World-Geography-How-are-we-to-judge-whether-any-map-is-a-good-map-Geology-Assignment-homework-Help

Can you please help answer these questions and each answer needs to have 150-180 words

1.) All map projections, which represent the three-dimensional surface of the Earth on a two-dimensional surface distort one or more of the four properties – area, shape, distance, direction. How then are we to judge whether any map is a “good map”?

2.) 
Some people might say that to be lost is not to know where you are. Others might say that when you are lost, you know where you are but do not know where other places are. With that in mind,

•What does the idea of being lost tell us about the nature of geographic location.

•How does relative location and absolute location play into this?

3.) Watch the YouTube video below to see how GPS and GIS is helping to solve medical problems in Cameroon, West Africa.

https://www.youtube.com/watch?v=1g_FEuNI2l0

https://www.youtube.com/watch?v=pW-ZcflAxLM

Describe how technologies such as geographic information systems, remote sensing, GPS, and maps are used to analyze local, regional and global issues.

4.) Many people use the terms weather and climate interchangeably.

What is weather? (Give an example.)

What is climate? (Give an example.)

Compare/contrast the two.

When traveling to an area of the world when would you be concerned about weather? When would you be concerned about climate?

5.) Causes of Precipitation: There are three main causes of precipitation:

1) convection,

2) orographic uplift, and

3) frontal uplift.

Explain each of them and give unique examples of where each cause can be encountered around the world.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Structure-Frameworks-for-Establishing-and-Managing-the-Internal-IT-Security-Program-Cybersecurity-risk-profile

(1)Structure & Frameworks for Establishing and Managing the Internal IT Security Program

This week, our focus is upon the structures and frameworks used to establish and manage a business’s internal cybersecurity or IT security program. Most businesses do not attempt to create their own structure from the ground up. Instead, they adopt and adapt one or more governance frameworks developed by an industry standards setting body, e.g. ISACA, a national standards body (e.g. NIST or the British Standards Organization), or an international body such as the International Standards Organization (ISO). Specific IT governance frameworks and standards for information security management include:

    • COBIT® 4.1
    • ISO/IEC 27001/27002
    • ITIL® v. 3

These frameworks and standards set forth recommended organization structures for information security functions within a business and recommend policies, procedures, activities, and best practices which should be adapted and adopted by a business.

Businesses also need to adopt a standard set of IT security controls which will be used to mitigate and manage risk. (seehttp://www.praxiom.com/iso-27000-definitions.htm#Control). IT security controls are also used to establish the performance standards used to evaluate the effectiveness (functioning) of the IT security program. There are three primary categories (“classes”) of security controls:

  • Management Controls
  • Operational Controls
  • Technical Controls

The National Institute of Standards and Technology (NIST) publishes a catalog of recommended security controls for information, information technology, and related management functions (NIST Special Publication 800-53: Security and Privacy Controls for Federal Information Systems and Organizations. http://dx.doi.org/10.6028/NIST.SP.800-53r4). Originally developed for federal government organizations, this controls catalog is widely used by businesses and includes 18 families of controls. The table below is from Revision 3 of NIST SP 800-53 and shows the mapping of security control families to the three categories (“Classes”): management, operational, and technical.

Table showing the mapping of security control families to control categories: Management, Operational, and Technical. Table is from NIST SP 800-53 rev3 p 6

Security controls are integrated with and serve as the basis for the audit and compliance elements of the organization’s IT governance program. Compliance audits serve as a means for determining the effectiveness of the IT security program with respect to implementing controls.

Many businesses use COBIT and/or ITIL as their governance frameworks for managing the delivery of IT services. In this debate, you are asked to take a position as to which framework is a better fit for managing IT SECURITY services.

Write a 3 to 5 paragraph position statement in which you identify and describe 3 to 5 contributions that your chosen framework will make to “good governance” and “good management” for a company’s IT Security Management Program.

Provide in-text citations and references for 3 or more authoritative sources. Put the reference list at the end of your posting.

