Post one: Submarine Warfare: The North Atlantic
There are numerous instances of divided loyalties towards the government and personal morality in the video. The first illustration is when Pulaski, one of the survivor soldiers strongly disagrees with how the government is treating them. He condemns the government for its small appreciation and acknowledgment of their situation. Also, Pulaski does not agree with the fact that the government gave them medals as a symbol of heroism. In his point of view, he thinks that the government was not fair by awarding them medals only as he believes they deserve more than what they got. Another illustration of disloyalty is when the navy captain approaches Pulaski’s house and asks him to participate in a governmental duty, and he strongly disagrees acknowledging the needs of his wife. This is a clear indication that Pulaski is not loyal to the government, and he is has a high personal morality. Pulaski is experiencing a significant impact of war as he is nervous or afraid the horrible experience of war.
Yes, I have experienced a similar a situation. In 2009, I experienced a terrific road accident. Images from the incident were horrible, shocking and disturbing. Until today, I use specific drugs to help me sleep as I experience nightmares with images from that day.
Post two: Island Combat: Iwo Jima
The use of deadly force as a means of conflict resolution is acceptable when the cause is right, the defending of one’s home justifies the use of lethal force. In order to stop intruders or invading armies, it is justifiable to take up arms to deter the invaders from imposing their will on the people a certain area. Conflict resolution takes many forms, negotiation is one of the tools that help in the resolution of conflict since both sides are able to air their grievances. At the event that one side does not want to consider addressing the grievances of the other side and instead seeks to impose its will and dominance on it, then the other party is justified to take up arms against this intimidating party. When backed into a corner with no means of exit from such a situation, the use of lethal force is warranted since the survival of the party or individual relies on such force in order to resolve the conflict. The use of deadly force as a means of conflict resolution is only justifiable after the exhaustion of all the avenues that may lead to amicable conflict resolution, the two parties need to hear each side out before deciding to take up arms against the other party. The survival instinct of the individuals or parties also helps justify the use of lethal force, if the party or individual feels threatened and is not in an equal standing with the aggressor then his stance in taking up arms against the mightier force is justifiable since the question of survival is at hand. The loss of life and property, and the resulting instability has the capability to bring a nation down to its knees overnight.
Resis ...
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
According to the text, crime has been part of the human condition since people began to live in groups. Ancient documents indicate that conduct we now call murder, theft, or robbery was identified as criminal by civilizations that existed thousands of years ago. Criminal laws regulate human conduct and tell people what they can and cannot do and, in some instances, what they must do under certain circumstances. In this assignment, you will explore different types of criminal conduct and the goals of criminal law.
Write a four to six (4-6) page paper in which you:
Determine whether or not the Ex Post Facto Clause can be used as a defense to prohibit the increase in federal minimum/mandatory sentencing guidelines after a federal defendant has committed the crime. Provide a rationale to support your position.
Explain the distinction between criminal, tort, and moral wrongs. Next, support or criticize the premise that the standards set by moral laws are higher than those set by criminal law.
Identify and discuss the differences between solicitation of another to commit a crime and a conspiracy to commit a crime. Next, support or criticize the use of the unilateral approach to conspiracy convictions.
Identify the four (4) goals of criminal law, and discuss the manner in which these four goals effectuate the purpose of protecting the public and preventing the conviction of innocent persons.
Use at least three (3) quality academic resources in this assignment.
Note:
Wikipedia and similar types of websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new
Strayer Writing Standards (SWS
). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the nature and history of American criminal law.
Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.
Analyze the essential legal elements of criminal conduct.
Use technology and information resources to research issues in criminal law.
Write clearly and concisely about criminal law using proper writing mechanics.
.
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
According to Ronald Story and Bruce Laurie, “The dozen years between 1968 and 1980 marked more than the beginning of Republican ascendency; they also saw the breakup of the New Deal coalition and the advent of conservative domination of American politics.” (CP 139).
In this essay, you should explain,
first
, how it is that conservatives came to dominate American politics by the 1980s and,
second
,
how the ideas and policies they embraced shaped American society into the twenty first century.
Rules:
1. 3-4 pages
2. Double spaced, 12-point font
3. Standard margins—Approximately 1.25 on left and right margins and 1 on top and bottom
4. In crafting your essay, you will want to construct a clear thesis and draw on evidence from the sources described below.
5.
Only
use these sources below.
Sources:
Context: The Close of the 1960s
1. The black cat tavern and the LGBT Movement
Link:
https://www.npr.org/2017/02/13/514935126/stonewall-riots-grab-the-spotlight-from-black-cat-protests
2. ESPN Sport center on Katherine Switzwer
Link:
https://www.youtube.com/watch?v=U6CoScOIK_I
3. Crisis in the Cities and 1968.pdf (attachment)
4. Excerpt from MLK’s final Speech in 1968
Link:
https://www.youtube.com/watch?v=Oehry1JC9Rk
5. Vietnam-The path to war.pdf (attachment)
The Rediscovery of the Market: Conservative Politics and Policies
6. Alfred Kahn’s Legacy: Cheap Flights
Link:
https://www.npr.org/2010/12/29/132422495/alfred-kahns-legacy-cheap-flights
7. A Second Gilded Age?.pdf (attachment)
.
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
According to Kirk (2016), most of your time will be spent work with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
.
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation.
Walden’s MSW program expects students in their specialization year to be able to:
Evaluate the implication of policies and policy change in the lives of clients/constituents.
Demonstrate critical thinking skills that can be used to inform policymakers and influence policies that impact clients/constituents and services.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare
: Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies at that state and federal levels that impact the social problem. Then, from a position of advocacy, identify methods to address the social problem (i.e., how you, as a social worker, and the agency advocate to change the problem). You are expected to specifically address how both you and the agency can effectively engage policy makers to make them aware of the social problem and the impact that the policies have on the agency and clients.
The Assignment (2-3 pages): Social Problems is Ex-cons finding Jobs Opportunities in State of California. The Agency is Called "Manifest" the website is Manifest.org
Identify the social problem
Explain rational for selecting social problem
Describe state and federal policies that impact the social problem
Identify specific methods to address the social problems
Explain how the agency and student can advocate to change the social problem
You are expected to present and discuss this assignment with your agency Field Instructor. Your field instructor will be evaluating your ability to demonstrate this competency in their field evaluation. In addition, you will submit this assignment for classroom credit. The Field Liaison will grade the assignment “PASS/FAIL,” see rubric for passing criteria.
.
According to Kirk (2016), most of our time will be spent working.docxaryan532920
According to Kirk (2016), most of our time will be spent working with our data. The four following group actions were mentioned by Kirk (2016):
Book: Kirk, A. (2016). Data visualisation a handbook for data driven design. Los Angeles, CA: Sage.
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to the NASW Code of Ethics section 6.04 (NASW, 2008), .docxaryan532920
According to the NASW Code of Ethics section 6.04 (NASW, 2008), social workers are ethically bound to work for policies that support the healthy development of individuals, guarantee equal access to services, and promote social and economic justice.
