Questions
Jed Smith is a 38-year-old welder who came into the treatment center after being arrested for...

Jed Smith is a 38-year-old welder who came into the treatment center after being arrested for drinking and driving (DUI/DWI). His attorney has suggested that he quit drinking and enter treatment, at least until his trial, which is scheduled to occur in 2 months. Jed does not anticipate serving jail time, but he believes that treatment could strengthen his legal case. After his first arrest for DUI 2 years ago, he simply paid a fine and attended a special driver's education program for 6 weeks. Jed found the program to be a “waste of time.”

Jed has been married for 8 years and has two daughters, aged 8 and 6. He has had numerous arguments with his wife, Emily, concerning his drinking. He gets very angry and defensive when she confronts him about his heavy drinking and he asserts that he is not an alcoholic. He knows this is true because his father was an alcoholic and Jed says that he is not like his father. His father died as the result of a fight that occurred in traffic when he was drunk. Jed says that his father used to “beat the tar” out of him and his brother when he was drunk and that his father always belittled, taunted, and threatened their mother, whether he was drunk or sober. Jed references that his family is Irish and that it was cultural normal to drink and enjoy alcohol and that all of his family and relatives drink in excess.

Jed's work history is very good; he misses less than one day per year. He works the day shift on weekdays, putting in time-and-a-half on most Saturdays. He is well regarded by his supervisors and peers at work. He is fearful that his employer will find out about his treatment (it is being covered by his HMO), and that people at work will learn about the second DUI arrest.

Jed drinks with his buddies from the plant, and does not think that his drinking is any more than what they do. He was just “unlucky and was caught doing what everyone else seems to get away with. Jed's drinking is very predictable: he drinks 8-9 beers on a weeknight. Several of these are consumed at the bar with friends, the remainder at home over the course of the evening. He usually falls asleep in front of the television. When he is not working on Saturdays, he often drinks several 12-packs between Friday and Sunday. A typical Saturday involves getting up at 10:00 a.m., playing soccer with friends, and going to the bar for the rest of the day and night. This pattern leads to arguments with Emily, who calls him a “lousy father.” At times, Jed has had unsettling episodes of being unable to recall what happened while drinking. He has commented to friends that “maybe I overdo it a bit.” Several times, he has attempted to cut down on his drinking, especially after the last DUI. He once attended a few AA meetings, but did not feel that AA was helpful: "It was listening to a lot of guys whining…" and he especially did not care for the prayers.

Despite these attempts, Jed has experienced increased consumption levels over the past 2 years. He admits that, as a result of the drinking, he has become increasingly estranged from his wife and daughters. Jed feels that his marriage has been basically good, but that he would not blame Emily for leaving him, the way things have been going lately. She will no longer sleep with him while he is intoxicated, which occurs regularly. She complains that the house is falling apart because Jed does not keep up with his chores. He believes that his marriage would become solid again, if he stopped overdoing the drinking, but he complains about her hassling him about the alcohol.

Jed is not close to his remaining family members. His mother is very religious and wishes Jed would see religion as a way out of his problems. His siblings live in other communities and they rarely get together. His wife and daughters regularly attend his mother's church, but Jed only attends on Christmas Eve and Easter Sunday.

Jed is distraught about having to remain abstinent in preparation for the trial. He has trouble getting to sleep without alcohol. He also “gets jumpy when he tries to stay away from drinking, feeling “closed in or like he is suffocating.” Jed reports that he is not used to socializing without alcohol and alcohol helps him relax and be more social with people.

Jed is willing to go to AA meetings only because he knows they may be court ordered and it may be better for his legal case. He does struggle with the philosophy of AA. He does not like the spirituality part of the program and does not like when people talk about God.

He does believe that he can go to the bars with his friends and not drink. He does think that he can increase his sports activities to help him not drink although many of his friends who play also drink.

Part 1: Harmful/Destructive Behaviors Chart

Complete the chart below by including a minimum of three behaviors as well as associated rewards and consequences related to relapse and abstinence behaviors.

