Creating a Mass Scale
 with Elastic Materials

You MUST have these materials to complete the project. The first link tells you the materials needed and how to create the scale (I believe in steps 1-7). The document that was uploaded is the actual assignment where you must complete the charts, etc.

1. https://mywaycool.nebraska.edu/courses/SCIH035058/…

Let me know if you have any questions. Thank you.

critique discusion below

I do believe the executive branch has the authority to declare national emergencies and to re-appropriate funds in response to Congressional inaction. I also believe the legislative and judiciary branches have the authority to challenge the President’s actions. Our reading this week illustrated that there is a constant battle to maintain the separation of powers between the three branches of government. The recent declaration of a national emergency regarding border security is a great illustration of how our three branches of government can exercise their authorities to maintain checks and balances on power.

According to the National Emergencies Act of 1976, the President can declare a national emergency and invoke the emergency powers, as defined by law, but Congress can also terminate a declaration of emergency with a joint resolution signed into law (94th United States Congress, 1976). It is also my understanding that a citizen or organization can challenge this declaration in a court of law. A legal challenge can then be appealed all the way up to the Supreme Court where the judicial branch can judge the constitutionality of this emergency declaration along with the legality of the funds being re-appropriated.

Security of Health Care Records

Discussion: Security of Health Care Records

With the increase of health information technology used to store and access patient information, the likelihood of security breaches has also risen. In fact, according to the Canadian Medical Association Journal (CMAJ):

In the United States, there was a whopping 97% increase in the number of health records breached from 2010 to 2011… The number of patient records accessed in each breach has also increased substantially, from 26,968 (in 2010) to 49,394 (in 2011). Since August 2009, when the US government regulated that any breach affecting more than 500 patients be publicly disclosed, a total of 385 breaches, involving more than 19 million records, have been reported to the Department of Health and Human Services.

A large portion of those breaches, 39%, occurred because of a lost, stolen, or otherwise compromised portable electronic device—a problem that will likely only get worse as iPads, smartphones, and other gadgets become more common in hospitals. (CMAJ, 2012, p. E215).

Consider your own experiences. Does your organization use portable electronic devices? What safeguards are in place to ensure the security of data and patient information? For this Discussion you consider ethical and security issues surrounding the protection of digital health information.

To prepare

  • Review the Learning Resources dealing with the security of digital health care information. Reflect on your own organization or one with which you are familiar, and think about how health information stored electronically is protected.
  • Consider the nurse’s responsibility to ensure the protection of patient information. What strategies can you use?
  • Reflect on ethical issues that are likely to arise with the increased access to newer, smaller, and more powerful technology tools.
  • Consider strategies that can be implemented to ensure that the use of HIT contributes to an overall culture of safety.

Write an analysis of the nurse’s responsibility to protect patient information and the extent that HIT has made it easier or more difficult to protect patient privacy. Comment on any security or ethical issues related to the use of portable devices to store information. Assess the strategies your organization uses to safeguard patient information and how these promote a culture of safety. Describe an area where improvement is needed and one strategy that could address the situation.

video assignment

The questions is upload PDF, Please answer these questions by utilizing the given resources ,and any other reputable sources of information. Submit only your answers (without the text of the questions) in a document (DOC or PDF format only) in the Turnitin submission link below. will grade on completeness, so be sure to answer every question for full credit. Remember, all work that you turn in must be in your own words – you will NOT earn credit for copying and pasting text from websites or from the work of other students.

-use your own word please and DO NOT COPY ANYTHING ON LINE! I will be turn in this home work in turn it in! Please Use easy grammar and use your own word to answer all these questions.

-if you need books to answer the questions I will sensed to you.(use book!!) down below!!!!!

-use easy grammar and easy to understand! Please also use complete sentences

__________________________________________________________________________________________________________________

This 52-minute video showcases the process of developing lab-grown meat and provides context for why this biotechnology is being pursued. (Please note: the video contains examples of animal cruelty at minutes 40:30-­42:40)

Health and Wellness Appraisals

You are a teacher in a 4-year-old classroom and begin each day with your daily health and wellness check. You notice that a child who is dropped off looks very tired and is uncommonly quiet as she walks into the classroom. She was dropped off by bus so you have no additional information.

Given the above scenario, choose one of the following possible causes for the change in the child. Please indicate the cause you selected in the subject line of your discussion post.

  1. Sickness/Illness
  2. Trauma
  3. Abuse
  4. Oral Health Issue: Tooth ache, poor oral health
  5. Nutritional Concern: Inadequate nutritional intake, food allergy, food intolerance
  6. Hearing Concern: Ear Infection, ear ache
  7. Vision Concern: Eye infection
  8. Social-Emotional Issue

Examples of some of these common situations are described further in Chapter 7. After you select one of these as a possible cause for the child’s change in demeanor, use your imagination to develop it further discussing what you may see when you conduct your observation of the child. Be mindful to detail what you might look for and how you will document your observations. Based on your fictitious observation, create a plan of action for how to proceed. This plan should include both immediate and long-term actions that you will take.

