Keystone Species Research Paper
This writing assignment is designed to provide opportunities for the student to find, evaluate, select, synthesize, organize, cite, and present information and arguments clearly and effectively for understanding scientific issues on personal, societal, and global levels.
Your Aunt Gertrude recently wrote you a letter mentioning a news story she saw about a mysterious disease that causes sea stars to disintegrate. “I don’t know why there’s so much fuss about sea stars,” she writes. “They just sit there all day in the ocean and as far as I’m concerned, who would even notice if they disappeared? Those scientists should take all that time and money they’re spending on sea stars and put it to good use saving the whales instead!” Knowing you are enrolled in a biology course, your aunt wants to know what you think about the subject. Remember your
aunt is smart but has not taken a biology course in many years. Your response to her needs to be concise and clear, but understandable by a non-scientist.
Write a well-researched letter to your aunt that addresses the following key points (allocate 1 – 2 paragraphs for each point):
1. What is a keystone species? Explain why sea stars are considered a keystone species in their
community.
2. Explain the potential causes for sea star wasting disease, and describe the scientific evidence
for each cause.
3. Which cause or causes of the disease may be attributable to the actions of humans? Explain
how human actions can be linked to the spread of this disease in sea star populations.
4. Do you think it is important for people to protect keystone species from decline, such as
taking measures to prevent wasting disease in sea stars? Is it important to protect keystone species regardless of whether humans are responsible for the species decline? Explain your opinion to your aunt. Be sure to support your opinion with evidence.
*NOTE: Your entire paper, even parts that ask for your opinion, must be well supported by evidence. Having a good number of quality references will help in this regard.
Assigned article (must read and use in your paper):
Lopatto, E. (2014, November 18). In search of the starfish killer: the quest to save the original keystone species. The Verge
http://www.theverge.com/2014/11/18/7222479/starfish-wasting-quest-save-keystone-species
Total number of references (3):
You must use and reference the above article and at least two additional sources for this paper, making the minimum number of references for your paper 3. You may review relevant chapters in your textbook and use other sources to fill in missing information.
It is important that your response to your aunt be thoroughly researched and clearly written. You should define all your terms and be concise (1,000 words maximum). This assignment is designed to give you the experience of applying your knowledge of biology to a current controversy or topic of interest. You will use this ...
1) What is the difference between the social body and the bio-bod.docxjeremylockett77
1) What is the difference between the social body and the bio-body?
2). Tavia Nyongo’s article is about what South African track star?
3). List and briefly explain one aspect of culture.
Ann Fausto-Sterling suggest that there are three basic principles for successful investigations of the process of gender embodiment. What are they?
4).
5).
6).
7). According to Halberstam, what is gender?
8). Drawing from Stacey Patton, why do Bailey and Stallings suggest that discussions about sex and sexuality have been particularly fraught among black communities?
9). What does Fausto-Sterling mean by a bio-cultural process of sexual development?
11). For Ortiz-Vidal, how do the experiences of racialized sexualization and racialized femininities connect transwomen of color to other women of color.
For Rebecca Plante, what is the relationship between Culture and Socialization and sexuality?
12). Socialization and Sexuality
13). Culture and Sexuality
14). What is the difference between sex and gender?
15). According to Nyongo, what is the African “essentialist response to the essentialist attack on Semenya?”
List and briefly explain the four dimensions of “the social” through which we can understand sexuality, according to Steve Jackson.
16).
17).
18).
19).
20). According to Lorber, what are binary logics?
Part III: Short Essay (30 pts.)
In three paragraphs or 900 words—no more, no less—address the question. Draw from the readings, lectures, and discussions in class to give a thoughtful clear, and concise answer. Use/engage a concept in class that you have learned to explain your perspective. When drawing from the reading, use sources from the materials in class only and cite your sources.
Considering what you learned in this class thus far, describe the social constructionist theory of sexuality?
Essay 4.
Antibiotic resistance: are antimicrobial peptides a solution?
Information on the topic
Antibiotic resistance has become a worldwide issue in recent years. New strategies are necessary to tackle this problem. Antimicrobial peptides are widely distributed in nature and are continually being discovered in animals (including humans), plants and insects. Due to their broad spectrum of activity on drug-resistant microorganisms, could they be considered as potential treatment strategies?
Tips for writing the essay
You might want to include: an explanation of antibiotic resistance and a discussion of the long-term consequences of this, a description of some antimicrobial peptides (where do they come from? what can they be used for?), the benefits of using antimicrobial peptides to treat infection, the problems associated with antimicrobial use.
Essay guidance
Word count
1000 words +/- 10%
You must state your word count at the end of your essay.
You will be penalised if you exceed 1100 words – you will lose 10% of your mark.
Write concisely!
What is included in the word count?
All the text, in-text citations and any references to ...
This document discusses the different types of informational texts. It defines informational text as having the primary purpose of expressing information about various subjects. Literary nonfiction is described as including shorter works like essays and biographies written for a broad audience. Procedural texts are said to provide step-by-step instructions on how to complete a task, often with illustrations. Expository texts inform, explain, and expose using text structures like description and cause and effect. Argument texts aim to influence readers using claims, evidence, and reasoning.
ORIGINAL ONLY. Must pass SafeAssign. 3 papers 3 page each minimum ea.docxjakeomoore75037
The document outlines three assignments for a course on personality and sociology of developing countries. Assignment 1 involves a retrospective analysis of the student's personality and influences of nature vs nurture. Assignment 2 requires research on a developing nation and the effects of war and peace on foreign aid distribution. Assignment 3 involves researching a developing nation's lending institutions, healthcare, and human capital development.
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxkatherncarlyle
Adopt-a-Plant Project guidelines
Overview:
The purpose of this project is for you to choose a plant, conduct online research into the biology of the plant, and communicate what you have learned. You will be preparing an annotated bibliography on the plant you choose. The entire project is worth 50 points
Annotated Bibliography (50 points)
You will prepare an annotated bibliography with a list of the top 10 most interesting facts about your plant.
· Each fact should be paraphrased (i.e. written in your own words, no quotations allowed).
· Then tell me why this is interesting to you – make connections to your life or to currents issues in our world.
· Finally, give a full citation and tell me why you think this is a reliable, trustworthy source. Use this libguide to help you come up with reasons why your source is trustworthy.
· At least one of your sources should be from a peer-reviewed, science journal article.
Here is an example:
Fact 1: Taxol is a chemotherapy agent derived from the bark of the Pacific Yew Tree. The chemical itself is derived from a fungal endophtye within the bark. I thought this was very interesting, because the Pacific Yew tree is native to the state of Washington, and my aunt Jane received Taxol while undergoing chemotherapy for ovarian cancer. I also thought it was interesting because of the mutualistic relationship between the plant and the fungus.Citation: Plant natural products from cultured multipotent cells
Roberts, Susan; Kolewe, Martin. Nature Biotechnology28.11 (Nov 2010): 1175-6.
This is a reliable source because it is published in a peer-reviewed science journal article, written by two PhDs that are providing a review of the current literature on the topic
To complete the assignment, you should first choose a plant, gather articles discussing your plant, read the articles sufficiently enough to discuss the plant, and finally write the annotated bibliography. You are expected to produce original work, and any plagiarism will receive a zero. The paper should be double-spaced, and typed in 12 point font size, with normal margins. The instructions for how to properly cite your sources are at the end of this handout.
*** Reminder: The scientific name of a plant should always be typed in italics, with the first letter of the Genus capitalized. For ex.: Digitalis lanata. When you search for information on your plant online, make sure to use the scientific name, which will bring back a wider variety of results
The bibliography is worth 50 points and will be graded on:
1. Effort
• Quality of references
•Depth/breadth/quality of material covered
2. Following directions/ requirements
I will use the following rubric to grade your bibliography:
Research, Critical Reading and Documentation
Balanced, authoritative sources; correctly cited sources; effectively integrated outside sources. Most sources from science journals
10 pts
Effective sources, correctly cited, Could have a few more.
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxMARK547399
Adopt-a-Plant Project guidelines
Overview:
The purpose of this project is for you to choose a plant, conduct online research into the biology of the plant, and communicate what you have learned. You will be preparing an annotated bibliography on the plant you choose. The entire project is worth 50 points
Annotated Bibliography (50 points)
You will prepare an annotated bibliography with a list of the top 10 most interesting facts about your plant.
· Each fact should be paraphrased (i.e. written in your own words, no quotations allowed).
· Then tell me why this is interesting to you – make connections to your life or to currents issues in our world.
· Finally, give a full citation and tell me why you think this is a reliable, trustworthy source. Use this libguide to help you come up with reasons why your source is trustworthy.
· At least one of your sources should be from a peer-reviewed, science journal article.
Here is an example:
Fact 1: Taxol is a chemotherapy agent derived from the bark of the Pacific Yew Tree. The chemical itself is derived from a fungal endophtye within the bark. I thought this was very interesting, because the Pacific Yew tree is native to the state of Washington, and my aunt Jane received Taxol while undergoing chemotherapy for ovarian cancer. I also thought it was interesting because of the mutualistic relationship between the plant and the fungus.Citation: Plant natural products from cultured multipotent cells
Roberts, Susan; Kolewe, Martin. Nature Biotechnology28.11 (Nov 2010): 1175-6.
This is a reliable source because it is published in a peer-reviewed science journal article, written by two PhDs that are providing a review of the current literature on the topic
To complete the assignment, you should first choose a plant, gather articles discussing your plant, read the articles sufficiently enough to discuss the plant, and finally write the annotated bibliography. You are expected to produce original work, and any plagiarism will receive a zero. The paper should be double-spaced, and typed in 12 point font size, with normal margins. The instructions for how to properly cite your sources are at the end of this handout.
*** Reminder: The scientific name of a plant should always be typed in italics, with the first letter of the Genus capitalized. For ex.: Digitalis lanata. When you search for information on your plant online, make sure to use the scientific name, which will bring back a wider variety of results
The bibliography is worth 50 points and will be graded on:
1. Effort
• Quality of references
•Depth/breadth/quality of material covered
2. Following directions/ requirements
I will use the following rubric to grade your bibliography:
Research, Critical Reading and Documentation
Balanced, authoritative sources; correctly cited sources; effectively integrated outside sources. Most sources from science journals
10 pts
Effective sources, correctly cited, Could have a few more.
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxSALU18
Adopt-a-Plant Project guidelines
Overview:
The purpose of this project is for you to choose a plant, conduct online research into the biology of the plant, and communicate what you have learned. You will be preparing an annotated bibliography on the plant you choose. The entire project is worth 50 points
Annotated Bibliography (50 points)
You will prepare an annotated bibliography with a list of the top 10 most interesting facts about your plant.
· Each fact should be paraphrased (i.e. written in your own words, no quotations allowed).
· Then tell me why this is interesting to you – make connections to your life or to currents issues in our world.
· Finally, give a full citation and tell me why you think this is a reliable, trustworthy source. Use this libguide to help you come up with reasons why your source is trustworthy.
· At least one of your sources should be from a peer-reviewed, science journal article.
Here is an example:
Fact 1: Taxol is a chemotherapy agent derived from the bark of the Pacific Yew Tree. The chemical itself is derived from a fungal endophtye within the bark. I thought this was very interesting, because the Pacific Yew tree is native to the state of Washington, and my aunt Jane received Taxol while undergoing chemotherapy for ovarian cancer. I also thought it was interesting because of the mutualistic relationship between the plant and the fungus.Citation: Plant natural products from cultured multipotent cells
Roberts, Susan; Kolewe, Martin. Nature Biotechnology28.11 (Nov 2010): 1175-6.
This is a reliable source because it is published in a peer-reviewed science journal article, written by two PhDs that are providing a review of the current literature on the topic
To complete the assignment, you should first choose a plant, gather articles discussing your plant, read the articles sufficiently enough to discuss the plant, and finally write the annotated bibliography. You are expected to produce original work, and any plagiarism will receive a zero. The paper should be double-spaced, and typed in 12 point font size, with normal margins. The instructions for how to properly cite your sources are at the end of this handout.
*** Reminder: The scientific name of a plant should always be typed in italics, with the first letter of the Genus capitalized. For ex.: Digitalis lanata. When you search for information on your plant online, make sure to use the scientific name, which will bring back a wider variety of results
The bibliography is worth 50 points and will be graded on:
1. Effort
• Quality of references
•Depth/breadth/quality of material covered
2. Following directions/ requirements
I will use the following rubric to grade your bibliography:
Research, Critical Reading and Documentation
Balanced, authoritative sources; correctly cited sources; effectively integrated outside sources. Most sources from science journals
10 pts
Effective sources, correctly cited, Could have a few more.
The document provides instructions for an annotated bibliography assignment due on September 16th. It discusses choosing 10 relevant sources for the student's research area and field of study. The bibliography requires 5 fully annotated sources, 5 partially annotated sources, and a concluding synthesis section. Guidelines are provided for annotating sources, including bibliographic entries, summarizing arguments and issues, evaluating relevance, and assessing credibility. Additional resources and references are included to aid students in completing the assignment successfully.
The document provides guidance on academic writing style. It discusses the writing process, which involves three steps - pre-writing, writing, and post-writing. It also covers how to write with accuracy, clarity, and simplicity. Key points include organizing ideas logically, using precise language, and following discipline-specific writing norms and citation styles. The overall document offers advice to students on how to write effectively in an academic setting.
1) What is the difference between the social body and the bio-bod.docxjeremylockett77
1) What is the difference between the social body and the bio-body?
2). Tavia Nyongo’s article is about what South African track star?
3). List and briefly explain one aspect of culture.
Ann Fausto-Sterling suggest that there are three basic principles for successful investigations of the process of gender embodiment. What are they?
4).
5).
6).
7). According to Halberstam, what is gender?
8). Drawing from Stacey Patton, why do Bailey and Stallings suggest that discussions about sex and sexuality have been particularly fraught among black communities?
9). What does Fausto-Sterling mean by a bio-cultural process of sexual development?
11). For Ortiz-Vidal, how do the experiences of racialized sexualization and racialized femininities connect transwomen of color to other women of color.
For Rebecca Plante, what is the relationship between Culture and Socialization and sexuality?
12). Socialization and Sexuality
13). Culture and Sexuality
14). What is the difference between sex and gender?
15). According to Nyongo, what is the African “essentialist response to the essentialist attack on Semenya?”
List and briefly explain the four dimensions of “the social” through which we can understand sexuality, according to Steve Jackson.
16).
17).
18).
19).
20). According to Lorber, what are binary logics?
Part III: Short Essay (30 pts.)
In three paragraphs or 900 words—no more, no less—address the question. Draw from the readings, lectures, and discussions in class to give a thoughtful clear, and concise answer. Use/engage a concept in class that you have learned to explain your perspective. When drawing from the reading, use sources from the materials in class only and cite your sources.
Considering what you learned in this class thus far, describe the social constructionist theory of sexuality?
Essay 4.
Antibiotic resistance: are antimicrobial peptides a solution?
Information on the topic
Antibiotic resistance has become a worldwide issue in recent years. New strategies are necessary to tackle this problem. Antimicrobial peptides are widely distributed in nature and are continually being discovered in animals (including humans), plants and insects. Due to their broad spectrum of activity on drug-resistant microorganisms, could they be considered as potential treatment strategies?
Tips for writing the essay
You might want to include: an explanation of antibiotic resistance and a discussion of the long-term consequences of this, a description of some antimicrobial peptides (where do they come from? what can they be used for?), the benefits of using antimicrobial peptides to treat infection, the problems associated with antimicrobial use.
Essay guidance
Word count
1000 words +/- 10%
You must state your word count at the end of your essay.
You will be penalised if you exceed 1100 words – you will lose 10% of your mark.
Write concisely!
What is included in the word count?
All the text, in-text citations and any references to ...
This document discusses the different types of informational texts. It defines informational text as having the primary purpose of expressing information about various subjects. Literary nonfiction is described as including shorter works like essays and biographies written for a broad audience. Procedural texts are said to provide step-by-step instructions on how to complete a task, often with illustrations. Expository texts inform, explain, and expose using text structures like description and cause and effect. Argument texts aim to influence readers using claims, evidence, and reasoning.
ORIGINAL ONLY. Must pass SafeAssign. 3 papers 3 page each minimum ea.docxjakeomoore75037
The document outlines three assignments for a course on personality and sociology of developing countries. Assignment 1 involves a retrospective analysis of the student's personality and influences of nature vs nurture. Assignment 2 requires research on a developing nation and the effects of war and peace on foreign aid distribution. Assignment 3 involves researching a developing nation's lending institutions, healthcare, and human capital development.
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxkatherncarlyle
Adopt-a-Plant Project guidelines
Overview:
The purpose of this project is for you to choose a plant, conduct online research into the biology of the plant, and communicate what you have learned. You will be preparing an annotated bibliography on the plant you choose. The entire project is worth 50 points
Annotated Bibliography (50 points)
You will prepare an annotated bibliography with a list of the top 10 most interesting facts about your plant.
· Each fact should be paraphrased (i.e. written in your own words, no quotations allowed).
· Then tell me why this is interesting to you – make connections to your life or to currents issues in our world.
· Finally, give a full citation and tell me why you think this is a reliable, trustworthy source. Use this libguide to help you come up with reasons why your source is trustworthy.
· At least one of your sources should be from a peer-reviewed, science journal article.
Here is an example:
Fact 1: Taxol is a chemotherapy agent derived from the bark of the Pacific Yew Tree. The chemical itself is derived from a fungal endophtye within the bark. I thought this was very interesting, because the Pacific Yew tree is native to the state of Washington, and my aunt Jane received Taxol while undergoing chemotherapy for ovarian cancer. I also thought it was interesting because of the mutualistic relationship between the plant and the fungus.Citation: Plant natural products from cultured multipotent cells
Roberts, Susan; Kolewe, Martin. Nature Biotechnology28.11 (Nov 2010): 1175-6.
This is a reliable source because it is published in a peer-reviewed science journal article, written by two PhDs that are providing a review of the current literature on the topic
To complete the assignment, you should first choose a plant, gather articles discussing your plant, read the articles sufficiently enough to discuss the plant, and finally write the annotated bibliography. You are expected to produce original work, and any plagiarism will receive a zero. The paper should be double-spaced, and typed in 12 point font size, with normal margins. The instructions for how to properly cite your sources are at the end of this handout.
