Tuesday, May 19, 2020

Conflict Handling Style Essay - 723 Words

II.C.5 What’s My Preferred Conflict-Handling Style? Instrument When you differ with someone, how do you respond? Use the following rating scale to record your answers : 1= Practically never 2= Once in a great while 3= Sometimes 4= Fairly often 5= Very often 1. I work to come out victorious, no matter what. 1 2 3 4 5 2. I try to put the needs of other before myself. 1 2 3 4 5 3. I look for a mutually satisfactory solution. 1 2 3 4 5 4. I try not to get involved in conflicts. 1 2 3 4 5 5. I strive to investigate issues thoroughly and jointly. 1†¦show more content†¦I stress the advantages of give-and-take. 1 2 3 4 5 19. I agree early on, rather than argue about a point. 1 2 3 4 5 20. I state my position as only one point of view. 1 2 3 4 5 ___ Source: Based on conflict dimensions defined in K. W. Thomas, â€Å"Conflict and Conflict Management,† in M. Dunnette (ed.), Handbook of Industrial and Organizational Psychology (Chicago: Rand McNally, 1976), pp. 889-935. Scoring Key To calculate your conflict-handling score, add up your totals for each of the five categories. Categories and corresponding items are listed below. Analysis and Interpretation Research has identified five conflict-handling styles. They are defined as follows: Competing = A desire to satisfy ones interests, regardless of the impact on other party to the conflict. Items 1, 6, 11, and 16 in this instrument tap this style. Collaborating = Where the parties to a conflict each desire to satisfy fully the concerns of all parties. Items 5, 10, 15, and 20 in this instrument. Avoiding = The desire to withdraw from or suppress the conflict. Items 4, 9, 14, and 19 in this instrument. Accommodating = Willingness of one party in a conflict to place the opponent’s interests above his or her own. Items 2, 7, 12, and 17 in this instrument. Compromising = Where each party to a conflict is willing to give up something. Items 3, 8, 13, and 18 in thisShow MoreRelatedEssay about Conflict Handling Styles1354 Words   |  6 PagesUnderstanding Conflict Handling Styles In a dispute, its often easier to describe how others respond then to how we respond. Each of us has a predominant conflict style that we use to meet our own needs. By examining conflict styles and the consequences of those behaviors, we can gain a better understanding of the impact that our personal conflict style has on other people. With a better understanding, you then can make a conscious choice on how to respond to others in a conflict situation to helpRead MoreEssay on Conflict Management Styles 1166 Words   |  5 PagesConflict is known to be inseparable in all human interactions. In any organization, role differentiation acquires the different uses of conflict handling styles. Work direction, reward, supervision, discipline and performance review also involve the use of conflict handling styles. Organizational change and control is also viewed from a conflict perspective. In attempts to explain the nature or dynamics of a particular organizational phenomenon, conflict ma y be incorporated as a causal factor (BrownRead MoreHandling Conflicts1020 Words   |  5 PagesConflict Handling Styles Josephus J. Ellie (2012) Generally speaking, conflicts are relevant to any human existence. What is worthy of note is how these conflicts, when they occur, are managed or handled, because they would mean so much for the success or failure of the organization. For example, if an organization is to achieve its objective, it must be willing and able to handle conflicts in a functional manner. Organizational conflicts are the discords that arise when the goals, interestRead MoreDetermining Your Personality Style : Assessment1446 Words   |  6 PagesDetermining Your Personality Style After completing the â€Å"Determining Your Personality Style† assessment, I was shocked with my result because it plainly described me. According to my assessment my personality style is Amiable; a person who wants to know â€Å"why?†, Wants to build relationships, loves to give others support and attention, values suggestions from others, fears losing trust, dislike disagreements with others, displays her emotions, and somewhat introverted. I also discovered that as anRead MoreConflict Management Styles Among Corporate Ceos Nigeria1430 Words   |  6 Pagesframeworks used, and identifying which frame work best applies to the topic: â€Å"Conflict Management Styles among Corporate CEO’s in Nigeria†. Also the extract below introduces the theory of â€Å"conflict management† thus describing the conceptual perspectives that informs the different forms behavior by which conflict may be handled. Conflict management Rahim and Bonoma (1979) researched and separated the styles of managing conflict. The two authors devised two basic dimensions namely: â€Å"concern for selfRead MoreManaging Conflict And Organizational Change924 Words   |  4 PagesManaging conflict and the importance of a vision/mission in an organization are two important topics in our course of Leadership and Organizational Change. In this paper we tried to analyze the connection between these two important aspects of leadership. Our analysis and our interviews of leaders have supported and amplified what we have learnt in class. As we have seen during this course, working in a team can often lead to conflicts. In particular there are three types of conflicts that we describedRead MoreManaging Conflict and Negotiating Effectively Essay1604 Words   |  7 PagesManaging Conflict and Negotiating Effectively Managing conflict is something that as individuals we experience on a daily basis. Conflict may be in work, school, home, and even within ourselves. What I think individuals have trouble with and do not understand is how to deal with conflict in an effective way or to avoid conflict. I have always believed that not everything are meant to tangle over sometimes to avoid issues it is best to go with the flow as long as it is not a life-threatening situationRead MoreConflict Resolution At General Hospital Essay1302 Words   |  6 PagesConflict Resolution at General Hospital Key Issues This week’s case encompasses a nonprofit community hospital (General Hospital) that has been subjected to competitive forces that have hindered profit margins by directly affecting the patient occupancy by over 25%. In response to the diminishing returns, Mike Hammer, General Hospital’s CEO, decided to curtail spending and increase costs by implementing â€Å"physician-controlled costs.† The following key issues have been attributed to Hammer’s leadershipRead MoreThe Do I Trust Others?1342 Words   |  6 Pagesfive reasons where a group might endure conflict, why, and how the group could possibly resolve an issue. The Five Dysfunctions are lack of trust, conflict, lack of interest, dismissing liability, and enabling others to be irresponsible. Lencioni also offers an alternative to the Five Dysfunctions of a Team, in which we feel could benefit a person in a leadership position. He lists the following options, â€Å"Trust one another; engage in an unf iltered conflict around ideas; commit to decisions and plansRead MoreCommunication, Conflict, And Conflict1453 Words   |  6 Pages Communication and Conflict Margarita Vela COM325: Communication Conflict Instructor: Kenneth Newton March 10, 2015 Communication and Conflict Conflict is a contest or struggle between individuals with opposing values, beliefs, needs, goals, and ideas. On teams, conflict is inevitable; on the other hand, the conflict’s outcomes are not predetermined. Conflict may escalate and result in nonproductive outcomes, or it may be beneficially resolved and lead to quality outcomes (Cahn Abigail

Resistance Within The Iliad Helen s Agency Demolished

