This Competency Assessment assesses the following outcome(s):

SC200-4: Analyze how technology has driven scientific progress throughout history.

Science and Technology

Science is the study of how the universe works using the scientific method as a framework for asking questions. Throughout history, humans have built-up a body of scientific knowledge and have used this knowledge to develop technologies to make life easier or to broaden their knowledge. Scientific discovery drives technological advances and sometimes, as new technologies are developed, they enable scientists to answer questions that were unanswerable before. For example, researchers had to understand the physics of visible light and how it changes when going through different substances before they could use this knowledge to design microscopes. Once microscope technology was developed, it allowed scientists to ask questions about things that were not visible to the human eye. For this Assignment, you will look at this interdependence between science and technology by learning more about one biotechnology that is crucial to the modern world such as feeding a growing world population, fighting disease, developing new fuels, or cleaning up the environment.

Example: If you were thinking about cell phones (not a biotechnology), you could look at the scientific discoveries that had to happen before cell phones could exist. The discovery of electricity, electromagnetic waves, and the electrochemistry of batteries all had to happen before cell phones could be invented. You could also look at the technological advances that had to happen before we could have cell phones. Batteries, electric circuit boards, receivers, speakers, and satellites all had to exist before someone could invent the cell phone.

Select one specific biotechnology that you are interested in learning more about. For your selected biotechnology address the following questions in the table provided.

1. What biotechnology did you select? Explain what it is and how it is used.
2. Identify two scientific discoveries that had to take place before your selected biotechnology could be developed.
3. Describe the two scientific discoveries that had to take place before your selected biotechnology could be developed. When and how did the discoveries that you described take place?
4. Identify two technologies that had to exist before your selected biotechnology could be developed.
5. Describe the two technologies that had to exist before your selected biotechnology could be developed. How long have the technologies that you described existed?
6. Identify and discuss two positives and two negatives of biotechnological advances. Are there any biotechnologies that you think should not be pursued? Why or why not? Explain your answer.

Minimum Submission Requirements

At least 500 words not counting the instructions, questions or reference pages.
Use a minimum of four sources (with at least one from the PG library).
Free of grammar, spelling and punctuation errors.
No evidence of plagiarism.
Use the APA style for all citations.
Be original and insightful with no more than 10% taken verbatim from any outside sources.
If work submitted for this competency assessment does not meet the minimum submission requirements, it will be returned without being scored.

Plagiarism

Plagiarism is an act of academic dishonesty. It violates the University Honor Code, and the offense is subject to disciplinary action. You are expected to be the sole author of your work. Use of another person’s work or ideas must be accompanied by specific citations and references. Whether the action is intentional or not, it still constitutes plagiarism.

Is there a difference between common practice and best practice?

When you first went to work for your current organization, experienced colleagues may have shared with you details about processes and procedures. Perhaps you even attended an orientation session to brief you on these matters. As a rookie, you likely kept the nature of your questions to those with answers that would best help you perform your new role.

Over time and with experience, perhaps you recognized aspects of these processes and procedures that you wanted to question further. This is the realm of clinical inquiry.

Clinical inquiry is the practice of asking questions about clinical practice. To continuously improve patient care, all nurses should consistently use clinical inquiry to question why they are doing something the way they are doing it. Do they know why it is done this way, or is it just because we have always done it this way? Is it a common practice or a best practice?

In this Assignment, you will identify clinical areas of interest and inquiry and practice searching for research in support of maintaining or changing these practices. You will also analyze this research to compare research methodologies employed.

To Prepare:

Review the Resources and identify a clinical issue of interest that can form the basis of a clinical inquiry. Keep in mind that the clinical issue you identify for your research will stay the same for the entire course.
Based on the clinical issue of interest and using keywords related to the clinical issue of interest, search at least four different databases in the Walden Library to identify at least four relevant peer-reviewed articles related to your clinical issue of interest. You should not be using systematic reviews for this assignment, select original research articles.
Review the results of your peer-reviewed research and reflect on the process of using an unfiltered database to search for peer-reviewed research.
Reflect on the types of research methodologies contained in the four relevant peer-reviewed articles you selected.
Part 1: Identifying Research Methodologies

After reading each of the four peer-reviewed articles you selected, use the Matrix Worksheet template to analyze the methodologies applied in each of the four peer-reviewed articles. Your analysis should include the following:

