...Apply the Ethical Decision Making Method at Small Unit Level 158-C-123 Conditions: As a leader faced with a situation which requires you to make an ethical decision. Standards: Resolved the situation ethically by appropriately applying the Ethical Decision Making Method FM-1 FM 6-22 AR 600-100. Training and Evaluation Guide Performance Steps: 1. Clearly define the ethical problem. Im sure many people would consider not informing their chain of command of this situation given the circumstances(new to the unit and SFC Sharps reputation) and the fact that SFC Sharp is on his way out of the unit. However the ethical dilemma for me is, do I confront him, alert the chain of command or contact the Military Police to launch an investigation. 2. Employ applicable laws and regulations. Im sure that the 99th INF BN has established SOP's for found documents and false reporting. I would likely follow that SOP to the letter. Given SGT Days' proposal i could be inclined to think that this may happen often therfore i would also be considering investigation even if its not apart of the SOP. When classified documents are reported destroyed and arent Im sure my chain of command would support this 3. Reflect on the ethical values and their ramifications. First things first, I will not compromise my integrity with SGT Day, his first impression of me cannot be one that puts my integrity into question. This incident will be reported...
Words: 814 - Pages: 4
...December 7th, 1941 the United States was attacked at Pearl Harbor by Japanese forces. American forces already stationed in the Philippines as a deterrent against a Japanese invasion of the islands, were attacked by the Japanese hours after Pearl Harbor. With more than 72,000 American and Filipino soldiers fighting with outdated weapons, lacking supplies, stricken with disease and malnourishment were forced to lay down their arms to the Japanese on April 9th, 1942. This was due to the promise of reinforcements after General MacArthur and a few select officers evacuated the island on orders from the president. The Japanese however had only accommodated for 10,000 to 25,000 thousand POWs and the Us and Philippine soldiers were forced to march 60 miles to the Cabanatuan and Bataan prison camps. On October 20th, 1944 General Douglas MacArthur’s forces landed on Leyte, as Americans prepared for the main invasion of Luzon the Japanese captors continued to execute their prisoners. Several plans were submitted for possible rescue attempts of the prisoners but most fell through simply due to logistics or possible traders amongst the ranks of the Philippine guerillas. On January 26th, 1945 major Bob Lapham, the American US Army Forces Far East senior guerrilla chief and another guerilla leader Juan Pojota, traveled from his location near the prison camp to the Sixth Army headquarters. Lapham proposed to Lieutenant General Walter Krueger’s intelligence Chief Colonel Horton White that a rescue...
Words: 1104 - Pages: 5
...Xiao-Qiang GUO, Wei-Yang WU, He-Rong GU Yanshan University Phase locked loop and synchronization methods for gridinterfaced converters: a review Abstract. Phase locked loop and synchronization techniques are one of the most important issues for operating grid-interfaced converters in practical applications, which involve Distributed Power Generation Systems, Flexible AC Transmission Systems (FACTS), and High Voltage Direct Current (HVDC) Transmission, and so on. This paper presents a comprehensive review of the recently developed phase locked loop and synchronization methods, then a comparison and selection guide are provided. Finally, a list of more than 40 technical papers is also appended for a quick reference. Streszczenie. Techniki PLL i synchronizacji są ważnymi elementami przetworników w systemach sieciowych, takich jak: rozproszonych systemach mocy, FACTs czy HVDC. Artykuł przedstawia przegląd tego typu metod a następnie porównanie tych metod. Na końcu ponad 40 podstawowych artykułów z tej tematyki jest przedstawionych.(Metody synchronizacji i PLL w przetwornikach sieciowych – przegląd). Keywords: Grid-interfaced converters, phase locked loop, synchronization Słowa kluczowe: uchłady PLL, synchronizacja. Introduction The basic phase locked loop (PLL) concept was originally published by Appleton in 1923 and Bellescize in 1932, which was mainly used for synchronous reception of radio signals [1-2]. After that, PLL techniques were widely used in various industrial...
Words: 5211 - Pages: 21
...See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/296695247 USING DATA MINING TO PREDICT SECONDARY SCHOOL STUDENT ALCOHOL CONSUMPTION Dataset · February 2016 DOI: 10.13140/RG.2.1.1465.8328 READS 2,200 2 authors: Fabio Pagnotta Hossain Amran University of Camerino University of Camerino 8 PUBLICATIONS 0 CITATIONS 5 PUBLICATIONS 0 CITATIONS SEE PROFILE All in-text references underlined in blue are linked to publications on ResearchGate, letting you access and read them immediately. SEE PROFILE Available from: Hossain Amran Retrieved on: 12 April 2016 USING DATA MINING TO PREDICT SECONDARY SCHOOL STUDENT ALCOHOL CONSUMPTION Fabio Pagnotta Mat:-093579 Mohammad Amran Hossain Mat:-093192 Department of Computer science, University of Camerino Advanced Database In this project, we use a data set about Portuguese student on two courses ( Mathematics and Portuguese ) which was collected and analysed by Paulo Cortez and Alice Silva, University of Minho,Portugal. Our work intends to approach student addiction on alcohol in secondary level using business intelligence (BI) and Data Mining (DM) techniques. The result shows that a good predictive accuracy can be achieved, provided that addiction of alcohol can impact to the student performance. In addition,the result also provides the correlation between alcohol usage and the social, gender and study time attributes...