Address the following points in your discussion:

    • Fictitious elaboration of what you observe in the child including the possible cause. Include enough so that you can make a plan of action
    • Short-term plan of action detailing the procedure of how you will address the issue immediately or by the end of the day
    • Long-term plan of action detailing the procedure of how you will follow-up your short-term plan of action
    • Specific discussion regarding how you will support the child during this time

    Industrial Hygeinists: Asbestos Pollution & OSHA Policies discussion

    TOPIC: ASBESTOS

    Review the OSHA regulatory requirements for working with your chosen substance. Prepare a summary of each of the categories of compliance requirements within the OSHA standard (exposure limits, exposure monitoring, respiratory protection, etc.) in narrative form and explain the role the industrial hygienist plays for each of these requirements. Be sure to address at least six unique requirements.

    29 CFR 1910 Subpart Z, Toxic and Hazardous Substances

    Format your work using spacing, margins, font, and page numbering requirements as specified in the current APA Manual. Provide a reference for your source in APA format. Title page, table of contents, running head, and in-text citations are not required for this assignment only.

    1&2 in different docs please apa references and citations must

    1)In this week, you examined the security principle of discretion. The principle of discretion involves individuals and groups making good decisions to obscure sensitive information about national infrastructure. An essential component of discretion is utilizing the security concept of security through obscurity. However, the concept of security through obscurity is contradictory in the security community.

    Discuss what security through obscurity means with examples. Examine how it is relevant in the context of discretion. Discuss the advantages and disadvantages of security through obscurity, specifically within the context of national and critical infrastructure protection. Ensure to identify scenarios where security through obscurity would be beneficial and scenarios where it might not be beneficial.

    You must do the following:Create a new thread and share your perspectives with examples and references to course material

    2)According to Fennelly (2017), security managers are responsible for designating restricted areas. There are various reasons to restrict access to certain security areas. As noted by Fennelly (2017), restricted areas may be established for these reasons:

    • Enforcement of security measures
    • Exclusion of unauthorized personnel.
    • Intensified controls in areas requiring special protection.
    • Protection of classified information
    • Protection of critical equipment
    • Protection of critical material

    Select and discuss 1 of the reasons for restricting an users’ access to a designated area. Make sure to mention why you selected your option.


    ranguriskon

    creating the operation security policy for an organization.

    Case Assignment

    •Consider the organization where you work, or an organization where you would like to work if you are not currently employed.

    •Create a Policy that would benefit your organization

    •Suggest some controls for your policy

    •Suggest an audit mechanism

    Use the following Format for your policy:

    Overview

    You should put one or two sentences here that summarize the policy and its purpose for management. This is typically an explanation of why the policy exists. Don’t be too technical.

    Scope

    This is where you define who or what the policy applies to, from all employees to only cashiers that handle cash in the front office. If it applies to equipment, it could be all equipment, all servers, all network connected equipment, or just company issued cell phones. Be specific.

    Policy

    This is where the policy is actually defined. Don’t be too specific, leave that to the procedures and controls that support the policy.

    For example, a password policy might state that users cannot share passwords, passwords must be complex, help desk personnel never request passwords, and passwords must rotate periodically. The details of good password construction can be then put in a guideline document, instructions for the help desk on reseting passwords can be a procedure, and that Group Policy is used to force password changes every 60 days is a technical control. None of that should be in the policy, but it all needs to be properly documented and communicated to the people that need it – the guidelines to all staff, the help desk procedure to help desk staff, and the technical controls to the domain admins.

    If you are in doubt remember that good policy statements talk about what the policy is trying to accomplish and are addressed to a wide audience. Procedures and controls talk about how it is to be accomplished and are addressed to the staff that must carry it out.

    Compliance Measurement

    Typically, this section includes the job title of the person responsible for overseeing its implementation or the department if multiple people are responsible, a reference to audit mechanisms, and the consequences for failure to abide by policy.

    Definitions, Related Standards, and Policies

    This section usually contains definitions of technical or ambiguous terms, cross-references to applicable regulations, and other policies that relate to this policy. Examples include union contracts, discipline policies, and implementation guidelines. In our password policy example, this where readers would be told to consult the password construction guideline document.

    Exceptions

    If there any circumstances that might allow temporary exception to the policy, such as during an emergency, define them here. If there is anyone with the authority to temporarily waive the policy, they should be identified by job title. This section is often omitted since many policies do not allow any exceptions.

    Discussion 7 – Legal and Ethical Obligations to Provide Care

    Evaluate the ethical and legal ramifications involved in the termination or refusal of care and physician-assisted suicide. Discuss why informed consent may be controversial from the patient and family perspective. Provide examples and identify the ethical principles. Support your statements with logic and argument, citing any sources referenced.

    Composed of a minimum of two – three paragraphs – at least 500 words.

    Please use single spacing.

    Include references as they are required, minimum of 2 articles.

    community week 4

    Health Promotion and Wellness.

    Cultural Diversity.

    Environmental Health.

    Read chapter 4, 13 & 14 of the class textbook and review the attached PowerPoint presentations. Once done, answer the following questions;

    1. Discuss various theories of health promotion, including Pender’s Health Promotion Model, the Health Belief Model, the Transtheoretical Theory, and the Theory of Reasoned Action.
    2. Discuss at least two definitions of health.
    3. Critically analyze racial and cultural diversity in the United States.
    4. Describe the importance of air, water and food quality as a determinant of health.

    As stated in the class syllabus please present your assignment in an APA format, word document, Arial 12 font attached to the forum in the discussion tab of the blackboard title “week 4 discussion questions”. The assignment must include at least 2 evidence-based references (excluding the class textbook) no older than 5 years. References must be quoted in the assignment in order to comply with APA. Two replies to any of your peers sustained with the proper references are required. A minimum of 700 words is required.