The full citation of each peer-reviewed article in APA format.
A brief (1-paragraph) statement explaining why you chose this peer-reviewed article and/or how it relates to your clinical issue of interest, including a brief explanation of the ethics of research related to your clinical issue of interest.
A brief (1-2 paragraph) description of the aims of the research of each peer-reviewed article.
A brief (1-2 paragraph) description of the research methodology used. Be sure to identify if the methodology used was qualitative, quantitative, or a mixed-methods approach. Be specific.
A brief (1- to 2-paragraph) description of the strengths of each of the research methodologies used, including reliability and validity of how the methodology was applied in each of the peer-reviewed articles you selected.

Resources

Grant, M. J., & Booth, A. (2009). A typology of reviews: An analysis of 14 review types and associated methodologies. Health Information and Libraries Journal, 26, 91108. doi:10.1111/j.1471-1842.2009.00848.x

Hoare, Z., & Hoe, J. (2013). Understanding quantitative research: Part 2. Nursing Standard, 27(18), 4855. doi:10.7748/ns2013.01.27.18.48.c9488

Hoe, J., & Hoare, Z. (2012). Understanding quantitative research: Part 1. Nursing Standard, 27(15), 5257. doi:10.7748/ns2012.12.27.15.52.c9485

https://academicguides.waldenu.edu/az.php?s=19981

https://academicguides.waldenu.edu/library/evaluating/sources

http://academicguides.waldenu.edu/library/keyword/boolean

http://academicguides.waldenu.edu/library/keyword/searching-basics

SEE ATTACHED DOCUMENT FOR FULL DETAILS…..

Basically:

    Discuss the differences between a business plan and a strategic business plan. Why is this important?
    Choose an approved virtual business (ONLINE BUSINESS CONSULTING FIRM) from the list provided by your instructor to develop a strategic business plan.
    Conduct research and discuss what type of virtual business you will develop and how it differs from any competitors. Explain your perspectives.
    Discuss the components and process of building a strategic business plan for a virtual business.
    As a collective, construct and agree upon an outline for your strategic business plan.
    Describe the organizational identity of your virtual business.

the question I need to answer is How and why did the Greek concept of arete transform elitism role into the challenging idea that humans must constantly work towards excellence and virtue? Who was the major influence is on this transition that occurred roughly between 800-350 BCE? What were the last major events that foster these changes?

Assignment Instructions

Part 1: Major Events Documentation

Scenario: You visit a retail establishment, shop around, and finally carry several products to one of the point of sale (POS) terminals distributed openly around the store. You produce a credit card, the salesclerk processes the transaction, bags your goods, and hands you the receipt. On your way to the exit, a store employee asks to see your receipt and checks the contents of the store bag. Document each of the major events just described and explain them in terms of the PCI compliance standard. Include this report in your assignment.

Part 2: PCI Compliance

This part of the assignment will cover PCI. Please refer to Figure B1 in your responses.

Respond to and address the following in essay style:

Suppose HGAs mainframe, depicted in Figure B-1, stored cardholder data in the private databases. What steps should be taken to protect that data in order to be PCI compliant?

HGAs mainframe has network connectivity. Assuming that cardholder data is transmitted across these networks, describe how data should be protected in transmission.

Users are located at various sites connected to the HGA network. Suggest appropriate access controls to restrict unauthorized users from looking at cardholder data.

The PCI specification notes that all systems and network devices connected to a system that stores, transmits, or processes cardholder data is in scope and must comply with PCI specifications. To avoid having the whole network subject to PCI specifications, how would you segment the network to reduce the scope of compliance?

Read the following information about a typical dental practice:

