Posts

[Solved] Special Education Identification Process

[Solved] Special Education Identification Process

 Students must qualify for special education services under one of the disability categories outlined by the Individuals with Disabilities Education Act. There is a specific process involved in identifying students as having a disability. This process includes a group of educators called a Child Study Team who help determine interventions for students. This process can include RTI, MTSS, and the special education identification process. Special education teachers will be involved in all steps of these processes.

Create a 250-500 word brochure for families of students who may have disabilities. In your brochure, include the following

  • An explanation of RTI, MTSS, and the special education identification process
  • A visual to help families understand the explanation of RTI, MTSS, and the special education identification process
  • An overview of procedural safeguards and parental rights
  • A minimum of three local or national resources to support families who have children with disabilities

[Solved] Chronic Discipline Problems Physical

[Solved] Chronic Discipline Problems Physical

Using the guidance from our text and page 8 from the IRIS Center Module, create your Comprehensive Behavior Management Plan. Your plan must include the following components:

  • Specify grade level and subject area
  • Statement of Purpose
  • Routines/Procedures
  • Rules
  • Logical Consequences
  • Intervention Plan for chronic discipline problems
  • Physical learning environment arrangements for 2-3 different learning activities

[Solved] Select “ Hcup Statistical

[Solved] Select “ Hcup Statistical

 

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

There are many users, sources, and purposes for health care statistics. One of the significant sources of health care statistics is the Healthcare Cost and Utilization Project (HCUP, pronounced “H-Cup”). As the HCA, you mention this to your new CEO, but he says he is not familiar with it and asks you to put together a short description of it on how you and your colleagues make use of the data and information provided.

You will prepare a 400–600-word description of HCUP for the CEO. Include the following in your description:

  • 1–2-sentence introduction to HCUP, including the agency that administers the project and its purpose
  • What types of data and reports are provided and who uses this resource.
  • An example of a report available to anyone on the site
    • Go to the Reports tab on the Home page. Click on the tab, and then select “HCUP Statistical Briefs – Chronological List.” 
    • From the list, choose a recent brief (the most recent are listed first in the list). 
    • Open and review the brief, and describe what it contains and the types of health care statistics and graphical presentations included in it (e.g., line graphs or pie charts).
  • Finish by including your thoughts about this Web resource and what you find valuable about it. 

[Solved] Regulatory Standards Within Information

[Solved] Regulatory Standards Within Information

Review the Final Project Guidelines and Rubric and submit a topic suggestion and your reason for selecting that topic for review. Please note: The topic will be a graded assignment. Post any questions to the General Questions discussion.

For additional details, please refer to the Final Project Guidelines and Rubric and Topic Guidelines and Rubric.

IT 659 Final Project Guidelines and Rubric

Overview

The final project for this course is the creation of an information technology incident report.

Successful management in information technology requires knowledge of the legal and ethical environment. Globalization, increasing commerce between graphical locations brought on by the ability to connect online, and the increasing mix of cultures bring additional complexity to the considerations of law and ethics in cybersecurity and information technology (IT). The final project for this course will require you to research a recent (within the last five years) incident or event in the field of IT, e-commerce, or cyber security in the context of the legal and ethical standards of that time period. You will identify the issues the organization(s) had, recommend changes for that organization(s), and write a report that highlights your recent analysis, findings, and recommendations.

The project is divided into three milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Four, and Seven. The final submission will occur in Module Nine.

In this assignment you will demonstrate your mastery of the following course outcomes:

  • Apply cyberlaw principles appropriately to everyday circumstances, business models, and information technology issues
  • Assess legal and compliance issues related to information technology for their impact to organizations, society, and culture
  • Propose relevant changes to organizations and standards that ensure legal and ethical cyber practice and behavior
  • Determine the impact of various legal cases on compliance and regulatory standards within information technology
  • Analyze the impact of various cultural attitudes and legal issues related to global communication on information technology

Prompt

You will select a recent or current incident from the public record and analyze the case to identify the issues that led to the incident. What recommendations can you make to ensure the incident will not occur again? What were the results of the incident? And, finally, what were the cultural, societal, or global impacts of this case and the subsequent changes to the legal environment? Please note: Your selection will need to be submitted and approved by the instructor.

Specifically the following critical elements must be addressed:

