Discuss why mental health nurses establish a therapeutic relationship/ therapeutic alliance with mental health consumers who have schizophrenia.

Discusses how mental health nurses establish a therapeutic relationship/ therapeutic alliance with mental health consumers who have schizophrenia. Supports answer by referencing literature and evidence, and writes in manner consistent with academic conventions.Discusses why mental health nurses establish a therapeutic relationship/ therapeutic alliance with mental health consumers who have schizophrenia. Supports answer by referencing literature and evidence, and writes in manner consistent with academic conventions

Examine how schools and families in the Australian context have changed their attitude towards children since World War II.

Examine how schools and families in the Australian context have changed their attitude towards children since World War II.Your essay should include these four themes as Headings:1. Educational reforms and their influence on, for example:- participation rates, classroom and behaviour management, pedagogies, literacy acquisition, skilled workforce, further education expectations, attitudes toward Aboriginal and Torres Strait Islander communities, Education revolution: BYOD (Bring your Own Device); values education, Safe Schools Program.2. The ACARA curriculum reforms and the NESA syllabus documents.3. A Key Learning Area of your choice and how it is taught in Christian and alternate school contexts.4. Specific Christian educators that support your opinionsFocus on:-Creative evaluation of change on the impact of ethics, professionals’ roles, legislative and organisational processes and parents/carers in effective education of young people.Concise evaluation of the concepts substance and structure of ACARA curriculum reform and NESA syllabus documents related to one KLA in Christian or alternate schooling contextsComprehensive engagement with the philosophical perspectives and assumptions revealing accurate, perceptive and detailed understandingsWell-structured innovative response using appropriate academic writing; with references strongly integrated, used accurately and suitable for publication

Apply professional communication skills to support and manage the engineering of a large softwaresystem.

This assignment requires you to develop a state chart diagram for an Oral B Braun 5000 electrictoothbrush. Starting from the user manual you should first analyze the functionality of the toothbrushand its interaction with the SmartGuide and then, using suitable software, produce a state transitiondiagram which covers both. Your state chart diagram will be demonstrated subjected to tests you havedeveloped.Timelines and ExpectationsPercentage Value of Task: 20%Minimum time expectation: at least 10 hoursLearning Outcomes AssessedThe following course learning outcomes are assessed by completing this assessment:S1. Critically analyse and use complex decision making to research and determine the appropriateSoftware Engineering tools and methodologies to utilize in a given situation.S2. Apply professional communication skills to support and manage the engineering of a large softwaresystem.S3. Review, critically analyse and develop artefacts to define processes for quality assurance, riskmanagement and communication in large software development projects.S4. Implement quality assurance activities in order to verify user requirements and validate designdecisions.A1. Analysis of a large system development problem to decide upon the best methodologicalapproach.Assessment Details1) Read through the User Manual (O3764_14_LA.pdf) to familiarize yourself with the toothbrushand SmartGuide2) List the functionality of the Oral B Braun 5000 electric toothbrush3) List the functionality of the Oral B Braun 5000 SmartGuide4) Choose suitable software to use in developing and demonstrating your state transitiondiagram e.g. MATLAB, Enterprise Architect or even Mathematica, Maple or similar software;explain your choices5) Develop a state transition diagram which includes both the toothbrush and SmartScreenCRICOS Provider No. 00103D ITECH7410 Software Engineering Methodologies – Sem 1, 2019 Page 2 of 36) Demonstrate your final produce as a video (most smart phone cameras should be adequate)– please ask your tutor if you need feedback on the quality of the video and audio7) You should submit a report which adheres to the presentation of academic work1

How to better manage interdepartmental communication in respect to work place safety in trauma situations.

