Objective
The purpose of this project is to demonstrate your understanding of the following course concepts:
1. How companies or organizations use digital or social media to effectively communicate ideas, information, arguments, and messages to achieve a specific goal.
2. How digital or social media has transformed the communication of idea, information, and arguments in society.
Project Description
The use of digital and social media can have a profound effect on society. This project requires you to research and report on an organization or company who has used or is using digital or social media to create a profound effect, impact, or influence on others.
Project 2 consists of:
1. Project Requirements (topics and content to cover)
2. Presentation Requirements (content organization)
3. Submission Requirements (how to submit your assignment)
4. Presentation Resources
5. Due Date Information and Late Policy
Project Requirements
Select an organization or company that used or uses digital or social media to impact others.
CREATE A PRESENTATION (using a professional presentation application such as Microsoft PowerPoint, Prezi, or Apple Keynote for the Mac) highlighting the information you found.
NOTE 1:
You are required to complete ALL THREE SECTIONS of this project (Sections 1, 2, and 3).
PLEASE SELECT A DIFFERENT COMPANY THAN THE ONE YOU USED IN PROJECT 1.
SECTION 1: ORGANIZATION
OR COMPANY INFORMATION
Provide the following information about the organization or company you select. Answer the questions below:
Item 1:
What is the name of the organization or company?
Item 2:
What year was the organization or company established?
Item 3:
What is the organization's or company’s goal or mission?
Item 4:
Provide the company's or organization's website address (URL), if available.
Item 5:
Where is the company or
organization's
headquarters located?
Section 1 Source:
Include at least
one source
for Section 1. Include this source as an in-slide citation and on your References slide(s).
SECTION 2: DESCRIPTION OF THE DIGITAL OR SOCIAL MEDIA INFLUENCE
Describe how digital or social media was used to
influence others while answering the following questions:
Item 1:
Describe how digital or social media was used to influence others. Provide
at least one
example, instance, or situation that highlights this influence.
Item 2:
In the example, instance, or situation you provided in Item 1, what specific digital or social media platforms were used (e.g. Facebook, Twitter, Instagram, Snap chat, Pinterest, or YouTube) and how were they used?
Item 3:
What occurred as the result of the use of digital or social media? Describe the impact or magnitude of the change.
Section 2 Source:
Include at least
one source
for Section 2. Include this source as an in-slide citation and on your References Slide(s).
To help you with completing Section 2, an example is provided below:
Section 2 Example 1: Invisible Children
.
PROJECT 2 PRESENTATIONObjectiveThe purpose of this projecdavieec5f
PROJECT 2: PRESENTATION
Objective
The purpose of this project is to demonstrate your understanding of the following course concepts:
How companies or organizations use digital or social media to effectively communicate ideas, information, arguments, and messages to achieve a specific goal.
How digital or social media has transformed the communication of idea, information, and arguments in society.
Project Description
The use of digital and social media can have a profound effect on society. This project requires you to research and report on an organization or company who has used or is using digital or social media to create a profound effect, impact, or influence on others.
Project 2 consists of:
Project Requirements (topics and content to cover)
Presentation Requirements (content organization)
Submission Requirements (how to submit your assignment)
Presentation Resources
Due Date Information and Late Policy
Project Requirements
Select an organization or company that used or uses digital or social media to impact others.
CREATE A PRESENTATION (using a professional presentation application such as Microsoft PowerPoint, Prezi, or Apple Keynote for the Mac) highlighting the information you found.
While you may use other programs to create the file type submitted must be .pptx or .ppt
******File submitted is required to be a .pptx or .ppt file.******
*****References and in paper(text) citations required as per APA.*******In text citations may be on the slides or below in slide notes area.
NOTE 1:
You are required to complete ALL THREE SECTIONS of this project (Sections 1, 2, and 3).
NOTE 2:
PLEASE SELECT A DIFFERENT COMPANY THAN THE ONE YOU USED IN PROJECT 1.
SECTION 1: ORGANIZATION
OR COMPANY INFORMATION
Provide the following information about the organization or company you select. Answer the questions below:
Item 1:
What is the name of the organization or company?
Item 2:
What year was the organization or company established?
Item 3:
What is the organization's or company’s goal or mission?
Item 4:
Provide the company's or organization's website address (URL), if available.
Item 5:
Where is the company or
organization's
headquarters located?
Section 1 Source:
Include at least
one source
for Section 1. Include this source as an in-slide citation and on your References slide(s).
SECTION 2: DESCRIPTION OF THE DIGITAL OR SOCIAL MEDIA INFLUENCE
Describe how digital or social media was used to influenced others while answering the following questions:
Item 1:
Describe how digital or social media was used to influence others. Provide
at least one
example, instance, or situation that highlights this influence.
Item 2:
In the example, instance, or situation you provided in Item 1, what specific digital or social media platforms were used (e.g. Facebook, Twitter, Instagram, Snap chat, Pinterest, or YouTube) and how were they used?
Item 3:
What occurred as the result of the use of digital ...
Slides for talk on "Metrics for the Social Web" given by BriaN Kelly UKON at the DevCSI workshop on Open Data and the Institutional Web held at the University of Reading on 25 July 2011.
See http://www.ukoln.ac.uk/web-focus/events/workshops/devcsi-201107/
The following is adapted from the work of Paul Martin Lester.In .docxoreo10
The following is adapted from the work of Paul Martin Lester.
In order to find meaning from a visual message, you need to learn a systematic way for studying images.
1. Make an inventory list of every element in the image,
2. Note the lighting used in the image,
3. Note any eye contact by subjects in the image,
4. Note the visual cues of color, form, depth, and movement,
5. Note how the gestalt laws apply toward the composition of picture,
6. Note any semiotic signs that are a part of the image's content, and
When you've gone through the six steps noted above, it's time to apply the six perspectives for visual analysis to the piece. Each perspective is noted below.
Personal Perspective - Gut Reaction
Rick Williams' Omniphasism (all in balance) or Personal Impact Analysis
1. What is the picture's story?
2. List primary words.
3. List associative words.
4. Select most significant associative words.
5. Pair up primary & most significant associative words.
6. Relate word pairs with your own feelings.
7. Relate any inner symbolism.
8. Write a brief story concerning personal insights.
Historical Perspective - The image's place in history
· When do you think the image was made?
· Is there a specific style that the image imitates?
Technical Perspective - Consider the process decisions
· How was the image produced?
· What techniques were employed?
· Is the image of good quality?
Ethical Perspective - Moral Responsibility
· Was the image maker socially responsible?
· Has any person's rights been violated?
· Are the needs of viewers met?
· Is the picture aesthetically appealing?
· Do the picture choices reflect moderation?
· Is the image maker empathetic with the subject?
· Can all the image choices be justified?
· Does the visual message cause unjustified harm?
Cultural Perspective - Societal Impact
· What is the story and the symbolism involved with the elements in the visual message?
· What do they say about current cultural values?
Critical Perspective - Reasoned Opinion
· What do I think of this image now that I've spent so much time looking and studying it?
Running head: MEDIA ANALYSIS PROJECT 1
MEDIA ANALYSIS PROJECT 4
Media Analysis Project
Name:
University Affiliation:
Date:
Media Analysis Project
For my media analysis project, I would like to analyze the internet. The particular website being the company website of Kendra Scott Inc. I have developed much interest in the internet due to the revolution it has brought to the world. Personally looking at the work being an e-commerce website, I just like the easy navigation that it has based on the menu buttons.
Website development has evolved just after the introduction of the internet. Before that, it was difficult to learn about the happenings on the other side of the world, ...
Businesses are seeing the value of social media, and are chomping at the bit to get started. How, though? The first two steps are to determine your objectives and listen. This presentation reviews how you can do those steps.
