Blog

Would you request the military to assist you in dealing with the influx of patients at the hospital? Why or why not? If yes, how would you use the military, and if no, what would you and your staff do to deal with the influx of patients?

The ability to deal with the unexpected influx of patients is a key challenge in a disaster scenario. In order to be truly prepared, a healthcare organization must be ready to deal with the increased number of patients. In some cases, the military is also available to assist in dealing with the influx of patients. The military is highly trained and has a vast number of resources that most citizens are not aware of. They are equipped and have the skill-set and the mentality to respond efficiently to disasters.

Using the South University Online library or the Internet, search some articles on civilian response to disaster situations and military disaster response process. Based on your research, answer the following questions:

  • Would you request the military to assist you in dealing with the influx of patients at the hospital? Why or why not? If yes, how would you use the military, and if no, what would you and your staff do to deal with the influx of patients?
  • How would you go about garnering the assistance of the military if the situation called for it?

Following Hurricane Katrina, a hospital needed to be evacuated because of the rising water. The evacuation was conducted in stages as the patients were moved to other safe hospitals in batches using a helicopter, an ambulance, and a boat. After four days, the evacuation was complete, thanks to a coordinated effort with other agencies such as the Louisiana Department of Wildlife and Fisheries. In regard to the given scenario, answer the following questions:

 

  • What would have happened if the hospital had not been assisted by other agencies? Why?
  • How would you have addressed the situation? What would you include in your disaster plan to handle such a situation? How?

Create a 6-8-slide Microsoft® PowerPoint® presentation including detailed speaker notes in which you include the following: Graph the company’s selected financial data. Explain the role of standard deviation in financial analysis.

You are a financial analyst for a Fortune 500 company and you must present an analysis of the financial data to the executives.

Select a publicly traded company in the same industry as the company you work for or one that you would like to work.

Locate the company’s annual report and any other available data (e.g. units manufactured, revenue, etc.) that is available for the last 5 years.

Use one of the company’s historical data sets to calculate the standard deviation of the selected data for the last 5 years.

Discuss what the standard deviation means.

Analyze data using variance and standard deviation.

Create a 6-8-slide Microsoft® PowerPoint® presentation including detailed speaker notes in which you include the following:

  • Graph the company’s selected financial data.
  • Explain the role of standard deviation in financial analysis.
  • Explain any other uses for standard deviation in a business setting.

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

Project Deliverable 5: Network Infrastructure and Security

Due Week 8 and worth 120 points
This assignment consists of two (2) sections: an infrastructure document and a revised project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
With the parameters set forth at the onset of the project, present the infrastructure and security policy that will support the expected development and growth of the organization. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. Since the company will be merging with a multinational company, virtualization and cloud technology should be taken into consideration. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy.
Section 1: Infrastructure Document
Write a five to ten (5-10) page infrastructure document in which you:
  1. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.
  2. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network. Note: The graphically depicted solution is not included in the required page length.
  3. Illustrate the possible placement of servers, including access paths to the Internet and firewalls. Note: facility limitations, workstations, printers, routers, switches, bridges, and access points should be considered in the illustration.
  4. Create and describe a comprehensive security policy for the company that will:
  • Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three (3) core goals of confidentiality, integrity, and availability of information.
  • Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Your assignment must follow these formatting requirements:
  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
  • Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.
Section 2: Revised Project Plan
Use Microsoft Project to:
  1. Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.
The specific course learning outcomes associated with this assignment are:
  • Describe the methods and best practices in implementing process change in IT organizations.
  • Describe the role and methods of technology-induced process improvement in organizations.
  • Use technology and information resources to research issues in information systems.
  • Write clearly and concisely about leadership issues and strategic insight of the Information systems domain using proper writing mechanics and technical style conventions.
Points: 120 Project Deliverable 5: Network Infrastructure and Security
Criteria  

Unacceptable

Below 70% F

 

Fair

70-79% C

 

Proficient

80-89% B

 

Exemplary

90-100% A

Section 1: Infrastructure Document
1a. Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures. Ensure that consideration is given to virtualization and cloud technology.

