Get help from the best in academic writing.

CPT 310 Ashford University Week 3 Normalization of Database Tables Discussion

CPT 310 Ashford University Week 3 Normalization of Database Tables Discussion.

Prior to beginning this discussion, read Chapter 5: Advanced Data Modeling and Chapter 6: Normalization of Database Tables from the course text. In addition, you may also want to complete problems 10.a, 10.b, and 10.c in Chapter 6. These problems will assist you in completing this discussion.In relational database design, the process of organizing data to minimize redundancy usually involves dividing a database into two or more tables and defining relationships between the tables. In your initial post, list the first three normal forms, and describe the criteria required to satisfy each one of them. Support your analysis with practical examples.
CPT 310 Ashford University Week 3 Normalization of Database Tables Discussion

Success or Failure in Life and Emotional Intelligence Discussion.

‘EMOTIONAL INTELLIGENCE 2.0’by Travis Bradberry & Jean GreavesThe concept of Emotional Intelligence is being discussed in most areas of organizational management, but it can be easily broken down into 4 main concepts which are described in this book. These subjects are self-awareness, self-management, social awareness, and relationship management through life skills development. Empathy is also discussed and should be addressed in the paper. These concepts are extremely relevant to our study of Crew Resource Management but more importantly, this book will be valuable to you in every aspect of your life. This book and these concepts help you to know and define yourself as well as helping you in your interaction with others. Several aircraft accidents and incidents can be attributed to poor crew interaction instigated by unexpected individual actions. When you buy this book (new only, not used), you will be able to access an electronic emotional intelligence test which will help you identify your strengths and weaknesses in these areas. Knowledge of these subjects is crucial as you prepare to enter your professional life not only as an aircrew member but as a future captain. Knowledge of these subjects is also invaluable in your personal life and relationships.Be prepared to discuss this book in detail on Week 5: Self-Awareness and Self-Management Strategies and Social Awareness and Relationship Management Strategies.Your assignment will be a 4 to 5-page paper describing Emotional Intelligence and how an understanding of Emotional Intelligence will affect your actions and interactions as an aircraft crewmember. A course of action that has proved both beneficial and personally enlightening: take the electronic self-assessment (code found at the end of the NEW copy of the book) and use the results and the book content as a basis for the paper. A paper without reference to the guest lectures and the electronic self-assessment will not have employed the resources available and will be assessed accordingly. If we are fortunate enough to have Dr. Robin Rose as our subject matter expert (SME) presenting this module, references to her presentation will be expected in your paper.
Success or Failure in Life and Emotional Intelligence Discussion

week 3 hw continued.

I didn’t realize there was more to this assignment due to the outline of the syllabus. Can you do the last 3 questions and add them to the week three excel sheet. This is the format he’s looking forUse ONE Excel fileYour first worksheet within that file should be your name and the assignment titlePut ONE problem on each separate worksheet within that fileLabel each worksheet with the chapter and problem number (i.e., Ch3-pr8)Include ALL formulas in the function ribbon for each cell so I can check your workHIGHLIGHT your final answers (I don’t care what color, as long as I can read the answer)
week 3 hw continued

University of Wisconsin Madison Monster Collector Project.

I’m working on a Java project and need support to help me understand better.