Helen On Brendan Shapiro Humanities Core 20 October 2015 Resistance Within the Iliad: Helen’s Agency Demolished The Iliad, an epic poem written by Homer, concerns a deadly war between Greek and Trojan mortals and immortals. Throughout the battle, the characters try to impose their will onto the war by expressing their own agency. Agency is a character’s ability to act on their own free will without any emotional or physical constraints stopping them. However, the characters do not always have the luxury of doing whatever they please. There are many factors that come into play that does not allow the them to act freely. In Book Three, we can see Helen, the prize of the Trojan war, having trouble expressing her own will. Helen challenges Aphrodite’s command when she tries to convince Helen to join Paris in his bedroom and Helen shames Paris when they finally meet. In this particular scene, lines 3.428 to 3.524, Helen is able to assert herself through speaking, but she still has no capability to act and must follow the or ders of Aphrodite and Paris. Helen’s verbal resistance against Aphrodite and Paris shows how the social hierarchy set within the Iliad limit mortal women from being able to act on their own accord. Since Helen is a mortal, she is already in a position under all of the gods. But, this does not stop her from mocking Aphrodite. From lines 3.460 to 3.485, Aphrodite appears before Helen, demanding her to go to Paris’ bedroom. Of course, Helen is enraged. She

Wednesday, May 6, 2020

The Debate Over Physician Assisted Suicide - 951 Words

In today’s society, suicide, and more controversially, physician assisted suicide, is a hotly debated topic amongst both every day citizens and members of the medical community. The controversial nature of the subject opens up the conversation to scrutinizing the ethics involved. Who can draw the line between morality and immorality on such a delicate subject, between lessening the suffering of a loved one and murder? Is there a moral dissimilarity between letting someone die under your care and killing them? Assuming that PAS suicide is legal under certain circumstances, how stringent need be these circumstances? The patient must be terminally ill to qualify for voluntary physician-assisted suicide, but in the eyes of the non-terminal patients with no physical means to end their life, the ending of their pain through PAS may be worth their death; at what point is the medical staff disregarding a patient’s autonomy? Due to the variability of answers to these questions, the debate over physician-assisted suicide is far from over. However, real life occurrences happen every day outside the realm of debate and rhetoric, and decisions need to be made. In the context of Case Study #1, the doctor must decide on whether or not he will hasten the woman’s death to alleviate her pain; he must decide whether or not there is a moral difference between killing someone and hastening their death to relieve suffering. The woman described has a continuously declining and invariably fatalShow MoreRelatedThe Debate Over Euthanasia And Physician Assisted Suicide Essay1441 Words   |  6 PagesLegalization of Euthanasia in the United States The debate over Euthanasia and Physician Assisted Suicide is becoming progressively complicated as doctors develop a better understanding of its purpose and usefulness. Euthanasia, a Greek term meaning â€Å"good death† and it can portray as a killing of a patient who chooses to take this course of action by applying, administrating, and enduring a procedure to terminate their life (Euthanasia Debate). Prescribed when a patient is in intense pain or sufferingRead MorePhysician Assisted Suicide1226 Words   |  5 Pagesï » ¿ Physician Assisted Suicide There are instances when people who are terminally ill or severely injured who want to terminate their own lives. Sometimes, due to the state of their injuries or conditions, those people are unable to end their own pain. It is in many of these cases that the patients request assistance in their suicides. This kind of request is like to happen in facilities where the patient receives long term or permanent care. Physician assisted suicide is a hotly contested issueRead MoreThe Debate Of Physician Assisted Suicide1321 Words   |  6 PagesThe Debate Surrounding the Topic of Physician Assisted Suicide Who gets to make the choice whether someone lives or dies? If a person has the right to live, they certainly should be able to make the choice to end their own life. The law protects each and everyone’s right to live, but when a person tries to kill themselves more than likely they will end up in a Psychiatric unit. Today we hear more and more about the debate of Physician assisted suicide and where this topic stands morally and ethicallyRead MorePHI 103 Final1311 Words   |  6 Pagesï » ¿ Should Physician-Assisted Suicide Be Legal? Eileen K. Cordova PHI 103 Instuctor James Hardy July 11, 2013 SHOULD PHYSICIAN ASSISTED SUICIDE BE LEGAL Physician-assisted suicide has been a controversial topic for over a decade now. In today’s society, physician-assisted suicide brings so many ehtical questions as such, who is the true owner of our lives? Should releiving pain and suffering always be the highest priority, or does it occure for a reason?Read MoreSince The Fifteen Century, Society Has Viewed Suicide Or1178 Words   |  5 PagesSince the fifteen century, society has viewed suicide or intentional death as immoral. It was not until the twentieth century that these â€Å"immoral† attitudes were challenged. As of 2016, the Netherlands, Belgium, Luxembourg, and Colombia have unambiguously legalized direct assisted dying. Other areas, having to undergo a process of either a judicial or legislative decision, include Canada, Japan, and Germany. Currently in the United States, following the same process of a judicial or legislative processesRead More Physician-Assisted Suicide is Morally and Ethically Acceptab le1160 Words   |  5 Pages   Ã‚  Ã‚   The long time debate over medically assisted suicide, the presence of a doctor at a patient’s suicide, resurfaced again with the conviction of doctor Jack Kevorkian.   Kevorkian was convicted of second degree murder when he euthanized, or administered the injection himself, Thomas Youk on September 17, 1998.   Dr. Kevorkian, an advocate and practitioner of medically assisted suicides, has many opponents on the issue. Opponents say that it is unethical and even with the consent of the patientRead MoreThe debate of Physician Assisted Suicide993 Words   |  4 PagesOver the years the medical field has developed many miraculous ideas and procedures. From organ transfers to blood transfusions, tons of lives have been saved. A doctor’s whole purpose is to help those dying to live. Yet, doctors have developed PAS, Physician Assisted Suicide, also known as Physician Assisted Death, and not to be mixed up with Euthanasia. Physician Assisted Suicide is morally wrong, gives doctors too much power, and it opens a door for those less critical patients to receive treatmentRead MoreNew Client. Professor__. English___. 2/28/17. The Implications1182 Words   |  5 Pagesvia euthanasia it becomes an extensively debate regarding the rights of an individual to make that choice. The article â€Å"A Doctor-Assisted Disaster for Medicine† loosely examines the negative implications of assisted suicide laws on patients. Toffler’s article sheds light upon how the law has changed the relationship between patients and their medical provider. Toffler suggests that many individuals are forcefully driven to pursue physician assisted suicide as treatment. In result, many mentally illRead MoreLegalizing Physician Assisted Suicide And Active Euthanasia843 Words   |  4 PagesFatal Differences The civil argument in the U.S. over whether or not to authorize physician-assisted suicide and active euthanasia has reached new levels of vehemence. Oregon, California, Vermont, and Washington (and Montana, via court ruling) have become the first states to legalize physician-assisted suicide. There has, too, been campaigning, ballot measures, bills, and litigation in other states in attempts to legalize one or both practices. Supporters increasingly urge either absolute legalizationRead MoreThe Legal And Ethical Issues Involving Physician Assisted Suicide1134 Words   |  5 Pageswhat conditions is physician assisted suicide morally acceptable, is the question at hand and did these states make the right decision on such a slippery slope debate. This paper will go on to explain one side of this very touchy debate, it will also consider objections from the other side, and ultimately defend the position physician assisted suicide is wrong not only morally but also, ethically. My argument for this thesis is provided below: P1: Physician assisted suicide violates the doctor’s