Weight: 20%

Did not submit or incompletely identified possible network infrastructure vulnerabilities. Did not submit or incompletely addressed network vulnerabilities with the appropriate security measures. Did not submit or incompletely ensured that consideration is given to virtualization and cloud technology. Partially identified possible network infrastructure vulnerabilities. Partially addressed network vulnerabilities with the appropriate security measures. Partially ensured that consideration is given to virtualization and cloud technology. Satisfactorily identified possible network infrastructure vulnerabilities. Satisfactorily addressed network vulnerabilities with the appropriate security measures. Satisfactorily ensured that consideration is given to virtualization and cloud technology. Thoroughly identified possible network infrastructure vulnerabilities. Thoroughly addressed network vulnerabilities with the appropriate security measures. Thoroughly ensured that consideration is given to virtualization and cloud technology.
1b. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Explain the rationale for the logical and physical topographical layout of the planned network.

Weight: 20%

Did not submit or incompletely designed a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Did not submit or incompletely explained the rationale for the logical and physical topographical layout of the planned network. Partially designed a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Partially explained the rationale for the logical and physical topographical layout of the planned network. Satisfactorilydesigned a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Satisfactorily explained the rationale for the logical and physical topographical layout of the planned network. Thoroughlydesigned a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Thoroughly explained the rationale for the logical and physical topographical layout of the planned network.
1c. Illustrate the possible placement of servers, including access paths to the Internet and firewalls.

Weight: 15%

Did not submit or incompletely illustrated the possible placement of servers, including access paths to the Internet and firewalls. Partially illustrated the possible placement of servers, including access paths to the Internet and firewalls. Satisfactorilyillustrated the possible placement of servers, including access paths to the Internet and firewalls. Thoroughlyillustrated the possible placement of servers, including access paths to the Internet and firewalls.
1di. Create and describe a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.

Weight: 15%

Did not submit or incompletely created and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA. Partially created and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA. Satisfactorilycreated and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA. Thoroughly created and described a comprehensive security policy for the company that will protect the company infrastructure and assets by applying the principals of CIA.
1dii. Create and describe a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Weight: 15%

Did not submit or incompletely created and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Partially created and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Satisfactorilycreated and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information. Thoroughly created and described a comprehensive security policy for the company that will address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.
Section 2: Revised Project Plan
2. Update the project plan from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.

Weight: 5%

Did not submit or incompletely updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization,with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks. Partially updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization,with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks. Satisfactorily updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks. Thoroughly updated the project plan from Project Deliverable 4: Cloud Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five to ten (5-10) subtasks.
3. Clarity, writing mechanics, and formatting requirements

Weight: 10%

More than 6 errors present 5-6 errors present 3-4 errors present 0-2 errors present

What is religious pluralism? Please research and explain at least 3 different ideas on this, then articulate your group’s own definition.

There are 3 members in my group, and please make powerpoint and write notes answering the questions. I need to get it 14 hours later.

 

Assignment:

Please read the article “From Diversity to Pluralism” by Dr. Diana Eck, written for Harvard University’s Pluralism project.  Here is a link to the article: http://www.pluralism.org/pluralism/essays/from_diversity_to_pluralism.php With your group, please discuss the following questions and prepare an oral report to deliver to the class.

 

1. Offer a very brief summary of the article.

2. What is religious pluralism? Please research and explain at least 3 different ideas on this, then articulate your group’s own definition.

3. What are some examples – either historic or contemporary – of religious intolerance. You may discuss examples in the U.S. or internationally. (minimum of 3)

4. Who are some religious leaders or examples of religious communities that have been advocates for peace and inter-religious understanding? (minimum of 3)

5. What is the best way to achieve a peaceful and pluralistic society? Please research at least 3 different ideas on this, then articulate your group’s own definition.

 

Your in-class presentation: The report should be about 10 -15 minutes. You may use power point or any technology you wish.

 

What you will turn in:

You will be required to turn in a one page list of sources you used to Professor Wyant on the day of the presentation. Please be sure to cite where you get the information you used in the presentation from. It might be helpful to construct a bibliography containing articles or books you read, or websites containing the information you use in your presentation individually, then assign one person in the group to make it in to the final copy to hand in. Any format is acceptable. Please type up the source page, and be sure to label it with each group member’s name.

