Discussion | Science homework help

  • In your own words, explain to the other swashbucklers what the north-south and east-west lines represent. 
  • Explain how difficult would it be to pinpoint a location on a globe without using a coordinate system.
  • Describe your plan to figure out where you are and how you could get back home. Work with the others to devise a plan. The best laid plans will earn extra points.

Expectations

Your write-up should be at least 250 words. Thoughtfully respond to at least two other swashbucklers – you may comment about their approach to locating landmarks on a map using the coordinate system or help them brainstorm on how you are going to help each other get back home. Each response to your fellow shipmates should be a least 40 words (about 3 sentences). Please review the rubric to see how you will be assessed by the Captain. This is your first chance at earning some gold!

research paper social issue in the movie 1

My Movie is: Gladiator

For this essay, you will be examining an Academy Award nominated movie with special attention to the social issues found in the movie (marriage, war, poverty, racism, disability, environment, etc.) We will practice locating and analyzing these issues in class. (It’s important to remember that a film might contain more than one issue, but you need to pick just one.)You will research public opinion about the issue presented in the film during the time of the film’s release. Then, you will analyze whether or not this film reinforced or challenged public opinion at the time. How does it present its argument? Find scenes for support. Lastly, if this film were made today, would it remain in the same category (reinforcing/challenging) public opinion? We will discuss this in depth in class and a rubric will be provided in advance.

I also attached the outline for the Research Paper.

Additional Requirements:

6-8 pages in length (not including the works cited page, written in size 12 Times New Roman font.

6 academic sources* that are used and cited in the text.

APA or MLA format

*NO Wikipedia, ehow, about.com, or un-authored web sites.

Please feel free to contact me with any questions.

Thanks.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post research paper social issue in the movie 1 appeared first on Essay Writers.

individual project 2 21

Scenario Part 3

After completing a thorough investigation into the robbery and serving your search warrant, both of your suspects were found guilty at trial. The next step of the Criminal Justice System (the sentencing phase) will begin. Because victim Roberts was shot in the head and killed, the State is seeking the death penalty for Steve Chapman. He has an extensive violent criminal history (convicted felon), and shows no remorse for victim Roberts or his family.

As the lead detective, you have completed your investigation into the robbery and homicide. You have served the search warrant and found all of the evidence that you were looking for. You and your team have collected all of the evidence and interviewed witnesses, the victim, and the suspects.

Because of your hard work in this case, the State’s Attorney has asked for your thoughts on the method of punishment for Steve Chapman. Compose a professional quality email to the State’s Attorney detailing your thoughts on the following:

  • Is the death penalty a just sentence for this crime? Explain your answer.
  • What alternative punishments might be appropriate (if any)?
  • Does the death penalty deter others from committing similar crimes?
  • APA format for references with 2 being required.

  • 3 pages. Needed by Wednesday by mindight central time.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post individual project 2 21 appeared first on My Nursing Experts.

quiz questions 10

QUESTION 1

  1. According to the PCWorld article you read in the lab, the violation that occurred in the lab case study was that the:
    two VA supervisors were responsible for implementing appropriate information systems security.
    two VA supervisors were responsible for making external backup copies of the data.
    VA data analyst was not authorized to take VA privacy data home on a laptop computer and make an external backup copy of the data.
    the VA data analyst was not authorized to be a “whistleblower” about the incident.

10 points

QUESTION 2

  1. In the lab case study, the privacy data and privacy law rights of __________ were violated.
    VA employees
    VA management and executive officers
    U.S. citizens and military personnel
    IT administrative personnel

10 points

QUESTION 3

  1. Which organization in the U.S. federal government is responsible for performing audits on other U.S. federal government agencies?
    The U.S. Government Accountability Office (GAO)
    The Federal Bureau of Investigation (FBI)
    The Central Intelligence Agency (CIA)
    The National Security Agency (NSA)

10 points

QUESTION 4

  1. The PCWorld article you read in the lab revealed that the VA’s cybersecurity efforts were hampered by:
    lack of “know-how.”
    bureaucracy.
    political agendas.
    inadequate staffing.

10 points

QUESTION 5

  1. The loss of privacy data has implications:
    only for the individual(s) whose privacy data has been lost.
    only for the individual(s) responsible.
    only for the organization involved.
    for the individual(s) whose privacy data has been lost, as well as the individual(s) responsible and the organization involved.