LITERATURE REVIEW – Patient Experience Write a 6 page literature review of the following references. This needs to be done in APA format. The focus of the literature review needs to follow the following Research guidelines: Problem: There is very little communication when there is a violent patient or potentially violent patient being treated by clinicians across multiple departments in emergency medicine. Purpose: To manage improved communication techniques between departments in respect to work place safety in trauma situations. Research question: How to better manage interdepartmental communication in respect to work place safety in trauma situations Tentative title: Interdepartmental communication in respect to work place safety in trauma situations. (Ahmed, Burt, & Roland, 2014; Hogerzeil, Samson, Jaume Vidal, & Rahmani-Ocora, 2006; Kumar, Henseler, & Haukaas, 2009; Lewis, 2015; Nancy Mannion et al., 2017; Padgett, 2014; Robbins, 2014; Rosiek & Leksowski, 2013; Stuttaford et al., 2014) References Ahmed, F., Burt, J., & Roland, M. (2014). Measuring Patient Experience: Concepts and Methods. The Patient, 7(3), 235-241. Hogerzeil, H. V., Samson, M., Jaume Vidal, C., & Rahmani-Ocora, L. (2006). Is access to essential medicines as part of the fulfilment of the right to health enforceable through the courts? The Lancet, 368(9532), 305-311. Kumar, S., Henseler, A., & Haukaas, D. (2009). HIPAA’s effects on US healthcare. International Journal of Health Care Quality Assurance, 22(2), 183-197. doi:http://dx.doi.org/10.1108/09526860910944665 Lewis, T. (2015). Healthcare Leaders Who Influence the Sustainability of High Patient Satisfaction Scores. (3721844 Ph.D.), The Chicago School of Professional Psychology, Ann Arbor. Retrieved from https://proxy.cecybrary.com/login?url=https://search.proquest.com/docview/1721470413?accountid=26967 ProQuest Dissertations & Theses Global database. Nancy Mannion, B., Bhattacharya, A., Edwards, C., Fasnacht, A., Mazzone, L., Stephens, K., . . . Swanson-Bierman, B. (2017). Impact of a Planned Workflow Change: Super Track Improves Quality and Service for Low-Acuity Patients at an Inner-City Hospital. Journal of Emergency Nursing, 43(2), 114-125. doi:http://dx.doi.org/10.1016/j.jen.2016.03.029 Padgett, J. D. (2014). Patient Safety Culture and High Reliability Organizations. (3625714 D.B.A.), Walden University, Ann Arbor. Retrieved from https://proxy.cecybrary.com/login?url=https://search.proquest.com/docview/1557705479?accountid=144789 ProQuest Central database. Robbins, B. G. (2014). On the Origins of Trust. (3641622 Ph.D.), University of Washington, Ann Arbor. Retrieved from https://proxy.cecybrary.com/login?url=https://search.proquest.com/docview/1622540352?accountid=26967 ProQuest Central; ProQuest Dissertations & Theses Global database. Rosiek, A., & Leksowski, K. (2013). How the Practicing Physician Encounters Human Rights in Daily Clinical Situations. Health, Culture and Society, 4(1), 66-n/a. doi:http://dx.doi.org/10.5195/hcs.2013.110 Stuttaford, M., Makhamreh, S. A., Coomans, F., Harrington, J., Himonga, C., & Hundt, G. L. (2014). The right to traditional, complementary, and alternative health care. Global Health Action, 7. doi:http://dx.doi.org/10.3402/gha.v7.24121

Discuss how the impact of culture affects interpretations of symptoms and recommendations of services for that organization.

Write a 700- to 1,050-word paper in which you examine depression in the context of the chosen organization’s goals. Include the following in your paper: Research the organization’s website – Anchorage Community Mental Health Identify multiple cultures the organization serves. (Alaska Native most prevalent) Identify symptoms of your selected disorder and describe how the interpretation of the symptoms varies across cultures. Discuss how the impact of culture affects interpretations of symptoms and recommendations of services for that organization. Information to include in the paper: Anchorage Community Mental Health Services, Inc. (ACMHS) has been providing services in Alaska since 1974. Their mission is to promote recovery and wellness by providing consumer-driven behavioral health services to the people of Anchorage and the surrounding areas. Consumer driven means the consumer is choosing their own healthcare and the paving the path to the recovery. They serve children we are severely emotionally disturbed and adults with severe mental illness.

Automated Teller Machines (ATM) are designed so that users will provide a personal identification number (PIN) and a card to access their bank accounts. Give examples of confidentiality, integrity and availability requirements associated in such a system and describe the degree of importance for each requirement.