Community Dental has two offices in the same city the North office and the South office. These offices offer the same dental services to patients. Patients can make appointments to either office at their convenience to see the dentist of their choice. Both offices are similarly equipped.
The professional staff includes the dentists, hygienists, dental mechanics, and administrative staff (receptionist, billing clerk, and office manager).
Each Community Dental office has a waiting area served by a receptionist who uses a computer to check in patients, schedule one of the examination rooms, and answer the phone. The waiting room has a door opening to the outside. A second door admits patients into the rest of the facility. Background music plays inside the waiting area. There is also a large aquarium on display.
Each examination area is partitioned off from the adjacent ones. Each has a computer and LCD screen used to pull up patient information and record new dental data such as x-ray interpretations, examination and test results, and procedures done for the patient. A low-level sound masking system is installed in this area.
After their treatment, the patient visits the billing clerks desk, which of course has a computer and a printer. Here patients pay (cash co-pay, credit card, or check), insurance information is verified, and an appointment is made. This clerk also mails out postcard appointment reminders and answers the phone.
The Community Dental dentists share a private office that has a computer and a printer. Here they can review patient data, access the Internet, and exchange email with their patients, colleagues, and acquaintances.
A database server containing patient data sits in a closet, next to a small tape library used for backup. Next to it sits a VPN server, firewall/router, and cable modem connected to the Internet. The VPN server accepts incoming connections from the dentists home computers. It also provides a permanent VPN connection between the North and South Offices. In this way, all patient data is available at all times at either office.
Most patient data is stored electronically on the database server, but some data such as x-rays and third-party labs results are still in physical form. Community Dental also depends on third party service providers to build crowns, braces, false teeth, soft dental protectors, and such. Information is exchanged with service providers using telephone, fax, letter, and email.
The network infrastructures management and maintenance are outsourced.
Community Dental also maintains an informative website to advertise its practice. The site is remotely hosted.

Answer the following questions in essay style. Make any sensible assumptions necessary in order to continue your analysis. Feel free to use the discussion board to share your assumptions with others in the class:

What is all the electronic and non-electronic private health information (ePHI) that is stored, processed, and transmitted at Community Dentals two offices?

Assess the practices organization. Where is it most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?

Assess the practices physical and technical safeguards. Where is it most likely HIPAA compliant? What changes should be made to move the practice closer to compliance?

Community Dental exchanges data with service providers and uses a third party to manage its IT infrastructure. What administrative and organizational safeguards should the practice expect these providers to adhere to?

Alternative Processing Site Proposal

R&D Media, LLC has asked you to develop a proposal for an Alternative Processing Site.

Conduct research on the latest technologies for Alternative Processing Sites (feel free to use your teamwork for this part of the assignment).
Determine who the companys stakeholders are.
Using the results of your research, develop the request for proposal that best meets the stakeholders requirements and incorporates innovative technologies.
Within your proposal you must also consider cost and what R&D Media, LLC can afford.
Develop and document the requirements for R&D Media, LLCs alternate processing site.
Identify the mission critical services and indicate services that are not provided at the alternate site. The plan must include all data security issues.
Create and document the design and do walkthroughs for building the alternate site to ensure that there are no omissions and errors.
Document the activation process for the alternate processing site.
Document the hand-back process.
The information you need about R&D Media, LLC is as follows:

Consider the LAN for a small 100-person business, R&D Media, LLC Inc. The business occupies one floor in an office building. Everybody has a computer on his or her desk, and there are servers for the web, file and print sharing, email, database, and a small 3D render farm, a rack of 20 quad processor Xeon servers running Red Hat Linux that generates the actual high-resolution video animations that R&D Media, LLC produces for its clients. The desktop systems consist of Apple Mac Pro desktops running the latest version of the Mac OS for the creative staff, and the latest version of Windows on computers for general use. The servers are running the latest version of Windows Server running Microsoft Exchange, web server, and file and print service.

The network is gigabit

Ethernet and the network hardware are a mixture from Cisco and Hewlett-Packard. Employees, business partners, and clients may visit R&D Media, LLCs office with laptop computers in order to collaborate on projects. The laptops will obtain their IP configuration from the DHCP server at R&D Media, LLC.

R&D Media, LLC has 10 megabit/second Internet access and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access R&D Media, LLCs servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.

