Get help from the best in academic writing.

problem 7 [ /4] the Radius Of The S2- Ion Is 1.84 Gp Essay Help

Problem 7 [ /4]
The radius of the S2- ion is 1.84 × 10-10 m. Predict how the radius of P3- and Se2- will compare to this value. What factors are taken into consideration when making this prediction?

professional writing services near me


Research Paper

ASSIGNMENT DETAILS/ GRADING CRITERIA: 1. Evidenced-based Leadership Change project: Instructions for Leadership Change Paper: Observe your environment in the health care facility where you have clinical and monitor the site for signs and symptoms of the need for change. Look at the nursing processes in place: do they work efficiently, are infection control practices being done routinely. Anything can be a catalyst for change as long as it adds something positive to the establishment. Then, diagnose the problem that indicates a need for change. 1. Pick a change theory. Lewin’s change theory is used widely in nursing. Despite this fact, there are many other change theories you can use like Spradley’s theory of change, Lippitts change theory or Roger’s theory of change. Pick the ones that best suit the change you are trying to bring about. 2.Put a plan together. Using your selected change theory, develop a plan based on each step of the theory you have chosen. Your plan should address what you will do to solve the problem you have diagnosed. It should include activities that will combat the problem and bring about change, a method to measure the success of the plan such as a quiz and a way to make the change permanent. Be sure to include a timeline or timetable for your change project. It needs to have a beginning and an end. 3. Type a 4-5 page double-spaced, APA formatted professional paper that describes your project and submit to your instructor at the end of the semester. The paper has to include: o An introduction: Brief description of the issue & Purpose of the paper o Assessment of the environment which needs to be changed: Current practice, organizational structure, deriving and restraining forces, advantages of change, cost and resources for implementing the change. o Planning: Goals of change, phases of change, timeline, how you will mobilize the driving forces and minimize the restraining forces and plan of evaluation o Implementation: Needed training and education and methods o Evaluation. o Conclusion Topic: Infection Control

Cyber Security

Write a 300-word essay on the topic ( The essay should not be plagiarized)- ‘ Discuss the current methodologies used to secure wired or wireless networks via current Firewall technologies and the potential exposures that currently exist’ There should be at least two references.

Soical Work Theory And Practice

In this two-part assignment you are asked to summarize a theory, an area of practice that can be applied to the theory, a client population aligned with the area of practice and an intervention to be implemented. This will be done twice as you will choose a 2nd theory, area of practice, client population and intervention to be applied.

Nursing Leadership And Management

Legal and Ethical Issues of Advanced Practice Nursing -Week 2 Practice Experience Ethics Committee Roles and Responsibilities -The Telephone Interview Investigate the role and responsibilities of the ethics committee at a clinical institution. Conduct a phone interview one of the members of the ethics committee to determine the ethical decision-making process that the ethics committee goes through. 1. Develop 3 open-ended questions to ask during the interview. 2. Conduct the phone interview. 3. Use the questions and answers to write a paper that summarizes your interview. 4. Choose one question-answer dyad. What inference can you make regarding the importance of the ethics committee on patient rights based on this question-answer dyad? This assignment will be 3 page, APA formatted, paper and include a minimum of 2 references from peer-reviewed nursing articles that address health care ethics and were published within the last five years.


Part 1 After facilities personnel consulted with your IT management team building management now would like an example of how they may be able to implement embedded IoT systems and the related hardware in the corporate facilities environment. Their idea is to implement an IoT Smart asset tracking system. Therefore please discuss the following: Discuss the thing that is connected to the Internet allowing this smart asset tracking system to operate Identify and discuss the mobile technology (SW and Apps) and hardware associated with the scenario needed to implement this scenario Discuss how the WiFi network and Cloud will be the basis for the Network Technology How might the IT engineers integrate and test the IoT devices and technology in this scenario to ensure effective monitoring and tracking of key assets? Part 2 The challenging concept of ensuring security over the new IoT device and technology implementation at the corporation is now the next task which must be briefed and understood by management. Corporate sensitive information, personally identifiable information, financial records and more will be within the IoT sphere therefore a meeting is required to discuss the security infrastructure needed for effective IoT implementation. Management would like a 3-5 page concept paper put together bringing depth to the critical security concepts needed for the IoT asset tracking implementation and strong device identity protection. Identify the core IoT security requirements for the following: Describe the security infrastructure needed to establish trust when a device connects to the network. Identify the required security needed to ensure personal, sensitive and financial information is kept private and secure, and device identity is preserved. For the devices and the data being sent across the IoT infrastructure, security integrity is critical. Describe how security professionals will ensure the data integrity and encryption of information being transmitted.

