2-1 research questions 2024
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
285
Subject
Computer Science
Date
Apr 29, 2024
Type
docx
Pages
3
Uploaded by DEEHAYES34
Deanna Williams
2-1 Practice Activity: Identifying Research Questions
SCS 285: Professor Lynne Barga
March 8, 2024
SCENARIO ONE
You are a social worker in an outpatient clinical setting. You receive referrals from juvenile court
counselors (also known as probation officers) to provide clinical assessments and therapy for juveniles aged 12 to 17 suspected of having a mental illness such as depression and/or a substance use disorder. In your work over the last several years, you noticed that when a youth has been in treatment for several months, they tend to have fewer arrests for crimes. You are interested in conducting a research study about what is at the core of this outcome.
What is your research question? What are the chances that the juveniles who participate in these outpatient clinic settings help reduce the arrests among juveniles?
Why do you think this is the research question being asked? Because after reading this scenario, further discusses that juveniles between the ages of 12 and 17 who are among these outpatient clinics are not being arrested for the crimes they commit as often as they should. Once a juvenile enters an outpatient clinic setting, it Is not necessarily true that they will change their behavior. If the consequences of their actions don’t change their way of decision-making, then they are only aware of the consequences but will make it up in their mind that they will continue to break the law.
SCENARIO TWO:
You are a caseworker responsible for investigating child abuse and neglect reports in your city. After team meeting discussions with fellow caseworkers, you noticed that when the report caseloads are high (over 50 cases per worker), there tend to be more substantiated cases of abuse
before the caseworker can get involved in the initial case management after adjudication. It often
takes one to two weeks before a caseworker can get involved in the case: This can be due to higher priorities among other cases, other caseworkers being out sick or on vacation, or the amount and type of paperwork involved. You are interested in knowing what can be improved to reduce the number of substantiated abuse cases and the time frame between report and actual involvement, which would minimize the likelihood of this abuse occurring.
What is your research question? Is it necessary to hire more help within the department to
reduce the caseloads being handled so long?
Why do you think this is the research question being asked? To determine why the caseloads are taking so long to be handled, not knowing if the child is in danger and needs immediate assistance. But having more help with the cases, it can help so these cases won't get overlooked. SCENARIO THREE
You are a health educator for your county’s public health department. You work with a team of nurses, social workers, dieticians, and other health educators to help reduce the rate of type 2 diabetes among adults who come to the clinic. You have often noticed that the children of parents
who have recently been diagnosed with type 2 diabetes tend to be overweight. You are interested in how eating habits in the family may change after a parent with diabetes is educated on proper diet to reduce weight.
What is your research question? What can be done to make sure that the children in the family won’t have to experience diabetes, how can healthy eating habits be implemented into the family?
Why do you think this is the research question being asked? This question is being asked to make sure that the parents are doing everything possible to make sure the next generation won’t be exposed to unhealthy habits.
SCENARIO FOUR:
You are a county commissioner for your county: You are responsible for keeping your county safe from crime and serving as an ambassador for its citizens. While meeting with the mayor and
your sheriff’s department and deputies, you were told that there has been an increase in human trafficking reports and arrests since the new interstate opened about six months ago. You want to know if there has been an increase in human trafficking happening among residents in your county, or if the increase is due to people traveling on the interstate and being caught while stopping in your county.
What is your research question? How has the new highway changed the rate of human trafficking?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
Have you ever witnessed someone being harassed or tormented by another person on the internet?
What was your initial reaction to the situation?
How did you determine that the individual was already being bullied before you intervened?
arrow_forward
Have you ever seen someone being bullied or harassed online by another person? What did you feel when you initially learned about the situation? How did you get to the conclusion that, prior to your intervention, the individual had been the target of bullying behavior?
arrow_forward
Word limit: 1000 words
arrow_forward
Computer ethics question:
An amber alert is activated in your hometown (this is when a child goes missing and authorities issue a county-wide or state-wide search for that individual). All security cameras, traffic cameras, local police and the public try to find a white pickup truck with a broken left brake light and Florida license plates in order to quickly locate the missing child. (no, this is not Dave's car)
This would be an example of what type of data science practice?
arrow_forward
Have you ever seen an instance of internet bullying or harassment? To begin with, how did
you feel when you found out about the situation? How did you determine that the person
had been the victim of bullying before you got involved?
arrow_forward
Have you ever seen someone being bullied or harassed online by another person?
What did you think of the scenario at first? How did you determine that the victim of
bullying was already being mistreated before you intervened?
arrow_forward
Have you ever witnessed someone being the target of online bullying or harassment? So, what did you initially think? How did you determine that the person was being bullied before you intervened?
arrow_forward
PROBLEM STATEMENTS:
"Because of the pandemic since it started in Wuhan in December 2019, most
countries have limited cross-border travel and have therefore had an impact on
the global tourism industry. Most countries have shut down the border to control
the spread of the virus. By early 2021, COVID-19 vaccines have been broadly
introduced and are effective and can reduce the risk of contracting and spreading
COVID-19. That has enabled people to cross the border and will give an
opportunity to the tourism industry."
