SlideShare a Scribd company logo
1 of 31
RUNNING HEADER: TERRORISM
1
Terrorism in America
Position Paper 1
CJUS 380
Kenton Shatzer
Liberty University
Introduction
“Have you forgotten how it felt that day? To see your
homeland under fire and her people blown away. Have you
forgotten when those towers fell? We had neighbors still inside
going thru a living hell and you say we shouldn’t worry ‘bout
bin Laden. Have you forgotten?” (Worley. 2003). Have
forgotten what happened on 9/11 and do you ever wonder what
the United States could have done to ensure that the terrorist
attack did not happen on that faithful day? 9/11 was not the first
terrorist attack on the United States and it was not the last. On
April 14, 1972, in New York City, “ten members of a local
mosque phoned in a false alarm and then ambushed responding
officer, killing one” (TheReligionofPeace.com. 2015). In
Moore, OK on September 25, 2014, “A Sharia advocate
beheaded a woman after calling for Islamic terror and posting
an Islamist beheading photo” (TheReligionofPeace.com. 2015.).
So what is terrorism? “There are more than 100 definitions
of terrorism in the literature. The United Nations defines
terrorism as “an anxiety-inspiring method of repeated violent
action, employed by clandestine individual, group or state
actors, for idiosyncratic, criminal or political reason, whereby-
in contrast to assassinations- the direct targets of violence are
not the man targets”” (Bullock, Haddow, & Coppola. 2013. Pg.
490). The problem with terrorism is that terrorists want to
attack when their target is not ready, but also when there is a
large crowd that will be watching and knowing that the attack
will kill and injury many innocent people. So how can terrorist
attacks be stopped or be limited? Can countries stop terrorist
from attacking their countries? The learner of this paper firmly
believes that countries can limit and stop terrorist attacks.
Literature Review
Like stated above, terrorism has been around since the first
attack in 1972 and has continued to present day when the last
terrorist attack was in September 2014. “The largest act of
international terrorism occurred on September 11, 2001 in a set
of co-ordinated attacks on the United States of America, where
Islamic terrorists hijacked civilian airliners and used them to
attack the World Trade Center towers in New York City and the
Pentagon in Washington, DC” (Terrorism Research). Since 9/11,
the United States has cracked down and created new laws to
help protect the American citizens. The learner firmly believes
that the laws have enhanced the security and protection of the
United States and the citizens.
The United States government created a new policy after
9/11 known as the “Homeland Security,” and in this new policy
is an act called the USA PARTRIOT Act. The Bush
Administration passed this acted and also updated electronic
surveillance rules which allowed “warrants to intercept
individuals even they frequently changed phones, and to grant
access to internet communications on the same basic terms as
applicable to traditional telephone communications” (Chertoff.
2011). “The Department of Homeland Security (DHS) and its
many partners across the federal government, public and private
sectors, and communities across the country and around the
world have worked since 9/11 to build a new homeland security
enterprise to better mitigate and defend against dynamic threats,
minimize risks, and maximize the ability to respond and recover
from attacks and disaster of all kinds” (Department of
Homeland Security. 2011).
Since 9/11, the Department of Homeland Security has changed
and updated air travel in order to prevent terrorist attacks, and
they have also improved passenger screening. DHS has created
a data base where passenger information and name record data
to help keep out terrorists and this program has “denied entry to
the United States for having ties to terrorism” (Department of
Homeland Security. 2011.). Before 9/11, there were limited
requirements for explosives screening, but that has changed.