TaskThis assessment aims to develop and gauge student understanding of the key topics covered so far by answering the following questions. Answering these questions will help you build some understanding for the next assessment item as well as for the entire subject. It is expected that answers to the assignment questions be succinct (i.e. precise and concise) with all sources of information fully referenced as per APA referencing style. You have to reference the text book and any additional material you have used in your answers.Note that the guide for APA referencing is provided in the resources section of Interact site of this subject.Answers MUST be written in your own words. If an answer contains more than 10% direct quote (referenced or unreferenced), 0 marks will be awarded for this question. One or two sentence answers will be too short and only receive low marks. Answers longer than 1.5 pages (12 point font, single line spacing) may incur a penalty if too much non-relevant information is stated. For mathematical questions it is expected that you show intermediate steps of your working. Just stating the correct solution will result in low marks, on the other hand if the working is correct and you only made minor mistakes, you will still be awarded marks, even though the final answer is wrong.Question 1 [5 Marks]Automated Teller Machines (ATM) are designed so that users will provide a personal identification number (PIN) and a card to access their bank accounts. Give examples of confidentiality, integrity and availability requirements associated in such a system and describe the degree of importance for each requirement.Question 2 [5 Marks]A thief broke into an Automated Teller Machine (ATM) using a screwdriver and was able to jam the card reader as well as breaking five keys from the keypad. The thief had to halt the process of break-in and hide, as a customer approached to use the ATM. The customer was able to successfully enter their ATM card, punch in the 4 digit PIN and was able to draw out some cash. Since the card reader was jammed, the customer was however not able to withdraw the ATM card, and drove off to seek some help. In the meantime, the thief came back and decided to try to discover the customer’s PIN so that he can steal money from the customer. You are required to calculate the maximum number of PINs that the thief may have to enter before correctly discovering the customer’s PIN?Question 3 [5 Marks]Thinking about bio-metric authentication, list three reasons why people may be reluctant to use bio-metrics. Describe various ways of how to counter those objections.Question 4 [5 Marks]In bio-metric authentication, false positive and false negative rates can be tuned according to the requirement, and they are often complementary i.e. raising one lowers the other. Describe two circumstances where false negatives are significantly more serious than false positives.Question 5 [10 Marks]Transposition is one known method of encrypting the text. What can be one way that a piece of cipher text can be determined quickly if it was likely a result of a transposition? Utilising some of the decryption techniques (substitution and others) covered in the subject so far, you are required to decipher (find the plain text) the cipher text that will be proviced to you closer to the assessment due date via the subject site. In order to present your solution, you need to demonstrate and explain the steps taken to decipher this text.

Describe a methodology for identifying types of Federal information and information systems.

Title III of the E-Government Act (Public Law 107-347), titled the Federal Information SecurityManagement Act (FISMA), tasked the National Institute of Standards and Technology (NIST) todevelop:• Standards to be used by all Federal agencies to categorize all information and informationsystems collected or maintained by or on behalf of each agency based on the objectivesof providing appropriate levels of information security according to a range of risk levels;• Guidelines recommending the types of information and information systems to beincluded in each such category; and• Minimum information security requirements (i.e., management, operational, andtechnical security controls), for information and information systems in each suchcategory.In response to the second of these tasks, this guideline has been developed to assist Federalgovernment agencies to categorize information and information systems. The guideline’sobjective is to facilitate application of appropriate levels of information security according to arange of levels of impact or consequences that might result from the unauthorized disclosure,modification, or use of the information or information system. This guideline assumes that theuser is familiar with Standards for Security Categorization of Federal Information andInformation Systems (Federal Information Processing Standard [FIPS] 199). The guideline andits appendices:• Review the security categorization terms and definitions established by FIPS 199;• Recommend a security categorization process;• Describe a methodology for identifying types of Federal information and informationsystems;• Suggest provisional1security impact levels for common information types;• Discuss information attributes that may result in variances from the provisional impactlevel assignment; and• Describe how to establish a system security categorization based on the system’s use,connectivity, and aggregate information content.This document is intended as a reference resource rather than as a tutorial and not all of thematerial will be relevant to all agencies. This document includes two volumes, a basic guidelineand a volume of appendices. Users should review the guidelines provided in Volume I, thenrefer to only that specific material from the appendices that applies to their own systems andapplications. The provisional impact assignments are provided in Volume II, Appendix C and D.The basis employed in this guideline for the identification of information types is the Office of

Describe the essential elements required to create,manage and discharge a contract and the remedies available for breach of contract.

