Write a comparative essay comparing at least 3 factors (e.g., age, income, geography) of the digital divide within the United States and Nigeria.Essay requirements: 2,000-2,500 words, at least 5 sources, Chicago or APA Style.

Write a comparative essay comparing at least 3 factors (e.g., age, income, geography) of the digital divide within the United States and Nigeria.Essay requirements: 2,000-2,500 words, at least 5 sources, Chicago or APA Style.

Urine Culture Techniques 1. What is bacteriuria? When is it significant? 2. How do microorganisms enter the urinary tract?

Week 9 ProjectAssignment Task: Submit to complete this assignment Due November 23 at 10:59 PM

Review Sheet

Based on your knowledge from the lab manual readings from this week, create a 2- to 3-page document in Microsoft Word for providing answers to questions in the following review sheets:

Submission Details:

  • Support your responses with examples.
  • Cite any sources in APA format.
  • Name your document SU_BIO2071_W9_A2_LastName_FirstInitial.doc.
  • Submit your  to the Sdocumentubmissions Area by the due date assigned.       

Week 9 – Review Sheet Exercise 5 – Urine Culture Techniques 1. What is bacteriuria? When is it significant? 2. How do microorganisms enter the urinary tract? 3. Why is aseptic urine collection important when cultures are ordered? 4. List five bacteria that can cause urinary tract infection. 5. If you counted 20 colonies from a 0.01-ml inoculum of a 1:10 dilution of urine, how many organisms per milliliter of specimen would you report? Is this number significant?

  Both the president and Congress play a role in decisions regarding the use of military force. What are the president’s powers in this area? What are the powers of Congress in this area?

 the writing prompts and write a minimum 300 word essay.

3)  Both the president and Congress play a role in decisions regarding the use of military force. What are the president’s powers in this area? What are the powers of Congress in this area? Read the article “ New Legislation Offers Opportunity to Address 2001 Authorization for Use of Force, Amid Fears of War with Iran .” Why do you think members of Congress have been willing not to vote on the use of force and to allow modern presidents (such as Bush, Obama and Trump) to take the lead in this area? Do you think Congress should play a larger role in decisions regarding the use of military force?

Is the Constitution clear about potential conflicts between privacy and national security? How much privacy should Americans expect in an age where information about people is so readily available? 

the writing prompts and write a minimum 300 word essay

1)  Read the Pew Research article, “Americans feel the tensions between privacy and security concerns.” How should the government balance the tensions between privacy and national security concerns? Is the Constitution clear about potential conflicts between privacy and national security? How much privacy should Americans expect in an age where information about people is so readily available?

Specifically, how does voter turnout in the U.S. compare with voter turnout in other advanced democracies? What are some of the causes for the low voter turnout between the United States and other advanced democracies?

the writing prompts and write a minimum 300 word essay

Review the Pew Research articles “U.S. trails most developed countries in voter turnout” and “Weekday elections set the U.S. apart from many other advanced democracies.” Specifically, how does voter turnout in the U.S. compare with voter turnout in other advanced democracies? What are some of the causes for the low voter turnout between the United States and other advanced democracies? What are the pros and cons of changing election day to a holiday or a weekend?

Compare and contrast the modernization theory and dependency theory. Which do you think is more useful for explaining global inequality? Explain, using examples.

Compare and contrast the modernization theory and dependency theory. Which do you think is more useful for explaining global inequality? Explain, using examples.

This post should be substantial (containing at least 200-250 words). Any use of outside resources requires that you cite and reference your sources in APA format.

There are a variety of tools that an epidemiologist might have at his or her disposal. The most common tools that are used in the field are SAS, SPSS, EpiInfo, R, and many others. These require significant time and diligence to become proficient at each of these statistical tools.

Week One Assignment – Epidemiological Calculations Example (CLO 3, 7)

Attached Files:

Epidemiological Tools

There are a variety of tools that an epidemiologist might have at his or her disposal. The most common tools that are used in the field are SAS, SPSS, EpiInfo, R, and many others. These require significant time and diligence to become proficient at each of these statistical tools. However, almost every office has Microsoft Excel, Numbers (the Mac equivalent), or Google’s Excel-like product.

 

Often times epidemiological calculations can seem/appear intimidating. However, if you let the excel document do the work for you then you do not have to worry about making errors in simple math. Please download the attached excel sheet. You will be doing the following:

Calculating:

Crude Mortality Rate

Age-Specific Mortality Rate

Age-Adjustment (using the direct method)

Prevalence

Incidence Density

Graphing:

Incidence and Prevalence

 

You will need to go to the American FactFinder, then click on Advanced Search in the area marked state, county, or place type your community (San Diego County)or a community near you and select enter. You are going to want information from a table that contains Age and Sex in the title.

 

Keith Bain discusses the various elements that make up the Trinity. Watch this short scene from DV8 Thetare’s 2014 performance of John, and describe the elements of the Trinity that you see at work. https://youtu.be/9N4LWVSkH1s

Keith Bain discusses the various elements that make up the Trinity. Watch this short scene from DV8 Thetare’s 2014 performance of John, and describe the elements of the Trinity that you see at work.

Cite another example of information technology companies pushing the boundaries of privacy issues; apologizing, and then pushing again once the scandal dies down. As long as the controversy fades, is there anything unethical about such a strategy?