Respond to the following questions: In your opinion, what are the main issues pertaining to conflict and conflict resolution? How do you demonstrate your ability to effectively deal with conflict? In your opinion, what are the real-life solutions to the problem? What are the criteria for success for this project and how will you measure success?

You have subsequently hired recruiters who are not having a great deal of success recruiting and selecting scientists. The dilemma is that these same recruiters, who now represent the bulk of your recruitment staff, are much better at recruiting and selecting sales personnel. The problem is that you probably should have split the difference and hired more sales-oriented recruiters, but you failed to do this.

Your choices are the following:

  1. Allocate additional funds in the budget for additional scientific recruiters
  2. Train the existing recruitment staff so that they are prepared to recruit and select the appropriate scientists.

Respond to the following questions:

  • In your opinion, what are the main issues pertaining to conflict and conflict resolution?
  • How do you demonstrate your ability to effectively deal with conflict?
  • In your opinion, what are the real-life solutions to the problem?
  • What are the criteria for success for this project and how will you measure success?
  • Use a format similar to the following:

initial idea surrounded by all follow-up ideas

In your own words, post a substantive response to the Discussion Board question(s) and comment on other postings. Your response should address the DB question(s) and move the conversation forward. You will be graded on the quality of your postings, including mastery of the concept as well as critical thinking. If asked for your opinion, do not simply state that it is a good or bad idea; elaborate on your reasons and argument. Include enough detail to substantiate your thinking as well as your position on the questions or comments.Please, I need 5 pages and no plagiarism

Grading Criteria
10% Brainstorm for each step of your recruitment and selection strategy.
15% Identify and address the main issues pertaining to conflict and conflict resolution.
20% Clearly display your capacity to effectively deal with conflict.
20% Provide real-life solutions and more than just theoretical considerations in relation to diplomacy and negotiation.
15% Address the criteria for success for this project. How will you measure the success of this project?
15% Provide solutions which display critical and innovative thinking.
5% Use a format similar to the one shown.

 

How would you retrain these valuable personnel? How would you redesign your recruitment efforts in the discussion to account for the fact that sales personnel will need additional training? Display an ability to behave in a diplomatic fashion.

The issue here is how to communicate with the new sales personnel. They need more scientific training than you originally envisioned, and you must redesign the hiring process to include a training program, which should include a needs analysis.

  • How would you retrain these valuable personnel?
  • How would you redesign your recruitment efforts in the discussion to account for the fact that sales personnel will need additional training?
  • Display an ability to behave in a diplomatic fashion.

The following is a basic checklist for solutions:

  • Identify and address the main issue.
  • Provide real-life solutions (more than just theoretical considerations).
  • Address the criteria and measurements for success for this project
  • Use proper APA formatting and citation.
  • Provide solutions which display critical and innovative thinking.

Please submit your assignment.

35% How would you retrain these valuable personnel?
35% How would you redesign your recruitment efforts in the discussion to account for the fact that sales personnel will need additional training?
20% Display an ability to behave in a diplomatic fashion.
10% Use proper APA formatting and citation.

For assistance with your assignment, please use your text, Web resources, and all course materials.

 

 

Reading Assignment  I need 5 pages with references thanks

Evans: Chapter 1, 2, 3, 4

  • Construct a better process by mapping, analyzing, and redesigning the process.
  • Appropriately use effective communication techniques.

There is no additional information to display at this time.

(TCO 6) Emile Durkheim proposed several functions of deviance. Which of the following is NOT one of them? Deviance affirms cultural values and norms.  Deviance provides employment for a large segment of the work force.  Responding to deviance clarifies moral boundaries. Deviance encourages social change. Deviance promotes social unity.

Question 7. Question : (TCO 6) Emile Durkheim proposed several functions of deviance. Which of the following is NOT one of them?

Deviance affirms cultural values and norms.

Deviance provides employment for a large segment of the work force.

Responding to deviance clarifies moral boundaries.

Deviance encourages social change.

Deviance promotes social unity.

Question 8. Question : (TCO 6) Travis Hirschi’s approach to deviance and control proposes that

Hirschi is a deviant spelling of Hershey.

deviance results from differential access to wealth.

deviance is a frustration of ambition.

individualism inhibits the deviance.

everyone finds at least some deviance tempting.