Today, 100 percent of all passengers’ baggage and carry-ons are
checked before any bag or person can enter the main part of the
airports. “Through the Recovery Act and annual appropriations,
TSA has accelerated the deployment of new technologies to
detect the next generation of threats, including Advanced
Imaging Technology units, Explosive Detection Systems,
Explosives Trace Detection units, Advanced Technology X-Ray
systems and Bottled Liquid Scanners” (Department of Homeland
Security. 2011).
The new policies, acts, and laws do not stop at the federal
level of government, but they extend to the state and local
governments. All levels of governments agencies have been
trained in case of attack would happen and have been trained to
prevent attacks. The learner believes that will all levels
government being ready to prevent terrorist attacks, then attacks
on America will decrease which means that the protection as
increased. The learner also believes that everyone should stand
together to prevent attacks against the U.S. and should follow
all laws and guidelines that the government has set forth.
Conclusion
On Tuesday morning at 8:45 a.m. on September 11, 2001, a
20,000 gallons jet fuel, Airline Boeing 767 loaded crashed in
the north tower of the World Trade Center in New York City.
Eighteen minutes later, another airplane crashed into the south
near at the 60th floor. Both of these planes instantly killed
hundreds of people while injuring thousands and trapping
hundreds of people. Once the towers hit the World Trade
Centers, Americans knew that United States of America was
under an attack, but this was not the end of this attack as two
more planes crashed. This terrorist attack has forever changed
the lives of everyone in the United States and has changed the
United States’ government. Laws, policies, and upgrades have
been since 9/11 in order to prevent any more terrorist attacks.
The learner believes that the United States has set forth strong
laws and policies that will enhance the protection of the citizen
of the American people.
Reference
Bullock, J., Haddow, G., & Coppola, D. (2013). Introduction to
homeland security (4th ed.). New York, NY: Elsevier.
Chertoff, Michael., 2011. 9/11 Before and After.
http://www.hsaj.org/?fullarticle=7.2.13
Homeland Security. 2011. Preventing Terrorism and Enhancing
Security. https://www.dhs.gov/preventing-terrorism-and-
enhancing-security
Terrorism Research: International terrorism and security
research. http://www.terrorism-research.com/
TheReligionofPeace.com. (2002-2015). Islamic terror attacks on
American soil.
http://www.thereligionofpeace.com/pages/americanattacks.htm
Worley, D. (2003). Have you forgotten?
Name: _______________________
The following take home test may be used to replace your
lowest test score. You MUST work on this individually. You
may use your notes, book, and homework to answer the
following questions.
Chapter 1
1. Perform the given operations.
)
2
(
3
12
18
5
2
-
¸
-
+
-
2. Translate the following statement into symbols.
Five subtracted from the quotient of a number and five is twice
the sum of four and the number.
Chapter 2
3. Solve the following equation and check your solution.
y
y
y
6
)
3
(
2
)
3
(
5
11
+
+
-
=
-
-
Check:
4. Solve the following inequality. Graph your solution on the
number line. Give answers in interval notation.
)
1
4
(
2
)
2
(
3
-
<
-
+
x
x
x
¾
¾
¾
¾
¾
¾
¾
¾
¾
¾
¾
¾
¾
¾
®
¬
Interval Notation: _________________
5. Solve for the given variable.
c
bn
a
n
-
=
+
)
2
(
5
for
a
Chapter 3
6. Translate to a mathematical model and solve. The length of
a rectangular room is three less than twice its width. Find the
dimensions if the perimeter is 54 feet. Interpret the results and
include correct units.
7. Translate to a mathematical model and solve. Two angles
are supplementary. One of the angles is 20 degrees more than
three times the other. What are the angles? Interpret the results
and include correct units.
Chapter 4
8. Plot and label the following points. Name the quadrant or
axis where each point lies.
a.
)
2
,
3
(
-
-
_______________
b.