*** Reminder: The scientific name of a plant should always be typed in italics, with the first letter of the Genus capitalized. For ex.: Digitalis lanata. When you search for information on your plant online, make sure to use the scientific name, which will bring back a wider variety of results
The bibliography is worth 50 points and will be graded on:
1. Effort
• Quality of references
•Depth/breadth/quality of material covered
2. Following directions/ requirements
I will use the following rubric to grade your bibliography:
Research, Critical Reading and Documentation
Balanced, authoritative sources; correctly cited sources; effectively integrated outside sources. Most sources from science journals
10 pts
Effective sources, correctly cited, Could have a few more.
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxMARK547399
Adopt-a-Plant Project guidelines
Overview:
The purpose of this project is for you to choose a plant, conduct online research into the biology of the plant, and communicate what you have learned. You will be preparing an annotated bibliography on the plant you choose. The entire project is worth 50 points
Annotated Bibliography (50 points)
You will prepare an annotated bibliography with a list of the top 10 most interesting facts about your plant.
· Each fact should be paraphrased (i.e. written in your own words, no quotations allowed).
· Then tell me why this is interesting to you – make connections to your life or to currents issues in our world.
· Finally, give a full citation and tell me why you think this is a reliable, trustworthy source. Use this libguide to help you come up with reasons why your source is trustworthy.
· At least one of your sources should be from a peer-reviewed, science journal article.
Here is an example:
Fact 1: Taxol is a chemotherapy agent derived from the bark of the Pacific Yew Tree. The chemical itself is derived from a fungal endophtye within the bark. I thought this was very interesting, because the Pacific Yew tree is native to the state of Washington, and my aunt Jane received Taxol while undergoing chemotherapy for ovarian cancer. I also thought it was interesting because of the mutualistic relationship between the plant and the fungus.Citation: Plant natural products from cultured multipotent cells
Roberts, Susan; Kolewe, Martin. Nature Biotechnology28.11 (Nov 2010): 1175-6.
This is a reliable source because it is published in a peer-reviewed science journal article, written by two PhDs that are providing a review of the current literature on the topic
To complete the assignment, you should first choose a plant, gather articles discussing your plant, read the articles sufficiently enough to discuss the plant, and finally write the annotated bibliography. You are expected to produce original work, and any plagiarism will receive a zero. The paper should be double-spaced, and typed in 12 point font size, with normal margins. The instructions for how to properly cite your sources are at the end of this handout.
*** Reminder: The scientific name of a plant should always be typed in italics, with the first letter of the Genus capitalized. For ex.: Digitalis lanata. When you search for information on your plant online, make sure to use the scientific name, which will bring back a wider variety of results
The bibliography is worth 50 points and will be graded on:
1. Effort
• Quality of references
•Depth/breadth/quality of material covered
2. Following directions/ requirements
I will use the following rubric to grade your bibliography:
Research, Critical Reading and Documentation
Balanced, authoritative sources; correctly cited sources; effectively integrated outside sources. Most sources from science journals
10 pts
Effective sources, correctly cited, Could have a few more.
Adopt-a-Plant Project guidelinesOverviewThe purpose of this.docxSALU18
Adopt-a-Plant Project guidelines
Overview:
The purpose of this project is for you to choose a plant, conduct online research into the biology of the plant, and communicate what you have learned. You will be preparing an annotated bibliography on the plant you choose. The entire project is worth 50 points
Annotated Bibliography (50 points)
You will prepare an annotated bibliography with a list of the top 10 most interesting facts about your plant.
· Each fact should be paraphrased (i.e. written in your own words, no quotations allowed).
· Then tell me why this is interesting to you – make connections to your life or to currents issues in our world.
· Finally, give a full citation and tell me why you think this is a reliable, trustworthy source. Use this libguide to help you come up with reasons why your source is trustworthy.
· At least one of your sources should be from a peer-reviewed, science journal article.
Here is an example:
Fact 1: Taxol is a chemotherapy agent derived from the bark of the Pacific Yew Tree. The chemical itself is derived from a fungal endophtye within the bark. I thought this was very interesting, because the Pacific Yew tree is native to the state of Washington, and my aunt Jane received Taxol while undergoing chemotherapy for ovarian cancer. I also thought it was interesting because of the mutualistic relationship between the plant and the fungus.Citation: Plant natural products from cultured multipotent cells
Roberts, Susan; Kolewe, Martin. Nature Biotechnology28.11 (Nov 2010): 1175-6.
This is a reliable source because it is published in a peer-reviewed science journal article, written by two PhDs that are providing a review of the current literature on the topic
To complete the assignment, you should first choose a plant, gather articles discussing your plant, read the articles sufficiently enough to discuss the plant, and finally write the annotated bibliography. You are expected to produce original work, and any plagiarism will receive a zero. The paper should be double-spaced, and typed in 12 point font size, with normal margins. The instructions for how to properly cite your sources are at the end of this handout.
*** Reminder: The scientific name of a plant should always be typed in italics, with the first letter of the Genus capitalized. For ex.: Digitalis lanata. When you search for information on your plant online, make sure to use the scientific name, which will bring back a wider variety of results
The bibliography is worth 50 points and will be graded on:
1. Effort
• Quality of references
•Depth/breadth/quality of material covered
2. Following directions/ requirements
I will use the following rubric to grade your bibliography:
Research, Critical Reading and Documentation
Balanced, authoritative sources; correctly cited sources; effectively integrated outside sources. Most sources from science journals
10 pts
Effective sources, correctly cited, Could have a few more.
The document provides instructions for an annotated bibliography assignment due on September 16th. It discusses choosing 10 relevant sources for the student's research area and field of study. The bibliography requires 5 fully annotated sources, 5 partially annotated sources, and a concluding synthesis section. Guidelines are provided for annotating sources, including bibliographic entries, summarizing arguments and issues, evaluating relevance, and assessing credibility. Additional resources and references are included to aid students in completing the assignment successfully.
The document provides guidance on academic writing style. It discusses the writing process, which involves three steps - pre-writing, writing, and post-writing. It also covers how to write with accuracy, clarity, and simplicity. Key points include organizing ideas logically, using precise language, and following discipline-specific writing norms and citation styles. The overall document offers advice to students on how to write effectively in an academic setting.
The document provides an overview of the Reading Assessment for the B2 level exam. It details the format and structure of the test, including the types of texts, number of questions, time limits, and question types. It offers strategies for approaching different parts of the paper, such as reading the texts before the questions, using topic sentences to help answer questions, and guessing answers rather than leaving any blank. Sample questions are also provided to illustrate the different task types.
This illustrated lesson provides students with many illustrations, hyperlinked articles, and essential questions that can be used to create their own PowerPoint projects about polluting our planet.
Scientific writing is an important skill for communicating research effectively. It requires understanding audience and purpose, supporting all statements with evidence, and distinguishing facts from possibilities. Well-written papers are clear, concise, and logical. They avoid unnecessary complexity and do not make readers work harder than needed. References should be used to support assertions but not over-paraphrased, and it is important to thoroughly understand source materials. Overall, scientific writing aims to illuminate rather than impress through simplicity and accuracy.
The topic of my Literature Review is Gender and CompetitionLiter.docxssusera34210
The topic of my Literature Review is Gender and Competition
Literature Review Paper (25%)
What is a Literature Review?
It is very important that you know what a literature is, its purpose, and how it is organized. A literature review is a summary of previous research on a topic. Its' purpose is to review the scholarly literature relevant to the topic you are studying. Some questions you may think about as you develop your literature review:
· What is known about the subject?
· Are there any gaps in the knowledge of the subject?
· Is there consensus about the topic (subtopics)?
· What aspects have generated significant debate on the topic?
· What methods or problems were identified by others studying in the field?
· What is the current status of research in this area or what direction do researchers feel need to be addressed in the future?
How do you write a Literature Review?
Summarize and explain what research has been done on the topic, citing the sources as you mention them. Point out the different ways researchers have treated the topic. Point out any connections between the sources especially where one source built upon prior study. Explain how this past work fits together and where scholars believe future research is headed.
You will be required to write a literature review on a specific (pre-approved) gender communication topic. This paper is to be presented in proper APA format (with the exception that it must be single spaced NOT double spaced) and it should be six full single spaced pages in length (not including the title page and the references page). This paper should expand your knowledge of the subject area, clearly demonstrate your vast understanding of the topic to the professor and provide readers with the most current, scholarly research on the topic. I must approve your topic before you begin to gathering your research.
The research project requires you to:
· select a topic within gender communication to research (must receive my approval before you begin your research on your topic)
· provide a title page
· include an introduction section (generates interest in the topic, stresses the importance of the subject matter and includes a clear preview) 3/4 page in length
· provide a body section that is well organized with sub-sections of the various important aspects of your topics that are properly cited with in-text citations (use subheadings to organize the body of your paper) 5 pages in length
· end with your conclusion (provides closure to your paper) 1/4 page in length -be sure to label your conclusion
· provide a list of references in proper APA format (on a separate page entitled "References")
· Note the page requirements above and adhere to them. You may be over requirement for each section, but not under.
· Make sure the vast majority of your literature review is paraphrased (use direct quotations sparingly).
· You may site both texts, but you still need the additional 8 (minimum) scholarly ...
This booklet aims to provide
resources to tutors who
work with Indigenous
students at Charles Darwin
University. It is intended to
provide you with
information and exercises to
assist you to scaffold
students to be successful in
their university studies. We
focus on writing academic
essays, because this is a skill
student’s need in most
university courses, and is a
skill that can be transferred
to assessments in other
units.
Hello Sir
We are a premier academic writing agency with industry partners in UK, Australia and Middle East and over 15 years of experience. We are looking to establish long-term relationships with industry partners and would love to discuss this opportunity further with you.
Thanks & Regards
visit our website.
www.onlineassignmenthelp.com.au
www.freeassignmenthelp.com
www.btechndassignment.cheapassignmenthelp.co.uk
www.cheapassignmenthelp.com
www.cheapassignmenthelp.co.uk/
http://www.cheapassignmenthelp.net/
One ocean rubric at 1 bibliography 170305(1)Nicole Valerio
Hello Sir
We are a premier academic writing agency with industry partners in UK, Australia and Middle East and over 15 years of experience. We are looking to establish long-term relationships with industry partners and would love to discuss this opportunity further with you.
Thanks & Regards
visit our website.
www.onlineassignmenthelp.com.au
www.freeassignmenthelp.com
www.btechndassignment.cheapassignmenthelp.co.uk
www.cheapassignmenthelp.com
www.cheapassignmenthelp.co.uk/
http://www.cheapassignmenthelp.net/
Thesis SamplesRagged Dick” shows that in order to be success.docxssusera34210
Thesis Samples:
“Ragged Dick” shows that in order to be successful you need to better yourself.
“Ragged Dick” shows that in order to be successful you need to be lucky.
“The Lesson” teaches us that race and class limit opportunity and that wealth distribution in America is unfair.
“The Lesson” reveals that despite the limits of race and class, hard work can lead to success.
How to introduce a quotation
(quotation sandwich method)
For non-fiction texts, use author tags before introducing a quotation
Author tag = author’s last name + a writing verb.
Writing Verbs: Use these verbs to describe how an author says something
Example: Mantsios reports that “one if five men will surpass their father’s social class” (254).
“Class in America”
Mantsios: argues, asserts, reports, suggests, emphasizes, insists, claims
How to introduce a quotation
(quotation sandwich method)
For fiction texts, provide the context for the quotation. Tell the reader who the quote involves, where in the story this quote takes place, and what is happening in the quote.
Example: Half way into the field trip, Miss Moore notices that Sylvia is getting angry “you sound angry Sylvia” (Bambara 7).
Different ways to analyze a quotation (quotation sandwich method)
Explain what the quotation means and how it supports your main idea.
Example, Mantsios reports that “one if five men will surpass their father’s social class” (254). In other words, most Americans will die in the class they were born in. This proves that all Americans do not have equal chances to succeed.
Helpful templates for quotation analysis:
In other words… Basically… What _____ is saying is…
This reveals, suggests, confirms, proves, shows, conveys, describes, disproves
SQL Joins-Functions-View Assignment
Part 1: SQL Joins and Functions (15 points – 3 points each)
1. Write a query to display the minimum and maximum number of diagnoses (distinct diagnosis codes)
by state, for each state in which patients in our database live. Display the name of the state, the
minimum number of diagnoses, and the maximum number of diagnoses. Be sure each field is
displayed with a meaningful, user-friendly name (e.g., ‘MinDiagnoses’).
2. Write a query to display the average number of immunizations given to female patients by state, for
each state in which patients in our database live. Display the name of the state, patient gender, and
the average number of immunizations. Be sure each field is displayed with a meaningful, user-
friendly name.
3. Write a query to display the minimum, maximum, and average, and total number of lab tests
resulted for patients born in each year between 1990 and 2000 and living in California. Display
patient year of birth, minimum number of lab tests, maximum number of lab tests, average number
of lab tests number of lab tests and total number of lab tests resulted for patients having each birth
year. Be sure each field is displayed with a meaningful, user-friendly n ...
How to write a scientific article Dr: Taher A.EidSoliman hassan
The purpose of scientific writing is to communicate new scientific findings
SO, it has to be clear, simple and well ordered communication to transmit new scientific findings
Scientific writing must use proper English which gives the sense in the fewest short words
paper should be academic but you’re not writing for the ages – others will come after you with newer data and better models. Think of your role as guiding their future efforts
being occasionally wrong is forgiven, being boring is not.
a paper is worth writing only if it has general implications for knowledge
caseYou have been hired as a health educator to develop an Ost.docxtidwellveronique
case
You have been hired as a health educator to develop an Osteoporosis Prevention program for the County Health Department. Review the modular information on Natural History of Disease.
Your tasks: Write a 2 page essay in which you:
1. Identify a stage of the natural history of Osteoporosis that you feel is particularly interesting from a standpoint of prevention.
2. Briefly cite relevant statistics or health trends for a specific County, identify the target population for whom your Osteoporosis Prevention program would be directed.
3. Describe one primary, secondary, or tertiary prevention measure that you would include in your Osteoporosis Prevention program. Justify its importance.
slp
Project Summary: For your session-long project, you will investigate an outbreak.
You work in the community outreach department at the Disease Control Office at the Wintersburg County Health Department. You have been requested to attend an emergency meeting with some epidemiologists. During the meeting, you were informed that 40 kids became ill with diarrhea and fever at Wintersburg Elementary School. Ten children were hospitalized. The diagnosis is Salmonella infection.
Assignment:
According to the epidemiologic triangle, there are three factors that influence the occurrence of disease:
· Etiologic agent
· Host factors
· Environmental factors
Describe each of these factors for food-borne Salmonella infection. Do they all need to be present for disease to occur? (Review "Multiple Causation of Disease" on the modular Homepage.)
Assignment Expectations, in order to earn full credit:
Please write your paper in your own words. That is the only way I can evaluate your level of understanding. Quotes are rarely needed; if necessary, they should comprise less than 10% of a paper and must be properly cited.
Even though the papers must be written in your own words, you are required to cite sources for any statement of fact or idea that is not common knowledge. You must cite the sources within the body of the paper and include a reference list at the end of the paper.
Note: Wikipedia is not an acceptable source of information. Use credible, professional, and scholarly sources such as journal articles from ProQuest or EBSCO, and government, university, or nonprofit organizations’ Web sites.
You must clearly show that you have read the module homepage and the required background materials. You are welcome to do research in addition to -- but not instead of -- the required readings.
Your papers will be evaluated on the following factors:
· References - citations are used within the body of the paper any time you state a fact or idea that is not common knowledge. A reference list is included at the end of the paper.
· Precision - you follow all instructions and you answer each part of the assignment.
· Breadth - you show broad knowledge of the module’s topic.
· Depth - you go into detail to show more critical thought about the specific tasks or que ...
Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docxdurantheseldine
Annotated Bibliography
Due: Nov 28/29
Genre/Medium: Annotated Bibliography
Purpose: The writer of an annotated bibliography uses the bibliography to compile a list of sources to build research. The form includes a brief summary of the source and your own critical assessment of its relevance, objectivity, appropriateness, and usefulness. It is a tool that helps you keep an organized and thoughtful record of the research process and relevant information about the topic.
To this end, you will put together an annotated bibliography in preparation for Assignment 3. In addition to the primary text (Whistling Vivaldi) the bibliography will include three types of textual information: 1) a mainstream news/ magazine article, 2) a scholarly/academic “peer reviewed” article, and 3) a web-based multimedia or blog-style article.
Format: Your annotated bibliographies must paragraphs must contain a topic sentence, clear evidence from the reading, and coherent sentences on a topic. It will use transitions affectively to cohere the overall piece together. It must answer: 1) What is the information in the article you are summarizing? and 2) What is your critical assessment of the article?
Instructions:
1. Cite in MLA-citation format the name of the article.
2. Draft one or two paragraphs for each of the sources you list in your annotated bibliography.
3. Review the information in the bibliographies with your classmates to improve the grammar of the text and consider points that might help you build your argument in Assignment 3.
Grading Rubric:
25-20
20-15
15-10
10-5
5-0
Content & evidence
Excellent annotated bibliographies. It lays out the aspects of the topic well and evaluates the sources effectively.
Good annotated bibliographies. It lays out the aspects of the topic well and evaluates the sources.
It is an adequate annotated bibliographies. It lays out the aspects of the topic well, but does not evaluates the sources.
Does not fulfill the requirements of an annotated bibliographies.
Paragraphs are too poorly written to be useful.
Information Literacy
Citation is correct. It also provides specific evaluations about the appropriateness of the medium and the information for academic research.
Citation is correct. It provides specific evaluations about the appropriateness of the medium.
Citation is correct. Citation is accurate. It needs to speak to the appropriateness of the medium and the information for academic research.
Citation is not correct. Does not include any information about the medium and appropriateness for academic research.
Citation and assessment are not adequate.
Summary Questions – Aristotle, Confucius
Put things in your own words unless the question asks for a direct quote.
Answer each question in 8-12 sentences.
1. How does Aristotle describe the relation between virtue and pleasure? Give and
explain one direct quote from the reading as part of your response.
2. Think of a famous person (politician, celebrity.
please write a short essay to address the following questions. Lengt.docxDIPESH30
please write a short essay to address the following questions. Length: 500 word count to the minimum.
