Safety Using Headpnones

Creation of a research paper

Exercise Content

  1. WD2 – Exercise # 1

     Follow along with the tutorial on how to properly format a research paper. Follow the steps, this is important.
    Chapter Exercise “Safety Using Headphones and Earbuds”

    Safety Using Headpnones

    NOTE: Enter in the Header your personal information not the information of the exercise
    (my Name: Nayancy Rodriguez)

    Save as 2-WD2-EX-A-YourName
    The document  “2-Steps to create the Research Paper – Exercise 1″ is a guide to create the Research Paper in exercise 1.

    Be sure to save your assignment in a .docx format, especially if you are using an Apple or MAC computer.

    Note: You need to submit the File:
    Chapter Exercise “Safety Using Headphones and Earbuds”     as 2-WD2-EX-A-YourName

    The document “1- MLA Documentation Style” shows all the features of the MLA Style Research Paper.

    1-MLA Documentation Style.pdfThe document “2-Steps to create the Research Paper Exercise 1.pdf” shows the steps to do a Research Paper in exercise 1

    2-Steps to create the Research Paper Exercise 1.pdf

    IMPORTANT!
    Remember that all the Word documents that you create should be in a file with the Creation Date of this week, or after if you submit late, but not a previous date. Files Assignments with the previous date will not be accepted

Discussion 4 response 2

Read classmates post and respond with 50 words:

There are three guidelines for radiology which are professional, technical and global. Technical guideline is for the use of facilities, equipment and non medical staff and supplies. An example will be code 77014-TC which indicates every non medical like the equipment and facilities. Professional guidelines is for the doctor’s professionals services only. An example is code 77014-26 which lets you know its only for professional services. Global guidelines when there is no division of costs associated with medical services because it was provided by a single operator. An example will be 99203 for a consultation with a doctor. 
Reference:

Carol J. Buck, Saunders (2022). Step-by-Step Medical Coding, 2022 Edition, by Carol J. Buck, Saunders

Discussion

 Search “scholar.google.com” for a company, school, or person that has been the target of a network or system intrusion? What information was targeted? Was the attack successful? If so, what changes were made to ensure that this vulnerability has been controlled? If not, what mechanisms were in place to protect against the intrusion.(250 words)
 

 

Exp19_PowerPoint_AppCapstone_Intro_STEM

  

Exp19_PowerPoint_AppCapstone_Intro_STEM

  

Exp19 PowerPoint AppCapstone Intro STEM

 
PowerPoint Introductory Capstone – STEM 

  

Project Description:

As a member of the local school district’s STEM (Science, Technology, Engineering, and Math) committee, you have been asked to create a presentation on STEM education to be used to build interest in expanding the STEM curriculum with the local school district and to seek funding from local business owners and taxpayers. You began a presentation and now need to add the content to the presentation.

     

Start PowerPoint. Download and open the file named Exp19_PPT_AppCapstone_Stem.pptx. Grader has automatically added your last   name to the beginning of the filename. Download and extract the zip file   named Exp19_PPT_AppCapstone_Stem_Assets.zip.   

 

Change the theme   colors to Aspect.

 

 

Change the theme   fonts to Gill Sans MT.

 

On Slide 8, insert   the Microscope.jpg in the left   placeholder. Apply the Metal Oval
  picture style. Change the Picture Border fill to Dark Gray, Background 2,   Lighter 10%.

 

On Slide 10 in the   left content placeholder, insert the ElementarySchool.jpg   image. In the right content placeholder, insert the ElementarySchool2.jpg image.
 

  Apply the Simple Frame, White picture style to both images. Change the   Picture Border fill for both images to Dark Gray, Background 2, Lighter 10%.

 

On Slide 11 insert   the MiddleSchool.jpg image. Make   the following changes to
  the inserted image:
  • Crop the left side of the image so that most of the white area is removed.
  • Change the Shape Height of the image to 5.2“.
  • Apply the Simple Frame, White picture style.
  • Change the Picture Border to Dark Gray, Background 2, Lighter 10%.
  • Set the Horizontal position of the image to 3.6” and the   Vertical position to 1.9“.

