Identify the methods used in the identification of evidence (e.g., visual, black light, police dog, chemicals, electronics, etc.) Describe at least three different methods involved in the identification of evidence. Explain why these identification methods are appropriate for certain evidence but inappropriate for other types. Explain how the identification methodology might affect laboratory testing.

There are several different types or classifications of evidence. Each type of evidence may have different requirements or methodology for handling them at the scene for it to be properly identified, documented, processed, and admissible at trial.
Prior to beginning work on this discussion, please review the following:
You are also strongly encouraged to review the list of recommended resources, as they may assist you with this discussion forum and the The Difference Between Preliminary Field and Laboratory Testing assignment.
For students whose last names begin with

A through G:

Identify the methods used in the identification of evidence (e.g., visual, black light, police dog, chemicals, electronics, etc.)
Describe at least three different methods involved in the identification of evidence.
Explain why these identification methods are appropriate for certain evidence but inappropriate for other types.
Explain how the identification methodology might affect laboratory testing.
Explain the requirements for the identification methodology related to admissibility of evidence at trial.

Each thread must also address health and safety issues at the scene and in handling evidence (e.g., explosives, drugs, biological, etc.)
The instructor has the discretion to reassign students to an alternative category to ensure all topics are covered.
The body of your initial post should be at least 250 words in length. Support your claims with examples from this week’s required material(s) and/or other scholarly resources and properly cite any references. Remember science is objective, not a matter of subjective opinions.?

Discuss why spyware has become so widely used. Should spyware be allowed to be used as it is or restricted in some manner?

Discuss why spyware has become so widely used. Should spyware be allowed to be used as it is or restricted in some manner?
 
Course Textbook(s)
Gregg, M. & Santos, O. (2020). Certified ethical hacker (CEH) version 10 cert guide: Learn, prepare, and practice for exam

success (3rd ed.). Pearson IT Certification. https://online.vitalsource.com/#/books/9780135305393

Explain the purpose of the communication plan for students and families related to student achievement and development. Explain how your communication plan will support your school’s mission and vision statements. Discuss methods to build appropriate family relationships based on your school demographics.

 
Teachers regularly evaluate what can be done to improve familial support in their classrooms for increased academic success. It is important to help students and their families feel welcomed, appreciated, and understood.
For this assignment, create a word communication plan to build relationships with families that focuses on student achievement and development, as well as building a safe, positive learning environment of openness, mutual respect, and support in a grade level of your choice. Include the following in your plan:

Explain the purpose of the communication plan for students and families related to student achievement and development.
Explain how your communication plan will support your school’s mission and vision statements.
Discuss methods to build appropriate family relationships based on your school demographics.
Identify 2-3 specific methods you will use to regularly communicate with families, including at least one method using technology.
Describe at least three events or activities in which you plan to include families.
Explain how you will collaborate with families to build a safe, positive learning climate of openness, mutual respect, and support.

Support your communication plan with 2-3 references for this

Why is the definition of health important to health policy? Define the term “target population” as it relates to health policy. How do societal influences impact the identification and definition process of policy? Research a healthcare organization and highlight how their policies align or misalign with the WHO’s definition of health.

 IMPORTANT PLEASE READ FULL INSTRUCTIONS. NO PLAGIARISM! NO QUOTES, MUST PARAPHRASE. I WILL CHECK FOR RECYCLED WORK AND PLAGIARISM. THIS ASSIGNMENT IS DUE 04/16/23 AT 9PM PST. IF YOU CANT MEET THIS DEADLINE, DONT AGREE TO DO MY ASSIGNMENT. PRICE ISNT NEGOTIABLE.  PLEASE UNDERSTAND BY ACCEPTING TO DO MY WORK, I HAVE STRICT RULES. I DONT LIKE TO DISPUTE, BUT I WILL IF DIRECTIONS ARENT BEING FOLLOWED. IF I SEE SOMETHING WRONG AFTER PURCHASING, I WILL GIVE YOU A CHANCE TO FIX IT IMMEDIATELY. THIS DOESNT MEAN HOURS  LATER. IF YOU TURN SOMETHING INTO ME EARLY, I EXPECT YOU TO FIX MY ASSIGNMENT IMMEDIATELY. DONT LIE TO ME, IF THESE RULES ARENT FOLLOWED, I WILL DISPUTE 
   
Review the World Health Organization’s (WHO) definition. Then, write a research study fulfilling the following requirements.

Why is the definition of health important to health policy?
Define the term “target population” as it relates to health policy.
How do societal influences impact the identification and definition process of policy?
Research a healthcare organization and highlight how their policies align or misalign with the WHO’s definition of health.