10 points

QUESTION 6

  1. In the lab case study, the VA secretary reprimanded and demoted the VA data analyst’s two supervisors because they:
    took VA privacy data home on their laptop computers.
    failed to report the incident immediately to appropriate officials.
    did not take adequate information system security measures.
    made external backup copies of privacy data.

10 points

QUESTION 7

  1. Which of the following deals with the regulation of personal information about individuals which can be collected by governments and other public as well as private organizations and its storage and use?
    Privacy laws
    Agency policy
    Security acts
    Information systems security

10 points

QUESTION 8

  1. Who was the weakest link in the chain of security and protection of privacy data in the lab case study?
    The VA Inspector General
    The VA’s executive management
    The VA employee and the employee’s supervisors
    The House Veterans’ Affairs Committee

10 points

QUESTION 9

  1. According to the PCWorld article you read in the lab, which of the following was stated as an issue in the lab case study?
    The database was not encrypted.
    The VA’s decentralized management.
    The employee and supervisors were overworked.
    The VA’s computer equipment was unable to adequately protect the privacy data in the database.

10 points

QUESTION 10

  1. According to the PCWorld article you read in the lab, which of the following was reported by House Veterans’ Affairs Committee?
    The VA seemed to focus on agency-wide solutions rather than fixing individual medical centers.
    The VA was ineffective because it had a centralized management and no divisions.
    An annual cybersecurity review had given the VA a failing grade in four of the past five years.
    The VA’s internal controls in data security had been mostly adequate in recent years.

10 points

QUESTION 11

  1. In the lab case study, the VA analyst:
    had been given permission to use the laptop at home.
    had been expressly forbidden to remove the laptop from the premises.
    was completely unaware that the laptop was stolen.
    was a “black-hat” hacker searching for veterans’ personal information.

10 points

QUESTION 12

  1. The privacy information that was stolen in the VA data breach included names, as well as:
    employment information such as employee ID numbers, titles, and salaries.
    electronic health records and protected health information (PHI).
    Social Security numbers, dates of birth, and disability ratings.
    credit card, banking, and other financial information.

10 points

QUESTION 13

  1. Which of the following statements is true regarding the difference between privacy and security?
    There are no privacy laws currently in existence at the federal level.
    Security is a necessary tool for building privacy while privacy is a basic human right.
    Security only applies to information systems security requirements.
    There is no difference between privacy and security.

10 points

QUESTION 14

  1. Which of the following statements is true regarding calculating the costs of a crime like the one in the lab case study?
    Calculating the consequences of a crime is relatively easy.
    All of the costs are directly related to recovery from the crime.
    There are costs associated with closing the vulnerabilities that allowed the crime to happen.
    No costs are incurred after the crime has occurred.

10 points

QUESTION 15

  1. In the PCWorld article you read in the lab, Representative Bob Filner called the VA’s response to the data theft:
    “noble.”
    “inadequate.”
    “gross.”
    “pathetic.”

10 points

QUESTION 16

  1. The costs of a crime like the one in the lab case study:
    are easily identified and quantifiable.
    include only the money spent to fix the problem, appease those affected, and the estimated losses from downtime.
    include only those costs that are directly related to the crime that occurred.
    include costs that stem from situations that might or might not happen, such as identity theft and any resulting fraud.

10 points

QUESTION 17

  1. The costs of the crime in the lab case study ranged from:
    $100,000 to $200,000.
    $100,000 to $1 million.
    $1 million to $5 million.
    $100 million to $500 million.

10 points

QUESTION 18

  1. The data breach at the VA affected the records of approximately how many people?
    1.4 million
    5.3 million
    15.7 million
    26.5 million

10 points

QUESTION 19

  1. Which of the following statements is true regarding the costs of a crime like the one in the lab case study?
    Costs are far less justified before a disaster than after.
    Management will be more than willing to spend funds to prevent all possible risks.
    It is feasible to mitigate all identified risks, even the unforeseen ones, before they occur.
    All closure happens prior to a risk presenting itself.

10 points

QUESTION 20

  1. In the lab case study, the employee had permission from his supervisors to take the laptop home. Was he justified in taking home official data?
    He was justified in taking home official data because removing veterans’ privacy data was not specifically prohibited.
    He was not justified in taking home official data because it was against agency policy definition to remove veterans’ privacy data.
    He was not justified in taking home official data because it was against information systems security requirements to remove veterans’ privacy data.
    He was not justified in taking home official data because it was against the organization’s security control systems to remove veterans’ privacy data.

 

Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code “Newclient” for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

The post quiz questions 10 appeared first on The Nursing Hub.