The creation of a weak acid titration plot is described in chapter 10-5 of your technique book. A generic…

The creation of a weak acid titration plot is described in chapter 10-5 of your technique book. A generic four-step procedure is given. Rewrite the four steps to be a specific prcedure to be used to titrate a sample of potassium hydrogen phthalate (MM 204.22 g/mol) using the NaOH soluiton you will prepare.
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Some calculus and probability

file enclosed… Moment Generating Function Differentiable function Differential Equations
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Homework Question

Week 3 Discussion

 

Theory in Action: Humanistic/Existential Applications

Human beings often place blame on people and forces outside of themselves. “Ever since I was fired from my job, I have experienced high levels of anxiety.” “My parent’s divorce caused me to abuse drugs at an early age.” In both of these statements, the blame is given to an external force. Humanistic and existential counselors ask clients to look internally to explore the meaning in these situations. By employing interventions that focus on growth, acceptance, and self-awareness, counselors address the root cause of a client’s problems. In addition, focusing on the person and not the disease or addiction can empower clients to take responsibility for their choices and their lives.

In this Discussion, you use this week’s media to continue your exploration of humanistic and existential theories.  In addition, you select one presentation that depicts a theory that resonates with you the most. Watch your selected media in its entirety, carefully observing the interactions of both the client and the counselor.  Then, imagine you had not known the counselor’s theoretical approach before accessing the media. Without this knowledge, how might you use his or her actions or interventions to identify the theory that he or she is applying?

When developing your Discussion post, support your ideas by providing references to specific examples from the video. In addition, cite the video frame (e.g. 8.32 minutes) that the action or intervention occurred. You do not need to summarize the demonstration itself, as your instructor and many of your colleagues have also viewed it. Instead, provide insight into the interventions used and major constructs of the theory.
Post by Day 3 a brief description of the video you selected and the theoretical approach used. Explain how this theory resonates with you. Then, describe the counselor’s specific interventions that would indicate his/her theoretical approach and explain how effectively they demonstrated the approach. Finally, share one insight you gained from watching the counselor in the media.  

Respond by Day 5 to at least two of your colleagues using one or more of the following approaches:

·         Identify colleagues who selected a different theory than you. Critically appraise your colleagues’ critique of the counselor’s actions.

·         Provide insight into how another humanistic/existential theory could have been used to address this client.

 

·         DUE BY 12/16/[email protected] 5PM EASTERN STANDARD TIME

Week 3 Learning Resources

 

This page contains the Learning Resources for this week. Be sure to scroll down the page to see all of this week’s assigned Learning Resources.

Required Resources

Note: To access this week’s required library resources, please click on the link to the Course Readings List, found in the Course Materials section of your Syllabus.

Readings

·    Capuzzi, D., & Gross, D. R. (Ed.). (2011). Counseling and psychotherapy: Theories and interventions (5th ed.). Alexandria, VA: American Counseling Association.

o    Chapter 6, “Existential Theory” (pp. 119–142)

o    Chapter 7, “Person-Centered Theory” (pp. 143–166)

o    Chapter 8, “Gestalt Theory” (pp. 167–191)

Note: This week’s chapters are for review, as they are the same as assigned for Week 2.

·         Document: Analyzing Counseling Theories (Word document)

Note: This document will be used for the completion of this week’s Assignment.

Media

·         Psychotherapy.net. (Executive Producer). (2008). Existential-humanistic psychotherapy [Video]. Retrieved from the Walden Library databases.

Note: The approximate length of this media piece is 108 minutes.

 

·         Psychotherapy.net. (Executive Producer). (2008). Person-centered expressive arts therapy [Video]. Retrieved from the Walden Library databases.

Note: The approximate length of this media piece is 118 minutes.
There is not a video for Gestalt therapy in this video series.

 

Week 3 Assignment

Application: Analyzing Counseling Theories

Theories help to build the foundation for almost all the actions you will engage in as a counselor. In fact, there might be one or more theories guiding your work without your conscious effort to actually use them. Employing an integrative approach allows counselors to utilize a wide variety of interventions and techniques to best address the needs of clients. Although it is common for many counselors to be influenced by one theory more than others, it is imperative that you are mindful of the ways each theory can contribute to your overall theoretical approach.

The Assignments in this course will support you in your efforts to successfully identify, apply, and evaluate theories. In each “Analyzing Counseling Theories” Assignment, you complete a 1-page chart and a 1-page reflection on two of the many theories discussed each week. When selecting your theories, think about how these theories could help to drive your work as a scholar-practitioner who effects social change. At the conclusion of this course, your completed Assignments will become a useful resource that can assist you as you progress through this program and your professional career. Download the chart template, “Analyzing Counseling Theories” from this week’s Learning Resources to begin your Assignment.