The study

Must be four to six double-spaced pages in length (not including title and reference pages) and formatted according to APA style    
 Must use at least four scholarly sources 

Acute Kidney Injury and Chronic Kidney Disease Will is a 68-year-old male with a history of hypertension. Eight months ago, he started regular dialysis therapy for ESRD. Before that, his physician was closely monitoring his condition because he had polyuria and nocturia. Soon it became difficult to manage his hypertension. He also lost his appetite, became weak, easily fatigued, and had edema around his ankles. Will debated with his physician about starting dialysis, but she insisted, before the signs and symptoms of uremia increased, the treatment was absolutely necessary (Chapter 34, Learning Objectives 1 to 4). What is the difference between azotemia and uremia? Two years ago, Will’s physician told him to decrease his protein intake. In spite of what the physician ordered, Will could not stop having chicken, beef, pork, or eggs at least once a day. Why did his physician warn him about his diet? Will’s feelings of weakness and fatigue are symptoms of anemia. Why is he anemic?

 
Acute Kidney Injury and Chronic Kidney Disease
Will is a 68-year-old male with a history of hypertension. Eight months ago, he started regular dialysis therapy for ESRD. Before that, his physician was closely monitoring his condition because he had polyuria and nocturia. Soon it became difficult to manage his hypertension. He also lost his appetite, became weak, easily fatigued, and had edema around his ankles. Will debated with his physician about starting dialysis, but she insisted, before the signs and symptoms of uremia increased, the treatment was absolutely necessary (Chapter 34, Learning Objectives 1 to 4).

What is the difference between azotemia and uremia?
Two years ago, Will’s physician told him to decrease his protein intake. In spite of what the physician ordered, Will could not stop having chicken, beef, pork, or eggs at least once a day. Why did his physician warn him about his diet?
Will’s feelings of weakness and fatigue are symptoms of anemia. Why is he anemic?
Knowing what you do about Will’s history, why is left ventricular dysfunction a concern for his physician?

Instructions:

Your primary post should be at least 200 words long and should include reference to the textbook or another course resource using APA 7th edition format. Your primary post is due by Wednesday at midnight ET.
 Respond with at least 100 words (each) to at least two classmates’ posts by Sunday at midnight ET.
To see the grading rubric, click on the 3-dot menu on the top-right side of screen.

Case Study Jill, a 24 y/o Hispanic female arrives in the emergency room where her parents brought her for evaluation. They are worried because she is giving away all of her possessions and says she is planning to move to the South Pole so she can “save the world.” Her parents say that she has hardly been sleeping at all for the last 7 days, but she seems very energetic. They say she has appeared to be “in a frenzy” lately. When you interview Jill you notice that she speaks very rapidly and is laughing uncontrollably. It is hard to get her to be quiet long enough for you to ask questions. She seems agitated and has difficulty sitting still. Questions: Remember to answer these questions from your textbooks and clinical guidelines to create your evidence-based treatment plan. At all times, explain your answers.  Summarize the clinical case including the significant subjective and objective data. Generate a primary and two differential diagnoses.  Use the DSM5 to support the assessment.  Include the DSM5 and ICD 10 codes. Discuss a pharmacological treatment would you prescribe? Use the clinical guidelines to support the rationale for this treatment.

 Case Study
Jill, a 24 y/o Hispanic female arrives in the emergency room where her parents brought her for evaluation. They are worried because she is giving away all of her possessions and says she is planning to move to the South Pole so she can “save the world.” Her parents say that she has hardly been sleeping at all for the last 7 days, but she seems very energetic. They say she has appeared to be “in a frenzy” lately. When you interview Jill you notice that she speaks very rapidly and is laughing uncontrollably. It is hard to get her to be quiet long enough for you to ask questions. She seems agitated and has difficulty sitting still.
Questions:
Remember to answer these questions from your textbooks and clinical guidelines to create your evidence-based treatment plan. At all times, explain your answers. 

Summarize the clinical case including the significant subjective and objective data.
Generate a primary and two differential diagnoses.  Use the DSM5 to support the assessment.  Include the DSM5 and ICD 10 codes.
Discuss a pharmacological treatment would you prescribe? Use the clinical guidelines to support the rationale for this treatment.
Discuss non-pharmacological treatment would you prescribe?  Use the clinical guidelines to support the rationale for this treatment.
Describe a health promotion intervention that would be appropriate for this patient.

REQUIREMENTS:
at least 500 words ( 2 complete pages of content) formatted and cited in current APA style 7 ed  with support from at least 3 academic sources which need to be journal articles or books from 2019 up to now. NO WEBSITES allowed for reference entry. Include doi, page numbers, etc. Plagiarism must be less than 10%.

Mr. Tomas, the owner of a restaurant, has requested that your Web design company build a website for his restaurant. You were chosen as the web designer for this project. The restaurant is family-owned and features the family’s specialty dishes. You agree to meet with Mr. Tomas this weekend to discuss the required website for the restaurant. What ten questions will you ask him during the meeting? (Be specific) Outline the steps you plan to take to complete the website. Identify the key deliverables you will need to provide to Mr. Tomas during the Web design process.

