Pt1420 Unit 7

Improved Essays
Interpret the data displayed in the SPSS output graphs you created.
90 children obtained trauma- informed counseling services. Children age 10 is the highest (mode) and the average (mean) age group to obtain service. The standard deviant is 3.3. Age 18 is the least number of children that seek and/ or obtain services.
How do these trends affect your planning for the program?
These trends reflect that the older the children become the less likely they obtained or needed services. Age 10 is the highest number of children that obtained services. This trend demonstrates that the Ray Foundation needs to advertise and connect to younger and older population to inform and provide services to them. Overall, if the agency wants an equal distribution

Related Documents

  • Decent Essays

    Pt1420 Unit 6 Lab

    • 109 Words
    • 1 Pages

    One thing that definitely went wrong in the lab was that we had to round about two of our measurements and the reason being was that they were exact. To exemplify, when we were reading the volume for the finishing measurement of the base for trial three, we got exactly 45.00 mL. The only problem was that, we had didn’t really have the two significant decimal numbers. Hence, we rounded our volume to 45.01 mL. Also, we got exactly 23.00 mL for our finishing volume of the acid for trial three. Therefore, once again we rounded it to 23.02mL in order to get at least two significant decimal numbers.…

    • 109 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Pt2520 Unit 1 Assignment

    • 382 Words
    • 2 Pages

    Capacity cloud sends ask for alongside the client ID to the encryption or unscrambling administration framework. In the wake of sending the information to the client, the encryption or unscrambling cloud framework is not having the power to put away the decoded information and any decoded information. It ought to be erased after the information send had been send to the client the explanation for this is as decoding key is being put away in a similar cloud. All together tp lessened the hazard figure an unscrambled information ought to be erased be erased to protected security can protection. 5.2 Fitting access to information for information stockpiling framework…

    • 382 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4 Lab 4

    • 367 Words
    • 2 Pages

    The first objective of Lab 4 is to use structure activity relationships to predict the properties of an acid and the potency of hallucinogenic compounds. The overall goal of the laboratory is to examine quantitative structure activity relationships (QSAR) in a system that is either chemical or biochemical. The lab is divided into two parts; predicting the acidity of an organic acid, and predicting the hallucinogenicity of derivatives of mescaline. The materials of this lab for both part 1 and part 2 are small training sets, which are groups of similar chemicals with known biological activity, a computer to graph the data that is recorded in the tables, the internet resource MiLogP to generate LogP data, and computational programs that will…

    • 367 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    The project is scheduled to finish in 21 months starting from August 2015. The project is divided into three categories. 1. Civil Works: -Civil Works comprise all major civil works of the project like construction of the dams for reservoir, power house, and buildings for staffs, tailrace, penstock, testing and commissioning of all hydraulic steelworks including all gates, trash racks and trash rack cleaners. 2.…

    • 200 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1310 Unit 2

    • 592 Words
    • 3 Pages

    I am a registered health information technologist. I am currently working on an Epic implementation as an analyst and trainer. All answers are based on my personal experience or my previous education unless denoted by in text citation. TASK: A. EXAMINE ELEMENTS OF THE VENDOR SELECTION PROCESS BY DOING THE FOLLOWING: 1.…

    • 592 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Nt1310 Unit 2

    • 234 Words
    • 1 Pages

    1. Who will participate in the evaluation? The person that will participate in this evaluation is my cousin. 2.…

    • 234 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 3

    • 271 Words
    • 2 Pages

    -------------------------------------------------------------------------------- Security ( show explanationhide explanation ) This is a public or shared computer Select this option if you are connecting from a public computer. Be sure to log off and close all browser windows to end your session.…

    • 271 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 3

    • 483 Words
    • 2 Pages

    Microsoft was the one to develop Active Directory. Directory services are provided by Active Directory to windows domain network. It stores all the information related to files, users, resources and computers. It places them in proper hierarchal logical groupings. It uses this information to provide the right access and authority to the right user.…

    • 483 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Pt1420 Unit 7 Checkpoint

    • 517 Words
    • 3 Pages

    The findings associated with this experiment are quantitative, meaning that they were broken down into a “numerical representation and manipulation of observations for the purpose of describing and explaining the phenomena that those observations reflected” (Babbie, 2015, 494). The data was then compiled utilizing Micrsoft Excel, this allowed for individual charts to be created to visually represent the data accuratly, See Figure 1, Figure 2, Figure 3, and Figure 4. Each chart has a different representation. Figure 1 illustrates the findings of the pre-test wich indicate that each participant with the exclusion of two were not able to list all 50 states. Additionally, Massachusets and Iowa were most commonly missed and with the inclusion of Hawaii, Minnesota, Texas, Nevada, and California the participants were also able…

    • 517 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 4 Thr

    • 474 Words
    • 2 Pages

    Complete Name: Unit 4 Student Name: Davidson, Amber Nicole ********************************************************************************************************** 1. Name at least four things checked for in a DUR. Student Answer: When a physician is writing an electronic prescription, they must select the drug and enter the SIG information. The EHR system scans the patient's chart for any known alergies.…

    • 474 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1320 Unit 7

    • 1110 Words
    • 5 Pages

    1. How is the Moon dependent on the Sun? The Moon is dependent on the Sun for its different lunar phases. Although these phases may not be essential to the existence of the Moon, they would not occur without the Sun.…

    • 1110 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Pt1420 Unit 4 Journal

    • 541 Words
    • 3 Pages

    Reading Usually I enjoy reading (particularly math), however, this week was extremely rushed, due to personal responsibilities. As a consequence, I didn't give the first pass through the attention it deserved. This resulted in the need to reread significant portions in support of the quiz, and assignment questions. Discussion Forum. I love these discussion forums.…

    • 541 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Pt1420 Unit 6 Argument

    • 253 Words
    • 2 Pages

    After recording my arguments for two days, I found that the purpose of most of my arguments was to try and convince the other person that my ideas were right and the best choice. In total I made six arguments where my purpose was to convince the other party. The six arguments I made are as follows; The best pokemon go team is Mystic and not Valor or Instinct, that 9/11 was not an inside job nor was it done by president Bush, that we need stricter gun control laws, that Trump should not be president, and that the education system for grades 12 and lower should be changed and made to be more practical for life.…

    • 253 Words
    • 2 Pages
    Decent Essays