Using average daily intake of carbohydrates, lipids, and proteins shown on the excel calculation sheet, write a report in a scientific format, discussing your results and comparing them with the RDAs for your age group.

Use headings:  Introduction, Materials & Methods, Results, Discussion & Conclusion.

for materials and methods:
– I used a website called ” NutritionCalcPlus”
– I would log in to track my food down

– Make sure your report is double spaced. 
– Make sure to include a hypothesis in your introduction.
– Compare your averages to the recommended values from your textbook or from the provided chart to determine if you are within those limits for macronutrients.
– Compare your caloric intake with your EER to determine if you are in a +/- energy balance.
– Estimate your average daily water intake, sleep hours, and exercise time. Are you meeting the recommendations?
– Include in your evaluation whether the food choices are actually healthy, even if they agree with the correct percentages.
– Make sure to save as a .pdf prior to uploading.  Only .pdf formats will be graded.

Reply to classmates post , at least 125 words each and 1 scholarly reference within last 5 years for each

Post 1

Psoriasis is a chronic inflammatory skin disease thats normally passed down through genetics and autoimmune pathogenic traits. About 2% of the world population has psoriasis and shows more favor to Caucasians and Scandinavians at 11%. There are different types of psoriasis. There is Psoriasis vulgaris that presents with erythematous scaly plaques, generalized pustular psoriasis, localized pustular psoriasis and inverse psoriasis which affects the folds of the skin (axillary, intergluteal, groin). About 90% of psoriasis cases corresponds to chronic plaque type. The clinical manifestation are sharply demarcated, erythematous, pruritic plaques covered in silver scales. Inverse psoriasis also called flexural psoriasis, affects intertriginous location and characterized by slightly erosive erythematous plaques and patches. Pustular psoriasis is multiple coalescing sterile pustules. It can be localized or generalized (Rendon & Schakel, 2019).
Sustained inflammation that leads to uncontrolled keratinocyte proliferation and dysfunctional differentiation. Excessive activation of parts of the adaptive immune system is thought to be central to the causes of psoriasis. A variety of cell types that includes plasmacytoid dendric cells, keratinocyte, natural killer t cells and macrophages secrete cytokines that active myeloid dendric cells. The cytokines lead to downstream keratinocyte proliferation, increased expression of angiogenic mediators and endothelial adhesion molecules and infiltration of immune cells into skin lesions (Armstrong & Read, 2020).
Although theres no known way to prevent psoriasis there are steps to help reduce flare ups. It is important to education patient on stress. Stress can make psoriasis worse and vice versa. Patients need to learn techniques to relax such as deep breathing, massage and medication. There was a study that showed meditation tapes can help lower stress and ones who receive light therapy. Also a gentle bath or shower daily can help with soothe psoriasis. It is also important to not touch and pick on your flare ups because it may cause infection. Continue treatment from your physician is important.

Post 2
Intravenous Immunoglobulin (IVIG) is a medication that can be used to treat and control symptoms of multifocal motor neuropathy (MMN).  IVIG contains immunoglobulins prepared by human plasma pooled from many donors (Whalen, 2018, p. 1382). The mechanism of action for IVIG is not well defined and there are multiple ways that IVIG is thought to treat multifocal motor neuropathy (MMN). In my first discussion post for this week I talked about how MMN is immune-mediated and is thought to occur due to anti-GM1 antibodies being present. These antibodies cause a disruption in ion channels resulting in conduction block. The conduction block causes the symptoms of MMN that patients will slowly develop over time including asymmetrical weakness. 
There are three different possible mechanisms of action for IVIG for treatment of MMN: First, IVIG may exert anti-idiotypic effects that reduce levels of circulating anti-GM1 IgM antibodies and interfere with B-cell receptors on GM1-specific clones. Second, IVIG may induce inhibitory receptors on B cells as has been shown in patients with chronic inflammatory demyelinating polyneuropathy. Finally, IVIG may interfere with anti-GM1 IgM-mediated complement deposition in nerves (van der Pol, Cats, & van den Berg, 2010, p. S81).
Hints for monitoring: According to Arumugham & Rayi (2020), IgG levels in blood serve as an essential yardstick to guide IVIG therapy (p. 14). Another effective guide to the effectiveness of IVIG therapy is the clinical response. The clinical response of IVIG determines the dosing and frequency of the medication since most patients will continue IVIG therapy indefinitely. Patients with blood type A, B, or AB should be monitored carefully for hemolytic transfusion reaction during high-dose therapy as they may contain anti-A or anti-B blood group antibodies (Arumugham & Rayi, 2020. p. 15). As an infusion nurse, this is why I sit there and check vitals every 15 minutes for the first hour, then every half hour for the next hour and then every hour until completion.
Side effects: headache, fever, chills, myalgias and hypotension/hypertension which can be resolved by slowing the rate of infusion (Whalen, 2018). More serious side effects which are rare include aseptic meningitis, acute renal failure and thrombotic events (Whalen, 2018).
Drug interactions: inhibitors of the renin-angiotensin system (RAS) such as angiotensin converting enzyme (ACE) inhibitors, angiotensin receptor blockers (ARBs) and direct renin inhibitors should be avoided while receiving IVIG therapy (Arumugham & Rayi, 2020). In addition, Measles, mumps, and rubella (MMR) vaccine should not be administered in children who are receiving IVIG therapy, as the IgG could counter the attenuated virus in the vaccine preparation and render them inactive. Thus vaccines should be delayed for at least nine months after the IVIG therapy or vice versa (Arumugham & Rayi, 2020, p. 13).

