Being in a diverse environment allows one to distinguish the similarities and differences between oneself and others around them. Within the module overview, it stated, The United States was founded on principles of equality and opportunity for all citizens, but in practice, some groups of citizens have encountered different treatment, which has resulted in less-than-equal opportunities (Hobbs, 2015). In grade schools, most children without intellectual disabilities often see themselves as “normal” students. Students have questioned the inclusion of persons with disabilities in public schools, but should they not be given the same chance as others? We all are humans. However, some students do not understand diversity or how to accept some of the physical differences such as varying abilities. Because of that, students with learning disabilities may face many barriers because of discriminatory practices and beliefs (LDA0, 2020). It is important, not only for children but for adults, to understand and accept diversity in any form whether it is physical or social. Furthermore, diversity among people with varying abilities will be examined in depth through the four lenses of general education. We will explore the history of intellectual disabilities, some causes of intellectual disabilities how persons with disabilities differ in values and culture, and most of all how the disabilities affect the persons daily within society.
HISTORY
Many years ago, there was a stigma of persons with intellectual disabilities. People feared them and often mistreated them because they were different. They were called many names that belittled them and degraded them as humans. They were placed in centers secluded from the world. During the 19th century, institutions were developed, and influential people adopted the concept of care and education provisions for persons with intellectual disabilities. The idea of the institutions was not all great, yet it carried on to the 20th century. In 1966, there was a publication of a photograph album that was very dehumanizing, displaying intellectually handicapped and mentally ill persons in isolation. “They showed pictures of adults and children naked or dressed in inappropriate clothes of the cheapest quality; closed in isolated rooms without handles” (Zakrzewska-Manterys,2015). Years later Dr. Wolf Wolfensberger exposed the idea of Normalization. Dr. Wolfensberger’s Normalization principle concentrated on improvement within the lives of the people who were known as mentally retarded. Normalization began in Scandinavian countries but Wolfensberger decided to take on the principle and teach about it amongst the North American people. From the years 1945 until 1975 were called the “Golden Age”. This during the segregation police which fostered the acceptance, social integration, and inclusion of persons with disabilities (Zakrzewska-Manterys, 2015). Throughout time the services for intellectual disabilities have ch.
Sections Included:
1. Introduction to Social Barriers
2. Effects and Results
3. History
4. Remedies
5. Movies Showing Behaviour of Society Towards Disabled People
6. Strategies For Teachers and Schools
7. Chapters Showing Behaviour of Society Towards Disabled People
8. Lesson Plan
9. Awareness Day
10. Initiative by PM during Lockdown
BUSI 330Collaborative Marketing Plan Final Draft Instructions.docxrichardnorman90310
BUSI 330
Collaborative Marketing Plan Final Draft Instructions
Include the following in your Group Discussion Board Forum:
1. A report with the final Marketing Plan that includes the three previous drafts, attached as an MS Word file. In addition, this final MP must include the following sections:
· Marketing Programs & Financial Projections.
You should review pp. 54–55 of the text for examples of the key issues that should be discussed within these sections of the MP. You will need a comprehensive marketing program, which includes a discussion of: the Product Strategy, the Pricing Strategy, the Promotion Strategy and the Distribution (channels) Strategy.
The last section on Financial Projections should show a 5-year projection of expected revenues. In addition, you should present some type of idea when BE (break-even) will take place. Companies that introduce new products generally do not make a profit in “year 1” because of the high development and marketing costs required to test and launch the product. Obtaining costs will be difficult, but you should try to estimate costs.
· Executive Summary (ES)
Finally, once the MP is written, you will need to write the Executive Summary. The ES is written last but is placed right after the Table of Contents. You will want the reader to see the ES first. if they like it, they may read on. If it does not excite the reader, the MP will likely be discounted. The ES should contain only the most important findings, conclusions, and recommendations contained within your plan.
· The Table of Contents
The Table of Contents contains a list of the major sections of your marketing plan with the names of the group members that participated in the actual writing of each section. This will allow the instructor to evaluate each member’s contribution to the overall group project.
· Appendices
The only Appendix required is a reference list. Keep in mind that data and key information may need citations, but will surely require a reference list. A plan with no references will be considered marginal since information sources add considerable credibility to the ideas in your plan.
Your Collaborative Marketing Plan Final Draft must be submitted by 11:59 p.m. (ET) on Friday of Module/Week 8.
Running head: 1
4Group 4-Crystal ArzolaEdwin BrannanLevi ClarkJennifer HardyBrodee Whichard
Liberty UniversityDraft 1-Marketing Plan
1. Executive Summary
Our marketing plan is for the pediatric rack system used by g-tube patients to be distributed and sold through the Fortune 500 company, Owens & Minor.
2. Company Description
Owens and Minor was established by cofounders Otho O. Owens and G. Gilmer Minor in 1882 to provide healthcare services for the local Richmond community. What started as a drugstore, in a now historic landmark, quickly grew to buy out competitor drugstore Bodeker Drug Company in 1954. With this acquisition, the company briefly changed names to Owens, Minor & Bodeker, commonly known in that day as OMB. In pre.
Sections Included:
1. Introduction to Social Barriers
2. Effects and Results
3. History
4. Remedies
5. Movies Showing Behaviour of Society Towards Disabled People
6. Strategies For Teachers and Schools
7. Chapters Showing Behaviour of Society Towards Disabled People
8. Lesson Plan
9. Awareness Day
10. Initiative by PM during Lockdown
BUSI 330Collaborative Marketing Plan Final Draft Instructions.docxrichardnorman90310
BUSI 330
Collaborative Marketing Plan Final Draft Instructions
Include the following in your Group Discussion Board Forum:
1. A report with the final Marketing Plan that includes the three previous drafts, attached as an MS Word file. In addition, this final MP must include the following sections:
· Marketing Programs & Financial Projections.
You should review pp. 54–55 of the text for examples of the key issues that should be discussed within these sections of the MP. You will need a comprehensive marketing program, which includes a discussion of: the Product Strategy, the Pricing Strategy, the Promotion Strategy and the Distribution (channels) Strategy.
The last section on Financial Projections should show a 5-year projection of expected revenues. In addition, you should present some type of idea when BE (break-even) will take place. Companies that introduce new products generally do not make a profit in “year 1” because of the high development and marketing costs required to test and launch the product. Obtaining costs will be difficult, but you should try to estimate costs.
· Executive Summary (ES)
Finally, once the MP is written, you will need to write the Executive Summary. The ES is written last but is placed right after the Table of Contents. You will want the reader to see the ES first. if they like it, they may read on. If it does not excite the reader, the MP will likely be discounted. The ES should contain only the most important findings, conclusions, and recommendations contained within your plan.
· The Table of Contents
The Table of Contents contains a list of the major sections of your marketing plan with the names of the group members that participated in the actual writing of each section. This will allow the instructor to evaluate each member’s contribution to the overall group project.
· Appendices
The only Appendix required is a reference list. Keep in mind that data and key information may need citations, but will surely require a reference list. A plan with no references will be considered marginal since information sources add considerable credibility to the ideas in your plan.
Your Collaborative Marketing Plan Final Draft must be submitted by 11:59 p.m. (ET) on Friday of Module/Week 8.
Running head: 1
4Group 4-Crystal ArzolaEdwin BrannanLevi ClarkJennifer HardyBrodee Whichard
Liberty UniversityDraft 1-Marketing Plan
1. Executive Summary
Our marketing plan is for the pediatric rack system used by g-tube patients to be distributed and sold through the Fortune 500 company, Owens & Minor.
2. Company Description
Owens and Minor was established by cofounders Otho O. Owens and G. Gilmer Minor in 1882 to provide healthcare services for the local Richmond community. What started as a drugstore, in a now historic landmark, quickly grew to buy out competitor drugstore Bodeker Drug Company in 1954. With this acquisition, the company briefly changed names to Owens, Minor & Bodeker, commonly known in that day as OMB. In pre.
BUSI 460 – LT Assignment Brief 1
ACADEMIC YEAR 2020 – SPRING TERM
MBA
(MASTER OF BUSINESS ADMINISTRATION)
BUSI 460 – CONSLTING PRACTICE
INSTRUCTOR: DR. PAURIC P. O’ROURKE
LEARNING TEAM (LT) ASSIGNMENT BRIEF –
LAYERED
TOPIC: LT CONSULTING PROJECT CASE STUDY
35% OF TOTAL COURSE GRADE
(Part 1-5% -W6, Part 2-10% -W7, Part 3 - 15%-W10 &
Part 4 - 5%- W11)
SUBMISSION DATES: VARIES - WEEKS 6, 7, 10 &
11 ONLINE VIA STUDENT PORTAL(MOODLE)
TURNITIN LINK
Self-Selected Learning Team Group (LT Group)
N= Name. Cell = Mobile. e = E Mail Address. f/t/i = Facebook. or Twitter or Instagram Account
Members of Group Written Assignment Learning Team:
1.N:______________ C: __________ e: ___________f/t/i: ___________
2.N:______________ C: __________ e: ___________f/t/i: ___________
3.N:_______________ C: __________ e: ___________f/t/i: ___________
4.N:______________ C: __________ e: ___________f/t/i: ___________
If you change any of your contact details, such as cell number, you are obliged to let your team members know in advance asap.
Important: Sharing such personal contact details is totally optional and up to each individual student but it does make arranging
meetings outside of class time, which you will have to do in this subject must easier. Sharing of such information is on the strict basis
BUSI 460 – LT Assignment Brief 2
and understanding that such information will not be misused or passed on to third parties without the individual’s consent. Any breach
of this will be reported to the University Authorities.