)
2
,
1
(
-
_______________
c.
)
0
,
5
(
_______________
9. Find the
x
- and
y
-intercepts (in ordered pair form) for the following equation.
Graph the line by plotting intercept points.
6
2
=
-
y
x
a.
x
-intercept: _____________
b.
y
-intercept: _____________
c. Graph.
10. Find the
y
-intercept (in ordered pair form) and slope of the following line.
.
7
2
6
=
-
y
x
a. Equation in slope-intercept form: ___________________
b.
y
-intercept:
_____________
c. slope:
_____________
11. Write the equation of the line through
)
5
,
3
(
-
with slope
5
1
in slope-intercept form.
12. Find the equation of the line through the points
)
1
,
2
(
-
and
)
9
,
5
(
in slope-intercept form.
Chapter 5
13. Determine whether the following system of equations is
CONSISTENT / INCONSISTENT and where the equations are
DEPENDENT / INDEPENDENT. Justify your answer using
complete sentences.
î
í
ì
=
+
-
=
-
15
10
4
10
5
2
y
x
y
x
14. Solve the following system of equations using the
substitution method. Check your solution.
î
í
ì
=
+
-
=
-
9
3
4
5
2
y
x
y
x
Check:
15. Solve the following system of equations using the
elimination method. Check your solution.
î
í
ì
=
+
=
-
7
2
3
17
5
4
y
x
y
x
Check:
16. Translate to a mathematical model and solve. A movie
theater charges $5 for student tickets and $8 for adult tickets.
If 175 tickets are sold for a total of $1145, how many of each
type of ticket were sold? Interpret the results and include
correct units.
17. Translate to a mathematical model and solve. Carla has
available a 20% alcohol solution and a 65% alcohol solution.
Find how many liters of each solution she should mix to make
25 liters of 38% alcohol solution. Interpret the results and
include correct units.
Chapter 6
18. Using rules of exponents, simplify the following. Write all
answers with positive exponents.
a.
(
)
3
3
2
6
y
x
-
b.
2
3
3
2
4
3
-
-
-
÷
÷
ø
ö
ç
ç
è
æ
x
y
x
c.
(
)
(
)
2
2
3
4
3
2
y
x
y
x
-
19. Multiply.
a.
)
2
6
12
(
2
2
2
+
-
-
xy
x
xy
b.
)
2
3
)(
9
2
(
b
a
b
a
+
-
c.
)
3
2
)(
1
3
(
2
-
-
-
x
x
x
d.
2
)
6
5
(
-
x
Chapter 7
20. Factor completely.
a.
2
2
3
24
18
xyz
z
y
x
-
-
b.
y
xy
x
x
3
6
2
2
-
+
-
c.
24
2
2
-
+
x
x
d.
7
39
18
2
-
-
x
x
e.
2
2
12
27
y
x
-
21. Solve the following equations.
a.
0
)
5
2
)(
11
3
(
2
=
-
+
-
x
x
x
b.
7
)
3
(
6
+
=
-
x
x
x
Chapter 8
22. Divide. Simplify the answer.
6
81
18
7
36
4
2
2
2
-
-
-
¸
-
-
+
a
a
a
a
a
a
23. Subtract. Simplify the answer.
16
12
3
16
8
6
2
2
2
2
2
-
-
-
-
-
+
+
y
y
y
y
y
y
24. Solve the following equations.
a.
3
1
8
5
1
3
-
=
-
-
x
x
b.
15
8
3
2
6
5
3
-
=
+
x
x
Chapter 9
25. Perform the following operations. Simplify all answers.
a.
7
8
32
b
a
b.
3
4
12
15
x
x
×
c.
3
8
16
192
x
x
26. Solve the follow equations.
a.
5
2
3
=
-
x
b.
1
13
-
=
-
x
x
Chapter 10
27. Solve the following equation.
28
)
5
(
2
=
-
h
28. Solve the following equation.
4
5
6
2
-
=
-
-
t
t
29. For
8
6
2
+
+
=
x
x
y
, find the following and graph on the axes provided.
a. Direction:
__________
b.
y
-intercept:
__________
c.
x
-intercepts:
__________
d. vertex:
__________
_1436286165.unknown
_1436286185.unknown
_1436286193.unknown
_1436286201.unknown
_1436286205.unknown
_1478968230.unknown
_1478968320.unknown
_1478968197.unknown
_1436286206.unknown
_1436286203.unknown
_1436286204.unknown
_1436286202.unknown
_1436286196.unknown
_1436286200.unknown
_1436286194.unknown
_1436286189.unknown
_1436286191.unknown
_1436286192.unknown
_1436286190.unknown
_1436286187.unknown
_1436286188.unknown
_1436286186.unknown
_1436286174.unknown
_1436286180.unknown
_1436286182.unknown
_1436286184.unknown
_1436286181.unknown
_1436286176.unknown
_1436286177.unknown
_1436286175.unknown
_1436286170.unknown
_1436286172.unknown
_1436286173.unknown
_1436286171.unknown
_1436286167.unknown
_1436286168.unknown
_1436286166.unknown
_1436286157.unknown
_1436286161.unknown
_1436286163.unknown
_1436286164.unknown
_1436286162.unknown
_1436286159.unknown
_1436286160.unknown
_1436286158.unknown
_1436286152.unknown
_1436286155.unknown
_1436286156.unknown
_1436286153.unknown
_1436286150.unknown
_1436286151.unknown
_1436286149.unknown

