Get help from the best in academic writing.

Do Olfactory Cues Effect Ovulation, psychology homework help

Do Olfactory Cues Effect Ovulation, psychology homework help.

The effects of olfactory cues and pheromones on animals,
from marking territory to inducing ovulation, have been widely
documented. However, in humans, these effects have been difficult to
document.Review the following article:Miller, S. L., & Maner, J. K. (2010). Scent of a woman: Men’s testosterone responses to olfactory ovulation cues. Psychological Science, 21(2), 276–283. doi: 10.1177/0956797609357733. Retrieved from
http://pss.sagepub.com.libproxy.edmc.edu/content/21/2/276.full.pdf+html Using the module readings, the Argosy University online library resources, and the Internet, research olfactory ovulation cues. Based on your analysis of the article and your research, respond to the following: Would you participate in a study such as the one described in the article above (Miller & Maner, 2010)? Why or why not?
What is the utility of this type of experiment in examining social interactions between men and women?
What are some of the methodological concerns that arise when reading about this research?
What directions for future research would you suggest for this topic? Write your initial response in 300–500 words. Apply APA standards to citation of sources.
Do Olfactory Cues Effect Ovulation, psychology homework help

Introduction Advancement in technology has brought about revolution in telecommunication industry. This has led to increased use of camera phones and digital cameras in the United States. Estimates show that nearly half of American families have cameras. Moreover, they also show that nearly 40% of the families have camera phones. This shows that people have embraced technology. However, it is worrisome that some people risk their lives to use these gadgets. For instance, a graduate student (Jamal Albarghouti) took footage of the Virginia student massacre on a camera phone. Similarly, another 19 years old college student (Ho) took footage of plane crash on a digital camera. These cases provide examples of citizens who risk their lives to take video footages (Rottenberg and Winchell 262-265). Summary of the two articles Praise for Student’s footage of Virginia tech Mass killing The article by Lily Yulianti narrates about a chilling event at Virginia Tech. Yulianti reports how a Palestinian graduate student (Jamal Albarghouti) took footage of mass killings at the college using a phone camera. Albarghouti took a detailed footage of the event. Yulianti mentions in the article that Larry King, a news reporter with CNN, was amazed at Albarghouti’s achievement. The article goes through the event as taken in the footage. It mentions mass shootings, which was experienced at the College. In addition, the article covers Albarghouti’s interview with Larry king. Yulianti’s main concern in the article is about Albarghouti’s safety (Rottenberg and Winchell 262-265). She could not understand why Albarghouti stopped and take footage of events in such a commotion. Moreover, he was not a professional journalist. The article describes how Albarghouti gave an account of the event to King. Yulianti describes Albarghouti’s account on the event as clear and firm. However, she also notes that Albarghouti was used to such hostilities back in Gaza. Later on, the author introduces the citizen journalism debate, which has received criticism from traditional media. She therefore wonders why exclusive reports from citizen journalists are met with suspicion by the mainstream media (Rottenberg and Winchell 262-265). Disaster Photos: Newsworthy or Irresponsible The second article is about a debate on whether photos taken by survivors are newsworthy or irresponsible. The article begins by recounting how plane crashes have prompted concerns by safety investigators. In addition, it gives a detailed description of London bombings as well as witness photos from survivors. The article wonders why victims put the lives at risk to take pictures during tragic events like plane crash. It goes on to give a story of Ho, a student who took pictures of a plane crash disaster, in which he was a crew (Rottenberg and Winchell 262-265). Get your 100% original paper on any topic done in as little as 3 hours Learn More This was quite worrying given that he could have easily delayed rescue missions as well as his safety. The article talks of photos from Eddie Ho, which were, broadcasted in ABC’s good morning America. Moreover, this information was also broadcasted in CNN and NBC. The article therefore tries to debate whether taking photos at such crucial moments is newsworthy or irresponsible. It utilizes several scholars such as Helen Muir and Kelly McBride to analyze the debate (Rottenberg and Winchell 262-265). For instance, one scholar cautions media from taking footage/ pictures from citizens without prior information on how the sources got such information. However, other proponents like Sherwood welcomes contributions from citizen journalists like Ho. In the end, the article reaches a consensus on the issue by noting that over time, it is upon survivors to decide when to take pictures or not (Rottenberg and Winchell 262-265). Analysis The first article gives an overview of events before criticizing journalists at the end. It gives an overview of citizen journalism and an overview of how it is clear and firm. It does not give detailed information on professional journalism although it criticizes mainstream media, which consist of professional journalists, of being suspicious of citizen journalism. The author therefore uses appeal to describe one side and to refute the other (Whately 11). In this regard, the model utilized in the first article is Aristotelian, which promotes one claim but refutes the other. On the other hand, the second article gives a detailed description of both sides of the debate. For instance, it gives example of proponents of survivor photos with their reasons and those