Critically evaluate health care practice and identify areas of practice that would benefit from quality enhancement innovation.

Critically evaluate health care practice and identify areas of practice that would benefit from quality enhancement innovation.

Write a research paper of a new technology, an innovation of an existing technology, or a new development in an existing technological field.

Final Research Paper Assignment
The student will write a research paper of a new technology, an innovation of an existing technology, or a new development in an existing technological field. The student will select a topic related to Technology in Society ideas, topics, and discussions covered. Students must compare and contrast the effects of the topic within a global society. The paper will be written utilizing proper academic practices and correctly cited references using APA, this includes any or all photos within the research paper.
Research Paper Guidelines
It must follow accepted APA guidelines. If you are unsure of what is expected,Here are links to a sample APA Research Papers that you can use as a reference:

Papers should also meet the guidelines stated in the syllabus. These are:
• The paper must be typed using 12 pt font, with 1 inch margins, double spaced using Arial or Times New Roman.
• The header will be located on the first page; it will be left justified beginning on line one. The header will include the title of the paper and page number.
• Correct grammar, punctuation, and spelling, are a must.
• Whenever the content involves a list of any kind, bullets should be used, unless a rank order is needed and then numbered items will be used. (Use the bulleting and numbering tool available in your word processor).
• The body or text of this paper will be no less than two pages in length, excluding photos, the cover page, and the reference page.
• The paper will have no fewer than 3 correctly cited references.
• Technological topics for the research papers can readily be found in a variety of publications. Just a few examples include the textbook, magazines, newspapers, the Internet, and books.
• No abstract required.
• All assignments to be submitted through SafeAssign.

Write a brief reflection page describing the experience and highlight the advantages of using a virtualized environment for running multiple operating systems.

For this assignment, you must install a desktop virtualization package (Oracle Virtual Box with Linux) and two host operating systems to evaluate a virtualized computing environment.
Detailed steps for completing this assignment are located in the resources for this week.
You must also create a 2-3 page explanatory report containing the following:
• Screenshots documenting the successful installation of VDI and two hosted operating systems.
• Diagrams depicting the virtualization.
Length: 2-3 page report with narrative and screenshots.
The completed assignment should address all of the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards 7th Ed.

Instructions to Follow
You will need sufficient storage space on your computer to install the
software required for this assignment. You will also need administrator
privilege rights in order to install and configure the software. It is
recommended you NOT attempt installing this one any computer not
belonging to you personally.
1.
Download the Oracle Virtual Box from this URL:

2.
Download the DamnSmall Linux operating system software from this
URL:

3.
Download the TinyCore Linux operating system software from this URL:

4.
Install the Oracle Virtual Box software and create a base configuration.
Watch this video on how to install:

v=sB_5fqiysi4
5.
Next install the first guest operating system using this video as a guide

6.
Now install the second guest operating systems using this video as a
guide:

7.
Take a screen shot of your desktop with the two guest systems
installed and ready to start. Add this to your report.
8.
Start the Damnsmall Linux system and allow it to boot until the GUI
appears. Take a screen shot of the DamnSmall GUI once it’s loaded.
9.
Start the TinyCore Linux system and allow it to boot until the GUI
appears. Take a screen shot of the TinyCore GUI once it’s loaded.
10.
Overlap the two GUIs within the VirtualBox window and then take a
screen shot of all three running at same time on your desktop.
11.
Navigate around each Linux system demonstrating the apps that came
with the system. Try launch a browser in each window. Can you
connect to the Internet?
12.
Write a brief reflection page describing the experience and highlight the
advantages of using a virtualized environment for running multiple
operating systems.

Describe your different domains, and the role you play in each domain.

This is not a paper just a discussion. Please write this just by using your own words, not citation needed.

Describe your different domains, and the role you play in each domain. Next, describe the level of overlap across your domains and your personal preference for integration based on boundary conditions and similarity of domains.