“Blogs, Twitter, Facebook, and a host of other news and social-media sites have allowed average citizens to become newsmakers. Is this a good or bad thing? Is the increase in citizen journalism leading to inaccuracies in reporting? Or can we trust that Americans will “consider the source” and verify any questionable information they read on a blog?”
Requirements:
1.Word count: 500.
2.Submissions must be in Word format (doc, docx) or Rich Text format (rtf). Attached file sent to my email will not be graded.
3.VeriCite has been activated to prevent plagiarism and no credit will be issued if Similarity Index points to 20% or higher.
.
please write a diary entry from the perspective of a French Revoluti.docxDIPESH30
please write a diary entry from the perspective of a French Revolutionary of the Third Estate (bourgeoisie, worker, or peasant), a member of the First Estate (clergy) or a member of the Second Estate (nobles). Your entry should have a well established mood, or writing that evokes certain feelings or emotions in readers through words and descriptions. Some examples of mood through setting, diction, and tone can be found
HERE
.
In addition, your journal should incorporate at least
THREE
of the following vocabulary terms:
Louis XVI
Estates-General
National Assembly
Tennis Court Oath
estate (First, Second, Third)
The Enlightenment
Great Fear
.
Please write the definition for these words and provide .docxDIPESH30
Please write the definition for these words and
provide two
examples
for each one
The definition should relate to “linguistic form“ / grammar
See attached file. you have
three hours and an half
to do the assignemnt
.
Please view the filmThomas A. Edison Father of Invention, A .docxDIPESH30
Please view the film:
Thomas A. Edison: Father of Invention
, A & E Television (New York, NY: A & E Television Networks, 1996); Available on the Hagerty Library catalogue at: http://records.library.drexel.edu/record=b2133926~S9
And discuss:
Edison is portrayed rather herocially in this film, what would you do to present a more balanced view of Edison the man and inventor? Based on my lecture, discuss why or why not Edison should be considered the creator of the light bulb?
.
Please watch the clip from the movie The Break Up. Then reflect w.docxDIPESH30
Please watch the clip from the movie "The Break Up." Then reflect who you think is most at fault and why.
Then I would you like to think about a conflict you have had and think about what could have been done differently to resolve it.
Write a one page paper (double spaced)
https://www.youtube.com/watch?v=_bqhVqTuFO4
.
please write a report on Social Media and ERP SystemReport should.docxDIPESH30
please write a report on Social Media and ERP System:
Report should be a detail study on social media, effects of social media on business.Use of ERP Systems in social media and its benefits.During presentatio the students should present the use of ERP Systems in the social media aspect.
pages: 15
font size: 11
spaces: 1.5
please see attached file
due date tomorrow, within 24 hour
.
Please write 200 wordsHow has the healthcare delivery system chang.docxDIPESH30
Please write 200 words
How has the healthcare delivery system changed?
For what types of patients and what types of care does each of the systems deliver? Would a patient have a need for more than one system? When (give examples and explain)?
What are the regulations related to the medical staff? What purpose do these regulations serve?
.
Please view the documentary on Typhoid Mary at httpswww..docxDIPESH30
Please view the documentary on Typhoid Mary at:
https
://
www
.
youtube
.com/watch?v=
Mc
8O9
EnAuLo
And read:
- Priscilla Wald, “Cultures and Carriers: "Typhoid Mary" and the Science of Social Control,”
Social Text
, No. 52/53,
Queer
Transexions
of Race, Nation, and Gender
(Autumn - Winter, 1997), pp. 181-214; Available in the Readings Folder and on JSTOR at:
http
://
www
.
jstor
.
org
/stable/466739
Then discuss:
Wald discusses how the concept of "social control" relates or is exemplified by the Mary
Mallon
ca
se
. Choose one of the aspects of Wald's argument and discuss how it relates to the Typhoid Mary documentary. Do these help us understand the significance the 'Typhoid Mary' case has for the history of medicine, or for the treatment of epidemics today?
.
Please use the two attachments posted to complete work. Detailed in.docxDIPESH30
This document provides instructions and deadlines for two assignments. A discussion is due on December 11th by noon and a paper is due on December 13th by noon. It also lists additional research sources that can be used for part two of the assignment, including journal articles and books on business regulation and international trade theory.
More Related Content
Similar to Keystone Species Research PaperThis writing assignment is desi.docx
The document provides an overview of the Reading Assessment for the B2 level exam. It details the format and structure of the test, including the types of texts, number of questions, time limits, and question types. It offers strategies for approaching different parts of the paper, such as reading the texts before the questions, using topic sentences to help answer questions, and guessing answers rather than leaving any blank. Sample questions are also provided to illustrate the different task types.
This illustrated lesson provides students with many illustrations, hyperlinked articles, and essential questions that can be used to create their own PowerPoint projects about polluting our planet.
Scientific writing is an important skill for communicating research effectively. It requires understanding audience and purpose, supporting all statements with evidence, and distinguishing facts from possibilities. Well-written papers are clear, concise, and logical. They avoid unnecessary complexity and do not make readers work harder than needed. References should be used to support assertions but not over-paraphrased, and it is important to thoroughly understand source materials. Overall, scientific writing aims to illuminate rather than impress through simplicity and accuracy.
The topic of my Literature Review is Gender and CompetitionLiter.docxssusera34210
The topic of my Literature Review is Gender and Competition
Literature Review Paper (25%)
What is a Literature Review?
It is very important that you know what a literature is, its purpose, and how it is organized. A literature review is a summary of previous research on a topic. Its' purpose is to review the scholarly literature relevant to the topic you are studying. Some questions you may think about as you develop your literature review:
· What is known about the subject?
· Are there any gaps in the knowledge of the subject?
· Is there consensus about the topic (subtopics)?
· What aspects have generated significant debate on the topic?
· What methods or problems were identified by others studying in the field?
· What is the current status of research in this area or what direction do researchers feel need to be addressed in the future?
How do you write a Literature Review?
Summarize and explain what research has been done on the topic, citing the sources as you mention them. Point out the different ways researchers have treated the topic. Point out any connections between the sources especially where one source built upon prior study. Explain how this past work fits together and where scholars believe future research is headed.
You will be required to write a literature review on a specific (pre-approved) gender communication topic. This paper is to be presented in proper APA format (with the exception that it must be single spaced NOT double spaced) and it should be six full single spaced pages in length (not including the title page and the references page). This paper should expand your knowledge of the subject area, clearly demonstrate your vast understanding of the topic to the professor and provide readers with the most current, scholarly research on the topic. I must approve your topic before you begin to gathering your research.
The research project requires you to:
· select a topic within gender communication to research (must receive my approval before you begin your research on your topic)
· provide a title page
· include an introduction section (generates interest in the topic, stresses the importance of the subject matter and includes a clear preview) 3/4 page in length
· provide a body section that is well organized with sub-sections of the various important aspects of your topics that are properly cited with in-text citations (use subheadings to organize the body of your paper) 5 pages in length
· end with your conclusion (provides closure to your paper) 1/4 page in length -be sure to label your conclusion
· provide a list of references in proper APA format (on a separate page entitled "References")
· Note the page requirements above and adhere to them. You may be over requirement for each section, but not under.
· Make sure the vast majority of your literature review is paraphrased (use direct quotations sparingly).
· You may site both texts, but you still need the additional 8 (minimum) scholarly ...
This booklet aims to provide
resources to tutors who
work with Indigenous
students at Charles Darwin
University. It is intended to
provide you with
information and exercises to
assist you to scaffold
students to be successful in
their university studies. We
focus on writing academic
essays, because this is a skill
student’s need in most
university courses, and is a
skill that can be transferred
to assessments in other
units.
Hello Sir
We are a premier academic writing agency with industry partners in UK, Australia and Middle East and over 15 years of experience. We are looking to establish long-term relationships with industry partners and would love to discuss this opportunity further with you.
Thanks & Regards
visit our website.
www.onlineassignmenthelp.com.au
www.freeassignmenthelp.com
www.btechndassignment.cheapassignmenthelp.co.uk
www.cheapassignmenthelp.com
www.cheapassignmenthelp.co.uk/
http://www.cheapassignmenthelp.net/
One ocean rubric at 1 bibliography 170305(1)Nicole Valerio
Hello Sir
We are a premier academic writing agency with industry partners in UK, Australia and Middle East and over 15 years of experience. We are looking to establish long-term relationships with industry partners and would love to discuss this opportunity further with you.
Thanks & Regards
visit our website.
www.onlineassignmenthelp.com.au
www.freeassignmenthelp.com
www.btechndassignment.cheapassignmenthelp.co.uk
www.cheapassignmenthelp.com
www.cheapassignmenthelp.co.uk/
http://www.cheapassignmenthelp.net/
Thesis SamplesRagged Dick” shows that in order to be success.docxssusera34210
Thesis Samples:
“Ragged Dick” shows that in order to be successful you need to better yourself.
“Ragged Dick” shows that in order to be successful you need to be lucky.
“The Lesson” teaches us that race and class limit opportunity and that wealth distribution in America is unfair.
“The Lesson” reveals that despite the limits of race and class, hard work can lead to success.
How to introduce a quotation
(quotation sandwich method)
For non-fiction texts, use author tags before introducing a quotation
Author tag = author’s last name + a writing verb.
Writing Verbs: Use these verbs to describe how an author says something
Example: Mantsios reports that “one if five men will surpass their father’s social class” (254).
“Class in America”
Mantsios: argues, asserts, reports, suggests, emphasizes, insists, claims
How to introduce a quotation
(quotation sandwich method)
For fiction texts, provide the context for the quotation. Tell the reader who the quote involves, where in the story this quote takes place, and what is happening in the quote.
Example: Half way into the field trip, Miss Moore notices that Sylvia is getting angry “you sound angry Sylvia” (Bambara 7).
Different ways to analyze a quotation (quotation sandwich method)
Explain what the quotation means and how it supports your main idea.
Example, Mantsios reports that “one if five men will surpass their father’s social class” (254). In other words, most Americans will die in the class they were born in. This proves that all Americans do not have equal chances to succeed.
Helpful templates for quotation analysis:
In other words… Basically… What _____ is saying is…
This reveals, suggests, confirms, proves, shows, conveys, describes, disproves
SQL Joins-Functions-View Assignment
Part 1: SQL Joins and Functions (15 points – 3 points each)
1. Write a query to display the minimum and maximum number of diagnoses (distinct diagnosis codes)
by state, for each state in which patients in our database live. Display the name of the state, the
minimum number of diagnoses, and the maximum number of diagnoses. Be sure each field is
displayed with a meaningful, user-friendly name (e.g., ‘MinDiagnoses’).
2. Write a query to display the average number of immunizations given to female patients by state, for
each state in which patients in our database live. Display the name of the state, patient gender, and
the average number of immunizations. Be sure each field is displayed with a meaningful, user-
friendly name.
3. Write a query to display the minimum, maximum, and average, and total number of lab tests
resulted for patients born in each year between 1990 and 2000 and living in California. Display
patient year of birth, minimum number of lab tests, maximum number of lab tests, average number
of lab tests number of lab tests and total number of lab tests resulted for patients having each birth
year. Be sure each field is displayed with a meaningful, user-friendly n ...
How to write a scientific article Dr: Taher A.EidSoliman hassan
The purpose of scientific writing is to communicate new scientific findings
SO, it has to be clear, simple and well ordered communication to transmit new scientific findings
Scientific writing must use proper English which gives the sense in the fewest short words
paper should be academic but you’re not writing for the ages – others will come after you with newer data and better models. Think of your role as guiding their future efforts
being occasionally wrong is forgiven, being boring is not.
a paper is worth writing only if it has general implications for knowledge
caseYou have been hired as a health educator to develop an Ost.docxtidwellveronique
case
You have been hired as a health educator to develop an Osteoporosis Prevention program for the County Health Department. Review the modular information on Natural History of Disease.
Your tasks: Write a 2 page essay in which you:
1. Identify a stage of the natural history of Osteoporosis that you feel is particularly interesting from a standpoint of prevention.
2. Briefly cite relevant statistics or health trends for a specific County, identify the target population for whom your Osteoporosis Prevention program would be directed.
3. Describe one primary, secondary, or tertiary prevention measure that you would include in your Osteoporosis Prevention program. Justify its importance.
slp
Project Summary: For your session-long project, you will investigate an outbreak.
You work in the community outreach department at the Disease Control Office at the Wintersburg County Health Department. You have been requested to attend an emergency meeting with some epidemiologists. During the meeting, you were informed that 40 kids became ill with diarrhea and fever at Wintersburg Elementary School. Ten children were hospitalized. The diagnosis is Salmonella infection.
Assignment:
According to the epidemiologic triangle, there are three factors that influence the occurrence of disease:
· Etiologic agent
· Host factors
· Environmental factors
Describe each of these factors for food-borne Salmonella infection. Do they all need to be present for disease to occur? (Review "Multiple Causation of Disease" on the modular Homepage.)
Assignment Expectations, in order to earn full credit:
Please write your paper in your own words. That is the only way I can evaluate your level of understanding. Quotes are rarely needed; if necessary, they should comprise less than 10% of a paper and must be properly cited.
Even though the papers must be written in your own words, you are required to cite sources for any statement of fact or idea that is not common knowledge. You must cite the sources within the body of the paper and include a reference list at the end of the paper.
Note: Wikipedia is not an acceptable source of information. Use credible, professional, and scholarly sources such as journal articles from ProQuest or EBSCO, and government, university, or nonprofit organizations’ Web sites.
You must clearly show that you have read the module homepage and the required background materials. You are welcome to do research in addition to -- but not instead of -- the required readings.
Your papers will be evaluated on the following factors:
· References - citations are used within the body of the paper any time you state a fact or idea that is not common knowledge. A reference list is included at the end of the paper.
· Precision - you follow all instructions and you answer each part of the assignment.
· Breadth - you show broad knowledge of the module’s topic.
· Depth - you go into detail to show more critical thought about the specific tasks or que ...
Annotated BibliographyDue Nov 2829GenreMediumAnnotated .docxdurantheseldine
Annotated Bibliography
Due: Nov 28/29
Genre/Medium: Annotated Bibliography
Purpose: The writer of an annotated bibliography uses the bibliography to compile a list of sources to build research. The form includes a brief summary of the source and your own critical assessment of its relevance, objectivity, appropriateness, and usefulness. It is a tool that helps you keep an organized and thoughtful record of the research process and relevant information about the topic.
To this end, you will put together an annotated bibliography in preparation for Assignment 3. In addition to the primary text (Whistling Vivaldi) the bibliography will include three types of textual information: 1) a mainstream news/ magazine article, 2) a scholarly/academic “peer reviewed” article, and 3) a web-based multimedia or blog-style article.
Format: Your annotated bibliographies must paragraphs must contain a topic sentence, clear evidence from the reading, and coherent sentences on a topic. It will use transitions affectively to cohere the overall piece together. It must answer: 1) What is the information in the article you are summarizing? and 2) What is your critical assessment of the article?
Instructions:
1. Cite in MLA-citation format the name of the article.
2. Draft one or two paragraphs for each of the sources you list in your annotated bibliography.
3. Review the information in the bibliographies with your classmates to improve the grammar of the text and consider points that might help you build your argument in Assignment 3.
Grading Rubric:
25-20
20-15
15-10
10-5
5-0
Content & evidence
Excellent annotated bibliographies. It lays out the aspects of the topic well and evaluates the sources effectively.
Good annotated bibliographies. It lays out the aspects of the topic well and evaluates the sources.
It is an adequate annotated bibliographies. It lays out the aspects of the topic well, but does not evaluates the sources.
Does not fulfill the requirements of an annotated bibliographies.
Paragraphs are too poorly written to be useful.
Information Literacy
Citation is correct. It also provides specific evaluations about the appropriateness of the medium and the information for academic research.
Citation is correct. It provides specific evaluations about the appropriateness of the medium.
Citation is correct. Citation is accurate. It needs to speak to the appropriateness of the medium and the information for academic research.
Citation is not correct. Does not include any information about the medium and appropriateness for academic research.
Citation and assessment are not adequate.
Summary Questions – Aristotle, Confucius
Put things in your own words unless the question asks for a direct quote.
Answer each question in 8-12 sentences.
1. How does Aristotle describe the relation between virtue and pleasure? Give and
explain one direct quote from the reading as part of your response.
2. Think of a famous person (politician, celebrity.
please write a short essay to address the following questions. Lengt.docxDIPESH30
please write a short essay to address the following questions. Length: 500 word count to the minimum.
“Blogs, Twitter, Facebook, and a host of other news and social-media sites have allowed average citizens to become newsmakers. Is this a good or bad thing? Is the increase in citizen journalism leading to inaccuracies in reporting? Or can we trust that Americans will “consider the source” and verify any questionable information they read on a blog?”
Requirements:
1.Word count: 500.
2.Submissions must be in Word format (doc, docx) or Rich Text format (rtf). Attached file sent to my email will not be graded.
3.VeriCite has been activated to prevent plagiarism and no credit will be issued if Similarity Index points to 20% or higher.
.
please write a diary entry from the perspective of a French Revoluti.docxDIPESH30
please write a diary entry from the perspective of a French Revolutionary of the Third Estate (bourgeoisie, worker, or peasant), a member of the First Estate (clergy) or a member of the Second Estate (nobles). Your entry should have a well established mood, or writing that evokes certain feelings or emotions in readers through words and descriptions. Some examples of mood through setting, diction, and tone can be found
HERE
.
In addition, your journal should incorporate at least
THREE
of the following vocabulary terms:
Louis XVI
Estates-General
National Assembly
Tennis Court Oath
estate (First, Second, Third)
The Enlightenment
Great Fear
.
Please write the definition for these words and provide .docxDIPESH30
Please write the definition for these words and
provide two
examples
for each one
The definition should relate to “linguistic form“ / grammar
See attached file. you have
three hours and an half
to do the assignemnt
.
Please view the filmThomas A. Edison Father of Invention, A .docxDIPESH30
Please view the film:
Thomas A. Edison: Father of Invention
, A & E Television (New York, NY: A & E Television Networks, 1996); Available on the Hagerty Library catalogue at: http://records.library.drexel.edu/record=b2133926~S9
And discuss:
Edison is portrayed rather herocially in this film, what would you do to present a more balanced view of Edison the man and inventor? Based on my lecture, discuss why or why not Edison should be considered the creator of the light bulb?
.
Please watch the clip from the movie The Break Up. Then reflect w.docxDIPESH30
Please watch the clip from the movie "The Break Up." Then reflect who you think is most at fault and why.