PROJECT 2 PRESENTATIONObjectiveThe purpose of this projecdavieec5f
PROJECT 2: PRESENTATION
Objective
The purpose of this project is to demonstrate your understanding of the following course concepts:
How companies or organizations use digital or social media to effectively communicate ideas, information, arguments, and messages to achieve a specific goal.
How digital or social media has transformed the communication of idea, information, and arguments in society.
Project Description
The use of digital and social media can have a profound effect on society. This project requires you to research and report on an organization or company who has used or is using digital or social media to create a profound effect, impact, or influence on others.
Project 2 consists of:
Project Requirements (topics and content to cover)
Presentation Requirements (content organization)
Submission Requirements (how to submit your assignment)
Presentation Resources
Due Date Information and Late Policy
Project Requirements
Select an organization or company that used or uses digital or social media to impact others.
CREATE A PRESENTATION (using a professional presentation application such as Microsoft PowerPoint, Prezi, or Apple Keynote for the Mac) highlighting the information you found.
While you may use other programs to create the file type submitted must be .pptx or .ppt
******File submitted is required to be a .pptx or .ppt file.******
*****References and in paper(text) citations required as per APA.*******In text citations may be on the slides or below in slide notes area.
NOTE 1:
You are required to complete ALL THREE SECTIONS of this project (Sections 1, 2, and 3).
NOTE 2:
PLEASE SELECT A DIFFERENT COMPANY THAN THE ONE YOU USED IN PROJECT 1.
SECTION 1: ORGANIZATION
OR COMPANY INFORMATION
Provide the following information about the organization or company you select. Answer the questions below:
Item 1:
What is the name of the organization or company?
Item 2:
What year was the organization or company established?
Item 3:
What is the organization's or company’s goal or mission?
Item 4:
Provide the company's or organization's website address (URL), if available.
Item 5:
Where is the company or
organization's
headquarters located?
Section 1 Source:
Include at least
one source
for Section 1. Include this source as an in-slide citation and on your References slide(s).
SECTION 2: DESCRIPTION OF THE DIGITAL OR SOCIAL MEDIA INFLUENCE
Describe how digital or social media was used to influenced others while answering the following questions:
Item 1:
Describe how digital or social media was used to influence others. Provide
at least one
example, instance, or situation that highlights this influence.
Item 2:
In the example, instance, or situation you provided in Item 1, what specific digital or social media platforms were used (e.g. Facebook, Twitter, Instagram, Snap chat, Pinterest, or YouTube) and how were they used?
Item 3:
What occurred as the result of the use of digital ...
Slides for talk on "Metrics for the Social Web" given by BriaN Kelly UKON at the DevCSI workshop on Open Data and the Institutional Web held at the University of Reading on 25 July 2011.
See http://www.ukoln.ac.uk/web-focus/events/workshops/devcsi-201107/
The following is adapted from the work of Paul Martin Lester.In .docxoreo10
The following is adapted from the work of Paul Martin Lester.
In order to find meaning from a visual message, you need to learn a systematic way for studying images.
1. Make an inventory list of every element in the image,
2. Note the lighting used in the image,
3. Note any eye contact by subjects in the image,
4. Note the visual cues of color, form, depth, and movement,
5. Note how the gestalt laws apply toward the composition of picture,
6. Note any semiotic signs that are a part of the image's content, and
When you've gone through the six steps noted above, it's time to apply the six perspectives for visual analysis to the piece. Each perspective is noted below.
Personal Perspective - Gut Reaction
Rick Williams' Omniphasism (all in balance) or Personal Impact Analysis
1. What is the picture's story?
2. List primary words.
3. List associative words.
4. Select most significant associative words.
5. Pair up primary & most significant associative words.
6. Relate word pairs with your own feelings.
7. Relate any inner symbolism.
8. Write a brief story concerning personal insights.
Historical Perspective - The image's place in history
· When do you think the image was made?
· Is there a specific style that the image imitates?
Technical Perspective - Consider the process decisions
· How was the image produced?
· What techniques were employed?
· Is the image of good quality?
Ethical Perspective - Moral Responsibility
· Was the image maker socially responsible?
· Has any person's rights been violated?
· Are the needs of viewers met?
· Is the picture aesthetically appealing?
· Do the picture choices reflect moderation?
· Is the image maker empathetic with the subject?
· Can all the image choices be justified?
· Does the visual message cause unjustified harm?
Cultural Perspective - Societal Impact
· What is the story and the symbolism involved with the elements in the visual message?
· What do they say about current cultural values?
Critical Perspective - Reasoned Opinion
· What do I think of this image now that I've spent so much time looking and studying it?
Running head: MEDIA ANALYSIS PROJECT 1
MEDIA ANALYSIS PROJECT 4
Media Analysis Project
Name:
University Affiliation:
Date:
Media Analysis Project
For my media analysis project, I would like to analyze the internet. The particular website being the company website of Kendra Scott Inc. I have developed much interest in the internet due to the revolution it has brought to the world. Personally looking at the work being an e-commerce website, I just like the easy navigation that it has based on the menu buttons.
Website development has evolved just after the introduction of the internet. Before that, it was difficult to learn about the happenings on the other side of the world, ...
Businesses are seeing the value of social media, and are chomping at the bit to get started. How, though? The first two steps are to determine your objectives and listen. This presentation reviews how you can do those steps.
ITS835 enterprise risk managementChapter 3ERM at Mars, Incor.docxvrickens
ITS835 enterprise risk management
Chapter 3
ERM at Mars, Incorporated: ERM for Strategy and Operations
Introduction
Mars’ ERM history
Phase 1 –Crash and Burn
Phase 2 -Success
Global rollout
Reporting
Operating workshops
Technology
Aggregation
Template evolution
Conclusion
Mars’ erm history
Mars, Incorporated
Privately held -> migration to non-family management
Decentralized management
Leadership had legacy commitment to risk management
ERM was viewed as an evolution
COSO versus bespoke approach
COSO –Committee of Sponsoring Organizations structure
Bespoke approach won
Phase 1
Failed due to being impractical and overly complex
Phase 2
Simpler and targeted
Planning workshops
Desire to align senior management goals with ERM
Started with simple template
Operating plan initiative sheet
Objective
Score
Risk column
Risk treatment column
Management team met to define and rank
Risks
Risk treatments
Changed label from “mitigations”
Global rollout
Used lessons learned from pilot
Each unit has specific nuances
Interviewing GM and CFO together saved subsequent interview time
Workshops helped to identify
Gaps in risk management readiness
High-risk initiatives
Ongoing activities with unexpected high risk
reporting
Color-coding adds
Urgency
Clarity
Groups are defined
Clusters
Score represents
Confidence of meeting goals
Reporting [cont’d]
Reporting [cont’d]
Reporting [cont’d]
Operating workshops
Several ongoing changes
Technology
Early-on, process was technology agnostic
Word -> Excel
Excel -> purpose-built software
ERM supports aggregation
More complete view of organizational impact of risk
Continual template evolution
Added risk treatment owners and due dates
summary
Mars received an award for their ERM
Corporate Executive Boards’ “Force of Ideas Award” for ERM
Key factors for ERM success
Alignment with Mars’ principles
Focus on meeting objectives
Operational
Strategic
Flexible
Realistic
WEEK 2 ASSIGNMENTS
BUS 3022: 600-800 WORDS
Dell's Supply Chain
Many companies have achieved excellent success as a result of emphasizing online sales and an associated distribution network. Dell has been one of the most successful at that, by offering significant customization direct to end users. As noted in a prior edition of our textbook:
“Dell is able to exploit most of the responsiveness-enhancing opportunities offered by the Internet for customized servers. The company uses the Internet to offer a wide variety of customized server configurations with the desired chassis, processor, memory, and operating system. Customization allows Dell to satisfy customers by giving them a product that is close to their specific requirements. The customization options are easy to display over the Internet, allowing Dell to attract customers who value this choice.”