More Related Content

More from agnesdcarey33086

Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docxSample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
agnesdcarey33086
 
SAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docxSAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docx
agnesdcarey33086
 
Sample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docxSample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docx
agnesdcarey33086
 
sample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docxsample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docx
agnesdcarey33086
 
SAMPLING MEAN DEFINITION The term sampling mean is.docx
SAMPLING MEAN  DEFINITION  The term sampling mean is.docxSAMPLING MEAN  DEFINITION  The term sampling mean is.docx
SAMPLING MEAN DEFINITION The term sampling mean is.docx
agnesdcarey33086
 
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docxSAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
agnesdcarey33086
 
sampleReportt.docxPower Electronics Contents.docx
sampleReportt.docxPower Electronics            Contents.docxsampleReportt.docxPower Electronics            Contents.docx
sampleReportt.docxPower Electronics Contents.docx
agnesdcarey33086
 
Sample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docxSample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docx
agnesdcarey33086
 
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docxSample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
agnesdcarey33086
 
SAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docxSAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docx
agnesdcarey33086
 
Sample Questions to Ask During an Informational Interview .docx
Sample Questions to Ask During an Informational Interview  .docxSample Questions to Ask During an Informational Interview  .docx
Sample Questions to Ask During an Informational Interview .docx
agnesdcarey33086
 
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docxSample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
agnesdcarey33086
 
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docxSAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
agnesdcarey33086
 
Sample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docxSample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docx
agnesdcarey33086
 
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docxSample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
agnesdcarey33086
 
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docxSample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
agnesdcarey33086
 
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docxSAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
agnesdcarey33086
 
Sample Action Research Report 1 Effect of Technol.docx
Sample Action Research Report 1    Effect of Technol.docxSample Action Research Report 1    Effect of Technol.docx
Sample Action Research Report 1 Effect of Technol.docx
agnesdcarey33086
 
Sample Case with a report Dawit Zerom, Instructor Cas.docx
Sample Case with a report Dawit Zerom, Instructor  Cas.docxSample Case with a report Dawit Zerom, Instructor  Cas.docx
Sample Case with a report Dawit Zerom, Instructor Cas.docx
agnesdcarey33086
 
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docxSalkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
agnesdcarey33086
 

More from agnesdcarey33086 (20)

Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docxSample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
Sample Summaries of Emily Raine’s Why Should I Be Nice to You.docx
 
SAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docxSAMPLEExecutive Summary The following report is an evalua.docx
SAMPLEExecutive Summary The following report is an evalua.docx
 
Sample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docxSample Student Industry AnalysisExecutive SummaryCom.docx
Sample Student Industry AnalysisExecutive SummaryCom.docx
 
sample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docxsample.sql-- START-- SETUP Create userCREATE USER .docx
sample.sql-- START-- SETUP Create userCREATE USER .docx
 
SAMPLING MEAN DEFINITION The term sampling mean is.docx
SAMPLING MEAN  DEFINITION  The term sampling mean is.docxSAMPLING MEAN  DEFINITION  The term sampling mean is.docx
SAMPLING MEAN DEFINITION The term sampling mean is.docx
 
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docxSAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
SAMPLING MEANDEFINITIONThe term sampling mean is a stati.docx
 
sampleReportt.docxPower Electronics Contents.docx
sampleReportt.docxPower Electronics            Contents.docxsampleReportt.docxPower Electronics            Contents.docx
sampleReportt.docxPower Electronics Contents.docx
 
Sample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docxSample Workflow of Answering a Telephone in an OfficeInform .docx
Sample Workflow of Answering a Telephone in an OfficeInform .docx
 
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docxSample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
Sample Investment PropertyAverage InlandSan Diego HomeASSUMPTION.docx
 
SAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docxSAMPLE Project (Answers and explanations are in red)I opened t.docx
SAMPLE Project (Answers and explanations are in red)I opened t.docx
 