Harmful/destructive behaviors that the client will need to avoid to prevent a relapse

Possible rewards the client experiences when they choose to use drugs/engage in relapse activities.

Possible costs for returning to use and the associated consequences

              Part 2: Current Risks of Relapse

              In this section, you will identify the steps to reduce the risk of relapse. Describe how you might assist Jed to identify high-risk situations, and specific triggers leading to relapse.

              1. What steps has the client already taken to reduce the risk of relapse? What is the client’s agreement to abstain from substance use/misuse?
              1. What are some high-risk situations that may trigger a relapse for the client? List three specific situations that may lead to relapse.
              1. What are some examples of irrational thinking that may create the urge to return to previous harmful behavior leading to relapse?

              Part 3: Relapse Response Plan

              In this section, you will create a response plan to use when the client is faced with triggers and urges to lapse into using behavior. Complete the chart below and include coping strategies, client’s skills to redirect thoughts, and immediate actions to take before using substances.

              List three people that the client identifies for a supportive network

              List three new activities the client can use as they shift their focus away from the destructive activities involved in their addiction

              List three actions or coping responses the client will utilize when a potentially negative pattern of behavior or high-risk situation emerges.

                          Part 4: Continued Health and Well-Being

                          1. Describe three community and support resources that are available to the client. Identify how often and the amount of support group meetings the client will participate in (any type of recovery support meeting) to improve health and sobriety. What resources might Jed find for himself and how will we know if they are effective resources?
                          1. Identify at least two strategies the client can do to improve his family relationships and describe how this is important to the success of the relapse prevention plan?
                          1. Describe how the ethnic and cultural aspects of the client may impact the relapse prevention plan?
                          1. Develop with the client an emergency contact sheet that the client may carry with them. Create a contact card with the client to list the people and resources to have available to use prior to a lapse or relapse to use substances. Go to Insert > Tables > and Select Table Size to begin creating the Contact Card.

                          Jed Smith

                          Client Signature

                          Date

                          Counselor Signature

                          In: Psychology

                          what is etl?( extract tranform and load basics. what are etl manual processes? discuss stagung and...

                          what is etl?( extract tranform and load basics.
                          what are etl manual processes?
                          discuss stagung and configuration of ataging area.
                          Also explain about how mapping and operators work in OWB

                          In: Computer Science

                          you will find out a real-life problem which can be formulated as a linear programming model....

                          you will find out a real-life problem which can be formulated as a linear programming model. After determining and understanding the problem on hand, you will collect the necessary data and develop the linear programming model. Then, you will solve the proposed mathematical model by using GAMS optimization software. After obtaining the optimal solution, you also need to perform sensitivity analysis on this problem. Finally, you will prepare
                          a report as described below.
                          Chapter 1 – Problem Definition
                          Give the detailed problem definition by explaining the following items:
                          • Motivation of the study.
                          • Known parameters of the problem.
                          • Restrictions of the problem.
                          • Objective of the study.
                          • Values that should be determined.
                          Chapter 2 – Linear Programming Model
                          Give the details of developed linear programming model by explaining the following items: • Indices
                          Page 1

                          • Parameters
                          • Decision Variables
                          • Objective Function
                          • Constraints
                          • Explain the objective function and constraints by words.
                          Chapter 3 – Implementation & Results
                          In this chapter, please give the information related to your input data. Give the values of parameters (table representation is preferred). Give brief information about the optimization software (GAMS) that you are using. Give the optimal results of your problem (table representation is preferred). Optimal solution and optimal values of decision variables should be explained in detail.
                          Chapter 4 – Scenario Analysis
                          For the parameters on hand, you should perform sensitivity analysis. You have to perform sensitivity analysis on at least two parameters of the problem.
                          For example, you can analyze the effect of increase in the cost to the optimal solution (objective function and values of decision variables). For different increase rates (such as %5, %10, %15, %20, %25, etc.), you can run the model and obtain the results for those increased values. Do the necessary comparisons. Please explain all results and comparisons in detail.
                          Chapter 5 – Conclusion & Suggestions
                          Please provide a general conclusion of your project. Do not forget to write some recommendations related to the problem you have studied

                          In: Operations Management

                          APC industries has been experiencing significant growth and has been having difficulty meeting customer demands recently....