“The Internet allows companies such as Dell and Apple to bring new products to market quickly. This is particularly important in the compute ...
Humans, especially children, have an amazing capability to learn l (2).docxpauline234567
Humans, especially children, have an amazing capability to learn language. Within the first year of life, children will have learned many of the necessary concepts to have functional language, although it will still take years to develop fully. But are humans unique in their ability to acquire language? As you know, as a graduate student I was chosen to work with Dr. Roger Fouts at the Chimpanzee and Human Communication Institute (CHCI), a sanctuary for chimpanzees used in ape language research and home to world renowned Washoe, the first nonhuman to acquire a human language. Four of the chimpanzees, Washoe, Moja, Tatu and Dar were immersed in American Sign Language (ASL), and they learned to communicate by using signs in their daily interactions. Loulis, Washoe's adopted son was not cross-fostered. He acquired his signs from Washoe and the three other chimpanzees. He was the first non-human to learn a human language from other non-humans. Thus, Loulis observed the other chimpanzees using the signs of ASL around him, like CHASE and TICKLE during play interactions. Washoe would even mold his hand into signs like MORE for new food. By observing and researching how Washoe and her family learn and use the signs of ASL, we have gained a better understanding of the patterns of language development that bridge species barriers. In addition to our use of language, we have also seen that our emotions and social bonds are very similar to chimpanzees. Read the attached excerpt from "Next of Kin" by Dr. Roger Fouts & Stephen Tukel Mills and answer the following questions:
1. What was Washoe doing in the tree that day that "left Harre shaken"?
2. What did Washoe do that deaf human children also do? (Give five examples)
3. What were some behaviors Washoe exhibited that proved she hadn't been trained? (Give four examples)
4. Explain how a language study like this can change a person's view of the world.
Attachments
excerpt 2 Next of Kin.pdf
(1.28 MB)
Wk10 Discussions
1.
Please respond to the following:
· Discuss whether the term "corporate entrepreneurship" is an oxymoron. Can corporations—especially large ones—be innovative? Support your answer with examples.
· Use the Internet to find an example of two corporate innovations—one brought about through autonomous strategic behavior and one developed through induced strategic behavior. Which innovation seems to hold the most promise for commercial success, and why?
2.
· There is often talk in the recent news about increasing tariffs on some imports. Watch your instructor's video,
Incidence of a Tariff, to prepare for this week's discussion.
· Start your discussion by responding to these questions:
. When the United States puts tariffs on imports, who do you think ultimately pays these tariffs? Is it the foreign companies selling the import, American consumers, or both? Explain your answer.
. Is it good or bad for American consumers when the United States puts tariffs on .
Exploiting The Social Aspects Of Web 2.0 In HE Institutionslisbk
Slides for talk on "Exploiting The Social Aspects Of Web 2.0 In HE Institutions".
See http://www.ukoln.ac.uk/web-focus/events/seminars/nottingham-2008-04/
COM 106 help Making Decisions/Snaptutorialpinck2324
For more classes visit
www.snaptutorial.com
Choose two of the following scenarios. For each scenario you choose, answer each component as clearly and completely as possible.
You are writing up your weekly responses for your COM106 course and want to respond to a classmate who discusses the need to use social media in a job search. You are not familiar with this phrase.
Describe what sort of search you would conduct to help you in responding to this student and why. What search engine(s) or database(s) might you use and why? What search terms? How would you go about evaluating the credibility of the information you found?
Week 1 Assignment First StepsWrite a two- to three-page analysi.docxjessiehampson
Week 1 Assignment First Steps
Write a two- to three-page analysis of your community and the existing programs for youth within this community using the following guidelines:
1. Using your research from the U.S. Census Bureau’s American Fact Finder (Links to an external site.), Pew Research Center (Links to an external site.), and the National Center for Education Statistics (Links to an external site.), create an info-graphic picture of your community to support your written analysis. Embed the info-graphic picture into your analysis as a chart illustrating the written analysis. Your info-graphic and analysis should illustrate those statistics that have direct bearing on the 40 Developmental Assets identified by the Search Institute which can include, but are not limited to:
· Population demographics, including ethnicity and special populations
· Economic status
· Housing and household demographics
2. Summarize youth-related issues that seem to be at the forefront of your community. Use specific examples to support your observations (newspaper headlines, community meetings, political platforms, etc.) and cite your text when appropriate.
3. In support of your written analysis, create and embed a table that identifies the resources for young people that already exist in your community. Your table should include:
· The name of the program
· A short description of the program’s mission
· An analysis how the program engages with the youth they serve (Are they partners with adults?)
· Summarize which of the 40 Developmental Assets the program focuses on or attempts to meet with their program
Conclude your analysis by brainstorming ideas on how you can plug into one or more of the existing programs using the Asset Building Framework. Focus specifically on where you can make an impact in strengthening relationships within families, among peers, within schools and other institutions, in programs and outside of programs, and across generations. Your analysis must be two to three pages in length (excluding the title and reference pages), double spaced, and be formatted according to APA style as outlined in the Ashford Writing Center. Two references, charts, and tables should be properly cited. Your info-graphic and analysis will be used in your Final Paper and presentation.
Instructor Guidance
Week 1
Welcome to week 1 of EDU 635. In this week we begin our learning about communities and the youth that live and play in those communities. We will be looking at the communities and the culture of those communities, and looking at data about our communities to try to build a synopsis of what’s going on there. With all that, we are hoping to identify what role youth programs play in our community, and the roles that adults play in providing those programs.
In your introductions for the week, you will of course be telling us a little bit about yourself. I encourage you to use one of the digital tools listed as options. Later this week and in the future, y ...
The best online videos beg the question: "How did they do that?!” Video remains a mystery to many organizations because of all the questions that go into even a 30-second video: What do we want to achieve? What is our message? What style will we use? How we will distribute this? How will we measure success?
Our panel features organizations big and small as they talk about the process and decisions that went into creating one of their videos. We'll discuss the strategy, the production, and the distribution—then show the result! Organizations will walk away with a clear understanding of how the most strategic, successful videos are made and used.
http://www.see3.net/event/2010-nonprofit-technology-conference
Building Communities: Increasing Online Engagement and AwarenessTechSoup Canada
TechSoup Canada presents a webinar for
the Canadian Association for Community Living on
How to build an online community through social media channels, what social media channels are out there, which ones should you be using, how to fit managing social media into your schedule, and tips for creating and curating great content to keep your community engaged.
One of the most common used risk management tools is the Incident Re.docxAKHIL969626
One of the most common used risk management tools is the Incident Reporting.
More recently, incident Reporting system incorporated computer technology that will provide information like:
1. Major incident category.
2. Early identification of patterns and trends in the "how" and "why" of untoward events.
3. Code vulnerability inductors.
Discuss the potential benefits to use this technology. There is any Limitation for the system? Explain.
.
One of the first anthropologists to examine religion in Africa was E.docxAKHIL969626
One of the first anthropologists to examine religion in Africa was Edward Evans-Pritchard in the early 1900's. You will explore what he learned about the Azande by watching the first 23 minutes of "
Strange Beliefs: Sir Edward Evans-Pritchard
".
Instructions:
When you are done watching the video answer the following questions by referring to specific information from the video, NOT outside sources:
How do the Azande people featured in the film explain unfortunate events and what do they do about it?
According to your textbook, what is religion and how would Azande religious beliefs be classified?
Do you think Azande beliefs are any more or less rational than other religious beliefs like Judaism, Christianity, Islam, or Buddhism?
.
