Outline● people seem to underestimate the power and value
1. Outline
● People seem to underestimate the power and value of art.
What causes them to
underestimate that and how should we fix it?
● The importance of art and how it affects the world.
● The range of art education should be spread more widely.
● What causes people to belittle the education of art and how
should we fix this?
● How do people view art and how is it different from artists’
view?
● Why are art education no longer important and why some
schools don’t offer art courses
anymore? How should we fix this problem?
Rough Draft
Art is not limited to a museum or an image on a wall; it takes on
various shapes. It might be
an artwork gallery, a video you just saw, or a song you recently
heard you recently saw in a. The
act of creating art is an entirely human experience. "Art is
purely a human thing," Maggie
2. Fishman writes in her book. All kinds of art captivate you in
unique ways and propel your ideas
to new heights. In this article, I will discuss how art has
impacted the world and why it has lost
its relevance in many places.
To begin, art impacts society by influencing attitudes,
establishing ideals, and interpreting
experiences across place and time. For instance, reading a book
may have a profound effect on a
person's thinking. When you read someone's narrative and hear
their views, you enter that
person's mentality and begin to think about things in new ways.
Their words penetrate your
mind, conveying this message and influencing you to consider
issues differently. Art captures
what factually accurate historical documents cannot: the
sensation of being in a specific location
at a particular moment.
Additionally, art is communication in this way; it enables
individuals from many cultures
and eras to communicate. Art is often used as a catalyst for
societal change. It has the potential to
3. empower those who are socially or politically downgraded.
Maggie highlights from the book
how art has aided political leaders (53). You may experience art
in various ways, and the artist
wishes for it to affect you. Yes, I think that it can have a
significant impact on society and human
behavior. While it may seem that images, music, and videos
have the most effect on you, the
truth is that books are the most powerful and instructive
because they connect with your mind
and emotions.
Art is the expression or application of a person's creative
abilities and imagination. It
creates works that are mainly appreciated for their aesthetic or
emotional capacity to move
audiences. However, many locations have ignored art for a
variety of reasons. One significant
reason art is undervalued is that it is inaccessible. It is seen as a
non-essential aspect of life,
reserved for a select few, but not for everyone. Art can and
should be accessible to everyone. We
devalue art by not appreciating artists. Both the creator and the
thing are considered to be part of
4. art. Most areas have lost their respect for art because they
believe that art is just one manner or
one thing and are unaware that it is so much more. Many of
these individuals are very practical
and see art only as a picture on a wall taking up space but
providing no helpful function. They
are oblivious to the fact that art extends much beyond that range
and scope.ss
To summarize, art is a diverse range of activities that include
the creation of aural,
performative, or visual artworks that demonstrate an artist's
imagination or creative abilities. Art
has had a broad range of effects on the world, including
transmitting, expressing, and
communicating intents. Nonetheless, art is no longer regarded
as it was in ancient times due to
various factors, including advancements in technology, its
inaccessibility, and finally, its
inaccessibility.
2
5. Vulnerability Assessment of The Biltmore Estate
Student’s Name
Institutional Affiliation
Course Name and Number
Professor’s Name
Assignment Due
Vulnerability Assessment of The Biltmore EstateNatural
surveillance
To protect the belonging of all the household in the estate, there
must be surveillance at all times. Surveillance tends to ensure
that any person committing any offence is observed.
Surveillance helps observe and identify any person going
against the laws of the estate (Shah et al. 2018).
Lighting the area.
Lighting ensures that any criminal in the area is eliminated. No
person would tend to steal or garb any person’s belongings
when they are being observed. Assessment on the pathways,
parking areas and more so around the houses of each resident is
important so as to ensure safety.
Guards and CCTV’s
The guards in the estate makes sure to observe and identify any
person passing through the gate to their residence. The CCTVs
as well are important as they ensure to capture any person who
passes through the gate and their destinatio n. This will
guarantee the security of the estate.
Landscaping of the estate.