Then I would you like to think about a conflict you have had and think about what could have been done differently to resolve it.
Write a one page paper (double spaced)
https://www.youtube.com/watch?v=_bqhVqTuFO4
.
please write a report on Social Media and ERP SystemReport should.docxDIPESH30
please write a report on Social Media and ERP System:
Report should be a detail study on social media, effects of social media on business.Use of ERP Systems in social media and its benefits.During presentatio the students should present the use of ERP Systems in the social media aspect.
pages: 15
font size: 11
spaces: 1.5
please see attached file
due date tomorrow, within 24 hour
.
Please write 200 wordsHow has the healthcare delivery system chang.docxDIPESH30
Please write 200 words
How has the healthcare delivery system changed?
For what types of patients and what types of care does each of the systems deliver? Would a patient have a need for more than one system? When (give examples and explain)?
What are the regulations related to the medical staff? What purpose do these regulations serve?
.
Please view the documentary on Typhoid Mary at httpswww..docxDIPESH30
Please view the documentary on Typhoid Mary at:
https
://
www
.
youtube
.com/watch?v=
Mc
8O9
EnAuLo
And read:
- Priscilla Wald, “Cultures and Carriers: "Typhoid Mary" and the Science of Social Control,”
Social Text
, No. 52/53,
Queer
Transexions
of Race, Nation, and Gender
(Autumn - Winter, 1997), pp. 181-214; Available in the Readings Folder and on JSTOR at:
http
://
www
.
jstor
.
org
/stable/466739
Then discuss:
Wald discusses how the concept of "social control" relates or is exemplified by the Mary
Mallon
ca
se
. Choose one of the aspects of Wald's argument and discuss how it relates to the Typhoid Mary documentary. Do these help us understand the significance the 'Typhoid Mary' case has for the history of medicine, or for the treatment of epidemics today?
.
Please use the two attachments posted to complete work. Detailed in.docxDIPESH30
This document provides instructions and deadlines for two assignments. A discussion is due on December 11th by noon and a paper is due on December 13th by noon. It also lists additional research sources that can be used for part two of the assignment, including journal articles and books on business regulation and international trade theory.
Please use the sources in the outline (see photos)The research.docxDIPESH30
Please use the sources in the outline (see photos)
The research essay is to be 12 pages, typed, double-spaced. 10-12 sources are to be used. It is to be on a social policy area and may focus on Canada, or Canada in comparative perspective.
1.
Discuss the National Child Benefit, introduced in 1997. Has this measure been effective in reducing child poverty? Can this measure be seen as the further extension of neoliberalism, or as a new form of state-provided social investment?
Please make a clear and wordy thesis (highlight this in red) use notions of this thesis throughout the paper please. Clear and concise english as this is a university level paper.
Please include your own ideas as well as recommendations.
if a point is made please provide proof with the sources or readings
Please use APA FORMAT.
Please ensure that the paper follows the format suggested in the outline.
.
Please submit a minimum of five (5) detailed and discussion-provokin.docxDIPESH30
Please submit a minimum of five (5) detailed and discussion-provoking questions based on the recent reading assignments, video clips and the other websites assigned.
Only complete questions will earn credit. Therefore, it is important for you to think carefully about formulating the kinds of questions intended to stimulate conversations. Ask detailed and specific, rather than broad, general questions. Do not ask, for example, ‘When was the first Mission established in California?’ Instead, ask something like ‘What is the ideological agenda behind maintaining figures like Father Junipero Serra as heroic in California textbooks?’
Other examples include:
Does recent news media coverage of the “riots” in Baltimore, Ferguson and other cities promote a message that is pro-police? If not, how does it engender understanding of the root causes of many of the frustrations of local residents?
In the film “Banned in Arizona,” why does Superintendent Tom Horne argue in favor of “individualism” and why does he say that the Mexican American Studies program encourages radical thinking? What, if anything, is radical about the way those courses teach students in Tucson, Arizona?
If the U.S. reinstated a Vietnam War era-like military draft instead of relying upon the current all-volunteer force, would current public support for war change at all? If so, how?
Please consider these guidelines in composing your questions:
1. Make certain to ask at least one question from each source.
2. Ask questions about things that interest you.
3. Write your questions as though you were asking them to the entire class.
4. Be sure to make specific reference to the readings in each question. Many good questions require at least two sentences.
5. Try and use the questions to critique the author's opinion.
6. These homework questions should attempt to raise larger issues and---when possible---to relate the readings to issues in our current world.
"This week, I want us to think about the concept of
bias
, and its application in the places we consume information. This is tricky territory because even the very presentation of this unit is fraught with bias—my personal bias, or frame of reference. I’m going to ask you to read a collection of articles that I think are important, but they all clearly have a perspective and an agenda that comes from a particular worldview. So let’s get that out in the open. Maybe nothing in your liberal arts education is free from bias, but that does not mean we shy away from considering the information, ideas, arguments and critiques.
What is bias? For the purposes of our consideration, bias is really just about a set of values that can color or distort fair judgment. We can sometimes recognize obvious bias in others, especially when people use overtly discriminatory or offensive language, or have a clear political or ideological perspective that makes everything they present go through that lens. But more than anything else, I want us to think a.
Please think about the various learning activities you engaged in du.docxDIPESH30
Please think about the various learning activities you engaged in during this unit.
write one page summarizing the following:
Multiculturalism plays an important role in many schools today.
How can this be incorporated into everyday lessons related to health, safety, and nutrition?
How has your school (or your children’s school) incorporated multiculturalism into their lesson?
.
Please type out the question and answer it underneath. Each question.docxDIPESH30
Please type out the question and answer it underneath. Each question should be about a page long DOUBLE SPACED and cited.
Please use the articles that I PROVIDE!
Due date is this Sunday the 14th.
First two articles answer the questions 1 & 2 , the last article answers question 3
PLEASE FOLLOW INSTRUCTIONS
.
Please use the following technique-Outline the legal issues t.docxDIPESH30
Please use the following technique:
-
Outline the legal issues that you are going to discuss in your answer
-
Define the legal rules that are relevant to the question
-
Apply the legal rules to the facts of the question
-
Formulate a decision of which party should be successful
The use of headings for each relationship discussed is suggested.
Application of legal principles to the facts is the most important and often the hardest step. I am more interested in how you arrived at your answer, than the actual conclusions that you draw. Having said that, the “kitchen sink approach” is not suggested – i.e. spilling all of your knowledge that is vaguely related to the issue raised into your answer.
Please do not simply say, “Andrew is liable for negligence.” You must go through the analysis for why or why not a particular tort claim will be successful.
Use the language of the question.
Be as comprehensive and thorough as possible when responding to each issue – canvas all possible answers. If you have considered the application of a particular contractual concept, but after analysis, you have decided that it is not applicable, please go through your analysis.
If any possible remedies are available to either party, please identify with supporting reasons.
Assume for each relationship that the matter is being litigated in court,
not
through alternative dispute resolution.
DUE: TUESDAY MARCH 24
th
, 2015 at beginning of class
No midterms will be accepted after this date.
Tort Law Problem
Andrew Black is the owner of Confederation Mall (“Mall”) located in New Minas, Nova Scotia. Mr. Black leases out many retail spaces in the Mall to a wide range of businesses. He prides himself as a local success story. The people of New Minas truly admire his entrepreneurial success.
George Orange, owner of Guppy World, a pet fish store, has been a long-time tenant of Confederation Mall. Colin and Darren work for Mr. Orange. Colin was repairing a ceiling fan when he asked Darren to toss him a screwdriver, as Colin was up on a step-ladder at the time. Darren, standing 15 feet away, underhand tosses the screwdriver to Colin. Darren overshoots the toss and the screwdriver shatters a glass fish tank containing a piranha fish. At the same time a customer, Sally, was walking towards the check-out to purchase fish food, when she slipped on the water from the broken tank, fell to the floor and fractured her wrist. She is also bitten on the ankle by the piranha. When Mr. Orange tried to assist Sally, he smelled a strong smell of alcoholic beverage coming from her mouth. Colin noted that Sally appeared to be staggering slightly before falling.
Sally was transported to the hospital by paramedics. The doctor determines that Sally’s foot needs to be amputated due to the piranha bite and she needs to wear a cast on her wrist for 6-8 weeks due to the fracture.
Word of the piranha bite spreads like wild fire throughout the Mall. Evelyn, who suff.
Please use from these stratagies This homework will be to copyies .docxDIPESH30
This homework assignment involves using different educational strategies to complete copies of student work. Some suggested strategies include revising and reading, quick writes, learning logs, data charts, and authors chair.
PLEASE THOROUGHLY ANSWER THE FOLLOWING FIVE QUESTIONS BELOW IN.docxDIPESH30
PLEASE THOROUGHLY ANSWER THE FOLLOWING
FIVE
QUESTIONS BELOW IN A 500 Word Count Discussion
Contrast the dynamics between dominant cultures and subcultures either in a work setting or in society.
Explain why it is important to understand the impact of culture.
Give an example where you demonstrated your awareness and or openness to understanding a cultural difference.
Explain how these differences underscore the need for understanding diversity.
From the information given, develop guidelines for embracing diversity.
YOU MUST USE ONE CITED SCHOLARLY SOURCE. PROPERLY CITED IN APA FORM WITH AN REFERENCE PAGE ON THE BOTTOM. DO NOT USE WIKIPEDIA, THESAURUS, OR ENCYCLOPEDIA (THESE ARE NOT CITED SCHOLARLY SOURCES)
DO NOT TURN IN A PLAGIARIZED PAPER, WE WILL REPORT YOU.....
THIS PAPER IS DUE TODAY 12/11/2014.... 8 HOURS FROM NOW MAX NO LATER....SERIOUS INQUIRIES ONLY...DO NOT TAKE THIS PAPER IF YOU DO NOT KNOW THE TOPIC.....
.
Please share your thoughts about how well your employer, military .docxDIPESH30
Please share your thoughts about how well your employer, military base, or home responds to environmental concerns. Provide examples of some types.
1.
Issue 4
-
Re-Wilding
a. Explain what re-wilding is and how it became an issue.
b. Outline and discuss three main areas of disagreement between Josh Donlan and Rubenstein et al.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Issue 5
-
Military Training and the Environment
a. Explain the history of military training and the environment.
b. Outline and discuss three main areas of disagreement between Benedict Cohen and Jamie Clark.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length.
All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Issue 6
-
Carbon Emission Restrictions
a. Explain the history of carbon emissions and why the debate over carbon emissions exists.
b. Outline and discuss three main areas of disagreement between Paul Cicio and Eileen Claussen.
c. Which side do you agree with? Explain your answer.
Your response should be at least 200 words in length. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
1.
Explain in your own words the Section 2017 initiative which Jamie Clark describes on. Then describe how you think Benedict Cohen would respond to Jamie Clark's presentation of Section 2017. Your response should be at least 200 words in length. as source material for your response. All sources used, must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
Explain carbon trading, carbon offsets, and cap and trade. How are each similar? How are each different? Your response should be at least 200 words in length. as source material for your response. All sources used, , must be referenced; paraphrased and quoted material must have accompanying citations.
Put citation under each answer please
.
Please select and answer one of the following topics in a well-org.docxDIPESH30
Please select and answer one of the following topics in a well-organized and thoughtful paper (a minimum of 10 pages in
length). Your paper must contain at least five references in addition to the text. CSU requires that students use the APA
style for papers and projects. Therefore, the APA rules for formatting, quoting, paraphrasing, citing, and listing of sources
are to be followed.
1. If your employer's EMS is registered to ISO 14000, review the registration process. What were the most
difficult implementation activities? How long did it take? How easy was it to get worker buy-in and
participation? Cost? Others.
.
Please see the attachment for the actual work that is require. This.docxDIPESH30
Please see the attachment for the actual work that is require. This will be due on Sunday Nov 9, 2014.
THIS ISTHE CASE STUDY ATTACHED IS THE DIRECTIONS ON OW TO COMPLETE THE TASK.
Case Study Analysis
When it comes to planning events how many of us take the proper steps and put in the time and how many of us wait till the last minute to plan our event? What's the outcome of an event that has had the proper planning? Usually, a properly planned event is a huge success, and people leave-taking away information that will help them either improve, grow as a person or be successful at their job. People who try to plan events without taking the proper steps find themselves running into many problems along the way. Before they know it, they are out of time to fix any issues or problems that arise. Running out of time can lead to frustration, panic, and eventually the thought of “what am I going to do". Even though the steps to planning an event can be time-consuming, proper planning can ease frustration and anxiety, and lead to a successful event. Proper planning can eliminate the “What am I going to do” question.
Background
In the case study, Carl Robins did not plan for his event very well. He hired 15 new trainees and wanted to schedule a new hire orientation on June 15
th
. His goal was to have the new hires working by July. Carl had only been at his job for six months, and this was his first recruitment effort, so it is crucial for this event to work in Carl’s favor. Carl was contacted by Monica Carrolls, the soon to be Supervisor of the new hires, on May 15
th
. Monica was following up with Carl on how the planning for his orientation was going. She asked him about physicals, drug tests, the training schedule, orientation, manuals, and policy booklets. Carl told Monica that everything would be fine and ready to go in time for orientation. After Memorial Day, Carl finally decided to start planning for his event. Unfortunately; because Carl did not do any planning after hiring the fifteen new trainees and waited till the last minute to plan his event, he ran into multiple problems. When Carl finally decided to start planning for his event, he found that the training room where he was going to hold his orientation was booked for the whole month of June by a fellow associate named Joe. Joe was from technology services and needed the room for computer terminals. When he went to finalize the paperwork for his event, he found that some of the new hire trainees did not have completed transcripts or applications on file; nor had they gone to the clinic for their physicals and mandatory drug screenings. He then checked the orientation manuals and found that there were only three and that those three had missing pages. By now, Carl is very concerned, his anxiety is at a level high, and he is so frustrated that he sits with his head on his desk with the thought of “What am I going to do”.
Alternatives
At this point, Carl can .
Please see the attachment and look over the LOOK HERE FIRST file b.docxDIPESH30
Please see the attachment and look over the "LOOK HERE FIRST" file before handshaking to make sure you're committed to the assignment. Everything you need is within the zip folder attached. Thanks in advance. I had someone working on this and then they stopped answering me. Please don't be that person.
.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Fix the Import Error in the Odoo 17Celine George
An import error occurs when a program fails to import a module or library, disrupting its execution. In languages like Python, this issue arises when the specified module cannot be found or accessed, hindering the program's functionality. Resolving import errors is crucial for maintaining smooth software operation and uninterrupted development processes.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
A review of the growth of the Israel Genealogy Research Association Database Collection for the last 12 months. Our collection is now passed the 3 million mark and still growing. See which archives have contributed the most. See the different types of records we have, and which years have had records added. You can also see what we have for the future.
A workshop hosted by the South African Journal of Science aimed at postgraduate students and early career researchers with little or no experience in writing and publishing journal articles.
Chapter wise All Notes of First year Basic Civil Engineering.pptxDenish Jangid
Chapter wise All Notes of First year Basic Civil Engineering
Syllabus
Chapter-1
Introduction to objective, scope and outcome the subject
Chapter 2
Introduction: Scope and Specialization of Civil Engineering, Role of civil Engineer in Society, Impact of infrastructural development on economy of country.
Chapter 3
Surveying: Object Principles & Types of Surveying; Site Plans, Plans & Maps; Scales & Unit of different Measurements.
Linear Measurements: Instruments used. Linear Measurement by Tape, Ranging out Survey Lines and overcoming Obstructions; Measurements on sloping ground; Tape corrections, conventional symbols. Angular Measurements: Instruments used; Introduction to Compass Surveying, Bearings and Longitude & Latitude of a Line, Introduction to total station.
Levelling: Instrument used Object of levelling, Methods of levelling in brief, and Contour maps.
Chapter 4
Buildings: Selection of site for Buildings, Layout of Building Plan, Types of buildings, Plinth area, carpet area, floor space index, Introduction to building byelaws, concept of sun light & ventilation. Components of Buildings & their functions, Basic concept of R.C.C., Introduction to types of foundation
Chapter 5
Transportation: Introduction to Transportation Engineering; Traffic and Road Safety: Types and Characteristics of Various Modes of Transportation; Various Road Traffic Signs, Causes of Accidents and Road Safety Measures.
Chapter 6
Environmental Engineering: Environmental Pollution, Environmental Acts and Regulations, Functional Concepts of Ecology, Basics of Species, Biodiversity, Ecosystem, Hydrological Cycle; Chemical Cycles: Carbon, Nitrogen & Phosphorus; Energy Flow in Ecosystems.
Water Pollution: Water Quality standards, Introduction to Treatment & Disposal of Waste Water. Reuse and Saving of Water, Rain Water Harvesting. Solid Waste Management: Classification of Solid Waste, Collection, Transportation and Disposal of Solid. Recycling of Solid Waste: Energy Recovery, Sanitary Landfill, On-Site Sanitation. Air & Noise Pollution: Primary and Secondary air pollutants, Harmful effects of Air Pollution, Control of Air Pollution. . Noise Pollution Harmful Effects of noise pollution, control of noise pollution, Global warming & Climate Change, Ozone depletion, Greenhouse effect
Text Books:
1. Palancharmy, Basic Civil Engineering, McGraw Hill publishers.
2. Satheesh Gopi, Basic Civil Engineering, Pearson Publishers.
3. Ketki Rangwala Dalal, Essentials of Civil Engineering, Charotar Publishing House.
4. BCP, Surveying volume 1
Leveraging Generative AI to Drive Nonprofit InnovationTechSoup
In this webinar, participants learned how to utilize Generative AI to streamline operations and elevate member engagement. Amazon Web Service experts provided a customer specific use cases and dived into low/no-code tools that are quick and easy to deploy through Amazon Web Service (AWS.)
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...PECB
Denis is a dynamic and results-driven Chief Information Officer (CIO) with a distinguished career spanning information systems analysis and technical project management. With a proven track record of spearheading the design and delivery of cutting-edge Information Management solutions, he has consistently elevated business operations, streamlined reporting functions, and maximized process efficiency.
Certified as an ISO/IEC 27001: Information Security Management Systems (ISMS) Lead Implementer, Data Protection Officer, and Cyber Risks Analyst, Denis brings a heightened focus on data security, privacy, and cyber resilience to every endeavor.
