photographs on websites provided.

One important aspect of learning about photography, is to explore what other photographers are doing and what kinds of photographs they are making, why they are making them and how they make photographs yhat are compelling cohesive statements.

This assignment requires you to virtually visit individual photographers that participated in a recent exhibition entitled: ” Reimagined Landscapes”, and to critique, review and comment about the images (using your own words), that were compelling to you. I have listed these photographers below with links to their websites and indicted which work that I wanted you to comment on. Please review ALL of the photographers listed:

Your assignment is:

1. Make a virtual visit to the photographers listed with the links that I provided.

2. View the virtual examples of the photographers’ work indicated with the titles listed on their specific websites.

3. Choose 15 images total from the virtual websites, that are compelling to you. (Please view ALL of the artists listed websites.) You must review ALL of them, even if you may not respond to their ideas.

4. Also, Pick ONE favorite photograph and share why it is your favorite.

5. Make a PowerPoint with those 15 images, (including the favorite), with the examples. Comment about each image and what your review/response is about each individual photograph. Please put your comments into the PowerPoint, next to or underneath each example. Use your own words. This is YOUR response to the photographs.

Some helpful guidelines when reviewing;(in your PowerPoint):

  • What is the title of the photograph?
  • Why did you choose it?
  • How was it photographed?
  • Describe any techniques that were used? (You know plenty of techniques now- show it in your review)
  • What is the content of each photograph?
  • How are the photographs cohesive? (How do they work together or alone?)
  • What was your experience viewing and responding/reviewing each of the photographer’s work?

Complete the RESPONSE PowerPoint, include the specifics mentioned above with images of the examples chosen to illustrate your points.

What are the issues? What are the techniques/approaches used until now to attack the problems identified in part (1)?

Machine Learning Question

  • (1) What are the issues?
  • (2) What are the techniques/approaches used until now to attack the problems identified in part (1)?
  • (3) Your critics of the current approaches (or shortcomings of the current solutions).
  • (4) Summary and conclusions.

You need to include possible future work in this area.Your report/paper must be at least 3000 words excluding references, tables, figures.Please submit a pdf file for the paper/report

  • https://www.studypool.com/questions/download?id=2779987&path=uploads/questions/5680633/20230321194723s40537_019_0274_4.pdf&fileDownloadName=attachment_1

Discuss the concepts related to data and data classification as they relate to the security concept of “Need to Know.” How can this access control guideline impact the sharing of information within an organization’s disparate business units?

Data and data classification

Discuss the concepts related to data and data classification as they relate to the security concept of “Need to Know.” How can this access control guideline impact the sharing of information within an organization’s disparate business units?

Requirements:

  • include at least one source from professional or academic literature.
  • formatted to APA 7th edition.
  • Avoid plagiarism.
  • Word format only

Use this excel template Download template to create a cash flow statement from the list of transactions below.

Cash Flow

Use this excel template Download template to create a cash flow statement from the list of transactions below. Your beginning of year cash (before any transactions are done) is $0, and your end of year cash is $940.

Q1

  1. Investor puts $1,500 cash into business for 50% equity
  2. Buy $200 of inventory
  3. Pay utilities of $250
  4. Buy equipment for $150. Will pay in Q2.

Q2

  1. Sell $100 in coffee mugs (COGS is 20% of revenue). Customer (Tim) will pay in Q3.
  2. Obtain bank loan for $750
  3. Pay bill for equipment of $150
  4. Buy $75 in advertising from Facebook

Q3

  1. Sell $150 worth of coffee (COGS is 40% of revenue). Customer pays in cash
  2. Pay utilities $250
  3. Receive $100 payment from Tim
  4. Buy $50 in inventory

Q4

  1. Depreciate equipment expense $25
  2. Buy company scooter for $2,000. Paid $500 in cash and got a 2-year loan for $1,500
  3. Pay $75 off of scooter loan principle
  4. Pay $10 off of scooter loan interest

Define and discuss the benefits of activation exercises. Why are they important and when should they be performed?

Benefits of activation exercises

Define and discuss the benefits of activation exercises. Why are they important and when should they be performed?

Identify one of the rules of inference that you used in your arguments. Explain how the rule of inference was used to reach your conclusion.