 If you need help getting started, review chapter 1 in Aligning CobiT® 4.1, ITIL® V3 and ISO/IEC 27002 for Business Benefit
http://www.isaca.org/Knowledge-Center/Research/Documents/Aligning-COBIT-ITIL-V3-ISO27002-for-Business-Benefit_res_Eng_1108.pdf

You can also search this document for “information security” to find processes (ITIL) or control objectives (COBIT) that are specific to the management and delivery of IT security services.

Timeliness of Initial Posting





2) Corporate Profile Part 2: Cybersecurity Risk Profile

For this paper, you will construct a cybersecurity risk profile for the company that you wrote about in Part 1 of the Corporate Profile project. Your risk profile, which includes an Executive Summary, Risk Register, and Risk Mitigation Recommendations (Approach & Security Controls by family), will be developed from information provided by the company in its Form 10-K filing (Annual Report to Investors) retrieved from the U.S. Securities and Exchange Commission (SEC) Edgar database.  You will also need to do additional research to identify security controls, products, and services which could be included in the company’s risk response (actions it will take to manage cybersecurity related risk).

Research

1.  Review the Risk section of the company’s SEC Form 10-K. Develop a list of 5 or more specific cyberspace or cybersecurity related risks which the company included in its report to investors. Your list should include the source(s) of the risks and the potential impacts as identified by the company.

2.  For each risk, identify the risk management or mitigation strategies which the company has implemented or plans to implement.

3.  Next, use the control families listed in the NIST Special Publication 800-53 http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf to identify general categories of controls which could be used or added to the company’s risk management strategy for each risk in your list.

4.  For each control family, develop a description of how the company should implement these controls (“implementation approach”) as part of its risk management strategy.

Write

1.  Develop a 2 to 3 page Executive Summary from your Corporate Profile Part 1 (reuse and/or improve upon the business profile). Your Executive Summary should provide an overview of the company, summarize its business operations, and discuss the sources, potential impacts, and mitigation approach/strategy for cybersecurity related risks identified in the company’s annual report. The Executive Summary should appear at the beginning of your submission file.

2.  Copy the Risk Register & Security Control Recommendations table (see template at the end of this assignment) to the end of the file that contains your Executive Summary.

3.  Using the information you collected during your research, complete the table. Make sure that you include a name and description for each risk. For the security controls, make sure that you include the family name and a description of how each recommended control should be implemented (implementation approach). Include the control family only. Do not include individual security controls from NIST SP 800-53.

Your Risk Profile is to be prepared using basic APA formatting (including title page and reference list) and submitted as an MS Word attachment to the Corporate Profile Part 2 entry in your assignments folder. See the sample paper and paper template provided in Course Resources > APA Resources for formatting examples. Consult the grading rubric for specific content and formatting requirements for this assignment.

Table 1. Risk Register & Risk Mitigation Approach with Recommended Security Controls

Risk Identifier

Description of the Risk &
Current Risk Management Strategy

Risk Mitigation Approach with
Recommended Security Controls (by NIST SP 800-53 family)

Sequence # or Brief title (<50 characters)

Must be from Form 10-K. Split complex risk statements into multiple individual risks.

Must list NIST Control Family (two character ID) as part of recommended mitigation


Provided an excellent introduction which identified the company being profiled and included a brief overview of the company (may reuse narrative from Part 1 of this assignment). Appropriately used information from 3 or more authoritative sources.

Provided an outstanding introduction which identified the company being profiled and included a brief overview of the company (may reuse narrative from Part 1 of this assignment). Appropriately used information from 2 or more authoritative sources.

Provided an introduction which identified the company being profiled and included a brief overview of the company (may reuse narrative from Part 1 of this assignment). Appropriately used information from authoritative sources.

Provided an introduction to the company but the section lacked some required details. Information from authoritative sources was cited and used in the overview.

Attempted to provide an introduction to the company but this section lacked detail and/or was not well supported by information drawn from authoritative sources. 

The introduction section was missing or did not clearly identify the company.

Provided an excellent summary of the sources, potential impacts, and planned mitigation approach/strategy for cyberspace and/or cybersecurity related risks as identified in the Risk Section of the company’s annual report.