His expertise extends across a diverse spectrum of reporting, database, and web development applications, underpinned by an exceptional grasp of data storage and virtualization technologies. His proficiency in application testing, database administration, and data cleansing ensures seamless execution of complex projects.
What sets Denis apart is his comprehensive understanding of Business and Systems Analysis technologies, honed through involvement in all phases of the Software Development Lifecycle (SDLC). From meticulous requirements gathering to precise analysis, innovative design, rigorous development, thorough testing, and successful implementation, he has consistently delivered exceptional results.
Throughout his career, he has taken on multifaceted roles, from leading technical project management teams to owning solutions that drive operational excellence. His conscientious and proactive approach is unwavering, whether he is working independently or collaboratively within a team. His ability to connect with colleagues on a personal level underscores his commitment to fostering a harmonious and productive workplace environment.
Date: May 29, 2024
Tags: Information Security, ISO/IEC 27001, ISO/IEC 42001, Artificial Intelligence, GDPR
-------------------------------------------------------------------------------
Find out more about ISO training and certification services
Training: ISO/IEC 27001 Information Security Management System - EN | PECB
ISO/IEC 42001 Artificial Intelligence Management System - EN | PECB
General Data Protection Regulation (GDPR) - Training Courses - EN | PECB
Webinars: https://pecb.com/webinars
Article: https://pecb.com/article
-------------------------------------------------------------------------------
For more information about PECB:
Website: https://pecb.com/
LinkedIn: https://www.linkedin.com/company/pecb/
Facebook: https://www.facebook.com/PECBInternational/
Slideshare: http://www.slideshare.net/PECBCERTIFICATION
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
Keystone Species Research PaperThis writing assignment is desi.docx
1. Keystone Species Research Paper
This writing assignment is designed to provide opportunities for
the student to find, evaluate, select, synthesize, organize, cite,
and present information and arguments clearly and effectively
for understanding scientific issues on personal, societal, and
global levels.
Your Aunt Gertrude recently wrote you a letter mentioning a
news story she saw about a mysterious disease that causes sea
stars to disintegrate. “I don’t know why there’s so much fuss
about sea stars,” she writes. “They just sit there all day in the
ocean and as far as I’m concerned, who would even notice if
they disappeared? Those scientists should take all that time and
money they’re spending on sea stars and put it to good use
saving the whales instead!” Knowing you are enrolled in a
biology course, your aunt wants to know what you think about
the subject. Remember your
aunt is smart but has not taken a biology course in many years.
Your response to her needs to be concise and clear, but
understandable by a non-scientist.
Write a well-researched letter to your aunt that addresses the
following key points (allocate 1 – 2 paragraphs for each point):
1. What is a keystone species? Explain why sea stars are
considered a keystone species in their
community.
2. Explain the potential causes for sea star wasting disease,
and describe the scientific evidence
for each cause.
3. Which cause or causes of the disease may be attributable to
the actions of humans? Explain
how human actions can be linked to the spread of this disease in
sea star populations.
2. 4. Do you think it is important for people to protect keystone
species from decline, such as
taking measures to prevent wasting disease in sea stars? Is it
important to protect keystone species regardless of whether
humans are responsible for the species decline? Explain your
opinion to your aunt. Be sure to support your opinion with
evidence.
*NOTE: Your entire paper, even parts that ask for your opinion,
must be well supported by evidence. Having a good number of
quality references will help in this regard.
Assigned article (must read and use in your paper):
Lopatto, E. (2014, November 18). In search of the starfish
killer: the quest to save the original keystone species. The
Verge
http://www.theverge.com/2014/11/18/7222479/starfish-wasting-
quest-save-keystone-species
Total number of references (3):
You must use and reference the above article and at least two
additional sources for this paper, making the minimum number
of references for your paper 3. You may review relevant
chapters in your textbook and use other sources to fill in
missing information.
It is important that your response to your aunt be thoroughly
researched and clearly written. You should define all your terms
and be concise (1,000 words maximum). This assignment is
designed to give you the experience of applying your knowledge
of biology to a current controversy or topic of interest. You
will use this experience as an informed citizen and consumer
when making decisions in the future that involve biology.
(
Page
1
3. of
4
)
Other resources
.
Secondary Sources: You may also find relevant articles in
recent newspapers, popular magazines,
or popular science journals. These are referred to as
“secondary” sources, since they describe research that was
published elsewhere. Examples of these include The New York
Times, The Los Angeles Times, The Guardian, Time, Scientific
American, Discover, New Scientist, and Science News.
Websites: If you choose to use a website, be aware that most
websites are not peer-reviewed, and often present inaccurate
information. Examples of excellent websites include those of
the National Academy of Science, the National Institute of
Health, the Centers for Disease Control, and WebMD. If
you are unsure of the appropriateness of a website, check with
your instructor.
The structure of your paper
• Be sure to cover all four points mentioned above and define
all technical terms that you use.
•Your paper must be between 750 to 1000 words (not including
references). Your paper should be double-spaced with one-inch
margins, using 12 point Times New Roman font. No cover page
is required.
•You are not allowed to include any quotes in your paper. All
of your writing must beoriginal. You must paraphrase ideas
from the literature, even if you provide an in-text citation.
•Information and ideas that are paraphrased must be
4. accompanied by proper in-text citations in the body of your
paper and a corresponding reference in APA format.
•You need to review your paper for format, spelling, grammar
and usage errors before you submit it, or you will lose points.
•Please also review the grading rubric before submitting your
paper to make sure that you have done everything you can to
receive a good grade.
Guidelines for citing references
In-Text Citations
In-text citations should be in APA format. You can find a
summary of APA guidelines for your reference page at:
https://owl.english.purdue.edu/owl/resource/560/01/
Reference Page
Your bibliography should be formatted using APA
(American Psychological Association) guidelines. You can
find a summary of APA guidelines for your reference page at:
https://owl.english.purdue.edu/owl/resource/560/0
Program Outcome 12 - Template - IT390.docx
Outcome 12
Demonstrate the ability to assist in the creation and execution
of an effective project plan.Performance Indicator
· Describe experiences with project life cycle issues
· Discuss the importance of management planning
· Elaborate on issues relating to risk analysis, task scheduling,
and resource schedulingLearning Statements
·
·
· Evidence Used to Support Learning Statements
5. · Tab C-1, Title
· Tab C-2, Title
· Tab C-3, Title
Tab C-1, Title 1
Tab C-2, Title 2Tab C-3, Title 3
Sample ITA - IT390.pdf
Last Name 1
Integrated Technology Assessment
IT 495
Jane Doe
Student ID: 12345678
P.O. Box 123
Albany, NY, 12345
(555) 123-4567 (Home)
(555) 123-0456 X1234 (Work)
myemailaddress
Term (Month/Year)
6. Last Name 2
Table of Contents
A. Professional Resume
........................................................................................... 5
B. Outcomes
...............................................................................................
............. 9
Outcome 1
...............................................................................................
............ 9
Outcome 2
...............................................................................................
............ 14
Outcome 3
...............................................................................................
............ 18
Outcome 4
...............................................................................................
............ 22
Outcome 5
...............................................................................................
............ 26
12. Last Name 5
Jane Doe
P.O. Box 123
Albany, NY, 12345
(555) 123-4567 (Home) (555) 123-0456 X1234 (Work)
[email protected]
EDUCATION
Excelsior College, Albany, NY Sep 20XX – present
Expect Bachelor of Science August 20XX
Program: Information Technology
My Local State University, My City, XX Aug 20XX – May
20XX
No degree/certificate earned
Program: BS Management Information Systems
Southern State University, My Town, XX Aug 19XX – Dec
19XX
No degree/certificate earned
Program: BS Management Information Systems
Southwestern Public College, XXXXXXXX, XX Aug 19XX –
Dec 19XX
Associate of Science
Program: General Studies
13. TECHNOLOGY-RELATED EMPLOYMENT HISTORY
Big Corporation, Saint Louis, CA June 2008 – Present
Role: Application Developer
Supervisor: My Boss XXX-2XX-XXXX
Description:
Support of physical security applications serving over 100
facilities in XXXXXXX and
XXXXXXXX. Applications including badging, facility access
control, alarm monitoring, CCTV
applications, customized reporting and utility applications, and
interfaces to other systems.
• Rotational on-call support of applications, troubleshooting
high priority, time-sensitive issues
• Support and maintain customized applications and interfaces
written in C# and ASP.NET
with SQL Server backend.
• Implement enhancements as needed based on user
requirements, utilizing full life-cycle
development.
• Work in a team oriented environment, supporting team
members in on-call, troubleshooting,
and development activities.
Another Company, Somewhere, GA June 20XX – June 20XX
Role: Software Developer
Supervisor: My Boss XXX-XXX-XXXX
Description:
mailto:[email protected]
14. Last Name 6
Support of financial applications, primarily a budgeting
application serving over 2,000 users in
seven utility operating companies. Utilized C#, SQLWindows,
Oracle, and Opalis.
• Lead developer converting the budgeting application from
SQLWindows to C# working with
a changing team of two to four developers.
• Responsible for support of the budgeting application providing
timely analysis and resolution
of problems. Provides back up support to team members for
other general ledger financial
applications.
• Implemented enhancements for the budgeting application
utilizing full life cycle strategies
including requirements gathering, analysis, design,
development, testing, implementation and
documentation.
Solution
s delivered according to specifications and implemented on
schedule for the start of Southern Company budgeting periods.
Fun Games, XXXXXXXXX, GZ March 20XX – June 20XX
15. Role: Software Engineer
Description:
Support of lottery applications related to inventory,
warehousing, telemarketing, and distribution
of instant tickets. Utilized Visual Basic 6.0, Visual Basic.Net,
ASP, ASP.NET, Crystal Reports,
and SQL Server.
• Responsible for modifications to existing applications for
implementation of an instant ticket
inventory and distribution system for the XXXXX State Lottery.
Lottery applications must
be implemented accurately and efficiently within strict
requirements and deadlines as
outlined by each lottery jurisdiction.
XXXXXXXXXX, Inc., XXXXXXXX, GA July 20XX – March
20XX
Role: Programmer Analyst
Description:
Full life cycle development of applications for a full service
provider including warehousing,
inventory tracking, accounting, reporting, and marketing
applications. Utilized Visual Basic,
16. Oracle, Crystal Reports, ASP, HTML, Oracle Forms and
Reports, ASP.NET, VB.NET,
CLMA.NET.
• Responsible for completion of demonstration applications for
presentation to lottery officials
for the procurement of lottery contracts. Completed the
applications within strict deadlines
contributing to the acquisition of a contract with the
XXXXXXXX lottery.
• Joined major team-work effort in Lincoln, Nebraska to convert
and implement the XXXXXX
State Lottery system. Contributed to the development and
support of applications in a very
time intensive, deadline-driven project resulting in a successful,
on-time startup.
• Developed marketing analysis business intelligence
application in Oracle Forms, Oracle
Reports, and Oracle PL/SQL packages.
XXXXXXX, XXXXXXX, GA April 20XX – June 20XX
Role: Software Engineer
17. Description:
Delivered graphical user interface solutions for audio/visual
device control systems. Utilized
Visual Basic, ActiveX controls, and Adobe Photoshop to
provide user interfaces for demos,
training classes, and end-users.
Last Name 7
Another Corporation, XXXXXXXXX, MS September 19XX –
March 20XX
Role: Programmer Analyst
Description:
Supported an electric and gas customer service system serving
over 1.5 million customers and
over 500 users. The client/server system consisted of COBOL,
C++, Oracle database, UNIX
platform and knowledge of several development and design
tools.
• Selected to join a major team-work effort with a consulting
18. firm in XXXXXXXXXX,
Florida, to implement enhancements to the customer service
system. Contributed to team
effort by performing high-quality and timely analysis, design,
programming, testing, and
debugging skills. The effort was completed on time and within
budget.
• During support of system in XXXXXXXXX, created extensive
test plans and performed
rigorous testing of code changes. Located errors and inefficient
coding before it was
implemented into production. Made recommendations on most
efficient coding solutions.
Supported an investor record-keeping system serving over
100,000 stock and bondholders and
15 users. Performed installation of system updates, testing,
VSAM file processing, COBOL
programming, JCL creation and execution, and job scheduling
in an MVS mainframe
environment.
• Used initiative and creativity to develop programs to automate
19. several manual
processes, saving time and money for the end-user.
• Maintained the integrity of investor records during a company
merger process by
developing programs to monitor and compare records.
Implemented a document imaging system for the Investor
Services Department to manage
investor correspondence. Business functionality included
scanning, viewing, annotating, storage
and retrieval of documents; document workflow and tracking;
and attachment of computer-
generated files. Utilized Visual Basic, COBOL, SQL, PL/SQL,
Oracle database, and Wang
scanning and viewing imaging controls.
• Worked independently to perform analysis, GUI interface and
database design,
programming, testing, debugging, implementation,
documentation, training and support.
• Implemented the system within budget and time constraints.
The application is successfully
in use to date, preventing the loss of sensitive stockholder
20. correspondence which must be
retained according to SEC regulations.
PROFESSIONAL ACTIVITIES OUTSIDE OF EMPLOYMENT
SETTING
MyRegion.NET Users Group
(http://www.xxxxxxx.org/default.aspx) July 20XX – June
20XX
Meets monthly at Microsoft facilities to discuss and learn .NET
technologies and related
emerging technologies. Presentations and tutorials are given, as
well as access to materials
online.
EMPLOYMENT-RELATED COMMITTEE AND
PROFESSIONAL ACTIVITIES
Systems Advisory Committee June 20XX – December 20XX
Member of committee which was responsible for advising on
application enhancements and
problem resolutions for an investor record-keeping system.
Members contributed to the
enhancement and issues content, then reviewed and prioritized
21. items which contributed to the
decision on the specific items to implement within the system.
http://www.xxxxxxx.org/default.aspx
Last Name 8
Development Resource Group June 20XX – Present
Attend monthly meetings at my current place of employment.
Presentations are given by
employees in the areas of current and emerging technologies in
the work place.
CONTINUING EDUCATION ACTIVITIES
Microsoft Tech-Ed, XXXXXXX, TN May 20XX
Five day event held by Microsoft. Event included seminars,
instructor-led labs, hands-on labs,
and demonstrations. Content included the latest emerging
technologies in the areas of system
architecture, Windows OS, database development, developer
22. tools, mobility technology, office
system, security, SOA, web development and more.
DotNet Code Camp, XXXXXXXX, NY May 20XX
All day event featuring presentations and seminars by experts in
the field of .NET technologies.
ASP.NET MOC, XXXXXXX, MS July 20XX
Five day instructor-led course taken at HP Microsoft Technical
Education Center. Course
content included the fundamentals for developing web sites
using ASP.NET.
SPECIAL COMPETENCIES AND SKILLS
Programming Languages – C#; Visual Basic.NET; Visual Basic
6.0; SQLWindows; C++;
COBOL
Web Development – ASP; ASP.NET; VB Script; JavaScript;
HTML
Programming Tools – Visual Studio 2003/2005/2008; Visual
SourceSafe; PVCS; Reporting
23. Services; MKS Integrity Source Control; MVS JCL/TSO
Database – SQL Server 2000/2005; Oracle; SQL; PL/SQL; SQL
Loader; Stored
Procedures/Packages; Oracle Developer Suite 10G; Oracle
Forms; Oracle Reports; TOAD;
Relational and data warehouse database design; VSAM
Last Name 9
Outcome 1
Apply knowledge of computing and mathematics for problem
solving in the field of information
technology.
24. Characteristics:
• Describe use of appropriate mathematical techniques to aid in
the needs analysis, and the
selection, evaluation, and administration of computer based
systems
• Identify specific abilities to identify and analyze technical
needs of the user
• Demonstrate the ability to apply mathematics in application
development
Learning Statements:
• I supported a budgeting application which was used to input,
calculate, and forecast
budgets for several companies. I was able to demonstrate my
ability to understand the
mathematical concepts within the system, and analyze and
identify necessary
25. modifications or additional functionality based on the users’
needs. Not only did I have
to understand the mathematics from the users’ standpoint so that
I could support the
application, I had to create, modify, and support several Oracle
stored procedures that
contained these mathematical computations to calculate
budgeted dollars. The budgeting
application was used by various operating companies under the
umbrella of a holding
company. Calculations could be as simple as inputting an
expense for the current year
and having the forecast years escalated by a certain percentage.
Or calculations were
more complex when those dollars had to be allocated from one
company out to various
operating companies according to certain allocations rules, such
26. as percentages, head
counts, square footage, etc. Another example of a calculation
involved forecasting
employees’ salaries. This calculation was done differently
depending on the operating
Last Name 10
company. One company chose to group employees together by
job classification and
headcount. Other companies would specifically calculate and
forecast each individual’s
salary based on their current annual salary.
For my supporting evidence, I am submitting an Oracle stored
procedure that was used to
27. implement the employee salary calculations. The stored
procedure called RecalcEmploy
was used to calculate and escalate an individual’s salary over
forecast months. The
employee’s annual salary was multiplied by their usage
percentage, or the percentage for
which a particular budget department is utilizing the employee
to achieve a base salary.
Then their daily salary is calculated by taking that base salary
divided by a predetermined
number of working days in the year. Then each monthly amount
for each forecast year is
determined by multiplying the daily rate by a predetermined
number of working days in
the month and by a predetermined escalation percentage. The
escalation percentage is
what inflates the employee’s salary for future forecast years,
28. accounting for raises in
salary and benefits. The calculation would look somewhat like
this: January Salary =
Daily Rate * (100 + January Escalation Percentage) / 100 *
Number of days in January.
The stored procedure demonstrates my ability to understand
how to apply mathematical
computations within information systems. Supporting evidence
for this learning
statement outcome is located in tab C-1, Budgeting Application
Stored Procedure.
• I am able to demonstrate implementation of mathematics in
application development
after completing IT 412 Advanced Object Oriented
Programming at Excelsior College.