Critical Thinking Final Touchstone

In this assignment, you will make two contrasting normative arguments about what one ought to do. Both arguments will be about the same topic, and so at least one of the arguments is likely to be something you don’t actually agree with. You will compose the arguments in standard form—that is, as a series of statements that end with your conclusion. Reminder: Do not write as an essay!

Part I. Select your topic and arguments.

  1. Choose a topic from the following list:

 

  • Should people eat meat?
  • Should marijuana be legal?
  • Should pet cats be kept indoors?
  • Should zoos exist?
  • Should customers leave a tip in a coffee shop?
  • Should seat belt wearing be mandatory?
  • Should children be required to take gym/PE classes?
  • Should public roads be used for private car parking?

 

 

  1. Write two logically contradictory normative conclusions for the topic. You do not need to agree with both (or either!) conclusions, but you should be able to logically support both of them.

The conclusions need not be phrased exactly the same as they are phrased in the topic list, but they do need to be logically contradictory to one another. For example, if you selected the topic “Should people eat meat?”, your conclusions might be:

 

  • People should not eat meat.
  • People should eat meat.

 

But it would also be acceptable to choose:

 

  • People should reduce their meat consumption.
  • People need not reduce their meat consumption.

 

Conclusion #1: Enter your first conclusion here.
Conclusion #2: Enter your second conclusion here.

Part II. Write your arguments in standard form.

  1. What are the premises of your argument? There should be at least one normative statement and at least one descriptive statement, but ideally there will be 5-7 premises.
  2. If any of your premises make factual statements that are not common knowledge and widely accepted, include a source supporting your reference. This can be an APA citation or just a link to a reputable website or publication. Here is a helpful resource for APA references.
  3. Place an asterisk (*) by the normative premise(s) that support the conclusion.
  4. There may be a subargument within your argument, a conclusion reached by premises that then becomes a conclusion that supports your premise. If there is a subargument, underline the subconclusion.
  5. The conclusion should be the final statement in your argument and begin with the word “therefore.” These should correspond to the conclusions from Part 1.

 

 

Argument #1

 

Insert your first argument here.

Argument #2

 

Insert your second argument here.

 

 

 

Part III. Check your work.

 

  • Is each argument in standard form, not paragraph form?
  • Do your two arguments have substantially different conclusions?
  • Is each argument at least seven declarative sentences, ending in a conclusion?
  • Does each argument have a normative conclusion (saying what people ought to do)?
  • Is there at least one normative premise that supports each conclusion?
  • Did you place an asterisk (*) on the normative premise(s) that support your conclusion?
  • Did you underline any subconclusions in your argument?
  • Are there sources for any assertions that are fact-based and not well known/accepted?

 

Part IV. Reflection

 

  1. Are your arguments deductive or inductive? Explain why. (2 sentences)
Enter answer here.
  1. Identify one of the rules of inference that you used in your arguments. Explain how the rule of inference was used to reach your conclusion. (2-3 sentences)
Enter answer here.
  1. What moral framework do you use to justify your normative conclusions (utilitarian, deontological, or virtue ethics)? Explain how adopting that perspective leads to your conclusion. The two arguments do not need to follow the same moral theory. (4-6 sentences)
Enter answer here.
  1. What assumptions are you making that may compromise your arguments? These may be cognitive or unconscious biases. (4-6 sentences)
Enter answer here.
  1. What challenges to critical thinking did you encounter when arguing for a conclusion you didn’t agree with? How did logic and critical thinking help you to think about your topic from two different angles? (4-6 sentences)
Enter answer here.

Explain what ARDS is. Explain what is significant with her lab results using the ABG normal values and the nursing mnemonic ROME which was also referenced in week #2 of this course. Explain what an appropriate treatment would be.

Pathophysiology

Part 1: Discussion

Answer the following questions about the respiratory system, using the included case study, for this week’s discussion.

  1. Explain what ARDS is.
  2. Explain what is significant with her lab results using the ABG normal values and the nursing mnemonic ROME which was also referenced in week #2 of this course.
  3. Explain what an appropriate treatment would be.
  4. At least 200 – 250 words

Case Study:

Mrs. Breathless is a 43-year-old female, just getting off the late shift. She reports to the ER in the early morning with shortness of breath. She has cyanosis of the lips. She has had a productive cough for 2 weeks. Her temperature is 102.2, blood pressure 110/76, heart rate 108, respiration 32, rapid and shallow. Breath sounds are diminished in both bases, with coarse rhonchi in the upper lobes. Chest X-ray indicates bilateral pneumonia.