Risk Management Assignment

For the Chessfield Case Study: Identify broad implications of this case as you compare this case others scenario, and if you feel that this issue could be resolved by additional regulation For the Bon Boulangerie Case Study: What are the operational risks of expanding the business so quickly? Identify as many as you can think of. For both questions, answer with as much detail as necessary for a substantial, doctoral-level response. Use APA style for any outside sources cited.

Answer The Below Question In APA Format 200 Words.

If you became the new manager at a restaurant with high employee turnover, what actions would you take to increase retention of employees? Your discussion is to be submitted in 12-point Times New Roman font using APA format(In text citations mandatory). You must have a minimum of two sources to support your answer. Significant posts are at least 200 words and require some information from the text, academically reviewed papers, some significant commentary that requires knowledge of the subject, a web link to an article or other source in order to be accepted. Text book attached. Please find the other source as required


Assignment Choice #1: Entity-Relationship Modeling Let us consider the information that your school tracks for a class. In this instance, a class is a scheduled course. For example, your school may offer FINA 2100- Introduction to International Financial Markets as a course. If the school offers it in the fall, then it becomes a class. Below, we have provided some basic business rules and many pieces of information that your school probably tracks about the class: A course may (or may not) require one or more prerequisite courses, and a course may (or may not) serve as a prerequisite of other courses. Each course belongs to a specific department and a department can have many courses. One or more sections of a course will be scheduled each semester at different times of the day and on different days of the week. One instructor will teach a scheduled course section in a specific classroom. The same classroom can be used for many different course sections at different times. A department has many instructors and an instructor may teach for multiple departments. Submit all three parts of this assignment in one document called CT03 assignment. The document can be found here. Part 1: Complete the table. Part 2: Write a detail document about the various business rules and define how the described scenario works with respect to entities and their relationships. Part 3: Create an E-R Diagram. INSTRUCTIONS: Part 1: Complete the table Fill out the table by following these instructions: 1) For each piece of information that the school wants to track, identify if it is an entity or an attribute (place an X in the appropriate column). 2) For each recognized attribute, identify if it is a primary key with an X in the Primary Key column. 3) Identify the entity to which the Primary Key belongs (write the name of the entity in the last column). The first three rows are filled in to provide an example of how the table should be completed. INFORMATION ENTITY ATTRIBUTE PRIMARY KEY ENTITY THAT ATTRIBUTES BELONG TO Department X Course Number X X Course Course X Course Name Course Description Number of Credit Hours Instructor Name Room Number Time of Day Day of Week Instructor ID Department ID Department Name Class Schedule Class Section Number Room Capacity Instructor Room Part 2: Write a detail document Using the provided information, write a detail document about the various scenarios described in Part 1 with respect to entities and their relationships. The E-R diagram will be created from your findings. Don’t worry about going through the normalization process at this point. Identify the appropriate relationships among the entities, and define the minimum and maximum cardinality of each relationship. Make some additional assumptions about the business rules, if necessary. Part 3: Create an E-R Diagram Draw the initial E-R diagram based on the given business rules and the scenarios you defined in your detail document. Include a screen shot or jpeg of the E-R diagram in the CT03 assignment document for submission. Your paper must be a minimum of two pages, double-spaced and comply with CSU-Global Guide to Writing and APA Requirements. You may want to review the assignment criteria found in the Rubric under “Course Information” in the left navigation pane. Assignment Choice #2: CRUD – Defining Information Ownership One easy way to determine information ownership is to think of CRUD-create, read, update, and delete. If you cannot only read but also create, update, and/or delete information, then in some way you own that information because you are responsible for its quality. Here again, let’s consider your school as an example and focus on your personal and transcript information. That information includes your student ID, name, address, phone number, GPA, declared major, declared minor (if you have one), and courses completed (your transcript). Part 1: Identify Create, Update, and Delete Privileges For each piece of information, first identify who has create, update, and delete privileges. Include any individuals or departments that have these sorts of information privileges. There may be several. If so, who is ultimately responsible for your personal and transcript information? Second, identify all the groups of people at your school who can only view (read) your information. Part 2: Develop a CRUD Matrix Develop a CRUD matrix that outlines the relationships among the pieces of information and user privileges (example: Part 3: Write a Detail Document Write a detail document about the various business rules that define how the scenario described in Part 1 works with respect to information ownership and their relationships. Identify the appropriate relationships among the information, and define the minimum and maximum privileges associated with each relationship. Your paper must be a minimum of two pages, double-spaced and comply with CSU-Global Guide to Writing and APA Requirements. You may want to review the assignment criteria found in the Rubric under “Course Information” in the left navigation pane.

error: Content is protected !!