  1. Introduction
    1. Apply cyberlaw and security principles to the business, e-commerce, and e-communication industries. What purpose does the application of cyber principles serve for these industries?
    2. Summarize the selected case, including the necessary organizational information, industry, problem, and time period of the incident.
  2. Case Analysis
    1. Analyze the case to determine the ethical issues within the organization that may have led to the incident. What are these issues and why do you credit them for the incident?
    2. Determine legal compliance issues within the organization that may have led to the incident or could lead to future incidents. Were there any legal and ethical standards in existence at the time that were not followed by the organization? What were these issues and how did they impact the organization?
    3. Determine the societal and cultural impact of these compliance issues. Some things to consider in your assessment include specific targeting of demographic groups, victimization of certain customers, and so on.
  3. Incident Impact
    1. Determine the impact this incident may have had on the ethical and legal IT regulations of the time. If there were no direct results of this case, what may have been the indirect impact and/or what was the impact of similar cases? For example, what regulatory changes resulted from this or similar cases? What is your reasoning?
    2. Determine the connection between the industry standards and the standards in existence for information technology. Specifically, determine if the organization was lacking in either industry-specific or IT-specific alignment with regulations that may have contributed to the incident, and provide support for your conclusions. For example, misalignment with HIPAA laws in healthcare is an industry-specific deviation from standards.
    3. Cultural Impact: Analyze the influence this incident may have had on various cultural attitudes toward IT and cybercommunication or commerce. In other words, how could this incident impact views of information technology use ?
  4. Recommendations
    1. Propose relevant changes to the organization that may have prevented the incident. How would these changes have helped to prevent the occurrence?
    2. Propose reasonable ethical guidelines that could have helped prevent the incident and that might help the organization prevent future incidents.
    3. Propose changes to the standards external to the organization that might have helped prevent the incident. This can include changes to regulations and regulatory and ethical standards that might exist today but did not exist or were not properly delivered at the time of the incident. Be sure to support your conclusions.
  5. Global Considerations
    1. What international compliance standards (either at the time of the incident or today) would have been relevant to the incident, and how? If your company is not global, imagine that is.
    2. Analyze the impact of the incident on global communication and commerce (again, if your organization is not global, imagine otherwise). In other words, what impact did (or would) the incident have on views and use of information technology and communication in global contexts?
    3. Global Technology Environment: Based on your research and analysis of this case, determine the global legal and regulatory impacts this case had on the information technology overall. In other words, determine the relationship between this case and the global regulatory standards that are now in place, will be put in place shortly, or should be put in place as a result of this or related incident(s).
  6. Summary: Given your knowledge of cyberlaw principles, ethical needs, and legal compliance standards, summarize how you applied these principles to your analysis of the case. In other words, how did you apply cyberlaw principles to the circumstances, business model, and IT issues that the selected organization faced?

Milestones

Milestone One: Introduction
In Module Two, you will submit the introduction. In this assignment you will identify the cyber law principles and explain how each applies to the business, e- commerce, ore-communication industries chosen. Describe the purpose of the application of the principles serve for the industry. You will also need to include the necessary organizational information, industry, problem, and the time period of the incident that occurred. The format of this assignment will be a one- to two-page Word document. This milestone is graded with the Milestone One Rubric.

Milestone Two: Case Analysis and Incident Impact
In Module Four, you will submit the Case Analysis and Incident Impacts. In this assignment you will analyze the ethical issues and determine the legal compliance issues within the organization as well as the social and cultural impacts of these compliance issues. You will be expected to address the impact the incident may have had on the ethical and legal IT regulations at the time. The connection between the industry standards and the standards for informational technology should be determined, as well as the influence of the cultural impact to IT and cybercommunication or commerce. The format of this assignment will be a three- to five-page Word document. This milestone is graded with the Milestone Two Rubric.

Milestone Three: Recommendations and Global Considerations
In Module Seven, you will submit the Recommendations and Global Considerations. In this assignment you will suggest relevant changes to the organization itself and changes to the ethical guidelines that could have prevented the incident. Standards external to the organization that may have helped prevent the incident should also be proposed. This assignment will also address international compliance standards and how they would have been relevant to the incident. The impact of the incident on global communication and commerce will be analyzed, as well as the impact on the global technology environment. The format of this assignment will be a three- to five-page Word document. This milestone is graded with the Milestone Three Rubric.

Final Submission: Information Technology Incident Report and Summary
In Module Nine, you will submit your Information Technology Incident Report along with a summary explaining how you applied the principles to your analysis of the case. It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded using the Final Product Rubric.

What to Submit

Your report should be long enough to contain all relevant information, reasoning, and research. It should be formatted logically and written in a professional manner, following APA guidelines.

[Solved] New Business Model

[Solved] New Business Model

After reading about the origin of the internet in the textbook, discuss how difficult it is to determine who has jurisdiction over the internet and the global implications.

Finally, in responding to your peers’ posts, discuss how the internet has changed the current business model. Under this new business model, who has jurisdiction over the internet? 

[Solved] One Router One Switch

[Solved] One Router One Switch

Overview

When you document a computer network, it is often necessary to describe the existing network structure with the help of schemes or diagrams. Documentation of configuration, used protocols, logical structure of the network, addresses, and names of network objects is required.

Prompt

To complete this assignment, you must install or have access to Microsoft Visio. In this assignment, you will demonstrate your understanding of using Visio to construct a basic network diagram. In Visio, construct a basic network diagram consisting of the following components:

  • One router
  • One switch
  • One firewall
  • Three PCs
  • One server
  • Two printers
  • Switch → Router and firewall

Specifically, the following critical elements must be addressed:

  • Demonstrate proficient use of Microsoft Visio
  • Construct a basic network diagram

What to Submit

Ensure each component in your diagram is visually represented and communication between each device is established. Choose shapes in Visio to represent each component and ensure each is properly labeled. Submit a VSD file.