  • ABG (Arterial Blood Gases) Lab results are:
    • pH= 7.44
    • PaCO2= 28
    • HCO3= low
    • PaO2= 54

Note: rhonchi are continuous low pitched rattling lung sounds that often resemble snoring or wheezes.

Problems:

  • PaCO2 is low.
  • pH is on the high side of normal, therefore compensated respiratory alkalosis.
  • Also, PaO2 is low, probably due to mucous displacing air in the alveoli affected by the pneumonia.

Part 2:

This week, you will have the opportunity to unleash your creativity in order to help you and your classmates study.

Assignment Instructions:

For this assignment you will be able to create an infographic or video presentation.

1. Select one of the topics below.

    • Structures of the Pulmonary System, (Chapter 28, p. 655)
    • Functions of the Pulmonary System, (Chapter 28, p. 660)
    • Signs and Symptoms of Pulmonary Disease, (Chapter 29, p. 670)
    • Pulmonary Disorders, (Chapter 29, p. 676)
    • Table 29-1, Mechanism of Pleural Effusion, (Chapter 29, p. 676)
    • Table 29-2, Clinical Manifestations of Chronic Obstructive Lung Disease, (Chapter 29, p. 686)
    • Disorders of the Upper Airway, (Chapter 30, p. 697)
    • Obstructive Sleep Apnea, (Chapter 30, p. 700)

2. Explore the topic and gather the information needed to teach your fellow learners.

3.Create these items using infographics (Canva.com) or video (Powtoon.com). If you would like to use a different media source, please email your Instructor first for permission.

What is the optimal capital structure (or Debt/Asset ratio) in the above table? What is the firm value under the optimal capital structure? What is the stock price under the optimal capital structure?

Capital Structure

Assume that you have just been hired as business manager of Campus Deli(CD), located adjacent to the campus. Its Free Cash Flow(FCF) is $400,000. Because the university’s enrollment is capped, FCF is expected to be constant over time. Because no expansion capital is required, CD pays out all earnings as dividends. CD currently has no debt—it is an all-equity firm—and its 100,000 shares outstanding selling at $40 per share. The firm’s federal-plus-state tax rate is 35%.

On the basis of statements made in your finance text, you believe that CD’s shareholders would be better off if some debt financing were used. When you suggested this to your new boss, she encouraged you to pursue the idea but supported the suggestion.

In today’s market, the risk-free rate is 5% and the market risk premium is 5%. CD’s unlevered beta is 1.0. CD currently has no debt, so its cost of equity (and WACC) is 10%. If the firm was recapitalized, debt would be issued and the borrowed funds would be used to repurchase stock. After speaking with a local investment banker, you obtain the following estimates of the cost of debt at different debt levels (in thousands of dollars):

Amount Borrowed Debt/Asset Ratio Bond Rating Yield
$0 0
500 0.125 AA 8.0%
1000 0.250 A 9.0%
1500 0.375 BBB 11.0%
2000 0.500 BB 13.0%

Now answer the following questions:

  1. ) What is the optimal capital structure (or Debt/Asset ratio) in the above table?
  2. ) What is the firm value under the optimal capital structure?
  3. ) What is the stock price under the optimal capital structure?

Craft and support an argument identifying 2 “best practices” that should apply universally to large technology companies in protecting individual privacy rights.

Module-2 Video Case Study (ISCS-570)

Instructions:

Read the information and watch the 2 videos below. As you watch the videos, consider the balance of a corporation’s right to use information they collect (especially in exchange for free services) and an individual’s right to privacy. Using what you’ve learned, do the following:

A. Craft and support an argument identifying 2 “best practices” that should apply universally to large technology companies in protecting individual privacy rights.

B. Additionally, identify the most egrigious technique by either Facebook or Google (from the case study only) and explain why it constitutes a serious individual privacy breach.

Be sure to fully support your positions (in both parts A & B) with at least 2 external sources (total) – these sources can be used to support either your “best practices” argument or your “most egrigious” argument, but the textbook is not considered an external source.

Submission Instructions:
Submit your answers/arguments in a single MS Word document. Be sure to properly cite all sources and provide a bibliography.