All of the instructions are within the Java doc header comments and the example output is attached in a file.Please make the code as simple as possible only using the provided imported tools(Random, Scanner, etc).import java.util.Random;import java.util.Scanner;public class MonsterCollector { /* * This method is for trying to catch a monster of your very own! * Generate a random number from 1 to 5 inclusive. If the user did NOT guess this number, they caught the monster. * Add that monster to the next null spot in the myMonster array. If they were successful * in catching the monster print “Congratulations, you caught [monster]!” * otherwise print “You almost had it, but the monster escaped.” * If monster, myMonsters, or rand is null, return before doing ANYTHING else in the method. * * @param userGuess – user guess between 1 and 5 * @param monster – monster retrieved from getMonster * @param myMonsters – array of monsters user has caught * @param rand – random number generator */ public static void catchMonster(int userGuess, String monster, String[] myMonsters, Random rand) { } /* * This method is for retrieving your next monster to encounter. * Search through the array starting at index 0 until you find an index that is not null; * this will be the monster you encounter. Set that monsters index to null and return * the monster. * * @param monsters – the array of monster left to encounter * @return String – next monster to encounter. If monsters is null, return null. * If you search through the entire monsters array, and all indexes are null, return null. */ public static String getMonster(String[] monsters) { return null; } /* * Count the number of monsters the user caught, and print it to the console. * If the user caught all the monsters, they are the master! Otherwise, * they must continue to train. * The number of monsters the user caught will be the number of non-null elements in the user’s monster array, * while the total possible monsters is the size of the myMonsters array. * (See assignment page for example output) * * @param myMonsters – monsters the user has caught */ public static void printResult(String[] myMonsters) { } /* * This is the main method. * Config.MONSTERS is an array provided in, full of cool monsters to encounter! * Create a new array the same size as Config.MONSTERS, then copy all the entries from Config.MONSTERS * into your new array.(Hint: A loop could be useful here) * Welcome your user to the game, and start your game loop. The game ends when the user has encountered * all monsters in our monsters array. * First get the monster we are going to encounter. If the monster is null, inform the user there are no more * monsters to encounter, and end the game. If the monster is not null, prompt the user for a number between * 1 and 5 and begin the encounter. If the user input is out of range of 1 – 5, prompt the user again until we * receive correct input. * When the game ends, print the results. * (See assignment page for example output) * * @param args unused */ public static void main(String[] args) { }}//Below is the file that needs to be utilized in the main program along with the seed that cannot be changed. filepublic class Config { public static final String[] MONSTERS = new String[] {“pikamoo”,”bulbaroar”,”chubaboo”,”nubat”,”qualimer”}; public static final int SEED = 365;}
University of Wisconsin Madison Monster Collector Project


Assignment. I’m trying to study for my Psychology course and I need some help to understand this question.

For this written assignment you will think of leadership in all of its dimensions. Leadership is a term that is often used in education, business, and the military. In this class, you will have the opportunity to explore specific theories and paradigms of leadership.
Please make sure to read the required articles on work motivation by Ruth Kanfer and take a look at the following online resources to get an overview some of the main leadership theories.
MindTools. (2016). Core leadership theories: Learning the foundations of leadership. Available online at (Links to an external site.)
Leadership-central. (2016). Leadership theories. Available online at (Links to an external site.)
Zigarelli, M. (2013). Ten leadership theories in five minutes‬. [Video file]. Retrieved from Ten Leadership Theories in Five Minutes
Please respond to the following questions:
Which leadership theories spoke to you the most? Which ones have you seen in practice in your career or otherwise? Which ones have you implemented in your life, whether or not you were aware of doing so? Please explain how at least one theory has been demonstrated by one person in your life, or yourself.
Also, how might Ruth Kanfer’s three C’s of work motivation (content, context, and change) be applicable knowledge for a leader? How might you apply (or contrast) each leadership theory that you read about to this paradigm of work motivation?
As you prepare this written assignment for the course, please keep in mind that a successful final draft of any written assignment should be the product of brainstorming, outlining, and writing multiple drafts. Many of the assignments in this course are building blocks toward the final Leadership Theory paper, but it is important to keep in mind that you will need to continually revise your work using the feedback from your instructor as well as the Writing Center as you use these pieces to develop the final draft. The Writing Center is a great service for all students, offering 24/7 live chat support and a 24 hour feedback turnaround for papers and discussion posts. It is suggested that you submit a draft for the Writing Center for this paper, and required of you for the written assignments in Weeks 5 and 6. In addition, continue to leverage Grammarly and Turnitin as you build toward the final paper. HelpNow! (Links to an external site.) has three video tutorials on how to use Turnitin, an online tool that evaluates written work for originality and proper citations. You can also review the Turnitin FAQs (Links to an external site.) for responses to specific questions about the tool.
Make sure your completed written assignment is at least 300 words. Your assignment can refer to your own experience, but make sure to include content from readings, the online resources, or other reputable media and websites.