Sample Questions to Ask During an Informational Interview .docx
Sample Questions to Ask During an Informational Interview  .docxSample Questions to Ask During an Informational Interview  .docx
Sample Questions to Ask During an Informational Interview .docx
 
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docxSample Table.pdfTopic RatingPatients Goal Able to walk .docx
Sample Table.pdfTopic RatingPatients Goal Able to walk .docx
 
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docxSAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
SAMPLE QUESTIONExercise 1 Consider the functionf (x,C).docx
 
Sample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docxSample PowerPoint Flow Week 5Select a current product with which.docx
Sample PowerPoint Flow Week 5Select a current product with which.docx
 
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docxSample Of assignmentIntroductionComment by Jane Summers Introd.docx
Sample Of assignmentIntroductionComment by Jane Summers Introd.docx
 
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docxSample Access Control Policy1.Purpose2.Scope3.Pol.docx
Sample Access Control Policy1.Purpose2.Scope3.Pol.docx
 
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docxSAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
SAMPLE GED 501 RESEARCH PAPERTechnology Based Education How.docx
 
Sample Action Research Report 1 Effect of Technol.docx
Sample Action Research Report 1    Effect of Technol.docxSample Action Research Report 1    Effect of Technol.docx
Sample Action Research Report 1 Effect of Technol.docx
 
Sample Case with a report Dawit Zerom, Instructor Cas.docx
Sample Case with a report Dawit Zerom, Instructor  Cas.docxSample Case with a report Dawit Zerom, Instructor  Cas.docx
Sample Case with a report Dawit Zerom, Instructor Cas.docx
 
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docxSalkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
Salkind_datasetsCrab Scale Results.savSalkind_datasetsLess.docx
 

Recently uploaded

SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
中 央社
 

Recently uploaded (20)

Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptxAnalyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
Analyzing and resolving a communication crisis in Dhaka textiles LTD.pptx
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community PartnershipsSpring gala 2024 photo slideshow - Celebrating School-Community Partnerships
Spring gala 2024 photo slideshow - Celebrating School-Community Partnerships
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽會考英聽
 
Major project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategiesMajor project report on Tata Motors and its marketing strategies
Major project report on Tata Motors and its marketing strategies
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinhĐề tieng anh thpt 2024 danh cho cac ban hoc sinh
Đề tieng anh thpt 2024 danh cho cac ban hoc sinh
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 