More Related Content
Similar to ObjectiveThe purpose of this project is to demonstrate you.docx
ITS835 enterprise risk managementChapter 3ERM at Mars, Incor.docxvrickens
ITS835 enterprise risk management
Chapter 3
ERM at Mars, Incorporated: ERM for Strategy and Operations
Introduction
Mars’ ERM history
Phase 1 –Crash and Burn
Phase 2 -Success
Global rollout
Reporting
Operating workshops
Technology
Aggregation
Template evolution
Conclusion
Mars’ erm history
Mars, Incorporated
Privately held -> migration to non-family management
Decentralized management
Leadership had legacy commitment to risk management
ERM was viewed as an evolution
COSO versus bespoke approach
COSO –Committee of Sponsoring Organizations structure
Bespoke approach won
Phase 1
Failed due to being impractical and overly complex
Phase 2
Simpler and targeted
Planning workshops
Desire to align senior management goals with ERM
Started with simple template
Operating plan initiative sheet
Objective
Score
Risk column
Risk treatment column
Management team met to define and rank
Risks
Risk treatments
Changed label from “mitigations”
Global rollout
Used lessons learned from pilot
Each unit has specific nuances
Interviewing GM and CFO together saved subsequent interview time
Workshops helped to identify
Gaps in risk management readiness
High-risk initiatives
Ongoing activities with unexpected high risk
reporting
Color-coding adds
Urgency
Clarity
Groups are defined
Clusters
Score represents
Confidence of meeting goals
Reporting [cont’d]
Reporting [cont’d]
Reporting [cont’d]
Operating workshops
Several ongoing changes
Technology
Early-on, process was technology agnostic
Word -> Excel
Excel -> purpose-built software
ERM supports aggregation
More complete view of organizational impact of risk
Continual template evolution
Added risk treatment owners and due dates
summary
Mars received an award for their ERM
Corporate Executive Boards’ “Force of Ideas Award” for ERM
Key factors for ERM success
Alignment with Mars’ principles
Focus on meeting objectives
Operational
Strategic
Flexible
Realistic
WEEK 2 ASSIGNMENTS
BUS 3022: 600-800 WORDS
Dell's Supply Chain
Many companies have achieved excellent success as a result of emphasizing online sales and an associated distribution network. Dell has been one of the most successful at that, by offering significant customization direct to end users. As noted in a prior edition of our textbook:
“Dell is able to exploit most of the responsiveness-enhancing opportunities offered by the Internet for customized servers. The company uses the Internet to offer a wide variety of customized server configurations with the desired chassis, processor, memory, and operating system. Customization allows Dell to satisfy customers by giving them a product that is close to their specific requirements. The customization options are easy to display over the Internet, allowing Dell to attract customers who value this choice.”
“The Internet allows companies such as Dell and Apple to bring new products to market quickly. This is particularly important in the compute ...
Humans, especially children, have an amazing capability to learn l (2).docxpauline234567
Humans, especially children, have an amazing capability to learn language. Within the first year of life, children will have learned many of the necessary concepts to have functional language, although it will still take years to develop fully. But are humans unique in their ability to acquire language? As you know, as a graduate student I was chosen to work with Dr. Roger Fouts at the Chimpanzee and Human Communication Institute (CHCI), a sanctuary for chimpanzees used in ape language research and home to world renowned Washoe, the first nonhuman to acquire a human language. Four of the chimpanzees, Washoe, Moja, Tatu and Dar were immersed in American Sign Language (ASL), and they learned to communicate by using signs in their daily interactions. Loulis, Washoe's adopted son was not cross-fostered. He acquired his signs from Washoe and the three other chimpanzees. He was the first non-human to learn a human language from other non-humans. Thus, Loulis observed the other chimpanzees using the signs of ASL around him, like CHASE and TICKLE during play interactions. Washoe would even mold his hand into signs like MORE for new food. By observing and researching how Washoe and her family learn and use the signs of ASL, we have gained a better understanding of the patterns of language development that bridge species barriers. In addition to our use of language, we have also seen that our emotions and social bonds are very similar to chimpanzees. Read the attached excerpt from "Next of Kin" by Dr. Roger Fouts & Stephen Tukel Mills and answer the following questions:
1. What was Washoe doing in the tree that day that "left Harre shaken"?
2. What did Washoe do that deaf human children also do? (Give five examples)
3. What were some behaviors Washoe exhibited that proved she hadn't been trained? (Give four examples)
4. Explain how a language study like this can change a person's view of the world.
Attachments
excerpt 2 Next of Kin.pdf
(1.28 MB)
Wk10 Discussions
1.
Please respond to the following:
· Discuss whether the term "corporate entrepreneurship" is an oxymoron. Can corporations—especially large ones—be innovative? Support your answer with examples.
· Use the Internet to find an example of two corporate innovations—one brought about through autonomous strategic behavior and one developed through induced strategic behavior. Which innovation seems to hold the most promise for commercial success, and why?
2.
· There is often talk in the recent news about increasing tariffs on some imports. Watch your instructor's video,
Incidence of a Tariff, to prepare for this week's discussion.
· Start your discussion by responding to these questions:
. When the United States puts tariffs on imports, who do you think ultimately pays these tariffs? Is it the foreign companies selling the import, American consumers, or both? Explain your answer.
. Is it good or bad for American consumers when the United States puts tariffs on .
Exploiting The Social Aspects Of Web 2.0 In HE Institutionslisbk
Slides for talk on "Exploiting The Social Aspects Of Web 2.0 In HE Institutions".
See http://www.ukoln.ac.uk/web-focus/events/seminars/nottingham-2008-04/
COM 106 help Making Decisions/Snaptutorialpinck2324
For more classes visit
www.snaptutorial.com
Choose two of the following scenarios. For each scenario you choose, answer each component as clearly and completely as possible.
You are writing up your weekly responses for your COM106 course and want to respond to a classmate who discusses the need to use social media in a job search. You are not familiar with this phrase.
Describe what sort of search you would conduct to help you in responding to this student and why. What search engine(s) or database(s) might you use and why? What search terms? How would you go about evaluating the credibility of the information you found?
Week 1 Assignment First StepsWrite a two- to three-page analysi.docxjessiehampson
Week 1 Assignment First Steps
Write a two- to three-page analysis of your community and the existing programs for youth within this community using the following guidelines:
1. Using your research from the U.S. Census Bureau’s American Fact Finder (Links to an external site.), Pew Research Center (Links to an external site.), and the National Center for Education Statistics (Links to an external site.), create an info-graphic picture of your community to support your written analysis. Embed the info-graphic picture into your analysis as a chart illustrating the written analysis. Your info-graphic and analysis should illustrate those statistics that have direct bearing on the 40 Developmental Assets identified by the Search Institute which can include, but are not limited to:
· Population demographics, including ethnicity and special populations
· Economic status
· Housing and household demographics
2. Summarize youth-related issues that seem to be at the forefront of your community. Use specific examples to support your observations (newspaper headlines, community meetings, political platforms, etc.) and cite your text when appropriate.
3. In support of your written analysis, create and embed a table that identifies the resources for young people that already exist in your community. Your table should include:
· The name of the program
· A short description of the program’s mission
· An analysis how the program engages with the youth they serve (Are they partners with adults?)
· Summarize which of the 40 Developmental Assets the program focuses on or attempts to meet with their program
Conclude your analysis by brainstorming ideas on how you can plug into one or more of the existing programs using the Asset Building Framework. Focus specifically on where you can make an impact in strengthening relationships within families, among peers, within schools and other institutions, in programs and outside of programs, and across generations. Your analysis must be two to three pages in length (excluding the title and reference pages), double spaced, and be formatted according to APA style as outlined in the Ashford Writing Center. Two references, charts, and tables should be properly cited. Your info-graphic and analysis will be used in your Final Paper and presentation.
Instructor Guidance
Week 1
Welcome to week 1 of EDU 635. In this week we begin our learning about communities and the youth that live and play in those communities. We will be looking at the communities and the culture of those communities, and looking at data about our communities to try to build a synopsis of what’s going on there. With all that, we are hoping to identify what role youth programs play in our community, and the roles that adults play in providing those programs.