The estate should be designed in a way that one sees to the far
6. end. No areas that can be used to hide such as long and unkempt
grass, fences or shrubs. Trees be trimmed to ensure visibility all
over the estate and the landscape be clearTerritorial
reinforcement
Each person in the estate wants to feel the complete ownership
of the area they live in. To protect and defend what they owe in
the area reinforces the act of territoriality. The management of
the estate needs to implement techniques that will help all the
residents feel the territoriality of the areas they live in (Barreca,
Curto & Rolando, 2017).
Marking boundaries
Making marks over all houses would better help the resi dents
identify and know what they owe. They will be able to protect
what belongs to them. Make marks over all the entry points, the
exit points, around the houses and more so marking the houses
by numbers.
Fencing
Complete ownership is felt when one is one is in a position to
control everything taking place in their compound. Fencing will
help secure the houses and as well ensure that the residents own
everything in their compound.
Signage
All collective signatures of each household would show
complete ownership. Giving them legal documents to sign and
show them that the assets belong to them would ensure
territorial reinforcementAccess control
Controlling the people in the area would ensure they access the
right areas and be able to watch and control them. Restricting
access in to different important and risky areas would help
reduce vulnerability (Shah et al. 2018).
Parking area
Parking areas should be identified through the class of the
7. people that are allowed. Marked areas where employees,
residents, or visitors should park. This would help control
vulnerability such as theft of vehicles or destruction of the
vehicles by people.
Define all entry and exit points
Entry points should be purposely be used to enter the areas that
people want to go. This would make it easy to control the
number of people as compared to when they use the same area
as the entry and exit point.
Fire access
In case there is fire emergency, enough measure should be kept
to control the number of people and to prevent risks that ar e fire
related. This could be controlled by labelling all the fire exit
points, fire assembly and labelling the fire alarms and fire
extinguishers in the estate.Maintenance
A well-maintained compound and residency will attract people
and more so prof that the area is owned. As well, risks related
to non-maintained environment such as harmful animals hiding
in the environment could be avoided (Shah et al. 2018).
Trashing the waste
Trash should be emptied in a well-built bin. Some which are
decomposable be decomposed in an area where they will cause
no harm to the people and the other be thrown in the incinerator
where they can be burnt. This will ensure safety of the estate.
Sewage carriers.
Ensure no sewage is left leaking on the compound. Well
maintained pipes to carry the swage and empty them properly
should be used. Ensure no children are allowed to play near the
area.
Maintain grass, and landscape
Unmaintained environment is an area for harmful and hazardous
8. animals to hide. Animals such as snake would hide in tall
grasses and trees. Ensure that the estate is clean, grass kept
short and all trees in the area are trimmed. As well as any
natural fence that could be in the area.
References
Shah, M. F., Kegyes-B, O. K., Ray, R. P., Ahmed, A., & Al-
ghamadi, A. (2018). Vulnerability assessment of residential
buildings in Jeddah: A methodological proposal. International
Journal, 14(44), 134-141.
Barreca, A., Curto, R., & Rolando, D. (2017). Assessing social
and territorial vulnerability on real estate submarke ts.
Buildings, 7(4), 94. https://www.mdpi.com/2075-5309/7/4/94
2
Physical Security
Student’s name
Institutional affiliation
Course
Instructor’s name
Date
Physical security
Physical security is an essential aspect of the maintenance of
confidentiality and the safety of data. The article will discuss
9. how to take stock of windows and locks and ensure maximum
security for information technology systems.
a) Windows.
In a building design, the purpose of windows is primarily for
ventilation and acts as a source of lighting for the building.
When it comes to building security, windows are moistly the
weak link. Windows are always exploited because they can offer
a direct entry to a premise (Al-Fedaghi & Alsumait, 2019).
Therefore, to ensure maximum security to a premise, a window's
design should consider the following aspects.
a) The use of solid materials.
Strong materials should be used when constructing a window
structure. In a building with an increased risk of entry, it is
essential to avoid breakable materials such as glass. Strong
materials such as steel or even wood should be utilized.
Windows build with solid materials will act as the first security
mechanism by deterring people from entering a premise.
b) Structures design
The structure of the building and the windows' position also go
a long way in determining the level of security in a building
facility. To ensure maximum security, the windows need to be
higher than in ordinary houses, and the building should be
constructed in a way that will deter people from climbing
quickly. The windows should also be smaller in size.
c) Reinforcement
Reinforcement is the act of using additional structure i=to
improve the strength and security capabilities of a window.