Provided an outstanding summary of the sources, potential impacts, and planned mitigation approach/strategy for cyberspace and/or cybersecurity related risks as identified in the Risk Section of the company’s annual report. Appropriately used and cited information from 3 or more authoritative sources.

Provided a summary of the sources, potential impacts, and planned mitigation approach/strategy for cyberspace and/or cybersecurity related risks as identified in the Risk Section of the company’s annual report. Appropriately used and cited information from 2 or more authoritative sources.

Provided a summary of the sources, potential impacts, and planned mitigation approach/strategy for cyberspace and/or cybersecurity related risks as identified in the Risk Section of the company’s annual report. Appropriately used and cited information from authoritative sources.

Provided a discussion of the cybersecurity risks that the company faces. The discussion lacked detail and/or was not well supported by information drawn from authoritative sources.

Risk discussion was missing or off topic.

Provided a complete, concise, and thorough Risk Register (columns 1 and 2 of table) for 10 or more cyberspace or cybersecurity related risks as identified in the company’s annual report. (Risk ID was numeric sequence # or short title suitable for cross-referencing.)

Provided a complete, concise, and thorough Risk Register (columns 1 and 2 of table) for 8 or more cyberspace or cybersecurity related risks as identified in the company’s annual report. (Risk ID was numeric sequence # or short title suitable for cross-referencing.)

Provided a completed Risk Register (columns 1 and 2 of table) for 5 or more cyberspace or cybersecurity related risks as identified in the company’s annual report. (Risk ID was numeric sequence # or short title suitable for cross-referencing.)

Provided a completed Risk Register (columns 1 and 2 of table) for at least three cyberspace or cybersecurity related risks which the company faces.

Attempted to complete the Risk Register (columns 1 and 2 of table) for 3 or more entries but information about the risks was lacking details.

Did not complete 3 or more entries in the Risk Register.

Provided a complete, concise, and thorough Risk Mitigation Approach with Recommendation Security Controls by family (column 3 of table) for 10 or more cyberspace or cybersecurity related risks as identified in the company’s annual report.

Provided a complete, concise, and thoroughRisk Mitigation Approach with Recommendation Security Controls by family (column 3 of table) for 8 or more cyberspace or cybersecurity related risks as identified in the company’s annual report.

Provided a completed Risk Mitigation Approach with Recommendation Security Controls by family (column 3 of table) for 5 or more cyberspace or cybersecurity related risks as identified in the company’s annual report.

Provided a completed Risk Mitigation Approach with Recommendation Security Controls by family (column 3 of table) for at least three cyberspace or cybersecurity related risks which the company faces.

Attempted to complete the Risk Mitigation Approach with Recommendation Security Controls by family (column 3 of table) for 3 or more entries but information about risk mitigation was lacking details.

Did not complete 3 or more entries in the Risk Mitigation Approach column of the table.

Demonstrated excellence in the integration of standard cybersecurity terminology into the case study.

Provided an outstanding integration of standard cybersecurity terminology into the case study.

Integrated standard cybersecurity terminology into the into the case study

Used standard cybersecurity terminology but this usage was not well integrated with the discussion.

Misused standard cybersecurity terminology.

Did not integrate standard cybersecurity terminology into the discussion.

Work contains a reference list containing entries for all cited resources. Reference list entries and in-text citations are correctly formatted using the appropriate APA style for each type of resource.

Work contains a reference list containing entries for all cited resources. One or two minor errors in APA format for in-text citations and/or reference list entries.

Work contains a reference list containing entries for all cited resources. No more than 3 minor errors in APA format for in-text citations and/or reference list entries.

Work has no more than three paragraphs with omissions of citations crediting sources for facts and information. Work contains a reference list containing entries for cited resources. Work contains no more than 5 minor errors in APA format for in-text citations and/or reference list entries.

Work attempts to credit sources but demonstrates a fundamental failure to understand and apply the APA formatting standard as defined in the Publication Manual of the American Psychological Association (6th ed.).

Reference list is missing. Work demonstrates an overall failure to incorporate and/or credit authoritative sources for information used in the paper.

Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Submitted work has minor style or formatting flaws but still presents a professional appearance. Submitted work is well organized and appropriately uses color, fonts, and section headings (per the assignment’s directions).

Organization and/or appearance of submitted work could be improved through better use of fonts, color, titles, headings, etc. OR Submitted work has multiple style or formatting errors. Professional appearance could be improved.

Submitted work has multiple style or formatting errors. Organization and professional appearance need substantial improvement.

Submitted work meets minimum requirements but has major style and formatting errors. Work is disorganized and needs to be rewritten for readability and professional appearance.

Submitted work is poorly organized and formatted. Writing and presentation are lacking in professional style and appearance. Work does not reflect college level writing skills.

No formatting, grammar, spelling, or punctuation errors.

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance.

Errors in formatting, spelling, grammar, or punctuation which detract from professional appearance of the submitted work.

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Work is unprofessional in appearance.

Submitted work is difficult to read / understand and has significant errors in formatting, spelling, grammar, punctuation, or word usage.

Submitted work is poorly executed OR does not reflect college level work.

Overall Score points

Posted briefing statement or paper before 11:59 PM ET on Friday.

Posted briefing statement or paper before 11:59 PM ET on Saturday.

Posted briefing statement or paper before 11:59 PM ET on Sunday.

Did not post a briefing statement or paper before 11:59 PM ET on Sunday.

Briefing Statement or Paper

Provided an excellent introduction to the deliverable which clearly, concisely, and accurately addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.

Provided an outstanding introduction to the deliverable which clearly and accurately addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.

Provided an acceptable introduction to the deliverable which addressed the topic of the briefing statement or paper. Appropriately paraphrased information from authoritative sources.

Provided an introduction to the deliverable but the section lacked some required details. Information from authoritative sources was mentioned.

Attempted to provide an introduction to the deliverable but this section lacked detail and/or was not well supported by information drawn from authoritative sources (too many quotations or improper paraphrasing).

Introduction was missing or no work submitted.

Provided an excellent analysis of the issues for the required briefing topic. Addressed at least three separate issues and provided appropriate examples for each. Appropriately used and cited information from authoritative sources.

Provided an outstanding analysis of the issues for the required briefing topic. Addressed at least two separate issues and provided appropriate examples for each. Appropriately used and cited information from authoritative sources.

Provided an acceptable analysis of the issues for the required briefing topic. Addressed at least one specific issue and provided an appropriate example. Appropriately used and cited information from authoritative sources.

Addressed the required briefing topic but the analysis lacked details or was somewhat disorganized. Appropriately used and cited information from authoritative sources.

Mentioned the required briefing topic but the analysis was very disorganized or off topic. OR, the analysis did not appropriately use information from authoritative sources (too many quotations or improper paraphrasing).

Analysis was missing or no work was submitted.

Included an excellent summary section for the briefing statement or paper which was on topic, well organized, and covered at least 3 key points. The summary contained at least one full paragraph.

Included an outstanding summary paragraph for the briefing statement or paper which was on topic and covered at least 3 key points.

Included a summary paragraph for the briefing statement or paper which was on topic and provided an appropriate closing.

Included a summary paragraph but, this section lacked content or was disorganized.

Included a few summary sentences for the briefing statement or paper.

Did not include a summary for the briefing statement or paper.

Included and properly cited three or more authoritative sources (no errors).

Included and properly cited three or more authoritative sources (minor errors allowable).

Included and cited two or more authoritative sources (minor errors allowable). Reference list entries contain sufficient information to enable the reader to find and retrieve the cited sources.

Included and cited at least one authoritative source (errors allowable in citations or reference entries). Reference list entries contain sufficient information to enable the reader to find and retrieve the cited sources.

Mentioned at least one authoritative source but, the citations and/or reference list entries lacked required information (not sufficient to retrieve the correct resource).

References and citations were missing. Or, no work submitted.

No formatting, grammar, spelling, or punctuation errors. Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type.

Work contains minor errors in formatting, grammar, spelling or punctuation which do not significantly impact professional appearance. Work needs some polishing to improve professional appearance.

Errors in formatting, spelling, grammar, or punctuation which need attention / editing to improve professional appearance of the work.

Submitted work has numerous errors in formatting, spelling, grammar, or punctuation. Substantial polishing / editing is required.

Submitted work is difficult to read and/or understand. OR, work has significant errors in formatting, spelling, grammar, punctuation, or word usage which detract from the overall professional appearance of the work.

No submission.

Timeliness of Postings

Posted a critique of another student’s briefing statement or paper before 11:59 pm ET on Saturday.

Posted a critique of another student’s briefing statement or paper before 11:59 pm ET on Sunday.

Did not post a critique of another student’s briefing statement or paper before 11:59 PM ET on Sunday.

Posted a second critique of another student’s briefing statement or paper before 11:59 pm ET on Saturday.

Posted a second critique of another student’s briefing statement or paper before 11:59 pm ET on Sunday.

Did not post a second critique of another student’s briefing statement or paper before 11:59 PM ET on Sunday.

Posted a follow-up reply or discussion posting before 11:59 pm ET on Sunday.

Posted a follow-up reply or discussion posting after 11:59 pm ET on Sunday.

Did not post a follow-up reply in the week’s topic.

Posted a second follow-up reply or discussion posting before 11:59 pm ET on Sunday.

Posted a second follow-up reply or discussion posting after 11:59 pm ET on Sunday.

Did not post a second follow-up reply in the week’s topic.

Quality of Discussion Postings

Posted an excellent critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided 3 or more specific examples and added value to the discussion.

Posted an acceptable critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided at least one specific example and added value to the discussion.

Posted a critique of another student’s briefing statement or paper. Critique provided at least one suggestion for improvement.

Posting was missing or did not add contain a critique of the briefing statement or paper.

Posted an excellent critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided 3 or more specific examples and added value to the discussion.

Posted an acceptable critique for another student’s briefing statement or paper. Critique focused on ways in which the content could be improved and/or better organized. Provided at least one specific example and added value to the discussion.

Posted a critique of a second student’s briefing statement or paper. Critique provided at least one suggestion for improvement.

Posting was missing or did not add contain a critique of the briefing statement or paper.

Posted a follow-up reply or comment which added value to the discussion.

Posted an acceptable follow-up reply or comment which added some value to the discussion.

Posted a follow-up reply or comment but added little value to the discussion.

Posting was missing or did not add value to the discussion.

Posted a follow-up reply or comment which added value to the discussion.

Posted an acceptable follow-up reply or comment which added some value to the discussion.

Posted a follow-up reply or comment but added little value to the discussion.

Posting was missing or did not add value to the discussion.

Overall Score

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

So-Far-from-God-essay-help-3-pages-MLA-

Tittle: So Far from God  Author Castillo, Ana   Description Magical-Realistic/ Chicana

Write an analytic essay on it. You essay should follow the guideline in the handout “How to analyze Literature”; so yes, do aim to argue a message that the book offers, using quotes and clearly explaining how  those quotes prove your viewpoints. You may analyze characters

-3 full pages

-Provide at least 3 quotes

HOW TO ANALYZE LITERATURE

Introductory Paragraph (The essay’s first paragraph):

-Your introductory paragraph ends with a thesis; by “end”, make sure it’s the last sentence of your first paragraph.

-Your thesis must take a position; it’s must explicitly state you think people should (or should not) do. Your thesis should refer to the character or he author; it should refer to people who exist in reality, don’t write what you think is the author’s viewpoint; instead write your own.  

-Make sure that the position is worth arguing. In other words, make it an opinion some people would disagree with it. If your position is one that most people agree with, then is a week thesis that makes a week essay.

Your analytic paragraph (the 2nd paragraph, but also the 3rd, the 4th and the 5th at least)

 Open each analytic paragraph with viewpoint; state what you think people should do; it should act as a sub-heading for your thesis that also declares what people should do.  

1—Do not open your analytic paragraph by announcing the story/poem/play/ and what happen in it, or what the writer believes. When staring your analytic paragraph, try not to mention the work- or the author – at all. Neither one relates to what should be your viewpoint.