This course implemented programming practices in Java,
including those that contained
29. mathematical calculations. I was able to use programming logic
to implement the
appropriate calculations into my programs and test them
accordingly to ensure the
Last Name 11
outcomes were correct. The first program, pa1prob1, calculates
the values in the Pascal
Triangle and prints out a designated line of the triangle. To
determine a number within
the triangle, you add the two numbers above, to the right and to
the left, of that particular
number in the triangle. If a number is missing to the right or
left, zero is substituted. It
30. begins with number one at the top most of the triangle. My
program uses recursion to
calculate each subsequent row in the triangle using calculations
to determine the value of
each position within that row by taking into account the values
in the previous row. The
calculation is like this: lineValues[num][i] = lineValues[num -
1][i] + lineValues[num -
1][i - 1]. The second program, pa1prob2, uses math to locate
specific values within a
two-dimensional array. The idea is to find all of the values of
‘B’ that are connected
together within the array (top, bottom, left, right). It uses
recursion (one method calling
itself) and mathematical calculations (for example FindB(x + 1,
y + 1)) for incrementing
and decrementing values to locate all the surrounding connected
31. B’s.
As supporting evidence, I am submitting the homework
assignment describing the two
programming problems mentioned above, and the two Java
programs. The Pascal
Triangle program is called pa1prob1. This programming
problem came from
Programming Project 10.7 in the text book, Java Software
Structures. The two-
dimensional array program is called pa1prob2. This problem is
described in the
homework assignment and was not in the text book. These two
programs demonstrate
my ability to think logically and use mathematical programming
to achieve desired
results. Supporting evidence for this learning statement
outcome is located in tab C-2,
32. Advanced Object-Oriented Programming.
Last Name 12
• I am able to demonstrate my ability to understand mathematics
and how it can apply to
computer science after completing TECH 205 Discrete
Structures/Mathematics at
Excelsior College. As noted on Wikipedia
(http://en.wikipedia.org/wiki/Discrete_mathematics), “Discrete
mathematics has become
popular in recent decades because of its applications to
computer science. Concepts and
notations from discrete mathematics are useful in studying and
33. describing objects and
problems in computer algorithms and programming languages,
and have applications in
cryptography, automated theorem proving, and software
development.” I learned many
concepts from discrete mathematics that can be used in
information systems. Among the
topics included were conditional statements, circuits, sequences
and mathematical
induction, set theory, counting and probability, and recursion.
One concept of recursion included using recursively defined
sequences to determine
mathematical outcomes. As my supporting evidence, I will be
submitting an assignment
from Chapter 8, Section 1, of the text book Discrete
Mathematics with Applications. I
34. completed this assignment by determining the appropriate
mathematical sequence to
achieve an outcome. For example, question 23 uses the
Fibonacci sequence to determine
the number of rabbit pairs at the end of the year based on
particular criteria. The criterion
is that a single pair of rabbits is born at the beginning of the
year, rabbit pairs are not
fertile during the first two months of life, and then give birth to
three new male/female
pairs at the end of every month, and no rabbits die. Question
23’s answer gives the
recursive sequence and the resulting number of rabbit pairs at
the end of the year.
Question 35 uses a sequence to determine interest compounded
monthly at 3 percent and
to calculate what the dollar value would be at the end of the
35. year. This last calculation is
http://en.wikipedia.org/wiki/Discrete_mathematics
Last Name 13
a real-world example of mathematics that could be applied in a
computer program to
calculate compound interest over a period of time using the
recursive sequence.
Supporting evidence for this learning statement outcome is
located in tab C-3, Discrete
Mathematics Homework.
Evidence Used to Support Learning Statements:
• Tab C-1, Budgeting Application Stored Procedure
• Tab C-2, Advanced Object-Oriented Programming
36. • Tab C-3, Discrete Mathematics Homework
Last Name 14
Outcome 2
Demonstrate the ability to identify and analyze user needs to
define and create appropriate
computing requirements and solutions.
Characteristics:
• Identify specific involvement and knowledge to identify and
analyze user needs
• Demonstrate the ability to select, create, evaluate and
administer computer based systems
37. • Describe use of appropriate tools to aid in the needs analysis,
and the selection,
evaluation, and administration of computer based systems
Learning Statements:
• I am able to demonstrate using tools in relationship with
analysis of requirements, and the
selection and evaluation of information systems after taking
IT418 Software Systems
Analysis and Design at Excelsior College. This class prepares
you to analyze user needs
and to create requirements and designs that satisfy the user.
The course takes you
through the requirements process, discussing both the
traditional approaches and object-
oriented approaches. The traditional approach makes heavy use
of the data flow diagram
38. tool, while the object-oriented approach uses use cases and
system sequence diagrams.
The course then moves you into the design phase describing the
traditional versus object-
oriented design techniques. The traditional approach of design
uses tools such as the
system flowchart and structure chart, while the object-oriented
approach uses design class
diagrams and sequence diagrams. The course also discusses
design of databases, user
interfaces, and system interfaces.
As my supporting evidence, I am submitting the written part of
my final in this course
which contains applicable questions and answers regarding
analyzing and identifying
39. Last Name 15
user and system needs for requirements and design. In the
assignment, I used a system
flowchart, structure chart, and pseudo code to analyze the
traditional approach for an
electronic gas pump control program. For the object-oriented
approach, I used a system
sequence diagram, class diagram, and a communication
diagram. I also developed a set
of user interface dialogs for the gas pump control program.
This assignment shows my
understanding of analyzing user needs and requirements and
implementing design using
tools. Supporting evidence for this learning statement outcome
is located in tab C-4,
40. Systems Analysis and Design Final.
• I am able to demonstrate identifying user needs and
requirements and implementing them
into a system. I was responsible for gathering the necessary
user requirements for an
upgraded version of a Customer Service Center application and
implementing the new
design. The requirements were initially based on an old
version, but modifications and
enhancements were required for the new version, including
upgrading the software to
.NET from ASP pages. This Customer Service Center
application involved viewing
retailer information, creating trouble tickets for retailer issues,
and scheduling routine
maintenance checks for retailers. Issues and maintenance were
handled by field
41. personnel, for which their information also had to be
maintained. I had to understand the
older version of the application, gather requirements for
enhancements and modifications
from the users, develop a new user interface and data model,
and implement the design in
an upgraded .NET framework.
As supporting evidence, I am submitting a requirements
document that I authored
outlining the requirements for the application upgrade. This
document contains an
overview of the application and upgrade, screen shots for
assisting in building the user
42. Last Name 16
interface with descriptions of each, including any enhancements
or modifications,
descriptions of fields on the screens and their purpose, and the
data model and data
definitions. This document demonstrates my ability to capture
the needed requirements
in order to implement the new system. Supporting evidence for
this learning statement
outcome is located in tab C-5, Customer Service Center
Requirements.
• I am able to demonstrate my involvement in determining and
analyzing user needs. In
my current position, I support a customized reporting
application that reports on physical
security activity, such as personnel granted access in and out of
facilities, or alarms that
43. have resulted from improper access. This application can track
activity for entire
facilities or for individuals. I was responsible for implementing
an upgrade of the
application into the production environment and making sure it
met user needs. While I
did not do the majority of the upgrade programming, I inherited
the application prior to
its induction into production, and I had to finalize several
unfinished elements, debug the
application, and implement some missed and unforeseen user
requirements. In addition, I
also implemented new functionality into the system according to
user requirements,
including two new reports.
For my supporting evidence, I am submitting a detail design
44. document for one of the
newly implemented reports which outlines the requirements and
design. The new report
captures usage statistics for all of the other reports to determine
how many times reports
are run, and can be grouped by report, by the user that is
running reports, or by various
geographical regions. The design leaves open the possibility of
collecting and reporting
on other types of statistics in the future in relation to user
interactions within the reporting
system. This document shows my ability to capture the
requirements, design the report
Last Name 17
45. according to user needs, and implement the appropriate design
into the production
environment. Supporting evidence for this learning statement
outcome is located in tab
C-6, Usage Statistics Report Design.
Evidence Used to Support Learning Statements:
• Tab C-4, Systems Analysis and Design Final
• Tab C-5, Customer Service Center Requirements
• Tab C-6, Usage Statistics Report Design
Last Name 18
46. Outcome 3
Demonstrate the ability to effectively select, evaluate, and
integrate information technologies
based solutions in a user environment.
Characteristics:
• Describe previous and current educational or work experiences
where analysis and
development of good logical design was required
• Document experiences with applications that satisfied end user
requirements
• Provide examples of educational or professional activities that
document the ability to
implement solutions into a user environment
Learning Statements:
• I am able to demonstrate my ability to implement solutions
47. into a user environment that
satisfy end user requirements. I implemented Inventory
Management functionality into
an Instant Ticket Gaming system for a full-service lottery
vendor. An Instant Ticket
Gaming system is responsible for certain administrative tasks
surrounding management
of instant ticket games, inventory, replenishment, order
management, and prize payment.
The Inventory Management functionality that I implemented
pertains to managing instant
ticket packaging, delivery, location and status of inventory,
transferring inventory, and
returning of inventory. I followed a set of requirements in
order to design the
architecture, code the user interfaces, supporting classes and
libraries, test the application,
48. and implement the required functionality into the system
according to the users’ needs.
As supporting evidence, I am submitting a functional
specification that I authored
detailing the Inventory Control design and implementation. The
document provides for
an extensive explanation for each type of Inventory
Management function, including
Last Name 19
screen shots, an overview, controls definitions, restrictions and
validations, screen
behavior and events, error handling, table access, and class
usage. This document was
49. used by both users and technical people to assist in
understanding the functionality of the
Inventory Management portion of the system. The Inventory
Management functionality
was implemented in the system as described by this document
and is evidence of my
ability to implement solutions into a user environment that
satisfies the requirements.
Supporting evidence for this learning statement outcome is
located in tab C-7, Inventory
Management Functional Design.
• I am able to demonstrate my ability to evaluate and integrate
applications into a user
environment. In my current position, I evaluated the need for a
tool to automate a manual
process. My team supports camera systems for which a central
security office can
50. remotely connect to any site to view activity. Occasionally,
cameras at a site may go
down. The routine fix is to call the on-call support person, who
would typically just have
to reboot the pc that the cameras are connected to. The on-call
person has to find the
application IP address from a SharePoint list, connect to the PC
through remote desktop
and issue commands to reboot the PC. The combination of
these tasks takes time. I
designed, coded, and implemented an application which
embedded this process in a .NET
windows application where the user can select the site IP from a
dropdown list, instead of
hunting for it on a SharePoint site. The user can then simply
click a single button to
51. connect to and reboot the pc. Not only has this saved time, but
a future use will be
deploying the application to the help desk users, so that on-call
support will not have to
be called in the middle of the night. With the confidential user
name and password
embedded in the compiled code and the fact that the help desk
person will not have to
Last Name 20
connect to the PC through remote desktop, which would expose
the PC, this safely allows
the help desk person to handle the situation. This empowers the
end-user to have more
control, while relieving the on-call support from having to
52. manually implement the
process each time there is an issue, which can happen on the
average of 10 to 15 days out
of the month.
For my supporting evidence, I am submitting a functional
design document that I
authored describing the functionality of the application. The
application was
implemented as described in this document and is evidence of
my ability to evaluate the
need for the application, analyze how to accomplish the goal
through a program, and
implement the application. Supporting evidence for this
learning statement outcome is
located in tab C-8, Camera Site Status Application.
• I am able to demonstrate my use of good logical design when
53. implementing information
technology solutions in a user environment. In my current
position, I support an interface
between the human resources system and the physical security
application. The goal of
the physical security application is to be able to issue access
badges to contractors that
specifically handle outage work at the power plants. These
contractors work temporarily
at different locations and when they show up for work, if they
do not already have a
badge, they are issued a new one. An unrelated time-tracking
application must also track
the contractor’s time on projects, requiring an employee
number. In order to issue an
employee number, an interface between the HR system and the
physical security system
54. will create an employee number upon issuing a new badge. In
addition to the contractor
badge and employee number, it is also important to track the
company or vendor that they
work for as a contractor. Both the HR system and the physical
security system maintain
Last Name 21
separate lists of vendors or companies, with little current
functionality for data integrity
between the two systems. It has been cumbersome to try to
sync them up and there are
multiple entries of the same vendor in both systems, but maybe
spelled differently. I
55. evaluated, designed, and implemented new functionality into the
physical security
application to assist in keeping vendor names in sync between
the two systems.
For my supporting evidence, I am submitting a document
describing the analysis of the
situation and the design and necessary code modifications to
implement a solution to
assist the badging officers in synchronizing vendors between
the two systems. I had to
understand what the needs were along with the limitations of
the two systems and come
up with a design to be implemented that could satisfy this need.
Supporting evidence for
this learning statement outcome is located in tab C-9, Vendor
Synchronization Interface.
Evidence Used to Support Learning Statements:
56. • Tab C-7, Inventory Management Functional Design
• Tab C-8, Camera Site Status Application
• Tab C-9, Vendor Synchronization Interface
Last Name 22
Outcome 4
Demonstrate the ability to participate effectively in groups or
team projects.
Characteristics:
• Describe involvement in group projects or activities
• Interact effectively with colleagues who have critical
57. involvement with projects
• Discuss how cultural, diversity, and interpersonal issues relate
to groups in professional,
ethical, and social life
Learning Statements:
• I am able to demonstrate my involvement in group projects
after taking CIS 252 Intro to
Data Communications at the local State University. Many of
the classes at the college
encouraged group projects as a way to prepare the student for
working in teams. For a
class project, we were divided into groups and tasked with
writing a paper and presenting
the information to the class. Each group had to work together
to agree on the topic and
subtopics of the paper, divide the subtopics amongst the group
58. members, communicate
effectively to make sure a consistent flow of the paper from one
subtopic to the next and
a consistency in writing style and grammar. We met as a group
outside of class to
accomplish our goal. One of the team members provided a page
on his personal website
where we could share information and updates regarding our
progress. In addition, we
had to review and critique each others work, involving honesty,
openness, trust, and
relationship-building. All members made it a point to
contribute equally, and all
members were involved in the presentation to the class.
As supporting evidence, I am submitting the paper my group
wrote, which includes the
59. names of the participants. The topic of the paper was VOIP and
there were five
Last Name 23
participants on the team. I learned that active participation in a
group project by all
members lends to the success of that project. I learned how to
interact with the other
participants to achieve our common goal, despite our differing
views and opinions, and to
respect the other team members and recognize the value each
participant lent to the
project. Supporting evidence for this learning statement
outcome is located in tab C-10,
Intro to Data Communications Team Paper.
60. • In 2001, I joined a major team-work effort, collaborated
between my company and
XXXXXXXXX Consulting in XXXXXXXXX, Florida, for a
major application upgrade
to a customer service system. I learned more about team work
in this nine month
experience than in any other situation. Members of the team
were both local and from
different parts of the country with varying cultures, offering my
first opportunity to
embrace diversity among my team members. The
XXXXXXXXX culture produced an
excellent team-work environment where everyone was
encouraged to be part of the team,
to be assisted by other team members and to remember to assist
others. Cubicles were set
61. up so that you were assigned to a small team of six or seven
members, all sitting together
within one large cube, which promoted communication and
awareness of what was going
on. My small team was part of larger subsets of teams. They
instituted a 20 minute rule
whereby if you struggled with an issue for more than 20
minutes, you went to your
immediate team members for help first. If the issue still
persisted, you went to team
members at the next level, continuing on until you had a
resolution. Having worked
independently in my former position, I realized the benefits
team work can offer to a
project by exchanging knowledge and offering support to other
members.
XXXXXXXXX also had many team building events and outings
62. which further enhanced
Last Name 24
relationships both in and outside of the office. I have used this
experience going forward
in all of my projects and groups that I work with.
As supporting evidence, I have an email from the Accenture
project supervisor to my
company supervisor regarding my joining the team and my
progress as far as interrelating
to the team. I struggled at first with the newness of working
with a team, but eventually
came to embrace it, as reflected in the email. This is located in
the fifth paragraph down
63. in the email and is shaded. This small paragraph emphasizes
the importance placed on
team work in the Accenture environment and how team work
played a critical role in the
success of the overall project. Each team member, including
myself, was expected to
play their part, and I learned how to do that well within this
culture. Supporting evidence
for this learning statement outcome is located in tab C-11,
XXXXXXXXX Team.
• In my current position, I work with a team of four people plus
a supervisor. Our team
supports each other in the areas of troubleshooting, on call
support duties, and
development activities. The team is responsible for IT support
of critical physical
security applications that protect over 100 facilities in Missouri
64. and Illinois. These
applications include access control to facilities, alarm
monitoring, and camera
monitoring. If applications or equipment fails, the issue needs
to be addressed with a
high priority, while maintaining the security of the facility
either through backup systems
or courtesy patrols by the local police department. Our team
rotates on a 24/7 on call
duty to ensure availability of the systems. Besides the primary
on-call person, we also
make sure there is a secondary backup on-call. In addition, the
other team members are
always willing to assist at any time if the primary or secondary
persons have questions. I
65. Last Name 25
have demonstrated that I can contribute to the team by sharing
the responsibilities and
supporting other members when needed.
As supporting evidence, I am submitting a narrative that
includes explanations and screen
shots of the various tools we use to be an effective team. We
have a team SharePoint site
which consists of troubleshooting guidelines, documentation,
and other materials to assist
all team members by having knowledge at their fingertips.
Team members are expected
to contribute to the site any knowledge that will benefit other
members. This is also
where our on-call schedule and team calendar exist. In addition
66. to support and on-call
situations, the team also shares responsibility for development
activities, such as
modifications and enhancements to applications. We use a
project management tool to
help us track outstanding tasks, resources assigned and
available, statuses of tasks, and
work loads. This tool assists in sharing this work load across
the team members. In
addition, team members are responsible for reviewing other
team members’ work to
ensure quality and correctness across the team. Supporting
evidence for this learning
statement outcome is located in tab C-12, Team Tools.
Evidence Used to Support Learning Statements:
• Tab C-10, Into to Data Communications Team Paper
67. • Tab C-11, XXXXXXXXXX Team
• Tab C-12, Team Tools
Last Name 26
Outcome 5
Demonstrate an ability to understand professional, ethical and
social responsibilities, including
the impacts of culture, diversity, and interpersonal relations.
Characteristics:
• Identify circumstances where professional, ethical and social
responsibilities were dealt
with
68. • Document methods used to deal with professional, ethical, and
social responsibilities
• Discuss when and where cultural, diversity, and interpersonal
relations affect
professional, ethical, and social responsibilities
Learning Statements:
• I completed BUS 323 Business Ethics at Excelsior College
which covered many aspects
of ethics as it relates to our business and personal lives. We
were assigned to write a
paper regarding individual ethical dilemmas in our work place.
