[Solved] 500 Square Feet Total

[Solved] 500 Square Feet Total

 Scenario:
You have been planning on opening your own  child care program and have decided that you would like to open a  small, center-based program. While looking for locations, you come  across an available space that is conveniently located and perfectly  situated to house a child care program. The space is 30 feet by 50 feet  or 1,500 square feet total (indoor space). Right now, the space is a  completely open floor plan and you have the resources to build walls as  needed. Your first step in licensing is to look at licensing  requirements, but you know that your licensing specialist will want to  know how many classrooms you want to open, how many children can be  served in each classroom, and how many teachers you need to maintain  appropriate student-teacher ratios. 

 

Focus Assignment: 

With the purpose of ensuring your plan will meet licensing  requirements, write a 1-page (business formatted) letter to your  licensing specialist. Be sure to describe the floor plan of your center  including the total available space and the number and size of each  toddler and/or preschool classroom you are planning on opening and how  many children can be in each classroom. Also, include the  student-teacher ratios you plan on meeting, and how many teachers will  be in each classroom. Don’t forget to consider the space needed for the  kitchen, office, bathrooms, storage, etc. because this will take away  from usable classroom space. 

Self-Reflection: 50 points

  1. For your floor plan, explain how this floor plan addresses the issues in the scenario 

[Solved] 3 – 6 Paragraphs

[Solved] 3 – 6 Paragraphs

In this task, you will write an analysis of one work (suggested length of 3–6 paragraphs total). Choose one work from one time period.

SELECTION: Classical Period: Literature/Philosophy: 1. Sappho, “Charaxos and Larichos,” ca. 7th century B.C.E. (poem). 

 
 

https://www.poetryfoundation.org/poetrymagazine/poems/89724/charaxos-and-larichos

 
 

Once you have selected one of the accepted works from the list provided in the “Task Works” found in the web links section, you will research the work, the life of the author/artist, and the period. You will then be ready to create your analysis. This process of analysis will require you to discuss the events or innovations that define the historical period when the work was created, analyze a theme or stylistic characteristic of the period that is reflected in the work, and finally analyze the work’s or author’s/artist’s/composer’s contribution to the humanities.

A.  Analyze the accepted work selected from the “Task Works” found in the web links section by doing the following:

1.  Describe the historical events or innovations that characterize the period in which the work was created (suggested length of 1–2 paragraphs).

2.  Analyze how this work reflects a theme or stylistic characteristic from its period (suggested length of 1–2 paragraphs).

3.  Analyze the work’s or author’s/artist’s/composer’s contributions to the humanities (suggested length of 1–2 paragraphs). 

[Solved] Also Review Durable Medical

[Solved] Also Review Durable Medical

You are responsible for auditing patient records to ensure that documentation justifies medical necessity of those procedures, services, or supplies that have been reported and coded on insurance claims.  For each record, you locate patient diagnoses and verify the ICD-10-CM codes reported on claims. You also review documentation in the patient record to ensure that each diagnosis justifies the medical necessity of diagnostic or therapeutic procedures performed and services or supplies provided to patients.

The worksheet that you use to audit patient records includes the following items, which must be documented by the provider:

  • Patient history, including review of systems
  • Physical examination, including impression
  • Diagnostic test results, including analysis of findings
  • Diagnoses, including duration and comorbidities that impact care
  • Patient’s treatment, prognosis, and follow-up care

You also review Durable Medical Equipment Prosthetics Orthotics and Supplies (DMEPOS) cases to locate appropriate reports, verify that such reports have been authenticated by the physician, and review for documentation of rehabilitation care and/or medical equipment necessary for patient recuperation. Today, you have also been tasked with verifying durable medical equipment (DME) certificates of medical necessity.

What is a DME certificate of medical necessity, and when is it required?

[Solved] Unique Compared

[Solved] Unique Compared

Research the following airlines and discuss the commonalities between all of them. Additionally, discuss the differences or what makes them unique compared to other airlines within the industry. Discuss this from an operational perspective (route structure, aircraft, cost structure, etc.) AND from a service perspective (airport and onboard services or amenities, customer perceptions, etc.) :

a. Ryan Air (Europe)

b. JetBlue (U.S.)

c. Singapore Airlines (Singapore)

d. Porter Airlines (Canada)

[Solved] Organizations Face Includes Different

[Solved] Organizations Face Includes Different

  

The threat environment that organizations face includes different types of attacks and different types of attackers who commit these attacks.

  • Select two types of network security attacks. Explain the two types of attacks, the types of attackers who are engaged in these attacks, and the counterattacks that are taken to mitigate the risks of these attacks.

[Solved] Enterprise Risk Management Initiative

[Solved] Enterprise Risk Management Initiative

 After reading this week’s article, and any other relevant research you locate, please discuss the following in your main post:.

  • Which case study in the paper was most interesting to you and why?
  • Do you think that ERM is necessary in the contemporary organization and why?

Please make your initial post 

  • Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA 7)
  • Make an argument concerning the topic.

Reading Materials – 

 Do, H., Railwaywalla, M., & Thayer, J. (2016). Integration of ERM with strategy (p. 35). Enterprise risk management initiative. Retrieved from Poole College of Management, NCSU.  