Mr. Tomas, the owner of a restaurant, has requested that your Web design company build a website for his restaurant. You were chosen as the web designer for this project. The restaurant is family-owned and features the family’s specialty dishes. You agree to meet with Mr. Tomas this weekend to discuss the required website for the restaurant.

What ten questions will you ask him during the meeting? (Be specific)
Outline the steps you plan to take to complete the website.
Identify the key deliverables you will need to provide to Mr. Tomas during the Web design process.

Your manager appreciated your thoughtful analysis on the infiltrate phase and would now like your thoughts on the Activate phase. Your efforts at educating users on the common ransomware attack vectors has been a huge success. Despite that success, some users were caught off guard and clicked through a phishing email message. At least one user landed on a malicious website and clicked a form submission button that allowed the attacker direct access to your network.  Now that an attacker has infiltrated your network, and you suspect they have planted ransomware on some systems:   Choose one of the questions below. What would you communicate to your manager?  1. What, if anything can CAG do to determine if malicious code was transferred over the network and planted on a system?  2. Provide your thoughts on how a defender can gain better visibility over the Activate phase.  3. How do you think CAG can best defend against a ransomware attack in the activate stage?

You were introduced to a ransomware attack scenario during Unit I in which you assumed the role of a recently hired cybersecurity analyst to help the organization to respond to an unfolding ransomware attack. In Unit II, you provided your manager with your ideas on ransomware attack vectors, how an attacker might employ a vector in an attack or how Celinszky Automotive Group (CAG) might best defend against these common vectors.
Your manager appreciated your thoughtful analysis on the infiltrate phase and would now like your thoughts on the Activate phase. Your efforts at educating users on the common ransomware attack vectors has been a huge success. Despite that success, some users were caught off guard and clicked through a phishing email message. At least one user landed on a malicious website and clicked a form submission button that allowed the attacker direct access to your network. 
Now that an attacker has infiltrated your network, and you suspect they have planted ransomware on some systems:
 
Choose one of the questions below. What would you communicate to your manager? 
1. What, if anything can CAG do to determine if malicious code was transferred over the network and planted on a system? 
2. Provide your thoughts on how a defender can gain better visibility over the Activate phase. 
3. How do you think CAG can best defend against a ransomware attack in the activate stage?
 
Textbook Reference
Grama, J. L. (2022). Legal and privacy issues in information security (3rd ed.). Jones and Bartlett. https://online.vitalsource.com/#/books/9781284231465

State the name of the company you chose and your information source (link, employer, and so on). Describe the type of company it is, and explain which area it is planning to outsource or is already outsourcing.  Why did the company consider outsourcing in the first place? Explain in terms of the company’s sustainable income and the quality of its earnings. Identify the revenues and costs that would be impacted by this outsourcing decision using ratio analysis. Use your best estimate on these revenue/cost values since the actual amounts are most likely not known to the public. 

Instructions
Use your favorite search engine to locate an article about a company that has decided to outsource a part of its business operations. If you currently work for an organization that outsources or is thinking about outsourcing, you can use that instead. Respond to the following four (4) prompts based on your knowledge from this unit’s material and the article you found. 

State the name of the company you chose and your information source (link, employer, and so on). Describe the type of company it is, and explain which area it is planning to outsource or is already outsourcing. 
Why did the company consider outsourcing in the first place? Explain in terms of the company’s sustainable income and the quality of its earnings.
Identify the revenues and costs that would be impacted by this outsourcing decision using ratio analysis. Use your best estimate on these revenue/cost values since the actual amounts are most likely not known to the public. 
Identify the factors, based on horizonal analysis and vertical analysis, that could impact the company’s decision to outsource this business operation. Make your own assumptions and estimates regarding these factors. 

  What misalignment(s) caused channel conflict between manufacturers and dealers in the automotive industry? How was this conflict reflected in the attitudes of GM and its dealers toward the CDK Digital program? How would you characterize CDK Digital’s core competencies as of 2011? Suppose a car shopper’s interests could be known when she visited a dealer website. How would the dealer want to treat her? What about the OEM? How can CDK Digital leverage its core competencies to provide a website solution that both GM and its dealers consider to serve their interests?

 

What misalignment(s) caused channel conflict between manufacturers and dealers in the automotive industry? How was this conflict reflected in the attitudes of GM and its dealers toward the CDK Digital program?
How would you characterize CDK Digital’s core competencies as of 2011?
Suppose a car shopper’s interests could be known when she visited a dealer website. How would the dealer want to treat her? What about the OEM?
How can CDK Digital leverage its core competencies to provide a website solution that both GM and its dealers consider to serve their interests?

 
Please keep in mind the following learning objectives so that the answers efforts are focused within the following topics:

Explain how franchisors and franchisees have different perspectives on the value of data on retail operations
Recognize benefits of big data and analytics that reach well beyond the obvious potential improvements to marketing and operational effectiveness
Articulate the value of data analytics for channel management
Appraise the benefits of real-time website customization