I was able to use the
information from the text book and other class readings and
incorporate that into my
paper. For example, my paper involved security guards stealing
time causing negligence
69. and security risks. Before taking this class, I had never thought
about the different ways
that people ‘steal time’ at work, as opposed to stealing
resources, and the fact that is was
an ethical issue. The information I learned from the class
helped me to realize the ethical
situation, analyze it, and determine the appropriate actions.
As my supporting evidence, I am submitting the paper that I
wrote titled The Ethics of
Security. This paper describes the ethical dilemma, the
stakeholders that were affected
by the situation, an analysis of the dilemma, and my
recommendations for solving the
issue in an ethical manner. This assignment allowed me to take
a real-life ethical
70. Last Name 27
situation that occurs within my work place, which lent much
more weight to my learning
as opposed to an invented situation. I was able to demonstrate
my understanding of the
ethical situation and deal with it ‘on paper’ using the
information I learned in the class.
Supporting evidence for this learning statement outcome is
located in tab C-13, The
Ethics of Security Paper.
• I am able to demonstrate my understanding of ethics in
relationship to social
responsibility and differing cultures after completing BUS 323
Business Ethics at
71. Excelsior College. This class discussed many of the ethical
issues facing organizations as
a whole and how that affects their stakeholders. We were
assigned to write a case
analysis based on a selected ethics situation that dealt with
ethics from an organizational
perspective. The case analysis drew on ethical theories such as
teleological,
deontological, and virtue ethics perspectives. I chose a case
that addressed an
organizational ethical situation that encompassed issues of
cultural differences and social
responsibility. The paper addresses the ethical dilemma
presented to a pharmaceutical
company faced with the decision to possibly forgo profits in
order to act in a socially
responsible manner for groups of poverty-stricken stakeholders
72. in economically
depressed countries.
As evidence of my learning, I am submitting the case analysis
titled Merck River
Blindness Case Analysis. The case analysis included describing
the ethical situation, an
analysis of the affected stakeholders, an analysis of the
situation based on ethical
theories, and recommendations as to if the ethical situation was
resolved correctly and if
not, how it could have been. I demonstrated my ability to
address the ethical situation as
it relates to social responsibility using the various theories that
I learned in the course.
73. Last Name 28
Supporting evidence for this learning statement outcome is
located in tab C-14, Merck
River Blindness Case Analysis.
• Upon my employment with my current company, I was
required to spend an entire day in
orientation to get acquainted with the various HR policies and
practices and to learn more
about my employer. Topics of the day include diversity and
ethics within the work place.
Knowledgeable speakers provided valuable information and
relayed real-life stories of
incidences that countered the company’s policies regarding
ethics and diversity. They
provided insight into the benefits of diversity and performing
our duties in an ethical
74. manner. Handouts were provided for further reading, which
also contained links to the
company’s intranet sites for diversity and ethics. To keep
employees current, they are
required to repeat ethics training annually. The company has an
organization devoted to
diversity that sponsors a diversity day, and provides
newsletters, training workshops,
speakers, and community outreach programs.
As evidence of my learning, I am submitting a narrative
containing screenshots of the
ethics and diversity policies on the intranet site where I work.
Having the intranet site
available to me as a ready reference helps to continue to
reinforce what I learned in
training sessions and serves as an additional electronic version
75. of the printed policies I
have been given. The various methods of communicating ethics
and diversity have
strengthened my awareness of and my ability to deal with such
topics. Supporting
evidence for this learning statement outcome is located in tab
C-15, Work Place Policies.
Evidence Used to Support Learning Statements:
• Tab C-13, The Ethics of Security Paper
• Tab C-14, Merck River Blindness Case Analysis
Last Name 29
• Tab C-15, Work Place Policies
76. Last Name 30
Outcome 6
Demonstrate proficiency in communicating technical
information in formal reports,
documentation, and presentations to users and information
technology professionals.
Characteristics:
• Demonstrate the ability to organize and be concise in written
communication
• Use effective grammar and language appropriate to the
audience
• Demonstrate the ability to effectively communicate grasp of
77. technical concepts
Learning Statements:
• I am able to demonstrate that I can effectively communicate
technical concepts to an
audience. I attended a Microsoft Tech-Ed conference in Florida
in 20XX. This was a
five-day conference presenting the latest Microsoft technologies
in the areas of business,
architecture, database, mobility, development tools and more.
Information was presented
by various methods including seminars, instructor-led labs, and
hands-on labs. This was
the most comprehensive conference I have attended where I
learned a great deal of
information in a short time. During my visit, I concentrated on
attending developer
78. sessions and labs to gather information I could take back to my
team members. I learned
about the latest technology surrounding Visual Studio 2008,
such as LINQ, Windows
Presentation Foundation, XAML, Windows Communication
Foundation, and much more.
As a follow up to my conference, I gave a presentation to my
team, approximately 20
members, during our monthly staff meeting reflecting on my
experiences at the
conference and what I had learned.
As supporting evidence, I am submitting my PowerPoint
presentation. I was able to
effectively deliver the information to my team members in a
way the entire audience
79. Last Name 31
could understand as they had varying levels of exposure to
Microsoft and the
technologies I presented. By using minimal information on the
PowerPoint presentation,
they were able to absorb the highlights without being
overloaded with information. I
included website links in the presentation where they could
access additional information.
I could identify that I was gaining the audience’s attention and
interest during the
presentation, and several of the participants asked that I send
out the presentation in
electronic format after the meeting so they could refer to it.
Supporting evidence for this
80. learning statement outcome is located in tab C-16, Microsoft
Tech-Ed Presentation.
• I am able to demonstrate my ability to communicate a set of
instructions that must be
followed for a particular duty in a simple, understandable,
organized manner that the
reader is able to follow in order to complete a task. I
implemented an ETL (extraction,
transformation, and load) process for a business intelligence
data warehouse. This
process was responsible for pulling information from a
transactional sales database into a
data warehouse. The process was part of a list of routine jobs
that a computer operator
executed on a daily basis. To assist the computer operator, I
wrote a procedural
document explaining how the computer operator would execute
81. the ETL process
manually, and how errors should be handled.
For my supporting evidence, I am submitting the procedural
document that assisted both
the operators and technical people on staff. The operators were
able to follow the
instructions and deal with errors as they came up. The
instructions had to be precise and
clear for the operator to understand and follow as I was not
always available and not in
the same geographic location to assist the operator. In addition
to these instructions, I
provided an ERD of the data warehouse to help assist the
technical personnel which I am
82. Last Name 32
also submitting. Supporting evidence for this learning
statement outcome is located in
tab C-17, ETL Operator Procedures.
• I am able to demonstrate my ability to be an effective writer
after taking IT 380 Overview
of Computer Security. In addition to learning the key concepts
of computer security, this
class involved several writing assignments, which sharpened my
written communication
skills. In fact, there were 12 one page papers for lab
assignments, five papers with a
length of three to five pages, a two-part security policy
consisting of two papers of three
to five pages in length, and weekly written discussions that
were graded. I received an A
83. on each writing assignment, reflecting my ability to
communicate the objectives and
purpose of the content, to properly use grammar and language,
and to organize my
thoughts in a manner that was understandable and easy to follow
for the reader.
For my supporting evidence, I am submitting one of the
assignments. This assignment
entailed reading various documents regarding security policies
and the security policy life
cycle, and then summing up the information in a more concise
three to five page
document. I made sure to capture the important topics and
highlights of a security policy
in an understandable, easy-to-read document, demonstrating my
ability to communicate
84. the security policy life cycle effectively. The professor praised
the paper, as well as
many of my writings. Supporting evidence for this learning
statement outcome is located
in tab C-18, Security Policy Lifecycle Paper.
Evidence Used to Support Learning Statements:
• Tab C-16 Microsoft Tech-Ed Presentation
• Tab C-17 ETL Operator Procedures
• Tab C-18 Security Policy Lifecycle Paper
Last Name 33
Outcome 7
85. Demonstrate the ability to identify and analyze the impacts of
information technologies and
computing on public, organizations, and individuals.
Characteristics:
• Discuss practical identification and analysis experiences
relating to public,
organizational, and individual use of informational technologies
• Document use of tools and techniques to protect
organizational assets
• Identify instances or experiences where ethically responsible
issues were encountered
while dealing with the impact of information technology
Learning Statements:
• In my current position, I support physical security applications
that protect over 100
86. facilities. These facilities must be secure 24/7 to the best of the
security officers’ abilities
through the use of these applications. When any of these
applications are down or not
performing as expected, this impacts the officers’ abilities to
perform their job and their
ability to protect not only the facilities, but also any employees
that may be present, and
the surrounding public areas. If the applications are
unavailable, facilities must be
protected through backup systems or courtesy police patrols.
With the age of information
technology, the security personnel are now dependent on readily
available information
through these applications that help them to better perform their
job. I am part of a
rotational on-call support to handle issues and ensure reliability
87. of the physical security
applications. I am able to demonstrate that I can identify the
impact to the user when
there is an issue, analyze the problem and find a resulting
solution in order to maintain
physically secure environments. I use tools and troubleshooting
guidelines to assess the
Last Name 34
I am submitting three items as my supporting evidence. The
first item is a copy of the
24/7 on-call schedule, which displays the primary and
secondary on-call persons each
week, and telephone numbers for all available personnel that
can assist in an issue should
88. it need to be escalated for the quickest resolution possible. The
second item is a sample
help desk case that assists in the work flow for supporting the
issue. The help desk case
tracks the status of the issue, who is assigned to the issue, and
keeps a log of all the
activity that has occurred while capturing, diagnosing, and
resolving the issue. The third
item is a screen shot of one of the troubleshooting guides that
assist me in resolving
issues. These items show that I am responsible as part of a
team for making sure there is
little impact to users when issues arise and that the applications
are as reliable as possible.
Supporting evidence for this learning statement outcome is
located in tab C-19, Physical
89. Security Application Impacts.
• I am able to demonstrate knowledge of tools and techniques to
protect organizational
assets after taking IT 380 Overview of Computer Security at
Excelsior College. This
course discussed many of these tools and techniques to protect
organizational assets on
the network, such as anti-virus software, firewalls, encryption,
and public key
infrastructures. The course also addressed protection from a
physical security standpoint
and processes such as business continuity planning. While
protection of the company
assets are important, it can have an impact on users of those
assets and how users
perceive those tools as being used.
90. Last Name 35
I wrote a paper regarding some of these tools and techniques
and their impact on
employees within the organization, particularly in the area of
privacy rights and ethics.
This paper demonstrates my knowledge of the tools and
techniques that protect company
assets, and I am also able to discuss how these security
technologies impact users at
work. As my supporting evidence, I am submitting this paper.
This paper discusses
topics, such as internet and email monitoring, techniques for
monitoring such as packet
sniffing and keystroke loggers, and the security policies that
91. help employees to
understand and agree to such monitoring. Supporting evidence
for this learning
statement outcome is located in tab C-20, Security Technology
Impacts.
• During my employment at Southern Company, there were a
number of impacts to
systems that arose due to outdated software. These outdated
systems potentially
impacted the users of those systems and their ability to get their
job done. It also
impacted the IT department as far as lack of knowledge and
funds to keep up with
changing technology. One of the major impacts was the
inability to upgrade to Windows
Vista from XP because some of the in-house and vendor
applications would not be
92. compatible, and the time and expense to upgrade applications
was too great. Some
applications were not able to take advantage of enhanced
functionality, such as use of
web services, because the applications were outdated. There
were instances where the
expense of upgrading an application was too great to warrant
the upgrade from a business
perspective. This happened to a capital module of a budgeting
application suite that I
supported when money simply ran out. The company’s
customer service system was so
large that upgrading the technology seemed virtually impossible
from a budget
perspective, and it still runs on COBOL and C++. Then there is
the case of upgrading
93. Last Name 36
one system, which leads to all the ancillary systems having to
either also upgrade or make
significant changes to maintain compatibility. This was the
case with a major general
ledger upgrade, which affected numerous dependent
applications, such as the budgeting
application which I supported. Significant modifications were
required for the budgeting
application to comply with the new general ledger system. This
caused unexpected
financial impacts to the business.
One other significant component of keeping software up-to-date
is knowledge expertise.
94. One of the ways that the company combated this issue was to
create a development
consulting department. This department maintained a group of
employees whose sole
purpose was to keep current with technology, develop standards
and best practices, to
create core foundational architectures and code generators, and
most of all to provide
their expertise and tools to all of the developers within the IT
Department. Developers
were expected to collaborate with the development consulting
department for
development projects, to get advice, make use of the available
tools, and tap into the
wealth of resources provided by this group. There were still
some gaps due to the fact
95. that it took time to develop standards and best practices for the
latest technologies, and
then relay that information to IT developers, but the
development consulting department
did their best to keep the company moving in the right direction
with technology to
minimize impacts and risks to applications. They hired
consultants that had
qualifications in the areas of current and emerging technologies.
The IT departments
were also encouraged to set aside a portion of their budget for
training full-time
employees. This was significantly important as the IT staff
could quickly grow out-of-
date and out-of-touch with current technology, as a big portion
of their time is spent
96. Last Name 37
simply trying to maintain current applications. When I was
hired, I was sent to .NET
training, which helped to realize a faster turnaround when
assisting with upgrading
applications to C# code. I also joined members of the
development consulting
department in attending a Microsoft Tech-Ed conference, which
was a five day
comprehensive event that covered all of the latest Microsoft
development technologies.
This was a useful event for preparing us for future technological
impacts to systems. I
was able to take this information back to my team members to
educate and make them
97. aware of emerging technologies. For my supporting evidence, I
am submitting a
PowerPoint presentation I created and presented to my team
describing the conference.
Training was just one of the many ways the company showed
their commitment to
reducing impacts of technology through education and exposure.
Supporting evidence
for this learning statement outcome is located in tab C-16,
Microsoft Tech-Ed
Presentation.
Evidence Used to Support Learning Statements:
• Tab C-19, Physical Security Application Impacts
• Tab C-20, Security Technology Impacts
• Tab C-16, Microsoft Tech-Ed Presentation
98. Last Name 38
Outcome 8
Demonstrate the ability to identify and apply current and
emerging technologies and tools for
information technologies solutions.
Characteristics:
• Document previous and current educational and professional
experiences with emerging
technologies and tools within the realm of information
technology
• Discuss your knowledge and experience with new information
technologies such as
99. documenting their use within an organization
• Identify specific experiences where the role of new data
communications and networking
technologies plays a large role in an educational or workplace
setting
Learning Statements:
• During my employment at a lottery vendor, most applications
were written in Visual
Basic 6.0. When we began the process of learning about .NET
technologies and
converting applications from VB 6 into .NET, several decisions
had to be made regarding
choice of language and architecture. I was able to assist in
investigating, learning, and
adopting this technology. I did this by purchasing books, doing
internet research, and
100. downloading case studies and tutorials. An architecture was
selected by a senior
developer. This architecture is called CLSB.NET and was
created by XXXXXX
XXXXXXX (http://www.xxxxx.net/cslanet/). This architecture
was chosen as a natural
move from the visual basic environment that existed into a
.NET environment based on
the structure and language. I was able to assist in initially
preparing for and
implementing this architecture into our development
environment.
http://www.xxxxx.net/cslanet/
Last Name 39
101. For my supporting evidence, I am submitting a summary I
composed regarding the
framework and design goals of the selected architecture. This
document shows my
understanding of what was, at that time, emerging technologies,
including the key
technologies and design goals. Also included in my supporting
evidence is a code file
with comments stating that I converted the code to .NET
indicating my ability to embrace
and implement new technologies. Supporting evidence for this
learning statement
outcome is located in tab C-21, Dotnet Architecture and
Standards.
• I attended a Microsoft Tech-Ed conference in Florida in
20XX, which was a five-day
102. conference presenting the latest Microsoft technologies in
various areas, such as
development, architecture, Windows, Office, mobility, and
much more. Information was
presented by various methods including seminars, instructor-led
labs, hands-on labs and
demonstrations. The conference took place within a convention
center of 7 million
square feet with 14,000 attendees, and the amount of
information presented was
overwhelming. During that week, I focused on the developer
track, attending sessions
and completing hands-on labs that were related to the latest
tools and languages for
software developers. The hands-on labs were a great self-
teaching mechanism for putting
into practice the concepts that were learned during sessions.
103. For my supporting evidence, I am submitting a PowerPoint
presentation that I delivered
to my work group summarizing the event and the technologies
that I learned. We had not
used many of these technologies in our work environment, so
the information was
insightful. Some of these technologies are as follows: LINQ,
or Language Integrated
Query, extends .NET languages with the capability to query
objects similar to querying a
database. WPF, or Windows Presentation Foundation, is the
next-generation UI layer
Last Name 40
104. that offers a true separation of presentation from code, making
use of XAML, or
Extensible Application Markup Language. WCF, or Windows
Communication
Foundation, is a unified model for communication between
distributed applications. WF,
or Windows Workflow, is a tool for managing processes through
workflows. Windows
PowerShell is the latest in command line scripting. AJAX, or
Asynchronous JavaScript
and XML allows for a better web experience by allowing
asynchronous callbacks to the
server without having to reload web pages. I also provided
links in the presentation for
more information, including downloads for sample applications,
such as DinnerNow and
Acropolis. Supporting evidence for this learning statement
105. outcome is located in tab C-
16, Microsoft Tech-Ed Presentation.
• In my current position as a software developer supporting
physical security applications,
I am part of a 24/7 rotational on-call support team. Our
applications must have high
availability and be reliable in order to ensure protection of over
100 facilities. There are
only four people on this team, requiring an on-call shift every
fourth week. In order to
make it easier to perform our duties while still maintaining a
personal life outside of
work, the company seeks to make us as mobile as possible with
the needed tools to
perform our duties. I am provided with a wireless laptop and a
Verizon
106. BroadbandAccess card with additional NationalAccess, with 3G
capabilities through
1xEVDO digital wireless standard. This technology gives us
mobility, along with using a
Blackberry for phone calls and email messages. After
establishing an internet connection
using my lap top, I am able to access the network through an
intranet website. The
intranet site has available limited applications for use; however,
it does provide remote
desktop whereby you can log into your work pc to have
everything available to you as if
Last Name 41
you were at work. Unfortunately for us, our laptop was also our
107. computer that we used at
work. The server operations team created virtual desktops for
our support team on a
server. These virtual desktops contain all of the tools and
applications that we use when
at work, including drive mappings to the network. This
technology allows us full
capabilities to perform our duties on the move and at any time
when on-call, without
missing social activities, such as family functions. It is
relatively easy to take a call on
your blackberry, connect to the wireless internet, log into the
intranet, access your virtual
desktop and resolve an issue in tennis shoes and shorts while
eating barbeque, and not
having to be tied to a desk.