Videos:

1.)https://youtu.be/IWlyut4zsko

2.https://youtu.be/V7M_FOhXXKM

Case:

In a 2010 interview, Mark Zuckerberg, the founder of Facebook, proclaimed that the “age of privacy” had to come to an end. According to Zuckerberg, social norms had changed and people were no longer worried about sharing their personal information with friends, friends of friends, or even the entire Web. This view is in accordance with Facebook’s broader goal, which is, according to Zuckerberg, to make the world a more open and connected place. Supporters of Zuckerberg’s viewpoint, including fellow tech titan Google, believe the 21st century is an age of “information exhibitionism,” a new era of openness and transparency. However, times have changed, and there are growing calls to put new limits on the personal information that Facebook, and Google, collect and provide to advertisers.

Facebook has a long history of invading the personal privacy of its users. In fact, the very foundation of Facebook’s business model is to sell the personal private information of its users to advertisers. In essence, Facebook is like any broadcast or cable television service that uses entertainment to attract large audiences, and then once those audiences are in place, to sell air time to advertisers in 30 to 60 second blocks. Of course, television broadcasters do not have much if any personal information on their users, and in that sense are much less of a privacy threat. Facebook, with over 2.9 billion users worldwide, clearly attracts a huge audience.

Although Facebook started out at Harvard and other campuses with a simple privacy policy of not giving anyone except friends access to your profile, this quickly changed as its founder Mark Zuckerberg realized the revenue-generating potential of a social networking site open to the public.

In 2007 Facebook introduced the Beacon program, which was designed to broadcast users’ activities on participating websites to their friends. Class-action suits followed. Facebook initially tried to mollify members by making the program “opt in” but this policy change was discovered to be a sham, as personal information continued to flow from Facebook to various websites. Facebook finally terminated the Beacon program in 2009, and paid $9.5 million to settle the class-action suits.

In 2009, undeterred by the Beacon fiasco, Facebook unilaterally decided that it would publish users’ basic personal information on the public Internet, andannounced that whatever content users had contributed belonged to Facebook, and that its ownership of that information never terminated. However, as with the Beacon program, Facebook’s efforts to take permanent control of user information resulted in users joining online resistance groups and it was ultimately forced to withdraw this policy as well. The widespread user unrest prompted Facebook to propose a new Facebook Principles and Statement of Rights and Responsibilities, which was approved by 75 percent of its members, who voted in an online survey. However, the resulting privacy policy was so complicated that many users preferred the default “share” setting to working through over 170 privacy options.

In 2009, Facebook also introduced the Like button, and in 2010 extended it to thirdparty websites to alert Facebook users to their friends’ browsing and purchases. In 2011, it began publicizing users’ “likes” of various advertisers’ products in Sponsored Stories (i.e., advertisements) that included the users’ names and profile pictures without their explicit consent, without paying them, and without giving them a way to opt out. This resulted in yet another class-action lawsuit, which Facebook settled for $20 million in June 2012. As part of the settlement, Facebook agreed to make it clear to users that information like their names and profile pictures might be used in Sponsored Stories, and also give users and parents of minor children greater control over how that personal information is used.

In 2011, Facebook enrolled all Facebook subscribers into its facial recognition program without asking anyone. When a user uploaded photos, the software recognized the faces, tagged them, and created a record of that person/photo. Later, users could retrieve all photos containing an image of a specific friend. Any existing friend could be tagged, and the software suggested the names of friends to tag when you upload the photos. This too raised the privacy alarm, forcing Facebook to make it easier for users to opt out. In 2021, Facebook finally terminated the program after years of privacy concerns about it.

In 2012, Facebook went public, creating more pressure on it to increase revenues and profits to justify its stock market value. Shortly thereafter, Facebook announced that it was launching a mobile advertising product that would push ads to the mobile News Feeds of users based on the apps they used through the Facebook Connect feature, without explicit permission from the user to do so. It also announced Facebook Exchange (also known as FBX), an advertising platform that allows advertisers to serve ads to Facebook users based on their browsing activity while not on Facebook.