[Solved] Decentralized Public Key Infrastructures

[Solved] Decentralized Public Key Infrastructures

 IT Research Paper

Threat Modeling

A new medium-sized health care facility just opened and you are hired as the CIO. The CEO is somewhat technical and has tasked you with creating a threat model. The CEO needs to decide from 3 selected models but needs your recommendation. Review this week’s readings, conduct your own research, then choose a model to recommend with proper justifications. Items to include (at a minimum) are:

  • User authentication and credentials with third-party applications
  • 3 common security risks with ratings: low, medium or high
  • Justification of your threat model (why it was chosen over the other two: compare and contrast)

You will research several threat models as it applies to the health care industry, summarize three models and choose one as a recommendation to the CEO in a summary with a model using UML Diagrams (Do not copy and paste images from the Internet). In your research paper, be sure to discuss the security risks and assign a label of low, medium or high risks and the CEO will make the determination to accept the risks or mitigate them. Your paper should meet the following requirements:

  • Be approximately five to six pages in length, not including the required cover page and reference page. (Remember, APA is double spaced)
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.

Reading Materials- 

 BURKE, MCDONALD, J., & AUSTIN, T. (2000). Architectural support for fast symmetric-key cryptography. Operating Systems Review34(5), 178–189.

Diffie, & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644–654.

Ullah, de Roode, G., Meratnia, N., & Havinga, P. (2021). Threat Modeling — How to Visualize Attacks on IOTA? Sensors (Basel, Switzerland)21(5), 1834–.

Li, Yu, Y., Lou, C., Guizani, N., & Wang, L. (2020). Decentralized Public Key Infrastructures atop Blockchain. IEEE Network, 34(6), 133–139.

Chia, Heng, S.-H., Chin, J.-J., Tan, S.-Y., & Yau, W.-C. (2021). An Implementation Suite for a Hybrid Public Key Infrastructure. Symmetry (Basel), 13(8), 1535–. 

[Solved] Write One Page Module

[Solved] Write One Page Module

-Need to write one page

Module 5 question about Cabling Upgrade

  • Research online to find how much cabling of higher categories would cost. Choose a higher category that offers better throughput for reasonable costs. Consider whether you would be able to use existing connectors on devices or if devices would need adapters or replacement. What target cable category did you choose? How much does this cabling cost, on average, per meter?

Module 6 question about Wi-Fi Innovations

  • How would you explain OFDMA to non-IT executive at your company?

[Solved] Message Boards Ietf

[Solved] Message Boards Ietf

TCP/IP Protocol Suite

The job of the Internet Engineering Task Force (IETF) is to make the Internet work, and the IETF achieves that primarily by writing technical standards for network protocols. The TCP/IP Protocol Suite is a collection of protocols that ultimately enable us to share data across the Internet and other networks.

Search the Internet for information on one of the following IETF Request for Comments (try to pick one that has yet to be discussed on the message boards):

  • IETF RFC 791 Internet Protocol.
  • IETF RFC 792 Internet Control Message Protocol.
  • IETF RFC 793 Transmission Control Protocol.
  • IETF RFC 959 File Transfer Protocol.
  • IETF RFC 854 Telnet.
  • IETF RFC 1058 Routing Information Protocol.
  • IETF RFC 1059 Network Time Protocol.
  • IETF RFC 1350 Trivial File Transfer Protocol.
  • IETF RFC 1939 Post Office Protocol.
  • IETF RFC 2409 Internet Key Exchange.
  • IETF RFC 2570 Simple Network Management Protocol.
  • IETF RFC 3261 Session Initiation Protocol.
  • IETF RFC 4251 Secure Shell.
  • IETF RFC 4880 Pretty Good Privacy.
  • IETF RFC 4291 IPv6 Addressing.

Discuss the primary function that makes the protocol unique from others. Describe the salient characteristics of the protocol including its relationship to the OSI Reference Model and discuss any security mechanisms that the protocol may have built into it. Write your own review of the prominent features of the protocol; do not include material directly copied from the associated IETF Request for Comments.

Response Guidelines

Post detailed comments or questions to at least two other learners and explain how their insights helped to inform your understanding of the specific protocol that they analyzed.

Resources

[Solved] Single 3 – 4

[Solved] Single 3 – 4

Overview

It is often necessary for information technologists to evaluate new and emerging technologies and to assess the potential impacts on an enterprise’s current information technology (IT) operations and future IT project planning.

In this assignment, you write about the interaction of cloud-enabling technologies.

Directions

Pick two of the following cloud-enabling technologies that directly interact with one another:

Broadband network technology.

Data center technology.

Internet technology.

Virtualization technology.

World Wide Web (WWW) technology.

Multitenant technology.

Service technology.

Write 3–4 pages explaining how your chosen cloud-enabling technologies function. Explain how they interact with one another to create a cloud consumer network, a cloud provider network, an enterprise internet connection, or another cloud component.

Make sure to do the following:

Describe the primary functions of cloud-enabling technologies.

Explain how cloud-enabling technologies interact to create a cloud component.

Submission Requirements

Submit a single 3–4 page Word document with both parts of this assignment.

Font: Times New Roman, 12 point.

Format: Double spaced lines. Use current APA style and format.