Learning Outcomes:
On successful completion of this assignment the student will be able:
1. To develop abilities to gather, analyse, interpret and evaluate information on a
management consulting task and project related topic(s).
2. To strengthen conceptual and analytical skills in the study management
consulting.
3. To build tangible links between the theory and practice of management
consulting.
4. To heighten awareness and understanding of management consulting in action
and gain greater self-awareness of oneself as a consultant.
5. To develop and present thoughts, arguments, and informed opinions in a logical
and coherent way.
6. To develop creativity and critical management skills.
7. To develop skills in case study navigation and analysis.
8. To demonstrate academic and management research, proposal, report writing
and composition skills with academic and business integrity.
9. To consistently apply the APA system of academic referencing.
10. To demonstrate word processing and IT skills
11. To develop project and time management skills.
12. To develop team working skills in order to function as a high performance team.
13. To develop healthy and functional work habits in progressing confidently and
consistently towards a defined submission deadline date.
Learning Team (LT) Assignment – Overall Task
Usin.
BUS475 week#7Diversity in the work environment promotes accept.docxrichardnorman90310
BUS475 week#7
Diversity in the work environment promotes acceptance, respect, and teamwork despite differences in race, age, gender, language, political beliefs, religion, sexual orientation, communication styles, and other differences. Discuss the following:
If you were starting a business that required you to hire new personnel, would diversity be a priority? How important would it be to you on a list of other considerations? Explain.
.
BUS475week#5In Chapter 11 of your textbook, you explored import.docxrichardnorman90310
BUS475/week#5
In Chapter 11 of your textbook, you explored important areas of risk and opportunity for society and companies such as the role of technology in business and society, cybersecurity, privacy, robotics, genetically engineering and others.
Discuss questions or concerns or enthusiasm you have regarding one of these areas (or other similar area of your choice) that are changing due to technological advance
.
BUS475week#6Share a recent or current event in which a busine.docxrichardnorman90310
BUS475/week#6
Share a recent or current event in which a business or government failed to protect consumers. What were the failures? Who were the victims? What can or could be done to prevent such failures in the future? Do your findings change the way you will support the company in the future?
You are encouraged to share resources that introduce or illuminate the event.
.
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docxrichardnorman90310
BUS/475v10
Project Plan
BUS/475 v10
Page 2 of 2
Wk 4 – Apply: Project Plan
Project Title: Project Objectives:
· List project objective
· List project objective
· List project objective
Operational Step
Responsible Person
Timeline
Example
Project Title: Desert Taco Opportunity
Description: Based on initial feedback from customer surveys, online discussion/social media groups, and SWOT analyses, you’ve determined that there is an opportunity to increase your organization’s customer base through the introduction of desert tacos in your food truck menu.Project Objectives:
· Identify the top 3 potential customer groups for this opportunity and describe their characteristics and preferences
Operational Step
Responsible Person
Timeline
Review the organization’s customer database to determine potential customer groups
Leo (Market Research Manager)
9/30 (1 week)
Identify the top 3 groups to target based upon volume, brand loyalty, and location
Betty (Director of Marketing)
10/7 (2 weeks)
Survey customers regarding food preferences and potential menu items
Tom (Customer Service Representative)
10/21 (4 weeks)
Share customer feedback with inventory and operational teams
Betty/Tom
10/28 (5 weeks)
Determine the top 5 locations and times to complete a pilot study with your test market.
Operational Step
Responsible Person
Timeline
Review sales data to determine peak sales opportunities by location
Jim (Director of Sales)
9/30 (1 week)
Identify the top 5 locations in which to conduct the desert taco pilot
Jim
10/7 (2 weeks)
Create marketing collateral and social media communications to promote the desert taco pilot
Oliver (Media Relations Manager)
10/21 (4 weeks)
Provide expected volume and product information for the inventory team
Jim
10/7 (2 weeks)
Estimate the required inventory and supply chain needs necessary to support the desert taco pilot
Operational Step
Responsible Person
Timeline
Based on expected customer volume, locations, and times, determine the product inventory required to support the pilot.
Louise (Controller)
10/14 (3 weeks)
Source supply companies and obtain product pricing quotes and delivery timelines.
Louise
10/21 (4 weeks)
Determine shipment and storage needs to support the pilot.
Louise and Ben (Operations Manager)
10/21 (4 weeks)
Purchase product for the pilot and arrange transportation to support the desert taco pilot at the various locations.
Louise
10/28 (5 weeks)
Copyright 2019 by University of Phoenix. All rights reserved.
Copyright 2019 by University of Phoenix. All rights reserved.
Running head: TESLA EXPANSION 2
TESLA EXPANSION 2
Tesla Global Expansion
Shawn Cyr
BUS 475
31 March 2020
Mr. Simpson
The opportunity which Tesla needs to exploit is to go into expand its market into the developing countries. The reason for choosing this opportunity is that Tesla today operates in a small market. The company has the majority of its revenues from the United States with a small percentage from China. .
BUS472L – Unit 2 & 4 AssignmentStudent Name ___________________.docxrichardnorman90310
BUS472L – Unit 2 & 4 Assignment
Student Name: ______________________
Instructions:
Unit 2: Replace fields within [brackets] with applicable data for your project. First, list out deliverables and work packages; which align to your project scope. Feel free to add additional lines as applicable based on your project size. Ensure to update the WBS # and indent lines as applicable. Add in estimated start and completion dates, owners (person responsible for ensuring the activity is completed), and then shade the applicable columns to represent the length of each activity to create a Gantt chart. Ignore the predecessor column for Unit 2. Then fill in the Resource Chart, the resources should align to the activity owners that you assigned in your WBS.
Unit 4: Update your WBS below to include predecessors (this will be the WBS # of the activity that must be completed prior to starting that activity). Note be sure to check then your expected start and completion dates reflect properly based on your predecessors. Next, set at least two tasks to run in parallel. Finally, complete the below critical path and resource constraint/leveling instructions below.
Project WBS (Unit 2 & 4)
WBS #
Activity Name
Expected
Start
Expected Completion
Activity Owner
Predecessor
1st Quarter
2nd Quarter
3rd Quarter
4th Quarter
UNIT 4
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
1
[Project Name]
1.1
Initiate
1.1.1
[Deliverable 1]
[2/1/2020]
[3/15/2020]
[Bob Smith]
1.1.2
[Deliverable 2]
[3/15/2020]
[4/30/2020]
1.2
Planning
1.2.1
[Deliverable 3]
1.3
Execution
1.3.1
[Deliverable 4]
1.3.1.1
[Work Package 1]
1.3.1.2
[Work Package 2]
1.3.2
[Deliverable 5]
1.3.3
[Deliverable 6]
1.4
Close
1.4.1
[Deliverable 7]
Resource Chart: (Unit 2)
Name
Role
% of time dedicated to the project
[Bob Smith]
Project Manager
95%
Critical Path: (Unit 4)
The project critical path is important; because if an activity on the critical path delays; the project delays. In looking at your project, what activities are on your critical path (note all might be if you have your activities in serial sequence)? How could you work to limit the number of activities on the critical path? How could you proactively put measures in place so if an activity slips by a couple days the entire success of the project is not jeopardized? Respond with at least 5-6 sentences.
Response:
Resource Constraints: (Unit 4)
Your project may or may not have resource constraints. A resource constraint would be present if you have an individual working on one or multiple activities and do not have enough capacity in order to finish that activity on time. In reflection of your pr.
BUS308 Week 4 Lecture 1
Examining Relationships
Expected Outcomes
After reading this lecture, the student should be familiar with:
1. Issues around correlation
2. The basics of Correlation analysis
3. The basics of Linear Regression
4. The basics of the Multiple Regression
Overview
Often in our detective shows when the clues are not providing a clear answer – such as
we are seeing with the apparent continuing contradiction between the compa-ratio and salary
related results – we hear the line “maybe we need to look at this from a different viewpoint.”
That is what we will be doing this week.
Our investigation changes focus a bit this week. We started the class by finding ways to
describe and summarize data sets – finding measures of the center and dispersion of the data with
means, medians, standard deviations, ranges, etc. As interesting as these clues were, they did not
tell us all we needed to know to solve our question about equal work for equal pay. In fact, the
evidence was somewhat contradictory depending upon what measure we focused on. In Weeks 2
and 3, we changed our focus to asking questions about differences and how important different
sample outcomes were. We found that all differences were not important, and that for many
relatively small result differences we could safely ignore them for decision making purposes –
they were due to simple sampling (or chance) errors. We found that this idea of sampling error
could extend into work and individual performance outcomes observed over time; and that over-
reacting to such differences did not make much sense.
Now, in our continuing efforts to detect and uncover what the data is hiding from us, we
change focus again as we start to find out why something happened, what caused the data to act
as it did; rather than merely what happened (describing the data as we have been doing). This
week we move from examining differences to looking at relationships; that is, if some measure
changes does another measure change as well? And, if so, can we use this information to make
predictions and/or understand what underlies this common movement?
Our tools in doing this involve correlation, the measurement of how closely two
variables move together; and regression, an equation showing the impact of inputs on a final
output. A regression is similar to a recipe for a cake or other food dish; take a bit of this and
some of that, put them together, and we get our result.
Correlation
We have seen correlations a lot, and probably have even used them (formally or
informally). We know, for example, that all other things being equal; the more we eat. the more
we weigh. Kids, up to the early teens, grow taller the older they get. If we consistently speed,
we will get more speeding tickets than those who obey the speed limit. The more efforts we put
into studying, the better grades we get. All of these are examples of correlations.
Correlatio.
