Instructions:    Option 2: Self-Regulation PaperUsing material in textbook readings for this week, create a 3- to 5-page essay to explain the processes of self-regulation of learning described in t

Data too large for file format

 

“Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code “Newclient”

The post Instructions:    Option 2: Self-Regulation PaperUsing material in textbook readings for this week, create a 3- to 5-page essay to explain the processes of self-regulation of learning described in t appeared first on Psychology Homework.

discussion the contribution of classical theorists to contemporary developmental theorists

While all major developmental theories attempt to explain the growth of individuals, each theory has a slightly different perspective. Some theories emphasize environmental (nurture) more than biological (nature) influences. Some theories focus on a particular construct (e.g., cognition), while others emphasize the impact of age range in shaping development. Piaget’s cognitive developmental theory emphasizes fixed stages during which the mind’s capacities allow an individual to learn about the world. Vygotsky’s sociocultural theory, on the other hand, is not stage-based and describes growth as an interaction between the individual and his or her environment.
Contemporary theories (e.g., Langer’s theory of mindfulness) typically build upon the foundation generated by earlier theories. Langer’s theory of mindfulness contains similarities to classical theories, such as Vygotskys sociocultural theory, in that they both agree that development is contextual and the organism is an active “mindful” participant. Langer took Vygotsky’s theory to a new level, focusing specifically on education and the learner. Other contemporary theories include neo-Piagetian cognitive developmental theories, which attempt to address the limitations found within Piaget’s classical theory. Robbie Case, Andreas Demetriou, and Kurt Fischer proposed theories that were extensions of Piaget’s theory. These theorists added concepts that expanded on cognitive functioning within the stages of development. Most developmental psychologists today do not believe that a single perspective or theory can sufficiently explain lifespan development; rather, an eclectic approach accounts for development better.
For this Discussion, you will examine classical and contemporary developmental theories as they relate to current applications in developmental psychology.
To prepare for this Discussion:

Review the course text and other Learning Resources related to mid-20th-century theories and recent theoretical perspectives
Select two theories from the following list, one from each column (classical, contemporary), that examine the same developmental processes (i.e., cognitive, physical, and/or social-emotional).

Classical TheoriesContemporary Theories

Psychoanalytic/Psychosexual
Psychosocial
Behaviorism/Learning
Social Learning
Cognitive-Developmental
Information Processing
Developmental Cognitive Neuroscience
Ethology/Evolutionary Developmental
Sociocultural
Systems Theory

By Day 4
Post a brief description of the two theories you selected (one classical and one contemporary). Contrast the theories you selected. Specifically, identify important similarities and differences, including an explanation of the strengths and limitations of each theory in explaining developmental processes (i.e., cognitive, physical, and social-emotional). Note:Your descriptions should be in paragraph form, not bullet points. Use your Learning Resources and/or other scholarly sources to support your post. Use proper APA format and citations.
Zero plagiarizing and APA formatting, Quote work, No.coms
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!Use Discount Code “Newclient” for a 15% Discount!NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Action for success – powerpoint presentation

 

During this course, we have looked at what honest, upright people do to become successful in life. They:

  • take control of their own fate
  • take personal responsibility for their actions
  • develop self-confidence
  • think critically and ask questions
  • plan to act early rather than procrastinating
  • turn to capable people when they need help or advice
  • demonstrate flexibility and interest in lifelong learning
  • practice moral and ethical behavior

While the above actions are important, they are by no means the only actions one can take to be successful.

  • Think of one additional action you can take to bring about your success, both academically and in life generally.
  • Search for a quote that highlights the value of that action and that you personally find meaningful.
  • Research some brief information about the individual who is credited with making the quote. When did they live? Are they famous? If so, what are they famous for? Note: This means that you cannot choose a quote by someone anonymous.
  • Explain in your own words what the quote means.
  • Explain why the quote is meaningful to you, e.g., by providing an example from your life experience.
  • Relate the important message the quote has for students who want to achieve academic success.

Create a PowerPoint presentation that includes all of the above.

Grading criteria for the oral presentation (2 points for each of the following):

  • I make a presentation that is about 4 minutes long.
  • I present the quote on a slide and give my colleagues a chance to read it.
  • I accurately paraphrase the meaning of the quote.
  • I explain why the quote is meaningful to me.
  • I connect the message of the quote to academic success.
  • The layout of the slides balances text and images.
  • The text uses bullet points – is in note form, not complete sentences
  • The text is grammatically correct.
  • The text uses academic vocabulary.
  • I speak in a loud, clear voice.

Total: 2 x 10 = 20 points

To help you with your presentation, if you’d like, here is an outline you can follow:

I have chosen a quote about _____________________.

This quote is by ____________________. S/he is/was a __________________ who lived _______________.

Please take a minute to read it.

This quote means ____________________.

I chose this particular quote because ________________________.

I also believe it relates to our academic success here at Cedar Crest College because ____________________.

Do you have any questions you’d like to ask me?

Previous
 

M4.10 Reflection: Secure practices for password Management

Introduction

The secure storage of passwords is crucial for application security. In this assignment, you will analyze and list the best practices for the developer for storing the passwords securely in the application.

Instructions

Refer to M4.5: Web-based Authentication and Authorization: Secure Practices. Of the 17 secure practices listed, reflect on three (3). In a 2-3 page paper, address the following:

Based on your web experiences with websites, give an example where, in general,  developers are following these best practices.
Explain the strengths and weaknesses of the mitigation tools and practices related to your selections, e.g. input validation, secure cookies, authentication, password challenges, and cryptography.
Research and determine a current (within 2 years) exploit that has happened because of poor implementation of one or more of these secure practices.

M4.5: Notes

Module Notes: Web-based Authentication and Authorization: Secure Practices
Image of a consultant touching the virtual screen showing a lock icon depicting cyber security

Here are a few secure practices for authentication and authorization:
1.Username should be unique and case insensitive.
2.Request to access restricted resources should be authenticated and the user roles should be verified before granting the access.
3.The applications should only allow secure passwords. The passwords should be of a minimum of 8 characters and should contain an uppercase letter and a number.
4.Passwords should not be stored in cleartext. The best way to store is by using one way salted hash of the passwords.
5.Authentication failure messages should be generic and should not indicate in any way the cause of the error. Even applications with the same error message but different HTTP error codes can lead to security threats.
6.The input should be validated at all entry points of the application to avoid attacks like cross-site scripting, SQL injection, etc.
7.The application should require re-authentication for updating sensitive information on the website to mitigate session fixation and CSRF attacks.
8.Simple challenges in the forgot password feature can be used to easily bypass the authentication mechanism in a website. So, this feature should be securely implemented. Multiple questions should be used to authenticate the user and a multi-factor token challenge should be used to reset the users password. After the successful password reset, the current session should end and the user should be redirected to the login page.
9.The application should restrict login attempts to prevent the hacker from cracking the password using brute force or dictionary attacks.
10.The developer should address the security issues related to delegable credentials. The delegation should be time-specific and the link should expire after some period.
11.All authentication failures should be logged.
12.Session cookies should be stored securely. The persistent cookies should expire after a few hours. Always enable secure attribute of the cookie that prevents the transmission of cookie over an unencrypted channel. Session ids should be unpredictable.
13.Remember me feature should re-authenticate when the user changes data across security boundaries.
14.Http Only attribute of the cookie should be set to prevent JavaScript from reading sensitive values.
15.The session id should be regenerated every time the user authenticates. This mitigates threats like session fixation.
16.Use secure authentication protocols.
17.Track the IP address of the user to limit the login attempts.