RUNNING HEADER TERRORISM .docx

  • 1. RUNNING HEADER: TERRORISM 1 Terrorism in America Position Paper 1 CJUS 380 Kenton Shatzer Liberty University Introduction “Have you forgotten how it felt that day? To see your homeland under fire and her people blown away. Have you forgotten when those towers fell? We had neighbors still inside going thru a living hell and you say we shouldn’t worry ‘bout bin Laden. Have you forgotten?” (Worley. 2003). Have forgotten what happened on 9/11 and do you ever wonder what the United States could have done to ensure that the terrorist attack did not happen on that faithful day? 9/11 was not the first terrorist attack on the United States and it was not the last. On April 14, 1972, in New York City, “ten members of a local mosque phoned in a false alarm and then ambushed responding officer, killing one” (TheReligionofPeace.com. 2015). In Moore, OK on September 25, 2014, “A Sharia advocate
  • 2. beheaded a woman after calling for Islamic terror and posting an Islamist beheading photo” (TheReligionofPeace.com. 2015.). So what is terrorism? “There are more than 100 definitions of terrorism in the literature. The United Nations defines terrorism as “an anxiety-inspiring method of repeated violent action, employed by clandestine individual, group or state actors, for idiosyncratic, criminal or political reason, whereby- in contrast to assassinations- the direct targets of violence are not the man targets”” (Bullock, Haddow, & Coppola. 2013. Pg. 490). The problem with terrorism is that terrorists want to attack when their target is not ready, but also when there is a large crowd that will be watching and knowing that the attack will kill and injury many innocent people. So how can terrorist attacks be stopped or be limited? Can countries stop terrorist from attacking their countries? The learner of this paper firmly believes that countries can limit and stop terrorist attacks. Literature Review Like stated above, terrorism has been around since the first attack in 1972 and has continued to present day when the last terrorist attack was in September 2014. “The largest act of international terrorism occurred on September 11, 2001 in a set of co-ordinated attacks on the United States of America, where Islamic terrorists hijacked civilian airliners and used them to attack the World Trade Center towers in New York City and the Pentagon in Washington, DC” (Terrorism Research). Since 9/11, the United States has cracked down and created new laws to help protect the American citizens. The learner firmly believes that the laws have enhanced the security and protection of the United States and the citizens. The United States government created a new policy after 9/11 known as the “Homeland Security,” and in this new policy is an act called the USA PARTRIOT Act. The Bush Administration passed this acted and also updated electronic surveillance rules which allowed “warrants to intercept individuals even they frequently changed phones, and to grant
  • 3. access to internet communications on the same basic terms as applicable to traditional telephone communications” (Chertoff. 2011). “The Department of Homeland Security (DHS) and its many partners across the federal government, public and private sectors, and communities across the country and around the world have worked since 9/11 to build a new homeland security enterprise to better mitigate and defend against dynamic threats, minimize risks, and maximize the ability to respond and recover from attacks and disaster of all kinds” (Department of Homeland Security. 2011). Since 9/11, the Department of Homeland Security has changed and updated air travel in order to prevent terrorist attacks, and they have also improved passenger screening. DHS has created a data base where passenger information and name record data to help keep out terrorists and this program has “denied entry to the United States for having ties to terrorism” (Department of Homeland Security. 2011.). Before 9/11, there were limited requirements for explosives screening, but that has changed. Today, 100 percent of all passengers’ baggage and carry-ons are checked before any bag or person can enter the main part of the airports. “Through the Recovery Act and annual appropriations, TSA has accelerated the deployment of new technologies to detect the next generation of threats, including Advanced Imaging Technology units, Explosive Detection Systems, Explosives Trace Detection units, Advanced Technology X-Ray systems and Bottled Liquid Scanners” (Department of Homeland Security. 2011). The new policies, acts, and laws do not stop at the federal level of government, but they extend to the state and local governments. All levels of governments agencies have been trained in case of attack would happen and have been trained to prevent attacks. The learner believes that will all levels government being ready to prevent terrorist attacks, then attacks on America will decrease which means that the protection as increased. The learner also believes that everyone should stand together to prevent attacks against the U.S. and should follow
