Can you do my Banking/Criminal Justice Papers

Here you go. see attachments

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Payment for Zyn Camus

Work already done. Don’t bother.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

FIN508 corporate finance homework

What is the purpose of learning the time value of money mathematics?

What are the factors that affect the components of interest rates?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

how does one pay for work here..i need help!

1.5 hrs deadline please. i am fixed- i will deliver the data set table via email.

 

Create a 700-word report in which you do the following:

  • Explain why this is (or is not) a suitable sample of quantitative data for the business scenario.
  • Evaluate the factors that would affect the validity of the data set.
  • Evaluate the factors that would affect the reliability of the data set.
  • Explain the steps you took to arrive at your conclusion about validity and reliability.
  • Display the data set in a chart
  • Explain briefly why that chart type was selected
  • Calculate the measures of central tendency and variability (mean, median, mode, standard deviation) for the data.
  • Explain the steps you followed to come your answer.
  • Interpret the measures of central tendency and variability. What are three conclusions you can draw based on the data analysis
 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

FOR ARISTOTLE ONLY HOMEWORK ASSISTANCE 3

Aristotle

 

Below is another assignmet that I would like your assistance with. Thanks for all your help!!! 

 

Using the guidelines in Chapter 7 design an experiment that could test one of your hypotheses for your research project. Then in the format of an APA style essay answer or do the following:

 

  1. Describe your hypothesis and justify why an experiment is the best for answering this question (see esp. p. 181). Describe what your independent and dependent variables are. Note that a survey is not the same as an experiment.
  2. Is your experiment based around everyday life, a natural experiment, or is it more systematic?  If  so,  what kind of comparison is it? Justify your answers
  3. How will you assign participants?
  4. Describe your experimental design
  5. Describe how you will protect your experiment’s internal and external validity.

Format:

Your paper must be at least 1000 words (approx. 4 pages , Times New Roman, double spaced)

APA format with a correctly formatted title page

Correctly formatted page numbers

Double spaced

No extra spaces between paragraphs

Include a works cited page and use internal citation with page numbers

Failure to use the format perfectly could result in a loss of a letter grade

 

V/r

AV102

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Business Statistics MAT510

The experiment data in below table was to evaluate the effects of three variables on invoice errors for a company. Invoice errors had been a major contributor to lengthening the time that customers took to pay their invoices and increasing the accounts receivables for a major chemical company. It was conjectured that the errors might be due to the size of the customer (larger customers have more complex orders), the customer location (foreign orders are more complicated), and the type of product. A subset of the data is summarized in the following Table.

 

Table: Invoice Experiment Error

Customer Size

Customer Location

Product Type

Number of Errors

15

+

18

+

6

+

+

2

+

19

+

+

23

+

+

16

+

+

+

21

Customer Size: Small (-), Large (+)

Customer Location: Foreign (-), Domestic (+)

Product Type: Commodity (-), Specialty (=)

 

Reference: Moen, Nolan, and Provost (R. D. Moen, T. W. Nolan and L. P. Provost. Improving Quality through Planned Experimentation. New York: McGraw-Hill, 1991)

 

Use the date in table above and answer the following questions in the space provided below:

1.      What is the nature of the effects of the factors studied in this experiment?

2.      What strategy would you use to reduce invoice errors, given the results of this experiment?

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

The purpose of every electronic business is to utilize technology in a way that enhances communication and the company profitability. B2B technology enchances efficiency within the company’s supply chain, whereas B2C also known as e-commerce, technologies

cont.

 would facilitate a transaction between a company and its consumers. Also examine how e-commerce interacts with the maketing department of the organization.Keep in mind that this is the first step towanrds establishing the foundation for yourbusiness presence on the Internet with an e-commerce site.

 

 

                                                 3 Paragraphs with References

 

1.) Research the library and provide at least 2 sources that illustrate examples of companies that are utilizing e-business strategies ( e.g., B2B, and B2C).

 

2.)What are several B2B technologies and applications. Explain.

 

3.What are several methods of B2C technology that you must utilize as part of an e-business strategy? Explain.

 

4. Provide specific examples to support your points in your post.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

Help with HCA/375 Assignment

Adverse Event Reporting

Read Chapters 5, 6, and 7 in our textbook. After reviewing this week’s required reading, consider the following scenario: You are the lead of the risk management team that has been assigned to evaluate an incident that has occurred. You will be preparing a report for the CEO of the hospital that includes all system failures that contributed to the adverse event as well as utilizing a CQI tool. You will be using the Adverse Event template to complete the three parts to the assignment. Note: If you have responded substantively to each of the content items within the three parts of the assignment, the paper should be between six and seven pages.