Question 9. Question : (TCO 6) There are four basic reasons to punish: moral vengeance, reforming the offender, discourage criminality, and render the offender incapable of further offenses. The terms for these are in order:

retribution, social protection, rehabilitation and deterrence.

deterrence, retribution, social protection, and rehabilitation.

social protection, deterrence, retribution, and rehabilitation

retribution, rehabilitation, deterrence, and social protection.

deterrence, social protection, retribution, and rehabilitation.

Question 10. Question : (TCO 3) In France during the Middle Ages, the third estate, second estate, and first estate refer respectively to

nobility, high clergy, and commoner.

high clergy, nobility, and commoner.

commoner, high clergy, and nobility.

commoner, nobility, and high clergy.

high clergy, commoner, and nobility

Page 2

Question 1. Question : (TCO 3

(TCO 3) Kuznet’s curve suggests that

it could be an effective pitch for the veteran who is starting to lose a little something on his fast ball.

industrial societies will, in the longer run, remain unchanged.

industrial societies tend to become less stratified than agrarian societies.

as human technological sophistication has increased, social stratification has decreased.

industrialization and social stratification are unrelated.

Question 2. Question : (TCO 3) _____ is the term for earnings from work or investments and _____ is the term for the total value of money and other assets, minus outstanding debts.

Income; personal property

Profit; income

Wealth; income

Income; wealth

Rent; net worth

Question 3. Question : (TCO 3) Which theory of poverty blames poverty on the shortcomings of the poor themselves?

Individual responsibility theory

Personal chioce theory

Social forces theory

Culture of poverty theory

Legacy or poverty theory

Question 4. Question : (TCO 5) Which of the following did Max Weber suggest were analytically distinct components of stratification?

Conformity, deviance, and social control

Power, prestige, and position

Class, caste, and age

Class, prestige, and esteem

Class, status, and power

Question 5. Question : (TCO 4) Accounts Payable Administrator Imelda Czechs works for a small international corporation. This category of work can be described as _____

blue-collar work.

white-collar work.

pink-collar work.

fur collar work.

no-collar work.

Question 6. Question : (TCO 4) Which type of slavery consists of employers holding workers by paying them too little to cover their debts?

Chattel slavery

Child slavery

Debt bondage

Debit slavery

Revolving credit slavery

Question 7. Question : (TCO 4) Which of the following gives the correct order of stages of modernization according to W. W. Rostow?

High mass consumption, traditional, drive to technological maturity, and take-off

Traditional, drive to technological maturity, take-off, and high mass consumption

High mass consumption, traditional, take-off, and drive to technological maturity

Traditional, take-off, drive to technological maturity, and high mass consumption

Take-off, drive to traditional maturity, technological, and consume mass quantities

Question 8. Question : (TCO 4) Andre Gunder Frank states that poor nations

are responsible for their own poverty.

were “underdeveloped,” or made poor, by rich nations.

suffer from traditional culture.

need to gain more productive technology.

can be helped with the investment of multinational corporations.

Question 9. Question : (TCO 4) According to Immanuel Wallerstein’s view of the global economic system, which type of nation is relatively independent of outside control?

Core

Periphery

Semiperiphery

Marginality

Tertiary

Question 10. Question : (TCO 5) While modernization theory focuses on _____, dependency theory focuses on _____.

poor nations; rich nations

distribution of wealth; production of wealth

production of wealth; distribution of wealth

culture; economics

multinationals; self-reliance

Week 6

Question 1. Question : (TCO 8) Back in 1900, it was common in the United States to consider people of these ancestries as “nonwhite.”
Irish, Italian, or Jewish

French, German, or Swiss

Dutch, French, or Swede

Austrian, Norse, or Prussian

Question 2. Question : (TCO 8) Ethnicity refers to ______.

a group that is set apart from others because of physical differences

socially constructed categories based on cultural traits a society defines as important

a group whose members have significantly less control over their own lives than the members of a dominant group

a collective that has reached very moral decisions about a way of life

all people from the same country

Question 3. Question : (TCO 6) The unequal treatment of various categories of people is known as

stereotyping.

ethnocentrism.

discrimination.

segregation.

active prejudice.