BUS301 Memo Rubric Spring 2020 - Student.docxBUS301 Writing Ru.docxrichardnorman90310
BUS301 Memo Rubric Spring 2020 - Student.docx
BUS301 Writing Rubric
Performance Dimensions
N/A
Not Met
Met
Comments
Organization (OABC)
Opening gets attention, provides context, and introduces topic
0
1
Agenda previews content of the document
0
1
Body
0
2
Sound paragraphing decisions (length and development)
Paragraphs limited to one topic per paragraph
Complete discussion of one topic before moving to next topic
Transitions and flow between paragraphs smooth
The overall flow/logic/structure of document is apparent
Closing summarizes and concludes, recommends, if appropriate
0
1
Content
The content of the document is relevant; information meaningful
0
2
The document is developed with adequate support and examples
0
2
The content is accurate and appropriate, with insightful analysis
0
2
Proofreading
The grammar and spelling are correct (proofread)
0
3
Punctuation—comma usage, capitalization, etc.—used correctly
0
3
The sentence structure and length are appropriate
0
1
Format
Appropriate formatting is used for type of document written
0
1
Good use of font, margins, spacing, headings, and visuals
0
1
[11/2016]
Example - Good - Corrected student example Spring 2020.docx
TO: Professor __________
FROM: Suzy Student
DATE: February 1, 2020
SUBJECT: Out of Class Experience – Cybersecurity Conference
Cybersecurity is a topic everyone should be concerned about, so I attended the 3rd Annual Cybersecurity Event held in the Grawn Atrium. I gained insight and knowledge from listening to the speakers that came from different kinds of industries. In this memo, I will discuss what I learned from the speaker and two takeaways: 1) cybersecurity is everywhere, 2) personal identifiable information, and 3) cybersecurity for the business student.
Cybersecurity is Everywhere
The conference was an opportunity to learn about cybersecurity. The first speaker talked about how companies are attacked in many different ways every day. The “bad guys” are trying to steal company information as well as employee information. Both kinds of information are valuable on the black market. The second speaker talked about the internet of things (IoT). These are things that are attached to the internet. The speaker talked about autonomous cars and medical equipment (heart) that talks to the internet. She talked about how cyber can and should influence designs. “Things” must be created with cybersecurity included in every step of the design. The last speaker talked about how my information has value. The “bad guys” steal my information and people want to buy it. Making money is one reason hackers steal millions of records.
Personal Identifiable Information
Personal Identifiable Information (PII) is any information relating to an identifiable person. There are laws in place to help make sure this information is secure. This topic is a takeaway for me because I had no idea my data had any value t.
BUS 206 Milestone Two Template To simplify completi.docxrichardnorman90310
BUS 206 Milestone Two Template
To simplify completing this milestone, use this template to help you write your essay. You may use each
heading as a starter sentence and then discuss the legal issues presented in the case study using the
following guide, if you choose. Be sure to explain and elaborate on how each term applies to the story.
Be sure to incorporate the facts of the case into your explanation and analysis.
Remember that the document you submit should follow the formatting guidelines described in the
Milestone Two Guidelines and Rubric document.
A. Various elements must be present to prove that a valid contract exists between Sam and the
chain store.
The four elements to a contract are . (Chapter 13)
The first element of would be deemed to exist if [describe facts that
are or should be present].
The second element of would be deemed to exist if [describe facts
that are or should be present].
The third element of would be deemed to exist if [describe facts that
are or should be present].
The fourth element of would be deemed to exist if [describe facts
that are or should be present].
If the elements of a contract did exist between these parties, there could still be some
possible reasons why a contract might not be valid based on facts not present in the
scenario. For example, if Sam was a minor at the time he made the agreement with
the chain store, the contract would not be valid because . List
some other reasons and elaborate on why a contract might be invalid.
Discuss and explain any other information you deem relevant to this answer.
(Chapters 13, 14, 15, and 16)
B. Even if there is not a valid legal contract between Sam and the chain store, there may still be
a quasi-contract (Chapter 13) or elements of what is called a promissory estoppel. (Chapter
15)
A quasi-contract is defined as . In this case, a quasi-contract may exist
if the following facts are true: . (Chapter 13)
A promissory estoppel is defined as . This principle might apply to this
case if . (Chapters 13 and 16)
Discuss and explain any other information you deem relevant to this answer.
C. The rights and obligations of both the landlord and tenant depend upon the term of their
contract. Such a contract may be verbal or in writing under a standard residential lease
agreement. (Chapters 13 and 50)
Some facts that may support that Sam is in breach of that contract are
.
Some facts that may support that Sam is not in breach of that contract are
. (Chapters 16, 17, and 50)
Discuss and explain any other information you deem relevant to this answer.
D. Based upon those rights and obligations, Sam’s landlord has/does not have grounds to evict
because .
Elaborate and explain.
E. Some defenses Sam might raise if his landlord tries to evict him include
because .
Elaborate .
Bunker Hill Community College MAT 093 Foundations of Mathema.docxrichardnorman90310
Bunker Hill Community College | MAT 093 Foundations of Mathematics
1
Name: _________________________ Section: MAT093- z
MAT093 MIDTERM EXAM (FORM A)
1. Ryan makes $1800 a month after taxes. Her rent is $725, utilities are $140, and her phone
is $78. She spends $250 on food, $95 on car insurance, and $180 on gas.
a) How much money does Ryan have left each month after paying all her expenses?
b) If Ryan decides to save $150 per month to build an emergency fund, how long will it
take her to save two months’ salary (the recommended value for an emergency
fund)?
2. Little Acorns Daycare Center is constructing an enclosed play yard. They must choose from
three different designs: a rectangle measuring 28 feet by 22 feet, a square measuring 25
feet on each side, or a rectangle measuring 35 feet by 18 feet.
a) What is the area of each of the proposed yards?
Yard #1:
Yard #2:
Yard #3:
b) Which proposed yard would require the least fence to make the enclosure?
A four-function calculator is permitted. Cellphones may not be used as calculators. Each question
will be graded in accordance with the rubric attached at the end of this test. Show all work on the
test or on the work paper provided. The minimum passing grade is 65%. You have one chance to
retake the exam.
Bunker Hill Community College | MAT 093 Foundations of Mathematics
2
3. You feed your gerbil
1
8
cup of seeds each day. If the seeds come in packages of
1
2
2
cups, for
how many days does a package of seeds last?
4. Joan waters her plants each day with
3
22
4
gallons of water. With a new irrigation system
in place, she uses
2
17
3
gallons of water each day. How many gallons of water does she save
in a 30-day period with the irrigation system?
5. A grocery store donated 60 dozen hot dog rolls to the local Youth Baseball League for their
Opening Day ceremonies. A total of 679 hotdogs were served.
a) How many dozen rolls were used? (Express your answer in mixed number form)
b) How many dozen rolls were left?
6. The beneficiary of a life insurance policy is the person who receives the payment of the
amount of insurance after the death of the insured. Todd is establishing his beneficiaries
for his life insurance policy. The policy is for $150,000. His daughter will get
1
2
of his
policy, his stepson will get
3
8
of his policy, and the rest will go to his grandson. What dollar
amount will his grandson receive?
Bunker Hill Community College | MAT 093 Foundations of Mathematics
3
7. Rosalie buys her lunch three times a week at the deli near her office. She usually spends
$7.50 for a sandwich, chips, and a drink. In order to save money, she decides to pack her
lunch at home and bring it with her. She estimates that a sandwich will cost her $2.00, a
bag of.
Bullying and cyberbullying of adolescents have become increasingly p.docxrichardnorman90310
Bullying and cyberbullying of adolescents have become increasingly popular media topics. Why do you think schools are often ineffective in reducing rates of bullying and cyberbullying? Imagine you are an administrator at a middle or high school. What specific activities would you engage in to deter students from bullying their peers?
.
Building an Information Technology Security Awareness an.docxrichardnorman90310
Building an Information
Technology Security Awareness
and Training Program
Mark Wilson and Joan Hash
NIST Special Publication 800-50
C O M P U T E R S E C U R I T Y
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8933
October 2003
U.S. Department of Commerce
Donald L. Evans, Secretary
Technology Administration
Phillip J. Bond, Under Secretary for Technology
National Institute of Standards and Technology
Arden L. Bement, Jr., Director
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analyses to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative
activities with industry, government, and academic organizations.
U.S. GOVERNMENT PRINTING OFFICE
WASHINGTON: 2003
For sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov — Phone: (202) 512-1800 — Fax: (202) 512-2250
Mail: Stop SSOP, Washington, DC 20402-0001
NIST Special Publication 800-50
Authority
This document has been developed by the National Institute of Standards and Technology (NIST) in
furtherance of its statutory responsibilities under the Federal Information Security Management Act
(FISMA) of 2002, Public Law 107-347.
NIST is responsible for developing standards and guidelines, including minimum requirements, for
providing adequate information security for all agency operations and assets, but such standards and
guidelines shall not apply to national security systems. This guideline is consistent with the requirements
of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency
Information Systems, as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental
information is provided A-130, Appendix III.
This guideline has been prepared for use by federal agencies. It may be used by nongovernmental
organizations on a voluntary basis and is not subject to copyright. (Attribution would be appreciated by
NIST.)
Nothing in this document should be taken to contradict standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce under statutory author.
Building a company with the help of IT is really necessary as most.docxrichardnorman90310
Building a company with the help of IT is really necessary as most of the daily things are running via technology these days and while using technology you must have some minimum criteria for all of those who are using it. Usually, the company must make some policies for internal use and external use, so that where someone crosses the line, they are able to catch hold of them and take a severe action as per the business policies. Now this is really important because due to an error from one person there are other people who would get affected, and there are multiple stages to those areas, that checks the severity of all of those mistakes.