108. For my supporting evidence, I am submitting an essay on my
understanding of desktop
virtualization, and the reasons my company is expanding its
implementation of virtual
desktops due to its advantages. Supporting evidence for this
learning statement outcome
is located in tab C-22, Desktop Virtualization.
Evidence Used to Support Learning Statements:
• Tab C-21, .Dotnet Architecture and Standards
• Tab C-16, Microsoft Tech-Ed Presentation
• Tab C-22, Desktop Virtualization
Last Name 42
109. Outcome 9
Demonstrate expertise in the core information technologies such
as data base management,
information management and security, object oriented
programming, computer architecture,
systems architecture, operating systems, and networking.
Characteristics:
• Document experiences with database applications that
satisfied end user requirements
• Provide documented Java or C++ code to illustrate objected
oriented programming
experience
• Document how modern network operating systems are used to
accomplish common tasks
Learning Statements:
110. • In my career as a software developer, I have written various
applications from an object
oriented approach. The primary language I have used is
VB.NET and C#. My programs
encompassed the concepts of interfaces, inheritance,
abstraction, and encapsulation in a
layered architecture, sometimes in a distributed architecture. In
addition to my work
experience, I took IT 412 Advanced Object Oriented
Programming at Excelsior College,
which reinforced the concepts of object oriented programming
using Java.
For my supporting evidence, I am submitting the Java program
called pa3prob1 which
was a class assignment. We had to write the main driver class,
and complete some of the
111. unfinished methods in the classes used by our driver class. The
main file, pa3prob1, is
the driver class that calls other classes to construct a tree,
display the number of children,
and then find the leaves, internal nodes, and the depth of each
node in the tree. It uses a
simple NodeObject class to create objects to add to the tree.
The NodeObjects are added
to the tree collection using the LinkedBinaryTree class, which
uses an object-oriented
Last Name 43
concept called generics. A generic class contains a placeholder
for any type of object that
the class can operate on, yielding more versatility to the class.
112. The LinkedBinaryTree
class implements the BinaryTreeADT interface, another OO
concept. The interface is an
abstraction that defines what operations must be included in the
class, but does not define
how those operations are implemented. The implementation is
defined in the class that
implements the interface. The LinkedBinaryTree class also
makes use of the
ArrayUnorderedList class to traverse the binary tree. The
ArrayUnorderedList class
inherits or extends the ArrayList class, which is another OO
concept. Inheritance allows
the derived class to use the base class’s methods and variables.
Inheritance can be used
for categorization of objects. For example, if you are dealing
with different kinds of
113. animals, the base class can be an animal, and the derived classes
can be a cat, dog, and
giraffe. This Java program shows separation of functionality
into individual classes or
objects, each one having their implementations encapsulated
within the objects and
available to other objects for use. Supporting evidence for this
learning statement
outcome is located in tab C-23, Java OO Programs.
• I am able to demonstrate my ability to implement database
applications. I implemented a
business intelligence data warehouse for a state lottery. The
first step taken was to gather
requirements for the reporting needs and develop a data model.
I worked as part of a
team to develop the data model, using data warehousing
114. concepts, such as
denormalization, and different type of tables then used in a
transactional database, such
as dimension, fact, and aggregate tables. A dimension table
typically describes an entity,
such as a customer, that has attributes that describes it. Fact
tables contain some type of
measurement of the dimension, such as customer orders.
Aggregate tables combine data
Last Name 44
from the fact tables into summaries for the purpose of making
querying faster in the
corresponding business intelligence application that is accessing
the data. Once the
115. database was in place, I created the extraction, transformation,
and load (ETL) process
using staging tables and Oracle stored procedures. The data
was pulled daily from the
transactional tables into staging tables, and the stored
procedures manipulated and moved
the data into the data warehouse in an appropriate format for
fast querying based on
reporting needs. Finally, I worked with another developer to
create the end-user
application using Oracle Forms and Reports to pull the
information out of the data
warehouse and present it to the user in predefined formats and
reports.
For my supporting evidence, I am submitting the ERD which
contains the dimension,
116. fact, and aggregate tables; a screen shot of the ETL application
written in Visual Basic
6.0 which called the Oracle stored procedures to populate the
data warehouse; and finally
sample screen shots of the end-user application that was used to
view the data warehouse
information. Supporting evidence for this learning statement
outcome is located in tab C-
24, BI Data Warehouse.
• I took IT 360 Operating Systems at Excelsior College. In this
course, I learned about the
architecture and functions of operating systems. It discussed
how processes are
scheduled, created and executed; threading concepts;
synchronization of processes
including issues with deadlock; and many other concepts
including memory, paging, file
117. and directory structures, performance, and security. This course
taught me the many
common tasks that operating systems accomplish that we take
for granted, such as
handling files, scheduling the processes running on our
computers, and handling
contention. One chapter was dedicated to the Linux operating
system including the
Last Name 45
design, process management, scheduling, memory management,
file systems, I/O,
security and other concepts. I found this chapter interesting as I
was only familiar with
118. the Windows operating system.
For my supporting evidence, I am submitting a paper I wrote for
this course about the
Linux operating system, showing my ability to research and
learn about the tasks that
operating systems perform. The paper gave an overview of
Linux, the design of the
kernel, process management through the use of a System Call
Interface, paging and
swapping concepts, the file system, scheduling techniques, and
the advantages of Linux
over other choices. Through the research I did to write the
paper and the many concepts I
learned from the course, I am able to identify and be aware of
the common tasks that
operating systems perform. Supporting evidence for this
learning statement outcome is
119. located in tab C-25, Linux Operating System.
Evidence Used to Support Learning Statements:
• Tab C-23, Java OO Programs
• Tab C-24, BI Data Warehouse
• Tab C-25, Linux Operating System
Last Name 46
Outcome 10
Demonstrate the ability to analyze computing and information
security requirements and risks,
and apply the appropriate tools and techniques to protect
organizational data assets in an
120. ethically responsible manner.
Characteristics:
• Discuss practical analysis experiences relating to computer
and information security
• Document use of tools and techniques to protect
organizational data assets
• Identify instances or experiences where ethically responsible
issues were encountered
Learning Statements:
• I am able to demonstrate my knowledge of tools and
techniques to protect organizational
assets after completing IT 380 Overview of Computer Security
at Excelsior College.
This course discussed many of the tools and techniques to
protect organizational assets
121. on the network, such as anti-virus software, firewalls, access
control, encryption, email
security, and public key infrastructures. I was assigned to write
a two-part security
policy. The first paper included identifying three assets within
your work place and
analyzing the threats to those assets. The second paper
involved determining appropriate
tools and techniques to protect the assets.
For my supporting evidence, I am submitting the two-part
security policy. In the first
paper, the assets I selected were a database server, web server,
and desktop pc, which
were assets within my work place. By using this ‘real-world’
scenario, it lent more
practicality to the assignment. I listed and discussed the threats
to these assets, drawing
122. on the information I learned from the text book and course
materials. In the second
paper, I list and discuss preventative measures for the assets
against the listed threats.
Last Name 47
Again, I drew upon the course information and research on the
internet. I was able to
demonstrate my ability to identify the applicable tools and
techniques to protect these
assets. Supporting evidence for this learning statement outcome
is located in tab C-26,
Security Lifecycle Policy.
• In my current position, I have implemented a new tool that
123. will assist in protecting
company assets on the network. The company hires long-term
consultants that need
access to network assets, and those consultants are given
employee numbers and limited
rights for their needs. However, there are another group of
consultants that do not
necessarily need access to the company network, but may need
internet access to get to
their own company email and resources. The company had been
allowing them access
on the network and it was a cumbersome process to set up their
access. In order to limit
the access rights of these consultants and to ease the process of
provisioning, a developer
within our group developed an active directory provisioning
tool which would give the
124. consultants access to a ‘Guest’ domain on the network. As a
member of this domain,
they are limited to internet access only through the company
network and have no other
privileges. This tool is beneficial in securing the network from
the many outside
resources.
For my supporting evidence, I am submitting a narrative of the
application with screen
shots. The developer who was mainly responsible for
developing the application is no
longer with the company, so I am responsible for supporting,
bug fixing, coding missed
requirements, and implementing the application into the
production environment,
working closely with the Data Security department. The
125. application was thoroughly
tested by the users with my assistance, and I implemented some
fixes and enhancements
Last Name 48
for the go live date on June 1, 20XX. This tool makes use of
Active Directory, so I had
to understand Active Directory concepts and structures and how
to implement that within
a .NET environment. Active Directory is one method of using
access control to protect
company assets. Supporting evidence for this learning
statement outcome is located in
tab C-27, Network Access Control.
126. • In my current position, I support physical security
applications. These applications
include access control to facilities, alarm monitoring and also
monitoring sites through
remote camera systems and motion detection. There are certain
areas that are deemed to
be ‘protected’ according to NERC standards. Any information
regarding a protected area
is confidential information, and any written communication
regarding these areas must be
encrypted. When I took my position, the importance of this
confidential information was
explained to me, and that I must act in an ethical manner to
ensure that I do not
communicate any information related to these protected sites in
clear text.
Communication is likely in the form of email, and for email
127. encryption, we use PGP
(Pretty Good Privacy) which was installed on my computer.
Any participant that I send
encrypted emails to regarding this information must also have
PGP installed.
For my supporting evidence, I am submitting a paper I wrote
when taking the course IT
380 Overview of Computer Security at Excelsior College. The
paper summarizes secure
email technologies, and the research I completed to write this
paper helped me to
understand the differing technologies behind securing email.
This paper includes PGP
which was selected by our company as the standard for email
encryption. Since this tool
is relatively easy to use with little additional effort between
sending an encrypted email
128. versus an unencrypted one, this helps us to ensure we make the
ethically responsible
Last Name 49
decision to encrypt any emails that contain confidential data or
are even questionable as
to whether they contain confidential information. Supporting
evidence for this learning
statement outcome is located in tab C-28, Email Security.
Evidence Used to Support Learning Statements:
• Tab C-26, Security Lifecycle Policy
• Tab C-27, Network Access Control
• Tab C-28, Email Security
129. Last Name 50
Outcome 11
Demonstrate the ability to apply best practices and standards for
information technology
applications.
Characteristics:
• Identify specific experiences where the role of data
communications and networking
plays a large role
• Elaborate on the specific details in relation to the function or
operation of user
130. interfacing, program design, or
• Describe experiences with common carriers, regulatory bodies
and relevant standards
Learning Statements:
• During my employment at a lottery vendor, most applications
were written in Visual
Basic 6.0. When the decision was made to move to .NET
technologies and convert the
applications, decisions had to be made regarding choice of an
architectural standard. The
CLMA.NET architecture was selected by a senior developer,
which is an architecture
created by XXXX XXXXX (http://www.xxxxxx.net/cnet/). I
was able to assist in
investigating, learning, and adopting this standard, and I
completed a prototype
131. application that implemented the architecture. I was able to
assist in preparing for and
implementing this architecture into our development
environment.
As supporting evidence, I am submitting a summary I composed
regarding the
framework and design goals of the selected architecture. This
document shows my
understanding of the standard we adopted and the elements of
that architecture that we
were to follow when converting existing applications and
implementing new
http://www.xxxxxx.net/cnet/
Last Name 51
132. applications. Supporting evidence for this learning statement
outcome is located in tab
C-21, Dotnet Architecture and Standards.
• At my current place of employment, I am expected to apply
best practices and standards
towards the development life cycle. I have available to me
various best practices and
standards through SharePoint sites. For example, the Project
Management Office
provides various templates for all stages of the development
lifecycle, including such
documents as high level and detail designs. By using these
standards, I contribute to
consistency within the IT department whereby documents have
the same ‘look and feel’
when read by different parties so they are recognizable and
readable. These templates
133. also provide placeholders for collecting information which
otherwise may get left out
when starting from a blank piece of paper. The templates also
help to be more efficient
and faster at composing a document because the formatting and
relevant topic headings
are included.
For my supporting evidence, I am submitting a document
containing screen shots of the
SharePoint site for the PMO, including the available templates
and samples of templates.
Supporting evidence for this learning statement outcome is
located in tab C-29,
Development Standards.
• In my current position, I support physical security
applications. These applications
134. include access control to facilities through card readers and
alarm monitoring and also
monitoring sites through remote camera systems and motion
detection. There are certain
areas within facilities that are deemed to be ‘protected’
according to NERC standards.
NERC stands for North American Electric Reliability
Corporation and has come about to
ensure the reliability of the power grid. Reliability includes
physical protection of areas
Last Name 52
and equipment that are vital to the health of the transmission
system. There are certain
135. standards and protocols to follow for determining what a NERC
site is, securing that site,
and monitoring these protected sites.
For my supporting evidence, I am submitting an essay regarding
NERC standards,
including how we define and monitor these areas within our
applications, report
incidences, and the standards that are available to us to help us
outline these procedures.
This document demonstrates my ability to understand and
follow regulatory standards
and rules. Supporting evidence for this learning statement
outcome is located in tab C-
30, Regulatory Standards.
Evidence Used to Support Learning Statements:
• Tab C-21, Dotnet Architecture and Standards
136. • Tab C-29, Development Standards
• Tab C-30, Regulatory Standards
Last Name 53
Outcome 12
Demonstrate the ability to assist in the creation and execution
of an effective project plan.
Characteristics:
• Describe experiences with project life cycle issues
• Discuss the importance of management planning
• Elaborate on issues relating to risk analysis, task scheduling,
and resource scheduling
137. Learning Statements:
• I took IT 390 Project Management at Excelsior College. This
course described the
project life cycle and the tools used to assist in project
management. Concepts discussed
were defining the project scope and priorities, the work
breakdown structure, estimating
project time and cost, constructing a project plan, identifying
and managing the risks, and
scheduling necessary resources. The course also discussed how
to be an effective project
manager, managing project teams, evaluating and measuring
project performance, and
oversight. The many topics I learned in this course gave me a
comprehensive overview
of the project life cycle and how each function is important to
138. the process.
For my supporting evidence, I am submitting a complete project
proposal that was my
final assignment for the course. The complete proposal is
comprised of subprojects that
were completed throughout the course. This proposal contains
many of the project
management components learned throughout the course, which
reinforced these concepts
via a practical learning method. I took a real-world proposed
idea from work and
implemented the idea into my project proposal. The idea was to
have a centralized
‘security dashboard’ for managing the various physical security
applications into one
central portal where information is readily available in a highly
observable user interface.
139. Last Name 54
The concepts from the course that were incorporated into the
proposal included a project
proposal (including problem, goal, and objective definition), the
project scope (including
deliverables, milestones, technical requirements, limits and
exclusions), a high-level
project plan using Microsoft Project, risk analysis (including
definition and mitigation
strategies), a communication plan, and a project
recommendation. Supporting evidence
for this learning statement outcome is located in tab C-31,
Project Proposal.
140. • In my current job, we have several ongoing projects, or
projects that are cued up but not
yet being worked on. Our team was using a SharePoint site to
try to manage the various
projects, but SharePoint was lacking as far as keeping track of
statuses, estimating,
retaining related documentation, knowing resource availability
and general tracking of
the projects. Last year, the company implemented a project
tracking and workflow tool
which we now use that helps to capture all of the relevant
information for all of the
ongoing projects. I have been using this tool which has
increased my efficiency as a
developer by helping me to see exactly what is outstanding and
what the status and
priorities are for those outstanding items. It also allows me to
141. attach all of my relevant
documents to each task and project in one area so they are
readily available, and I am not
searching for them on a shared drive or SharePoint site. The
tool also allows me to
follow a pre-determined workflow for the project or tasks. In
addition, this tool allows
for time entries and does comparisons between estimated hours
and actual hours.
For my supporting evidence, I am submitting a narrative of the
tool that describes how
this project workflow tool assists us in our day-to-day tasks.
This tool has shown me
how the importance of planning and scheduling relates to
successful and on-time
implementations. This tool also provides all the steps related to
the project life cycle or
142. Last Name 55
development life cycle within a workflow. Supporting evidence
for this learning
statement outcome is located in tab C-32, Project Management
Tool.
• At my current place of employment, I was involved in a major
project that included
several IT departments and multiple applications used
throughout the company.
Historically, employees were issued a 5 digit employee number.
This year, the 5 digit
numbers will run out, so there was an IT wide initiative to make
any modifications
143. necessary to accommodate a 6 digit employee number. Many
applications had
constraints surrounding the 5 digit limitation within
applications or in interfaces between
applications. And whether or not there were constraints, all
applications dealing with
employee numbers needed to perform testing with a 6 digit
employee number. I
participated in this project, which had a project plan and project
meetings. By sitting in
on the meetings and being able to view the related project
management documents, this
exposed me to the project management process, from
identifying the affected
applications, to ensuring resources were scheduled and a
timeline was constructed and
met to meet the changing requirement. I also was exposed to
144. the importance of the time
limitation, given that 5 digit employee numbers would soon
come to an end, and the
identified risks involved should applications not be tested or
modified to accommodate
the new 6 digit number.
For my supporting evidence, I am submitting the overall project
plan that was written by
the project manager. This plan contains responsible parties,
goals, requirements,
objectives, the stakeholders, and the scope, including the
affected applications, cost
estimate, schedule, risks, and other items. I am also submitting
a detail design that I
wrote which outlines the modifications to applications, stored
procedures, and database
145. Last Name 56
tables for my group’s affected applications. I also implemented
these changes into
production. Supporting evidence for this learning statement
outcome is located in tab C-
33, Employee Number Project.
Evidence Used to Support Learning Statements:
• Tab C-31, Project Proposal
• Tab C-32, Project Management Tool
• Tab C-33, Employee Number Project
146. Last Name 57
Outcome 13
Demonstrate a commitment to professional development and to
continue to engage in lifelong
learning.
Characteristics:
• Describe prior lifelong learning activities
• Describe current lifelong learning activities
• Describe how you plan to continue lifelong learning
Learning Statements:
• To continue lifelong learning, I plan to start attending the
XXXXXXXX DotNet User
Group meetings which are held monthly. I have participated in