WRK 100 Temple College Preparing for the Future of Work Development Plan Worksheet

write my term paper WRK 100 Temple College Preparing for the Future of Work Development Plan Worksheet.

Course: WRK100: Preparing for the Future of WorkAssignment 3: Development Plan for Three SkillsDue: Week 9Points: 125What to submit/deliverables: Word document that contains the Assignment 3 Template.What is the value of doing this assignment? For the last nine weeks, you’ve been learning how the 10 Skills are an essential part of being successful in the future world of work. In Assignment 2, you began to reflect on your skills and goals and how the 10 Skills have helped you reach accomplishments. Your understanding of the skills have been refined, and now it’s time to reflect on your strengths and areas for growth again in order to develop a plan moving forward.For this assignment, you’ll identify three skills that you’d like to focus on and develop a plan for. This could be the three skills you wrote about for Assignment 1, or three new skills. As you think of which skills you’d like to improve upon, consider choosing skills at varying levels. You might, for example, choose a skill that you are already strong in, but would be excited to continue exploring and building upon, as well as a skill in which you might have more room for growth in. At the end of the assignment, you’ll leave with the beginning of a tangible plan for personal and professional development that you can review with the Career Center team.Your goal for this assignment is to: Practice your communication skill by using the Assignment 3 Template to outline a plan for developing skills to support a successful learning experience and career. To truly develop your communication skill it is important that you write using your own words and do not cut and paste from the Skills Definition table or any other source. (See the Skill Development Plan Sample.)Steps to complete: In Week 9, complete and submit your Development Plan for Three Skills using the following steps:STEP 1: Identify the targeted skill. Summarize your strengths and areas of improvement in this skill area. Then, identify your desired outcomes around this skill area and write a positive goal statement. Review the Skills Definition table if you need a quick reminder of the 10 skills. Complete the following sections of the template:• Target Skill• Strengths• Areas of Improvement• Desired Outcome• Goal StatementSTEP 2: Specify the actions you can take to work towards your goals, with specific strategies and practices that you can apply. Identify any potential obstacles and challenges to achieving your goal. Complete the following sections of the template:• Practices for Growth• Action Steps• Potential Obstacles and ChallengesSTEP 3: Keeping your action plan in mind, identify trusted supporters and university resources that can help you in your skill development plan. Complete the following sections of the template:• Key Supporters• Supporting University ResourcesSTEP 4: Reflect on the connections between skill development and your overall personal, academic, and professional goals. Complete the following sections of the template:• Benefits From Change and Connections to Personal, Academic, and Career Goals.STEP 5: Complete Steps 1–4 for the two other skills you have identified. When you are done you should have three plans filled out in the template for three different skills.STEP 6: Save the template with your completed responses as a Word file titled Your Name, WRK100_Assignment 3 Skill Development Plan and submit in Blackboard in Week 9. To help make sure you are properly citing your sources, please review Strayer Writing Standards.Assignment 3 RubricAssignment Help
WRK 100 Temple College Preparing for the Future of Work Development Plan Worksheet