In 2018 and 2019 Facebook’s reputation for invading the personal privacy of its users took a turn for the worse when it was revealed that it had lost control of personal information on 87 million users to agents of the Russian government who had been able to use fake accounts and apps to target political ads designed to sway the 2016 presidential election. The Russian agents used 75,000 fake accounts, and 230,00 bots to send political messages to an estimated 146 million U.S. Facebook users. Facebook also revealed it had shared personal data with 60 device makers of smartphones and TVs, and to large advertisers like Nissan Motors. In 2019 a Wall Street Journal investigation found that eleven out of the top fifty Facebook apps were sharing data they collect with Facebook. Most of these apps involved health, fitness, and real estate data. In response, the app developers stopped sharing sensitive personal data with Facebook, and Facebook itself contacted large developers and advertisers and reminded them Facebook’s policy prohibits sharing any sensitive information with Facebook’s servers.

It isn’t just Facebook that allows app developers to share personal information with online ad platforms like Google. Facebook announced that this was “industry standard practice.” But clearly, Facebook’s ability to effectively monitor and police exactly what information apps and advertisers share with Facebook’s SDK (software development kit) is limited, at best, and at worst, not possible given the scale of Facebook’s platform, which is the most widely used app platform on the Internet with tens of thousands of app developers and advertisers.

Not to be outdone, Google has also taken liberties with user personal information, with services like Google Street View taking pictures of neighborhoods, houses and driveways, without consent; advertisements served using the content of Gmail messages (though Google claims the content is anonymized), and pervasive tracking cookies following users across the Internet. Echoing Mark Zuckerberg, Google CEO Eric Schmidt has stated that “true transparency and no anonymity” is the best policy for Internet users.

Textbook link below (not to be used as a reference for this assignment per what instructor noted above)

https://drive.google.com/file/d/19cxt3pMvrETe6MHwj… (https://drive.google.com/file/d/19cxt3pMvrETe6MHwj…)

Describe research techniques (e.g., case studies, data collection methods and equipment) that you would use to carry out the project.

RESEARCH, PLANNING and COMMUNICATIONS

Research Practice

You are required to write a proposal of a small-scale research project. The project should be relevant to the subject that you are studying and should be completed by one researcher (yourself, full-time). Your proposed project should start on 1/5/2023 and finish on 31/10/2023 (6 months in total).

 

PART ONE [30 marks]

  • Write an abstract of your proposed project with a project title [6].
  • Write an introduction to the research area [4], problems to be addressed [4] and potential benefits to industry and/or society [4].
  • Describe the aims [2], objectives [4] and scope (focus) of your project [2].
  • Describe the novel points of your research (i.e., contribution to knowledge) [4].

 

PART TWO [40 marks]

  • Obtain copies of 10 references that are of direct relevance to your project. Review the references and write your comments. For each reference, you should write one paragraph about its main contribution to knowledge [20], and one paragraph about its shortcomings [10]. You should not take the Abstracts and Conclusions directly from the
  • Do NOT include the actual copies of the references in your report, use the Harvard referencing system to list the references at the end of your report, and cite the references in the main text [5].
  • Based on your comments on the 10 references, write an overall summary of research [5]
  • You should follow the above instructions. Do not follow the style of the ‘Background’ section of the example proposal used during

 

PART THREE [30 marks]

  • Describe research techniques (e.g., case studies, data collection methods and equipment) that you would use to carry out the project [5]
  • Make a work plan by defining the tasks [4] to be Schedule the tasks into phases [3] with milestones and deliverables [3] in a Gantt Chart [5].
  • Describe the tasks [4], deliverables [4] and potential risks of your project [2] in your

 

SUBMISSION:

Submit your report in MicroSoft Word or PDF format including the Gantt Chart (in one single file).

 

NOTE:

  • The font size of the main text should be 11, single line spacing. The margins of each page should be 2.54 cm on all sides. Your report including the list of 10 references should not exceed 10 pages (A4). The report should have a separate title page including the title of your proposal, your full name, student number and the Programme you are studying. The title page, table of contents (if you have one) and the Gantt Chart are not counted for the total 10-page
  • Your report should not overlap with your final thesis, or any other published reports/documents by over 20%. You should avoid including the contents of this report (especially the literature review section) in your final thesis, otherwise you will have high
  • You should make sure that similarity of your report can be checked, g., if you use WPS Office to save your report, it will appear as a PDF image in the system, and similarity cannot be checked. Reports without similarity checked will not be marked.