Case

 

Google Collects Unprotected Wireless Network Information Google’s Street View maps allow users to zoom into a location on a map and view actual images of houses, shops, buildings, sidewalks, fields, parked cars, and anything else that can be photographed from the vantage point of a slow-moving vehicle. It’s a remarkable tool for those trying to find an auto repair shop, a post office, or a friend’s house for the first time. Google launched Street View in a few cities in the United States in May 2007. It gradually expanded to additional U.S. cities and then to other cities around the world. In August 2009, Google began collecting data for Street View in several German cities. Germany, however, has stricter privacy laws than other countries, and prohibits the photographing of private property and people unless they are engaged in a public event, such as a sports match. As a result, Google had to work closely with the country’s Data Protection Agency in order to comply with German laws in the hopes of getting its Street View service for Germany online by the end of 2010. In April 2010, a startling admission by Google provoked public outrage in Germany and around the world. It resulted in government probes in numerous countries, as well as several class action lawsuits in the United States. In response to queries by Germany’s Data Protection Agency, Google acknowledged that, in addition to taking snapshots, its cars were also sniffing out unprotected wireless network information. Google reported that it was only collecting service set identifier (SSID) data—such as the network name—and the media access control (MAC) address—the unique number given to wireless network devices. Google’s geo-location services could use this data to more accurately pinpoint the location of a person utilizing a mobile device, such as a smartphone. The company insisted that it was not collecting or storing payload data (the actual data sent over the network). The German Federal Commissioner for the Data Protection Agency was horrified and requested that Google stop collecting data immediately.93 Additionally, the German authorities asked to audit the data Google had collected. Google agreed to hand over its code to a third party, the security consulting firm Stroz Friedberg. Nine days later there came another admission: Google had in fact been collecting and storing payload data. But Google insisted that it had only collected fragmented data and made no use of this data.94 A few days later, Germany announced that it was launching a criminal investigation. Other European nations quickly opened investigations of their own. By early June, six class action lawsuits claiming that Google had violated federal wiretapping laws had been filed in the United States. In its defense, Google argued that collecting unencrypted payload data is not a violation of federal laws. Google explained that in order to locate wireless hotspots, it used a passive scanning technique, which had picked up payload data by mistake. The company used open source Kismet wireless scanning software that was customized by a Google engineer in 2006. Google insisted that the project’s managers were unaware that the software had been programmed to collect payload data when they launched the project. Finally, Google argued that the data it collected was fragmented—not only was the car moving, but it was changing channels five times per second. However, a civil lawsuit claimed that Google filed a patent for its wireless network scanning system in November 2008 that revealed that Google’s system could more accurately locate a router’s location—giving Google the ability to identify the street address of the router. The more data collected by the scanning system, the lawsuit contended, the higher the confidence level Google would have in its calculated location of the wireless hotspot. In the fall of 2010, the U.S. Federal Trade Commission (FTC) ended its investigation, deciding not to take action or impose fines. The FTC recognized that Google had taken steps to amend the situation by ceasing to collect the payload data and by hiring a new director of privacy.101 But by that time, 30 states had opened investigations into the matter. During the course of these and other investigations, Google turned over the data it had collected to external regulators. On October 22, the company announced that not all of the payload data it had collected was fragmentary. It had in fact collected entire email messages, URLs, and passwords. In November, the U.S. Federal Communications Commission announced that it was looking into whether Google had violated the federal Communications Act. Some analysts believe that Google’s behavior follows a trend in the Internet industry: Push the boundaries of privacy issues; apologize, and then push again once the scandal dies down. If this is the case, Google will have to decide, as the possible fines and other penalties accrue, whether this strategy pays off.

 

 

Discussion Questions

 

Questions 1. Cite another example of information technology companies pushing the boundaries of privacy issues; apologizing, and then pushing again once the scandal dies down. As long as the controversy fades, is there anything unethical about such a strategy?

Questions 3.  Enter the street address of your home or place of work to find what photos are available in Street View. Comment on the accuracy of Street View and the content of the photos you find. Does this sort of capability delight you or concern

Biotechnology harnesses cellular and biomolecular processes to develop technologies and products that help improve our lives and the health of our planet. We have used the biological processes of microorganisms for more than 6,000 years to make useful food products, such as bread and cheese, and to preserve dairy products.

Biotechnology harnesses cellular and biomolecular processes to develop technologies and products that help improve our lives and the health of our planet. We have used the biological processes of microorganisms for more than 6,000 years to make useful food products, such as bread and cheese, and to preserve dairy products.

According to the Biotechnology Industry Organization, “Modern biotechnology provides breakthrough products and technologies to combat debilitating and rare diseases, reduce our environmental footprint, feed the hungry, use less and cleaner energy, and have safer, cleaner and more efficient industrial manufacturing processes.”  As such, biotechnology can be used to:

a. Heal the World – healthcare

b. Fuel the World – industrial and environmental

c. Feed the World – food and agriculture

For this discussion, please respond to the following questions:

1. Which area of biotechnology (feed the world, fuel the world, heal the world) do you believe is the most important for society today? Explain your choice.

2. Identify and research a specific application of biotechnology from within the category you picked in number 1.

a. Describe in detail its use

b. Describe its impact on society.

3. Cite all references