                          APC industries has been experiencing significant growth and has been having difficulty meeting customer demands recently. They are considering three options to address this issue. They can move to a larger facility, add a second shift or use a subcontractor to assist in production. The annual payoff of each option depends on if the current market continues to expand, hold steady or declines. The expected payoff for each combination is show in the table below

                          Option Expand Steady Decline

                          Move to larger facility 250,000 125,000 -90,000

                          Add a second shift 175,000 80000 -45,000

                          Subcontract 90,000 15,000 -10,000

                          a) Which alternative should APC choose under the maximax criterion? (1 mark)

                          b) Which option should APC choose under the maximin criterion? (1 mark)

                          c) Which option should APC choose under the LaPlace criterion?

                          d) Which option should APC choose with the Hurwicz criterion with α = 0.5?

                          e) Using a minimax regret approach, what alternative should she choose?

                          f) After reading about economic predictions, APC has assigned the probability that the market will be expand , or be steady or be weak at 20%, 50% and 30 %. Using expected monetary values, what option should be chosen and what is that optimal expected value?

                          g) What is the most that the APC should be willing to pay for additional information? Use Expected Regret

                          h) Use the alternative method to verify EVPI (3 marks

                          In: Operations Management

                          Create a C structure which stores information about a book. Each book should have the following...

                          Create a C structure which stores information about a book. Each book should have the following data: Author (string), Title (string), Publisher (string), Year (int), ISBN (int), Genre (string), Price (float). Write a C program which creates an array of 100 of these structures, then prompts the user to enter book information to fill the array. The data entry should stop when the array is full, or when the user enters 0 for the ISBN.

                          In: Computer Science

                          Wireless Medical Sensor Network (WMSN) What a computer network is and what is the importance of...

                          Wireless Medical Sensor Network (WMSN)
                          What a computer network is and what is the importance of the computer network to this topic (Wireless Medical Sensor Network)?.  

                          Explain how a Wireless Medical Sensor Network (WMSN) differs from a Wireless Sensor Network (WSN). What kind of devices does it consist of? What kind of data do the devices collect? Please include information about authentication, user friendliness and user anonymity.

                          In: Computer Science

                          Benson Brands, Inc. Benson, presents its statement of cash flows using the indirect method. The following...

                          Benson Brands, Inc. Benson, presents its statement of cash flows using the indirect method. The following accounts and corresponding balances were drawn from Benson’s 2017 and 2016 year-end balance sheets:

                          Account Title 2017 2016
                          Accounts receivable $ 20,000 $ 30,000
                          Merchandise inventory 56,000 49,600
                          Prepaid insurance 16,500 24,700
                          Accounts payable 26,800 18,500
                          Salaries payable 4,700 4,000
                          Unearned service revenue 1,000 2,900

                          The 2017 income statement is shown below:

                          Income Statement
                          Sales $ 610,000
                          Cost of goods sold (380,000 )
                          Gross margin 230,000
                          Service revenue 4,900
                          Insurance expense (39,000 )
                          Salaries expense (157,000 )
                          Depreciation expense (4,100 )
                          Operating income 34,800
                          Gain on sale of equipment 3,600
                          Net income $ 38,400

                          Required

                          1. Prepare the operating activities section of the statement of cash flows using the direct method.

                          2. Prepare the operating activities section of the statement of cash flows using the indirect method.

                          Prepare the operating activities section of the statement of cash flows using the direct method. (Cash outflows should be indicated with minus sign.)

                          BENSON BRANDS, INC.
                          Statement of Cash Flows (Operating Activities)
                          For the Year Ended December 31, 2017
                          Cash flows from operating activities:
                          Cash collections from customers for sales
                          Cash collections from customers for services
                          Cash payments for:
                          Net cash flow from operating activities $0

                          Prepare the operating activities section of the statement of cash flows using the indirect method. (Amounts to be deducted should be indicated with a minus sign.)