 

On Slide 12 insert   the HSVideo.mp4 video file. Make   the following changes to the
  video:
  • Apply the Simple Frame, White video style.
  • Change the Video Border to Dark Gray, Background 2, Lighter 10%.
  • Set the video to start Automatically.

 

On Slide 4 insert the   image WorldMap.jpg as a background   image on the slide. Change the transparency to 40%.

 

On Slide 2 insert a   Picture Caption List SmartArt graphic.
 

  Add the following to the SmartArt graphic:
  • Type Science in the first bullet point in the Text pane and then insert Science.jpg as the image
  • Type Technology in the second bullet point and   add then insert the Technology.jpg   image.
  • Type Engineering in the third bullet point and add the image Engineering.jpg.
  • Type Math as the fourth bullet point and add the image Math.jpg.
 

  Apply the Intense Effect SmartArt Style to the SmartArt graphic.

 

On Slide 6 convert   the bulleted list to a Lined List SmartArt graphic and change the
  colors to Colorful–Accent Colors.

 

On Slide 3 apply the   Gradient Fill: Dark Purple, Accent color 5, Reflection WordArt style to the   text Why Stem?
 

  Make the following changes to the WordArt:
  • Increase the font size to 96 pt.
  • Change the Text Fill to Orange, Accent 1.
  • Apply the Wave Up text effect in the Transform gallery (Mac users: Apply   the Wave 2 text effect in the Transform gallery).
  • Change the Shape Height to 2.8“.

 

On Slide 4, insert an   Oval shape on the slide.
 

  Make the following changes to the Oval shape:
  • Change the Shape Height to 3.9” and the Shape Width to   3.9“.
  • Type 40th in Mathematics in the shape, change the font   color to Black, Background 1, and increase the font size to 36   pt.
  • Change the Shape Fill to White, Text 1 and the Shape Outline to No Outline.
  • Change the Transparency to 36%.
  • Set the Horizontal position of the shape to 2” and the Vertical position   to 2.5“.

 

Make a copy of the   formatted oval shape and paste on the slide. Set the Horizontal position of
  the new shape to 7” and the Vertical position   to 2.5“. Highlight the text in the shape, and type
25th in Science.

 

On Slide 9 insert a   table with 2 columns and 6 rows. In the table, merge the following:
  Column 1 – Merge the cells in rows 1 and 2
  Column 1 – Merge the cells in rows 3 and 4
  Column 1 – Merge the cells in rows 5 and 6 

 

Make the following   changes to the table structure:
  • Apply the No Style, Table Grid table style.
  • Change the width of the first column to 2.8“.
  • Change the width of the second column to to 8.2“.

 

Type the following   information into the table:
  Row 1: Col 1: Elementary School; Col 2: Focuses   on introductory STEM courses and awareness of STEM occupations
  Row 2: Col 2: Provides structured inquiry-based and real-world   problem-based learning, connecting all four of the STEM subjects
  Row 3: Col 1: Middle School; Col 2: Courses   become more rigorous and challenging
  Row 4: Col 2: Student exploration of STEM-related careers begins at   this level
  Row 5: Col 1: High School; Col 2: Focuses   on the application of the subjects in a challenging and rigorous manner
  Row 6: Col 2: Courses and pathways are now available in STEM fields   and occupations

 

 

Set the height of the   table to 4.8“. Apply Center and Center Vertically   alignments to the first column of the table. Apply Center Vertically to the   second column of the table. 

 

In the table, apply the   following shading:
  •Red, Accent 2 to the cell with the text Elementary   School
  •Orange, Accent 1 to the cell with the text Middle School
  •Dark Blue, Accent 3 to the cell with the text High School

 

On Slide 5 insert a   Clustered Column chart. Replace the spreadsheet information with
  the following information: Leaving cell A1 blank, type Percentage in cell B1. Populate   cells A2:B7 with the following:
 

All Occupations 14%
Mathematics 16%
Computer Systems Analysts 22%
Systems Software Developers 32%
Medical Scientists 36%
Biomedical Engineers 62%
  Change the source data to use the range A1:B7.

 

Make the following   changes to the chart:
  • Remove the chart title, gridlines, legend, and vertical axis.
  • Increase the font size of the x-axis (horizontal) to 16 pt.
  • Add Outside End data labels and change the font size to 18 pt.