For this Discussion
, review this week’s resources, including
Working with Survivors of Sexual Abuse and Trauma: The Case of Rita
and “The Johnson Family”. Consider what change you might make to the policies that affect the client in the case you chose. Finally, think about how you might evaluate the success of the policy changes.
By Day 3
Post
an explanation of one change you might make to the policies that affect the client in the case. Be sure to reference the case you selected in your post. Finally, explain how you might evaluate the success of the policy changes.
Working With Survivors of Sexual Abuse and Trauma: The Case of Rita
Rita is a 22-year-old, heterosexual, Latina female working in the hospitality industry at a resort. She is the youngest of five children and lives at home with her parents. Rita has dated in the past but never developed a serious relationship. She is close to her immediate and extended family as well as to her female friends in the Latino community. Although her parents and three of her siblings were born in the Dominican Republic, Rita was born in the United States.
A year ago, Rita was sexually assaulted by an acquaintance of a male coworker. Rita and a female coworker met Juan and Bob after work at a local bar for a light meal and a few drinks. Because Rita had to get up early to work her shift the next day, Bob offered to drive her home. Instead of taking Rita directly home, however, he drove to a desolate spot nearby and assaulted her. Afterward, Bob threatened to harm her family if she did not remain silent and proceeded to drive her home. Although Rita did not tell her family what happened, she did call our agency hotline the next day to discuss her options. Because Rita’s assault occurred within the 5-day window for forensic evidence collection of this kind, Rita consented to activation of the county’s sexual assault response team (SART). Although she agreed to have an advocate and the sexual assault nurse examiner (SANE) meet her at the hospital, Rita tearfully stated that she did not want to file a police report at that time because she did not want to upset her family. The nurse examiner interviewed Rita, collected evidence, recorded any injuries, administered antibiotics for possible sexually transmitted infections, and gave Rita emergency contraception in case of pregnancy. The advocate stayed with Rita during the procedure, supporting her and validating her experience, and gave her a referral for individual crisis counseling at our agency.
My treatment goals for Rita included alleviation of rape trauma syndrome symptoms that included shame and self-blame, validation of self-worth and empowerment, and processing how it would feel to discl.
According to the text, crime has been part of the human condition si.docxaryan532920
According to the text, crime has been part of the human condition since people began to live in groups. Ancient documents indicate that conduct we now call murder, theft, or robbery was identified as criminal by civilizations that existed thousands of years ago. Criminal laws regulate human conduct and tell people what they can and cannot do and, in some instances, what they must do under certain circumstances. In this assignment, you will explore different types of criminal conduct and the goals of criminal law.
Write a four to six (4-6) page paper in which you:
Determine whether or not the Ex Post Facto Clause can be used as a defense to prohibit the increase in federal minimum/mandatory sentencing guidelines after a federal defendant has committed the crime. Provide a rationale to support your position.
Explain the distinction between criminal, tort, and moral wrongs. Next, support or criticize the premise that the standards set by moral laws are higher than those set by criminal law.
Identify and discuss the differences between solicitation of another to commit a crime and a conspiracy to commit a crime. Next, support or criticize the use of the unilateral approach to conspiracy convictions.
Identify the four (4) goals of criminal law, and discuss the manner in which these four goals effectuate the purpose of protecting the public and preventing the conviction of innocent persons.
Use at least three (3) quality academic resources in this assignment.
Note:
Wikipedia and similar types of websites do not qualify as academic resources.
Your assignment must follow these formatting requirements:
This course requires use of new
Strayer Writing Standards (SWS
). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Describe the nature and history of American criminal law.
Explain the role of individuals and federal, state, and local government agencies in crime fighting and prosecution of criminal offenses.
Analyze the essential legal elements of criminal conduct.
Use technology and information resources to research issues in criminal law.
Write clearly and concisely about criminal law using proper writing mechanics.
.
According to Ronald Story and Bruce Laurie, The dozen years between.docxaryan532920
According to Ronald Story and Bruce Laurie, “The dozen years between 1968 and 1980 marked more than the beginning of Republican ascendency; they also saw the breakup of the New Deal coalition and the advent of conservative domination of American politics.” (CP 139).
In this essay, you should explain,
first
, how it is that conservatives came to dominate American politics by the 1980s and,
second
,
how the ideas and policies they embraced shaped American society into the twenty first century.
Rules:
1. 3-4 pages
2. Double spaced, 12-point font
3. Standard margins—Approximately 1.25 on left and right margins and 1 on top and bottom
4. In crafting your essay, you will want to construct a clear thesis and draw on evidence from the sources described below.
5.
Only
use these sources below.
Sources:
Context: The Close of the 1960s
1. The black cat tavern and the LGBT Movement
Link:
https://www.npr.org/2017/02/13/514935126/stonewall-riots-grab-the-spotlight-from-black-cat-protests
2. ESPN Sport center on Katherine Switzwer
Link:
https://www.youtube.com/watch?v=U6CoScOIK_I
3. Crisis in the Cities and 1968.pdf (attachment)
4. Excerpt from MLK’s final Speech in 1968
Link:
https://www.youtube.com/watch?v=Oehry1JC9Rk
5. Vietnam-The path to war.pdf (attachment)
The Rediscovery of the Market: Conservative Politics and Policies
6. Alfred Kahn’s Legacy: Cheap Flights
Link:
https://www.npr.org/2010/12/29/132422495/alfred-kahns-legacy-cheap-flights
7. A Second Gilded Age?.pdf (attachment)
.
According to Kirk (2016), most of your time will be spent work with .docxaryan532920
According to Kirk (2016), most of your time will be spent work with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions performed in that action group.
Reference: Kirk, A. (2016). Data Visualisation: A Handbook for Data Driven Design (p. 50). SAGE Publications.
.
According to the Council on Social Work Education, Competency 5 Eng.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation.
Walden’s MSW program expects students in their specialization year to be able to:
Evaluate the implication of policies and policy change in the lives of clients/constituents.
Demonstrate critical thinking skills that can be used to inform policymakers and influence policies that impact clients/constituents and services.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare
: Working with your field instructor, identify a social problem that is common among the organization (or its clients) and research current policies at that state and federal levels that impact the social problem. Then, from a position of advocacy, identify methods to address the social problem (i.e., how you, as a social worker, and the agency advocate to change the problem). You are expected to specifically address how both you and the agency can effectively engage policy makers to make them aware of the social problem and the impact that the policies have on the agency and clients.
The Assignment (2-3 pages): Social Problems is Ex-cons finding Jobs Opportunities in State of California. The Agency is Called "Manifest" the website is Manifest.org
Identify the social problem
Explain rational for selecting social problem
Describe state and federal policies that impact the social problem
Identify specific methods to address the social problems
Explain how the agency and student can advocate to change the social problem
You are expected to present and discuss this assignment with your agency Field Instructor. Your field instructor will be evaluating your ability to demonstrate this competency in their field evaluation. In addition, you will submit this assignment for classroom credit. The Field Liaison will grade the assignment “PASS/FAIL,” see rubric for passing criteria.