                          BENSON BRANDS, INC.
                          Statement of Cash Flows (Operating Activities)
                          For the Year Ended December 31, 2017
                          Cash flows from operating activities:
                          Add:
                          Deduct:
                          Add: noncash expenses
                          Net cash flow from operating activities $0

                          In: Accounting

                          Write a C program that repeatedly prompts the user for input at a simple prompt (see...

                          Write a C program that repeatedly prompts the user for input at a simple prompt (see the sample output below for details). Your program should parse the input and provide output that describes the input specified. To best explain, here's some sample output:

                          ibrahim@ibrahim-latech:~$ ./prog1

                          $ ls -a -l -h

                          Line read: ls -a -l -h

                          Token(s):

                          ls

                          -a

                          -l

                          -h

                          4 token(s) read

                          $ ls -alh

                          Line read: ls -alh

                          Token(s):

                          ls

                          -a

                          -l

                          -h

                          2 token(s) read

                          $ clear

                          Line read: clear

                          Token(s):

                          clear

                          1 token(s) read

                          $ exit ibrahim@ibrahim-latech:~$

                          Note that the first and last lines are not part of program output (i.e., they are of the terminal session launching the program and after its exit). The program prompts the user (with a simple prompt containing just a $ followed by a space) and accepts user input until the command exit is provided, at which point it exits the program and returns to the terminal. For all other user input, it first outputs the string Line read: followed by the user input provided (on the same line). On the next line, it outputs the string Token(s):. This is followed by a list of the tokens in the input provided, each placed on a separate line and indented by a single space. For our purposes, a token is any string in the user input that is delimited by a space (i.e., basically a word). The string n token(s) read is then outputted on the next line (of course, n is replaced with the actual number of tokens read). Finally, a blank line is outputted before prompting for user input again. The process repeats until the command exit is provided. Hints: (1) An array of 256 characters for the user input should suffice (2) To get user input, fgets is your friend (3) To compare user input, strcmp is your friend (4) To tokenize user input, strtok is your friend Turn in your .c source file only that is compilable as follows (filename doesn't matter): gcc -o prog1 prog1.c Make sure to comment your source code appropriately, and to include a header providing your name.

                          In: Computer Science

                          How did the New York Police Department implement their new theory of policing?

                          How did the New York Police Department implement their new theory of policing?

                          In: Psychology

                          In C++, dealing with Binary Search trees. Implement search, insert, removeLeaf, and removeNodeWithOneChild methods in BST.h....

                          In C++, dealing with Binary Search trees. Implement search, insert, removeLeaf, and removeNodeWithOneChild methods in BST.h. BST.h code below

                          #include <iostream>
                          #include "BSTNode.h"
                          using namespace std;
                          
                          #ifndef BST_H_
                          #define BST_H_
                          
                          class BST {
                          
                          public:
                          
                                  BSTNode *root;
                                  int size;
                          
                                  BST() {
                                          root = NULL;
                                          size = 0;
                                  }
                          
                                  ~BST() {
                                          if (root != NULL)
                                                  deepClean(root);
                                  }
                          
                                  BSTNode *search(int key) { // complete this method
                                  }
                          
                                  BSTNode *insert(int val) { // complete this method
                                  }
                          
                                  bool remove(int val) { // complete this method
                                  }
                          
                          private:
                          
                                  void removeLeaf(BSTNode *leaf) { // complete this method
                                  }
                          
                                  void removeNodeWithOneChild(BSTNode *node) { // complete this method
                                  }
                          
                                  static BSTNode *findMin(BSTNode *node) {
                                          if (NULL == node)
                                                  return NULL;
                                          while (node->left != NULL) {
                                                  node = node->left;
                                          }
                                          return node;
                                  }
                          
                                  static BSTNode *findMax(BSTNode *node) {
                                          if (NULL == node)
                                                  return NULL;
                                          while (node->right != NULL) {
                                                  node = node->right;
                                          }
                                          return node;
                                  }
                          