This assessment addresses the following subject learningoutcomes:2. Describe the essential elements required to create,manage and discharge a contract and the remediesavailable for breach of contract.3. Explain the different ways in which a business may becarried and the advantages and disadvantages ofeach method.

Describe and discuss the principles of ethical practice as they pertain to the information technologyand business sectors.

LO1: Describe and discuss theprinciples of ethical practice as theypertain to the information technologyand business sectors.LO3: Demonstrate comprehension ofbasic problem solving and decisionmakingskillsAssessment Description Students are required to write a reflective journal based on the previousclasses e.g. week 5 – 8. In each journal, you should include:? What you have learned in the previous weeks? Define and discuss relevant concepts and theories? How you will use the knowledge learnt in the future as an ITProfessional? At least 3 journal articles (Harvard Referencing)Detailed SubmissionRequirementsBefore submission, you ensure the submitted work satisfies the followingrequirements:? Moodle submission? 500 words? Turnitin

What are the ‘interrupts’ in a computer system? Describe the approaches to deal with multiple interrupts in a system.

Question 1.a) Determine the value of base b if (152)b = 0x6A. Please show all steps. [3 marks]b) Convert the followings: (Please show all steps; no marks will be awarded if no steps are shown) [1.5×4 = 6 marks]i) 0xBAD into 3-base representationii) 3217 into 2-base (binary) representationiii) 1235 into octal representationiv) 21.218 into decimal representationc) Given a (very) tiny computer that has a word size of 3 bits, what are the lowest value (negative number) and the highest value (positive number) that this computer can represent in each of the following representations? [3 marks]i) One’s complementii) Two’s complementiii) Signed MagnitudeQuestion 2.a) The Fibonacci numbers are the numbers in the following integer sequence, called the Fibonacci sequence, and are characterised by the fact that every number after the first two is the sum of the two preceding ones: 0, 1, 1, 2, 3, 5, 8, 13, 21, 34, 55, 89, 114, … etc.By definition, the first two numbers in the Fibonacci sequence are 0 and 1, and each subsequent number is the sum of the previous two. We define Fib(0)=0, Fib(1)=1, Fib(2)=1, Fib(3)=2, Fib(4)=3, etc. The first 22 Fibonacci numbers given below:Fib(0) Fib(1) Fib(2) Fib(3) Fib(4) Fib(5) Fib(6) Fib(7) Fib(8) Fib(9) Fib(10)0 1 1 2 3 5 8 13 21 34 55Fib(11) Fib(12) Fib(13) Fib(14) Fib(15) Fib(16) Fib(17) Fib(18) Fib(19) Fib(20) Fib(21)89 144 233 377 610 987 1597 2584 4181 6765 10946Write a MARIE program to calculate Fib(n), where the user inputs n. For example, if the user inputs 7, the program outputs the value 13; if the user inputs 15, the program outputs the value 610; if the user inputs 20, the program outputs the value 6765 and so on. You need to write and run the program using MARIE simulator. Please include appropriate comments to make your code readable.[8 marks]b) For some values of n, your program will not produce correct results. You can check this by gradually increasing the values of n and checking for the correct outputs. What is the maximum value of n for which your program produces a correct result? Why? Please comment on this [3 marks].Question 3.a) What are the ‘interrupts’ in a computer system? Describe the approaches to deal with multiple interrupts in a system. [4 marks]b) Analyse the benefits of using a multiple-bus architecture compared to a single-bus architecture for a computer system. [3 marks]Rationaleback to topThis assessment task will assess the following learning outcome/s:• be able to investigate and describe the essential elements of a computer and their functionalities.• be able to apply an understanding of data representations and calculations to practical situations.• be able to develop an elementary computer program.