Microsoft Word

   

   using Microsoft Word or Publisher, create a pamphlet for families that outlines the requirements in the IFSP and IEP processes. Include information for students in birth-PK programs and grades K-3. Describe the roles and responsibilities of both the early childhood teacher and the parents. Provide sources of information for parents who need support in the IEP and IFSP processes (Web sites, parent information networks, support services, etc.). State education sites are a good source of information. You might use http://nichcy.org/bridging-home-school-communications as a resource to see examples of parent communications.

Discussion 3- Project Risk & Quality Mngnt

Chapter 4: Project Risk Management SystemsInitial Postings: Read and reflect on the assigned readings for the week. Then post what you thought was the most important concept(s), method(s), term(s), and/or any other thing that you felt was worthy of your understanding in each assigned textbook chapter.Your initial post should be based upon the assigned reading for the week, so the textbook should be a source listed in your reference section and cited within the body of the text. Other sources are not required but feel free to use them if they aid in your discussion.Also, provide a graduate-level response to each of the following questions:

  1. Explain each of the following steps in risk evaluation and remediation.
    • Risk identification
    • Risk evaluation for chance of occurrence
    • Risk evaluation for impact if the risk takes place.
    • The four types of risk remediation,
    • What is a project risk owner,
    • What is a risk threshold.
    • What is a risk matrix.

Text

Title: Managing Project Risks 

ISBN: 9781119489733 

Authors: Peter J. Edwards, Paulo Vaz Serra, Michael Edwards 

Publisher: John Wiley & Sons 

Publication Date: 2019-08-13

Successes of Knowledge Management Systems

The research paper must be at least 15 pages supported by evidence (citations from peer-reviewed sources).  

• A minimum of four (4) peer-reviewed journal citations are required. 

1. Chapter 1 illustrates the document details of the research report and constitutes Background/Introduction, Problem Statement(s), 

Goal(s), Research Question(s), Relevance and Significance, Barriers and Issues related to topic chosen.

2.  Chapter 2 should consist of student paraphrasing the cited research material (i.e. what happened in case study x). 

3. Chapter 3 should be the reasoning for doing a basic compare/contrast or 

advantages/disadvantage of what was stated in Chapter 2 (do not state because the professor said so). 

4. Chapter 4 is a complete analysis, synthesis, and evaluation of what was stated in chapter 2. In effect, chapter 3 is a statement of what will be done 

and chapter 4 is what was done and what the findings were. Again, thus far the writing is objective and must not contain student opinion. 

5. Chapter 5 states results, conclusion, and future work recommendations.

Ethical Hacking week 8

Locate an article on a system breach (Target stores, Sony Pictures, US Government, and many more).In 2-3 paragraphs, briefly explain the situation and what kind of information was compromised. How large was the breach and how long did it take to find the problem. Include a link to any of your Internet resources. 

DISCUSSION

 

Perform a search within the Education via ProQuest database in the Rasmussen e-library, and perform a search for Cybersecurity Risk Assessment. (You can find this database listed alphabetically in the Rasmussen A-Z Databases.)

Find an article that you feel best describes what a risk assessment is.

Make an initial post that addresses the following:

Using the list of departments below, choose which department you would begin with when performing a risk assessment? Your choice should be based on which department you feel poses the greatest risk to the organization. Explain your reasoning in making that decision.

  • Production / Manufacturing
  • Research and Development
  • Purchasing
  • Marketing
  • Human Resources
  • Accounting and Finance

For your reply post, expand on your peer’s post by including additional areas of risk that this particular department has, and explain how the risk assessment will help you identify those risks.

Jaqvascript Landing Page

 

For this project, you will be writing most of your code in js/app.js

Rubric Tip: All the points mentioned below will help you to satisfy the criteria for the project rubric. Please make sure to re-review the rubric for detailed project requirements prior to submission.
Start by linking your app.js.
Build out your HTML and at least 4 content sections. The rest of your functionality relies on these sections.
Take a quick look at all the HTML elements in index.html. Note the values for their id, class, and data attributes.
Think about how you can create, say, an unordered list (i.e., bulleted list) in HTML from this structure, and where you be placing that list.
Think about how you’ll test whether a section is in the viewport.
What actions are you performing that will cause interactivity with the DOM?
Build the navigation menu.
Add functionality to distinguish the section in view.
How can we use classList methods to change the CSS being displayed? What about removing that CSS?
Add the functionality to scroll to sections
Add an active state to your navigation items when a section is in the viewport.
Detect the element location relative to the viewport using .getBoundingClientRect() built-in function.
Set CSS class active state when the element is in the viewport.

DB 5 CIS337

 

Sunrise Consultancy is a medium-sized consulting firm that operates 17 offices around the world (Dallas, Chicago, New York, Atlanta, Miami, Seattle, Los Angeles, San Jose, Toronto, Montreal, London, Paris, Sao Paulo, Singapore, Hong Kong, Sydney, and Mumbai). They have been using Internet connections to exchange email and files, but the volume of traffic has increased to the point that they now want to connect the offices via a WAN. Volume is low but expected to grow quickly once they implement a new knowledge management system. What type of a WAN topology and WAN service would you recommend? Why?

With your peers, discuss how WAN performance can be improved.

FitzGerald, J., Dennis, A., & Durcikova, A. (2021). Business data communications and networking. Hoboken, NJ: Wiley.

LIT101 week 6 A

This week, we will discuss accents and dialects in literature. The following are a list of potential authors and works you can use for this assignment. I tried to choose works that you might easily find excerpts online. You are not required to use someone from this list, but this is a good range of different types of accents and dialects. 

Authors Who Use Accents and Dialects

·  Mark Twain: Adventures of Huckleberry Finn

·  Toni Morrison: The Bluest Eye

·  Trainspotting: Irvine Welsh

·  Wuthering Heights: Emily Bronte

·  Tess of the d’Urbervilles: Thomas Hardy

·   Anything by Shakespeare

Initial Response

Choose an author and find a brief excerpt online of one of their works. Choose a paragraph or two from their work and paste it into the discussion. Don’t forget to cite it. Then, answer the following questions about the excerpt you chose. 

  • What accent or dialect did this author use?
  • What does the accent or dialect convey about the character(s) in this excerpt?
  • Do you think the author uses the accent or dialect effectively? Why or why not?

Responses to Others

Electronic innovation and the government

 

Electronic innovation and the government

Find a peer-reviewed scholarly journal article discussing electronic innovation and the government. Complete a review of the article by writing a 2-3 page overview of the article. This will be a detailed summary of the journal article, including concepts discussed and findings. Additionally, find one other source (it does not have to be a peer-reviewed journal article) that substantiates the findings in the article you are reviewing. 

You should use the UC library (https://www.ucumberlands.edu/library) and/or Google Scholar to find these types of articles (https://scholar.google.com/ )

Once you find the article, you will read it and write a review of it.  This is considered a research article review.

Your paper should meet these requirements: 

  • Be approximately three to four pages in length, not including the required cover page and reference page.
  • Follow APA 7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
  • Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
  • Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.