Part 1: Chart

·         Use the chart template to analyze counseling theories.

·         Select two theories from this week’s Learning Resources

·         Describe the background theory, human nature, major constructs, applications, and evaluations of each counseling theory.

Part 2: Reflection (1-page)

·         Describe a specific population of clients with whom you hope to work in the future.

·         Explain which of the two theories in your chart would be the most effective in working with this client population and explain why.

·         Describe the interventions you would suggest from this theory and how these interventions would assist this client population in reaching counseling goals.

 DUE BY 12/19/[email protected] 5pm EASTERN STANDARD TIME

 

 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Privacy Implications of OPEN Data computer science homework help

Short Newsletter Item: Privacy Implications of OPEN Data 

Write a short “newsletter” article (3 to 5 paragraphs) for non-technical managers to tell them about the potential privacy implications of the U.S. federal government’s OPEN Data initiatives.

Identify and discuss 3 or more specific types of OPEN Data which could impact the privacy of individuals and companies. See http://www.data.gov for examples.

If you need help getting started thinking about privacy and open data, use this Google search: https://www.google.com/search?q=open+data+privacy+implications

Since this article is for a newsletter, you may use an informal but professional tone (address the reader as “you,” use “we” and “our” to refer to the organization’s perspective).

Provide in-text citations and references for
3 or more authoritative sources. Put the reference list at the end of your article.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

igital Government services Critical Analysis Discussion help

One question for tonight is How will your administration ensure that Digital Government services are secure?. 1.1

“There is increasing digitalization in citizens’ lives and the business world, with the growing expectation of more online transactions. Changes in the political, societal and economic realms are driving government leaders to rethink how they design and deliver public services for the future.” (1) Because of this Digital Government service is needed.

Several parts of Government needs protection, and the government networks are far behind the competition. Digital government service is how the government will take itself into the 21st century. There are three strategy’s that they will use to do this. The first is to Enable the American people and an increasingly mobile workforce to access high-quality digital government information and services anywhere, anytime, on any device. (2)  The second is to “Ensure that as the government adjusts to this new digital world, we seize the opportunity to procure and manage devices, applications, and data in smart, secure and affordable ways.” (2) This is a way that the government will move away from inefficient, costly and wasteful policies from the past. And Third is to “Unlock the power of government data to spur innovation across our Nation and improve the quality of services for the American people.”(2) The primary reason is to streamline the management and increase transparency.

Within the last few years, there have been several data breaches within the federal government. The most damaging breach has taken place under the current administration with the OPM breach which happened back in June 2015. There were two attacks; the first arrived first in early 2014 than in Dec 2014. “After months of investigation, it was confirmed that the theft of federal employee information expanded to affect as many as 22,100,000 current and former employees. The breach accessed information like, “applicants’ financial histories and investment records, children’s and relatives’ names, foreign trips taken and contacts with foreign nationals, past residences, and names of neighbors and close friends”—all taken from the 127-page SF-86 forms”.(3) Securing our networks is a top priority of the government do to breaches and other countries wanting the information that we have.

Securing our networks against all threats foreign and domestic is a priority that we need to establish. We have insider threats which are hard to detect like Edward Snowden who stole classified information and gave it to other countries. Another threat, organized hacking groups like Anonymous and LULZ which are cyber groups who hack systems for political and personal gain. Then you have the nation-state hackers who work for their government and hack into other government’s networks. These are real threats to our country systems.

With all the information that was discussed here, the question remains: How will your administration ensure that Digital Government services are secure?

Digital Government Services Summary – Accenture Business Service. Retrieved September 07, 2016, from https://www.accenture.com/us-en/service-acn-digital-government-services

Digital Government: Building a 21st Century Platform to Better Serve the American People. (n.d.). Retrieved September 07, 2016, fromhttps://www.whitehouse.gov/sites/default/files/omb/egov/digital-government/digital-government.html

Walters, R. (2015, November 19). Continued Federal Cyber Breaches in 2015. Retrieved September 07, 2016, from http://www.heritage.org/research/reports/2015/11/continued-federal-cyber-breaches-in-2015

2. Digital Government is fast becoming the new trend as the technological world moves forward.  As the government changes how it releases information to the public, so does the security of the delivery methods.  The general population is now able to go on their home computer and pull up thousands of data collection offered by the government under the Digital Government Services initiative.