.
According to Kirk (2016), most of our time will be spent working.docxaryan532920
According to Kirk (2016), most of our time will be spent working with our data. The four following group actions were mentioned by Kirk (2016):
Book: Kirk, A. (2016). Data visualisation a handbook for data driven design. Los Angeles, CA: Sage.
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Kirk (2016), most of your time will be spent working wi.docxaryan532920
According to Kirk (2016), most of your time will be spent working with your data. The four following group actions were mentioned by Kirk (2016):
Data acquisition: Gathering the raw material
Data examination: Identifying physical properties and meaning
Data transformation: Enhancing your data through modification and consolidation
Data exploration: Using exploratory analysis and research techniques to learn
Select 1 data action and elaborate on the actions preformed in that action group.
.
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
According to Davenport (2014) the organizational value of healthcare analytics, both determination and importance, provide a potential increase in annual revenue and ROI based on the value and use of analytics. To complete this assignment, research and evaluate the challenges faced in the implementation of healthcare analytics in the Health Care Organization (HCO) or health care industry using the following tools:
The paper must also address the following:
Application of PICO (problem, intervention, comparison group, and outcomes) to the challenge identified in your research.
The paper:
Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the
Ashford Writing Center. (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
.
According to the authors, privacy and security go hand in hand; .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
.
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Briefly explain what the simulation modeling relies upon?
-500 words at least.
-No Plagiarism.
-APA Format.
.
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
According to Klein (2016), using ethical absolutism and ethical relativism in ethical decision making can lead to different outcomes. How can moral reasoning about a specific situation differ based on relativism or absolutism? Can you provide an illustration or example of an accounting procedure/situation whose outcome may differ based on absolutism or relativism? Is ethical relativism a more suitable standard within a global IFRS Environment? Why or why not?
at least 250 words
.
According to Franks and Smallwood (2013), information has become.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Provide a page response identifying and clearly stating what the difference are? APA Standard, 2 page response, not including front page and references.
.
According to the Council on Social Work Education, Competency 5.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation. Social workers:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to social services;
Assess how social welfare and economic policies impact the delivery of and access to social services;
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social, economic, and environmental justice.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare: Working with your field instructor, identify, evaluate, and discuss policies established by the local, state, and federal government (within the last five years) that affect the day to day operations of the field placement agency.
The Assignment (1-2 pages): (In The States California. The Good Seed is a Drop-In center for 18-25 years!
Describe the policies and their impact on the field agency.
Propose specific recommendations regarding how you, as a social work intern, and the agency can advocate for policies pertaining to advancing social justice for the agency and the clients it serves.
.
According to the authors, privacy and security go hand in hand; and .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
Must be in APA format with references and citations.
.
According to the authors, countries that lag behind the rest of the .docxaryan532920
According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.
.
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
According to Peskin et al. (2013) in our course reader, "Studies on early health risk factors, including prenatal nicotine/alcohol exposure, birth complications, and minor physical anomalies have found that these risk factors significantly increase the likelihood of anti-social and criminal behavior throughout life." What policy changes might you suggest to help curtail the occurrence or effects of these risk factors? Remember to think about public health policy, not just criminal policy.
.
According to Franks and Smallwood (2013), information has become the.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q: Please identify and clearly state what the difference is?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to Ang (2011), how is Social Media management differen.docxaryan532920
According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.
The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.
.
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
According to (Alsaidi & Kausar (2018), "It is expected that by 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become an easy target for hackers as these systems are often deployed in an uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration" (p. 213).
Discuss and describe the difference between a black hole attack and a wormhole attack.
.
Accessing Non-Renewable ResourcesAs Hite and Seitz (2016) disc.docxaryan532920
Accessing Non-Renewable Resources
As Hite and Seitz (2016) discuss in Chapter 9: Alternative Futures, developed and developing countries that have access to the planet’s resources (because they can buy those resources from others or because those resources exist in abundance in that country) continue to grow at a fast pace, placing a tremendous strain on the availability of nonrenewable resources.
Briefly, what non-renewable natural resources are most at risk of depletion?
Discuss some sustainable development models that have broad applicability to the needs and consumption demands of both developing and developed countries.
.
Access the Internet Web site of any two U.S. state health department.docxaryan532920
Access the Internet Web site of any two U.S. state health departments and compare and contrast the two state-local public health systems in terms of their structure, general functions, specific services, resources, and other important features. Your focus should be on state-local public health systems in these two states, rather than only the state health agencies.
Two pages
Consider this week's discussion in the context of the Triple Aim Initiatives.
.
ACADEMIC CHALLENGES1Why Parents Force their Childr.docxaryan532920
ACADEMIC CHALLENGES 1
Why Parents Force their Children to Study Science Majors
Mahmoud Almutairi
California State University Fullerton
4/28/2020
The career choices people make usually have a serious impact on their future professions. This is because there is always a slight difference between the theories learned in the classroom and their application in the real world. Therefore, it is important that people be keen while deciding on which fields they would major their studies on in order to be competent in their industries. However, the parents, in most cases, try to get involved in the education of their children and try to encourage them, discourage or, in some cases, force them to study certain courses which are more preferred to them (Wong & Liu, 2010). For example, most parents try to force their children to study science-related courses such as medicine and engineering courses. (1) This may be a great challenge for an individual either in academics or in the professional world. In this paper, we will be discussing the reasons why most parents force their children to undertake science-related courses. Additionally, we will be able to understand the effects that this kind of situation may have on the future life of the student academically or professionally.(2) Comment by Sadnik, Daniel: What do you mean by most parents? Why the emphasis around science? Comment by Sadnik, Daniel: You don’t need to be so meta. Comment by Sadnik, Daniel: Who is we? Comment by Sadnik, Daniel: What connects these two statements? Situate the reader.
Reasons why parents want their children to study science-related courses.
Parents have a very important role in identifying the talents of their children and nurturing them. Generally, it is the wish of every parent to have academically successful children (Wong & Liu, 2010). This is because it is believed that when a child succeeds in academics, there is a higher chance for them to get higher-paying jobs in the future. Additionally, most parents think that taking a science course like engineering assures someone ready job opportunity. However, taking a science-related course such as nursing, medicine, or even engineering may be a great challenge for the child.(3) A good number of parents base their argument on the fact that they want their children to be competitive in the job market and also be able to enjoy high living standards(4). Some of the students live their lives to regret having taken certain courses instead of others
Comment by Sadnik, Daniel: How is this a great challenge compared to any other field of study? Comment by Sadnik, Daniel: What shapes these mentalities?
Another reason why you would find a parent encouraging or rather pressing their child to take a certain science course is the need for them to follow the parent's steps (Varlik & Apaydin, 2020). For example, if one of the parents is an engineer, he will want the child to be an engineer like him in order to make sure that the leg.