Essay on You Are What You Eat - 884 Words

You Are What You Eat It is indeed true that the quality of food that you take in will do a great deal to determine the quality of life that goes on in each cell of your body. Food has a huge effect on your health, and a diet rich in any one aspect would be an unhealthy diet, in the same way that a diet lacking in a certain nutrient would also affect your health. A balanced diet consists of carbohydrates, fats, protein, vitamins, minerals and water. Carbohydrate provides us with energy. Fats (lipids) with healthy cell membranes and an energy reserve. Proteins are essential for growth and repair or body tissues. Vitamins are needed to keep our cells working properly and minerals build molecules†¦show more content†¦The averages for male and female are two thousand-nine hundred for males and two thousand-one hundred for females. Protein is recommended seventy grams for males and fifty-eight for females. Fat is ninety grams for a male and seventy for a female (Samuels Henett, 1973). Although some amounts vary for male and female most vitamins are consistent for both sexes, like seventy milligrams of vitamin C. What types of food you eat determine whether your diet is healthy. By looking at the nutritional information of food packaging we can see what we get out of what we eat. Per one hundred grams of chocolate we are provided with four hundred and ninety-one calories, six point one grams of protein and twenty-three grams of fat. Where as per one hundred grams of cereal, such as corn flakes, we are provided with three hundred and seventy calories, six grams of protein and only one gram of fat. By comparing these two foods we can clearly see which one is healthier, as chocolate has and extremely high fat content. In this way could say that maybe what you eat is what you are because if you ate a diet rich in chocolate with few vitamins etc then your skin would not be as healthy and weight gain would be inevitable with such high levels of saturated and unsaturated lipids into your system. The absence of proteins, would cause weak bones, your cells would not operate so well asShow MoreRelatedYou Are What You Eat1840 Words   |  8 PagesYou Are What You Eat Introduction I didn’t start reading The Omnivore’s Dilemma with noble intentions of learning about the secrets of the food industry. I didn’t try to learn how they might affect our health and the environment. I didn’t start reading it because I wanted to know more about the organic-conventional debate. I only found it because I was looking for a book that would allow me to research irradiation for school (that didn’t happen). Even though The Omnivore’s Dilemma didn’t allow meRead MoreEssay Are You What You Eat4582 Words   |  19 PagesDay One: September 24, 2012 Do Now: Are you what you eat? How do you know? Prove it! I think in a way you are what you eat because most things you eat were alive at one point and the nutrition from the food gives you energy to keep living and moving. Also, if you eat unhealthy, your body will become affected and be unhealthy, but if you eat healthy your body will remain healthy. It also all depends on a person’s metabolism because some people are more affected by certain foods than othersRead MoreYou Are What You Eat By Michael Pollan1385 Words   |  6 Pagesâ€Å"You are what you eat† is a famous quote said by French physician Anthelme Brillat-Savarin. If this were to be true we would be walking talking corn people according to Michael Pollan’s book the Omnivores Dilemma. In his book he tried to answer a question so simple yet complex :†What should I have for dinner?† At first glance this question can be very simple basing solely off personal experience yet when truly looked at you have more questions you have to ask yourself;How many calories are in thisRead MorePublic Health : You Are What You Eat1696 Words   |  7 Pages EN 101: English Composition I 14 September 2015 Public Health: You Are What You Eat The food you eat says a lot about your lifestyle. Everything you put into your mouth is affecting you somehow and someway. The affects can be good or bad but you don’t always know which it is. Eating a salad compared to eating a burger and fries will impact your body differently. People of the lower class can’t always afford the more costly salad compared to the cheaper burger. Fast food in the tri-state is oneRead MoreThe Common Saying, You Are What You Eat, Is A Famous1742 Words   |  7 PagesThe common saying, you are what you eat, is a famous aphorism, that explains how to be healthy, you should eat healthy. However, many people, outside of the neurobiology or medicine discourse community, won’t know much about nutrition. If someone were to ask a stranger on a street a series of basic questions about nutrition, they wouldn’t be able to answer in detail. This is mostly due to a lack of exposure of information that is only obtained through science-re lated classes, articles, journalsRead MoreWhat You Eat Is Your Business868 Words   |  4 Pagesâ€Å"What You Eat Is Your Business,† by Radley Balko In the article of Radley Balko, he considers obesity a problem in the nation. Balko believes that it is unhealthy for children to be eating bad food but it’s their choices to eat that food. Balko is saying that if people are eating unhealthy and are having health problems everyone shouldnt have to pay for their health problems. Balko says, â€Å"In other words, bringing the government between you and your waistline.† Basically he is saying that theRead MoreWhat You Eat Is Your Business Essay1140 Words   |  5 Pages In Radley Balko’s essay â€Å"What You Eat Is Your Business,† Balko argues that what we put into our bodies is our business, not the government’s, and that personal responsibility should be primary in our nutrition choices. I agree wholeheartedly. However, while I do agree that personal responsibility is paramount, in the new age of the Affordable Care Act (which had not been implemented prior to Balko’s writing), it is becoming hard to say that the government should stay out of my business, when healthcareRead MoreWhat You Eat Is Your Business894 Words   |  4 Pagesis favorable to society as a whole. But on closer investigation, it is easily seen that the governments influence on such a personal matter produces the antithesis of beneficial and ultimately aids in nurturing obesity. In Radley Balko’s essay â€Å"What You Eat Is Your Business†, he is rightfully insists that the anti-obesity regulations and restrictions set by the government wrongfully alleviates American consumers of their individual responsibility for their own well-being by transforming health careRead MoreWhat You Eat Is Your Business1315 Words   |  6 Pageseven the family of 4, finding time to eat a healthy meal fells like it can be impossible. Some might argue everyone can find time to eat a healthy meal, but as a full time college student with a family of 4 with another kid on the way. Even the little time I do have at home doesn’t change that I have not had a chance to get to the store for two weeks to buy food. Given the little time and lack of food, the options can be slim, but fast food addictions can cause you to make bad choices too. So when doesRead MoreYou Are What You Eat: The Detrimental Effects of a Poor Diet789 Words   |  3 PagesYou are What You Eat You are what you eat is an idiom that most everyone can recall being told at some point. The phrase was gotten from Anthelme Brillat-Savarin who wrote in 1826 Dis-moi ce que tu manges, je te dirai ce que tu es. Translated into English it means â€Å"tell me what you eat and I will tell you what you are†. Many people especially in the United States do not really give the food that they eat very much thought. The people in this country eat because of the taste of food, the experience

Telecommunication Management Network Organization