Apart from building a window using solid materials, it is
essential to use steel reinforcement bars to reduce the space on
windows, thus making it impossible for people or objects to
pass through the windows.
b) Locks
Locks are security structure that protects people from accessing
a building or a computer system and requires an individual to
produce a specific key to open and gain access. The following
10. are the techniques to ensure effective locks.
a) Materials used to build the lock.
It is essential to ensure that the materials used to manufacture a
security lock are firmer materials that cannot be broken easily.
Reinforced steel is one of the essential materials that should be
used to manufacture locks and keys.
b) Limit the number of people with access to keys.
With a key, it is easy to gain entry into a premise that is locked.
Having a stronger locking system and failing to regulate key
access is equivalent to a zero-sum game in ensuring security. A
specific person should be assigned the responsibility of the
keys.
c) Maintenance
All materials manufactured have their lifespan or are prone to
breakages. A qualified person must constantly maintain all the
locking systems in an organization to ensure they remain
effective all the time.
References
Al-Fedaghi, S., & Alsumait, O. (2019). Towards a conceptual
11. foundation for physical security: A case study of its department.
International Journal of Safety and Security Engineering, 9(2),
137-156. Retrieved from
https://www.witpress.com/elibrary/sse/9/2/2441
1
Research Paper: CPTED Best Practices
Research Paper: CPTED Best Practices
Your Name
School of Computer and Information Sciences, University of the
Cumberlands
ISOL634 Physical Security
Dr. Name of Your Instructor
Current Date
Table of Contents
Natural Surveillance (Note: H1 required) 4
Best Practice 1 (Note: H2 required. Substitute name of best
practice) 4
Best Practice 2 (Note: H2 required. Substitute name of best
practice) 4
Best Practice 3 (Note: H2 required. Substitute name of best
practice) 4
Best Practice 4 (Note: H2 required. Substitute name of best
practice) 4
Best Practice 5 (Note: H2 required. Substitute name of best
practice) 4
Best Practice n (optional) 4
Territorial Reinforcement (H1 required) 4
Best Practice 1 (Note: H2 required. Substitute name of best
practice) 4
12. Best Practice 2 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 3 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 4 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 5 (Note: H2 required. Substitute name of best
practice) 5
Best Practice n (Note: optional) 5
Access Control (Note: H1 required) 5
Best Practice 1 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 2 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 3 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 4 (Note: H2 required. Substitute name of best
practice) 5
Best Practice 5 (Note: H2 required. Substitute name of best
practice) 5
Best Practice n (optional) 6
Maintenance (Note: H1 required) 6
Best Practice 1 (Note: H2 required. Substitute name of best
practice) 6
Best Practice 2 (Note: H2 required. Substitute name of best
practice) 6
Best Practice 3 (Note: H2 required. Substitute name of best
practice) 6
Best Practice 4 (Note: H2 required. Substitute name of best
practice) 6
Best Practice 5 (Note: H2 required. Substitute name of best
practice) 6
Best Practice n (optional) 6
References 7
13. Your paper starts here with the first paragraph indented. Start
by writing a brief description of your approach to completing
the assignment. (Note: Each Heading should have at least 2
properly formatted paragraphs and each paragraph should have
at least 3 properly formatted sentences. Also, please delete all
the notes before submitting)Natural Surveillance (Note: H1
required)
Start typing here.Best Practice 1 (Note: H2 required. Substitute
name of best practice)
Start typing here.Best Practice 2 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice 3 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 4 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 5 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice n (optional)
Start typing here
Territorial Reinforcement (H1 required)
Start typing here.Best Practice 1 (Note: H2 required. Substitute
name of best practice)
Start typing here.Best Practice 2 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice 3 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 4 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 5 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice n (Note: optional)
Start typing hereAccess Control (Note: H1 required)
Start typing here.Best Practice 1 (Note: H2 required. Substitute
name of best practice)
14. Start typing here.Best Practice 2 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice 3 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 4 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 5 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice n (optional)
Start typing hereMaintenance (Note: H1 required)
Start typing here.Best Practice 1 (Note: H2 required. Substitute
name of best practice)
Start typing here.Best Practice 2 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice 3 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 4 (Note: H2 required. Substitute
name of best practice)
Start typing hereBest Practice 5 (Note: H2 required.