[Solved] Financial Government Operations Education

[Solved] Financial Government Operations Education

First, introduce yourself to the class. Include your major and anything you would like to share about yourself.
Then address the prompt below.

The telecommunication sector continues to be at the epicenter of growth, innovation, and disruption for virtually any industry. For this discussion, you will choose an industry and describe the network attributes required to perform its business functions and services. Refer to the examples below to assist you in developing your main post.

  • Military intelligence
  • Banking/financial
  • Government operations
  • Education
  • Medical/healthcare
  • Insurance

To complete your main post, identify a minimum of two attributes needed to perform the network functions. You must include a summary of each attribute and the reason you chose the attribute. You are highly encouraged to provide examples to better support your reasoning.

[Solved] Extrapolate Discuss

[Solved] Extrapolate Discuss

Is MSG bad for you ?   Moderated. Must post first.

Dear scholars: I hope that, by now, your second chapters are in the appropriate Assignments folder.  Please create a third Prezi presentation that will outline the third chapter of your book project.  As I discussed in class, the third presentation — and the third chapter — does NOT require research, citations, or a Works Cited page.  Here are some possibilities for your Chapter Three:

a.) Write a prologue to your book

b.) Write an epilogue to your book

c.) Find a common ground between the position that you debunk in your first chapter and the ‘Richer Conception’ that you set forth in your second chapter

d.) Extrapolate — discuss the future of your book and a new direction of your research

e.) Be creative

f.) Write an appendix (or annex) to your book

g.) Tell a story that exemplifies your point of view in Chapter Two

[Solved] “ Group Discussion Board

[Solved] “ Group Discussion Board

 

NOTE: Writing Assignment 6 should be posted to the FILE EXCHANGE area within your GROUP PAGES. After peer evaluation and revision, WA6 will be submitted to the link before for my review. 

Continue working through the steps outlined under “Projects, General” at the end of Chapter 21. Complete the Audience and Use Profile (step j.) and the first draft of your analytical report (step k. and l.), combine the profile and draft into one file and post this file in the “File Exchange” section of your Group Page. Click this link to view a somewhat weak sample Writing Assignment 6:  English_2311_Sample_WA_6-2019.rtf Click for more optionsClick this link to find a better sample:  WA6-Sample-019.rtf  Click for more optionsTechnical writers rarely work in isolation, but depend on feedback and suggestions from other writers and employers. For this reason I have placed each student in a work group of 4 or 5. This will provide you with the opportunity to exchange information with at least three other writers. You will find the “Group Pages” link under the GROUP PAGES button on the menu of our eCampus site to be most useful. Within “Group Pages” you can post your assignments in File Exchange, then share ideas and comments in the “Group Discussion Board.”Simply follow the instructions on screen to use these features. It will give you some insight into possible problems. 
As a group member, your job is to read the reports of your fellow members. Read them carefully. Write at least one page of response for all other group members in which you provide specific suggestions of where you feel the report is strong, where you’d like to see more information or a different organization, and any other suggestion that might help strengthen the report. Also, if you discover that the draft does not conform to the guidelines of a report, indicate that as well. The purpose of getting group feedback on your draft is NOT to tear each other apart, but to give help to each other so that everyone does better.

This is the one assignment in this course that resembles what happens in a real business environment. Almost all reports are examined by groups for their feedback and suggestions. The more important the report, the more extensive the feedback. In addition, to make certain that the assignment WA6 and WA7 are your original work, these reports go through SafeAssign, which is originality checking software. Please be sure you have documented your work fully and correctly.
Please post your draft in the File Exchange of your GROUP PAGES according to the deadline listed in the course calendar. I will review the draft AFTER you have received peer review from your group members. 

[Solved] Social Media – Personal

[Solved] Social Media – Personal

Should people post videos of their kids on social media? If so, what types of content, and what happens when those kids grow up? If not, why not?

– Minimum of 1000 words 

–   

Anna-Maria, Iskül, and Kristi Joamets. “Child Right to Privacy and Social Media – Personal Information Oversharing Parents.” Baltic Journal of Law & Politics, vol. 14, no. 2, Dec. 2021, pp. 101–22. EBSCOhost, https://doi.org/10.2478/bjlp-2021-0012.

Cassandra, 

Stone. “New French Bill Would Prevent Parents from Oversharing About Their Kids Online.” MSN, https://www.msn.com/en-us/lifestyle/lifestyle-buzz/new-french-bill-would-prevent-parents-from-oversharing-about-their-kids-online/ar-AA19bqEw. 

Katie, Humphrey. “Parents’ Dilemma: To Share or Not to Share Kids’ Photos on Social Media.” Star Tribune (Minneapolis, MN), 4 June 2014. EBSCOhost, search.ebscohost.com/login.aspx?direct=true&db=n5h&AN=2W61028513461&site=eds-live&scope=site.

Samantha, Lui. “’Sharenting’ May Seem like Harmless Family Fun, but Experts Are Concerned about Its Impact on Kids’ Privacy | CBC Radio.” CBCnews, CBC/Radio Canada, 15 Mar. 2023, https://www.cbc.ca/radio/thecurrent/sharenting-privacy-concerns-1.6779790.