Question: Discuss about the Telecommunication Management Network Organization. Answer: Introduction The report focuses on the organization Telecom Australia which has network management environment across Victoria. The organization faces challenges in providing services to the customers due to expensive as well legacy tool sets. The organization also wants to expand their customer base and therefore they want to provide better customer experience to the customers in the marketplace. For this, the organization wants to research telecommunication network software, which can be helpful in providing service assurance platform considering TMN and FCAPS. The report illustrates various protocols in the TMN architecture model, fault management process, fault identification, configuration state and software network of the level resources. The report also discusses disaster recovery plan, quality of service management and identification of various monitoring parameters in the fault management model. Identification of various protocols in the TMN architectures model The TMN architecture is defined as an approach of hierarchical telecommunication management. The main aim of the architecture model is to divide the various functional areas or regions of management into various protocols (Kim and Feamster 2013). The TMN architecture model helps in identifying different protocols in the functional level of telecommunication management. The protocols of TMN architecture model includes Business Management Layer, Service Management layer, Network Management Layer, Element Management Layer and the Network Element Layer (Ghezzi, Cortimiglia and Frank 2015). The protocols are described below: Network Element Layer: The network management layer helps in defining various interfaces of the network elements that helps in instantiating different functions, which are associated with device instrumentation (Mijumbi et al. 2016). They also assist in covering all the areas related with FCAPS. Element Management Layer: It helps in providing various management functions for connecting different network elements on an individual or in the group. It also assists in supporting an abstraction of different functions, which are provided by different network element layer (Han et al. 2015). The examples include determination of various equipment error, measuring temperatures of device, collection of various statistical data for accounting purpose and notification of various logging event as well as performance statistics. Network Management Layer: It helps in offering a holistic view of the network between the various pieces of equipment as well as independent types. It helps in managing a network, which is generally supported by the element management layer (Bolla et al. 2013). The examples of network management layer include end-to-end report of network utilization, root cause analysis as well as traffic engineering. Service Management Layer: It generally deals with various contractual aspects of services, which are provided to the customers. The main functions of this layer include service creation, handling of orders, implementation of service, monitoring of service, handling of complaint as well as invoices (Dotcenko, Vladyko and Letenko 2014). Examples of service management layer include QoS management, VPN and monitoring as well as verification of SLA. Business Management Layer: The layer is responsible for total enterprise. The protocol is considered as a goal setting approach. The information as well as data is related with the level of abstraction addresses of the objectives (Cohn et al. 2013). TMN implementation and standards provide proper specification, which are related with all the protocols except BML. Analyzing the fault management process and fault identification Fault management in telecommunication management network includes all the procedures as well as processes that are required for handling various systems for responding properly to the complaints of the customers. The fault management process includes the following: Alarm: TMN must have the capability of monitoring the failures of NE in real time. Indication is generally created by NE when a failure occurs. TMN helps in determining both the severity as well as nature of the fault basing (Wood et al. 2015). It also helps in determining the effect of various fault on the services which are supported by the fault equipment by using two methodologies. Correction: The procedure of automatic restoration from NE to TMN helps in indicating a specific line, equipment, service as well as system that helps in switching the protection procedures of NEs. Telecommunication management network requests NE so that they start hot-standby procedures for the system for letting a redundant unit that is further helpful in minimizing disruption (Monza et al. 2016). Reloading process includes a request to NE from telecommunication management network for reconstructing a system or a service from a specific dumb record. Reload report is the procedure of reporting a service or a system from NE to TMN. Testing: The procedure of testing can be completed using two ways. In the first way, a TMN orders a NE for carrying out analysis about the circuit as well as characteristics of the equipment. The procedure is entirely done with the NE. The results of testing are provided to the TMN automatically as well as immediately on a delayed basis. Another procedures analysis is completed within the TMN (Forbes Causam Energy 2016). It assists NE for providing proper as well as effective access to the different circuit and it is analyzed that there are no more messages which are exchanged with the NE. The main purpose of fault identification within a specific system is to identify various replaceable units. The level of granularity is fully dependent on the system under some specific consideration (John et al. 2013). The fault identification technique includes experienced based technique and model based technique that involves models of some expected system as well as behavior. Description of the configuration state and software level of the network resources Configuration state helps in providing proper as well as effective functions for exercising control, proper identification, collection of data and providing effective data to NEs. It includes the following: NE installation: Telecommunication management network helps in supporting the installation of equipment that assists in generating telecommunication networks. It helps in covering the extension as well as reduction of a system. Some of the NEs call in order to exchange data between themselves and TMN (Lara, Kolasani and Ramamurthy 2014). Another example, is the installation of various programs into NE Provisioning: It consists of different procedures, which are needed for bringing equipment inside the device including the process of installation. The supporting programs are generally initialized with the help of TMN when the unit is ready for providing service (Peng et al. 2013). The various state of service including in-service, out-of-service, stand-by as well as selected parameters are controlled by provisioning different functions. It mainly comprises of NE configuration, NE administrative functions and NE database management. NE status as well as Control: The TMN helps in providing proper capability for monitoring as well as for controlling various aspects of NE. TMN will be helpful in enabling the exclusion for some faulty equipment as a result it assists in rearranging as well as re-route traffic. (Kanode et al. 2013). It helps in enabling the entry of various proposed configuration for automatically analyzing the feasibility of the design before implementing it. It generally includes generic NE status as well as control functions, message-handling systems as well as network status, leased circuits as well as transmission network status. The management information modeling consists of an abstraction of the management aspect of network resources and the associated support management activities. The network resources present helps in determining the various scope of information and data which can be exchanged in a standardized manner (de Assis et al. 2014). The network architecture also helps in providing