 

Click Slide 13 and   use the Reuse Slides option to insert Slides 2–5 from Careers.pptx. Keep the source formatting of the original slides   (inserted slides).

 

Start Excel. Open the   downloaded file named StemData.xlsx   and save it as StemData_LastFirst.xlsx. Copy the chart from   the HarrisData worksheet and embed the chart using Paste Special on Slide 13.
 

  Change the Shape Height to 4.8“. Set the Horizontal   position to 1.4” and the Vertical position
  to 1.9″.

 

On Slide 1 select the   blue circle shape, press SHIFT, and then select the inserted icon. Group the   shapes. Repeat for the three remaining shapes on the first slide to group   each of the circle shapes with their associated icons.

 

 

On Slide 5 apply the Fly   In animation (Entrance category) to the chart. Set the Effect Options   Sequence to By Element in Category. Set the animation to start After   Previous. 

 

Delete Slide 7. Add   slide numbers to all slides with the exception of the first slide. Apply the   Split transition to all slides.

 

On Slide 1 type Welcome   to our presentation on STEM education. (including the
  period) as a speaker note.

 

Check the   presentation for spelling errors, and correct any errors.

 

Save and close Exp19_PPT_AppCapstone_Intro_STEM.pptx.   Submit the file as directed.

canon.com/ijsetup

 

canon.com/ijsetup is a website to download Canon printer drivers, you can also visit the canonsetup-canon.com/ijsetup website for the same. All-in-one Canon Inkjet printers are suitable for home, business, school, and others to improve productivity. Depending on your requirement, it offers a type printer including PIXMA, SELPHY, MAXIFY, etc. Some factors need to be in mind while choosing an inkjet printer for you. Later, you can easily set up your Canon printer through drivers from canon.com/ijsetup, wireless connection, USB, and a few components. The setup process for every Canon model is almost similar, however the download through http //ij.start.cannon or https //ij.start.cannon and  installation process may differ.

discusion-4

Chain letters are messages sent to a huge number of people, asking each recipient to forward them to as many other people as they can. While some of them can be amusing or sent for fun, others may carry hidden threats to your Internet security. What types of threats do these messages pose to Internet users? How can we guard ourselves from these threats?

Responding to Guest Concerns about Cyberattacks

 

This week, your internship assignment is with the company’s Guest Relations office.

You have been asked to draft a letter to guests to address concerns about the impacts of possible cyber attacks. This particular letter should reassure guests that the company is taking positive steps to protect guest privacy. The guests’ concerns extend beyond privacy of information in databases. There have been news reports detailing situations where hackers have attacked internal building monitoring and control systems to spy on guests and invade their privacy.

In order to write an effective notification letter, it is first necessary to understand the required perspective for such a letter.

From a technical perspective, this type of attack is a data security problem because the attackers are stealing data by attacking at the point of creation (data at rest) and then along the transmission paths (data in transit).  The impact of this type of attack is a loss of confidentiality.

From a people perspective, this type of attack is viewed as an attack on the privacy of guests and is categorized as a loss of privacy.

Managers need to address this problem from both perspectives. With internal technical staff, the conversation would revolve around data security. But, with guests and Guest Relations staff, the conversation needs to address concerns about the possible loss of privacy.

Secondly, we must consider the required “tone” for such a letter. The letter must be factual but, more importantly, it is necessary to show an appropriate amount of empathy and understanding for the recipient’s feelings. Empathy and emotional intelligence are important leadership skills for managers.

Having empathy and/or acting in an empathetic manner (aware of and sensitive to the emotions of guests and customers), allows a manager to respond appropriately when a cyberattack occurs.  As you write this letter, you will need to find a balance between addressing the emotional aspects of a cyberattack (need for a supportive and calming response — less information may be best) and the need to develop trust by providing information about a situation which can invoke fear and concern.

After you read this week’s readings on data security, read this definition of Emotional Intelligence and this discussion article about What Emotional Intelligence Is and Is Not. Then, read about three types of empathy https://www.huffingtonpost.com/entry/types-of-empathy_us_56f171cde4b03a640a6bcc17.

Next, read one or more of these articles about a cyber attack that affected hotel operations and created fear and concern among guests and employees.