Question 4. Question : (TCO 5) The claim that defining members of some minority as inferior will make them inferior is one application of

social distance research.

the iron law of oligarchy.

the Thomas theorem.

authoritarian personality theory.

exploitation theory.

Question 5. Question : (TCO 8) The barrier that is invisible, but which prevents women from rising beyond middle-management positions, is referred to as

the “glass ceiling.

the “closed top.

transparent discrimination.

the “ceiling of upper management.

the “impermeable barrier.

Question 6. Question : (TCO 8) _____ refers to social organization in which males dominate females.

Patriarchy

Matriarchy

Monarchy

Oligarchy

Fratriarchy

Question 7. Question : (TCO 8) Talcott Parsons explained that males tend to exhibit _____ behavior, while females are more _____.

instrumental; expressive

expressive; instrumental

egalitarian; hierarchical

rational; emotional

emotional; rational

Question 8. Question : (TCO 8) Which type of feminism seeks to end patriarchy by eliminating the idea of gender itself?

Liberal feminism

Socialist feminism

Radical feminism

Moderate feminism

Libertarian feminism

Question 9. Question : (TCO 7) Comparing school performance, researchers have found that the most important cause of the achievement gap between rich and poor children is

differences in schools.

differences in home environments.

differences in personal ability.

differences in personal health.

differences in family composition.

Question 10. Question : (TCO 3) _____ and _____ theories explain that families perpetuate social inequality in U.S. society through inheritance of private property, encouraging patriarchy, and passing on racial and ethnic inequality.

Feminist; functionalist

Social-exchange; feminist

Social-exchange; interactionist

Global; internationalist

Feminist; social conflict

Page 2

Question 1. Question : (TCO 3) When Mort Tality assisted in the death of his wife Fay, who was suffering from an incurable disease, he engaged in

Euthanasia.

Youthinasia.

Homicide.

Misdemeanour.

Kevorkianism.

Question 2. Question : (TCO 7) The term empty nest refers to

families whose children have grown and left home.

women who choose to remain single.

women who marry, but choose to remain childless.

egalitarian family structures.

couples who are unable to have a child.

Question 3. Question : (TCO 7) A religious organization that stands apart from the larger society is a _____, while a _____ is a religious organization that is largely outside a society’s cultural traditions.

church; sect

sect; cult

cult; church

denomination; cult

cult; sect

Question 4. Question : (TCO 7) According to Max Weber’s analysis of Protestantism and the rise of capitalism, which of the following statements is TRUE?

Protestantism held back the development of capitalism for years.

Protestantism, with its conflict with the Roman Catholic Church, fostered social unrest, and averted a socialist revolution.

Protestantism even with its argument with the dominant Roman Catholic Church, still supported the economic status quo.

Protestantism stressed duty and hard work, boosting economic production and fostering the rise of capitalism.

Protestantism, with its conflict with the Roman Catholic Church, fostered social unrest, and a socialist revolution.

Question 5. Question : (TCO 3) Charter schools are

private schools that typically enroll high-income students.

public schools that have the freedom to try new programs and policies.

private schools that have a religious curriculum.

public schools that are run by private companies.

public schools established through a land grant charter.

Question 6. Question : (TCO 3) Following the social-conflict approach, patterns of health and illness are seen largely as a product of

technology.

how people define the situation they experience.

how culture defines health and illness.

a mobile society

social inequality.

Question 7. Question : (TCO 5) Which term do we use to refer to a political and economic system that combines a mostly market-based economy with extensive social welfare programs??

Modernization

Socialism

Welfare capitalism

Capitalism

Communism

Question 8. Question : (TCO 5) In a capitalist economic system, justice amounts to

doing what is best for society’s poorest members.

everyone being more or less economically equal.

freedom of the marketplace allowing people to follow their self-interest.

no one going hungry.

little more than lip service.

Question 9. Question : (TCO 5) The Marxist political-economy model suggests that

power is no longer concentrated in the hands of a few.

an anti-democratic bias exists in the capitalist system.

power is widely dispersed throughout society.

many people do not vote because they are satisfied with the political system..

that the only justice in the halls of justice is in the halls.

Question 10. Question : (TCO 5) Which of Weber’s types of authority is also know as bureaucratic authority?