R&D Media, LLC produces short animation movies for advertiser clients

These clients are located worldwide and need to communicate securely with R&D Media, LLC as they collaborate on their advertising shorts. R&D Media, LLC uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

The network has the following additional specifications:

The network is all TCP/IP based.
The network is based on Cisco routers and switches.
All desktop computers include email, web, database access, and office productivity software.
Creative users also have multimedia authoring software installed.
All server and critical network equipment are in a secure server room.
Printers are located around the office area.
The multimedia department uses high-end workstations for video rendering and animation.
A load-balancing dual firewall connects the network to the Internet.
Security Policy:

All email must be secure so it cannot be inadvertently sent to the wrong party or intercepted.
All network resources and equipment must be password protected.
Company equipment may not be used for personal business.
All Windows-based PCs must run approved anti-virus and antispyware programs.
All servers and desktops should run host-based intrusion detection software.
Clients may use the Secure FTP (SFTP) server to send or receive multimedia files, but under no circumstances should one client be able to view the files of any other client.
The mail server must be configured not to forward email that originated on the Internet.
Password aging must be enforced on all servers and desktops.
All server configurations must be readily available to rebuild a failed system.
Offsite backup is required, with 24/7 access to that location.
All employees will demonstrate they understand the security policy.
There will be a security officer who reports directly to the CEO of R&D Media, LLC.
Be sure that you capture the following information in your report:

List of mission critical applications, list of non-critical applications dropped
New technologies for Alternative Processing Sites are utilized
The needs of R&D Media, LLCs stakeholders are considered within the plan
A Plan for updating alternate processing site software during normal operation
Documentation showing a simple rack diagram and a network diagram
Network configuration info (IP, DNS, MX)
Power consumption estimates
Bandwidth estimates
Information security architecture (firewalls, VPNs)
Plan for cutting over to the alternate plan
Plan for cutting back to the main site (a.k.a. hand back)

This is the one kind of research essay .Tutor give me a question . this research essay will be written by using five academic sources they are reliable /accuray/ authority and correct referencing with citation.Answer must be written Ms Office file which file tutor given me.I will upload and you will write it.Collect answer from the sources with own pharaphasing not copy.I have also attached a sample answer one of my friends as well as method file which help you understand this coursework. Thanks

The assignment is split into two separate documents, the first is

” A statistical evaluation of a behavioural intervention” is the evaluate the statistical measures that are already put in place to measure behavioural intervention and state why. Comment on why it was affected and relate to any drawbacks on the research.

The assignment should focus on one intervention. Equally important I will need to also use Stata for this assignment. I will need to research a dataset which will be downloaded and be used to create tables and charts for that intervention plus explain what the dataset shows which is the analysis (empirical analysis).

The second part of this assignment is

“Critically evaluate the decision to save for retirement using insights from traditional economic theory and behavioural economics”

I need to examine, why people will choose to save up for retirement. In my analysis, I should use research and studies that have been conducted in this field and evaluate its effectiveness. This paper is just theory-based. Here I can go in-depth on behavioural intervention, how does traditional economic theory differ from saving retirement

Prior to beginning work on this discussion, read Farah Mohammeds article, Why Are Diamonds More Expensive Than Water? https://daily.jstor.org/diamonds-expensive-water/

(Links to an external site.), as well as Chapter 5 in your textbook, especially Sections 5.1 and 5.3, and respond to the following:

Describe the relationship between total utility and marginal utility.
Explain if marginal utility can be negative.
Examine the diamond-water paradox. Why are diamonds more expensive than water?
Evaluate the law of diminishing marginal utility.
Identify some items, explaining your reasoning, that do not follow the law of diminishing marginal utility.
Evaluate how the law of diminishing marginal utility can explain the diamond-water paradox.
The Law of Diminishing Marginal Utility paper

Must be three to five double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Centers APA Style resource (Links to an external site.).
Must include a separate title page with the following:
Title of paper
Students name
Course name and number
Instructors name
Date submitted
For further assistance with the formatting and the title page, refer to APA Formatting for Word 2013 (Links to an external site.).
Must utilize academic voice. See the Academic Voice (Links to an external site.) resource for additional guidance.
Must include an introduction and conclusion paragraph. Your introduction paragraph needs to end with a clear thesis statement that indicates the purpose of your paper.
For assistance on writing Introductions & Conclusions (Links to an external site.) as well as Writing a Thesis Statement (Links to an external site.), refer to the Ashford Writing Center resources.
Must use at least three scholarly, peer-reviewed, and/or other credible sources in addition to the course text.
The Scholarly, Peer-Reviewed, and Other Credible Sources (Links to an external site.) table offers additional guidance on appropriate source types. If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document any information used from sources in APA style as outlined in the Ashford Writing Centers Citing Within Your Paper guide (Links to an external site.).
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center. See the Formatting Your References List (Links to an external site.) resource in the Ashford Writing Center for specifications.