Instructions
The purpose of this homework assignment is to learn how to audit the LAN-to-WAN domain. You will identify common risks, threats, and vulnerabilities found in the LAN-to-WAN domain. You will assess common risks, threats, vulnerabilities found in the LAN-to-WAN domain, and you will identify network and security policies needed to properly secure the LAN-to-WAN portion of the network infrastructure. You will audit and assess implementation of security controls within the LAN-to-WAN domain, and you will recommend LAN-to-WAN domain hardening solutions by implementing proper security controls at the Internet ingress/egress point within an IT infrastructure. You will use a text document to develop your homework assignment by completing the sections listed below:
Lab 6.1a
Review the following scenario:
You are a security consultant for an information systems security firm and have a new healthcare provider client under HIPAA compliance. Your new client wants to know the requirements and business drivers for securing the LAN-to-WAN domain in its healthcare environment, which requires compliance with HIPAA. Similarly, your firm has a U.S. government DoD client who also wants you to perform a LAN-to-WAN domain compliance audit per the DoD LAN and network hardening guidelines and baseline requirements. Both organizations want you to focus on the LAN-to-WAN domain only, and you are to use the DoD-provided frameworks and STIGs previously found to summarize a network infrastructure hardening strategy.
Launch your Web browser. Navigate to the following website: https://public.cyber.mil/stigs/.

Review the Security Technical Implementation Guides (STIGs) available and the proper implementation of security based on DoDs workstation/desktop hardening guidelines (i.e., Windows 10, Server 2012, Apple IOS).
In your homework assignment, discuss three STIGs and the DoDs workstation/desktop hardening guidelines.
Lab 6.1b
Launch your Web browser and navigate to the following website: https://www.sans.org/reading-room/whitepapers/bestprac/network-security-smb-1542
Open the .pdf file and identify the risks, threats, and vulnerabilities commonly found in the LAN-to-WAN domain. List these in your homework assignment.
Using the information you learned in the homework assignment you submitted in Unit II and Internet resources, identify and review the documents available for hardening network infrastructure and the LAN-to-WAN domain as per DoD standards.
List these in your homework assignment.
Lab 6.1c
Launch your Web browser and type in the web address https://public.cyber.mil/stigs/ .

Find the STIGs for the routers and switches, network policy, firewalls and IDS/IPS, and other network devices.
Use the following search criteria to find these devices:
Routers

Switches

Network Policy

Firewall

ISD/IPS

Download these ZIP files from the URLs listed in the previous step.
Extract the Overview PDFs from each of the ZIP files listed in the previous step. This PDF is the summary document that supports all of the XML files.
Review the following concepts from this overarching DoD standards document for network infrastructure:
Enclave perimeter
enclave protection mechanisms
network infrastructure diagram
external connections
leased lines
approved gateway/internet service provider connectivity
backdoor connections
IPv4 address privacy
Firewall
packet filters 
bastion host
stateful inspection
firewalls with application awareness
deep packet inspection
application-proxy gateway
hybrid firewall technologies
dedicated proxy
layered firewall architecture 
content filtering
perimeter protection
tunnels
Briefly discuss in these in your homework assignment.
Lab 6.1d
Extract the Switch Cisco Manual XML file from the Network L2 Switch ZIP file. Review some of the following concepts and vulnerabilities for configuring and hardening Cisco switches:
non-registered or unauthorized IP addresses,
in-band Mgt not configured to timeout in 10 min,
exclusive use of privileged and non-privileged,
assign lowest privilege level to user accounts, and
log all in-band management access attempts.
Briefly discuss these in your homework assignment.
Lab 6.1e
Extract the Perimeter Router Cisco XML file from the Network Perimeter Router L3 Switch ZIP file. Review some of the following concepts and vulnerabilities for configuring and hardening Cisco routers:
A log or syslog statement does not follow all deny statements.
DNS servers must be defined for client resolver.
Running and startup configurations are not synchronized.
Briefly discuss these in your homework assignment.
Lab 6.1f
Extract the Firewall Cisco PIX ASA XML file from the Network Firewall ZIP file. Review at least three of the concepts and vulnerabilities for configuring and hardening Cisco firewalls as performed previously for switches and routers.
Discuss these in your homework assignment.
Lab 6.1g
Extract the IDS-IPS Manual XML file from the Network IDS-IPS ZIP file. Review at least three of the concepts and vulnerabilities for configuring and hardening IDS/IPS devices as performed previously for switches and routers.
Discuss these in your homework assignment.
Lab 6.1h
Extract the Network Policy Manual XML file from the Network Policy ZIP file. Review at least three of the concepts and vulnerabilities for configuring and hardening network policy as performed previously for switches and routers.
Discuss these in your homework assignment.
Lab 6.2
Write an executive summary on the top LAN-to-WAN domain risks, threats, and vulnerabilities, and include a description of the risk mitigation tactics you would perform to audit the LAN-to-WAN domain for compliance. Use the U.S. DoD LAN-to-WAN hardening guidelines as your example for a baseline definition for compliance. Submit the document to your instructor as a deliverable for this homework assignment.
NOTE: When you submit your homework assignment, you can combine the assignments into one document for grading. Please clearly mark the answers for Lab 6.1a, Lab 6.1b, Lab 6.1c, Lab 6.1d, Lab 6.1e, Lab 6.1f, Lab 6.1g, Lab 6.1h, and Lab 6.2 within your submission by labeling those sections within your assignment.
Your homework assignment should be a minimum of three pages in APA format. Include a minimum of two sources, with at least one source from the  Online Library in addition to your textbook. 
Adhere to APA Style when constructing this assignment, including in-text citations and references for all sources that are used. Please note that no abstract is needed.

You are an adviser to a newly-elected state legislator with no experience in criminal justice. She has been appointed to the legislature’s Committee on Crime and Criminal Justice and needs an education concerning contemporary issues in law enforcement.
In a memo, explain to her the three levels of law enforcement and tell her how local police and private security personnel have new roles in homeland security.
How must the three levels of law enforcement work together on this mission? Should she press for federal funding for local agencies in doing so? Should local police and private security personnel have roles in intelligence-gathering that may not have a relationship to specific criminal activity?

I need to write a Study essay.

I plan to study in the US for an LLM and in order to get the scholarship I need to write this following ;

A carefully prepared statement, of no more than two pages, giving
1. The reason why you wish to study or pursue research in the U.S.A.
2. A plan of the work you propose to undertake, the benefits you expect to obtain from such a study or research

I want you to ;

a.    Try to formulate 1, 2 or 3 clear study/research topics or goals, that you can expand on. Make references to the experiences I already have in my resume.

b.    Include references to the universities where I want to study, the classes taught or possible clinics/internships (top ones like Berkeley, Columbia, Harvard..). Make sure to also mention professors that I want to work with, what their specific expertise is and what you want to work on.

c.    Emphasize the output that I want to create. What impact will I have? How will that influence the world around me? What do I want to do once I finished my studies?

Best would be to emphasize on Alternative Dispute Resolution in International Arbitration. Corporate Law too would be great. I have specific experiences in ADR that will be relevant.

The paper needs to be stellar.

attached document- 12 Major Types of Research Design. It describes various types of research designs. My goal in giving you this is to show you that there are many other types of research models. Each one has a benefit and each one has a drawback. These models are in addition to the ones you read about this week.
I want you to read this handout and write me a 300 word paper on which ones might apply to an educational setting. Which ones might apply to the study ( motivating students to learn virtually)

attached document- 12 Major Types of Research Design. It describes various types of research designs. My goal in giving you this is to show you that there are many other types of research models. Each one has a benefit and each one has a drawback. These models are in addition to the ones you read about this week.
I want you to read this handout and write me a 300 word paper on which ones might apply to an educational setting. Which ones might apply to the study ( motivating students to learn virtually)

For this unit, you will write an essay which analyzes how a poet uses specific literary devices and techniques to develop a literary theme.  Chose one of the following topics for a well developed essay of 700-1000 words:

Explain how Owen uses poetic devices including simile, metaphor, and onomatopoeia to support the theme of Dulce et Decorum Est.
OR
Explain how cumming uses clich, jargon, and diction to support the theme of next to of course god america i.

For either topic, your essay must do the following:
Include an introduction paragraph that provides the title of the poem, poet, and a thesis statement connecting the literary elements to theme.
Use specific examples from the poem (quotations) to support your argument and document them properly.
Include at least three body paragraph each with a strong topic sentence that connects one specific literary device to the theme of the poem.
Include a conclusion paragraph which restates (not repeats) the thesis statement.
Be written in literary present tense.
Include a Works Cited containing only the poems information.

Do not use first person pronouns unless they are quotations from the poem.
Do not use secondary sources.  You may only use the poems and study materials I provided for you.
Do not simply follow the structure of the poem.  You should organize materials according to poetic devices.

analyse teachers’ interviews and class observations provided in the attached files.

analyse by using the thematic analysis  I will be providing the suggested Themes for the writer

the theoretical frame that I am using is  (Bennetts (1986, 1993, 2004) Developmental Model of Intercultural Sensitivity (DMIS), with cultural worldviews as its conceptual basis (Bennett 1986, 1993), posits that intercultural competence advances along a developmental continuum, with increasing complexity and sophistication in the perception and understanding of cultures and cultural differences.

the teachers (participants code)= TT is Teachers who completed their intercultural training through Khebrat programme
TE Teachers who are only exposed to intercultural experience through travelling

There are 3 teachers TT
and 7 teachers TE
the total is 10