Egalitarian authority

Charismatic authority

Traditional authority

Rational-legal authority

Representative authority

 

(TCO 1) The study of the larger world and our society’s place in it is known as _____. a social science perspective a scientific perspective a social psychological perspective a sociological perspective a global perspective

Week 2

Question

Question 1. Question :

(TCO 1) The systematic study of human society is known as _____.

psychology

science

anthropology

sociology

social psychology

Question 2. Question :

(TCO 1) The study of the larger world and our society’s place in it is known as _____.

a social science perspective

a scientific perspective

a social psychological perspective

a sociological perspective

a global perspective

Question 3. Question :

(TCO 1) When Peter Berger characterized the sociological perspective as “seeing the general in the particular,” he meant that sociology allows us to _____.

recognize that society has the same effect on all categories of people

see that people in general are rather particular about their behaviors

make generalizations about individuals’ particular habits

see McArthur in his Jeep, Patton in his tank, or Bradley in his personnel carrier

look for general patterns in the behavior of particular people

Question 4. Question :

(TCO 3) Of the major theoretical theories in sociology, which one views society as an arena of inequality that generates conflict and change?

Social-solidarity paradigm

Social-conflict theory

Symbolic-interaction paradigm

Structural-functional paradigm

Symbolic-conflict paradigm

Question 5. Question :

(TCO 3) Functions of institutions that are open, stated, and conscious functions; that involve the intended, recognized consequences of any social pattern are known as _____.

Oktoberfest

manifest

latent

obvious

direct

Question 6. Question :

(TCO 2) Which is the term for a concept that has a value that changes from case to case?

Concept

Measurement

Changeling

Variable

Term

Question 7. Question :

(TCO 2) Independent variable is to dependent variable as _____.

blood is to water

effect is to cause

cause is to effect

variable is to constant

logic is to intuition

Question 8. Question :

(TCO 2) A relationship in which two (or more) variables change together is called _____.

a correlation

a variation

measurement congruence

a replication

an event horizon

Question 9. Question :

(TCO 2) What research method was used in Philip Zimbardo’s study, the “Stanford County Prison”?

Captive participant observation

Ethnographic field observation

An experiment

Participant observation

The hellgrammite method

Question 10. Question :

(TCO 2) A criticism of the symbolic-interaction approach is that it

says little about how individuals actually experience society.

wanted to colorize Casablanca.

ignores the influence of factors such as culture, class, gender, and race.

focuses too much on class.

paints a very positive picture of society.

Page 2

Question 1. Question :

(TCO 4) On the first day of basic training in the army, Pvt. N. Terprize has his civilian clothes replaced with army “greens,” has his hair shaved off, loses his privacy, and finds that he must use a communal bathroom and other people decide when he eats, sleeps, and what job he does. Erving Goffman would say that all these humiliating activities are part of _____.

a humiliation ceremony

impression management

the total institution

face-work

a deprivation ceremony

Question 2. Question :

(TCO 4) Other than perceiving the competing realities in a joke, what is sometimes involved in “getting” and enjoying a joke?

The joke must be universally funny.

The joke must be simple.

The audience must inferentially complete the joke in their minds.

The joke teller must explain the joke and provide more and more information until it is understood.

The listener must be able to tell a joke well in order to get a joke.

Question 3. Question :

(TCO 4) Which is the order of the stages of human development in Jean Piaget’s model?

Sensorimotor, preoperational, operational, and post operational

Preoperational, post operational, concrete operational, and formal operational

Sensorimotor, concrete operational, formal operational, and post operational

Formal operation, concrete operational, preoperational, and sensorimotor

Sensorimotor, preoperational, concrete operational, and formal operational

Question 4. Question :

(TCO 4) Erving Goffman makes so many explicit parallels to the theater that his view has been termed _____.

Shakespearean

Theatrical

Stage Directions

Method Sociology

the Dramaturgical Approach

Question 5. Question :

(TCO 4) Shrimp merchant Sheldon Devane is the son of immigrants, and lives with his aunt and uncle while enrolled at a four-year university where he is studying to be a graphic artist. Which of the following is his achieved status?