1. Hackers use ransomware to target hotel guests’ door locks

2. Hackers are using hotel Wi-Fi to spy on guests, steal data

3. 20 hotels suffer hack costing tens of thousands their credit card information

Using what you’ve learned about data security AND emotional intelligence, draft a letter that Padgett-Beale could use to inform and calm its guests should a similar cyberattack (door locks, guest WiFi access, or credit card Point-of-Sale breach) affect one of the company’s hotel properties. Your draft letter will also be used to train employees in how they can and should respond to guest concerns

Need 750+ Words With No Plagiarism And 2+ Scholarly References In APA Format

In chapter seven (7), we have learned from “The Path to Information Value” that 70% (seventy percent) of managers and executives say data are “extremely important” for creating competitive advantage.

In addition, it is implied by the authors that, “The key, of course, is knowing which data matter, who within a company needs them, and finding ways to get that data into users’ hands.”

Based on the company you have identified for your Final Paper, discuss 1) the data that matters to the executives in that industry, 2) who, within that industry, needs that data, and 3) some methods for ensuring that the critical data gets into the users’ hands.  Remember to respond to two other learners’ post, letting them know if they missed any data or details in their industry.

A substantive post will do at least two of the following:

  • Ask an interesting, thoughtful question pertaining to the topic
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide outside schoarly sources (for example, an article from the UC Library https://www.ucumberlands.edu/library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

SLR paper

  

Course Paper

A systematic Literature review paper on analyzing and visualizing data

Guidelines

· There are two main goals to conduct this SLR paper in this course:

o Help you toward your PhD thesis. My experience advising many phd students in different universities is that one of the “easiest” approaches to reach the “difficult” task of finding your research subject in your phd is to start by conducting an SLR in your general subject. It can help you as an output of this work to know what are some of the hot topics or trending research subjects in your area of interest. 

o As a phd student or soon to be graduate, publications are key factors in evaluating your profile. A good SLR paper in this course can be publishable whether in a conference or a journal whether directly or through extending the work after the end of the course

· The overall grade for this course paper is 25 or 25% of the overall course grade.

· The paper to be submitted no later than June 10th, a firm-deadline.

· We will follow APA guidelines (Please read relevant material about that)

· It is important to write in your own words. Paper will be evaluated using University integrity checking services.

· Systematic Literature Review has a structured approach that you have to follow. You can find online many references on how to conduct SLR. Below is a table as an example describing SLR steps (https://lib.guides.umd.edu/SR/steps). As an alternative to the 8 steps described below, minimum steps in SLR can be 5 (see https://www.ncbi.nlm.nih.gov/pmc/articles/PMC539417/). You will be graded based on following one of those two SLR templates in completing each step properly.

· You may have issue reaching or accessing some papers. Use University library or any available resources, to the best of your abilities.

· You can always submit progress documents for me to discuss and evaluate (i.e. before your final submission throughout the semester).

· In terms of the subjects to pick from, I will create a discussion board for that in which students should not pick repeated subjects and so you can reserve your subject earlier through the discussion board.

· Verify with me through an email before finalizing your paper subject

· Remember, instead of selecting a paper subject, you can start from framing a question to review or even from few selected keywords.

  

Tools

Steps

 

PICO template

1. Identify   your research question. Formulate   a clear, well-defined research question of appropriate scope. Define your   terminology. Find existing reviews on your topic to inform the development of   your research question, identify gaps, and confirm that you are not   duplicating the efforts of previous reviews. Consider using a framework   like PICO or SPIDER to define you question scope.   Use Database Search Log Excel spreadsheet to record search terms under each   concept. 

Optional: It   is a good idea to register your protocol in a publicly accessible way. This   will help avoid other people completing a review on your topic.   Similarly, before you start doing a systematic review, it’s worth checking   the different registries that nobody else has already registered a   protocol on the same topic.