a set of generic components for network resources. The components also provide high-level abstraction of resources that is connection. It is mainly used by several service applications for providing the network resources to the management. Development of a disaster recovery plan for a telecommunication network with required procedures and policies The disaster recovery plan for a telecommunication network includes the following steps: Constitute a Disaster Recovery Team: The organization Telecom Australia should form a DR team for assisting the entire disaster recovery operations. The team must comprise of core member from all departments of the organization with representative from the top management of Telecom Australia (Tingfang et al. 2015). The team members must be responsible for overseeing the implementation as well as development of the DR Paln. Performing risk assessment: Proper risk analysis as well as business impact analysis must be conducted which includes various possible disasters both natural as well as man-made. Various disaster scenarios must be conducted for determining the security of various crucial resources. Prioritizing various processes as well as operations: The critical requirements of the organization that is pertained to each department must be determined properly with respect to various data, documentation, service as well as processes (Sun et al. 2015). They must be categorized properly depending on the priority essential, non-essential as well as important. Data Collection: Complete data about Telecom Australia must be collected as well as documented. The documentation must include inventory of forms, proper policies as well as procedures, communications, equipments, applications, systems as well as various retention schedules. Creation of Recovery Plan: The DR plan must be generated in a standard format for enabling various detail procedures. All significant procedures must be outlined completely for explaining the plan (Yu et al. 2014). The plan helps in providing systematic information about the disasters. It must all includes different procedures for maintaining as well as updating the plan. Plan Testing: The disaster recovery plan is mainly developed as well as tested in order to enhance the efficiency. It also assists in providing a platform where proper analysis can be done for making proper adjustments in the plan (Mavromoustakis et al. 2015). The plan should be tested using test like simulation test, parallel test, full interruption test and many more. Quality of Service or Service Level Agreement management for supporting different modes of accounting and alarm handling Quality of Service as well as Service Level Agreement management is needed for supporting various modes of accounting as well as alarm handling. Quality of service data is generally needed by the Telecommunication management network from NE either with the help of threshold or with the help of schedule (Lara, Kolasani and Ramamurthy 2014). It comprises of raw data, which either are required in order to process in a TMN or in a NE, which is very much capable of analyzing the data before the report, is forwarded. Quality of Service includes monitoring as well as recording of various parameters, which are associated with establishment, retention as well as quality of connection for cooperating properly with the fault management in order to establish possible failure of resources. It also cooperates with various configuration management for changing routing as well as load parameters for links. Element Management Systems helps in detecting the performance threshold crossings, which include SLIPS and BERs, which further assist in forwarding those to the fault manager of NML (Kim and Feamster 2013). This data helps in identifying various degrading facilities before they become apparent to various customers. It also helps in storing the performance measurement data from NEs in order to make it available to EMA report generators to various SML performance management as well as QoS systems. EMSs sometimes help in providing the capability to perform various diagnostics depending on the ability of NE as well as EMS. It is related with various communication facilities on a scheduled as well as demand basis (Ghezzi et al. 2015). Quality of service components is fully dependent on the ability of pinpointing the cause of a problem quickly for repairing the resources quickly. The main objective is to achieve the minimum mean time in order to repair the MTTR. In some situations, the procedure of repair can be done from either by NOC or by a customer under the direction of NOC technician (Yaz?c?, Kozat and Sunay 2014). It also helps in reflecting the application of cable telephony for diagnosing the RSU on the customer house. It also helps in performing tests for determining the problem in the customers telephone equipment or inside wiring. Identification of monitoring parameters in fault management context The availability of the system is compromised if the failure of the system is not handled correctly. In order to ensure availability of various computing resources, it is quite important to have an effective framework for fault management. An ARMA model is utilized as a parameter prediction method for the framework (Dotcenko, Vladyko and Letenko 2014). The fault management framework helps in predicting the future state of a system by utilizing some components or parameters. The five parameters that are utilized by the framework include monitoring module, pre-processing module, availability analysis module, resource manager module and migration module (Monza et al. 2016). The different modules are connected with the database of the system for storing as well as retrieving various predicted as well as historical data. The monitoring module helps in capturing various set of hardware parameters from each of the physical machine. The different parameters of fault management are observed p eriodically, which is dependent on a predefined interval. ARMA model of time series are mainly utilized in order to formulate a system model for predicting various future value of the systems. Results from the model are used for analyzing availability by the fault tree. Fault tree helps in analyzing the structure, which is mainly utilized in reality analysis field. The prediction model is generally created with the help of the data training set. When the real time data is analyzed with the help of the monitoring module, it is mainly fed in order to predict with the help of ARMA prediction model that is generally formulated in the Availability Analyzing module (Yaz?c?, Kozat and Sunay 2014). The output is fed into the module for storing data back into the database of the system. The leaf nodes as well as fault tree are mainly helpful in analyzing the threshold value in order to collect various parameters for calculating the state. Conclusion It can be concluded that proper research about the telecommunication network software, helps in providing proper service assurance platform considering TMN and FCAPS. The telecommunication management network not only helps in resolving the issues which are associated with the challenges in providing services to the customers due to expensive as well legacy tool sets. It also assists in expanding the customer base of the organization for providing better customer experience to the customers in the marketplace. It is analyzed that the assignment also provides proper information about development of a disaster recovery plan for a telecommunication network with required procedures and policies. Proper fault management is created in order to resolve the challenges that occurred due to improper fault management. It is identified that fault management includes all the procedures as well as processes that are required for handling various systems for responding properly to the complaints of the customers. In order to ensure availability of various computing resources, it is quite important to have an effective framework for fault management. It is analyzed that an ARMA model is utilized as a parameter prediction method for the framework. References Bolla, R., Bruschi, R., Davoli, F., Di