Here some of them that is general while making policies, such as visiting pornographic web sites using company computer is not allowed, disrupting another’s data or computer system and sharing corporate database information. When employees make any of these mistakes, then companies have authorities to terminate employees from the business. Usually every employee is supposed work as per the basic rules or you can say acceptable usage policy. While using company materials and internet, because most of the office work is done over the internet, like using cloud or any other online applications. This allows you to have full access to outside world, but you must know what are the DO’s and Don’t’s. This will help you stick to the company for long time and also grow with the company as much as possible (Information Resources Management Association. International Conference).
These are made by looking at the history, because most of the employees have made some worst things in the history for personal benefits and ended sharing company details with outsiders, and hampered own company value. Using such valuable data, someone from outside can take over the company or misuse the data or they can do anything that can hurt the business directly. When the business owners are going under loss, the company can take actions against such activity or people who are committing those mistakes.
References
Information Resources Management Association. International Conference. Challenges of Information Technology Management in the 21st Century:
Primary Source Document
with Questions (DBQs)
E X C E R P T S F R O M I N S T R U C T I O N S T O M Y D A U G H T E R
By Song Siyŏl
Introduction
Song Siyŏl (1607‐1689) was a prominent scholar and official. This piece was written for his oldest daughter on the
occasion of her marriage and subsequently became an important tutelary text that circulated among elite families.
By the time this text was written, the patterns of patrilocal residence and patrilineal descent advocated by Neo‐
Confucian reformers early in the Chosŏn dynasty had become well established.
Document Excerpt with Questions (Longer selection follows this section)
From Sources of Korean Tradition, edited by Yŏng‐ho Ch’oe, Peter H. Lee, .
Building a Comprehensive Health HistoryBuild a health histor.docxrichardnorman90310
Building a Comprehensive Health History
Build a health history for a 55-year-old Asian female living in a high-density public housing complex –
Introduction of the paper, then explain
1. How would your communication and interview techniques for building a health history differ with each patient?
2. How might you target your questions for building a health history based on the patient’s social determinants of health?
3. What risk assessment instruments would be appropriate to use with the patient, or what questions would you ask the patient to assess his or her health risks?
4. Identify any potential health-related risks based upon the patient’s age, gender, ethnicity, or environmental setting that should be taken into consideration.
5. Select one of the risk assessment instruments presented in Chapter 1 or Chapter 5 of the Seidel's Guide to Physical Examination text, or another tool with which you are familiar, related to your selected patient.
6. Develop at least eight targeted questions you would ask the selected patient to assess his or her health risks and begin building a health history.
Resources
Ball, J. W., Dains, J. E., Flynn, J. A., Solomon, B. S., & Stewart, R. W. (2019). Seidel's guide to physical examination: An interprofessional approach (9th ed.). St. Louis, MO: Elsevier Mosby.
· Chapter 1, “The History and Interviewing Process”
· Chapter 5, “Recording Information” provides methods for maintaining clear and accurate records, also explore the legal aspects of patient records.
Sullivan, D. D. (2019). Guide to clinical documentation (3rd ed.). Philadelphia, PA: F. A. Davis.
· Chapter 2, "The Comprehensive History and Physical Exam" (pp. 19–29)
R Ryanne, W., & Lori A, O. (2015). Implementation of health risk assessments with family health history: barriers and benefits. Postgraduate Medical Journal, 1079, 508.
Lushniak, B. D. (2015). Surgeon general’s perspectives: family health history: using the past to improve future health. Public Health Reports, 1, 3.
Jardim, T. V., Sousa, A. L. L., Povoa, T. I. R., Barroso, W. K. S., Chinem, B., Jardim, L., Bernardes, R., Coca, A., & Jardim, P. C. B. V. (2015). The natural history of cardiovascular risk factors in health professionals: 20-year follow-up. BMC Public Health, 15, 1111.
ITS 832
Chapter 5
From Building a Model to Adaptive Robust
Decision Making Using Systems Modeling
InformationTechnology in a Global Economy
Professor Miguel Buleje
Introduction
• Modeling & Simulation
• Fields that develops and applies computational methods to
address complex system
• Addresses problems related to complex issues
• Focus on decision making abilities
• Opportunities to leverage interdisciplinary approach, and learn
across fields to understand complex systems.
• Legacy System Dynamics (SD) modeling and others
methods are presented
• Recent innovations
• What the future holds
• Examples
Systems Modeling
• Dynamic complexity
• Behavior evolves over time
• Mode.
Build-a-modelStarting with this partial model, which contains fina.docxrichardnorman90310
Build-a-modelStarting with this partial model, which contains financial statements and other information, complete sections a thru g. All sections in yellow must be completed using formulas. All data must be computed using formulas referencing data from the financial statements and other data. Manual entry of data for solutions will result in zero points for the particular calculation.Income Statement for the Year Ending December 31 (Millions of Dollars)2019Net Sales$ 800.0Costs (except depreciation)$ 576.0Depreciation$ 60.0 Total operating costs$ 636.0Earning before int. & tax$ 164.0 Less interest$ 32.0Earning before taxes$ 132.0 Taxes (25%)$ 33.0Net income before pref. div.$ 99.0 Preferred div.$ 9.00Net income avail. for com. div.$ 90.0Common dividends$ 30.0Addition to retained earnings$ 60.0Number of shares (in millions)10Dividends per share$ 3.00Tax Rate25%Balance Sheets for December 31 (Millions of Dollars)Assets2019Liabilities and Equity2019Cash$ 28.0Accounts Payable$ 16.0Short-term investments40.0Notes payable30.0Accounts receivable80.0Accruals24.0Inventories180.0 Total current liabilities$ 70.0 Total current assets$ 328.0Long-term bonds$ 300.0Net plant and equipment600.0Preferred stock$ 90.0Total Assets$ 928.0Common Stock
(Par plus PIC)$ 257.0Retained earnings211.0 Common equity$ 468.0Total liabilities and equity$ 928.0Key Assumptions: Operating ratios remain unchanged from values in most recent year. Sales are expected to increase, 15%, 10%, 6%, and 6% during the next four years. The tax rate will remain at 25% and WACC is assumed to be 15% for all years. This data should be in a separate input table and referenced for the calculations when needed. This means you create an input table for the key assumptions data.a. Calculate the actual operating and projected ratios. Also fill in the tax rate and WACC for each year. (6.75pts)InputsActualProjectedProjectedProjectedProjected12/31/1912/31/2012/31/2112/31/2212/31/23Sales Growth RateCosts/SalesDepreciation/(Net PPE)Cash/Sales(Acct. Rec.)/SalesInventories/Sales(Net PPE)/Sales(Acct. Pay.)/SalesAccruals/SalesTax rateWeighted average cost of capital (WACC)b. Forecast the parts of the income statement and balance sheets necessary to calculate free cash flow. (13.75pts)Partial Income Statement for the Year Ending December 31 (Millions of Dollars)ActualProjectedProjectedProjectedProjectedIncome Statement Items12/31/1912/31/2012/31/2112/31/2212/31/23Net SalesCosts (except depreciation)Depreciation Total operating costsEarning before int. & taxPartial Balance Sheets for December 31 (Millions of Dollars)ActualProjectedProjectedProjectedProjectedOperating Assets12/31/1912/31/2012/31/2112/31/2212/31/23CashAccounts receivableInventoriesNet plant and equipmentOperating LiabilitiesAccounts PayableAccrualsc. Calculate free cash flow for each projected year. Also calculate the growth rates of free cash flow each year to ensure that th.
build a currency converter from USD to any other foreign currency. S.docxrichardnorman90310
build a currency converter from USD to any other foreign currency. Show me a mobile app that enters a USD amount and the country exchange amount. Give at least multiple Web sites to get the exchange rate of foreign countries. Do this in both Android and iOS platforms.
use java
just simple code
package the work and hand in
.
BUSI 460 – LT Assignment Brief 1
ACADEMIC YEAR 2020 – SPRING TERM
MBA
(MASTER OF BUSINESS ADMINISTRATION)
BUSI 460 – CONSLTING PRACTICE
INSTRUCTOR: DR. PAURIC P. O’ROURKE
LEARNING TEAM (LT) ASSIGNMENT BRIEF –
LAYERED
TOPIC: LT CONSULTING PROJECT CASE STUDY
35% OF TOTAL COURSE GRADE
(Part 1-5% -W6, Part 2-10% -W7, Part 3 - 15%-W10 &
Part 4 - 5%- W11)
SUBMISSION DATES: VARIES - WEEKS 6, 7, 10 &
11 ONLINE VIA STUDENT PORTAL(MOODLE)
TURNITIN LINK
Self-Selected Learning Team Group (LT Group)
N= Name. Cell = Mobile. e = E Mail Address. f/t/i = Facebook. or Twitter or Instagram Account
Members of Group Written Assignment Learning Team:
1.N:______________ C: __________ e: ___________f/t/i: ___________
2.N:______________ C: __________ e: ___________f/t/i: ___________
3.N:_______________ C: __________ e: ___________f/t/i: ___________
4.N:______________ C: __________ e: ___________f/t/i: ___________
If you change any of your contact details, such as cell number, you are obliged to let your team members know in advance asap.
Important: Sharing such personal contact details is totally optional and up to each individual student but it does make arranging
meetings outside of class time, which you will have to do in this subject must easier. Sharing of such information is on the strict basis
BUSI 460 – LT Assignment Brief 2
and understanding that such information will not be misused or passed on to third parties without the individual’s consent. Any breach
of this will be reported to the University Authorities.