In preparation for the opening of the border, the Government of Malaysia plans to develop an
Electronic COVID-19 passport information system (eCPIS) to store Malaysian immunization
information. You are required to develop this system to keep immunization information and
allow passport control officers to retrieve each individual immunization information, ECPIS
should contain the following information:
• Personal information (Name, passport no., age, and gender)
• Vaccination…
arrow_forward
Do you know anybody who has been the victim of online bullying or harassment? When you initially learned about the issue, what did you think? Specifically, how did you get to the conclusion that this individual had been the subject of bullying before you became involved?
arrow_forward
Have you witnessed someone being bullied over the internet? What was your initial reaction? How did you realize that the person was already being bullied?
arrow_forward
Computer Science
When preparing for an investigation, what is the most important factor in determining the level of skill and resources required to investigate a potential crime? Explain each of the possible options for planning the investigation.
arrow_forward
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
Kickback Fraud The kickback is a form of fraud often associated with purchasing. Most organizations expect their purchasing agents to select the vendor that provides the best products at the lowest price. To influence the purchasing agent in his or her decision, vendors may grant the agent financial favors (cash, presents, football tickets, and so on). This activity can result in orders being placed with vendors that supply inferior products or charge excessive prices.
Required:
Describe the controls that an organization can employ to deal with kickbacks. Classify each control as either preventive, detective, or corrective.
arrow_forward
Identifying New Computer Viruses and Worms
Objective: Examine some current computer virus threats.
Description: As a security professional, you must keep abreast of the manynew viruses and worms that might attack networks
and computers. If one computer is compromised, all computers in your network could be compromised. Many firewalls don't
detect malware attached to an executable program or amacro virus (covered later in this section), so securityprofessionals needto
train users on the dangers of installing software, including games and screensavers, on a computer. Remember, a firewall doesn't
examine packets internal to the network, so malware can spread internally in an organization regardless of how effective the
firewall is. A good place to learn about new threats is the Internet.
1. Start your Webbrowser, and go to www.us-cert.gov.
2. Onthe homepage, type Conficker Wormin the SearchUS-CERTtext box, and then click the
GObutton. WhatOSsareaffected bythis worm?
3.…
arrow_forward
Have you seen internet bullying or harassment? What was your first reaction? How did you know the person was bullied before your intervention?
arrow_forward
DRY infractions are those that fall outside of the guidelines.
Why do you think that is?
arrow_forward
subject: computer forensic
based on the question write for me introduction and conclusion 200 words
arrow_forward
Digital forensics investigators use specialized techniques gather, to analyse and preserve information on computer systems. An employee is suspected of operating his sheep business with a company computer. It's been alleged that he's tracking the sales price of the wool and the cost of feed and upkeep on spread sheets. What should the employer do? Write at least two pages explaining the tasks a Digital Forensics Investigator should perform.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning
Related Questions
- Have you ever witnessed someone being harassed or tormented by another person on the internet? What was your initial reaction to the situation? How did you determine that the individual was already being bullied before you intervened?arrow_forwardHave you ever seen someone being bullied or harassed online by another person? What did you feel when you initially learned about the situation? How did you get to the conclusion that, prior to your intervention, the individual had been the target of bullying behavior?arrow_forwardWord limit: 1000 wordsarrow_forward
- Computer ethics question: An amber alert is activated in your hometown (this is when a child goes missing and authorities issue a county-wide or state-wide search for that individual). All security cameras, traffic cameras, local police and the public try to find a white pickup truck with a broken left brake light and Florida license plates in order to quickly locate the missing child. (no, this is not Dave's car) This would be an example of what type of data science practice?arrow_forwardHave you ever seen an instance of internet bullying or harassment? To begin with, how did you feel when you found out about the situation? How did you determine that the person had been the victim of bullying before you got involved?arrow_forwardHave you ever seen someone being bullied or harassed online by another person? What did you think of the scenario at first? How did you determine that the victim of bullying was already being mistreated before you intervened?arrow_forward
- Have you ever witnessed someone being the target of online bullying or harassment? So, what did you initially think? How did you determine that the person was being bullied before you intervened?arrow_forwardPROBLEM STATEMENTS: "Because of the pandemic since it started in Wuhan in December 2019, most countries have limited cross-border travel and have therefore had an impact on the global tourism industry. Most countries have shut down the border to control the spread of the virus. By early 2021, COVID-19 vaccines have been broadly introduced and are effective and can reduce the risk of contracting and spreading COVID-19. That has enabled people to cross the border and will give an opportunity to the tourism industry." In preparation for the opening of the border, the Government of Malaysia plans to develop an Electronic COVID-19 passport information system (eCPIS) to store Malaysian immunization information. You are required to develop this system to keep immunization information and allow passport control officers to retrieve each individual immunization information, ECPIS should contain the following information: • Personal information (Name, passport no., age, and gender) • Vaccination…arrow_forwardDo you know anybody who has been the victim of online bullying or harassment? When you initially learned about the issue, what did you think? Specifically, how did you get to the conclusion that this individual had been the subject of bullying before you became involved?arrow_forward
- Have you witnessed someone being bullied over the internet? What was your initial reaction? How did you realize that the person was already being bullied?arrow_forwardComputer Science When preparing for an investigation, what is the most important factor in determining the level of skill and resources required to investigate a potential crime? Explain each of the possible options for planning the investigation.arrow_forward"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningEnhanced Discovering Computers 2017 (Shelly Cashm...Computer ScienceISBN:9781305657458Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. CampbellPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Enhanced Discovering Computers 2017 (Shelly Cashm...
Computer Science
ISBN:9781305657458
Author:Misty E. Vermaat, Susan L. Sebok, Steven M. Freund, Mark Frydenberg, Jennifer T. Campbell
Publisher:Cengage Learning