Access Control ModelsIf you were going to design an access sys.docxaryan532920
Access Control Models
If you were going to design an access system that would control people getting into your favorite or most valued items (e.g., financial records, health records, or other sensitive files), what things would you consider based on your readings from Chapter 14? (
CISSP: Certified Information Systems Security Professional Official Study Guide, 8th Edition
)
Make sure you address all the possible avenues of attack that could be exploited. Remember, security measures are designed to slow and draw attention to attackers. No system can completely prevent a successful attack.
.
Access Case 1-16 using the Cases link below this assignment..docxaryan532920
Access
Case 1-16 using the "Cases" link below this assignment.
Review
Ch. 1, Case 1-16, Research Case – Federal Financial Reporting Objectives.
Write
a 175- to 350-word response.
Briefly
describe the user groups, their needs for information, and how these tie into the four objectives of federal financial reporting identified in the statement.
.
About 2 pages due in 24 hours Love Language Project Part I.docxaryan532920
About 2 pages due in 24 hours
Love Language Project Part I
Objective:
To demonstrate the principles of love languages and effective use of interpersonal communication skills through “gifting” a close interpersonal relationship.
Assignment:
Please research the 5 Love Languages. Set a time when you can interview your selected person, at least ½ hour. Choose a quiet, comfortable environment where you will be able to listen effectively. The goal of your interview is to learn how your selected person most likes to receive expressions of affection.
You might begin by sharing the five love languages with them and asking some versions of the following questions:
1. Based on the descriptions in this section and this piece, which of the five love languages is most appealing to you to receive?
2. Can you share a story/example of a time when you received affection this way?
3. Which is the most challenging/uncomfortable love language for you to receive?
4. Can you share a story/example of a time when you received affection this way?
5. What changes do you think you could make in the way you receive affectionate messages in your close relationships?
Please describe the person that you chose to interview and your relationship with them. Then, post their responses to the questions
Love Language Project Part II
Write a personal reflection paper, at least 1.5 pages long, double spaced, typed, include the following:
1. What did you learn about your selected person and their preferred love languages from your interview? What was challenging about the interview? What surprised you?
2. How does their preferred love languages differ from yours? Did this make it difficult to plan your special event?
3. Comment on planning your Love Language Event. How did you come up with your ideas? What was easy and what was challenging?
4. Comment on implementing your Love Language Event. What was enjoyable? What was challenging? Did it go as you’d planned?
5. Comment on the Love Language Project in general. What did you learn? About the other person? About yourself?
6. How might what you learned during this Love Language Project affect your expressions of affection in other relationships?
.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
According to Davenport (2014) the organizational value of healthcare.docxaryan532920
According to Davenport (2014) the organizational value of healthcare analytics, both determination and importance, provide a potential increase in annual revenue and ROI based on the value and use of analytics. To complete this assignment, research and evaluate the challenges faced in the implementation of healthcare analytics in the Health Care Organization (HCO) or health care industry using the following tools:
The paper must also address the following:
Application of PICO (problem, intervention, comparison group, and outcomes) to the challenge identified in your research.
The paper:
Must be two to four double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the
Ashford Writing Center. (Links to an external site.)
Must include a separate title page with the following:
Title of paper
Student’s name
Course name and number
Instructor’s name
Date submitted
Must use at least three scholarly sources in addition to the course text.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
.
According to the authors, privacy and security go hand in hand; .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
Q: From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
.
According to Gilbert and Troitzsch (2005), Foundations of Simula.docxaryan532920
According to Gilbert and Troitzsch (2005), Foundations of Simulation Modeling, a simulation model is a computer program that captures the behavior of a real-world system and its input and possible output processes.
Briefly explain what the simulation modeling relies upon?
-500 words at least.
-No Plagiarism.
-APA Format.
.
According to Klein (2016), using ethical absolutism and ethical .docxaryan532920
According to Klein (2016), using ethical absolutism and ethical relativism in ethical decision making can lead to different outcomes. How can moral reasoning about a specific situation differ based on relativism or absolutism? Can you provide an illustration or example of an accounting procedure/situation whose outcome may differ based on absolutism or relativism? Is ethical relativism a more suitable standard within a global IFRS Environment? Why or why not?
at least 250 words
.
According to Franks and Smallwood (2013), information has become.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Provide a page response identifying and clearly stating what the difference are? APA Standard, 2 page response, not including front page and references.
.
According to the Council on Social Work Education, Competency 5.docxaryan532920
According to the Council on Social Work Education, Competency 5: Engage in Policy Practice:
Social workers understand that human rights and social justice, as well as social welfare and services, are mediated by policy and its implementation at the federal, state, and local levels. Social workers understand the history and current structures of social policies and services, the role of policy in service delivery, and the role of practice in policy development. Social workers understand their role in policy development and implementation within their practice settings at the micro, mezzo, and macro levels and they actively engage in policy practice to effect change within those settings. Social workers recognize and understand the historical, social, cultural, economic, organizational, environmental, and global influences that affect social policy. They are also knowledgeable about policy formulation, analysis, implementation, and evaluation. Social workers:
Identify social policy at the local, state, and federal level that impacts well-being, service delivery, and access to social services;
Assess how social welfare and economic policies impact the delivery of and access to social services;
Apply critical thinking to analyze, formulate, and advocate for policies that advance human rights and social, economic, and environmental justice.
This assignment is intended to help students demonstrate the behavioral components of this competency in their field education.
To prepare: Working with your field instructor, identify, evaluate, and discuss policies established by the local, state, and federal government (within the last five years) that affect the day to day operations of the field placement agency.
The Assignment (1-2 pages): (In The States California. The Good Seed is a Drop-In center for 18-25 years!
Describe the policies and their impact on the field agency.
Propose specific recommendations regarding how you, as a social work intern, and the agency can advocate for policies pertaining to advancing social justice for the agency and the clients it serves.
.
According to the authors, privacy and security go hand in hand; and .docxaryan532920
According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls and technologies. Today, organizations must make not only reasonable efforts to offer protection of privacy of data, but also must go much further as privacy breaches are damaging to its customers, reputation, and potentially could put the company out of business. As we continue learning from our various professional areas of practice, its no doubt that breaches have become an increasing concern to many businesses and their future operations. Taking Cyberattacks proliferation of 2011 into context, security experts at Intel/McAfee discovered huge series of cyberattacks on the networks of 72 organizations globally, including the United Nations, governments and corporations.
From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to recent surveys, China, India, and the Philippines are t.docxaryan532920
According to recent surveys, China, India, and the Philippines are the three most popular countries for IT outsourcing. Write a short paper (4 paragraphs) explaining what the appeal would be for US companies to outsource IT functions to these countries. You may discuss cost, labor pool, language, or possibly government support as your reasons. There are many other reasons you may choose to highlight in your paper. Be sure to use your own words.
Must be in APA format with references and citations.
.