Learning Outcomes:
On successful completion of this assignment the student will be able:
1. To develop abilities to gather, analyse, interpret and evaluate information on a
management consulting task and project related topic(s).
2. To strengthen conceptual and analytical skills in the study management
consulting.
3. To build tangible links between the theory and practice of management
consulting.
4. To heighten awareness and understanding of management consulting in action
and gain greater self-awareness of oneself as a consultant.
5. To develop and present thoughts, arguments, and informed opinions in a logical
and coherent way.
6. To develop creativity and critical management skills.
7. To develop skills in case study navigation and analysis.
8. To demonstrate academic and management research, proposal, report writing
and composition skills with academic and business integrity.
9. To consistently apply the APA system of academic referencing.
10. To demonstrate word processing and IT skills
11. To develop project and time management skills.
12. To develop team working skills in order to function as a high performance team.
13. To develop healthy and functional work habits in progressing confidently and
consistently towards a defined submission deadline date.
Learning Team (LT) Assignment – Overall Task
Usin.
BUS475 week#7Diversity in the work environment promotes accept.docxrichardnorman90310
BUS475 week#7
Diversity in the work environment promotes acceptance, respect, and teamwork despite differences in race, age, gender, language, political beliefs, religion, sexual orientation, communication styles, and other differences. Discuss the following:
If you were starting a business that required you to hire new personnel, would diversity be a priority? How important would it be to you on a list of other considerations? Explain.
.
BUS475week#5In Chapter 11 of your textbook, you explored import.docxrichardnorman90310
BUS475/week#5
In Chapter 11 of your textbook, you explored important areas of risk and opportunity for society and companies such as the role of technology in business and society, cybersecurity, privacy, robotics, genetically engineering and others.
Discuss questions or concerns or enthusiasm you have regarding one of these areas (or other similar area of your choice) that are changing due to technological advance
.
BUS475week#6Share a recent or current event in which a busine.docxrichardnorman90310
BUS475/week#6
Share a recent or current event in which a business or government failed to protect consumers. What were the failures? Who were the victims? What can or could be done to prevent such failures in the future? Do your findings change the way you will support the company in the future?
You are encouraged to share resources that introduce or illuminate the event.
.
BUS475v10Project PlanBUS475 v10Page 2 of 2Wk 4 – App.docxrichardnorman90310
BUS/475v10
Project Plan
BUS/475 v10
Page 2 of 2
Wk 4 – Apply: Project Plan
Project Title: Project Objectives:
· List project objective
· List project objective
· List project objective
Operational Step
Responsible Person
Timeline
Example
Project Title: Desert Taco Opportunity
Description: Based on initial feedback from customer surveys, online discussion/social media groups, and SWOT analyses, you’ve determined that there is an opportunity to increase your organization’s customer base through the introduction of desert tacos in your food truck menu.Project Objectives:
· Identify the top 3 potential customer groups for this opportunity and describe their characteristics and preferences
Operational Step
Responsible Person
Timeline
Review the organization’s customer database to determine potential customer groups
Leo (Market Research Manager)
9/30 (1 week)
Identify the top 3 groups to target based upon volume, brand loyalty, and location
Betty (Director of Marketing)
10/7 (2 weeks)
Survey customers regarding food preferences and potential menu items
Tom (Customer Service Representative)
10/21 (4 weeks)
Share customer feedback with inventory and operational teams
Betty/Tom
10/28 (5 weeks)
Determine the top 5 locations and times to complete a pilot study with your test market.
Operational Step
Responsible Person
Timeline
Review sales data to determine peak sales opportunities by location
Jim (Director of Sales)
9/30 (1 week)
Identify the top 5 locations in which to conduct the desert taco pilot
Jim
10/7 (2 weeks)
Create marketing collateral and social media communications to promote the desert taco pilot
Oliver (Media Relations Manager)
10/21 (4 weeks)
Provide expected volume and product information for the inventory team
Jim
10/7 (2 weeks)
Estimate the required inventory and supply chain needs necessary to support the desert taco pilot
Operational Step
Responsible Person
Timeline
Based on expected customer volume, locations, and times, determine the product inventory required to support the pilot.
Louise (Controller)
10/14 (3 weeks)
Source supply companies and obtain product pricing quotes and delivery timelines.
Louise
10/21 (4 weeks)
Determine shipment and storage needs to support the pilot.
Louise and Ben (Operations Manager)
10/21 (4 weeks)
Purchase product for the pilot and arrange transportation to support the desert taco pilot at the various locations.
Louise
10/28 (5 weeks)
Copyright 2019 by University of Phoenix. All rights reserved.
Copyright 2019 by University of Phoenix. All rights reserved.
Running head: TESLA EXPANSION 2
TESLA EXPANSION 2
Tesla Global Expansion
Shawn Cyr
BUS 475
31 March 2020
Mr. Simpson
The opportunity which Tesla needs to exploit is to go into expand its market into the developing countries. The reason for choosing this opportunity is that Tesla today operates in a small market. The company has the majority of its revenues from the United States with a small percentage from China. .
BUS472L – Unit 2 & 4 AssignmentStudent Name ___________________.docxrichardnorman90310
BUS472L – Unit 2 & 4 Assignment
Student Name: ______________________
Instructions:
Unit 2: Replace fields within [brackets] with applicable data for your project. First, list out deliverables and work packages; which align to your project scope. Feel free to add additional lines as applicable based on your project size. Ensure to update the WBS # and indent lines as applicable. Add in estimated start and completion dates, owners (person responsible for ensuring the activity is completed), and then shade the applicable columns to represent the length of each activity to create a Gantt chart. Ignore the predecessor column for Unit 2. Then fill in the Resource Chart, the resources should align to the activity owners that you assigned in your WBS.
Unit 4: Update your WBS below to include predecessors (this will be the WBS # of the activity that must be completed prior to starting that activity). Note be sure to check then your expected start and completion dates reflect properly based on your predecessors. Next, set at least two tasks to run in parallel. Finally, complete the below critical path and resource constraint/leveling instructions below.
Project WBS (Unit 2 & 4)
WBS #
Activity Name
Expected
Start
Expected Completion
Activity Owner
Predecessor
1st Quarter
2nd Quarter
3rd Quarter
4th Quarter
UNIT 4
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
1
[Project Name]
1.1
Initiate
1.1.1
[Deliverable 1]
[2/1/2020]
[3/15/2020]
[Bob Smith]
1.1.2
[Deliverable 2]
[3/15/2020]
[4/30/2020]
1.2
Planning
1.2.1
[Deliverable 3]
1.3
Execution
1.3.1
[Deliverable 4]
1.3.1.1
[Work Package 1]
1.3.1.2
[Work Package 2]
1.3.2
[Deliverable 5]
1.3.3
[Deliverable 6]
1.4
Close
1.4.1
[Deliverable 7]
Resource Chart: (Unit 2)
Name
Role
% of time dedicated to the project
[Bob Smith]
Project Manager
95%
Critical Path: (Unit 4)
The project critical path is important; because if an activity on the critical path delays; the project delays. In looking at your project, what activities are on your critical path (note all might be if you have your activities in serial sequence)? How could you work to limit the number of activities on the critical path? How could you proactively put measures in place so if an activity slips by a couple days the entire success of the project is not jeopardized? Respond with at least 5-6 sentences.
Response:
Resource Constraints: (Unit 4)
Your project may or may not have resource constraints. A resource constraint would be present if you have an individual working on one or multiple activities and do not have enough capacity in order to finish that activity on time. In reflection of your pr.
BUS308 Week 4 Lecture 1
Examining Relationships
Expected Outcomes
After reading this lecture, the student should be familiar with:
1. Issues around correlation
2. The basics of Correlation analysis
3. The basics of Linear Regression
4. The basics of the Multiple Regression
Overview
Often in our detective shows when the clues are not providing a clear answer – such as
we are seeing with the apparent continuing contradiction between the compa-ratio and salary
related results – we hear the line “maybe we need to look at this from a different viewpoint.”
That is what we will be doing this week.
Our investigation changes focus a bit this week. We started the class by finding ways to
describe and summarize data sets – finding measures of the center and dispersion of the data with
means, medians, standard deviations, ranges, etc. As interesting as these clues were, they did not
tell us all we needed to know to solve our question about equal work for equal pay. In fact, the
evidence was somewhat contradictory depending upon what measure we focused on. In Weeks 2
and 3, we changed our focus to asking questions about differences and how important different
sample outcomes were. We found that all differences were not important, and that for many
relatively small result differences we could safely ignore them for decision making purposes –
they were due to simple sampling (or chance) errors. We found that this idea of sampling error
could extend into work and individual performance outcomes observed over time; and that over-
reacting to such differences did not make much sense.
Now, in our continuing efforts to detect and uncover what the data is hiding from us, we
change focus again as we start to find out why something happened, what caused the data to act
as it did; rather than merely what happened (describing the data as we have been doing). This
week we move from examining differences to looking at relationships; that is, if some measure
changes does another measure change as well? And, if so, can we use this information to make
predictions and/or understand what underlies this common movement?
Our tools in doing this involve correlation, the measurement of how closely two
variables move together; and regression, an equation showing the impact of inputs on a final
output. A regression is similar to a recipe for a cake or other food dish; take a bit of this and
some of that, put them together, and we get our result.
Correlation
We have seen correlations a lot, and probably have even used them (formally or
informally). We know, for example, that all other things being equal; the more we eat. the more
we weigh. Kids, up to the early teens, grow taller the older they get. If we consistently speed,
we will get more speeding tickets than those who obey the speed limit. The more efforts we put
into studying, the better grades we get. All of these are examples of correlations.
Correlatio.
