WK 1 CASE STUDY Access the Behavioral Risk Factor Surveillance System on the Centers for Disease Control and Prevention website

WK 1 CASE STUDY

Access the Behavioral Risk Factor Surveillance System on the Centers for Disease Control and Prevention website

Under Prevalence and Trends Data, select the following:

State: California
Year: 2016
Category: Tobacco Use

Scroll down and click the link for Tobacco Use

Under the drop-down, select Current Smoking Status

According to the CDC data, 7.9% of Californian adults smoked everyday.

How does this compare to previous years?

Click the “View Trend Data” tab.

a. Write one (1) sentence explaining this trend. NOTE: Use APA-formatted citation and references (6th edition). The following is an example of one sentence with a properly-formatted citation and reference:

In the period from 2011 to 2012, Californian adults who smoked everyday decreased from 8.6% to 7.9% (Centers for Disease Control and Prevention, 2012).

b. Now, you explore this data set by selecting a different category, different state or different years. This should be very useful in writing prevalence statements regarding behaviors.

REFERENCE

Centers for Disease Control and Prevention (2012). Behavioral Risk Factor Surveillance System Survey Data: 2011-2012. Atlanta, GA: Author.Access the Behavioral Risk Factor Surveillance System using the CDC website.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

1. Management Plan: Write a final management plan for the client you presented with bulimia. Include the following components in the management

1. Management Plan: Write a final management plan for the client you presented with bulimia. Include the following components in the management plan: a. Primary diagnosis b. Recommended diagnostic testing based on clinical practice guidelines c. Medications d. Nonpharmacologic interventions e. Recommended follow-up schedule and referrals with rationale 2. Analysis:

  iscuss one of these topics as a developmental issue occurring during the newborn, preschool, school-age, or adolescent period. Include your

  iscuss one of these topics as a developmental issue occurring during the newborn, preschool, school-age, or adolescent period. Include your recommendations and patient teachings. Autism Spectrum Disorder Cerebral Palsy Depression Developmental Disabilities Fetal Alcohol Spectrum Disorders Fragile X Syndrome Hemophilia Language and Speech Disorders Learning Disorders Muscular Dystrophy Oppositional

READ BELOW- Presentation: Demographics, onset of symptoms, history of present illness, associated risk factors  Dementia and delirium are both

READ BELOW- Presentation: Demographics, onset of symptoms, history of present illness, associated risk factors  Dementia and delirium are both conditions that present a challenge to a person’s functional capacity, however, they contrast in their pathophysiology, presentation, duration, and treatment methods. It is important to note that both conditions have the

   M2 M2 covers chapters 8 through 13 of the textbooks. TEXTBOOK(S) AND REQUIRED MATERIALS: Title: The Marriage and Family Experience: Intimate

   M2 M2 covers chapters 8 through 13 of the textbooks. TEXTBOOK(S) AND REQUIRED MATERIALS: Title: The Marriage and Family Experience: Intimate Relationships In A Changing Society  Author: Theodore F. Cohen and Bryan Strong  Publisher: Cengage Learning  Year Published: 2021 Edition: 14th ISBN: 13: 9780357378229 Please answer the following questions.

  The first Administrative Safeguard in the Security Rule Standards is the Security Management Process standard.  The Security Management Process

  The first Administrative Safeguard in the Security Rule Standards is the Security Management Process standard.  The Security Management Process standard has four required implementation specifications.  Two of these are Risk Analysis and Risk Management.   Risk Analysis and Risk Management are the foundation upon which an entity’s necessary security activities are built.  Security Risk