against survivor photos. In the end, it reaches consensus on situations when survivors can take photos. This article shows a rogerian argumentation, which normally reaches consensus after exploring both options (Whately 11). Conclusion From the two articles, it is clear that the latter provides more information for decision making than the first. For instance, it does not only make claims on the need for survivors to stop taking picture in distress, but it also provides evidences from proponents. These include Helen Muir and Kelly McBride, among others. On the other hand, it provides information from opponents like Sherwood, among others. Finally, it reaches a solution with evidence from Mark Glaser. The second article is therefore more convincing than the first (Munson and Black 55). Works Cited Munson, Ronald, and Black Andrew. The Elements of Reasoning, Belmont, CA: Wadsworth Publishing, 2011. We will write a custom Essay on Camera phone debate specifically for you! Get your first paper with 15% OFF Learn More Rottenberg, Annette, and Winchell Donna. Elements of Argument, London: Bedford, 2012. Whately, Richard. Elements of Logic, New York, NY: Sheldon
Gender Studies homework help. This is a paper that is focusing on the student to explore the Software Development Life Cycle step 1. The paper also provides additional information to use in the writing and submission of the assignment paper well and precisely.,Explore the Software Development Life Cycle step 1,Step 1: Explore the Software Development Life Cycle (SDLC), Now that you understand SCRM, you will complete a software development life cycle assessment. The software development life cycle (SDLC) is a process used to develop, maintain, replace, and change software. The overall purpose of SDLC is to improve the quality of software through the development and implementation process., As part of your assessment, include the following information:, Note how various entities are currently using SDLC to implement software., Identify and take note of successful implementations, describing the results., Identify software development methodologies for common software applications and cybersecurity standards organizations., You will use the information that you gather during this step to complete your SDLC assessment.,Step 2: Identify Key Implementation Attributes, In the previous step, you explored SDLC, the ways other organizations are implementing it, and best practices. Now, you are ready to guide your own organization through the process of developing software., Start by considering the needs of your organization. Currently, the accounting month-end closing procedures involve extracting data from the accounting database into spreadsheets, running macros within the spreadsheets, uploading new data into the accounting database, and emailing generated spreadsheet reports and word processing memos.,Brenda, the director of Accounting Systems, would like this process automated without putting financial data at risk during or after the implementation., Review topics on databases for operational data, database management systems, and how a database works., Based on this needs analysis, you decide to focus on the SDLC maintenance phase:, ●    Identify the key factors to successful maintenance and the implementation of this phase., ●    Identify potential obstacles to success and ways to anticipate and mitigate them., You will use the information that you gather during this step to complete your SDLC assessment.,Explore the Software Development Life Cycle step 1,Step 3: Examine Software Assurance, Businesses depend on the safe operations of systems. The level of confidence a business or other entity has that its software is free from vulnerabilities is referred to as software assurance (SwA). As the final step before your assessment, research SwA and other topics related to preventing and fixing software vulnerabilities., In your research, make sure to complete the following:,●    Evaluate the major steps, underlying theory, and relative usefulness of software security testing, white box and black box software security testing, the ,Common Criteria/Common Criteria Evaluation and Validation Scheme, (CCEVS), and the Common Criteria (CC) for Information Technology Security Evaluation., Identify and evaluate state and federal cybersecurity policies underlying the application, scope, and selection of secure software development methodologies., Determine when to perform a risk analysis., Evaluate security concerns that arise during the acceptance phase of software development., Describe the testing and validation process from a cybersecurity policy standpoint., Identify the ways in which SwA ensures trustworthiness, predictable execution, and conformance., Identify SwA best practices., Lastly, identify innovations in the provision of SwA that you have found in your research., You will use the information that you gather during this step to complete your SDLC assessment.,Additionally,Step 4: Prepare a Software Development Life Cycle Assessment, Integrating the information that you have gathered on software development in the last few steps, develop  a five-page summary assessment  explanation of the software development life cycle, including your view on its importance to software security. This assessment will provide foundational support for your final recommendation., Be sure to do the following:, Describe basic models and methodologies of the software development life cycle., Identify a development methodology that fits your organization and explain why., Describe the phases of the software life cycle., List and discuss the security principles you would need to consider and explain how you would apply them throughout the software life cycle., Describe the elements of a maturity model.,Attachments,Click Here To Download,Gender Studies homework help

LEG 100 Strayer Univeristy the Second Scenario Tort Post Discussion

LEG 100 Strayer Univeristy the Second Scenario Tort Post Discussion.