Outline the steps needed to secure a computer system and/or give recommendations for cyber-defence

In order to pass Assessment 1, you will need to:
• Apply your knowledge of information security to a given real-world problem
• Evaluate the concept of the defence-in-depth approach to cyber-defence
• Outline the threat vector given an information security scenario
• Outline the steps needed to secure a computer system and/or give recommendations for cyber-defence
• Justify the choices and selections of information security tools and techniques included in your solution to a given scenario

This is a case study of a network and information security consultation conducted on behalf of PetMeds, an online pet medicine supplier. You are to provide a report detailing the current cyber threats faced by the company and to make recommendations for improvements to their network and computer systems to mitigate the likelihood of damage from those threats. Your report needs to highlight the principles of cyber and information security

 

How does Surveillance Capitalism impact the free will of individuals in the past 2 decades around the world?

Synthesis of Research
Your final essay will be a synthesis of your interdisciplinary research this term. The goal of this paper is to survey the literature that you have determined addresses your research topic and question and to show how knowledge and perspectives from these sources relate to each other.

Your tasks:

In an introductory paragraph of about 300-500 words, state your research topic and your research question. Establish the definitions of the terms you are using in your research question. (For example, if your question refers to “early childhood education,” explain that this means “ages 3-7” or “up to grade 2 in the U.S.”)
In the body of the essay (1200-1500 words) describe how information from the sources you have consulted contribute to an understanding of the topic you are investigating. Rather than presenting summaries of the sources one-by-one as you did in your annotated bibliography, strive to describe the body of literature in larger conceptual groups. Think about how individual sources are in conversation with other ones. There are many ways to organize the body of your essay. You could look at several “sides” in a debate; or how researchers use several different research methods to study this topic; or how different disciplines contribute differently to knowledge about this topic; or how different subtopics are emphasized in the body of literature you have consulted. Recall how you justified your choices of sources in the annotated bibliography as a blueprint and use the “Identifying a Conversation” resource below to help clarify some conceptual groupings.
The conceptual groupings should arise organically from the body of literature you’ve read so there aren’t hard and fast rules for the structure. (For example, you may be describing one debate where there are 3 distinct perspectives, or two debates where there are two perspectives each. You may be addressing how quantitative methods produce different knowledge than experimental methods. You may see how behavioral scientists tend to create certain kinds of findings while education scholars contribute another sort. Or that there are 3 or 4 or 5 subtopics in the body of literature.)
In a concluding paragraph of 300-500 words, describe one “gap” in the body of knowledge you have surveyed. What’s one thing that seems to be undiscovered or one thing that there’s little consensus on? Suggest how you think this “gap” may be filled in.
You must engage (i.e. cite and interact with) with at least 10 relevant and substantive sources, of which at least 5 are peer-reviewed articles on original research. The essay should contain in-text citations and a works cited list using APA or MLA citation style consistently.

Describe at least three wireless standards that influenced your network structure.

For this assignment, you will create a wireless network design strategy. The wireless network strategy is the overall umbrella encompassing wireless access controllers (WACs) and wireless access points (APs). The wireless service provider can play a role by connecting these, thereby providing connectivity to the entire network.

Start with the network diagram you created in the Unit 2 assignment. You may want to make some changes depending on the feedback you received from your instructor. Using this diagram, complete the following:

Add a wireless infrastructure to your network diagram.
Include your IP addresses. Calculate and add your IP ranges and subnets into your diagram.
Use Visio or a graphical drawing tool of your choice. Note: Microsoft Visio is provided for your use via MS Imagine. See the Microsoft Software section in the Unit 1 studies for more information.​
Export your diagram to an image and include in the Word document, or copy and paste the diagram into the Word document.
Explain hardware placement, hardware device choices, topology choice, and overall wireless infrastructure decisions.
Explain your IP addressing strategy.
Describe at least three wireless standards that influenced your network structure.

The assignment you submit should be approximately 3–4 pages in length, including the diagram you create. Be sure your document is professionally written, free of errors, and that your citations and references follow APA guidelines.
Additional Requirements

Length: 3–4 double-spaced pages, not including a title page and references page.
Font and font size: Times New Roman, 12-point font.
References: At least three recent, relevant, and professional resources.

How did your Country of choice react to the virus with policy options at their disposal (What monetary and fiscal policy decisions did they make?). Did it work?

Topic: G20 Economic summary (pre/post virus impact)

As this is an assignment for Macroeconomics (Econ 1005) this assignment is Macro in scope and by the time this assignment is due, you will have read about the primary economic policy tool kit used by Governments and Central Banks around the world.

*REMINDER: using wikipedia.org or worldmeters.com will result in severe penalty.

  1. How did your Country of choice react to the virus with policy options at their disposal (What monetary and fiscal policy decisions did they make?). Did it work?
  2. If you think it would help the reader understand the data referenced, make sure to include a graphs or charts of each metric you submit in the economic summary along with an explanation of what it is measuring written in your own words.
  3. Write this assignment as if the person reading it has never taken an Economics course before so make sure to explain what you are presenting.

A complete citation/reference list is expected to be done according to the most recent APA standards for any material you use. Your summary should be at least one page but no more than three using double spacing in 11 or 12 pt font.

If you are struggling for the right place to start, try asking the School librarian for suggested readings.

WARNING, any work screened for plagiarism will be caught and will be formally written up which may affect not only your grade, but your official transcript. Ignorance of what constitutes an academic offense is NOT an excuse – if it’s not in your OWN words, then you are likely committing an offense. Ask your professor if you are unsure. If your Turnitin score looks high to you, it probably is.

Submissions: Submit either .doc/.docx or .pdf into the FOL drop-box by 11:00 pm on the due date listed on the course schedule. Late assignments, even if a few minutes, will not be accepted.

Provide “historical data about the origin of internet off switch and detail current technology impacts of the internet off switch.”

Acting as consultant to a company or country that has an internet off switch issue. Provide “historical data about the origin of internet off switch and detail current technology impacts of the internet off switch.” This discussion is important so that the company gains knowledge of the scope/impact of internet off switch issues. Explain ethics of this issues.

Follow this example template as beginning:

“ABC Company is currently investigating suspicions of hacking into their Customer IT systems.  ABC contacted our consulting firm, HACK BACK, LLC., to help them address these suspicions and develop proactive steps to prevent any future development of these issues.

Following is our recommendation to ABC Company.  We begin with historical data about the origin of hacking and detail current technology impacts of hacking.  This discussion is important so that ABC Company gains knowledge of the scope of hacking issues.  Our goal is to ensure that ABC Company can make modifications to safeguard their critical IT systems and, thus, guarantee customer confidence

Use 5 sources from common internet websites.

Compare the rhetoric surrounding the newest social media platform or a widely discussed update to an app vs. how users actually feel about the new platform or app update

ENC 4415 Final ProjectDue Wednesday Dec. 9thby NoonOut of a possible 25 pointsThroughout the semester, we discussed how to analyze and critique the changing mediums of our communicationand the rhetoric surrounding digital technologies. The final project is an opportunity to apply what you learned by creating an analytic project, meaning your final project needs to be driven by ideas and explicationrather than descriptions and summaries.You will produce your own digital text that creates and defends an original argumentrelating todigital rhetoric, and you will support your claim(s)with evidence from a variety of scholarly and internet sources.The final projectwill have two parts: 1) the digital textyou createand 2) a short paper explaining your text.The first step is to think of an issue or topic that you are interested in; feel free to use our class discussions asinspiration. Then, consider which aspects of rhetoric to apply to your topic to structure your argument and analysis. Because digital rhetoric is a broad area of study, you will need to clearly define and narrow the scope of your project. You will also need to research your topic to provide support and context for your argument. What have other scholars said about the topic? Who is the audience for your topic? Your Project Proposal and Annotated Bibliography will help you with the research for your final project.Hereare some exampleproject topics, butfeel free to come up with your own topics

•Comparing the rhetoric surrounding the newest social media platform or a widely discussed update to an app vs. how users actually feel about the new platform or app update

•Rhetorically analyzing how internet content, such as a meme,social media account,video, or website, can perpetuate or challenge representations of race, gender, and/or other aspects of identity

•Examining the rhetorical appeals of the visual and textual elements of a website or social media platform

•Creating a hypertextual or digital narrative and analyzing how this method relates to other storytelling mediums