                                  void print(BSTNode *node) {
                                          if (NULL != node) {
                                                  node->toString();
                                                  cout << " ";
                                                  print(node->left);
                                                  print(node->right);
                                          }
                                  }
                          
                                  static int getHeight(BSTNode *node) {
                                          if (node == NULL)
                                                  return 0;
                                          else
                                                  return 1 + max(getHeight(node->left), getHeight(node->right));
                                  }
                              
                              static void deepClean(BSTNode *node) {
                                  if (node->left != NULL)
                                      deepClean(node->left);
                                  if (node->right != NULL)
                                      deepClean(node->right);
                                  delete node;
                              }
                          
                          public:
                          
                                  int getTreeHeight() {
                                          return getHeight(root);
                                  }
                          
                                  void print() {
                                          print(root);
                                  }
                          
                                  int getSize() {
                                          return size;
                                  }
                          };
                          
                          #endif

                          This is the expected output

                          ****************** Test BST Correctness ******************
                          Inserting the following numbers: [11, 12, 15, 17, 12, 19, 4, 5, 11, 19, 20, 32, 77, 65, 66, 88, 99, 10, 8, 19,
                          15, 66, 11, 19]
                          *** BST Structure (after insertion) ***
                          <11, null> <4, 11> <5, 4> <10, 5> <8, 10> <12, 11> <15, 12> <17, 15> <19, 17> <20, 19> <32, 20> <77,
                          32> <65, 77> <66, 65> <88, 77> <99, 88>
                          Size of BST: 16
                          *** Searching BST ***
                          Found: [19, 12, 4, 5, 19, 20, 32, 99, 8, 12]
                          Did not find: [29, 3, 27, 34, 45, 37, 25, 25, 24, 16]
                          *** Deleting BST ***
                          Deleted: [12, 15, 5, 17, 19, 4, 20, 32, 99, 10, 8]
                          Did not find: [16, 5, 19, 17, 19, 39, 19, 15, 21]
                          *** BST Structure (after deletion) ***
                          <11, null> <77, 11> <65, 77> <66, 65> <88, 77>
                          Size of BST: 5
                          ****************** Clean up ******************
                          Size of hash table: 0
                          Size of BST: 0

                          In: Computer Science

                          You are a clinical psychologist researching the field of cognitive coping mechanisms, (no use of pharmacological...

                          You are a clinical psychologist researching the field of cognitive coping mechanisms, (no use of pharmacological drugs), associated with resiliency for middle childhood children. What would you do to help cognitive coping of middle childhood children with the hopes that they can develop increased resiliency?

                          In: Psychology

                          Suppose you have the following list of integers to sort: [1, 5, 4, 2, 18, 19]...

                          Suppose you have the following list of integers to sort:

                          [1, 5, 4, 2, 18, 19]

                          which list represents the partially sorted list after three complete passes of insertion sort?

                          1 2 4 5 18 19

                          1 4 5 2 18 19

                          1 4 2 5 18 19

                          None of the above

                          In: Computer Science

                          What are the central differences between Descartes and Locke? Which do you find most reasonable or...

                          What are the central differences between Descartes and Locke? Which do you find most reasonable or convincing?

                          In: Psychology

                          The year is 1997, California Pizza Kitchen is thinking to launch a new brand of frozen...

                          The year is 1997, California Pizza Kitchen is thinking to launch a new brand of frozen pizza. You are the Brand Manager for CPK.

                          Your task: develop a one-page executive summary to G.J. Hart, CEO persuading him that the company should launch this product

                          What is CPK's key POD?

                          What is your recommended S-T-P?

                          Include a proper positioning statement (using Kotler's model) What are the company's calculated risks?

                          WHY should the company pursue this endeavor?

                          Include an introduction, and summary conclusion

                          In: Operations Management

                          What is one thing that came to mind when you read the film study or the...

                          What is one thing that came to mind when you read the film study or the synopsis of Iron Jawed Angels?

                          Name one women in History that stood out for women's rights.

                          Why did this woman come to mind when asked that question?

                          In: Operations Management