According to the authors, countries that lag behind the rest of the .docxaryan532920
According to the authors, countries that lag behind the rest of the world’s ICT capabilities encounter difficulties at various levels. Discuss specific areas, both within and outside, eGovernance, in which citizens living in a country that lags behind the rest of the world in ICT capacity are lacking. Include in your discussion quality of life, sustainability, safety, affluence, and any other areas that you find of interest. Use at least 8-10 sentences to discuss this topic.
.
According to Peskin et al. (2013) in our course reader, Studies on .docxaryan532920
According to Peskin et al. (2013) in our course reader, "Studies on early health risk factors, including prenatal nicotine/alcohol exposure, birth complications, and minor physical anomalies have found that these risk factors significantly increase the likelihood of anti-social and criminal behavior throughout life." What policy changes might you suggest to help curtail the occurrence or effects of these risk factors? Remember to think about public health policy, not just criminal policy.
.
According to Franks and Smallwood (2013), information has become the.docxaryan532920
According to Franks and Smallwood (2013), information has become the lifeblood of every business organization, and that an increasing volume of information today has increased and exchanged through the use of social networks and Web2.0 tools like blogs, microblogs, and wikis. When looking at social media in the enterprise, there is a notable difference in functionality between e-mail and social media, and has been documented by research – “…that social media differ greatly from e-mail use due to its maturity and stability.” (Franks & Smallwood, 2013).
Q: Please identify and clearly state what the difference is?
Use the APA format to include your references. Each paragraph should have different references and each para should have at least 4 sentences.
.
According to Ang (2011), how is Social Media management differen.docxaryan532920
According to Ang (2011), how is Social Media management different than traditional Customer Relationship Management (CRM)? Define the four pillars of social media (connectivity, conversations, content creation and collaboration) and analyze how each pillar can be used to aid Social Media management. Identify the benefits Social Media management. Provide examples to illustrate each point.
The paper must be 1-2 pages in length (excluding title and reference page) and in APA (6th edition) format. The paper must include the Ang (2011) article in correct APA format.
.
According to (Alsaidi & Kausar (2018), It is expected that by 2020,.docxaryan532920
According to (Alsaidi & Kausar (2018), "It is expected that by 2020, around 25 billion objects will become the part of global IoT network, which will pose new challenges in securing IoT systems. It will become an easy target for hackers as these systems are often deployed in an uncontrolled and hostile environment. The main security challenges in IoT environment are authorization, privacy, authentication, admission control, system conformation, storage, and administration" (p. 213).
Discuss and describe the difference between a black hole attack and a wormhole attack.
.
Accessing Non-Renewable ResourcesAs Hite and Seitz (2016) disc.docxaryan532920
Accessing Non-Renewable Resources
As Hite and Seitz (2016) discuss in Chapter 9: Alternative Futures, developed and developing countries that have access to the planet’s resources (because they can buy those resources from others or because those resources exist in abundance in that country) continue to grow at a fast pace, placing a tremendous strain on the availability of nonrenewable resources.
Briefly, what non-renewable natural resources are most at risk of depletion?
Discuss some sustainable development models that have broad applicability to the needs and consumption demands of both developing and developed countries.
.
Access the Internet Web site of any two U.S. state health department.docxaryan532920
Access the Internet Web site of any two U.S. state health departments and compare and contrast the two state-local public health systems in terms of their structure, general functions, specific services, resources, and other important features. Your focus should be on state-local public health systems in these two states, rather than only the state health agencies.
Two pages
Consider this week's discussion in the context of the Triple Aim Initiatives.
.
ACADEMIC CHALLENGES1Why Parents Force their Childr.docxaryan532920
ACADEMIC CHALLENGES 1
Why Parents Force their Children to Study Science Majors
Mahmoud Almutairi
California State University Fullerton
4/28/2020
The career choices people make usually have a serious impact on their future professions. This is because there is always a slight difference between the theories learned in the classroom and their application in the real world. Therefore, it is important that people be keen while deciding on which fields they would major their studies on in order to be competent in their industries. However, the parents, in most cases, try to get involved in the education of their children and try to encourage them, discourage or, in some cases, force them to study certain courses which are more preferred to them (Wong & Liu, 2010). For example, most parents try to force their children to study science-related courses such as medicine and engineering courses. (1) This may be a great challenge for an individual either in academics or in the professional world. In this paper, we will be discussing the reasons why most parents force their children to undertake science-related courses. Additionally, we will be able to understand the effects that this kind of situation may have on the future life of the student academically or professionally.(2) Comment by Sadnik, Daniel: What do you mean by most parents? Why the emphasis around science? Comment by Sadnik, Daniel: You don’t need to be so meta. Comment by Sadnik, Daniel: Who is we? Comment by Sadnik, Daniel: What connects these two statements? Situate the reader.
Reasons why parents want their children to study science-related courses.
Parents have a very important role in identifying the talents of their children and nurturing them. Generally, it is the wish of every parent to have academically successful children (Wong & Liu, 2010). This is because it is believed that when a child succeeds in academics, there is a higher chance for them to get higher-paying jobs in the future. Additionally, most parents think that taking a science course like engineering assures someone ready job opportunity. However, taking a science-related course such as nursing, medicine, or even engineering may be a great challenge for the child.(3) A good number of parents base their argument on the fact that they want their children to be competitive in the job market and also be able to enjoy high living standards(4). Some of the students live their lives to regret having taken certain courses instead of others
Comment by Sadnik, Daniel: How is this a great challenge compared to any other field of study? Comment by Sadnik, Daniel: What shapes these mentalities?
Another reason why you would find a parent encouraging or rather pressing their child to take a certain science course is the need for them to follow the parent's steps (Varlik & Apaydin, 2020). For example, if one of the parents is an engineer, he will want the child to be an engineer like him in order to make sure that the leg.
Access Control ModelsIf you were going to design an access sys.docxaryan532920
Access Control Models
If you were going to design an access system that would control people getting into your favorite or most valued items (e.g., financial records, health records, or other sensitive files), what things would you consider based on your readings from Chapter 14? (
CISSP: Certified Information Systems Security Professional Official Study Guide, 8th Edition
)
Make sure you address all the possible avenues of attack that could be exploited. Remember, security measures are designed to slow and draw attention to attackers. No system can completely prevent a successful attack.
.
Access Case 1-16 using the Cases link below this assignment..docxaryan532920
Access
Case 1-16 using the "Cases" link below this assignment.
Review
Ch. 1, Case 1-16, Research Case – Federal Financial Reporting Objectives.
Write
a 175- to 350-word response.
Briefly
describe the user groups, their needs for information, and how these tie into the four objectives of federal financial reporting identified in the statement.
.
About 2 pages due in 24 hours Love Language Project Part I.docxaryan532920
About 2 pages due in 24 hours
Love Language Project Part I
Objective:
To demonstrate the principles of love languages and effective use of interpersonal communication skills through “gifting” a close interpersonal relationship.
Assignment:
Please research the 5 Love Languages. Set a time when you can interview your selected person, at least ½ hour. Choose a quiet, comfortable environment where you will be able to listen effectively. The goal of your interview is to learn how your selected person most likes to receive expressions of affection.
