Conducting The Research: Achievability

APA format (12pt times new roman, double spaced, no spacing between paragraphs)

300 words minimum

minimum of 2 peer reviewed resources

Topic:  A study to determine the factors that leads to people with Chronic Traumatic Encephalopathy cases have increased chances of involving in violent or criminal behaviors in the community


Conducting the Research: Achievability

Discuss obstacles that could potentially hinder the achievability of studying your research problem; that is, factors that might create barriers to accessing, collecting, analyzing and/or reporting data on the problem. For instance, colleagues may be uncooperative or unwilling to participate, the police chief may feel the problem is too sensitive or that the problem does not really exist, etc. There may be barriers to obtaining access to the necessary data. Explain how these barriers could impact the validity and reliability of your proposed study.

Analysis on why and how cash management is important in financial management. 



Please write an essay on one of the two topics below. Your essay should start with an outline, and either MLA or APA style is fine. Using a public company with real financial data to help with your analysis is highly preferred. Three correct citations are required.

Topic 1:  Analysis on why and how cash management is important in financial management.

Topic 2: Analysis on how exchange rate risk plays a role in international trade.

Length: 8-10 pages with double spacing and font size of 11. 

Part One: Agile Software Engineering

Part One: Agile Software Engineering

  1. Study the Agile Manifesto until you have it committed to memory: then write it here. Between each line explain in your own words what each line means and what benefits it provides ( especially benefits leading to the accelerated development and deployment of software.




  1. Describe what test-first development is. Use the following words in your answer: automated, system requirements, implementation, input, and output.



  1. Describe the benefits of User Stories. Use the following words in your answer: elicitation, requirements, test skeleton, release, back log, sprint, and test-first development.


  1. Compare and contrast the Scrum approach to project management with

conventional plan-based approaches as discussed in Chapter 23. Your

comparison should be based on the effectiveness of each approach for

planning the allocation of people to projects, estimating the cost of projects,

maintaining team cohesion and managing changes in project team

















Part Two: System Modeling

  1. Briefly define each of the following: Use the following words at least once in your answers: sequence, use-case, activity
  • Context Models
  • Interaction Models
  • Structural Models
  • Behavioral Models
  • Model-Driven Architecture
  1. Assume your library project has the following features:
  • Search by Dewey number
  • Search by subject
  • Place books on reserve
  • Inter-library loan

Also assume you have defined the following user types

  • Student
  • Professor
  • Research Librarian
  • Technical Librarian/System Administrator

Here is what you need to do (relate these as much as possible to your Library Project): (review chapters 5 and 7)

  • Develop a sequence diagram showing the interactions involved when a professor places a book on reserve.
  • Draw an activity diagram that models the processing involved when a student searches by subject.
  • Draw state diagrams of the control software for an inter-library loan system. This system:
    • Checks local availability
    • Checks avalability elsewhere
    • Automates delivery process



Part Three: Object Oriented Design

7.Using the UML graphical notation for object classes, design object classes, identifying attributes and operations. Use your own experience to decide on the attributes and operations that should be associated with these objects.


Hint: Diagram 7.6 from the book is a good place to start.




Current Issues In Correctional Management

Assignment Content

  1. Write a 700- to 1,050-word paper related to current issues facing correctional managers. Include a discussion of:
    • The impact of gangs and gang violence
    • The impact of illegal drugs and other contraband in correctional settings
    • The impact of gender and transgender-related issues
    • The impact of medical and mental health issues within the correctional population
    • Format your paper consistent with American Psychological Association (APA) guidelines.

      Include a minimum of 3 scholarly references both in the body of your paper as in text citations and on the references page of your assignment.

