Annotated Bibliography 2 Each student will be responsible for completing 3 annot

Annotated Bibliography 2
Each student will be responsible for completing 3 annotated bibliography assignments throughout the semester.  For each assignment, you are required to read two articles and complete an annotated bibliography for each article (scholarly/peer-reviewed journal articles). See syllabus for example. 

The post Annotated Bibliography 2
Each student will be responsible for completing 3 annot
appeared first on homework handlers.

TOPIC: Explain and characterize the changes in the standard rule-of-nines for bu

TOPIC: Explain and characterize the changes in the standard rule-of-nines for burns involving children.
For this assignment, you will produce a 4–7 minute audio-video presentation on your chosen topic. 
In your presentation, include the following:
Include at least one type of visual aid in your presentation such as PowerPoint slides, diagrams, white board use, etc.
You are expected to explain the processes or concepts in your own words using references to support your explanations. Include a reference list at the end and cite references verbally or with on screen citations.
Use appropriate master’s level terminology.
Include all necessary physiology and/or pathophysiology in your explanation.
Use detailed explanations to teach or explain. Your audience is your classmates and professional colleagues.
Reference a minimum of two sources; you may cite your etext as a source. Use APA format to style your visual aids and cite your sources. Include a reference page in your video.
Your presentation must include both audio and visual components and be professional in nature.

The post TOPIC: Explain and characterize the changes in the standard rule-of-nines for bu appeared first on homework handlers.

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
First of all, each part of incident response is absolutely crucial, and the effectiveness of the greatly diminishes if one of them is missing. Now it could also be noted that some of the steps would actually be impossible without another previous step. On that logic, I am going to pick incident identification. Without incident identification, none of the other steps will be completed or completed efficiently. In this stage a list of questions are asked and answered through investigation. Questions like: What actually happened? What was compromised? Is this a hack or not? Does this attack cease normal operations? When did it take place? Who discovered it? What is the origin of the attack? What is the type of attack? What malware was used in the attack? As this is the first phase upon discovering the incident, all the different people will be contacted according to the response plan. While investigating there must be no corruption of any evidence. The initial investigators will determine what is all compromised and classify the incident with threat levels. It needs to be determined if the law, shareholders, lawyers, or customers need to be contacted based off of the findings. There will be a lot of documentation throughout this process as well. This is all very important, because everything following this will be executed on the knowledge gained in this stage. How well the investigation stage is done and what needs to change will be brought up later in the debriefing and feedback stage, so that it can improve.
Jaron
2015. SAMPLE INFORMATION SECURITY INCIDENT RESPONSE PLAN. [ebook] ePlace Solutions, Inc. Available at: [Accessed 20 August 2020].
RESPONSE 2:
When considering the phases of incident response, we have incident identification, triage, containment, investigation, analysis and tracking, recovery and repair, and debriefing and feedback. They are, in their own right, all very important steps in the process, but some of the most crucial phases in my opinion are incident identification, containment, and debriefing and feedback. 
Incident identification – This step is one of the most important simply for the fact that you cannot react until you know there is a problem. Unfortunately, a lot of the time this work is reactionary instead of proactive. Having skilled people who are able to identify a potential problem early enough to stop large potential damage.
Containment – This step is also important because it is paramount to remove the compromised device from communication with any device that it could potentially effect as early as possible. Along with incident identification, containment of a threat will likely eliminate a potentially much larger incident.
Debriefing and feedback – This phase is an incredibly important tool for anybody not in the IT field. Not only is this where you will inform your higher ups the results of your work, but this is also where you can look back at the incident non objectively and poke holes in the process. This is where you can look for what went well, what did not, and what can be improved upon in the future. Using this step to educate users on detection techniques and basic safety precautions to reduce risk of damage could help prevent incidents in the first place.
Chris

The post Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES appeared first on homework handlers.

By Day 5 Respond to at least two of your colleagues’ postings. Write a 1- to 2-p

By Day 5
Respond to at least two of your colleagues’ postings. Write a 1- to 2-paragraph response in which you complete the following:
State whether or not you agree that your colleague’s recommendation is a good one.
If you agree with your colleague’s recommendation, add support to his or her suggestion. If you disagree with your colleague’s recommendation, provide support for your position.
In addition, be sure you cite any references to the Learning Resources.
Refer to the Week 6 Discussion Rubric for grading details.
QUESTION 1
One policy that helps protect yellow stone is the clean water act. This act came out in 1972. The reason for this act was to protect the aiquality. Yellow stone has a class 1 air quality protection.. The reason for this act is to prohibited the distribution of pollutants. This helps keep chemical, physical and biological features of yellowstone. 
by keeping he air and water clean at Yellowstone this helps keep the animal population and plant population at a stable level. Keeping he plants healthy keeps the animals healthy, which in return keeps the cycle of life moving. 
https://www.nps.gov/yell/learn/management/protecting-yellowstone.htm#:~:text=air%20quality%20in%20all%20units,prohibiting%20the%20discharge%20of%20pollutants.
QUESTION 2
One policy that benefits the ecosystem in and surrounding Yellowstone National Park is regulations. Regulations refer to a summary that helps protect the park while visiting to have a safe and enjoyable trip. Some activities prohibited in Yellowstone are hunting or feeding wildlife, removing or possessing natural or cultural resources ( such as wildflowers, antlers, rocks, and arrowheads). (National Park Service 2011). These rules are essential to protect each individual and the team.
Bieschke, states, “In 2013, the National Park Service (“NPS”) promulgated a new rule to regulate the use of snowmobiles and snowcoaches in Yellowstone National Park during the winter months”(Bieschke,B 2011). This is another rule that was implemented at Yellowstone National Park. Also, Hinckley shares, “ Grizzly bears in Yellowstone National Park area saw unprecedented growth this year after being granted protection under the Endangered Species Act (ESA) in 1975, causing many hunting enthusiasts to call”(Hinckley, S. 2015). This is why hunting is not allowed in the part because at some point during certain of the year, there could be some bears hanging around, and that could be very dangerous. So it is my recommendation to know all rules before taken a visit to the Yellowstone National Park so that everyone will have a safe and fun experience.
References
BIESCHKE, B. (2016). Challenging the 2013 Rule Implementing Regulations on Oversnow Vehicle Use in 
Yellowstone National Park. Boston College Environmental Affairs Law Review, 43(2), 541–573.
Hinckley, S. (2015). Why hunting of Yellowstone grizzly bears could resume. The Christian Science Monitor.
National Park Service. (2011). Yellowstone National Park. Retrieved from
http://www.nps.gov/yell/index.htm

The post By Day 5
Respond to at least two of your colleagues’ postings. Write a 1- to 2-p
appeared first on homework handlers.