Author: PAPERLINK

  • I’m attaching first the feedback from the methods as as well as two links and me

    I’m attaching first the feedback from the methods as as well as two links and me emailing my professor and him responding back “Advice”. The rest of the links should still be on the last order. 
    https://libguides.lib.siu.edu/health_care_management 
    These links are for Results
    https://www.jclinepi.com/article/S0895-4356(13)00129-7/pdf
    https://www.grammarly.com/grammar-check
    Please look at all links

    The post I’m attaching first the feedback from the methods as as well as two links and me appeared first on assignment in 6hours.

  • work on 3 Middle Range Theories for the Literature Review Paper. ·         Maxim

    work on 3 Middle Range Theories for the Literature Review Paper.
    ·         Maximum of 5 pages (not including title and reference page).
    ·         Must be APA format
    ·         Four references within 5 years.
    ·        The introduction includes a statement of the problem and the PICOT question briefly explains the
    Significance of your topic study and acts as a way to introduce the reader to your definitions and background. 

    The post work on 3 Middle Range Theories for the Literature Review Paper.
    ·         Maxim appeared first on assignment in 6hours.

  • You were just hired by an airline industry to create a database to record the various airlines and the pilots that work for them

    The post You were just hired by an airline industry to create a database to record the various airlines and the pilots that work for them is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Term Project – week 8 – (17%):

    You were just hired by an airline industry to create a database to record the various airlines and the pilots that work for them
    Discussions with the industry representatives focused on two initial entities, Airlines and Pilots; the following key points were agreed:
    1. Each pilot is assigned a unique PilotID.
    2. Each AirlineID is unique
    3. Each pilot may work for one airline, each airline can have many pilots.
    4. FName, LName, JobTitle and Salary describe each pilot (with the obvious meaning)
    5. AirlineID, NPlanes, NRoutes, NPilots describe each airline (NPlanes number of planes, NRoutes number of routes, NPilots number of pilots)
    6. No fields beyond those in the report are needed.

    The objective of this exercise is to demonstrate an understanding of some basic concepts covered in the course. The exercise is a straightforward application of those concepts – there are no “hidden” complexities – should you identify something in the key points or data that adds complexity, contact the instructor before submission – you may be overthinking the exercise.

    The sample data may not represent all possible values of each field – consider each field’s domain during the design.

    The objective is to replace the following report with a relational database. The submission will consist of a word compatible document to record the design process, and an Access DB.

    download

    Here is the relational schema (table notation) for the above report / table:
    PilotAirlines (PilotID, FName, LName, JobTitle, Salary, AirlineID, NPLanes, NRoutes, NPilots)

    The functional dependencies are:
    PilotID – – > FName, LName, JobTitle, Salary, AirlineID, NPLanes, NRoutes, NPilots
    PilotID – – > FName, LName, JobTitle, Salary, AirlineID
    AirlineID – – > NPLanes, NRoutes, NPilots

    The specific tasks are listed below, the percentage in parenthesis corresponds to the grade weight for each task.
    Name your document Last Name_TermProject (i.e. Smith_TermProject). When you are asked to provide an explanation or description, include enough content to demonstrate that you understand the definition, term, concept, etc. and how it applies to this exercise.

    SUGGESTION: Review the Terms and Concepts Discussion, especially the One-to-Many Normalization Process: Parts and Suppliers example. There is also a normalization MP4 file that can be downloaded from the Resources section.

    Incorporate the following outline in your submission – include the section numbers – not the questions or other content from the instructions.

    1) Review the existing report, functional dependencies provided and the sample data (as well as field domains and common knowledge) and document any assumptions you feel are appropriate (beyond those in the key points) and identify initial entities (person, place, thing). (10%)

    2 Define functional dependency, and explain one row of the functional dependencies provided above in plain English (use field names). (15%) (you do not need to explain partial or transitive dependency)

    3) Based on multiplicity – explain the relationship between the initial Entities in plain English – (either one-to-many, or many-to-many). (15%)