Gregorio, L., Donadio, P., Fialho, L., Collier, M., Lombardo, A., Recupero, D.R. and Szemethy, T., 2013. The green abstraction layer: A standard power-management interface for next-generation network devices.IEEE Internet Computing,17(2), pp.82-86. Cohn, A.W., Battles, R.E., Proft, D. and Shumate, S.W., Icontrol Networks, Inc., 2013.Method and system for automatically providing alternate network access for telecommunications. U.S. Patent 8,451,986. de Assis, M.V., Rodrigues, J.J. and Proena, M.L., 2014. A seven-dimensional flow analysis to help autonomous network management.Information Sciences,278, pp.900-913. Dotcenko, S., Vladyko, A. and Letenko, I., 2014, February. A fuzzy logic-based information security management for software-defined networks. InAdvanced Communication Technology (ICACT), 2014 16th International Conference on(pp. 167-171). IEEE. Forbes Jr, J.W., Causam Energy, Inc., 2016.System, method, and apparatus for electric power grid and network management of grid elements. U.S. Patent 9,513,648. Ghezzi, A., Cortimiglia, M.N. and Frank, A.G., 2015. Strategy and business model design in dynamic telecommunications industries: A study on Italian mobile network operators.Technological Forecasting and Social Change,90, pp.346-354. Han, B., Gopalakrishnan, V., Ji, L. and Lee, S., 2015. Network function virtualization: Challenges and opportunities for innovations.IEEE Communications Magazine,53(2), pp.90-97. John, W., Pentikousis, K., Agapiou, G., Jacob, E., Kind, M., Manzalini, A., Risso, F., Staessens, D., Steinert, R. and Meirosu, C., 2013, November. Research directions in network service chaining. InFuture Networks and Services (SDN4FNS), 2013 IEEE SDN for(pp. 1-7). IEEE. Kanode, M.E., Karmarkar, K.K., McCann, T.M., Sprague, D.M., Tomar, M., Wallace, D.E. and Marsico, P.J., Tekelec, Inc., 2013.Methods, systems, and computer readable media for diameter network management. U.S. Patent 8,498,202. Kim, H. and Feamster, N., 2013. Improving network management with software defined networking.IEEE Communications Magazine,51(2), pp.114-119. Lara, A., Kolasani, A. and Ramamurthy, B., 2014. Network innovation using openflow: A survey.IEEE communications surveys tutorials,16(1), pp.493-512. Mavromoustakis, C.X., Bourdena, A., Mastorakis, G., Pallis, E. and Kormentzas, G., 2015. An energy-aware scheme for efficient spectrum utilization in a 5G mobile cognitive radio network architecture.Telecommunication Systems,59(1), pp.63-75. Mijumbi, R., Serrat, J., Gorricho, J.L., Latre, S., Charalambides, M. and Lopez, D., 2016. Management and orchestration challenges in network functions virtualization.IEEE Communications Magazine,54(1), pp.98-105. Monza, J.V., McCord, A.W. and Anderson, D.H., Genesys Telecommunications Laboratories, Inc., 2016.Method and system for providing adaptive and proactive interaction management for multiple types of business interactions occurring in a multimedia communications environment. U.S. Patent RE46,181. Peng, M., Liang, D., Wei, Y., Li, J. and Chen, H.H., 2013. Self-configuration and self-optimization in LTE-advanced heterogeneous networks.IEEE Communications Magazine,51(5), pp.36-45. Sun, S., Kadoch, M., Gong, L. and Rong, B., 2015. Integrating network function virtualization with SDR and SDN for 4G/5G networks.IEEE Network,29(3), pp.54-59. Tingfang, J.I., Song, O., Damnjanovic, A., Gaal, P., Luo, T. and Malladi, D.P., Qualcomm Incorporated, 2015.Heterogeneous network (HetNet) user equipment (UE) radio resource management (RRM) measurements. U.S. Patent 9,125,072. Wood, T., Ramakrishnan, K.K., Hwang, J., Liu, G. and Zhang, W., 2015. Toward a software-based network: integrating software defined networking and network function virtualization.IEEE Network,29(3), pp.36-41. Yaz?c?, V., Kozat, U.C. and Sunay, M.O., 2014. A new control plane for 5G network architecture with a case study on unified handoff, mobility, and routing management.IEEE Communications Magazine,52(11), pp.76-85. Yu, T., Zhou, Z., Zhang, D., Wang, X., Liu, Y. and Lu, S., 2014, April. INDAPSON: An incentive data plan sharing system based on self-organizing network. InINFOCOM, 2014 Proceedings IEEE(pp. 1545-1553). IEEE.

Impact of Demographic Variables

Question: Describe the impact of demographic variables on African-American student athletes academic performance. Answer: Introduction The academic performance of the student is generally considered as the critical aspect of assessing the quality of education. The academic scores alone are not sufficient enough to fully understand the cause of academic success or failure. Various institutes have enrolled students based on their athletic character; most of them do not possess the reasonable possibility to pass the academic tests (Reynolds, Fisher, Cavil, 2012). Several academic researchers have shown the significant effect of demographic characteristics on their academic career. Especially of the African-American athletic student, various factors play the vital role in for both men and women athletics to succeed in academic life. In this particular study, the detailed analysis needs to be performed to understand fully the factor affecting the academic performance of the African-American Student Athletes. In this particular study, the researcher needs to choose descriptive procedure for conducting the research. Furthermore, the analyst will consider both qualitative and quantitative data collection process for having a detailed idea and understanding the research topic. 1. Research questions Research questions are believed to be the most useful area for understanding the research topic in detailed and easy manner. The research questions emphasize in the area of research that provides the analyst with better understanding collecting useful and relevant data for analysis. The research questions set for this particular topic are: Do the African-American athletic students have external influence over the academic performance? How much the demographic characteristics of athletic students affect the academic career? 2. Hypothesis The hypothesis set for conducting the research is: Hypothesis 1: H0: The gender, age, cultural background, occupation, family background effect has a significant impact on their academic performance. H1: The gender, age, cultural background, occupation, family background effect has no impact on their academic performance. Hypothesis 2: H0: The demographic characteristics do affect the academic performance of the African-American Student Athletes. H1: The demographic characteristics do not affect the academic performance of the African-American Student Athletes. 3. Research purpose Conducting the research on the topic Impact of Demographic Variables on African-American Student Athletes Academic Performance will help the researcher understand the relationship between academic performance and demographic variables. In terms of academic performance, there are usually two types of students who can improve their performance and who cannot (Carrell, Sacerdote, West, 2013). Thus, conducting the research will provide the analyst understand the influence of characters like gender, age, cultural background, occupation, family background upon the academic performance of the African-American students athletics. 4. Research Design Choosing a particular research design helps the researcher in explaining the detailed framework for that will provide a better selection of data collection and analysis pattern. During the data collection and data analysis process following a particular approach helps in better defining the selected research design (Traynowicz et al., 2016). In academic researchers, three particular research designs are followed, namely exploratory, explanatory and descriptive. The exploratory research design is utilized by the researcher to acknowledge several kinds of thoughts and ideas required to complete the analysis. In explanatory design, the events and incidents occurrence are described on the pattern of their occurrence. The Explanatory research design is limited only by the cause and effect characteristics of events (Busch et al., 2014). Apart from that, the descriptive design seeks the detailed description along with the occurrence of the incidents or events. Justification: For this particular research topic, the researcher should be avid the explanatory research design since the longitudinal study was not possible to research of this particular topic (Johnson, Wessel Pierce, 2013). For the analysis of this particular topic, the researcher will need to follow the descriptive research design for analysis the impact of demographic characteristics on the African American student athletes academic performance. 