Substitute name of best practice)
Start typing hereBest Practice n (optional)
Start typing here
References
There are no sources in the current document.
For Project 2 you will rhetorically analyze a chapter of your
choice from our textbook
Local Actions and compare and contrast the
Stakeholders/Issue/Faultline with a
Scholarly Primary/Secondary resource that explores this Topic
and Issue in California.
Step 1- Choose a section between chapters 2 - 10 in the course
15. textbook Local Actions:
Cultural Activism, Power, and Public Life in America with a
Topic and Issue that you are
interested in writing and research for the rest of the term.
Step 2- Locate a Scholarly and/or Primary/Secondary non-
scholary resource that
explains a contemporary instance of the Topic and Issue of the
chapter your chose
within the state of California within the last five years.
Step 3- Compare and contrast the two resources using
Rhetorical Analysis Key Terms
- - - - - - -
For the Introduction:
● Set up your paper with a clear Introduction that presents your
chosen Chapter
and the similar Topic/Issue that you have located in California.
Note why you
have chosen this issue and why you have decided to compare
the two
readings based on their Topic, Issue, Stakeholders, and
Faultline. Use the
template from Unit 1 for both the Introduction and Thesis.
For the first half of the body of the essay:
● Develop your Paragraphs around our formula of
Claim/Evidence/Analysis.
Your first five paragraphs should rhetorically analyze the
chapter of your
choice from Local Actions utilizing the Rhetorical Analysis Key
Terms below
16. to evaluate the efficacy of the thesis:
○ The author’s use of rhetorical strategies (logos, ethos, pathos,
)
○ Supporting evidence and author’s analysis/explanation of said
evidence
○ Absence or presence of one of the Five Cognitive Bias
(choose
one)
○ Pattern of Organization (What is the structure of the
argument?)
○ Author’s tone
For the second half of the body of the essay:
● Develop your Paragraphs around our formula of
Claim/Evidence/Analysis,
using the Compare/Contrast Pattern of Organization. For the
final 2-4
paragraphs, compare and contrast the chapter from the textbook
with the
Scholarly Primary/Secondary resource that has a similar Topic
and Issue in
California. You will want to pull 1-2 points of comparison and
1-2 points of
contrast. Each paragraph should be dedicate to a single idea.
For the Conclusion:
● End your paper with connections that summarize the work you
have
17. completed. Connect the your observations on the similarities
and differences.
Offer your opinion on the issue. End your essay with an
observation on what
the reader should understand about this issue, based on what
you have
written. Note, what issues should be discussed that would
further assist with
solving this question. The conclusion is the only section where
you should
speak in First-Person Perspective (I believe, In my opinion, etc.
…)
- - - - - - -
Submission guidelines
● You will submit the fully formatted Word Doc, Docx or Pdf
● Minimum of 1,500 words.
● 2 Primary/Secondary resources - Full MLA
Remember:
● Depth of Analysis – Should identify rhetorical appeals based
on the list
above, and provide insightful discussion of why and how they
impact the
persuasive power of the piece.
● Supporting Evidence – Should support ideas with specific
examples or quotes
from the piece and present excellent balance of summary and
analysis; you
use the evidence to support your thinking in the form of quotes
and
paraphrased material from your sources.
18. ● Structure – Should have a clear Cohesive and Coherent
structure, with topic
sentences as Claims, supporting Evidence, and clear Analysis. .
● Language & Mechanics – Academic grammar, syntax, and
word choice
- - - - - - -
Compare-Contrast Patterns
A compare and contrast pattern arranges information according
to how two or more
things are similar to or different from one another (or both).
This is an effective pattern to
use when the reader can better understa nd one subject when it is
described in relation
to another. If the reader is familiar with one topic, the writer
can compare or contrast it
with another topic to shed insight on it.