Part One: Description of Adverse Event (Complete Part One of the Adverse Event template)

  • Choose an adverse event from the following list:
    • Medication error
    • Patient falls
    • Post-operative hemorrhage
      • Data – Patient Safety Event For XYZ Hospital for 20XX through 20YY
                    # of Discharges         # of Surgical Cases            # of Medication Errors            # of Patient Falls            # of Post Operative Hemorrhage           
   20XX  20YY  20XX  20YY  20XX  20YY  20XX  20YY  20XX  20YY
Jan 
 1200 1400  200   240  300  350 38  35 
 Feb  1278  1450  213  250  289  370  42  40  1  2
 Mar  1389  1540  250  300  300  385  37  45  3  2
 Apr  1199  1800  200  245  289  412  36  65  2  3
 May  900  1768  159  289  215  404  40  70  1  3
 Jun  1000  1690  173  285  215  398  46  65  1  2
 Jul  1200  1100  215  200  278  246  50  45  2  1
 Aug  1239  978  240  158  301  241  53  40  2  3
 Sep  1000  1089  198  200  275  215  48  51  3  2
 Oct  789  978  150  248  241  251  38  52  2  1
 Nov  980  1000  175  209  230  231  42  47  2  1
 Dec  700  980  145  215  200  235  25  43  3  1

 

  • Note: The number of beds and operating rooms increased effective 1/1/20YY.
  • Describe the adverse event, including who was involved in the event.
  • For your selected adverse event, graph the data for the two years. Analyze the data by determining if the frequency is increasing or decreasing. What factors could be attributed to the change?
  • Discuss the communication techniques/methods utilized to inform the staff of the adverse event.
  • Describe at least two operational or safety processes that might not have been followed that contributed or caused this event to take place. For instance, describe any regulations or procedures that the professional organization and/or accrediting agency measures compliance with the standard.
  • Graph two years of data for your selected adverse event and analyze the data by determining if the frequency is increasing or decreasing.
  • What factors could attribute to the change in data over two years?
  • Summarize the historical and contemporary issues and legal implications related to patient safety in your chosen adverse event.
  • Describe how processes of continuous quality monitoring could impact the adverse event you chose.

Part Two: CQI Tool (Complete Part Two of the Adverse Event template)
Choose a CQI Tool that best suits your chosen Adverse Event from the following list:

  • Flowchart
  • Fishbone Diagram (Cause & Effect)
  • Pareto

Use the CQI Tool to illustrate the use of the tool with your chosen adverse event. You will be responsible for creating the CQI Tool, completing the tool, taking a screenshot, and copying/pasting the screenshot under the instructions in Part Two CQI Tool in the Adverse Event template.

Part Three: Future Prevention (Complete Part Three of the Adverse Event template
After describing the event in Part One and using a CQI tool in Part Two, apply the PDCA model to summarize the process and steps that your team would recommend to the CEO to prevent this adverse event from reoccurring. Make sure to include who (health care personnel) would be accountable at each step of the process. Complete the Explanation column in Part 3 of the Adverse Event template.
It is important to keep in mind that some processes require a checks and balance system. You will need to determine if one of the steps you are recommending would require a checks and balance step and why it is necessary. 

Paper Requirements: 
The Paper must be six to seven pages in length (excluding title and references pages) and should demonstrate understanding of the reading assignments, class discussions, your own research, and the application of new knowledge. Excluding your textbook and course readings include a minimum of four scholarly, peer-reviewed sources. Two of these sources must be from the Ashford University Library and must have been published within the past five years. An APA formatted reference page is required. Your responses within the document provided must be substantive, and include complete sentences in paragraph format, including citations per APA format. Refer to the Ashford Writing Center for information on APA guidelines.

Carefully review the Grading Rubric for the criteria that will be used to evaluate your assignment.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"

cyber security

Question 1 of 20
5.0 Points
The court decision that defined obscenity as being a work that “taken as a whole, lacks serious literary, artistic, political, or scientific value” is:

A. Roth v. United States.
 
B. FCC v. Pacifica Foundation.
 
C. Miller v. California.
 
D. Furman v. Georgia.
 

Reset Selection

Question 2 of 20
5.0 Points
Which of the following Supreme Court cases, affecting all subsequent obscenity rulings since, held that the state has a “compelling interest” in protecting the welfare of children?

A. Roth v. United States
 
B. FCC v. Pacifica Foundation
 
C. Miller v. California
 
D. Regina v. Hicklin
 

Reset Selection

Question 3 of 20
5.0 Points
Which of the following acts first attempted to protect families and children from online sexually explicit acts?

A. Telecommunications Reform Act of 1996
 
B. Child Pornography Prevention Act of 1982
 
C. Child Protection Act of 1984
 
D. Protection of Children Against Sexual Exploitation Act of 1977
 

Reset Selection

Question 4 of 20
5.0 Points
In an effort to tighten prohibitions at the Federal level against child pornography, what did Congress introduce that eliminated the obscenity requirement established in Miller v. California?

A. Telecommunications Reform Act of 1996
 
B. Child Pornography Prevention Act of 1982
 
C. Child Protection Act of 1984
 
D. Protection of Children Against Sexual Exploitation Act of 1977
 

Reset Selection

Question 5 of 20
5.0 Points
Without question, the single most important court decision regarding state prohibitions of child pornography is:

A. New York v. Ferber.
 
B. Miller v. California.
 
C. Stanley v. Georgia.
 
D. Osborne v. Ohio.
 

Reset Selection

Question 6 of 20
5.0 Points
The Supreme Court has said that states have more leeway in the regulation of pornographic depictions of children than in the regulation of obscenity because:

A. the Supreme Court has no jurisdiction over state lawmaking.
 
B. the use of children as subjects of pornographic materials is harmful to the mental health of the child.
 
C. no obscenity statute has ever been upheld by the Supreme Court.
 
D. most state constitutions do not allow for freedom of expression.
 

Reset Selection

Question 7 of 20
5.0 Points
What replaced the “Protection of Children Against Sexual Exploitation of 1977” act?

A. The Omnibus Crime Control Bill
 
B. Title 18 of the United States Code
 
C. The three pronged test of Cahill v. Utah
 
D. The Child Protection Act of 1984
 

Reset Selection

Question 8 of 20
5.0 Points
Which of the following was enacted in anticipation of an explosion of explicit material emerging on the Internet and specifically targets the issue of virtual child pornography?

A. Telecommunications Reform Act of 1996
 
B. Child Pornography Prevention Act of 1996
 
C. Child Protection Act of 1984
 
D. Protection of Children Against Sexual Exploitation Act
 

Reset Selection

Question 9 of 20
5.0 Points
What court struck down most of the Child Pornography Prevention Act, saying that it was unconstitutional to the extent that it proscribed computer images that did not involve the use of real children in their production or dissemination?

A. The Eleventh Circuit Court of Appeals
 
B. The Sixth Circuit Court of Appeals
 
C. The Eighth Circuit Court of Appeals
 
D. the Ninth Circuit Court of Appeals
 

Reset Selection

Question 10 of 20
5.0 Points
What issue, of interest to computer crime prosecutors, has not yet been ruled upon by the United States Supreme Court?

A. Whether the First Amendment will be applicable to Internet communications
 
B. Legislation dealing with technologically generated computer images
 
C. The continuation of the exclusionary rule
 
D. Whether Congress can pass laws prohibiting child pornography
 

Reset Selection

Question 11 of 20
5.0 Points
The probable cause requirement of the Fourth Amendment:

A. is based on a “reasonable person” standard.
 
B. does not apply if you have a warrant.
 
C. does not apply in computer crimes.
 
D. applies only when police get a warrant.
 

Reset Selection

Question 12 of 20
5.0 Points
The Electronic Communications Privacy Act of 1986 gave individuals more protection than the Fourth Amendment because:

A. the Fourth Amendment does not apply to state police, it only applies to federal authorities.
 
B. statutory law is more binding than case law.
 
C. it applies to all individuals, not just those acting on behalf of the government.
 
D. it makes the “equal protection” clause of the Fourteenth Amendment applicable to the states.
 

Reset Selection

Question 13 of 20
5.0 Points
One failing of the Electronic Communications Privacy Act of 1986 is that:

A. it was found to be “arbitrary and capricious” by the Ninth Circuit.
 
B. it only extends to communications which affect interstate or foreign commerce.
 
C. jurisdictional issues render it impossible to enforce.
 
D. it expires by operation of law in 2006.
 

Reset Selection

Question 14 of 20
5.0 Points
Which act requires manufacturers of telecommunications equipment and service providers to develop systems which provide the capability for surveillance of telephone and cellular communications, advanced paging, satellite-based systems, and specialized mobile radio?

A. CALEA
 
B. ECPA
 
C. PPA
 
D. Harrison Communications Act of 1997
 

Reset Selection

Question 15 of 20
5.0 Points
Which of the following is TRUE concerning search warrants?

A. Contraband cannot be seized unless it is specifically mentioned in the warrant.
 
B. Federal law enforcement authorities are not required to get search warrants.
 
C. The warrant must describe with particularity the places to be searched and the items to be seized.
 
D. A search warrant can only be obtained from a federal judge.
 

Reset Selection

Question 16 of 20
5.0 Points
Lawrence decides to have a few friends over for a cookout. While he is outside flipping burgers on the grill, one of his guests goes inside Lawrence’s house and starts looking through the files on his computer without Lawrence’s permission. He finds pornographic pictures that Lawrence has made of some of the neighborhood kids. Although he is not affiliated with law enforcement in any way, the guest feels it is his civic duty to copy the files onto a disc and turn them over to the police. Lawrence is arrested. Lawrence tells his lawyer that his Fourth Amendment rights have been violated because the search and seizure was unreasonable. This argument is:

A. not valid. Since computer evidence can be destroyed easily and quickly, exigent circumstances dictated that no warrant was necessary.
 
B. valid because there was no probable cause for the guest to have searched the computer prior to his doing so. Any evidence found must be excluded.
 
C. valid because a warrant was necessary to seize the files.
 
D. not valid because no Fourth Amendment protection exists for searches conducted by someone acting independently absent direction from the government.
 

Reset Selection

Question 17 of 20
5.0 Points
Not all searches require a search warrant. For example, a consent search does not require a warrant if which of the following requirements is met?

A. The person giving the consent must have the proper authority over the area to be searched and is legally capable of granting such access.
 
B. It can be shown that a magistrate or judge was unavailable.
 
C. It can be shown that those conducting the search checked with the U.S. Attorney’s office before proceeding.
 
D. The person giving the consent must be advised beforehand that any evidence seized can be used in a court of law against him and that he has the right to an attorney before the search takes place.
 

Reset Selection

Question 18 of 20
5.0 Points
The police obtain a search warrant to go to Harry’s house and look for stolen computers. They serve the warrant and, once inside, begin their search. While on the scene, one of the officers sees a bag of marijuana in plain view on Harry’s coffee table. He immediately knows it is marijuana, based on his 10 years of experience as a drug officer. The evidence is seized, and Harry is charged with possession of marijuana. Was the seizure of the marijuana valid under the Fourth Amendment?

A. Absolutely not. The Fourth Amendment requires that the object of the search be described with particularity. Since the police had no probable cause to search for drugs, and it wasn’t mentioned in the warrant, they exceeded the bounds of the warrant, and the exclusionary rule will require that the evidence be thrown out.
 
B. Absolutely. The police were acting in a lawful manner by being in the house to serve a search warrant. Since they were legally on the scene, anything in plain view which is obviously evidence of any crime can be seized and will be admissible in Harry’s trial.
 
C. Absolutely not. Unless the officer who seized it is a drug identification expert and tested the material, there is no way that the officer can know for certain that the item was in fact marijuana. The motion to suppress this evidence will be granted by the judge.
 
D. Absolutely. Marijuana is contraband, and it is illegal to possess it. As such, there are no Fourth Amendment protections. Regardless of whether the police were in an area where they were legally entitled to be or not, this evidence can be seized and will be admissible in court at Harry’s trial.
 

Reset Selection

Question 19 of 20
5.0 Points
A computer crime investigator looks for suspected child molesters by going to a live chat room on the Internet. She does not identify herself as a police officer. In fact, she does not say anything at all but remains silent in the chat room. If she is able to obtain enough evidence to use against a molester to build a case against him, what will most courts likely say about her methods? (Assume for the purposes of this question that the court in question is not the Ninth Circuit Court of Appeals.)

A. Most courts will likely say that a wiretap was required prior to obtaining any evidence.
 
B. Most courts will likely say that the molester had a reasonable expectation of privacy since the officer did not say anything and the molester did not know she was there. Therefore, any evidence collected will be excluded.
 
C. Most courts will likely say that no warrant was required. Since the officer could read the offending words on her screen, they are considered to be in “plain view” and are thus exempt from the warrant requirement of the Fourth Amendment.
 
D. Most courts will likely say that there is no expectation of privacy in an Internet chat room since others are likely to visit there. Therefore, no warrant is necessary.
 

Reset Selection

Question 20 of 20
5.0 Points
Generally, it can be said that because the courts recognize the difficulty of detection and prosecution of cyberspace child pornography, they tend to:

A. give child pornographers the harshest possible sentences.
 
B. rule consistently from court to court.
 
C. give child pornographers sentences far less than those provided for under law.
 
D. fail to agree on the appropriateness of traditional investigative techniques.

 

"Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!"