Saturday, February 22, 2020
Research critique Assignment Example | Topics and Well Written Essays - 2500 words
Research critique - Assignment Example The reason this article was chosen, and the nexus of its relevance as stated in the research questions, is that it specifically seeks to understand real issues as applied to real nurses (Akerstedt, et al. 2002). It takes into account the difference between many important demographic qualities. [104] Purpose of Study. The study is investigating possible contributors to maladaptive health outcomes in nurses who work full-time. Age and familial demands placed on the nurse are considered and weighed, as are the impacts of fatigue and recovery from night shift work. The outcomes were interesting, particularly the conclusion that domestic responsibilities are not significant contributors to maladaptive health outcomes. What was found to be significant was the shift pattern worked, especially night duty (Demerouti, et al. 2001). Interestingly, the effect of age was found to be equivocal with the younger nurses showing poorer recovery than the older group; it was shown that age was not associated with negative outcomes. [110] Literature Review. The literature review is well done and uses recent sources for those aspects of the discussion which require timely analysis, e.g., in 1990 it was well known that nurses worked in a stressful environment and so that old of a source is not a critical issue. When the authors begin discussing and citing information based on neuro-chemical studies, however, advances in that area of research would require up-to-date sources and older studies would lack reliable data. In this case, those aspects of the literature review that require modernity are properly supported with research performed within the previous year of this study (Newey & Hood 2004), and the sources used are reliable and known in the field. The authors are psychological researchers and not nurses; they do, however, use recognized studies from nurses and other scientists to support their points and give weight to
Thursday, February 6, 2020
Web Project-Online File Storage Research Paper Example | Topics and Well Written Essays - 500 words
Web Project-Online File Storage - Research Paper Example Today, there are a number of backup solutions available that enables us to store files in increasingly popular cloud, and so there is no reason of foregoing the routine of backing up important data. Online data is becoming the most popular method of storage despite the availability of traditional storage devices such as USB flashes, hard drivers, and DVDs. To make it simpler online storage of data method involves storing data in the Web; thus, allowing one to access his/her information from anywhere globally. The data that one is able to store ranges from all information on an individual or company’s computer hard drive, image storage, email accounts, and text files which are made available on demand through the web servers (Broberg & Buyya 2011). The greatest benefit of online storage of data as divergent to the other methods is because of the nature of the information that is being stored virtually; it cannot be damaged or lost. This is true because most of the online data storage websites have additional feature of the stored data in their backup. Even if one accidentally deletes the data stored, the same version will always be available. There are also features that allow one to replicate and adapt the files. Another advantage is that it can be easily accessed by people who travel and are unable to access their laptops. It is also convenient for those who lose their data to computer crashes or those who forget to bring data CDs (Broberg & Buyya 2011). Lastly, it allows employees and collaborators to easily log in and access data. This may conveniently serve small business saving them some money, because networking computer will not be necessary. There are a few issues that may also arise when using online storage solutions. Security is the prime concern with a great possibility of unauthorized persons getting access to the password and the user name through other methods. This is highly risky if one uses very similar password for every site.
Subscribe to:
Posts (Atom)