Archive for August 21st, 2019

Legislative Effects On English Language Learning

From your required readings, choose one Supreme Court case or one educational policy pertaining to English language learners (ELLs). In a 500-750 word essay, discuss the effect that this case or policy has had on the education of ELLs. Your essay should address the following questions:

 

  1. How has this case or policy helped contribute to the academic success of ELLs?
  2. How will this case or policy help improve education for ELLs?
  3. What gaps still exist?

 

Support your essay with at least three scholarly resources.

 

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

 

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

 

You are required to submit this assignment to LopesWrite

What is Stuxnet, and what set it apart from other potential threats?

 Click the link below to access and read the following article: 

 

 

 

 Singer, P. W. (2015). Stuxnet and its hidden lessons on the ethics of cyber weapons. Case Western Reserve Journal of International Law, 47(3), 79–86. Retrieved from https://libraryresources.waldorf.edu/login? auth=CAS&url=http://search.ebscohost.com.libraryresources.waldorf.edu/login.aspx? direct=true&db=tsh&AN=108307851&site=ehost-live&scope=site 

 

 

 

 Write an article critique that begins by addressing the following questions: What is Stuxnet, and what set it apart from other potential threats? How did Stuxnet get around standard computer operating systems? 

 

 Then continue with your article critique by analyzing the strengths and weaknesses of the article by addressing the following items: Do you agree or disagree that Stuxnet could be considered a cyber weapon? Could nations consider this type of attack an act of war? Why, or why not? Do you agree or disagree with the author’s viewpoints on the ethical considerations and implications of Stuxnet? Do you believe that the United States should be able to use worms such as Stuxnet to counter unsanctioned nuclear programs? What consequences might result from such use? Do you believe that the United States has updated critical infrastructures to deal with potential threats similar to Stuxnet? 

 

 

 

 At the end of the article, in the second-to-last paragraph, the author suggests two ways in which to judge the ethics of Stuxnet. Explain why you align yourself with one of the two focuses given, or offer your own focus and an explanation. Finally, answer the question posed at the end of the same paragraph. 

 

 

 

 Your article critique will be a minimum of three pages, not counting the title and reference pages. It should present an insightful and thorough analysis with strong arguments and evidence. You must use a minimum of two sources in addition to the Singer article in support of your analysis. All sources used will be properly cited. Your article critique, including all references, must be formatted in APA style. 

 

 

 

Reference:   Baggett, R. K., Foster, C. S., & Simpkins, B. K. (Eds.). (2017). Homeland security technologies for the 21st century. Santa Barbara, CA: Praeger. 

What are the advantages and disadvantages (or dangers) of these tools?

Digital Dossier: The amount of personal information available on the internet is frightening. Anonymous users can discover your name, DOB, place of address (with a photo), email address(es), dating profiles, phone number, likes, dislike, family relatives, social media accounts, and photos …the list goes on and on. Using Google, https://inteltechniques.com/menu.html, or other tools, research the information available on yourself. Try to find all the information listed above (make sure to list the sites you found it on) and then answer these questions: What are the advantages and disadvantages (or dangers) of these tools? Were you aware that this information was online? Does knowledge of this information on these sites make you vulnerable? What steps could you take to make this information harder to obtain?

 

 

 

Background: The amount of personal information available on the Internet is frightening. Anonymous users can discover your name, DOB, place of address (with photo), email address(es), dating profiles, phone number, likes, dislike, family relatives, social media accounts, and photos …the list goes on and on.

 

 

 

Requirements: Using https://osintframework.com/ , or other tools (ex. Google), research the information available on yourself. Try to find all of the information listed above (even if some of it might be inaccurate) and make sure to list the sites (URLs) you found it on. If you cannot find a specific information, explain what you tried to do in order to find it. Then, answer these four questions:

 

What are the advantages and disadvantages (or dangers) of these tools?

 

Were you aware that this information was online?

 

Does knowledge of this information on these sites make you vulnerable?

 

What steps could you take to make this information harder to obtain? (give example of actual, specific steps)

 

There is no specific number of pages for this assignment. It has to have enough pages to prove your point and to cover all the requirements.

MAT 510

“One-factor-at-a-time (OFAAT) and Design of Experiment (DOE)” Note: Online students, please select one of the two subjects to discuss.

  • Per the textbook, trying to understand factors that impact the outcomes of business process is an important aspect of improving business operations. Conventional wisdom plans experiment one-factor-at-a-time (OFAAT). Compare and contrast the main advantages and disadvantages of OFAAT and DOE and select the approach (e.g., OFAAT or DOE) that you would use in order to obtain effective business process. Provide a rationale for your response.
  • Select one (1) project from your working or educational environment that you would apply the DOE technique for the work process. Next, analyze the overall manner in which you would utilize DOE to manage and improve the work process of the project in question. Provide a rationale for your response.
 
 
 

Research the use of mobile technologies such as networks, devices, and software by terrorists or terrorist organizations.

To inflict widespread harm, terrorists often use conventional strategies and weapons such as suicide bombings and shootings; however, the Internet and mobile technologies have truly enhanced terrorists’ capabilities and their ability to inflict widespread harm and create awareness of their agendas. 

 

 Research the use of mobile technologies such as networks, devices, and software by terrorists or terrorist organizations. Write an essay that addresses the following questions. 

 

 In what ways are terrorists using technologies such as broadband and wireless to their advantage? Cite recent examples.  In your explanation.  What devices and software applications are being used by terrorists and for what purposes? What future advancements in terrorist use of technology do you predict, and why? What technology advancements might counter-terrorism efforts benefit? What, if anything, can be done to counter terrorist activities on a public network, system, or social media platform? 

 

 Your essay should contain an introduction and be well organized. It must be a minimum of three pages, not counting the title and reference pages. You must use at least two sources outside of your textbook. All sources will be properly cited. Your essay, including all references must be formatted in APA style. 

 

Reference:  Baggett, R. K., Foster, C. S., & Simpkins, B. K. (Eds.). (2017). Homeland security technologies for the 21st century. Santa Barbara, CA: Praeger 

 

 

error: Content is protected !!