  • Cochrane Collaboration – Systematic reviews of health care and        clinical interventions
  • Campbell Collaboration – Systematic reviews of the effects of social        interventions
  • F1000 Research – The protocol is published immediately and        subjected to open peer review. When two reviewers approve it, the paper        is sent to Medline, Embase and other databases for indexing.
  • Joanna Briggs Institute – Systematic reviews of healthcare practices to        assist in the improvement of healthcare outcomes globally
  • Open Science Framework (OSF) Registries – Registry of a protocol on OSF creates a        frozen, time-stamped record of the protocol, thus ensuring a level of        transparency and accountability for the research. There are no limits to        the types of protocols that can be hosted on OSF.
  • *** PROSPERO – International prospective register of        systematic reviews. This is the primary database for registering systematic review protocols and        searching for published protocols. Scoping reviews are not accepted.        PROSPERO accepts protocols from all disciplines (e.g., psychology,        nutrition) with the stipulation that they must include health-related        outcomes.
  • Research Registry – Similar to PROSPERO. Based in the UK,        fee-based service, quick turnaround time.
  • Zenodo –        Share your search strategy and research protocol. No limit on the        format, size, access restrictions or license.

Example outlining the details and documentation necessary for   conducting a systematic review:

Hersi, M., Traversy,   G., Thombs, B. D., Beck, A., Skidmore, B., Groulx, S., … Stevens, A. (2019).   Effectiveness of stop smoking interventions among adults: protocol for an   overview of systematic reviews and an updated systematic review. Systematic   Reviews, 8(1), 28. https://doi.org/10.1186/s13643-018-0928-

 

Inclusion/exclusion criteria template 

2. Define   inclusion and exclusion criteria. Clearly state the criteria you will use to determine   whether or not a study will be included in your search. Consider study populations,   study design, intervention types, comparison groups, measured outcomes. Use   some database-supplied limits such as language, dates, humans, female/male,   age groups, and publication/study types (randomized controlled trials, etc.).

 

Database search log template

3. Search for   studies. Run your searches in   the databases that you’ve identified as relevant to your topic. Work with a librarian to help you design comprehensive   search strategies across a variety of databases. Approach the grey literature   methodically and purposefully. Collect ALL of the retrieved records from each   search into a reference manager, such as Endnote, Zotero or Mendeley, and de-duplicate the library prior to screening.

 

Rayyan – export your Endnote results in this screening software

4. Select   studies for inclusion based on pre-defined criteria. Start with a title/abstract screening to remove studies that   are clearly not related to your topic. Use your inclusion/exclusion criteria to screen the full-text of studies. It   is highly recommended that two independent reviewers screen all studies,   resolving areas of disagreement by consensus.

 

Review matrix template

5. Extract   data from included studies. Use a spreadsheet, or systematic review software (e.g. Rayyan, RevMan), to extract all relevant data from each   included study. It is recommended that you pilot your data extraction tool,   to determine if other fields should be included or existing fields clarified.

 

Cochrane Risk of   Bias Tool

6. Evaluate   the risk of bias of included studies. Use a Risk of Bias tool (such as the Cochrane RoB Tool) to assess the potential biases of studies   in regards to study design and other factors. Read the Cochrane training materials to learn about the topic of assessing   risk of bias in included studies. You can adapt existing tools (PDF p.5) to best meet the needs of your review,   depending on the types of studies included.

 

PRISMA Flow   Diagram

PRISMA Checklist

Manuscript template

7. Present   results and assess the quality of evidence. Clearly present your findings, including   detailed methodology (such as search strategies used, selection criteria,   etc.) such that your review can be easily updated in the future with new   research findings. Perform a meta-analysis, if the studies allow. Provide   recommendations for practice and policy-making if sufficient, high quality   evidence exists, or future directions for research to fill existing gaps in   knowledge or to strengthen the body of evidence.

For more information, see: 

  • Liumbruno, G. M., Velati, C., Pasqualetti, P., &        Franchini, M. (2013). How to write a        scientific manuscript for publication. Blood Transfusion, 11(2), 217–226. https://doi.org/10.2450/2012.0247-12 
  • Academic Phrasebank – Get some inspiration and find some terms and        phrases for writing your manuscript
  • GradeProof – Automated high-quality spelling, grammar        and rephrasing corrections using artificial intelligence (AI) to improve        the flow of your writing. Free and subscription plans available.

 

Elsevier Journal   Finder

Springer Journal   Suggester

8. Find the   best journal to publish your work. Identifying the best journal to submit your   research to can be a difficult process. To help you make the choice of where   to submit, simply insert your title and abstract in any of the journal finder tools listed under the Publishing   your Systematic Review tab.