    4) Design: specify all tables and fields at each normal form level
    a) First Normal Forum (1NF) assessment / action – if needed 10%
    Copy the 1NF definition from the text (include quotes and page number)
    Assess the UNF table provided and if necessary, make the changes needed to conform to the 1NF definition. Document the resulting 1NF table(s) using relational schema notation or spreadsheet format (see the above example or page 111 Figure 4.2.6 of the text).
    Explain how each table(s) meets the 1NF definition (use field names)
    b) Second Normal Form (2NF) assessment / action – if needed 10%
    Copy the 2NF definition from the text (include quotes and page number)
    Assess the 1NF table(s) in the previous section and if necessary, make the changes needed to conform to the 2NF definition. Document the resulting 2NF table(s) using relational schema notation or spreadsheet format.
    Explain how each table meets the 2NF definition (use field names)
    c) Third Normal Form (3NF) assessment / action if needed 10%
    Copy the 3NF definition from the text (include quotes and page number)
    Assess the 2NF table(s) in the previous section and if necessary, make the changes needed to conform to the 3NF definition. Document the resulting 3NF table(s) using relational schema notation or spreadsheet format.
    Explain how each table meets the 3NF definition (use field names)

    5) Use the 3NF tables in your design, to create an new MS Access database, load the sample data provided,
    Name your database Ubogu_TermProject . (5%).

    6) Create a Query, that provides the results for the following request: List each PilotID, FirstName, LastName, the Airline each pilot works for, sorted by pilot. (5%)

    7) Create a Form: New Pilot Input (5%)

    8) Create a Report: Pilot List – list all pilots, their first and last names, and Salary (5%)
    Upload the database to the assignment area as one of the deliverables

    9) Submission content organization, clarity, spelling and grammar (10%

    The post You were just hired by an airline industry to create a database to record the various airlines and the pilots that work for them appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • It may be that attorneys hire you to consult with them regarding digital evidence and its relationship with what their client has been charged with or is under investigation for.

    The post It may be that attorneys hire you to consult with them regarding digital evidence and its relationship with what their client has been charged with or is under investigation for. is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    It may be that attorneys hire you to consult with them regarding digital evidence and its relationship with what their client has been charged with or is under investigation for. Discuss the steps you would take, as an examiner, to perform an attorney client privilege (ACP) investigation. If you know an attorney, ask them what the most difficult thing is when it comes to digital evidence.

    Directions: The student will post one thread of at least 500 words. For each thread, students must support their assertions with at least 3 scholarly citations in APA format. Each reply must incorporate at least 1 scholarly citation in APA format. Any sources cited must have been published within the last five years. Acceptable sources include peer reviewed journal articles, textbooks, the Bible, etc. The Post First feature has been activated in the Discussions for this course. You will need to post your thread before you will be able to view and reply to other students’ threads.

    The post It may be that attorneys hire you to consult with them regarding digital evidence and its relationship with what their client has been charged with or is under investigation for. appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Theory: Self-Care of Chronic Illness Theory by theorist Barbara Riegel, Tiny Jaarsma, & Anna Strömberg

    The post Theory: Self-Care of Chronic Illness Theory by theorist Barbara Riegel, Tiny Jaarsma, & Anna Strömberg is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Theory: Self-Care of Chronic Illness Theory by theorist Barbara Riegel, Tiny Jaarsma, & Anna Strömberg

    The essay must be 4 – 5 pages excluding the reference and title page. Instructions and an example template are provided in the attachments

    The post Theory: Self-Care of Chronic Illness Theory by theorist Barbara Riegel, Tiny Jaarsma, & Anna Strömberg appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • This is a 2 part assignment, each part is 300 words with apa citation. Please submit 2 different documents.

    The post This is a 2 part assignment, each part is 300 words with apa citation. Please submit 2 different documents. is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    This is a 2 part assignment, each part is 300 words with apa citation. Please submit 2 different documents.

    PART 1

    This week we have explored the cardiovascular, peripheral, vasculature, and lymphatic systems. Review the material covered and provide a minimum of five key points about one of the key content areas covered that are listed below. You may include assessment techniques as well evidence-based/research examples.

    Structure and function of the cardiovascular system
    Structure and function of the lymphatic system
    Cardiovascular history and risk factors
    Lifespan and cultural cardiovascular considerations
    Please be sure to validate your opinions and ideas with citations and references in APA format.

    Responses need to address all components of the question, demonstrate critical thinking and analysis, and include peer-reviewed journal evidence to support the student’s position.

    Estimated time to complete: 2 hours

    PART 2

    This week we have explored nutrition and dietary requirements. Review the material covered in the required readings and provide a minimum of five key points about one of the key content areas covered that are listed below.

    Factors affecting nutrition
    Therapeutic and modified dietary plans
    Nutritional assessment
    Capillary glucose monitoring
    Please be sure to validate your opinions and ideas with citations and references in APA format.

    Responses need to address all components of the question, demonstrate critical thinking and analysis, and include peer-reviewed journal evidence to support the student’s position.

    Your initial response is due by Wednesday at 11:59pm CT.