This week, we’ll be examining how our legal system protects persons who are injured by the purposeful act of another. These types of injuries are called intentional torts. The legal claims of assault, battery, false imprisonment, invasion of privacy and defamation are examples of intentional torts.For this discussion, choose one of the scenarios listed below and determine the intentional tort that you think applies. Make sure to explain your answer, including the elements of the claim, why you think those elements are or are not present, and what other information you would need to make this determination.A group of people protesting a company’s employment practices in the lobby of a building is surrounded by private security guards hired by the company.A teenager sends a joking message to his best friend telling him that there is a bomb in his basement.You accidentally leave your personal journal at the local coffee shop. Another customer finds it and shares your innermost secrets on his blog, but never identifies you as being the writer of the journal.At a family reunion at your parents’ home, you see Dave, a second cousin, take a very expensive bottle of wine from the wine cellar, place it in a duffle bag, and hurry out the backdoor. You quickly go to your father and tell him that Dave stole the bottle, and your father calls the police. In reality, your mother told Dave he could pick any bottle of wine from the cellar as a belated birthday present.
LEG 100 Strayer Univeristy the Second Scenario Tort Post Discussion

Discussion Best Practices, statistics homework help

java assignment help Discussion Best Practices, statistics homework help.

Discussion Best Practices

For this Discussion you will write an essay to address the
requirements described below. Your essay must be carefully
planned and written using well-constructed sentences and
paragraphs. Make sure that your grammar and spelling are
correct. Points will be awarded for content as well as
composition. Your essay must be a minimum of 1 page in
length with standard 1 inch margins and include the textbook
as a resource. Read this resource from the KU Writing Center
on how to you cite your sources in APA format:
https://kucampus.kaplan.edu/MyStudies/AcademicSupportCenter/WritingCenter/WritingReferenceLibrary/ResearchCitationAndPlagiarism/BasicCitationGuidelines.aspx
Assignments must be submitted as a Microsoft® Word® document and
as an attachment or in your post to the Unit 8 Discussion
Forum.

Project Management

Scenario: You are a consultant with expertise in project
management strategies. Select a possible project management
situation from your current or future professional
experience. As a project management consultant, you are
tasked with developing a project management plan for this
project. Your goal is to maximize the time, resources and
finances associated with the project in the best interests
of the business/company. You will need to write a
professional memo to the business/company owner describing
the management of the project.

Your essay should include:
Create the PERT/CPM activity network for your project
that includes at least five activities and at least
one predecessor activity.
Estimate the optimistic, most likely, and pessimistic
times to then determine an expected time for each
activity.
Determine all activities that are on the critical
path.
Identify the slack time (if any) associated with
activities in the project.
Create a Gantt chart to show the project timeline.
Address the following questions in your essay:
What is the overall timeline for this project? What activities are critical for established timeline
of the project?
What activities have flexibility in completion that
would not impact the overall project timeline?
What time, resources and money might be affected by any
changes to activities throughout the project?
What recommendations would you suggest to prioritize
the company’s time, resources and money with regards
to the project?

Discussion Best Practices, statistics homework help

Ohio State University Space Weather & Space Atmosphere Policy Discussion

Ohio State University Space Weather & Space Atmosphere Policy Discussion.

I’m working on a engineering multi-part question and need an explanation to help me understand better.

1)In addition to the NOAA site we’ve been checking (most) every day, find some other group that provides daily Space Weather forecasts. 2)(worth triple points!) Let’s delve into Space Weather Policy… imagine if you can… POTUS has convened a special executive committee in the Situation room to understand the possible implications of severe space weather on the U.S. … the President, VP, Secretary of Homeland Security, Secretaries of Defense, State, and the Treasury, Chairman of the Fed, Vice Chairman of the Joint Chiefs of Staff (VCJCS), and you! The briefing is 30 minutes, generally 10 – 15 minutes of presentation and then questions, though questions can be asked at any point and the meeting may extend to 1 hour. Are you prepared?! a) What is severe space weather and what technological and engineering systems may be harmed? List the first order consequences on foundational infrastructure systems, then second order consequences, third order, etc. For example, electrical systems are directly impacted by space weather (how?) Are computer systems impacted by severe space weather? b) What are the risks associated with space weather? When thinking of risk, think of 1) what can go wrong, 2) what are the chances, and 3) what are the consequences? c) Given the risks, how may they be effectively managed and communicated? d) What are your recommendations and next steps?3)An article to read: “ The Economic Impact of Space Weather: Where Do We Stand?”…. list 5 reasons why estimating economic costs of space weather impacts is challenging.4)I’ve heard that there doesn’t appear to be much in the way of ensemble forecasting in space weather. Is this correct? If so, why do you think this is? How does data assimilation fit into this picture?5)Go to the Community Coordinated Modeling Center (CCMC) (http://ccmc.gsfc.nasa.gov/models/models_at_glance….). Now, pick a model… learn about it… then tell me about it (what are its inputs, utility, etc.?) 6)If you could pick anywhere on the planet to build a “space weather research center,” where would it be? Why there?? (hint: your answer might depend on what you plan on doing at your research center).7)Define a CubeSat mission designed to help in the forecasting of Space Weather effects. Sketch your idea. Tell me how the data will be used. 8)Find a recent job posting in “Space Weather” (cast a wide search net; you should know what terms to use by now) … do you think you would qualify for it after this class? If not, what else would you need to learn first?
Ohio State University Space Weather & Space Atmosphere Policy Discussion

