Case Study on Moral Status

Based on “Case Study: Fetal Abnormality” and the required topic study materials, write a 750-1,000-word reflection that answers the following questions:
1) What is the Christian view of the nature of human persons, and which theory of moral status is it compatible with? How is this related to the intrinsic human value and dignity?
2) Which theory or theories are being used by Jessica, Marco, Maria, and Dr. Wilson to determine the moral status of the fetus? What from the case study specifically leads you to believe that they hold the theory you selected?
3) How does the theory determine or influence each of their recommendations for action?
4) What theory do you agree with? Why? How would that theory determine or influence the recommendation for action?

Sample Solution

The post Case Study on Moral Status appeared first on homework handlers.

The importance of the legislator/nurse’s role as advocate

Choose a legislator on the state or federal level who is also a nurse and discuss the importance of the legislator/nurse’s role as advocate for improving health care delivery. What specific bills has the legislator/nurse sponsored or supported that have influenced health care.

Sample Solution

The post The importance of the legislator/nurse’s role as advocate appeared first on homework handlers.

John Miller owns a lawn service

John Miller owns a lawn service and tracks all charges for mowing, landscaping, tree trimming, and other services in a database. Some customers are eligible for discounts. You have been asked to create a new table that tracks customer payments and to create queries that will help John with decision making.

In tblPayments, make the following changes to the field properties: Forthe field PmtID, add a custom format to display PMT before the IDnumber and make it the primary key with new values in sequentialincremental order. For the CustID, create a Lookup field using thetblCustomers table, including the fields CustID, CustLastName, andCustFirstName. Sort in Ascending order by CustID and hide the keycolumn. Add Customer as the caption. For the PmtMethod field,create a lookup field that lists the following values: Cash, Check,MasterCard, Visa, American Express, and Discover. Limit the user’sselection to what is on the list. Add the caption Method.
Enter the following data in tblPayments:
CustID ScheduleID PmtAmount PmtDate PmtMethod
Anderson 5 $225 3/3/2018 American Express
Saunders 6 $75 5/20/2018 Visa
Wong 7 $950 5/5/2018 MasterCard
Mead 8 $175 4/30/2018 Visa
Fowler 10 $85 4/12/2018 Visa
Sanders 11 $75 3/13/2018 Visa
Create a one-to-many relationship between ScheduleID in tblScheduleand the ScheduleID in tblPayments and enforce referential integrity.
Create a query that calculates any customer discounts on eachservice. Display CustFirstName, CustLastName, ScheduleID,ServiceDate, DiscountType, a field to display the discount amountnamed DiscountAmt, and a field that displays the actual amount duenamed AmtDue in the query. The LawnMember discount is 10%. TheReferral discount is 25%. The Contract discount is 20%. Only displayservices that receive a discount. Save the query as qryDiscounts.
Create a query that finds all services scheduled between 4/1/2018 and 5/31/2018. The query results should display ScheduleID, ServiceDate, PmtAmount, PmtDate, and PmtMethod. Show only the customers who paid with Visa. Sort in Ascending order by PmtAmount. Save the query as qryVisaDates
Create a Top Values query that displays the 10 highest service rates being charged to customers. The query results should display CustFirstName and CustLastName and ChargeAmount. Save the query as qryTopValues

Sample Solution

The post John Miller owns a lawn service appeared first on homework handlers.

Risk assessment portion of the information assurance plan

Submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?

Specifically, the following critical elements must be addressed:

III. Risk Assessment

a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.
b) Evaluate the threat environment of the organization.
c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most important areas for improvement to current protocols and policies?
d) Assess the threats to and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

Sample Solution

The post Risk assessment portion of the information assurance plan appeared first on homework handlers.