Exclusionary Rule: Benefits and Liabilities Essay

Abstract The Exclusionary rule is a serious and complex issue in criminal law that can have elaborate consequences when breached. The rule involves all types of evidence acquired by the representatives of the law enforcement in an unconstitutional manner and conflict with the Fourth Amendment to the United States Constitution. The present paper covers multiple aspects of the Exclusionary rule (such as Fruit of the Poisonous Tree and Christian burial speech), as well as its benefits and liabilities, and explains the potential consequences of non-adherence to the rule. Description, Purpose, and Benefits The Exclusionary rule is based on the rights granted to the United States citizens by the Fourth Amendment to the Constitution that was designed to protect the right of the American citizens “to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures”; additionally, the Amendment states that “no Warrants shall issue but upon probable cause” (“Fourth Amendment,” 2017, p. 1). However, even though the Amendment was ratified at the end of the 1700s, over a hundred years after its ratification it continued to have no power because all the evidence obtained by the representatives of the law enforcement during the searches of the suspects and their premises was considered admissible in the trials and prosecution (“The Fourth Amendment and the ‘Exclusionary Rule’,” 2017). The changes were introduced by the Supreme Court in 1914 in Weeks v. the United States, 232 U.S. 383; as the defendant’s conviction was based on evidence that was taken without a warrant, the Supreme Court ruled that the evidence serving as the ground for conviction had no power due to being acquired unconstitutionally. As a result, the conviction was reversed creating the Exclusionary rule that was further ratified by the other states. The major purpose of the Exclusionary rule is to protect the United States citizens from police misconduct and unsanctioned seizures and searches. Also, the rule provides the defendants with the right to exclude evidence from being unsigned at a trial if there is proof that the evidence was obtained unconstitutionally and thus is not admissible (“The Fourth Amendment and the ‘Exclusionary Rule’,” 2017). The exclusionary rule has evoked some controversy and opposition in the general public as it can be abused by the criminals, thus enabling them to exclude evidence when convicted and walk free from the trials (“Exclusionary rule pros and cons list,” 2016). However, the rule is necessary as its major objective is to provide security to the United States citizens and ensure that the operation of the law enforcement services and federal agents is controlled, thus limiting them from abusing the granted power. In that way, the Exclusionary rule serves to establish the balance of rights and freedoms among the citizens and law enforcement. The Best Evidence The title of the Best evidence rule speaks for itself. Practically, the rule applies to the procedures undertaken for the evidence expected to be presented during a trial. Usually, the application of the rule means that the “best” evidence should be detected and used; the quality of evidence is measured based on the validity of the copied of written or printed documents – the official and verified copies are prioritized (“What is the best evidence rule?” 2014). The theory of Best evidence does not apply to the printed documents as much in contemporary times since the creation of a digital copy does not require re-writing the document and the chances of errors as minor. However, the rule is more relevant for demonstrative evidence such as actual objects and video records. For example, in a scenario when an object serves as the evidence (a piece of clothing with bloodstains on it, for instance) – it should always be referred to a photograph or a model of this object (unless the object itself was somehow destroyed or lost). The same rule applies to films; in the cases when films serve as evidence – the original records from a security camera are preferred to the unofficial versions that could have been altered by mistake or deliberately. Fruit of the Poisonous Tree Fruit of the poisonous tree is the widely accepted name used for the type of evidence that happened accidentally to be found during the investigation on another cause, and that would not have been revealed otherwise (“Exclusionary rule,” n.d.). This kind of evidence also falls under the scope of the Exclusionary rule and can be suppressed at trial should the respondent request it. Get your 100% original paper on any topic done in as little as 3 hours Learn More The doctrine is in place to deter the law enforcement representatives from abusing their power. The failure to avoid breaking the rule will lead to the withdrawal of evidence revealed illegally and could jeopardize the entire course of investigation built based on such evidence. United States v. Crews (1980) is a good demonstration: a victim was assaulted at pinpoint and reported the crime to the police immediately describing the offender. Soon, a person matching the description is located; however, his picture could not be taken for further investigation. The person is arrested, brought to the police station for questioning, and photographed; his image is shown to the victim who recognized him as the offender; she also does so in the following line-up, and the offender is convicted. However, the court rules to suppress