Finance Assignment using by Excel

Finance Assignment using by Excel.

1. Goal of project:Estimation of fair value of an American option, comparison of this value with the market price of the option, decision to trade (buy or sell or sell-short), and closure of the option after a holding period of at least one day to determine profits.There should be at least 30 option trades and a project report in the format given below. 2. Data:Take following data generated for 15 calls and 15 puts with strike prices, rates of interest and years to maturity, and market prices of options on the opening day or trade day (first day of holding period) and the market prices of the options on the end of the closing period.Following these data are 32 prices of 15 underlying stocks on which the 15 pairs of calls and puts are written.These prices are prior to the trading date with the 32nd stock price (on row 32) as the price as of the close of the day before the trading date and the 1st stock price (on first row) as the price as of 32 days prior to the trading date.The data needed to calculate fair value of an option include the following: Strike price.There are 15 strike prices for each of the 15 pairs of calls and puts.Years to maturity (Mat), the same for the call and put written on the same stock.Yield to maturity (Rate) on a T-bill or any other zero-coupon Treasury bond with a date of maturity close to maturity of the option.15 such interest rates are given.Market prices of the options on the day of opening (Call0, Put0) and on closing (CallM and PutM) of trades.Daily stock prices (the 32 prices given).The 32nd stock price is as of close prior to trading day and the 1st stock price is as of 32 days prior to trading day.The stock goes ex-dividend every quarter starting at 0.25 years from trading date over the life of the option.The amount of quarterly dividend is 5% of the (32nd) stock price just prior to the trading date. An estimate of annual stock volatility (standard deviation of stock’s 31 daily continuously compounded rate of return) based on 32 daily stock prices including and prior to trading day, using the procedure discussed in class.The annual volatility is times the estimated standard deviation obtained from daily stock prices, because there are approximately 252 trading days in a year.The 32nd day stock price is ex-dividend price. 3. Method of Calculating Fair Option Value:Follow the step-by-step procedure used in class to determine fair value of each option using a 5-step binomial tree. 4. Trading, holding, and closing options:Compare the fair price of an option (obtained by using all information as of trading day) with the market price of the option on that day to determine the trade (buy or sell).Note that the trade is actually for the open on the following day, based on information as of close of the trading day.Ideally, you should base your trade on opening market price on the trading day.Decide a trade for each of the chosen 30 options.Hold your trades over the holding period and close the trades at the end of the holding period by selling the options bought and by buying the options sold-short. 5. Profits:Calculate profits from trading, equal to selling market price of an option minus buying market price of the same option. 6. Project Report:The project grade will be based on the accuracy of the reported answers, required to be submitted in a spread sheet of two columns with the question numbers in the first column and answers in the second column attached to e-mail before the due date. It is required that you submit all workings attached to your email submission. Answer the following questions for each option: 1 – 15: Annualized stock volatility (standard deviation of continuously compounded rate of return) for the 15 stocks. 16 – 30 Fair values of 15 calls on 15 stocks. 31 – 45 Fair values of 15 puts on 15 stocks. 46 – 60 Trades for calls (write 1 for buy and 0 for short-sell). 61 – 75 Trades for puts (write 1 for buy and 0 for short-sell). 76 – 90 Profits from 15 call trades. 91 – 105 Profits from 15 put trades. 106 Total profit from all trades.
Finance Assignment using by Excel

Essay Writing at Online Custom Essay

5.0 rating based on 10,001 ratings

Rated 4.9/5
10001 review

Review This Service




Rating: