Week 5 social studies | Education homework help

Week5Template.docx

EED/430 v8

Social Studies Resources Template

EED/430 v8

Page 2 of 2

Part 1

Identify your elementary grade level (K–5) and briefly describe, in one paragraph, the focus for your social studies community unit.
Explain why it is important for students to learn this. Write your explanation on a new line below.

Part 2

Complete the Social Studies Resources Table below.

The first column lists the type of sources to identify. You do not need to enter anything in that column.

In the second column,
provide an example of each type of source to support your unit.

In the third column,
explain how the source examples support the students’ assets and diverse needs based on the scenario in the assessment instructions (students who are native residents in your community, students who are foreign to your community, English learners, gifted students, and students with learning disabilities).

In the fourth column,
indicate whether the source examples you identified are primary or secondary sources and
explain your rationale.

Social Studies Resources Table

Type of Source

Source Examples

How Students’ Assets and Needs Are Supported

Primary or Secondary Source? Why?

School library or community library

Provide an example of at least one resource you and your students can find in the library to support your unit.

Explain how the source examples in this row support the students’ assets and diverse needs.

Indicate whether the source examples you identified in this row are primary or secondary sources and explain your rationale.

Social studies textbook or book

Provide an example of a social studies textbook or book you would use to support your unit.

Explain how the source examples you identified in this row support the students’ assets and diverse needs.

Indicate whether the source examples you identified in this row are primary or secondary sources and explain your rationale.

Field trip/virtual field trip

Provide an example of at least one place you would visit that would correlate to or support your unit.

Explain how the source examples you identified in this row support the students’ assets and diverse needs.

Indicate whether the source examples you identified in this row are primary or secondary sources and explain your rationale.

Guest speaker

Provide an example of at least one guest speaker you would invite to speak to your students to support your unit.

Explain how the source examples you identified in this row support the students’ assets and diverse needs.

Indicate whether the source examples you identified in this row are primary or secondary sources and explain your rationale.

Technology

Provide an example of at least one technology tool or software you would use to support your unit.

Explain how the source examples you identified in this row support the students’ assets and diverse needs.

Indicate whether the source examples you identified in this row are primary or secondary sources and explain your rationale.

Copyright 2023 by University of Phoenix. All rights reserved.

Copyright 2023 by University of Phoenix. All rights reserved.

image1.png

 
"If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!"

It540 create a security policy

 

Create a Security Policy

Purpose

To help solidify and reinforce the concepts you studied in the unit involving the development of a computer network security policy.

Instructions

Part 1: Devise a Security Policy

Think about a business you are familiar with that uses networks and computers to support business functions. Create a list of 10 important, specific IT/information assets. The list might contain items such as the following:

  • Components — Servers, computers, mobile devices, IoT devices, other equipment, etc.
  • Information — Sales data, client data, financial data, etc.
  • Network configuration

Identify the threats these important items are subject to. Devise a security policy to mitigate that threat. Document your analysis process used to develop this policy. Note that this information will be useful moving forward in the course, so develop it fully at this time.

Example: A company laptop is a portable device which is a trackable asset. A possible threat against this asset is theft or loss. A mitigation for this threat is to require encryption on the device to secure data in the event the device leaves control of an authorized party.

Part 2: Security Policy Assessment

Read the following mini-security policy. Assess this security policy in the following four major areas. What is missing, incomplete, inaccurate, or ill-advised? Provide a rationale for your concerns.

R&D Financial Services, LLC Security Policy

Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption for ActiveSync, POP3 and SMTP. SSL should also be used for web-based email. That way, regardless of where people work, their email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst any third-party firms and/or consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group. Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.

Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract with R&D Financial Services, LLC will be given the file server Administrator account password. Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not compromise data confidentiality.

Portable storage devices, such as USB and thumb drives, may be used to store client sensitive documents if they are stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

 
"If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!"

M1 barriers | school | FMTI

 

Describe three barriers that have slowed down the progress of advanced practice nursing and strategies to help overcome these barriers. (Saunders, 2014)

Submission Instructions:

  • Your initial post should be at least 500 words, formatted and cited in current APA style with support from at least 2 academic sources. 
 
"If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!"

Paper outline and paper | Computer Science homework help

  

Outline: For this exercise – please create the outline for your paper. The outline should include the following all in APA format:

  1. Title page with title, name date, class, professor, and university info.
  2. Top level headers which outline what you will be talking about in your paper.
  3. Second level headers (sub-headers) which outline detail for each of your top-level headers.
  4. A bibliography list with at least 3 sources.
  5. Submit your outline in a word file with the following file naming convention:

Instructions

Details of the Project:

  1. Research and prepare a report on your selected (selection made in Week 2) current trend in the area of IT Security.
  2. Prepare a 4-6 page paper in Microsoft Word using approved APA format. (1,000 word minimum)
  3. The minimum page count cannot not include your Title page and Reference list.
  4. Include a Title page, Reference list, introduction and concluding statement.
  5. Include a detailed description of the topic.
  6. Include information on technologies involved in your selected area of research.
  7. Include information on future trends indicated in your selected area of research.
  8. References (minimum 5 peer reviewed sources)
  9. 1″ Margins (top/bottom/sides).
  10. Times New Roman or Arial font, in size 12.
  11. Correct spelling and grammar.
  12. APA formatting: Title page, in-paragraph citations, and the Reference list.
 
"If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!"