BUS301 Memo Rubric Spring 2020 - Student.docxBUS301 Writing Ru.docxrichardnorman90310
BUS301 Memo Rubric Spring 2020 - Student.docx
BUS301 Writing Rubric
Performance Dimensions
N/A
Not Met
Met
Comments
Organization (OABC)
Opening gets attention, provides context, and introduces topic
0
1
Agenda previews content of the document
0
1
Body
0
2
Sound paragraphing decisions (length and development)
Paragraphs limited to one topic per paragraph
Complete discussion of one topic before moving to next topic
Transitions and flow between paragraphs smooth
The overall flow/logic/structure of document is apparent
Closing summarizes and concludes, recommends, if appropriate
0
1
Content
The content of the document is relevant; information meaningful
0
2
The document is developed with adequate support and examples
0
2
The content is accurate and appropriate, with insightful analysis
0
2
Proofreading
The grammar and spelling are correct (proofread)
0
3
Punctuation—comma usage, capitalization, etc.—used correctly
0
3
The sentence structure and length are appropriate
0
1
Format
Appropriate formatting is used for type of document written
0
1
Good use of font, margins, spacing, headings, and visuals
0
1
[11/2016]
Example - Good - Corrected student example Spring 2020.docx
TO: Professor __________
FROM: Suzy Student
DATE: February 1, 2020
SUBJECT: Out of Class Experience – Cybersecurity Conference
Cybersecurity is a topic everyone should be concerned about, so I attended the 3rd Annual Cybersecurity Event held in the Grawn Atrium. I gained insight and knowledge from listening to the speakers that came from different kinds of industries. In this memo, I will discuss what I learned from the speaker and two takeaways: 1) cybersecurity is everywhere, 2) personal identifiable information, and 3) cybersecurity for the business student.
Cybersecurity is Everywhere
The conference was an opportunity to learn about cybersecurity. The first speaker talked about how companies are attacked in many different ways every day. The “bad guys” are trying to steal company information as well as employee information. Both kinds of information are valuable on the black market. The second speaker talked about the internet of things (IoT). These are things that are attached to the internet. The speaker talked about autonomous cars and medical equipment (heart) that talks to the internet. She talked about how cyber can and should influence designs. “Things” must be created with cybersecurity included in every step of the design. The last speaker talked about how my information has value. The “bad guys” steal my information and people want to buy it. Making money is one reason hackers steal millions of records.
Personal Identifiable Information
Personal Identifiable Information (PII) is any information relating to an identifiable person. There are laws in place to help make sure this information is secure. This topic is a takeaway for me because I had no idea my data had any value t.
BUS 206 Milestone Two Template To simplify completi.docxrichardnorman90310
BUS 206 Milestone Two Template
To simplify completing this milestone, use this template to help you write your essay. You may use each
heading as a starter sentence and then discuss the legal issues presented in the case study using the
following guide, if you choose. Be sure to explain and elaborate on how each term applies to the story.
Be sure to incorporate the facts of the case into your explanation and analysis.
Remember that the document you submit should follow the formatting guidelines described in the
Milestone Two Guidelines and Rubric document.
A. Various elements must be present to prove that a valid contract exists between Sam and the
chain store.
The four elements to a contract are . (Chapter 13)
The first element of would be deemed to exist if [describe facts that
are or should be present].
The second element of would be deemed to exist if [describe facts
that are or should be present].
The third element of would be deemed to exist if [describe facts that
are or should be present].
The fourth element of would be deemed to exist if [describe facts
that are or should be present].
If the elements of a contract did exist between these parties, there could still be some
possible reasons why a contract might not be valid based on facts not present in the
scenario. For example, if Sam was a minor at the time he made the agreement with
the chain store, the contract would not be valid because . List
some other reasons and elaborate on why a contract might be invalid.
Discuss and explain any other information you deem relevant to this answer.
(Chapters 13, 14, 15, and 16)
B. Even if there is not a valid legal contract between Sam and the chain store, there may still be
a quasi-contract (Chapter 13) or elements of what is called a promissory estoppel. (Chapter
15)
A quasi-contract is defined as . In this case, a quasi-contract may exist
if the following facts are true: . (Chapter 13)
A promissory estoppel is defined as . This principle might apply to this
case if . (Chapters 13 and 16)
Discuss and explain any other information you deem relevant to this answer.
C. The rights and obligations of both the landlord and tenant depend upon the term of their
contract. Such a contract may be verbal or in writing under a standard residential lease
agreement. (Chapters 13 and 50)
Some facts that may support that Sam is in breach of that contract are
.
Some facts that may support that Sam is not in breach of that contract are
. (Chapters 16, 17, and 50)
Discuss and explain any other information you deem relevant to this answer.
D. Based upon those rights and obligations, Sam’s landlord has/does not have grounds to evict
because .
Elaborate and explain.
E. Some defenses Sam might raise if his landlord tries to evict him include
because .
Elaborate .
Bunker Hill Community College MAT 093 Foundations of Mathema.docxrichardnorman90310
Bunker Hill Community College | MAT 093 Foundations of Mathematics
1
Name: _________________________ Section: MAT093- z
MAT093 MIDTERM EXAM (FORM A)
1. Ryan makes $1800 a month after taxes. Her rent is $725, utilities are $140, and her phone
is $78. She spends $250 on food, $95 on car insurance, and $180 on gas.
a) How much money does Ryan have left each month after paying all her expenses?
b) If Ryan decides to save $150 per month to build an emergency fund, how long will it
take her to save two months’ salary (the recommended value for an emergency
fund)?
2. Little Acorns Daycare Center is constructing an enclosed play yard. They must choose from
three different designs: a rectangle measuring 28 feet by 22 feet, a square measuring 25
feet on each side, or a rectangle measuring 35 feet by 18 feet.
a) What is the area of each of the proposed yards?
Yard #1:
Yard #2:
Yard #3:
b) Which proposed yard would require the least fence to make the enclosure?
A four-function calculator is permitted. Cellphones may not be used as calculators. Each question
will be graded in accordance with the rubric attached at the end of this test. Show all work on the
test or on the work paper provided. The minimum passing grade is 65%. You have one chance to
retake the exam.
Bunker Hill Community College | MAT 093 Foundations of Mathematics
2
3. You feed your gerbil
1
8
cup of seeds each day. If the seeds come in packages of
1
2
2
cups, for
how many days does a package of seeds last?
4. Joan waters her plants each day with
3
22
4
gallons of water. With a new irrigation system
in place, she uses
2
17
3
gallons of water each day. How many gallons of water does she save
in a 30-day period with the irrigation system?
5. A grocery store donated 60 dozen hot dog rolls to the local Youth Baseball League for their
Opening Day ceremonies. A total of 679 hotdogs were served.
a) How many dozen rolls were used? (Express your answer in mixed number form)
b) How many dozen rolls were left?
6. The beneficiary of a life insurance policy is the person who receives the payment of the
amount of insurance after the death of the insured. Todd is establishing his beneficiaries
for his life insurance policy. The policy is for $150,000. His daughter will get
1
2
of his
policy, his stepson will get
3
8
of his policy, and the rest will go to his grandson. What dollar
amount will his grandson receive?
Bunker Hill Community College | MAT 093 Foundations of Mathematics
3
7. Rosalie buys her lunch three times a week at the deli near her office. She usually spends
$7.50 for a sandwich, chips, and a drink. In order to save money, she decides to pack her
lunch at home and bring it with her. She estimates that a sandwich will cost her $2.00, a
bag of.
Bullying and cyberbullying of adolescents have become increasingly p.docxrichardnorman90310
Bullying and cyberbullying of adolescents have become increasingly popular media topics. Why do you think schools are often ineffective in reducing rates of bullying and cyberbullying? Imagine you are an administrator at a middle or high school. What specific activities would you engage in to deter students from bullying their peers?
.
Building an Information Technology Security Awareness an.docxrichardnorman90310
Building an Information
Technology Security Awareness
and Training Program
Mark Wilson and Joan Hash
NIST Special Publication 800-50
C O M P U T E R S E C U R I T Y
Computer Security Division
Information Technology Laboratory
National Institute of Standards and Technology
Gaithersburg, MD 20899-8933
October 2003
U.S. Department of Commerce
Donald L. Evans, Secretary
Technology Administration
Phillip J. Bond, Under Secretary for Technology
National Institute of Standards and Technology
Arden L. Bement, Jr., Director
Reports on Computer Systems Technology
The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology
(NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s
measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of
concept implementations, and technical analyses to advance the development and productive use of
information technology. ITL’s responsibilities include the development of technical, physical,
administrative, and management standards and guidelines for the cost-effective security and privacy of
sensitive unclassified information in Federal computer systems. This Special Publication 800-series
reports on ITL’s research, guidance, and outreach efforts in computer security, and its collaborative
activities with industry, government, and academic organizations.
U.S. GOVERNMENT PRINTING OFFICE
WASHINGTON: 2003
For sale by the Superintendent of Documents, U.S. Government Printing Office
Internet: bookstore.gpo.gov — Phone: (202) 512-1800 — Fax: (202) 512-2250
Mail: Stop SSOP, Washington, DC 20402-0001
NIST Special Publication 800-50
Authority
This document has been developed by the National Institute of Standards and Technology (NIST) in
furtherance of its statutory responsibilities under the Federal Information Security Management Act
(FISMA) of 2002, Public Law 107-347.
NIST is responsible for developing standards and guidelines, including minimum requirements, for
providing adequate information security for all agency operations and assets, but such standards and
guidelines shall not apply to national security systems. This guideline is consistent with the requirements
of the Office of Management and Budget (OMB) Circular A-130, Section 8b(3), Securing Agency
Information Systems, as analyzed in A-130, Appendix IV: Analysis of Key Sections. Supplemental
information is provided A-130, Appendix III.