ECON240 Final Exam Fall 2019

ECON240 Final Exam Fall 2019 –
Do All Problems (note there are 110 points, you will be graded out of 100)
1) 5 pt Wanda’s will power is 25% in convincing people to vote for her. She needs 50% of
the vote to win. Assuming everyone votes, in order for Wanda to win what percentage of
people must already be planning on voting for her?
2) 10pt Paula wants to help plan for environmental protection for the next hundred
years. Her financial expert is currently using a discount rate of 10% to determine the
present value of several different projects. Relative to today, what must the environment
be worth in 100 years to be counted of equal value ? Discuss how realistic this would be.
What would the discount rate have to be so that so that an environment worth twice as
much as today, would be counted as of equal value?
3) 25pt Take the (correct) answers from problem 4 of Homework 8/9, and answer the
i) Assume M = 500, P
f = 25, Pt = 100, and the person starts with no training: What is
the optimal quantity of food, morsel size, number of bites, training, and savoring factor?
ii) What are the optimal amounts if the person started with 4 hours of training?
iii) Assume that training (when not used) atrophies at 2 units of year. Given the answer
for i) and ii) how much would utility decline after one year of atrophy? Does this change
optimal behavior?
iv) Describe and explain what might be missing from the model used.
v) Attempt to use formulas to represent your answer for iv)

4) 40 pt Consider two-person households, which run on the principle each should
experience the same utility from consumption. Let C
1 = Person 1’s consumption, and
2 = Person 2’s consumption. They have $90/day to spend on consumption for the whole
a) Assume the individual’s utility equals how much they consume. Determine how much
each will consume, and what their utility levels will be
b) In this case the first person feels competitive with the second, but the second feels
compersion for the first. Their respective utility functions are as follows:
1 (C1,C2) = C1 * ( C1/C2), U2(C1,C2) = C1 * C2
Determine how much each will consume, and what their utility levels will be.
c) Let the household be as if in part b. However, person 1 can increase the second
person’s sense of compersion by giving a small gift that costs k. When they do utility
functions become:
1 (C1,C2) = (C1 – k) * [ (C1 – k) / (C2 + k) ] , U2(C1,C2) = (C1 – k)2 * (C2 + k)
Determine the formulas for C
1 and C2. If k = .5, determine how much each consumes
and their utility levels.
d) Describe how the gift changed their relationship and shares of consumption.
e) Assume that a person must consume at least $5/day to sustain the household. Which of
the above scenarios are sustainable as they are. Are there any where the gift giving
becomes problematic ? What endogenous constraints would be required to make it
sustainable (determine the new consumptions levels and utilities be, can the household
still run by the equal utility principle?)

5) 30 pt Imagine the following: A new social media platform “Space2Pace” has an
architecture where messages are delayed by m minutes before being sent. The sender
can cancel the message within those m minutes. Researchers show that the fraction of
regrettable messages cancelled by users (r) based on the following formula:
r = .10 * m
the users utility was based on the formula:
U = n – x
Where n = number of messages they write an hour ,
x = number of messages they wish they hadn’t sent per hour.
When expressing physically, messages take 1 minute to write, but 50% are regrettable.
When expressing emotionally, messages take 3 minutes to write, and 20% are regrettable
When expressing rationally, messages take 11 minutes to write, and 5% are regrettable
p = probability of message being regrettable, g = number of regrettable messages written
Users can work (or wait) on only one message a time (hint: how are g and x related?)
i) Fill in the following table:

Mindset m t p n g r x Utility
Physical 0
Emotional 0
Rational 0
Physical 1
Emotional 1
Rational 1
Physical 4
Emotional 4
Rational 4
Physical 9
Emotional 9
Rational 9

ii) For each mindset state the optimal available delay time.
iii) For each delay time, state the optimal mindset
iv) Given this information, how would you market “Space2Pace”?
Keep in mind that m =0 implies it is the same as regular email.

WEEK 4 PSY6802 Assignment: Examine Current Research On Personal And Social Development


For this assignment, write an essay about personal and social development in childhood and adolescence related to diverse populations in educational settings. You must review and include at least two peer-reviewed articles that are current (within the last 5 years) to demonstrate current research and thinking in the field of educational psychology.

Be sure to include the following points in your essay:

  • What hereditary and environmental factors are likely to contribute to your student’s distinctive personalities during personal and social development?
  • How will your students’ beliefs about themselves affect their classroom behavior and academic achievement?
  • How do peer relationships change with age?
  • What ways might students act (i.e., behaviors demonstrated) that will benefit others and themselves during personal and social development?

Length: 5-7 pages, not including the title and reference pages

Reference: Include a minimum of three scholarly resources.