Digital Government services are information and data offerings made public by the federal government in an easy and accessible format (White House, n.d.).  These services can range from open data collection to mobile applications.  With anything that becomes easy and accessible, there is another element that comes with it as well – threats.  A threat can be described as an unauthorized person or person that are attempting to access internal resources from either internal networks or from the internet (ICS-CERT, n.d.).  Threats have migrated from their norm into advanced persistent threats (APT) in the recent years.  Gone are the days of an attacker coming and going like the wind.  They are more focused now and stay hidden within the target network for months or even years (FireEye, n.d.).  In the past, some agencies that have made their information available to the public have been compromised, such as the State Department, White House, and the United States Postal Service (Storm, 2014).  These compromises are of the serious nature because the attackers exploited privacy information from compromised systems.  One glaring mistake is that the incident response plan was not initiated are published properly across the impacted organization.  The response time and lack of incident response plan activation during the threat events have been the exact reason why the administration has fallen short on protection.   

  Identifying threats and addressing them quickly can mean the different between thousands of private records being stolen and only a few.  Digital Government services are making the need for data security more important than ever.  Threats can come from anywhere, including insider threats, which are becoming more sophisticated by the second.  Securing Digital Government services through the use of fast and reliable incident response is paramount. 

References:

FireEye. (n.d.). Anatomy of an APT (Advanced Persistent Threat) Attack | FireEye | FireEye. Retrieved September 06, 2016, from https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html

ICS-CERT. (n.d.). Cyber Threat Source Descriptions. Retrieved September 06, 2016, from https://ics-cert.us-cert.gov/content/cyber-threat-source-descriptions

Storm, D. (2014). List of hacked government agencies grows: State Department, White House, NOAA & USPS. Retrieved September 06, 2016, from http://www.computerworld.com/article/2848779/list-of-hacked-government-agencies-grows-state-department-white-house-noaa-and-usps.html

White House. (n.d.). Digital Government: Building a 21st Century Platform to Better Serve the American People. Retrieved September 06, 2016, from https://www.whitehouse.gov/sites/default/files/omb/egov/digital-government/digital-government.html

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Inequalities

 

Inequalities

 

Read the following instructions in order to complete this assignment, and review the example of how to complete the math required for this assignment:

Read the article about Body Mass Index (BMI) on page 151 of Elementary and Intermediate Algebra. Use the formula given using pounds and inches for finding the BMI at the end of the first paragraph in order to find the four intervals the article mentions:

 

17 < BMI < 22      might have a longer life span than average 

 

23 < BMI < 25      probably not overweight

 

25 < BMI < 29.9   probably overweight 

 

     BMI > 30       obese

You will use your height to plug into the formula to solve for W, the weight range that will go with each category. You may prefer to solve the formula for the variable W before plugging in values, which is fine.

Write a two to three page paper that is formatted in APA style and according to the Math Writing Guide. Format your math work as shown in the Instructor Guidance and be concise in your reasoning.  In the body of your essay, please make sure to include:

 

Your solution to the above problem, making sure to include all mathematical work

 

A discussion on the computed weight ranges and some reasons why they could be misleading

 

An evaluation of the regions outside of the “probably not overweight” range using both set notation and interval notation. Include a simple graph of the regions. (See Instructor Guidance example for some ideas of how to do this.) 

 

The incorporation of the following five math vocabulary words into your discussion. Use bold font to emphasize the words in your writing (Do not write definitions for the words; but integrate them into your discussion.):

 

Inequality 

 

Equivalent 

 

Compound inequality 

 

Interval 

 

Infinity

 

My height=5’7″ or 67 inches 

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Major Debates over Macroeconomic Policy assignment help

Select one bullet subject from the following list of topic combinations and write a 1,050-word analysis:

  • Active monetary and fiscal policy

*****Increased government spending to fight recessions*****

  • Reducing federal government’s discretionary powers
  • Balanced government budget

Present both the advocates’ position and the critics’ position

****increased government spending to fight recession**** This one is the chosen one.

Your part is Advocates Position****

***200-250 Words***

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

1.Complete NaOH + ? ->NaHCO3C+4HNO3->CO2 + 4NO2 + ?? +CO2 -> Na2CO3CO2 ? -> H2CO32. Please specify contained on whose…

1.Complete NaOH + ? ->NaHCO3 C+4HNO3->CO2 + 4NO2 + ? ? +CO2 -> Na2CO3 CO2 ? -> H2CO3 2. Please specify contained on whose molecular formula is: a) CO2 b) (NH4)2CO3 c) MgCO3 d) Al2 (CO3)3 f) NaHCO3 Find valence of carbon in each of them. 3.Write formulas of substances a) Barium carbonate b) hydrogen carbonate magnesium c) potassium carbonate d) carbonic acid
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

A square chunk of plastic has a length of 5 cm, width of 5 cm, and a height of 5…

A square chunk of plastic has a length of 5 cm, width of 5 cm, and a height of 5 cm. It has a mass of 200 g. What is it’s density?
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"