In your introductions for the week, you will of course be telling us a little bit about yourself. I encourage you to use one of the digital tools listed as options. Later this week and in the future, y ...
The best online videos beg the question: "How did they do that?!” Video remains a mystery to many organizations because of all the questions that go into even a 30-second video: What do we want to achieve? What is our message? What style will we use? How we will distribute this? How will we measure success?
Our panel features organizations big and small as they talk about the process and decisions that went into creating one of their videos. We'll discuss the strategy, the production, and the distribution—then show the result! Organizations will walk away with a clear understanding of how the most strategic, successful videos are made and used.
http://www.see3.net/event/2010-nonprofit-technology-conference
Building Communities: Increasing Online Engagement and AwarenessTechSoup Canada
TechSoup Canada presents a webinar for
the Canadian Association for Community Living on
How to build an online community through social media channels, what social media channels are out there, which ones should you be using, how to fit managing social media into your schedule, and tips for creating and curating great content to keep your community engaged.
One of the most common used risk management tools is the Incident Re.docxAKHIL969626
One of the most common used risk management tools is the Incident Reporting.
More recently, incident Reporting system incorporated computer technology that will provide information like:
1. Major incident category.
2. Early identification of patterns and trends in the "how" and "why" of untoward events.
3. Code vulnerability inductors.
Discuss the potential benefits to use this technology. There is any Limitation for the system? Explain.
.
One of the first anthropologists to examine religion in Africa was E.docxAKHIL969626
One of the first anthropologists to examine religion in Africa was Edward Evans-Pritchard in the early 1900's. You will explore what he learned about the Azande by watching the first 23 minutes of "
Strange Beliefs: Sir Edward Evans-Pritchard
".
Instructions:
When you are done watching the video answer the following questions by referring to specific information from the video, NOT outside sources:
How do the Azande people featured in the film explain unfortunate events and what do they do about it?
According to your textbook, what is religion and how would Azande religious beliefs be classified?
Do you think Azande beliefs are any more or less rational than other religious beliefs like Judaism, Christianity, Islam, or Buddhism?
.
One of the most important concepts in clinical practice and group wo.docxAKHIL969626
One of the most important concepts in clinical practice and group work is confidentiality. All members of the group sign an informed consent form in order to address the rules and parameters of the group sessions. The rules regarding confidentiality are stated in one section of the form. Although every member must sign this agreement, ensuring that all information shared in the group remains confidential can be difficult. As the group leader, the clinical social worker is responsible for developing strategies so that all members feel safe to share.
For this Discussion, review the “Working With Groups: Latino Patients Living With HIV/AIDS” case study.
By Day 3
Post
strategies you might prefer to use to ensure confidentiality in a treatment group for individuals living with HIV/AIDS. Describe how informed consent addresses confidentiality in a group setting. How does confidentiality in a group differ from confidentiality in individual counseling? Also, discuss how you would address a breach of confidentiality in the group.
Required Readings
Plummer, S.-B., Makris, S., & Brocksen, S. M. (Eds.). (2014).
Social work case studies: Concentration year
. Baltimore, MD: Laureate International Universities Publishing [Vital Source e-reader].
“Working With Groups: Latino Patients Living With HIV/AIDS” (pp. 39–41)
Toseland, R. W., & Rivas, R. F. (2017). An introduction to group work practice (8th ed.). Boston, MA: Pearson.
Chapter 11, “Task Groups: Foundation Methods” (pp. 336-363)
Chapter 12, “Task Groups: Specialized Methods” (pp. 364–395)
Himalhoch, S., Medoff, D. R., & Oyeniyi, G. (2007). Efficacy of group psychotherapy to reduce depressive symptoms among HIV-infected individuals: A systematic review and meta-analysis.
AIDS Patient Care and STDs,
21
(10), 732–739
Lasky, G. B., & Riva, M. T. (2006). Confidentiality and privileged communication in group psychotherapy.
International Journal of Group Psychotherapy
,
56
(4), 455–476.
Toseland, R. W., & Rivas, R. F. (2017).
An introduction to group work practice
(8th ed.). Boston, MA: Pearson.
Chapter 1, “Introduction” (pp. 1–42)
Chapter 2, “Historical and Theoretical Developments” (pp. 45–66)
Working With Groups:
Latino
Patients Living
WithHIV/AIDS
The support group discussed here was created to address the unique needs of a vulnerable population receiving services at an outpatient interdisciplinary comprehensive care center. The center’s mission was to provide medical and psychosocial services to adult patients living with HIV/AIDS (PLWH). Both patients and providers at the center expressed a need for a group to address the needs of the center’s Latino population. At the time the group was created, 36% of the center’s population identified as Latino, and 25% of this cohort identified Spanish as their primary language. The purpose of the group was twofold: 1) to reduce the social isolation felt by Latino patients at the center and 2) to create a culturally sensitive environm.
One function of a leader is to provide the vision for the organizati.docxAKHIL969626
One function of a leader is to provide the vision for the organization that they lead. Being a role model and leading the way forward are important aspects of leadership.
If you were leading an Internet retailer or another organization that involves innovative technology and organizational flexibility, describe the process that you would use to create a vision for the organization.
How would you get the employees involved in the vision?
Describe how the process would differ between an Internet retailer and a brick and mortar retailer.
.
One could argue that old-fashioned attitudes regarding gender and t.docxAKHIL969626
One could argue that old-fashioned attitudes regarding gender and "traditional" gender roles are becoming obsolete. In many parts of the world women head major corporations and hold high positions of power—positions historically seen as being of the male domain. In turn, many men freely choose to be "stay-at-home-dads" or enter professions that were once considered to be "feminine." Naturally, our contemporary views of gender and gender roles illustrate the social progress we have made as one human culture.
Yet, prehistoric and ancient works of art tell a different story—one that reinforces old-fashioned gender roles (and maybe for good reason). Prehistoric and ancient representations of gender illustrate the social norms of their periods. Naturally, these works of art were produced by people whose lives and values were quite different from ours. Yet, the views of gender presented by these works of art are, despite our contemporary sensibilities, are still very recognizable.
Write an essay that analyzes the representation of gender and gender roles as seen in
Woman of Willendorf
(prehistoric: c. 25,000–20,000 B.C.E.) and
Kouros
/
Statue of Standing Youth
(ancient Greece: c. 580 B.C.E.).
.
One of the hallmarks of qualitative research is writing detailed obs.docxAKHIL969626
One of the hallmarks of qualitative research is writing detailed observations when collecting data. For this assignment, take a notebook with you to a public setting where social interaction takes place (restaurant, public library, public park, shopping mall, airport, etc.). Observe for an hour, then write up your notes into a descriptive vignette, looking for patterns in events and actions.
Observe as though you are a stranger in a new country, trying to make sense of the action around you. Describe how things look, smell, sound, feel, etc. Be as descriptive as possible. Write up your observations into a vignette with the intention of having readers feel as though they are in the environment you choose to observe. Do not be shy to talk to people and ask what they are doing for more information.
REMEMBER to concentrate on observing the
context
only (NO PERSONAL OPINIONS)! This paper should be no longer than 3 pages double-spaced. There is going to be follow-up with this assignment in Module 8.
Assignment Specifics:
· Student will write a 3 double-spaced reflective paper.
· Citations from any of the required reading/presentations from the assigned module
· APA format
.
One of the three main tenants of information security is availabilit.docxAKHIL969626
One of the three main tenants of information security is availability. It is also one of the least thought about. Explain the importance of availability? Do you believe it should be more important than the other two tenants (confidentiality/integrity)? Why is it important to know the value of your data when it comes to availability?
Requirements:
Initial posting by Wednesday
Reply to at least 2 other classmates by Sunday (Post a response on different days throughout the week)
Provide a minimum of 3 references on the initial post and on any response posts.
