+1 (951) 902-6107 info@platinumressays.com

Prepare an annotated bibliography, 1 paragraph introduction on the six research articles : quantitative, qualitative, MMR

 

  • Use the Walden library databases to search for quantitative, qualitative, and mixed methods research articles from peer-reviewed journals on your topic of interest.
  • Before you read the full article and begin your annotation, locate the methodology section in the article to be sure that it describes the appropriate research design.
    • For quantitative research articles, confirm that a quantitative research design, such as a quasi-experimental, casual comparative, correlational, pretest–posttest, or true experimental, was used in the study.
    • For qualitative research articles, confirm that a qualitative research design or approach, such as narrative, ethnographic, grounded theory, case study, or phenomenology, was used in the study.
    • For mixed methods research articles, confirm that a mixed methods research (MMR) design was used in the study. There are several design classifications in MMR; some examples of MMR types or families of design are parallel, concurrent, sequential, multilevel, or fully integrated mixed methods design.
  • Prepare an annotated bibliography that includes the following:
    • A one-paragraph introduction that provides context for why you selected the six research articles you did: two quantitative, two qualitative, and two MMR.
    • A reference list entry in APA Style for each of the six articles that follows proper formatting. Follow each reference list entry with a three-paragraph annotation that includes:
    • A one-paragraph conclusion that presents a synthesis of the six articles.
  • Format your annotated bibliography in Times New Roman, 12-point font, double-spaced. A separate References list page is not needed for this assignment.
  • Submit your Annotated Bibliography.

    Assignment Week 12 (Rapid Testing)

     Assignment Week 12 (Rapid Testing)  I want you this week to concentrate again on a couple aspects of the NEW  FORENSICS, rapid testing. There is a ONE HOUR lecture that were put on my  Bode Technology Group dealing with these topics. I listened to several of them,  and they really hit the mark.  Bode is a private company, NOT associated with any government entity so all  they want to do is sell you, their services. So here is all you have to do;  1. Got to this website listed below and sign in  2. I signed in as myself, a faculty member of Nova. No big deal. It then will  start playing the webinar. Just put on there that you are a student. Use the  address of the Criminal Justice Institute at Nova and their number if you  like;  Nova Southeastern University  3300 S. University Drive, Fort Lauderdale, FL, 33328-2004  Phone: 877-396-0328  3. Here is the URL  Rapid testing of DNA samples  https://www.bodetech.com/pages/webinars-workshops  scroll down to; Webinar Series: Use of Rapid DNA in Forensics  Sign in and it will be presented to you  If you want any further information on familial searches see this  “Familial searches using DNA profiles”  https://forensiccoe.org/report-familial-dna-searching/  These subjects represent a brand new and exciting forensic  technology.  You will write a paper  (1 of 2) which will be 25% of your grade. Write 4-5  pages on DNA and Technology. You need to include in-text citations  (Plotkin,  2016) after any material that is not yours and especially any quotes. This intext  citation will also have a reference listed at the end to match as well as three  references. Please do not use Wikipedia for academic work as it is an  unreliable source.  

      Law – Criminal Week 4 Assignment – Defense in Depth NO PLAGARISM

       

      Introduction

      The process of implementing security frequently opens one's eyes to other forms of security not previously considered. In this two-part assignment, you should experience just that. This assignment focuses on a model of implementing security in layers, which, in many cases, requires a network that is designed accordingly.

      The specific course learning outcome associated with this assignment is:

      • Recommend best security practices to achieve business objectives based on risk assumptions.

      Instructions

      Design a network that incorporates the following:

      • One corporate site (Chicago).
        • All servers exist here (web server, file server, print server, mail server, FTP server).
        • Connection to the Internet (50 MBps).
        • 300 employees who only need access to local corporate resources and the Internet.
      • One remote site (8 miles away).
        • 20 employees who need access to all resources at corporate, plus the Internet.
        • Connection to the Internet (3 MBps).

      Part 1

      Use Microsoft Visio or an open-source alternative, such as Dia Diagram Editor, to:

      • Create a network diagram with defense in depth in mind, citing specific, credible sources that support the design and depicting at least four-fifths of the following:
        • All necessary network devices (routers, switches and/or hubs, firewalls, VPNs, proxies, and others).
        • The interconnections between network devices.
        • Connections to end-user (client) devices (desktops, laptops).
        • Connections from the Internet cloud to the network input.

      Part 2

      Write a 6 page paper in which you:

      • Describe the flow of data through the network, citing specific, credible sources.
        • Assume data begins at the remote site.
        • Data flow may be monitored by an IDS.
      • Explain all three elements of the CIA triad and how isolating by network functions helps deliver a layered approach, citing specific, credible sources that support your assertions and conclusions.
      • Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.
        • Cite each source listed on your source page at least one time within your assignment.
        • For help with research, writing, and citation, access the library or review library guides.

      This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

        In relation  theoretical models, consider the underlying concept of at least three theories at both the intra- and interpersonal levels

        In relation  theoretical models, consider the underlying concept of at least three theories at both the intra- and interpersonal levels.  Which theories are related and how are their differences better suited (or not) to treatment for substance use?  Which theories are most likely to be utilized in the provision of treatment?  Why or why not?  Are some theories better suited to adolescents and young adults, while others are better suited to older populations? 

          Theoretical models, consider the underlying concept of at least three theories at both the intra- and interpersonal levels

          In relation  theoretical models, consider the underlying concept of at least three theories at both the intra- and interpersonal levels.  Which theories are related and how are their differences better suited (or not) to treatment for substance use?  Which theories are most likely to be utilized in the provision of treatment?  Why or why not?  Are some theories better suited to adolescents and young adults, while others are better suited to older populations? 

            Theresa Johnson Age: 27 Criminal History (past crimes) – Prostitution, Distribution of a controlled substance, Possession of narcotics, Possession of Drug Paraphernalia, Public Drunkenness, Simple Assault, Aggravated Assault, Petty Theft, and Check Fraud all starting from age 11

             You have just been assigned a "client" who was just released on parole after serving two years of a two-to-five-year sentence for aggravated assault, a conviction that stems from repeatedly striking her boyfriend with a baseball bat.

            Name: Theresa Johnson

            Age: 27

            Criminal History (past crimes) – Prostitution, Distribution of a controlled substance, Possession of narcotics, Possession of Drug Paraphernalia, Public Drunkenness, Simple Assault, Aggravated Assault, Petty Theft, and Check Fraud all starting from age 11.

            Family History – Stepfather arrested for sexually assaulting Theresa when she was a child, starting at age 10.  Mother was unable to control her, so Theresa was in and out of foster homes along with a number of psychiatric facilities and detention facilities since age 12.

            Substance Abuse – Primarily Heroin and Alcohol dependence since adolescence.

            Treatment History – 4 unsuccessful court-ordered Inpatient treatment programs. (Removed from one facility for inappropriate sexual advances toward a male counselor; Removed from another facility for smuggling Oxycontin into the facility; Removed from a 3rd facility for a "hot urine" for alcohol, meth, and Xanax, and lastly, the most recent removal was for leaving the facility without permission.

            Psychological History –Diagnosed with Antisocial Personality Disorder and Post-Traumatic Stress Disorder (PTSD) stemming from years of physical and sexual abuse perpetrated by her stepfather starting at age 10 until the father's arrest when she was 12.  

             What conditions would you "require" while she is on parole, and why? Be extremely specific and detailed when responding.  You have several "issues" to contend with, so think outside the box by applying your critical thinking / problem solving skills when determining the conditions of parole. 

            500 words/2 references

              Platinum Essays