– Do not open you analytic paragraph by mentioning the characters and their problem; remember you must focus instead on opening with what you think people should or should not do.

– Do not open you analytic paragraph with a quote. You must star with  your own words, not the author’s.

2–Provide a quote. After you have finish opening with viewpoint for your analytical paragraph, then introduce the quote; before writing it, you may briefly relate the character’s trouble or situation that relates to your viewpoint , You certainly want to name (narrator? Character? Authors? ) who says this quote.

– Start the quote with a quotation mark and finish with one; keep them close to the letters and each one should pint toward the quote.

-you must add citation after your quote.

-do not quote too much; no more that forty per cent  of the paragraph’s words should be the author’s if your quote is that long or longer, then you need to either edit your quote or write more.

3– Comment after you r quote in your words after your quote; do not end the analytic paragraph with a quote.

-Write how your quote connects back to your viewpoint at the paragraph’s beginning .

-do not write what happen next in the story or play after your quote.  

-Do not end your paragraph telling about characters; end it, like you opening, without mentioning either the character or the author, again end your paragraph by clarifying how your quote proves your papers arguments. This will inevitably refer back to your opening paragraph’s viewpoint.  

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Code of conduct and ethics computer science homework help

HELLO , I have a small homework in information system

please check this attachment.

small paragraph for each one

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

why-Clinton-s-Health-Plan-was-unsuccessful-Health-Policy-assignment-help-

You will synthesize your understanding of why Clinton’s Health Plan was unsuccessful. Discuss the features of the Clinton health care reform plan and provide reasons why it failed and describe the influence of the various interest groups and governmental entities during this process. Make sure to discuss both the policy process and the policy environment—that is, the key players involved and other circumstances that shaped this policy-making effort. Consider and discuss the following:

  1. Take a position in support or opposition

  2. Discuss the context of this legislation – name the expected demanders and suppliers as outlined in our textbook, Chapter 3.

  3. Describe the expected interest groups and there specific arguments.

  4. Describe the expected interplay between demanders and suppliers, interest groups and analyze the public policy environment.

Write a 5 page paper with a References List. Your written assignment must follow APA guidelines. Be sure to support your work with specific citations from this week’s Learning Resources and additional scholarly sources as appropriate. Refer to the Pocket Guide to APA Style to ensure in-text citations and reference list are correct.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Organizations-305-chapter-4-assignment-help-

two discussion questions that I want you to respond 100 -200 words for each based on a reading I am gonna send you after I choose your bid.

Please, don’t make a bid if you increase time or cost.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Sustainable-eLearning-Design-social-science-homework-help

Sustainable eLearning Design

Online learning and eLearning are ubiquitous across all levels of education and training. This has driven a program and course design process that involves producing courseware that is housed on a server for learners to access at any time. Teams consisting of faculty, instructional designers, and subject matter experts design the courses. It is an expensive endeavor creating the general expectation that once courses are designed, they will last for multiple years. The problem is that in today’s mercurial educational atmosphere, the course content can become quickly outdated. The challenge for eLearning professionals is to design courses that can sustain the test of time in a rapidly changing academic climate. In this Discussion, you will evaluate the design of a course you are familiar with and explore strategies for a more sustainable course design.

To prepare:

Read Chapters 3, 6, and 8 in Design Alchemy: Transforming the Way We Think About Learning and Teaching, where instructional design is proposed as a combination of science, art, and alchemy. Also read “Sustainable e-Learning: Toward a Coherent Body of Knowledge,” where the authors investigate possible approaches towards sustainable teaching and learning in the higher education sector. Finally, view the media piece,Anatomy of eLearning: Conceptual Framework, in this module’s Learning Resources with a focus on the “Sustainability” section.

Then, reflect on a course that you have recently taken and completed or a course that you have recently taught, and consider the sustainability of its design.

Post the following by Day 7 of Week 9:

Deconstruct the design and delivery of the course you selected. Then, analyze the level of sustainability of the course. Finally, explain whether the course is sustainable or not—providing reasons to support your position. In your explanation, be sure to describe the sustainable elements in the course or describe specific strategies you would use to make course elements more sustainable. Adopt and defend a firm position on the need for sustainability in eLearning.

Support your analysis using the three pillars of sustainability, personal experience, and at least one research study (PhD and EdS students).

Resource:

Finally, view the media piece,Anatomy of eLearning: Conceptual Framework, in this module’s Learning Resources with a focus on the “Sustainability” section.

 http://mym.cdn.laureate-media.com/2dett4d/Walden/EDUC/8345/CH/mm/anatomy_of_elearning/index.html

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

Linear-Equations-Math-Assignment-Homework-Help

Linear Equations

Get in Line

Part 1:

For the Unit 5 Discussion Board, you will create a scenario where a linear equation will be used to find the solution. After setting up your scenario, write out the linear equation for your classmates. Remember linear equations will only have one variable with an exponent of one.

Part 2:

Solve a classmate’s linear equation. Include the steps showing how you arrived at the answer. Does the answer seem reasonable? Why or why not? Keep in mind that Discussion Boards are meant to be constructive exchanges. Click here to see an example.

Part 3:

Choose your favorite scenario posted by a classmate. Reply to that classmate telling them why their post is your favorite. Change their equation into an inequality. Choose the inequality (<, >, ≤, ≥) that makes sense for your classmate’s problem. How does this change transform the answer? Click here to see an example.

Note: Your responses to your classmates must be substantive and advance the Discussion. Substantive means your reply must 1) include comments specific to that particular post and 2) contain information or insight worthy of sharing with the instructor and class. Contact your instructor if you have questions about making substantive responses

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

There-are-many-times-that-treatments-and-vaccines-are-in-trials-and-not-ready-for-mass-production-or-use-Biology-Assignment-Homework-Help

There are many times that treatments and vaccines are in trials and not ready for mass production or use. The natural process is to go through a great deal of testing to ensure safety. However, in a situation where the treatment is needed right away due to an outbreak or pandemic, should the trials be abandoned if success has been seen before the trial period has ended? Explain the ethics behind and the pros and cons of this type of situation.

Ref.: Cowan, M. K. (2014) (4th Ed.). Microbiology: A Systems Approach, McGraw Hill

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.

How-serious-were-the-UN-talks-on-sovereignty-political-science-homework-help

  •   Dear Henry , thank you for your previous plan . Here you go my professor comments on the plan you did  . Please Please follow his instructions word to word I really want to score high marks.

“My general comments:

(1) There is a clear argument – that’s good as it helps your essay with focus.

(2) You do need to discuss the counter-argument: that the Thatcher govt was at least partially responsible. How serious were the UN talks on sovereignty? You will need to mention Leaseback as well as the mixed messages that the UK govt was sending over the fate of the Islands in the early 1980s.

(3) Were there other responsible parties that contributed (mention

 the US)?

(4) Sources – some useful ones here but some primary sources would be useful. I would suggest looking at Lawrence Freedman’s Official History Volume 1, The Franks Report and the documents on the Falklands War contained in the Margaret Thatcher foundation at Churchill College: http://www.margaretthatcher.org/​ ( if you could not access to this source let me know henry , because its important)

Overall, a promising start.”

  •  How to organize the essay :

Introduction: Address the question – don’t waffle. Explain the structure of the essay – how you are going to answer the question and what your position will be.

Description:The bulk of your essay – largely narrative with references to back up the facts. have some analysis.

Analysis: Where you are likely to pick up most of the marks. We are more interested in the way you use the description to back up your argument.

Conclusion.:A clear summary of your arguments and a restating of your case.

  •   It’s a 4000 thousand only only , with minimum 25-30 references .
  • ·  0% Plagiarism
  • ·  Harvard refrencing style . please when you write the in text citation do it as ( the author ,year :page number ).
  • ·  Alphabet list of reference.
  • ·  Don’t forget my Position is very important what do you I think if Thacter Government was responsible or not and why ?with supported arguments from academics .
  • ·  Any clarification please ask me before you start.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.