SEARCH RESULTS

YOU WERE LOOKING FOR :Two Data Sets Assessed

Essays 1201 - 1230

Data Collection Tools/Patient Safety

This research paper addresses selection of data collection and other relevant tools for use in a quality improvement project that...

Research Proposal on University Student Absenteeism

By studying the phenomena of absenteeism in universities there are many advantages that maybe gained by the use of that informatio...

Students Are Note Learning Languages

In today's global world, it is necessary for businesspersons and others to be proficient in at least one other language, yet, enro...

Shell Companies

With the release of the Panama papers, attention has been focused on overseas transactions and shell companies. This paper reports...

A Deadly Epidemic That Lasted Centuries

There are dozens of infectious diseases that have taken the lives of millions and millions of people. Some data back to many centu...

BayesiaLabs Data Mining System

customer loyalty are operating at the highest levels possible. Increasingly popular is the use of data mining to discover a...

Six Questions About Amazon.com Answered

to sell its own goods; promote the items of its many associated independent resellers; or promote the sites of its several retaile...

Alternative School Development

districts in the nation had at least one alternative school and about 88 percent of high school districts had at least one alterna...

Student Posed Questions About United Parcel Service

solutions," which is reinforced with principles of "First in Coverage, First in Confidence, First Thing in the Morning." The overv...

An Analysis of Nursing Care Concepts

individuals belief, values, and membership in family and social groups. Brodie (2001) asserts that it is the hallmark of professio...

Expand and Peribit Data Compression

on the same research that was used to map the human genome (Adshead, 2003). In the task of seeking to identify the human genome so...

Theories on Eugenics and Black Children

and "scientific evidence" was tailored to support racial biases. George Albee, professor of psychology at the University of Verm...

Digital Information Security

This paper considers the recent data breaches that have compromised our personal security and made identity theft a real threat. ...

Is the Teach-Back Model Effective

This essay follows a different format that usual. Questions are placed in a table with the answers following the question. Color c...

Hospital Upgrades IT Again

Memorial Hermann is a hospital system in Houston. This institution has been on the cutting edge of technology for years. They have...

Hackers Against Retail Stores

This essay focuses on the hackers that were able to access credit card data and information from Target's network. The paper repor...

Title IX Violations Colleges

Sexual harassment is covered under Title IX of the Educational Amendments of 1972. The EEOC defines this as unwelcome sexual advan...

Case STudy Hospital Readmissions

Hospital readmissions of patients is upsetting to patients and families, especially when that readmission occurs within 30 days of...

Issues with RHIOs

A RHIO is a type of health information exchange organization where certain professionals upload health/medical data and other prof...

Difficulty Proving Employee is Stealing

Unless an employee does something outlandish, it is very difficult to prove he or she is stealing from the company. In this essay,...

Overview Major Health Organization

This paper discusses a major health care organization and its diversity. Several topics are discussed: data regarding diversity, m...

Analysis Culture and Teen Pregnancy

Teen pregnancy is a problem with rising rates in most industrial countries. The incidence differs greatly by race/ethnicity. This ...

Legalizing Marijuana Compared to the Prohibition

Special interest groups and propaganda played a strong role in Prohibition and they have played a strong role in drug laws today, ...

EMAIL MARKETING TESTS -- A PROCESS

Analyzes the results of an email campaign, and suggests methods to interpret data. There are 3 sources in the bibliography of this...

Corrupt Officials in the World

The UN reported there was an inverted U-relationship between democracy and corruption in public officials. Numerous reports do not...

Computer Vulnerabilities in the Energy Industry

Cyber security is an important issue within the energy sector. The Stuxnet targeting of Iranian nuclear facilities demonstrated th...

Nursing Scholarships and Practice

This 4 page paper gives an overview of using concept analysis within the field of nursing. This paper explains how different appro...

Global Warming in Response to Anthropogenic Influence

This paper analyzes the current trend to misinterpret the data surrounding climate change. There are four sources listed in this ...

Teen Obesity

This research paper pertains to data on the prevalence of obesity among American adolescents. This information reveals that it is ...

Determining Statistical Tests

Different types of tests may be used for differing purposes and with different types of data. This paper looks at how univariate ...