the evidence because the suspect was seized unconstitutionally in the first place and the line-up would not have occurred without it. Another suitable scenario in United States v. Patane (2004) where during the investigation of a restraining order violation, it was revealed that the respondent illegally owned a gun; the weapon was acquired violating the fruit of the poisonous tree doctrine as the investigator was made aware of the respondent’s gun ownership by a peer, which made the entire case inadmissible at trial. Christian Burial Speech The issues referred to as the Christian Burial Speech first occurred in Brewer v. Williams in 1977 when a police officer spoke to the convicted mentally ill individual and convinced him to lead the police to the body of his victim while being transferred from one station to another even though the offender had been previously advised not to answer the officers’ questions; as a result, the actions of the respondent qualified as the compulsory self-incrimination causing the Supreme Court to rule to overturn the charges. Such violations may jeopardize the entire investigation and all the evidence obtained with the help of the Christian Burial Speech thus making it inadmissible at trial and causing the court to overturn the conviction. Shocking to the Conscience The court rulings based on the facts that were recognized as shocking to the conscience of the court justice in place have not been issued in over a hundred years (Denning, 2015). Such decisions are rather subjective and are based solely on the mindset of one person. The older scenarios that involve the character of shocking to the conscience date back to the early 1900s and late 1800s; they revolved around the prices for real estate that could be named shocking to the conscience due to being too high. The modern scenarios shocking to the conscience could potentially involve the actions of law enforcement officers that would shock the conscience of court justices. Coercion Coercion represents another way of unlawful acquisition of evidence or confession; the United States citizens are protected from it by the Fifth Amendment that covers the issue of self-incrimination. The behaviors that are characterized as coercive involve the acquisition of information in the settings that are particularly threatening to the convicted persons and the ones violating Miranda procedures. Such information cannon the presented as evidence or used by the prosecution at trial. Liabilities of the Exclusionary Rule The rule can be abused by the defendant and cause the suppression of evidence that was eligible. This error may occur due to the lack of an explicit statement of which actions quality as the breach of the Fourth Amendment. Also, the execution of the rule lengthens the trial processes for several months or even years. The evidence dismissed due to the rule still points at the convicted person’s guilt; however, it results in an overturn of the conviction, thus releasing the dangerous individual of the charges and potentially endangering the society. Conclusion The complexity of the Exclusionary rule makes it necessary for the law enforcement services to adhere to it and avoid engaging in practices jeopardizing the investigation or information acquired throughout its course. The rule is initially intended as the protection of the United States citizens from the infringement of their constitutional rights. However, it is often used by the offenders to benefit their cases and help them obtain miler sentences or be freed of charges. In some cases, the criminals plan their offenses based on the rule. In that way, it is detrimental that criminal justice professionals are extra careful while obtaining and working with evidence. References Denning, J. (2015). When police actions “shock the conscience”. Web. We will write a custom Essay on Exclusionary Rule: Benefits and Liabilities specifically for you! Get your first paper with 15% OFF Learn More Fourth Amendment. (2017). Web. Exclusionary rule pros and cons list. (2016). Web. The Fourth Amendment and the ‘Exclusionary Rule’. (2017). Web. United States v. Crews. (1980). Web. United States v. Patane. (2004). Web. What is the best rule theory? (2014). Web.

A balance between deindividuation and individuality

A balance between deindividuation and individuality. According to the model of Deindividuation, crowds, which usually create anonymity, lead to the loss of self-awareness. This account has been challenged by various researches which have shown that individuals can indeed accentuate their self-expression, despite being surrounded by a crowd of anonymous strangers. Psychologists have attempted to use the concept of self-awareness and deindividuation to predict and explain group behaviour. However, the explanations are often over-simplified as seen in this study which concluded that deindividuation is certainly not inevitable, as the buffer manifested within the extremes of individuality and deindividuation constantly try to maintain equilibrium. A Balance Between Deindividuation and Individuality in Group Behaviour Groups play a significant role in influencing an individual’s direction of attention (Diener, 1980). The irony is that when a group of anonymous strangers form, deindividuation will constantly be sought, yet people want to be unique (Dipboye, 1977). The word inevitable is defined as a situation that is “incapable of being avoided” (SoanesA balance between deindividuation and individuality