Proper APA Format (References & Citations)/No plagiarism
.
One of the challenges in group problem solving is identifying the ac.docxAKHIL969626
One of the challenges in group problem solving is identifying the actual problem. Often as a group, we try to fix the symptoms of the problem instead of the actual problem. Review the attached scenario. Identify the problem, write a problem statement, and explain why you believe the problem you identified is not a symptom but the actual root cause.
*Post must be 200 to 250 words
*Answer must be clear, concise and straight forward
* PE is attached
.
One is the personal plot that unfolds around the relationships betwe.docxAKHIL969626
One is the personal plot that unfolds around the relationships between the characters—O thello, Iago, Desdemona, Cassio, Rodrigo, and Emelia. The other plot is the more public one in which Venice is at war with the Turks. How do these plots intersect, and do they overlap in terms of some of the main themes of the play? For instance, don’t overlook the line in Act I, iii, regarding where the Turks are headed in their ships—“or this cannot be, by no assay of reason: 'tis a pageant,to keep us in false gaze.”
.
One and half pagesimple, noplagarism Title page, abstr.docxAKHIL969626
One and half page
simple, noplagarism
Title page, abstract, table of contents, list of figures, list of tables are all
not required
in the discussion forums. All other aspects of
APA (citations, list of references, correct spacing & formatting, etc.)
are
required to receive full credit
You must
engage
(not just agree, disagree, or repost you own posting) at least two of your classmates in the discussions each week to receive full credit
Each question should be researched and supported with some peer reviewed sources other than or in addition to your textbook
Discussion posts are assessed on a rubric with equal weight given to 5 assessable items: Comprehension, Timeliness, Engagement, Critical Thinking, and APA/Mechanics
Digital Forensics
There are three primary goals with digital forensics:
Collect electronically stored information in a sound, defensible manner,
Analyze the results of the collections, and
Present the findings either in formal legal proceedings or less formally to inform a client.
Electronic evidence can be short-lived and fragile. It needs to be collected in a defensible, methodological manner to preserve it accurately, and to withstand scrutiny in legal proceedings. (chain of custody)
Electronic evidence can be highly probative, both as it appears to users, and behind the scenes. There is a lot of information that a computer user never sees (e.g. metadata, logs, registry entries). This behind-the-scenes evidence may provide a wealth of information about who did what when and where. Forensic analysts are trained to preserve, collect and interpret this kind of evidence.
Some digital files can be recovered, even if a user has tried to delete them.
Locate a famous case where digital forensics played a role, and share it with the class. Discuss how digital forensics was critical in cracking the case. Examples are listed below, but
you can’t use them – find your own.
Famous cases cracked with digital forensics
Be it a text message, Google searches or GPS information, a person’s digital footprint can provide plenty of ammunition in the courtroom. Here are a few cases where digital forensics played a critical role in bringing about justice
.
1. The BTK Killer, Dennis Rader
Perhaps the most famous case to be solved through digital forensics is that of
the BTK Killer Dennis Rader
, with “BTK” referring to his MO of “bind, torture and kill.” Rader enjoyed taunting police during his killing sprees in Wichita, KS. But this also proved to be his fatal flaw. A floppy disk Rader sent to police revealed his true identity. He was soon arrested, pled guilty and was put behind bars for life, much to the relief of his long-terrorized community.
2. Dr. Conrad Murray’s lethal prescriptions
Another recent case solved with digital forensics was that of
Dr. Conrad Murray, personal physician of Michael Jackson
. Digital forensics played a crucial role in the trial. After Jackson passed away unexpectedly in 20.
One 750 - word essay exploring an art historical issue presented in .docxAKHIL969626
One 750 - word essay exploring an art historical issue presented in the class.(following file)
The file is 6 pages long. write a reaction and add some of the own thinking.
The file preview
The Combahee River Collective Statement
Combahee River Collective
We are a collective of Black feminists who have been meeting ...........
.
One of the most interesting items in the communication realm of orga.docxAKHIL969626
One of the most interesting items in the communication realm of organization management is the informal grapevine. The informal grapevine has the capacity to undermine the official communication function of a criminal justice organization.
Discuss what a grapevine is and the best methods to counteract it.
.
One of the most important filmmakers of the twentieth centur.docxAKHIL969626
One of the most important filmmakers of the twentieth century to release such popular films such as Ferris Bueller’s Day Off, and The Breakfast Club was someone by the name of John Hughes. Born February 18 in 1950, he sadly died 11 years ago due to a heart attack. Brought up in Michigan, John Hughes started off by creating jokes for already famous comedians. He then began to capture the interest of adolescents in the 1980’s with his work. Movies such as The Breakfast Club;Sixteen Candles;Ferris Bueller's Day Off;Plane, Trains, and Automobiles; and Home Alone gained a huge amount of popularity over time. These movies usually ended in a good way but not without a struggle along the way.
One of John Hughes most popular film’s, titled The Breakfast club takes place in a school library setting as the main 5 students are tasked with learning and understanding each other. Understanding their dislikes for teachers, parents, as well as going through the peer pressure of their respective social groups. This film highly resembles Hughes' work as it reaches toward the best of society with all different types of popular culture which explains why the movie takes place in a library, with the students surrounded by art, books, and statues.
Hughes was very well known as being the king of highschool movies. All of his work dealt with teenagers and the issues they dealt with. Ferris Bueller
Ferris Buellers was one of Hughes' first comedies, and it is the most original movie about high school that has ever been made. There wasn't a movie like it before it was made, and since many attempts have been made to recapture what Ferris Buellers brought to the table. Unfortunately, that is impossible. A big part of Ferris Bueller's magic was the originality of Hughes' vision. He looked at teenagers and high school life from a completely new perspective. Hughes created a world where everything worked out for the hero, and everyone can identify with that.
.
One of the ways businesses provide secure access to their networ.docxAKHIL969626
One of the ways businesses provide secure access to their network (or a subset of their network) to remote (or mobile) users is to use virtual private networks (VPNs). VPNs allow users to connect securely (over an encrypted link) to a network. For this discussion:
Define the term virtual private network
Discuss the goal(s) of a VPN
Describe different types of VPNs (hardware or software based)
Discuss how the use of a VPN may support BYOD (bring your own device)
List several commonly available (open source) VPNs
Describe best practices for using a VPN
300 Words NO Plagiarism
.
On Stretching Time (250 Words)The given paradigms by which we.docxAKHIL969626
On Stretching Time (250 Words)
“The given paradigms by which we are to understand and use academic freedom isolate utterances and individuals to insist that the contexts that matter are professional and institutional. But if we stretch time, the potent context of modern nationalism/settler colonialism becomes strongly palpable.”
Kandice Chuh argues that it is imperative for us to “stretch time”: to be able to place utterances and individuals in the academic context in the broader context of modern nationalism and settler colonialism. What is something someone can only understand about you by bringing in a larger context? Write that, and also the larger context needed to understand.
.
On the evening news, social media and even in conversation, do you f.docxAKHIL969626
On the evening news, social media and even in conversation, do you feel that noting where data and other vital information being shared came from could alleviate confusion, frustration and "gossip"? If so, where should we draw the line? Do you trust what others discuss with you? Or do you "fact check"?
.
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxAKHIL969626
On p. 98-99 of
Music and Capitalism,
Tim Taylor writes, “These and other Western star musicians employ other common discourses about the musicians with whom they worked and the musics they appropriated or collaborated with. The dominant ideology and discourse are that non-Western musics are a kind of natural resource that is available for the taking, though these acts of appropriation are frequently tempered by the Western star’s appearance alongside the non-Western musicians in publicity photographs, on recordings, and in liner notes.”
Review your notes from class about important words, or look these up as necessary: discourse, appropriation, collaboration, ideology
Then, write a response that does the following:
Explain: what does this quotation mean in your own words?