4.1. Elements of the design The essential elements of the research design help in describing the conceptual structure of the research design. The vital elements of research design are sample size, types of data collected and data collection procedure to conduct the research. Sample: Population in the research study is defined as the number of people who are indirectly or directly concerned with the research topic (Mertens, 2014). In this particular research study, the African-American basketball players of university and colleges are taken into consideration. Since the number of the population concerned with the research is not possible to represent, the researcher will consider football players of Arkansas, Mississippi, Louisiana, Texas and Alabama universities. Sample size: The sample size is considered to be the number of people on whom the research is conducted. The researcher will consider total 100 football players twenty from each of the area to conduct research. The sample size will be selected on random from different universities. Types of Data: For conducting the research study, the analyst needs to collect various kinds of data. There are two types of data, namely Quantitative and Qualitative. The researcher will collect both qualitative and quantitative data from valid and reliable sources. The Qualitative data are usually defined as the narrative form of data collected from the secondary sources that provide theoretical and better description of the research topic (Mazanov et al., 2013). The quantitative data assists in defining the data collected from the primary sources. The quantitative data provides a statistic representation of the collected data. In this research topic, the data collected from interviews with the professors of the different universities are considered for qualitative data collection and the data collected from students will be considered as the quantitative data. Data Collection Procedure: For the data collection procedure, the researcher needs to consider the face-to-face interview with the professors about the impact of demographic character on students academic performance (Voyer, Voyer, 2014). The interaction session and interview will provide the researcher with qualitative data for analysis. On the other hand, the athletic students of the universities will be given an online survey for collection of primary raw data. 4.2. Data Analysis Measure: The data collected from the secondary source will be considered for providing a theoretical background to the research topic. For the analysis of the data, the primary data will be taken into consideration. The researcher will conduct qualitative and qualitative and quantitative analysis of data. The students will be asked on participating in an online survey that will comprise of various questions. The response of the students will be collected on rating according to Likerts Scale from 1 to 5 (Blumer, 2016). Here, 1 rating means strongly agree, and 5 rating means strongly disagree, and the 3 rating will represent neutral answer towards the question. Statistical Analysis: For analyzing the data collected from the primary sources, the researcher will consider an application of regression models for data analysis (Lewis, 2015). As motioned in the above sections, the researcher has considered various aspects such as academic performance, demographic characteristics, and others. In order to advance with the first hypothesis The gender, age, cultural background, occupation, family background effect has the significant impact on their academic performance" the researcher will consider applying the multiple regression analysis models. For this regression model, the academic performance is considered as the dependent variable whereas gender, age, cultural background, occupation, family background are the dependent variable. Therefore, the regression model will look like- Academic Performance = A + B*Gender + C*Age + D*Cultural Background + E*Occupation + F*Family background Where A = Intercept of the Model B = Coefficient of Gender C = Coefficient of Age D = Coefficient of Cultural background E = Coefficient of occupation F = Coefficient of Family Background On the other hand, for the analysis of the second hypothesis- "The demographic characteristics do affect the academic performance of the African-American Student Athletes, the researcher will also utilize multiple regression models. For this analysis of data, Academic performance is considered as the dependent variable whereas the African-American Student Athletes and demographic characteristics have been considered as the independent variable. Thus, after applying the second hypothesis, the regression model will look like: Academic performance = A + B* African-American Student Athletes + C* demographic characteristics Where A = Intercept of the Model B = Coefficient of African-American Student Athletes C = Coefficient of demographic characteristics 4.3. Strengths and Weaknesses of the Envision Design and Methods Strength: Conducting the descriptive research design for the data analysis and collection of data provides various significant aspects of having in-depth knowledge of the research topic. The significant aspect of the research design is that it will provide a multi-facet approach for the collection of data (Kowalczyk, 2014). This research approach will provide insight details of the academic performance of the athletic students. Apart from that, one of the major advantages of this study that it will maintain data confidentiality of the information collected through the research (Voyer, Voyer, 2014). Apart from that, the data collected for this research will be considered for voluntary involvement of the participants. No external pressure will be exerted on the students for the online survey processes. Weakness: The research procedure allows the researcher in gaining in-depth description and details of the research topic. But there is no denying the fact that, there do exist various limitation and weaknesses that are both non-avoidable and avoidable in nature (Li, 2013). The weaknesses in the research process restrict the scope of the research topic. In spite of the various advantages of conducting the research in the said procedure, there is no denying the fact that there do exists some weaknesses. Reliability: The athletic students involved in the process of online survey were not influenced by any kind of external pressure. However, the students can be biased towards the university and professor that may have affected the findings of the research procedure (Boone, Boone, 2012). Thus, the issues regarding the reliability of the data are existent in the research study. Furthermore, due to the cross-sectional characteristics of the research study, the analyst has the time limitation for conducting the data collection and analysis procedure. Thus, various in-depth information and details will not be able to consider during the study. Another weakness of the research is the budget constraint in this investigation. Lack of sufficient resources has limited the data collection to fewer students and universities that will not provide the accurate research conclusion. 