Graphic artist

Male

Son

University student

Nephew

Question 6. Question :

(TCO 3) Taxi cab driver Peacup Andropov maintains that human behavior results from learning and has no gentic component. His position is the fundamental opposite of _____.

sociobiologists

G. H. Mead

interactionists

social paychologists

structural functionalists

Question 7. Question :

(TCO 3) Mashie Nibblet is a pro at a country club and loves to play golf, but hates to teach it to the country club members. Mashie is experiencing _____.

role conflict

role strain

role ambiguity

role exit

a handicap that, if not ironed out, would leave him feeling below par with a chip on his shoulder resulting in a stroke

Question 8. Question :

(TCO 3) Norms that are widely observed and have great moral significance are _____.

folkways

mores

stateways

nationways

s’mores

Question 9. Question :

(TCO 3) Standards by which members of a culture assess desirability, goodness, and beauty and that serve as broad guidelines for social living are referred to as _________, and ___________ are rules and expectations by which a society guides the behavior of its members.

values; norms

norms; values

values; symbols

language; norms

values; language

Question 10. Question :

(TCO 3) All of the following are theories of cultural, EXCEPT _____.

Structural-Functional

Social Conflict.

Anthropomorphic

Sociobiology

Feminist

Week 4

Question 1. Question :

Given North American tradition, what type of leadership would she be expected to show?

Task group leadership

Secondary group leadership

Expressive leadership

Instrumental leadership

Autocratic leadership

Question 2. Question : (TCO 4) Which statement reflects Georg Simmel’s understanding of the dyad?

She was one of the greatest marathon swimmers of all time and is a fine sports commentator.

There usually is less intense interaction in a dyad.

Dyads have the least potential for meaningful social bonds.

One member can act as a mediator if relations become strained.

Dyads are less stable than groups with many members.

Question 3. Question : (TCO 4) Ross T. Farrian’s itinerary for the day is to first, go to school; second, visit a maximum-security prison with his criminology class; and third, to serve dinner at the community soup kitchen. Ross is visiting, in order, a _____, _____, and _____ organization.

normative, coercive, utilitarian

coercive, normative, utilitarian

utilitarian, coercive, normative

utilitarian, normative, coercive

normative, utilitarian, coercive

Question 4. Question : (TCO 4) _____ feel they are trapped in the wrong body.

Hermaphrodites

Homosexuals

Transvestites

Transsexuals

Transylvanians

Question 5. Question : (TCO 4) Which statement is true concerning intersexual people?

They are sexually attracted to both sexes.

They are attracted to neither sex.

They have both female and male characteristics.

They have no gender.

They are in the middle of gender reassignment surgery.

Question 6. Question : (TCO 6) Pat Rearc argues that without norms controlling sexual behavior and thus giving the forces of sexual passion free reign, family life and the raising of children would be threatened. To which paradigm would Pat be aligned?

Structural Functional Theory

Symbolic Interaction Theory

Social Conflict Theory

Queer Theory

Exchange Theory

Using the University online library resources as well as NACHA’s Web site article to complete the following: Describe NACHA and its role. Examine and explain the Automated Clearing House (ACH), its role, and how it relates to NACHA. List and explain the key participants in an ACH e-payment.

Online Payment Systems:

With the increasing use of digital payments and the decreasing use of cash payments, enhanced digital security and tracking of financial transactions have become significant aspects of many businesses. The executive director of operations of Centervale Apparel has asked you to research this issue and prepare a presentation for the executive committee to educate them on these issues. You remember hearing that the National Automated Clearing House Association (NACHA) is a leader in this field and would be a good place to start your research.

Review the following:

  • NACHA – The Electronic Payments Association. (2011). News headlines. Retrieved from www.nacha.org

Using the University online library resources as well as NACHA’s Web site article to complete the following:

  • Describe NACHA and its role.
  • Examine and explain the Automated Clearing House (ACH), its role, and how it relates to NACHA.
  • List and explain the key participants in an ACH e-payment.
  • Describe the key initiatives currently underway at ACH.
  • Identify and analyze at least four digital payment concerns Centervale Apparel might want to consider in light of what you have learned from NACHA.
  • Use the Notes function in Microsoft PowerPoint to prepare detailed speaker’s notes for your formal presentation to the executive committee.

Develop a 4–5 slide presentation in PowerPoint format. Add speaker notes. Apply APA standards to citation of sources