This guideline has been prepared for use by federal agencies. It may be used by nongovernmental
organizations on a voluntary basis and is not subject to copyright. (Attribution would be appreciated by
NIST.)
Nothing in this document should be taken to contradict standards and guidelines made mandatory and
binding on federal agencies by the Secretary of Commerce under statutory author.
Building a company with the help of IT is really necessary as most.docxrichardnorman90310
Building a company with the help of IT is really necessary as most of the daily things are running via technology these days and while using technology you must have some minimum criteria for all of those who are using it. Usually, the company must make some policies for internal use and external use, so that where someone crosses the line, they are able to catch hold of them and take a severe action as per the business policies. Now this is really important because due to an error from one person there are other people who would get affected, and there are multiple stages to those areas, that checks the severity of all of those mistakes.
Here some of them that is general while making policies, such as visiting pornographic web sites using company computer is not allowed, disrupting another’s data or computer system and sharing corporate database information. When employees make any of these mistakes, then companies have authorities to terminate employees from the business. Usually every employee is supposed work as per the basic rules or you can say acceptable usage policy. While using company materials and internet, because most of the office work is done over the internet, like using cloud or any other online applications. This allows you to have full access to outside world, but you must know what are the DO’s and Don’t’s. This will help you stick to the company for long time and also grow with the company as much as possible (Information Resources Management Association. International Conference).
These are made by looking at the history, because most of the employees have made some worst things in the history for personal benefits and ended sharing company details with outsiders, and hampered own company value. Using such valuable data, someone from outside can take over the company or misuse the data or they can do anything that can hurt the business directly. When the business owners are going under loss, the company can take actions against such activity or people who are committing those mistakes.
References
Information Resources Management Association. International Conference. Challenges of Information Technology Management in the 21st Century:
Primary Source Document
with Questions (DBQs)
E X C E R P T S F R O M I N S T R U C T I O N S T O M Y D A U G H T E R
By Song Siyŏl
Introduction
Song Siyŏl (1607‐1689) was a prominent scholar and official. This piece was written for his oldest daughter on the
occasion of her marriage and subsequently became an important tutelary text that circulated among elite families.
By the time this text was written, the patterns of patrilocal residence and patrilineal descent advocated by Neo‐
Confucian reformers early in the Chosŏn dynasty had become well established.
Document Excerpt with Questions (Longer selection follows this section)
From Sources of Korean Tradition, edited by Yŏng‐ho Ch’oe, Peter H. Lee, .
Building a Comprehensive Health HistoryBuild a health histor.docxrichardnorman90310
Building a Comprehensive Health History
Build a health history for a 55-year-old Asian female living in a high-density public housing complex –
Introduction of the paper, then explain
1. How would your communication and interview techniques for building a health history differ with each patient?
2. How might you target your questions for building a health history based on the patient’s social determinants of health?
3. What risk assessment instruments would be appropriate to use with the patient, or what questions would you ask the patient to assess his or her health risks?
4. Identify any potential health-related risks based upon the patient’s age, gender, ethnicity, or environmental setting that should be taken into consideration.
5. Select one of the risk assessment instruments presented in Chapter 1 or Chapter 5 of the Seidel's Guide to Physical Examination text, or another tool with which you are familiar, related to your selected patient.
6. Develop at least eight targeted questions you would ask the selected patient to assess his or her health risks and begin building a health history.
Resources
Ball, J. W., Dains, J. E., Flynn, J. A., Solomon, B. S., & Stewart, R. W. (2019). Seidel's guide to physical examination: An interprofessional approach (9th ed.). St. Louis, MO: Elsevier Mosby.
· Chapter 1, “The History and Interviewing Process”
· Chapter 5, “Recording Information” provides methods for maintaining clear and accurate records, also explore the legal aspects of patient records.
Sullivan, D. D. (2019). Guide to clinical documentation (3rd ed.). Philadelphia, PA: F. A. Davis.
· Chapter 2, "The Comprehensive History and Physical Exam" (pp. 19–29)
R Ryanne, W., & Lori A, O. (2015). Implementation of health risk assessments with family health history: barriers and benefits. Postgraduate Medical Journal, 1079, 508.
Lushniak, B. D. (2015). Surgeon general’s perspectives: family health history: using the past to improve future health. Public Health Reports, 1, 3.
Jardim, T. V., Sousa, A. L. L., Povoa, T. I. R., Barroso, W. K. S., Chinem, B., Jardim, L., Bernardes, R., Coca, A., & Jardim, P. C. B. V. (2015). The natural history of cardiovascular risk factors in health professionals: 20-year follow-up. BMC Public Health, 15, 1111.
ITS 832
Chapter 5
From Building a Model to Adaptive Robust
Decision Making Using Systems Modeling
InformationTechnology in a Global Economy
Professor Miguel Buleje
Introduction
• Modeling & Simulation
• Fields that develops and applies computational methods to
address complex system
• Addresses problems related to complex issues
• Focus on decision making abilities
• Opportunities to leverage interdisciplinary approach, and learn
across fields to understand complex systems.
• Legacy System Dynamics (SD) modeling and others
methods are presented
• Recent innovations
• What the future holds
• Examples
Systems Modeling
• Dynamic complexity
• Behavior evolves over time
• Mode.
Build-a-modelStarting with this partial model, which contains fina.docxrichardnorman90310
Build-a-modelStarting with this partial model, which contains financial statements and other information, complete sections a thru g. All sections in yellow must be completed using formulas. All data must be computed using formulas referencing data from the financial statements and other data. Manual entry of data for solutions will result in zero points for the particular calculation.Income Statement for the Year Ending December 31 (Millions of Dollars)2019Net Sales$ 800.0Costs (except depreciation)$ 576.0Depreciation$ 60.0 Total operating costs$ 636.0Earning before int. & tax$ 164.0 Less interest$ 32.0Earning before taxes$ 132.0 Taxes (25%)$ 33.0Net income before pref. div.$ 99.0 Preferred div.$ 9.00Net income avail. for com. div.$ 90.0Common dividends$ 30.0Addition to retained earnings$ 60.0Number of shares (in millions)10Dividends per share$ 3.00Tax Rate25%Balance Sheets for December 31 (Millions of Dollars)Assets2019Liabilities and Equity2019Cash$ 28.0Accounts Payable$ 16.0Short-term investments40.0Notes payable30.0Accounts receivable80.0Accruals24.0Inventories180.0 Total current liabilities$ 70.0 Total current assets$ 328.0Long-term bonds$ 300.0Net plant and equipment600.0Preferred stock$ 90.0Total Assets$ 928.0Common Stock
(Par plus PIC)$ 257.0Retained earnings211.0 Common equity$ 468.0Total liabilities and equity$ 928.0Key Assumptions: Operating ratios remain unchanged from values in most recent year. Sales are expected to increase, 15%, 10%, 6%, and 6% during the next four years. The tax rate will remain at 25% and WACC is assumed to be 15% for all years. This data should be in a separate input table and referenced for the calculations when needed. This means you create an input table for the key assumptions data.a. Calculate the actual operating and projected ratios. Also fill in the tax rate and WACC for each year. (6.75pts)InputsActualProjectedProjectedProjectedProjected12/31/1912/31/2012/31/2112/31/2212/31/23Sales Growth RateCosts/SalesDepreciation/(Net PPE)Cash/Sales(Acct. Rec.)/SalesInventories/Sales(Net PPE)/Sales(Acct. Pay.)/SalesAccruals/SalesTax rateWeighted average cost of capital (WACC)b. Forecast the parts of the income statement and balance sheets necessary to calculate free cash flow. (13.75pts)Partial Income Statement for the Year Ending December 31 (Millions of Dollars)ActualProjectedProjectedProjectedProjectedIncome Statement Items12/31/1912/31/2012/31/2112/31/2212/31/23Net SalesCosts (except depreciation)Depreciation Total operating costsEarning before int. & taxPartial Balance Sheets for December 31 (Millions of Dollars)ActualProjectedProjectedProjectedProjectedOperating Assets12/31/1912/31/2012/31/2112/31/2212/31/23CashAccounts receivableInventoriesNet plant and equipmentOperating LiabilitiesAccounts PayableAccrualsc. Calculate free cash flow for each projected year. Also calculate the growth rates of free cash flow each year to ensure that th.
build a currency converter from USD to any other foreign currency. S.docxrichardnorman90310
build a currency converter from USD to any other foreign currency. Show me a mobile app that enters a USD amount and the country exchange amount. Give at least multiple Web sites to get the exchange rate of foreign countries. Do this in both Android and iOS platforms.
use java
just simple code
package the work and hand in
.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
This is a presentation by Dada Robert in a Your Skill Boost masterclass organised by the Excellence Foundation for South Sudan (EFSS) on Saturday, the 25th and Sunday, the 26th of May 2024.
He discussed the concept of quality improvement, emphasizing its applicability to various aspects of life, including personal, project, and program improvements. He defined quality as doing the right thing at the right time in the right way to achieve the best possible results and discussed the concept of the "gap" between what we know and what we do, and how this gap represents the areas we need to improve. He explained the scientific approach to quality improvement, which involves systematic performance analysis, testing and learning, and implementing change ideas. He also highlighted the importance of client focus and a team approach to quality improvement.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Being in a diverse environment allows one to distinguish the simi.docx
1. Being in a diverse environment allows one to distinguish
the similarities and differences between oneself and others
around them. Within the module overview, it stated, The United
States was founded on principles of equality and opportunity for
all citizens, but in practice, some groups of citizens have
encountered different treatment, which has resulted in less-than-
equal opportunities (Hobbs, 2015). In grade schools, most
children without intellectual disabilities often see themselves as
“normal” students. Students have questioned the inclusion of
persons with disabilities in public schools, but should they not
be given the same chance as others? We all are humans.