    Estimated time to complete: 2 hours

    The post This is a 2 part assignment, each part is 300 words with apa citation. Please submit 2 different documents. appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • RESEARCH QUESTION: What security measures are different pre 9/11 to post 9/11 in transportation areas such as the airport and what are some needed adjustments to improve current security

    The post RESEARCH QUESTION: What security measures are different pre 9/11 to post 9/11 in transportation areas such as the airport and what are some needed adjustments to improve current security is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    RESEARCH QUESTION: What security measures are different pre 9/11 to post 9/11 in transportation areas such as the airport and what are some needed adjustments to improve current security measures? If security measures in transportation areas such as the airport were the same as pre 9/11, where would the country be now with the ability to protect itself against terrorist and other criminals?

    In this week’s assignment, you will be asked to write a Review of Literature in which you must select appropriate resources, read them critically, and arrange them in a coherent manner in context to your own research topic. Describe the process that you used to find your material, the criteria you used to accept or reject the material, and the themes that you see in the existing body of knowledge about your topic. What variables can you use to organize the literature review?

    Please make sure responses are written at a graduate/masters level.

    must be 275+ words. please pay attention and make sure this is completed in connection with the research question.

    The post RESEARCH QUESTION: What security measures are different pre 9/11 to post 9/11 in transportation areas such as the airport and what are some needed adjustments to improve current security appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Please upload a personal statement. In 500-800 words, please describe the purpose for this application.

    The post Please upload a personal statement. In 500-800 words, please describe the purpose for this application. is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    Personal Statement

    Please upload a personal statement. In 500-800 words, please describe the purpose for this application.

    Please pay special attention to outlining the educational background, the reasons for selecting this program and key experiences that have led the applicant to apply at this time

    The post Please upload a personal statement. In 500-800 words, please describe the purpose for this application. appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • Question 2: Who is the criminal; how do the police find him?

    The post Question 2: Who is the criminal; how do the police find him? is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    United States v. Steven C. Perrine

    518 F.3d 1196 (10th Cir. 2008)

    The Perrine case illustrates how law enforcement must utilize the statutory framework to trace the source of criminal activity and then operate within the Fourth Amendment framework to seize evidence on the digital device that was the source of the activity. Some aspects of an investigation do not implicate any regulatory regime and law enforcement may, just like any private citizen, utilize the numerous ways that the Internet now offers to learn something to facilitate the investigation. Hence, an investigator passes in and out of three frameworks to obtain digital evidence: 1) statutes; 2) the Fourth Amendment; and, 3) non-regulated cyber-space. The point here is not to gain an understanding of the doctrines but to understand the complexity of such investigations, including passing in and out of various legal regimes during the course of the investigation. Picture yourself as the investigator in this case.

    Question 1: What evidence of crime is there? (recount the facts of the case).

    Question 2: Who is the criminal; how do the police find him?

    Question 3: What do you do next? (Discuss the various legal regimes that the police must confront and how they must comply with those regimes. For example, search engines such as Google, public websites, and chat rooms offer a host of information to anyone who chooses to use them. Perhaps you could use a free IP locater service and enter the IP address in Perrine to show how easy it is to find who is assigned the IP address. Discuss all the steps you would take until you have seized Vanlandingham’s computer and why each step is important.

    Directions: The student will post one thread of at least 500 words. For each thread, students must support their assertions with at least 3 scholarly citations in APA format. Each reply must incorporate at least 1 scholarly citation in APA format. Any sources cited must have been published within the last five years. Acceptable sources include peer reviewed journal articles, textbooks, the Bible, etc.

    The post Question 2: Who is the criminal; how do the police find him? appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper

  • discussion #1 How have you seen presenters handle questions from their audiences?

    The post discussion #1 How have you seen presenters handle questions from their audiences? is a property of College Pal
    College Pal writes Plagiarism Free Papers. Visit us at College Pal – Connecting to a pal for your paper

    discussion #1 How have you seen presenters handle questions from their audiences? What did they do that you thought was good and what did they do that you thought was poor? you might have to watch the videos of other students.

    discussion #2 Read the abstract on page 586 in the Rules for Writers textbook. Do you think the abstract is informative or descriptive?

    Next, comment on the skill with which the writer attracts the reader’s attention, captures the essence of the paper, and uses the abstract to make the reader want to read the entire paper.

    The initial posting should be approximately 250 to 300 words long. Make sure postings are carefully proofread with no spelling or grammatical errors. Please write your initial posting by Wednesday, midnight, central time

    The post discussion #1 How have you seen presenters handle questions from their audiences? appeared first on College Pal. Visit us at College Pal – Connecting to a pal for your paper