Your essay should demonstrate thoughtful consideration of the ideas and concepts presented in the course by providing new thoughts and insights relating directly to this topic. Your response should reflect graduate-level writing in APA standards. Be sure to adhere to Northcentral University’s Academic Integrity Policy

Network Research Project

You have been hired as part of the networking team at UMUC.  After completing orientation and training, your manager calls you into a meeting to discuss your first project.

The University is interested in creating a repository of networking knowledge based on research papers.  The research papers will be drafted by all employees, and you may select from a list of approved topics.  As a junior network engineer, you are asked to prepare a research paper that best aligns with your interests.  The approved research topics include:

  • Compare and contrast the characteristics of network topologies, types and technologies.
  • Summarize cloud concepts and their purposes.
  • Explain devices, applications, protocols and services at their appropriate OSI layers.
  • Explain the functions of network services.
  • Explain the purposes of virtualization and network storage technologies.
  • Compare and contrast business continuity and disaster recovery concepts.
  • Explain common scanning, monitoring and patching processes and summarize their expected outputs.
  • Explain authentication and access controls.
  • Compare and contrast network policies and best practices.

The research paper represents a great opportunity to focus additional study towards a networking topic of your interest.  It is also an opportunity for you to gain further expertise about a particular aspect of networking fundamentals that you will be asked about in the certification exam.

After speaking to your manager, you are excited about the research project, but realize you will have a busy schedule.  As you are writing the research paper, you will also have to prepare for the CompTIA Network+ Certification exam.  To prepare, you will perform the activities and labs within the TestOut LabSim environment following the proposed weekly schedule.  One of the conditions of your employment at this University is that you obtain this certification within 60-days of being hired.

Further details about the Network Research Project are provided below.


Expand All



Collapse All

0 %0 of 1 topics complete

Show data table for This chart displays the number of completed topics versus the total number of topics within module Network Research Project Instructions..

List of Topics and Sub-Modules for Network Research Project Instructions

  • NRP Requirements

The Network Research Project (NRP) expectations are to explain the concepts you are learning as part of this Networking Fundamentals course.  This is not an extensive review of the topic areas, but instead a cursory exploration of any approved topic you find most interesting.

You should consider the additional details below to guide you through completion of the NRP.

  • Quality is valued over quantity, but quantity is necessary for a quality paper.  It is estimated that 3 – 5 pages (not including the title page) would be necessary to address each Network Research Project (NRP) topic.
  • Each Network Research Project (NRP) must have an Introduction.  The introduction should address the purpose of your project, and an overview of what you will convey to the reader.  Each NRP must have a Conclusion.  The conclusion should summarize your findings in a succinct manner.  The remaining format will be at your discretion.  It is suggested that you review the NRP details under each approved topic and outline their paper accordingly.  You should maintain a consistent format throughout the entirety of the document.
  • All sources must be cited using the IEEE format.  Thisis an excellent guide that covers all aspects of citing in IEEE style.  Why do we use IEEE format?  IEEE format is used in technical fields when writing research papers.  Do not plagiarize any material or content.  The use of figures and diagrams is encouraged where appropriate.  Students should contact UMUC Effective Writing Center for any required writing assistance.
  • You will be allowed to submit the NRP three times.  The first two draft submissions are not graded, but will receive feedback from your Professor.  Draft version 1 should be submitted by Sunday of Week 3.  Draft version 2 should be submitted by Sunday of Week 5.  You should address the feedback in the context of the NRP grading rubric.  The final draft of the NRP is submitted in Week 8.  It must first be uploaded to Turnitin, and then the Assignment folder.  Submitting a draft in Week 3 and 5 is not mandatory, but highly encouraged.  You will not receive feedback or have an opportunity to resubmit a draft in Week 8.  A submission in Week 8 will be your final, graded version of the NRP.If you are satisfied with your feedback prior to Week 8, you have the ability to submit you final draft early by uploading it to Turnitin, and submitting it to the Week 8 Assignment folder.
  • You should use proper terminology and expand acronyms in each paragraph they are used. For example, the first time in a paragraph an acronym is used it should be expanded (e.g., University of Maryland University College (UMUC)).  Thereafter, and as long as you are in the same paragraph, the acronym (e.g., UMUC) can be used. When starting a new paragraph, the rule begins anew.
  • Review the Network Research Project (NRP) grading rubric to understand the expectations, and how the final draft will be graded.
  • NRP Topic Details

Details on each topic area are provided below to provide further understanding of expectations for the Network Research Project (NRP).  You will select one topic area to conduct the NRP.  At a minimum, you should address the details provided for each topic area.  However, you are not limited by these additional details.  You are encouraged to research and discuss additional aspects under any of these approved topic areas.