  • 4. all laws and guidelines that the government has set forth. Conclusion On Tuesday morning at 8:45 a.m. on September 11, 2001, a 20,000 gallons jet fuel, Airline Boeing 767 loaded crashed in the north tower of the World Trade Center in New York City. Eighteen minutes later, another airplane crashed into the south near at the 60th floor. Both of these planes instantly killed hundreds of people while injuring thousands and trapping hundreds of people. Once the towers hit the World Trade Centers, Americans knew that United States of America was under an attack, but this was not the end of this attack as two more planes crashed. This terrorist attack has forever changed the lives of everyone in the United States and has changed the United States’ government. Laws, policies, and upgrades have been since 9/11 in order to prevent any more terrorist attacks. The learner believes that the United States has set forth strong laws and policies that will enhance the protection of the citizen of the American people. Reference Bullock, J., Haddow, G., & Coppola, D. (2013). Introduction to homeland security (4th ed.). New York, NY: Elsevier. Chertoff, Michael., 2011. 9/11 Before and After. http://www.hsaj.org/?fullarticle=7.2.13
  • 5. Homeland Security. 2011. Preventing Terrorism and Enhancing Security. https://www.dhs.gov/preventing-terrorism-and- enhancing-security Terrorism Research: International terrorism and security research. http://www.terrorism-research.com/ TheReligionofPeace.com. (2002-2015). Islamic terror attacks on American soil. http://www.thereligionofpeace.com/pages/americanattacks.htm Worley, D. (2003). Have you forgotten? Name: _______________________ The following take home test may be used to replace your lowest test score. You MUST work on this individually. You may use your notes, book, and homework to answer the following questions. Chapter 1 1. Perform the given operations. ) 2 ( 3 12 18 5 2 - ¸ -
  • 6. + - 2. Translate the following statement into symbols. Five subtracted from the quotient of a number and five is twice the sum of four and the number. Chapter 2 3. Solve the following equation and check your solution. y y y 6 ) 3 ( 2 ) 3 ( 5 11 + + - = - -
  • 7. Check: 4. Solve the following inequality. Graph your solution on the number line. Give answers in interval notation. ) 1 4 ( 2 ) 2 ( 3 - < - + x x x ¾ ¾ ¾ ¾ ¾ ¾ ¾ ¾ ¾ ¾
  • 8. ¾ ¾ ¾ ¾ ® ¬ Interval Notation: _________________ 5. Solve for the given variable. c bn a n
  • 9. - = + ) 2 ( 5 for a Chapter 3 6. Translate to a mathematical model and solve. The length of a rectangular room is three less than twice its width. Find the dimensions if the perimeter is 54 feet. Interpret the results and include correct units. 7. Translate to a mathematical model and solve. Two angles are supplementary. One of the angles is 20 degrees more than three times the other. What are the angles? Interpret the results and include correct units. Chapter 4 8. Plot and label the following points. Name the quadrant or axis where each point lies. a. ) 2 , 3 ( - -
  • 11. - and y -intercepts (in ordered pair form) for the following equation. Graph the line by plotting intercept points. 6 2 = - y x a. x -intercept: _____________ b. y -intercept: _____________ c. Graph.
  • 12. 10. Find the y -intercept (in ordered pair form) and slope of the following line. . 7 2 6 = - y x a. Equation in slope-intercept form: ___________________ b. y -intercept: _____________ c. slope: _____________ 11. Write the equation of the line through
  • 13. ) 5 , 3 ( - with slope 5 1 in slope-intercept form. 12. Find the equation of the line through the points ) 1 , 2 ( - and ) 9 , 5 ( in slope-intercept form. Chapter 5 13. Determine whether the following system of equations is
  • 14. CONSISTENT / INCONSISTENT and where the equations are DEPENDENT / INDEPENDENT. Justify your answer using complete sentences. î í ì = + - = - 15 10 4 10 5 2 y x y x 14. Solve the following system of equations using the substitution method. Check your solution. î í ì = + -
  • 15. = - 9 3 4 5 2 y x y x Check: 15. Solve the following system of equations using the elimination method. Check your solution. î í ì = + = - 7 2 3
  • 16. 17 5 4 y x y x Check: 16. Translate to a mathematical model and solve. A movie theater charges $5 for student tickets and $8 for adult tickets. If 175 tickets are sold for a total of $1145, how many of each type of ticket were sold? Interpret the results and include correct units. 17. Translate to a mathematical model and solve. Carla has available a 20% alcohol solution and a 65% alcohol solution. Find how many liters of each solution she should mix to make 25 liters of 38% alcohol solution. Interpret the results and include correct units. Chapter 6 18. Using rules of exponents, simplify the following. Write all answers with positive exponents. a.
  • 20. ( 2 - - - x x x d. 2 ) 6 5 ( - x Chapter 7 20. Factor completely. a. 2 2 3 24 18 xyz z
  • 22. d. 7 39 18 2 - - x x e. 2 2 12 27 y x - 21. Solve the following equations. a. 0 ) 5 2 )( 11
  • 24. 7 36 4 2 2 2 - - - ¸ - - + a a a a a a 23. Subtract. Simplify the answer. 16 12 3 16 8 6 2 2 2 2 2 -
  • 25. - - - - + + y y y y y y 24. Solve the following equations. a. 3 1 8 5 1 3 - = - - x x
  • 26. b. 15 8 3 2 6 5 3 - = + x x Chapter 9 25. Perform the following operations. Simplify all answers. a. 7 8 32 b a b. 3 4 12 15 x
  • 27. x × c. 3 8 16 192 x x 26. Solve the follow equations. a. 5 2 3 = - x b. 1 13
  • 28. - = - x x Chapter 10 27. Solve the following equation. 28 ) 5 ( 2 = - h 28. Solve the following equation. 4 5 6 2 - = - - t t 29. For
  • 29. 8 6 2 + + = x x y , find the following and graph on the axes provided. a. Direction: __________ b. y -intercept: __________ c. x -intercepts: __________