Discussion – 5 PARTS

PART 1; Write a system of linear inequalities and solve the system graphically. You can do this by hand or use one of the online tools. You will need to embed a picture of your system with the correct shaded area if you solve it by hand.

PART2: Create a question

    • Identify a USLO from your syllabus and then using your notes as your guide, create a multiple-choice test/quiz question. Carefully consider the intended outcomes of the USLO. Think about what you want to ask and then write the stem (question) and the distractors (multiple choice answers).

Here is an example from BIO 1300 Human Anatomy and Physiology II

USLO 6.2 Identify the mechanisms of the innate (non-specific) defenses.

Question: Which cell type is involved in the innate response to destroy abnormal cells in peripheral tissue?

        1. Natural killer
        2. Cytotoxic T cells
        3. B cells
        4. Plasma cells

PART 3 Morphemic Analysis

      • Find a medical term that you were not familiar with and apply morphemic analysis to this word by breaking it down to see if you can make out the meaning. Explain the way that you broke the word down in order to determine its meaning. If you haven’t already, check out the video from this week .

Example: Hyperthyroidism: Hyper – means higher than normal, Thyroid – thyroid gland, Ism – means condition of. When you combine it all together and you get the meaning that Hyperthyroidism is the overactivity of the thyroid gland.

PART 4- Exam Prep and Managing Test Anxiey After watching , share your exam day preparations and strategies, and how you can incorporate Dr. Brodie’s strategies. For example, this may include: rest, diet, environment, etc.** is a helpful resource for this discussion. View this video below for more details on how to create a system of inequalities and how to embed the graph.

PART. 5- USLO 6.2 Describe the concepts of privacy, confidentiality, security, and integrity as they apply to AI use and the management of electronic data. (CSLO 1)

When using AI tools or managing electronic data, protecting privacy and confidentiality is critical, especially in fields like healthcare and education.

In your own academic, professional, or personal experiences, how have you seen privacy or confidentiality maintained (or violated) when using digital tools or AI? What are some best practices you think everyone should follow to protect personal or sensitive information when using technology? This will help demonstrate your understanding of the content while providing a thorough and detailed post. Must include at least one APA 7thedition style in-text citation and full matching references of an appropriate reading to support your responses.

Requirements: pages

WRITE MY PAPER