  • Compare and contrast the characteristics of network topologies, types and technologies.
    • Wired Topologies (logical vs physical, star, ring, mesh, and bus)
    • Wireless Topologies (mesh, ad hoc, other infrastructure)
    • Types (LAN, WLAN, MAN, WAN, CAN, SAN, and PAN)
    • Technologies that facilitate the Internet of Things (Z-Wave, Ant+ Bluetooth, NFC, IR, RFID, and 802.11)
  • Summarize cloud concepts and their purposes.
    • Types of services (SaaS, PaaS, IaaS)
    • Cloud delivery models (Private, Public, and Hybrid)
    • Connectivity methods
    • Security implications / considerations
    • Relationships between local and cloud resources
  • Explain devices, applications, protocols and services at their appropriate OSI layers.
    • Layer 1 (Physical)
    • Layer 2 (Data Link)
    • Layer 3 (Network)
    • Layer 4 (Transport)
    • Layer 5 (Session)
    • Layer 6 (Presentation)
    • Layer 7 (Application)
  • Explain the functions of network services.
    • DNS service (record types, internal vs external DNS, third-party/cloud hosted DNS, hierarchy, forward vs reverse zone)
    • DHCP service (MAC reservations, pools, IP exclusions, scope options, lease time, TTL, DHCP relay)
    • NTP
    • IPAM
    • VoIP
    • Simple Network Management Protocol
    • File sharing
    • WWW
    • Printing
  • Explain the purposes of virtualization and network storage technologies.
    • Virtual Networking Component (Virtual switch, firewall, NIC, router, hypervisor)
    • Network storage types (NAS, SAN)
    • Connection Type (FCoE, Fibre Channel, iSCSI, InfiniBand)
    • Jumbo Frame
    • Compare and contrast business continuity and disaster recovery concepts.
    • Availability Concepts (Fault tolerance, high availability, load balancing, NIC teaming, port aggregation, clustering)
    • Power Management (Battery backups/UPS, power generators, dual power supplies, redundant circuits)
    • Recovery (Cold sites, warm sites, hot sites)
    • Backups (Full, differential, incremental, snapshots)
    • MTTR
    • MTBF
    • SLA requirements
  • Explain common scanning, monitoring and patching processes and summarize their expected outputs.
    • Process (log reviewing, port scanning, vulnerability scanning, patch management, reviewing baselines, packet/traffic analysis)
    • Event management (notifications, alerts, SIEM)
    • SNMP monitors (MIB)
    • Metrics (Error rate, utilization, packet drops, bandwidth/throughput)
  • Explain authentication and access controls.
    • Authorization, authentication, and accounting (RADIUS, TACACS+, Kerberos, Single sign-on, Local authentication, LDAP, Certificates, Auditing and logging)
    • Multi-factor authentication (something you know, have, are, do, or somewhere you are)
    • Access Control (802.1x, NAC, port security, MAC filtering, captive portal, access control lists)
  • Summarize common networking attacks.
    • DoS (Reflective, amplified, distributed)
    • Social engineering
    • Insider threat
    • Logic bomb
    • Rogue access point
    • Evil twin
    • War-driving
    • Phishing
    • Ransomware
    • DNS poisoning
    • Brute force
    • Exploits vs. Vulnerabilities
  • Compare and Contrast network policies and best practices.
    • Privileged user agreement
    • Password policy
    • On-boarding/off-boarding procedures
    • Licensing restrictions
    • International export controls
    • Data loss prevention
    • Remote access policies
    • Incident response policies
    • BYOD
    • AUP
    • NDA
    • System life cycle (asset disposal)
    • Safety procedures and policies