You might begin by sharing the five love languages with them and asking some versions of the following questions:
1. Based on the descriptions in this section and this piece, which of the five love languages is most appealing to you to receive?
2. Can you share a story/example of a time when you received affection this way?
3. Which is the most challenging/uncomfortable love language for you to receive?
4. Can you share a story/example of a time when you received affection this way?
5. What changes do you think you could make in the way you receive affectionate messages in your close relationships?
Please describe the person that you chose to interview and your relationship with them. Then, post their responses to the questions
Love Language Project Part II
Write a personal reflection paper, at least 1.5 pages long, double spaced, typed, include the following:
1. What did you learn about your selected person and their preferred love languages from your interview? What was challenging about the interview? What surprised you?
2. How does their preferred love languages differ from yours? Did this make it difficult to plan your special event?
3. Comment on planning your Love Language Event. How did you come up with your ideas? What was easy and what was challenging?
4. Comment on implementing your Love Language Event. What was enjoyable? What was challenging? Did it go as you’d planned?
5. Comment on the Love Language Project in general. What did you learn? About the other person? About yourself?
6. How might what you learned during this Love Language Project affect your expressions of affection in other relationships?
.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Model Attribute Check Company Auto PropertyCeline George
In Odoo, the multi-company feature allows you to manage multiple companies within a single Odoo database instance. Each company can have its own configurations while still sharing common resources such as products, customers, and suppliers.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
2024.06.01 Introducing a competency framework for languag learning materials ...Sandy Millin
http://sandymillin.wordpress.com/iateflwebinar2024
Published classroom materials form the basis of syllabuses, drive teacher professional development, and have a potentially huge influence on learners, teachers and education systems. All teachers also create their own materials, whether a few sentences on a blackboard, a highly-structured fully-realised online course, or anything in between. Despite this, the knowledge and skills needed to create effective language learning materials are rarely part of teacher training, and are mostly learnt by trial and error.
Knowledge and skills frameworks, generally called competency frameworks, for ELT teachers, trainers and managers have existed for a few years now. However, until I created one for my MA dissertation, there wasn’t one drawing together what we need to know and do to be able to effectively produce language learning materials.
This webinar will introduce you to my framework, highlighting the key competencies I identified from my research. It will also show how anybody involved in language teaching (any language, not just English!), teacher training, managing schools or developing language learning materials can benefit from using the framework.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
The Roman Empire A Historical Colossus.pdfkaushalkr1407
The Roman Empire, a vast and enduring power, stands as one of history's most remarkable civilizations, leaving an indelible imprint on the world. It emerged from the Roman Republic, transitioning into an imperial powerhouse under the leadership of Augustus Caesar in 27 BCE. This transformation marked the beginning of an era defined by unprecedented territorial expansion, architectural marvels, and profound cultural influence.
The empire's roots lie in the city of Rome, founded, according to legend, by Romulus in 753 BCE. Over centuries, Rome evolved from a small settlement to a formidable republic, characterized by a complex political system with elected officials and checks on power. However, internal strife, class conflicts, and military ambitions paved the way for the end of the Republic. Julius Caesar’s dictatorship and subsequent assassination in 44 BCE created a power vacuum, leading to a civil war. Octavian, later Augustus, emerged victorious, heralding the Roman Empire’s birth.
Under Augustus, the empire experienced the Pax Romana, a 200-year period of relative peace and stability. Augustus reformed the military, established efficient administrative systems, and initiated grand construction projects. The empire's borders expanded, encompassing territories from Britain to Egypt and from Spain to the Euphrates. Roman legions, renowned for their discipline and engineering prowess, secured and maintained these vast territories, building roads, fortifications, and cities that facilitated control and integration.
The Roman Empire’s society was hierarchical, with a rigid class system. At the top were the patricians, wealthy elites who held significant political power. Below them were the plebeians, free citizens with limited political influence, and the vast numbers of slaves who formed the backbone of the economy. The family unit was central, governed by the paterfamilias, the male head who held absolute authority.
Culturally, the Romans were eclectic, absorbing and adapting elements from the civilizations they encountered, particularly the Greeks. Roman art, literature, and philosophy reflected this synthesis, creating a rich cultural tapestry. Latin, the Roman language, became the lingua franca of the Western world, influencing numerous modern languages.
Roman architecture and engineering achievements were monumental. They perfected the arch, vault, and dome, constructing enduring structures like the Colosseum, Pantheon, and aqueducts. These engineering marvels not only showcased Roman ingenuity but also served practical purposes, from public entertainment to water supply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Post one Submarine Warfare The North Atlantic There are nume.docx
1. Post one: Submarine Warfare: The North Atlantic
There are numerous instances of divided loyalties towards the
government and personal morality in the video. The first
illustration is when Pulaski, one of the survivor soldiers
strongly disagrees with how the government is treating them. He
condemns the government for its small appreciation and
acknowledgment of their situation. Also, Pulaski does not agree
with the fact that the government gave them medals as a symbol
of heroism. In his point of view, he thinks that the government
was not fair by awarding them medals only as he believes they
deserve more than what they got. Another illustration of
disloyalty is when the navy captain approaches Pulaski’s house
and asks him to participate in a governmental duty, and he
strongly disagrees acknowledging the needs of his wife. This is
a clear indication that Pulaski is not loyal to the government,
and he is has a high personal morality. Pulaski is experiencing a
significant impact of war as he is nervous or afraid the horrible
experience of war.
Yes, I have experienced a similar a situation. In 2009, I
experienced a terrific road accident. Images from the incident
were horrible, shocking and disturbing. Until today, I use
specific drugs to help me sleep as I experience nightmares with
images from that day.
Post two: Island Combat: Iwo Jima
The use of deadly force as a means of conflict resolution is
acceptable when the cause is right, the defending of one’s home
justifies the use of lethal force. In order to stop intruders or
invading armies, it is justifiable to take up arms to deter the
invaders from imposing their will on the people a certain area.
Conflict resolution takes many forms, negotiation is one of the
tools that help in the resolution of conflict since both sides are
able to air their grievances. At the event that one side does not
want to consider addressing the grievances of the other side and
2. instead seeks to impose its will and dominance on it, then the
other party is justified to take up arms against this intimidating
party. When backed into a corner with no means of exit from
such a situation, the use of lethal force is warranted since the
survival of the party or individual relies on such force in order
to resolve the conflict. The use of deadly force as a means of
conflict resolution is only justifiable after the exhaustion of all
the avenues that may lead to amicable conflict resolution, the
two parties need to hear each side out before deciding to take up
arms against the other party. The survival instinct of the
individuals or parties also helps justify the use of lethal force,
if the party or individual feels threatened and is not in an equal
standing with the aggressor then his stance in taking up arms
against the mightier force is justifiable since the question of
survival is at hand. The loss of life and property, and the
resulting instability has the capability to bring a nation down to
its knees overnight.