How does the
Graceland
example fit in with what Tim Taylor is talking about here
?
Think of another time that musicians with different power positions are part of a musical performance or recording (you can use one in the chapter, like
Buena Vista Social Club, Deep Forest,
“The Lion Sleeps Tonight,” “Return to Innocence,” “El Condor Pasa,” or
Talking Timbuktu
, or one not in the reading that interests you). Describe the relationship between the musicians, and argue whether you think the album/performance is appropriation, collaboration, sampling, or something else. If the artists have different positionalities in terms of race, gender, and/or country of origin, comment on the effect this has. Give your opinion on ethical questions raised in this particular situation.
Your response should be about 3-5 paragraphs (minimum 12 sentences) in length. For part c, you will need to reference and cite an additional source (i.e. web site, album, academic source, news article, etc.)
.
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxAKHIL969626
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) of the 2030 Agenda for Sustainable Development — adopted by world leaders in September 2015 at an historic UN Summit — officially came into force. These goals address every topic of concern we have discussed this semester. Over the coming decade, it's the hope of UN member nations (which includes the U.S.) that the SDGs will universally be applied to all, countries will mobilize efforts to end all forms of poverty, fight inequalities and tackle climate change, while ensuring that no one is left behind.
With the SDGs as your reference, answer these questions:
Are any of the 17goals from the UN website particularly unrealistic—describe, in detail, why you think so (or not).
Which of the 17 goals do you believe is the highest priority for the world and why? Cite specific examples from class content, discussions and assessments.
.
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxAKHIL969626
On September 11, 2001 the U.S. changed forever. While the U.S. had suffered attacks before, nothing to this scale and magnitude. The attacks were aimed at highly populated areas (NYC) and homes for the government and armed forces (Washington, D.C. and the Pentagon). The World Trade Centers were an ideal target for their height and location. For your own post, consider vulnerable populations. What constitutes vulnerability in populations living in disaster prone areas? Consider NYC, these attacks were neither the first nor the last attacks NYC has suffered. Why is NYC such a hub for terrorist attacks? Try considering other areas, other than NYC, and provide an example from a recent disaster. Unfortunately, there are many. You can discuss man-made disasters or natural disasters.
250 Words
.
On January 28, 1986, the Space Shuttle Challenger was destroyed upo.docxAKHIL969626
On January 28, 1986, the Space Shuttle Challenger was destroyed upon launch from Cape Canaveral, Florida killing all seven astronauts on board. Conduct a literature and an Internet search on the topics of the Challenger disaster and groupthink. Then, discuss how groupthink might have created decision-making problems for NASA and its booster contractor. Cite at least two sources in your answer.
250 words and list references
.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
The simplified electron and muon model, Oscillating Spacetime: The Foundation...RitikBhardwaj56
Discover the Simplified Electron and Muon Model: A New Wave-Based Approach to Understanding Particles delves into a groundbreaking theory that presents electrons and muons as rotating soliton waves within oscillating spacetime. Geared towards students, researchers, and science buffs, this book breaks down complex ideas into simple explanations. It covers topics such as electron waves, temporal dynamics, and the implications of this model on particle physics. With clear illustrations and easy-to-follow explanations, readers will gain a new outlook on the universe's fundamental nature.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
Digital Artefact 1 - Tiny Home Environmental Design
ObjectiveThe purpose of this project is to demonstrate you.docx
1. Objective
The purpose of this project is to demonstrate your
understanding of the following course concepts:
1. How companies or organizations use digital or social media
to effectively communicate ideas, information, arguments, and
messages to achieve a specific goal.
2. How digital or social media has transformed the
communication of idea, information, and arguments in society.
Project Description
The use of digital and social media can have a profound effect
on society. This project requires you to research and report on
an organization or company who has used or is using digital or
social media to create a profound effect, impact, or influence on
others.
Project 2 consists of:
1. Project Requirements (topics and content to cover)
2. Presentation Requirements (content organization)
3. Submission Requirements (how to submit your assignment)
4. Presentation Resources
2. 5. Due Date Information and Late Policy
Project Requirements
Select an organization or company that used or uses digital or
social media to impact others.
CREATE A PRESENTATION (using a professional presentation
application such as Microsoft PowerPoint, Prezi, or Apple
Keynote for the Mac) highlighting the information you found.
NOTE 1:
You are required to complete ALL THREE SECTIONS of this
project (Sections 1, 2, and 3).
PLEASE SELECT A DIFFERENT COMPANY THAN THE ONE
YOU USED IN PROJECT 1.
SECTION 1: ORGANIZATION
OR COMPANY INFORMATION
Provide the following information about the organization or
company you select. Answer the questions below:
Item 1:
What is the name of the organization or company?
Item 2:
What year was the organization or company established?
Item 3:
3. What is the organization's or company’s goal or mission?
Item 4:
Provide the company's or organization's website address (URL),
if available.
Item 5:
Where is the company or
organization's
headquarters located?
Section 1 Source:
Include at least
one source
for Section 1. Include this source as an in-slide citation and on
your References slide(s).
SECTION 2: DESCRIPTION OF THE DIGITAL OR SOCIAL
MEDIA INFLUENCE
Describe how digital or social media was used to
influence others while answering the following questions:
Item 1:
Describe how digital or social media was used to influence
others. Provide
at least one
example, instance, or situation that highlights this influence.
Item 2:
In the example, instance, or situation you provided in Item 1,
what specific digital or social media platforms were used (e.g.
Facebook, Twitter, Instagram, Snap chat, Pinterest, or
4. YouTube) and how were they used?
Item 3:
What occurred as the result of the use of digital or social
media? Describe the impact or magnitude of the change.
Section 2 Source:
Include at least
one source
for Section 2. Include this source as an in-slide citation and on
your References Slide(s).
To help you with completing Section 2, an example is provided
below:
Section 2 Example 1: Invisible Children
- Kony 2012
In 2012, an organization called Invisible Children created and
posted a 30 minute movie on YouTube to launch a campaign
they called "Kony 2012." View the movie here (
https://www.youtube.com/watch?v=Y4MnpzG5Sqc
).
The Kony 2012 campaign was an effort to capture James Kony,
who was portrayed as a ruthless rebel leader in Uganda who
committed numerous atrocities against humanity, including
kidnapping and murder.
The Kony 2012 campaign had a tremendous impact.
The video generated over 100 million YouTube Views.
Over 20 million dollars was donated to support the effort to
capture James Kony
5. NOTE 2:
You
cannot
use Invisible Children in your project.
To help you with completing Section 2, a second example is
provided below:
Section 1 Example 2: The ALS Ice Bucket Challenge
In 2016, the Amyotrophic Lateral Sclerosis Association (ALS)
organized the
Ice Bucket Challenge.
The challenge involved pouring a bucket filled with ice and
water over a person's head, followed by the person nominating 3
people who then had to take the challenge. The person would
then making a contribution to ALS research. The challenge
quickly became viral, gaining support and participation from
celebrities. As a result of the challenge, traffic to the ALS web
page increased, over 250,000 new donors signed up, and over
13.3 million dollars was raised.
NOTE 3:
You
cannot
use the ALS Ice Bucket Challenge in your project.
SECTION 3: ANALYSIS
What was the full impact of the use of Digital or Social Media?
Item 1:
6. Was the change created by the use of digital or social media
positive or negative (or both) in your opinion?
Item 2:
How successful was the company in accomplishing the
objective? Support your answer.
Item 3:
List one thing the company could have done better to
accomplish their objective.
To help you with completing Section 3, we have provided two
examples below:
Section 3 Example 1: Invisible Children - Kony 2012
The Kony 2012 campaign had both positive and negative
results:
The Kony 2012 campaign received global attention. This
attention lead to political and military action. The US
government, lead by President Obama, backed a mission of
5,000 soldiers to James Kony.