For example, suppose a writer's stated purpose is to help the
reader make an informed
decision about whether to attend a two-year college or a four-
year university. One way
to arrange the information is to compare and contrast the two
educational options along
several important dimensions, such: as cost, quality of
education, and variety of
educational programs. In this case, the number of main sections
in the outline would
depend on how many dimensions or factors were considered
19. (three in the case below).
Another way to arrange the information would be to create two
main sections, one that
describes similarities and one that describes differences (as
shown in example # 2).
Notice that either format could be equally effective.
Teacher’s Feedback on Rough Draft
Remember, we want to follow a general pattern of organization
for our body paragraph
Claims. This will help with both our reading during our research
and writing of the actual
essay:
Claim 1 - Chapter from Textbook - Choose one use of rhetorical
strategy (ethos, pathos,
logos) and explain how author utilizes
Claim 2 - Chapter from Textbook - analyze use of Evidence and
explanation of Evidence
(Primary/Secondary/Tertiary, Scholarly/Non-scholarly,
Resource Type: Book, Journal
Chapter, etc)
Claim 3 - Chapter from Textbook- describe if you see the
absence or presence of one of
the five cognitive bias
Claim 4 - Chapter from Textbook- describe what Pattern of
Organization is utilized
Claim 5 - Chapter from Textbook- describe the author's tone
Claim 6 - Primary/Secondary and/or Scholarly Resource -
Choose one use of rhetorical
strategy (ethos, pathos, logos) and explain how author utilizes
Claim 7 - Primary/Secondary and/or Scholarly Resource -
analyze use of Evidence and
explanation of Evidence (Primary/Secondary/Tertiary,
Scholarly/Non-scholarly,
20. Resource Type: Book, Journal Chapter, etc)
Claim 8 - Primary/Secondary and/or Scholarly Resource-
describe if you see the
absence or presence of one of the five cognitive bias
Claim 9 - Primary/Secondary and/or Scholarly Resource-
describe what Pattern of
Organization is utilized
Claim 10 - Primary/Secondary and/or Scholarly Resource-
describe the author's tone
Claims (11-13) Compare/Contrast
Your Outline is underdeveloped and this is impacting your
rough draft. Your Claims
should be written as Topic Sentences so it makes it easier to
transition from your
Outline to the Rough Draft. You may simply copy/paste your
Claims and add your
Evidence and Analysis. This means that you must do more to
introduce your resources,
which are a specific chapter not the entire edited book.
Remember, we want to follow a general pattern of organization
for our Claims. This will
help with both our reading during our research and writing of
the actual essay--see my
comments in the document. When we look at your Claims you
are still too broad and
vague.
You are struggling with setting up your Evidence. Primarily,
because you are not citing
the correct authors, you are citing the editors of the book. Also,
you need to work on
21. how you embed your quotes. We have the homework activity to
help with this.
Remember, you are simply developing a compare and contrast
rhetorical analysis of the
two resources.
(1) resource must be from chapter 2-10
(1) resource must be a Scholarly, Primary/Secondary resource
that explores the same
Topic and Issue in California within the last five years
When you revise:
Choose a chapter between 2-10 in our Textbook.
Your first five (5) paragraphs should be an analysis of the first
resource based on the
rhetorical analysis key terms:
The author’s use of rhetorical strategies (logos, ethos, pathos, )
Supporting evidence and author’s analysis/explanation of said
evidence
Absence or presence of one of the Five Cognitive Bias (choose
one)
Pattern of Organization (What is the structure of the argument?)
Author’s tone
Then, locate a Scholarly, Primary/Secondary resource that
explores the same Topic and
Issue in California within the last five years
Your second five (5) paragraphs should be an analysis of the
first resource based on the
rhetorical analysis key terms:
22. The author’s use of rhetorical strategies (logos, ethos, pathos, )
Supporting evidence and author’s analysis/explanation of said
evidence
Absence or presence of one of the Five Cognitive Bias (choose
one)
Pattern of Organization (What is the structure of the argument?)
Author’s tone
All you will need to add is an Introduction and Conclusions,and
(1-3) paragraphs of
discussion comparing and contrasting your findings.