Resistance and war are as a result of disagreements between
two parties thus forcing both sides to pick up arms against the
other party. War and resistance do not justify the use of lethal
force since there are numerous channels which can be pursued
in order to reach an amicable solution. The two parties should
completely exhaust all the avenues of conflict resolution, they
should seek help from other parties in order to help them to
incorporate ideas and suggestions that are sound and objective.
The deliberation between these disagreeing parties should not
be driven by blame games, they should seek solutions and
remedies to the problems at hand rather than dealing with the
past thus ensuring that the bitterness and contempt does not
have a place in the conflict resolution efforts. The use of deadly
force in conflict resolution only begets more conflict since it
cultivates emotions of anger and resentment towards the party
believed to be the aggressor. The use of lethal force does not
end the cycle of violence, instead it fuels it thus making it a
common norm. The cycle of violence does not end with war or
resistance since the presence of war or resistance on leads to the
3. creation of victims thus leading to the formation of emotions
that are fueled by anger and rage towards the parties believed to
be the aggressors. These emotions lead to the propagation of
more violence citing revenge as the motive since the victims
believe that they have the right to retaliate in order to obtain
vengeance for their fallen and the damages they received as a
consequence of the actions of the aggressor. The human cycle of
vengeance has proven to be continuous and everlasting since the
cycle always has victims that feel that they need to avenge their
fallen. The only remedy to conflict is attainable through the use
of conflict resolution tools that do not resort to the use of lethal
force.
Post Three: The Bosnia War
The Bosnian War
The Bosnian war was between Bosnia and Herzegovina. It was a
territorial conflict in which Bosnian Serbs wanted to establish
their own republic. The creation of Autonomous Serb Regions
in Yugoslavia and Bosnia was not recognized. The position
angers Bosnian Serbs whose forces began firing at Sarajevo
thereby driving the Bosnian people out of the city. The situation
deteriorated when the Bosnian Serbs took control of 70 percent
of the area and NATO forces intervened by shooting down of
Bosnian Serb planes. It would be protracted leading to losses of
many lives.
Response Question One
The UN is thought to have a calming effect. In the Bosnian war,
the UN headquarters had to be located in Sarajevo, a place that
would be neutral because it was a multicultural city inhabited
by Bosnian Serbs, Bosnians, Bosnian Orthodox and Catholics.
The UN could also be capable of humanitarian aid by operating
from Sarajevo and ensuring the stability of safe regions. It is
essential that the United Nations remains neutral so as to ensure
that it enhances its credibility. There are tensions between the
4. East and the West and the UN has to be level headed to enhance
stability.
Response Question Two
The UN allowed Srebrenican to be over run by Bosnian Serbs
killing around 7,000 men and boys, with a majority being
Bosnian Muslims. Apparently, the UN failed to boost the
number of officers protecting the people at the safe area. The
conflict would have been ended earlier if the UN would have
allowed the Bosnian Serbs to have their own republic as they
first agreed in the referendum but only have them either in
Yugoslavia or Bosnia to avoid two republics with the same
people who would lead to tension from the Croatians and
Muslim Bosnians and Serbs. Also, the UN would not have
applied the neutrality perspective since there were people from
many backgrounds. They would have asked for more
reinforcement with more security forces.
Post Four: Trench Warfare: France, 1917
Germany declared a war against France.
In 1914, Germany declared a war against France. Soon after,
France declared war against Germany. France readied their
troops to move into the Alsace and Lorraine provinces, its
provinces forfeited to end the Franco-Prussian war. France
fought to regain the territory that was achieved while there were
adverse results from the war. For instance, areas of Northern
France had the infrastructure badly damaged. France emerged as
the leading land power in the entire Europe. France also
suffered multiple causalities in the war. They however
pressurized the Germans since they wanted the custody of the
Rhineland. The French wanted the region separated from
Germany.
One of the biggest flaws that led to the war between the French
and the Germanys was the failure to establish discrete
international boundaries. The French and the Germanys were
fighting over the ownership of provinces that were in contention
while there existed controversies about how the Germans came
to own the regions. There was also the pressure to join blocks.
5. There was a desire for Nazi Germans to assert their military
might without any alignment while the French were part of the
allies.
In the contemporary world, there is a still a likelihood that
countries can go into war because of territorial control. There is
still disputed ownership of islands between China and Japan
that also makes the US side with Japan. There is an escalation
of tension especially when a country issues orders of a no-
flying zone. The only possible cure is in bilateral talks between
countries to trace who rightfully owns certain sections instead
of resorting to military interventions. However this is the
expectation, it is a difficult one as the countries themselves may
be unwilling to begin talks.
Post Five: Urban Stalingrad
World War II was referred to as Wehrmacht.
The German Army that took part in the World War II was
referred to as Wehrmacht. It was mostly comprised of the
regular German armed forces. However, it was later
demobilized and dissolved in 1946. The army also comprised of
the Navy and the Air Force. Approximately, about 18 million
soldiers served in the Wehrmacht; 10 million of whom became
casualties. During the expansion by Adolf Hitler, the German
troops continued to develop new concepts that pioneered during
the First World War. The German army made use of tactical and
operational methods such as the battle of annihilation and
encirclements. The German army had quick victories in the first
couple of years of the Second World War.
The difference in behavior within the German army can be
attributed to ideological and situational factors. Critics have
argued that the racist Nazi stereotypes and indoctrination should
be fully integrated in the chaotic context of explaining the
behavior of German troops. There were no clear military or
government orders that could regulate criminal behavior
towards various groups of war prisoners. Many of the atrocities
were committed by the elite German troops or Nazi military
troops. These troops were already being held accountable for
6. excesses and racist behaviors as well as mass murders in the
1940s. However, some German officers managed to prevent
some of these atrocities from occurring.
Researchers have linked these events to the absence of
governmental or military guidelines for the German army on the
treatment of war prisoners, in addition to situational and
ideological factors. The film has attempted to integrate the
singularity of the atrocities in the concept of an informal war
that was waged by the German army during the Second World
War. There were two type of warfare that was conducted by the
German troops. This provides a short-lived historical
orientation of how the German soldiers behaved during World
War II.
There is the integration of the concept of Nazi racism in the
German warfare campaign. However, this idea has not yet been
typically assessed by conventional military history. Critics have
proposed new and interesting interpretation of German troops’
behavior during World War II.
The overall portray of racism stereotypes and prejudices in the
film are precise and well contextualized. The film has attempted
to integrate the long existing racism stereotypes into the film’s
events and causes. There is a need to assess the evolution of
racist stereotypes in Germany. Going back to the colonialism in
West Africa provides more contexts for the explanation of racist
behavior in the World War II. The racist German stereotypes
have been linked to the French army during the First World
War. In the film, racism has been shown to be part of the
German culture during and before the World War II. Racism
tendencies were known to be frequently employed by Nazis
after the outbreak of World War II. This could explain the
behavior of the German troops during the war.
Even though the film cites some important aspects for assessing
the behavior of German troops that resulted in such atrocities,
the analysis of various motivations could have gone deeper.