The organization came under scrutiny as many have questioned
their efforts (see YouTube video
https://www.youtube.com/watch?v=okmswBs4rdg
or CNN report at
https://www.youtube.com/watch?v=TEVKNVTnYRA
).
James Kony has not been caught. Some people even believe that
7. he is no longer living or a threat to the region.
Section 3 Example 2: The ALS Ice Bucket Challenge
The Ice Bucket Challenge was extremely successful. The ALS
Ice Bucket Challenge increased the level of awareness of ALS
and was extremely positive.
The Ice Bucket Challenge campaign has ended. In order to
sustain the effort by coming up with a new challenge each year.
One idea would be to use a number of celebrities to start the
new challenge every year. Also, the association could do a
better job of showing how the money donated has gone to
furthering the cause. I would also create a thank you video from
current ALS patients. The key here is to find ways to take
advantage of the momentum the Ice Bucket Challenge initially
created.
Section 3 Sources
:
Include at least
two sources
for Section 3. Include the two sources as in-slide citations and
on your References page. At least one source should be
professional or scholarly.
NOTE 4:
You can not use in your project or any company or organization
we discussed in class or in this assignment (e.g. The Ice Bucket
Challenge or Invisible Children).
Presentation Requirements
8. 1.
SLIDE
SETUP AND ORGANIZATION
Your presentation must include the following slides and
sections:
Item 1:
Title Slide
Your Title Slide should contain the following:
Project Name
Your Name
Instructor’s Name
Course name and section number
Item 2:
Organization or Company Information (Section 1)
Item 3:
Description of the Digital Media Influence (Section 2)
Item 4:
Analysis of the Digital Media Influence (Section 3)
Item 5:
9. Summary Slide
Item 6:
Question Slide
(
this is where the audience is invited to ask questions
).
You will only need to include a "Title Only" slide .
Item 7:
References Slide(s) (
Your References MUST be in APA format
)!
2. PRESENTATION LENGTH
Minimum of 15 slides; Maximum of 25 slides.
(Title and Reference slides do not count toward the total slide
count).
NOTE 5:
Going over 15 slides is fine, but if you are under 15 you will be
penalized 10% (one letter grade) for every 2 slides you are
under the 15-slide minimum.
3. SLIDE DESIGN REQUIREMENTS
a.
Keep it Simple:
Slides must be easy to read and uncluttered. Keep in mind the 7
x 7 rule with presentation software, which effectively states no
10. more than 7 words per bullet and 7 bullets per slide.
b.
Images:
Pictures and images should be used
sparingly
to avoid distraction from the main contents. Include at least
one table, graph, or image of an appropriate size that is relevant
and supports the information provided in your paper. Feel free
to create the image if you like, but it must be professional.
c.
Fonts:
Use a standard font like Times New Roman or Helvetica. Use
36-point font for your slide title, 28-point font for main points,
and 24-point font for secondary points.
d.
Footer
:
Include the slide number, title of your presentation, and your
name in the footer (except on title slide).
e.
Background
:
Appropriate for the presentation. Use creativity here, but your
background color or design must not detract from the
readability of the slides. A bad example would be using dark
text against a dark background. Make sure the background and
font colors are a good contrast.
f.
Contrast:
11. Appropriate Foreground-Background Segregation
(use dark text against a light background or white or light
colored text against a dark background. This creates contrast.
4. PRESENTATION NARRATION
Add "Narration" to each and every Slide in your presentation.
I would like you to present your presentation as if you were
giving it to a LIVE AUDIENCE. In addition to designing each
slide, I also want you to provide me with the transcript of the
words you would actually say, word-for-word. while each slide
is being displayed.
Adding Narration
You can accomplish this in several ways:
a. Adding Text Narration to the Notes Section of each slide,
OR
b. Adding Voice Narration to each slide (Export the Narration
as a .MOV file).
5. SOURCES
Include at least Four (4) Sources (Total)
a. Include at least One (1) Source for Section 1.
b. Include at least One (1) Source for Section 2.
c. Include at least Two (2) Sources for Section 3. At least one of
the two sources must be a Professional or Scholarly Source.
12. Clarification:
Please do not use unprofessional sources such as Wikipedia,
About.com, Answers.com, Dictionary.com, How.com, or
anything remotely similar. Examples of
scholarly sources
include textbooks, articles, academic journals, and conference
proceedings. Scholarly resources are written by experts in their
fields, grounded in research, and often refereed (reviewed and
edited by researchers in the field). Examples of
professional sources
include: trade journals or magazines. Professional sources are
written for a specific audience that works in certain field. They
are not research-based. You can also use our course content
(e.g. Read & Watch resources) as a source as well. UMGC has a
top-notch, extensive online library. You can find many
scholarly and professional sources there.
NOTE 6:
You can
also
use social media (e.g. Twitter posts, blogs, YouTube) sources
as well as this is a paper about the use of digital and social
media.
Presentation Resources
The following optional resources may be helpful in completing
this project:
1.
Life After Death by PowerPoint
(3 mins | Automatic Closed Captioning)
13. https://www.youtube.com/watch?v=MjcO2ExtHso
This Youtube video provides great tips sprinkled in with humor!
:)
2.
PowerPoint Tutorial: Recording and Exporting Videos (5 mins |
Automatic Closed Captioning).
https://www.youtube.com/watch?v=uKgfVZ4aCE0
Submission Requirements
Please submit the following to your Assignments Folder in our
CMST 301 LEO Classroom by the specified due date:
1. The completed presentation (PowerPoint .PPT or .PPTX, or
Keynote project file) or a link to your online Prezi
presentation.
Exceptions may be allowed, on a case-by-case basis, for life
situations (military deployment, medical illness, death in the
family, etc). In all cases, timely notification of a "life situation"
is critical to the approval of any extensions. All exceptions
must be accompanied by official documentation, which is
subject to inspection and approval. Work load, course load,
vacations, or bad memory are not acceptable excuses.
14. Running Close to the Deadline?:
Please do not wait until the last minute to submit your
assignment. Give yourself at least a 5-hour window to account
for any technical difficulties that might arise. If you experience
technical difficulties beyond your control that do not allow you
to successfully complete the assignment, immediately follow the
steps below:
Step 1:
Contact
UMGC 360 Help and Support
. Inform them off the problem you are having. Get a problem
ticket number from them to document the situation.
Step 2:
E-mail me ASAP and include (a) your class and section, (b)
description of the problem you are having, (c) your problem
ticket number from 360 Help and Support, and (d) your name,
so I can investigate the situation.
Step 3:
Attempt to attach your assignment to a message to me inside of
LEO.
Step 4:
E-mail the assignment to me.
Grade Value
This project is worth 100 points or 20% of your total grade for
the course.
15. Grade Reductions
You will lose points for issues such as: not following
directions, not submitting your work on time, and failure to
include all required elements. Each omission will result in a
partial point deduction.
Submitting Your Assignment
To complete this project and receive full credit, you must
submit your completed presentation to your
Assignments Folder
unless you encounter problems--discussed above).
CYA (Copy Your Assignment)
Please make sure you keep a copy of your project stored on your
computer. Technical difficulties do happen--you may need to
resubmit your assignment for a number of reasons. It is always
a good policy to
CYA
!
Having Problems?
Please contact me in advance if you are having problems
understanding what is required of you.
16. Do Your Own Work
UMGC has strict policies regarding turning in work that is not
100% your own creation. I will enforce these policies.
Verify Your Assignment Has Been Posted (
** Very Important **
)
It is your responsibility to make sure you have posted your
assignment CORRECTLY! Once you have posted your
assignment, immediately attempt to view it, just to make sure
your post was accepted by LEO, that it is formatted correctly,
and you have posted the correct file.
NOTE 7:
You will be held responsible for posting your assignments
correctly.