However, some students do not understand diversity or how to
accept some of the physical differences such as varying
abilities. Because of that, students with learning disabilities
may face many barriers because of discriminatory practices and
beliefs (LDA0, 2020). It is important, not only for children but
for adults, to understand and accept diversity in any form
whether it is physical or social. Furthermore, diversity among
people with varying abilities will be examined in depth through
the four lenses of general education. We will explore the history
of intellectual disabilities, some causes of intellectual
disabilities how persons with disabilities differ in values and
culture, and most of all how the disabilities affect the persons
daily within society.
HISTORY
Many years ago, there was a stigma of persons with
intellectual disabilities. People feared them and often mistreated
them because they were different. They were called many names
that belittled them and degraded them as humans. They were
placed in centers secluded from the world. During the 19th
century, institutions were developed, and influential people
adopted the concept of care and education provisions for
persons with intellectual disabilities. The idea of the
institutions was not all great, yet it carried on to the 20th
2. century. In 1966, there was a publication of a photograph album
that was very dehumanizing, displaying intellectually
handicapped and mentally ill persons in isolation. “They
showed pictures of adults and children naked or dressed in
inappropriate clothes of the cheapest quality; closed in isolated
rooms without handles” (Zakrzewska-Manterys,2015). Years
later Dr. Wolf Wolfensberger exposed the idea of
Normalization. Dr. Wolfensberger’s Normalization principle
concentrated on improvement within the lives of the people who
were known as mentally retarded. Normalization began in
Scandinavian countries but Wolfensberger decided to take on
the principle and teach about it amongst the North American
people. From the years 1945 until 1975 were called the “Golden
Age”. This during the segregation police which fostered the
acceptance, social integration, and inclusion of persons with
disabilities (Zakrzewska-Manterys, 2015). Throughout time the
services for intellectual disabilities have changed. Many
changes from how they treated and even what they have been
called or referred to as. They went from persons being mentally
handicapped to mental retardation and now being known as
persons with intellectual and developmental disabilities. Due to
their overwhelming history and the many influential people who
have made a difference, today’s society has given great care and
respect to those persons living with disabilities.
HUMANITIES
Have you ever been curious to know what it is like for
persons with disabilities to learn or what it's like to teach them?
Even more exciting is knowing that they too have special gifts
that make them capable of understanding such creative artwork
like music or fine art like paintings and drawings. Note that it
should not be expected for all persons with disabilities to have a
remarkable talent, but some do. Through the lens of humanities,
we gain insight into how these persons can express themselves
through their creative works of art and talent. Many of us in the
world learn by watching one another and as do they. There is no
big difference. Just like many children without disabilities
3. pretend they are superheroes and they place a sheet or towel
around their neck as their cape, well the children with
disabilities sometimes do the same just in a different demeanor.
They hide behind their talent or use their talent as their boost of
confidence. It allows them to feel somewhat normal and
compare their similarities with the other children that are unlike
them. Arts allow such persons to feel humanized and part of
something so spectacular while using color, shapes, and pictures
to visualize what they have in mind. “The arts are intellectual
disciplines. Drawing and painting reinforce motor skills while
Music teaches children about rhythm, sound, and pitch” (NCLD,
2009). Furthermore, art strategies have shown to be productive
in education as it allows the person to show their abilities in
various creative ways while exploring self-worth, confidence,
and success in many areas.
NATURAL SCIENCES
The very first question parents have when they give
birth to a child with disabilities is; HOW? Research implies that
a mother with severe mental illness is at risk of giving birth
with complications that implicate intellectual disabilities (Patsy
Di Prinzio et. al, 2018). But does that mean every mother
whoever gave birth to a child with disabilities has a psychotic
illness? Most certainly not. Most intellectual disability cases
are caused by chromosome abnormalities or congenital defects.
“Congenital defects are problems that occur during the
development of the person when they are in utero (in the
mother’s womb) and due to a mutation or error in the genetic
coding of their genes or chromosomes”( CDC, 2015). Cognitive
functioning and a problem with motor skills are major effects
caused by genetic factors. According to the National Science
Teaching Association, a learning disability is a neurological
disorder that causes difficulty in organizing information
received. This can interfere with how information is kept thus
causing basic functions such as reading, writing, and
understanding words. (NSTA,2020). Many cases of intellectual
disabilities cause people to be left in predicaments of not being
4. able to do certain things for themselves or their abilities are
limited. Over the year’s technology has evolved and scientists
have been motivated year after year to develop wonderful
adaptive equipment for persons with disabilities. Just like
everyone else they want to someday be able to interact with
peers in social gatherings or perhaps just obtain the ability to do
for themself. Global Cooperation on Assistive Technology
(GATE) was a program created by The World Health
Organization. “The GATE program’s objective is to improve
access to high quality, affordable assistive products for people
with varying disabilities, diseases, and age-related conditions”
(Boot et. al, 2017). Assistive technology has helped persons
with intellectual disabilities gain some sort of control over their
daily functioning and mobility. The various items promote
independence and decrease the need for more support. Though
some persons are not fully capable of making choices that
support autonomy, assistive technology decreases the
restrictions that are related to their disability. Without these
supports’ somethings are just impossible for them. Overall,
together with natural and applied sciences have developed an
amazing world for persons with intellectual disabilities whether
it is with new robotic technology or a profound treatment for
diagnosed genetic disorders.
SOCIAL SCIENCE
With a social science perspective, you wonder about the
limitations and barriers that come with the integration of
persons with intellectual disabilities. Similar to the humanities,
yet this time you want to focus on the relationships that are
built amongst the persons and how it has an impact on them.
Maya Angelou stated, “I've learned that people will forget what
you said, people will forget what you did, but people will never
forget how you made them feel.” I love this quote because I find
it true. We sometimes forget that everyone has feelings and we
react to them, even persons with intellectual disabilities. Often
you may encounter a child, not excluding those without a
disability, which becomes an introvert around a particular
5. person, on the other hand, when they are with you, they may be
the opposite. Or a better example, I worked with a person with
Down Syndrome. Every time I relieved the shift before me, they
complained of her spitting on them, with me she never
displayed such actions. I think it was because I have made an
effort to build a bond with her and treat her like a normal
person with little accommodations. It is important for anyone as
the caregiver or educator of these people to build a quality
relationship, such as teacher-student or staff -individual, which
includes respect and dignity no matter what. We must keep in
mind Maslow’s Hierarchy of Needs which applies to all humans.
Research has shown that a positive rapport between caretaker or
educator enhances positive behavior in persons with intellectual
disabilities. It is often difficult for persons with disabilities to
have friendships or any type of relationship outside their family
or the people they encounter daily (teacher, caretaker, nurse).
Studies reveal that friendship predicts improved outcomes in
almost every area of one's life (Friedman & Rizzolo, 2018).
Therefore when you come across any person for that matter
remember that Social Exclusion is painful but Social Inclusion
is gainful.
References
Boot FH, Dinsmore J, Khasnabis C and MacLachlan M (2017)
Intellectual Disability and Assistive Technology: Opening
the GATE Wider. Front. Public Health 5:10. doi:
10.3389/fpubh.2017.00010
Centers for Disease Control and Prevention. (2015c, February
12). Developmental disabilities. Friedman, C., & Rizzolo, M. C.
6. (2018). Friendship, Quality of Life, and People with Intellectual
and Developmental Disabilities. Journal of Developmental
& Physical Disabilities, 30(1), 39–54. https://doi-
org.ezproxy.snhu.edu/10.1007/s10882-017-9576-7 Retrieved
from
http://www.cdc.gov/ncbddd/developmentaldisabilities/
Hobbs, P. (2015). Walt’s utopia: Disneyland and American
mythmaking. Jefferson, NC: McFarland.
Hughes, E. M., Ryan, J. B., & Green, J. M. (2011). The Use of
Assistive Technology To Improve Time Management Skills of a
Young Adult With an Intellectual Disability. Journal of Special
Education Technology, 26(3), 13–20.
Hurman, M. (2017). Exploring the relationships of people with
an intellectual disability and their support staff : to what
extent is rapport a useful and measurable concept?
Learning Disabilities Association of Ontario. 2020. Learning
Disabilities and Diversity: A Culturally Responsive Approach.
https://www.ldatschool.ca/culturally-responsive- pedagogy/
National Center for Learning Disabilities. 2009. Learning
Disabilities and the Arts. LD Online Works.
http://www.ldonline.org/article/30031/
National Science Teaching Association. 2020. Science for
Students with Disabilities
https://www.nsta.org/disabilities/learning.aspx
Patsy Di Prinzio, M. B., Vera A. Morgan, M. S. S., Jonas Björk,
P. D., Maxine Croft, P. D., Ashleigh Lin, P. D., Assen
Jablensky, M. D., & Thomas F. McNeil, P. D. (2018).
Intellectual Disability and Psychotic Disorders in
Children: Association With Maternal Severe Mental Illness
and Exposure to Obstetric Complications in a Whole-Population
Cohort. American Journal of Psychiatry, 175(12), 1232–
1242. https://doi-
org.ezproxy.snhu.edu/10.1176/appi.ajp.2018.17101153
Thomas, S. 2017. Life’s Work Normalization.
https://wolfwolfensberger.com/life-s- work/normalization
Zakrzewska-Manterys, E. (2015). A History of the Exclusion of