There could be a psychological pattern of dehumanization that
led to massacres. However, this attempt in explaining the
7. behavior of German troops presents some methodological limits.
These limits present questions on whether dehumanization and
authorization allowed the atrocities in the Second World War.
Post six: Resistance to Tyranny: Hitler
Resistance movements are like campaigns that are held by civil
rights people when they want to be heard on certain issues that
are affecting them in different areas. Most resistance
movements are done as a way to air their grievances in a much
peaceful and calm way than the violent ways. To resist is to
refuse to do something and hence, resistant movements were
done to protest in a silent way and a much more calm way but
still pass the information to the leaders. The reason why
resistance works or is useful in many instances is that it is not a
violent way. During the world war, people used strength so as to
voice their grievances to the leaders. They would refuse to go to
work or even eat as a form of protest on matters that they felt
were oppressive to them and their good being. When people
resist doing something they cannot be forced hence for them to
go back to work, their employers have to meet their demand and
expectations. Many resistance movements were much more
peaceful and bore more fruits, or the results were seen than
cases of strikes or where violence was used. During the time of
Hitler people resisted his way of reign or ruling. By resistance,
that is how they got to be heard and to air their grievances and
problems. Resistance movements were being held by war
protesters to air their issues so that the leaders could take an
action on what was affecting the people. Mainly resistance
movements yield results that were intended not because they are
peaceful but because their primary aim is not to cause a riot but
to express what they feel and also to ask for what they want
from their leaders.
I previously thought that resistance was not an effective way to
end the war but seeing what happened in Hitler and tyranny, I
can say that opposition can stop the war and bring peace. Most
fights happen may be because people do not want to do what
they are asked to do by the leaders and that will lead to them
8. resisting what they are asked to do. In the case of tyranny and
Hitler, there was resistance that led to the people get what they
were requesting for and what they had hoped to get. I used to
think that resistance leads to more war because the leader is not
happy with the actions of the people.
However, because resistance movements are meant to bring
change, that is why when applied they bring change. For
example in a place of work where one does not like how they
are being treated they can result in resistance. I prefer
resistance to strikes and other violent ways of seeking justice or
attention. When people refused to work this lead to the
resistance movement, then their actions are taken seriously. I
can recall one day I saw some industry workers resist being
inspected at the gate because it was inappropriate. At the end of
the day, it paid fruits as their resistance led to a change in how
things are done. My view of resistance changed one I realized
that it is a better way of asking for change than to strive or
cause havoc. Many people get results just from them resisting
than from them using force. I can also relate to the time of the
world war how the people resisted being conquered and what
happened is that they were given their freedom when they had
resistance movements than when they tried to fight back. Hence,
I change my view of strength as it yields positive results than
other methods to stop the war.
References
https://ils121.wordpress.com/2008/07/18/film-analysis-
terminology-a-guide-from-yale-university/
Hamerow. T.S (1997) On the Road to the Wolfs Lair: Germany
Resistance to Hitler Retrieved
From: http://www.books.google.com
9. Post seven: Resistance to Occupation: Algeria
Difference in Reaction between Iraq and Algeria
Countries react differently when they have been occupied or
invaded by mightier powers. Algeria and Iraq were not an
exception when they were occupied by French and United States
respectively. The forum discusses how the reaction of Algeria
to French occupation differed from that of Iraq to the United
States.
It is imperative to note, although both Algeria and Iraq
resisted the invasion of their countries, they did that for
different reason. First and foremost, the Algeria was first
occupied French in 1830 where they imposed their French rule.
This resulted into influx of Europeans in the region mainly
working class and peasant farmers mostly from Italy, France
and Spain. Consequently, they took ownership of the most land
of the native Algerian. The French expanded their influence to
the southern suppressing resistance and establishing
Christianity to replace Muslim which was a dominant religion
(Dunwoodie, 1998).
As a result the Algerian decided to put a fierce
resistance against the French who were discriminating their
Islam region and tradition. Abd al Qadir led the resistance
against the French and later on managed to occupy two-thirds of
Algeria. However, he was later defeated by French troops. Other
resistance came up in Eastern Algeria in the Kabylie region and
spread to the whole country. This was triggered by the French
extending their colonial rule to independent self-governing
reserve and violations of agreements signed between them and
the French. It should be noted, this was considered as religious
war at some point. This made the natives to be treated like
subjects because of their religion. This culminated into anger
and hatred towards French government (Dunwoodie, 1998).
On the other hand, the American troops occupied Iraq
for a mission which was totally different from that of French
invasion. The American under the Bush administration occupied
10. Iraq in 2003. This was after they suspected that Saddam Hussein
regime was manufacturing weapons of massive destruction. The
Coalition forces under the leadership of the United States
occupied Iraq and moved on swiftly to establish control in the
major cities. In contrast to French occupation, the American
occupation was marked by resistance from militia groups but
the transitional government of Iraq supported them. These
groups organized attacks on the Coalition forces as well as the
government of Iraq. This marked a major difference with all
Algerians who were fighting a common enemy; French. More
importantly, there was no established government as the
different regions established their independent authority (Ricks,
2006).
Furthermore, the Algerians were resisting against
discrimination based on religion and traditions whereas the Iraq
militia groups were launching attacks on American troops due
to the fact they supported the government (Dunwoodie, 1998).
This is a great demonstration that Iraq had mixed reactions
against the American invasion. The civil war in Iraq also
contributed to this reaction as different groups including the
government of Iraq perceived the occupation of Americans
differently. There were group of Iraq people who supported the
American invasion and others resisted. In the supported them.
These groups organized attacks on the Coalition forces as well
as the government of Iraq. This marked a major difference with
all Algerians who were fighting a common enemy; French. More
importantly, there was no established government as the
different regions established their independent authority (Ricks,
2006).
From the essay, it is evident that, although both
Algeria and had some element of resistance with occupation of
French and American in their country, they reacted differently.
Resistance of the Algeria was based on religious discrimination
and grabbing of land. On the other hand, in Iraq there was no
common ground for resisting the Coalition forces. Others
resisted them for fear of foreign domination and control and
11. others for supporting the transitional government. They
received collaboration from the transitional government.
: Reference
Dunwoodie, P. (1998). Writing French Algeria. Clanderon Press
Ricks. T.E. (2006) Fiasco: The American Military Adventure in
Iraq. Penguin press
IR-Research II. (Four pages)
Note: I send you seven post, to choose one and to do this
assignment,
Assignment Instructions
This assignment is a take-home essay of about four pages,
designed to measure your knowledge and assimilation of the
material we have covered in IRLS507. You will be asked to
choose your best initial post in the Instructor Forum of any
week, then to revise and further document it to make it into a
"publishable piece." Your revisions should also include what
you have learned from your independent study in the Yale Film
School, revisions that deal with the more technical aspects of
film making. Please put your new material in italics so that I
don't have to search for it.
https://ils121.wordpress.com/2008/07/18/film-analysis-
terminology-a-guide-from-yale-university/