4.4. Quantitative: How you will address threats to validity One of the most vital manifestations of Quantitative Data in the research paper is the validity. The ultimate question that lies while accounting the quantitative data collection and analysis is whether the research can draw a valid conclusion to the research questions (Rosenkrantz at al., 2013). The threat for ensuring the validity of the data lies throughout the research. For mitigating the threats to ensure valid data the researcher need to have sufficient knowledge about the contradiction of logic. The internal validity issues may occur while using the appropriate instrument for the research. To address the threats to validity, the researcher must not be biased against using particular instrument should be avoided. Furthermore, the threats to address the external data validity need to be also considered (Little, Rubin, 2014). The external validity refers to the reliability of the data collected from the sample size of the research. For ensuring the validity of data, the researcher needs to select the sample size on random. Furthermore, the researcher must not exert any external pressure on the respondents for providing responds to the online survey. 4.5. Quantitative: the constructs to measure to operationalize them For measuring the quantitative data collected in the data collection process, the researcher will use Likerts scale for collecting the data on a range of 1 to 5. The responses will be collected on the basis of five entities strongly agree, agree, neutral, disagree, and strongly disagree with the analysis (Mandel, 2012). Furthermore, the researcher will consider the application of multiple regression models for the analysis of collected data on the basis of the hypothesis (Voyer, Voyer, 2014). The data will be stored in tabular form, and statistical representation will be provided for the better understanding and representation of the collected data. 4.6. Qualitative: ensuring the quality of findings The Qualitative data needs to concern about the generalized theoretical concept of the research topic. The qualitative data have empirical applicability, theoretical generalizability and practical usefulness that have threats to the quality of the data. The researcher needs to compare between the empirical findings of the data with the previously conducted research (Fulton, Meyer, 2014). The researcher can ensure the quality of the data findings by maintaining some code of standards and standard instruction for measurement of the collected data. The ambiguous data can be preserved by following the standard procedure in data collection process while interviewing the professors. 6. Data Collection/ Method of Data Analysis The data collection process mentioned in the study helps in better extracting the information and better analysis of the data. The accurate data collected through the data collection procedure helps in driving the research procedure in the appropriate direction. Various sources of data are utilized by the researcher to have a transparent idea about the research process (Hosmer Jr, Lemeshow, Sturdivant, 2013). The researcher will utilize both the primary and secondary sources for collecting the data for conducting the research. The primary source of data will provide raw information about the topic while the secondary data source will help in providing a theoretical background to the research. The data analysis procedure will help in concluding the research. The analyst will use the multiple regression models for the detailed analysis of the collected data. The data analysis of the quantitative data allows the researcher to cross check the previous researchers and qualitative data collected. The multiple regression models will assist the researcher in statistically estimating the relationship existing between the academic performance and demographic character of the African-American student athletics (Krmer, Sonnberger, 2012). 7. Data Collected Will Enables the Researcher to Answer the Research Questions and Contribute To Theory The researcher ill collect the data through personal interviews with the professors and online surveys of the football athletes of various universities. By analyzing the collected data, the researcher will be able to understand the relationship between the academic performance and demographic characteristics among the student athletes (Creswell, 2013). Understanding the relation will help the researcher to utilize the significant area in order to improve the academic performance of the African-American Students. Apart from that, the successfully conducted research will allow the analyst in answering the research questions. Conclusion The entire research focuses on realizing the impact of demographic character on the academic performance of the students. The descriptive research design will allow the researcher in conducting the research while completely monitoring and controlling every procedure of the research study. Based on the data analysis procedure, the analyst will link the relevant data that will improve the success rate of the research. The findings of the research will help the students in overcoming the academic inabilities through the clear understanding of the scope of improvement. References Blumer, H. (2016). Research Purpose, Aim and Questions. InInternal Communication in Bangladeshi Ready-Made Garment Factories(pp. 49-50). Springer Fachmedien Wiesbaden. Boone, H. N., Boone, D. A. (2012). Analyzing likert data.Journal of extension,50(2), 1-5. Busch, V., Loyen, A., Lodder, M., Schrijvers, A. J., van Yperen, T. A., de Leeuw, J. R. (2014). The Effects of Adolescent Health-Related Behavior on Academic Performance A Systematic Review of the Longitudinal Evidence.Review of Educational Research, 0034654313518441. Carrell, S. E., Sacerdote, B. I., West, J. E. (2013). From natural variation to optimal policy? The importance of endogenous peer group formation.Econometrica,81(3), 855-882. Creswell, J. W. (2013).Research design: Qualitative, quantitative, and mixed methods approaches. Sage publications. Fulton, B. A., Meyer, J. S. (2014). Development of a regression model to predict copper toxicity to Daphnia magna and site specific copper criteria across multiple surface water drainages in an arid landscape.Environmental Toxicology and Chemistry,33(8), 1865-1873. Hosmer Jr, D. W., Lemeshow, S., Sturdivant, R. X. (2013). Logistic Regression Models for Multinomial and Ordinal Outcomes.Applied Logistic Regression, Third Edition, 269-311. Johnson, J. E., Wessel, R. D., Pierce, D. A. (2013). Exploring the influence of select demographic, academic, and athletic variables on the retention of student-athletes.Journal of College Student Retention: Research, Theory Practice,15(2), 135-155. Kowalczyk, D. (2014). Purposes of research: Exploratory, descriptive, and explanatory. Krmer, W., Sonnberger, H. (2012).The linear regression model under test. Springer Science Business Media. Lewis, S. (2015). Qualitative inquiry and research design: Choosing among five approaches.Health promotion practice, 1524839915580941. Li, Q. (2013). A novel Likert scale based on fuzzy sets theory.Expert Systems with Applications,40(5), 1609-1618. Little, R. J., Rubin, D. B. (2014).Statistical analysis with missing data. John Wiley Sons. Mandel, J. (2012).The statistical analysis of experimental data. Courier Corporation. Mazanov, J., Dunn, M., Connor, J., Fielding, M. L. (2013). Substance use to enhance academic performance among Australian university students.Performance Enhancement Health,2(3), 110-118. Mertens, D. M. (2014).Research and Evaluation in Education and Psychology: Integrating Diversity With Quantitative, Qualitative, and Mixed Methods: Integrating Diversity With Quantitative, Qualitative, and Mixed Methods. Sage Publications. Reynolds, L., Fisher, D., Cavil, J. K. (2012). Impact of demographic variables on African-American student athletes' academic performance.The Journal of Educational Foundations,26(3/4), 93. Rosenkrantz, A. B., Kim, S., Lim, R. P., Hindman, N., Deng, F. M., Babb, J. S., Taneja, S. S. (2013). Prostate cancer localization using multiparametric MR imaging: comparison of Prostate Imaging Reporting and Data System (PI-RADS) and Likert scales.Radiology,269(2), 482-492. Traynowicz, L., Harrison, C. K., McPherson-Botts, G., Bukstein, S., Lawrence, S. M. (2016). A Quantitative Analysis Of The Academic, Athletic, And Social Domain Perceptions Of Division I Football Players.College Student Affairs Journal,34(1), 17-32. Voyer, D., Voyer, S. D. (2014). Gender differences in scholastic achievement: A meta-analysis.Psychological Bulletin,140(4), 1174.