Words: 4224 - Pages: 17
...bi-directional. Power splitters are constructed of two resistors. They are used for leveling and ratio measurement applications to improve the effective output match of microwave sources. The two-resistor configuration also provides 50Ω output impedance to minimize measurement uncertainty in source leveling or ratio measurement applications. Characteristics of power dividers and power splitters Power dividers • Divide a signal equally for comparison measurements • All ports have equivalent 16 ²⁄ ³ resistance • Can be used as power combiners • SWR 3:1 16 2/3 ohm 16 2/3 ohm 1 16 2/3 ohm 1 50 ohm Power splitters • Used in ratio measurements and leveling loop applications • Only the input port has a 50Ω resistance, the other two ports have 83.33Ω impedance • SWR 1:1 3 50 ohm 3 2 2 Key specifications of Agilent 11636C power dividers and 11667C power splitter 11636C power dividers • • • • Operating frequency: DC to 50 GHz ±0.3 dB amplitude tracking ± 2º phase tracking Low SWR 1.67 11667C power splitters • Operating frequency:...
Words: 1240 - Pages: 5
...OPORD 01 (DEATH OF A GENTELMAN) References: a) Operation Order (OPORD) 01-10 ALC-RAID b) Map Series: Fort Benning, 1:50,000 c) TIMEZONE: Romeo (Local) TASK ORGANIZATION1/A/3-15 MECH | | | | | 1/1/A | 2/1/A | 3/1/A | HQ/1/A | Bradley 1 | Bradley 2 | PSG | PL | | | Bradley 7 | FO TEAM | | | | Bradley 6 | 1. SITUATION. Recent HUMINT sources have indicated that there is a large Insurgent’s Cell operating in the town of McKenna. The insurgents are conducting disruption operations in our AO by planting IEDs and conducting sniper operations to harass and kill Coalition Forces as they conduct their daily operations. The 3rd Battalion 11th Infantry Regiment will conduct a Raid on the suspected insurgent cell in the town of McKenna to prevent further disruption of daily operations, to seize any bomb making material, capture or kill insurgents, and collect any intelligence information that could lead to further elimination of the insurgent threat in our AO. B.A. ENEMY. 2.2.1. DISPOSITION: Insurgents appear to have established a base of operation in the town of McKenna IOT disrupt the freedom of movement of Coalition Forces responsible for providing security, training, and operational support to the ANA in the AO. The insurgents are currently occupying two buildings on the eastern side of the town, grid GL06528372.They are using one building as a safe house and the other to produce IEDs. This group of insurgents is focused on...
Words: 3660 - Pages: 15
...Army Regulation 350–1 Training Army Training and Leader Development Rapid Action Revision (RAR) Issue Date: 4 August 2011 Headquarters Department of the Army Washington, DC 18 December 2009 UNCLASSIFIED SUMMARY of CHANGE AR 350–1 Army Training and Leader Development This rapid action revision, 4 September 2011-o Implements the Don’t Ask, Don’t Tell Repeal Act of 2010 by deleting all references to developing and conducting training concerning the Army’s Homosexual Conduct Policy (paras 2-21p and 2-22k.) o Rescinds paragraphs 2-6r, 2-46ac, and G-14e.) o Makes administrative changes (app A: marked obsolete forms and publications; corrected forms and publication titles; and corrected Web site addresses; glossary: deleted unused acronyms and corrected titles/abbreviations as prescribed by Army Records Management and Declassification Agency). *Army Regulation 350–1 Headquarters Department of the Army Washington, DC 18 December 2009 Effective 18 January 2010 Training Army Training and Leader Development History. This publication is a rapid action revision (RAR). This RAR is effective 20 September 2011. The portions affected by this RAR are listed in the summary of change. Summary. This regulation consolidates policy and guidance for Army training and leader development and supports a full-spectrum, force protection, expeditionary Army. Applicability. This regulation applies to the active Army, the Army National ...
Words: 129456 - Pages: 518
...UNIT 1 ACCOUNTING AND ITS FUNCTIONS Objectives After studying this unit, you should be able to appreciate the: • • • nature and role of accounting; activities of an accountant; and roles of accounting personnel and the accounting function in an organization. Accounting and its Functions Structure 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 1.10 1.11 1.12 Introduction Scope of Accounting Emerging Role of Accounting Accounting as an Information System Role and Activities of an Accountant Accounting Personnel Nature of Accounting Function Organisation for Accounting and Finance Summary Key Words Self-assessment Questions/Exercises Further Readings 1.1 INTRODUCTION Accounting is often called the language of business. The basic function of any language is to serve as a means of communication. In this context, the purpose of accounting is to communicate or report the results of business operations and its various aspects. Though accounting has been defined in various ways. According to one commonly accepted definition. "Accounting is the art of recording, classifying and summarising in a significant manner and in terms of money, transactions and events which are; in part at least, of financial character and interpreting the results thereof'. Another definition which is less restrictive interprets accounting as "The process of identifying, measuring and communicating economic information to permit informed judgements and decisions by the users of information" 1.2 SCOPE...
Words: 23289 - Pages: 94
...9-906-415 REV: NOVEMBER 14, 2006 CHRISTOPHER A. BARTLETT VINCENT DESSAIN ANDERS SJÖMAN IKEA’s Global Sourcing Challenge: Indian Rugs and Child Labor (B) After more than a decade spent struggling with the issue of child labor, Marianne Barner felt good about how IKEA had responded. But occasionally, she found herself wondering whether the progress the global furniture retailer had made was real and durable. Just as it had in the mid-1990s, in 2005 the company could still find itself on the defensive in dealing with the issue. Even more troubling to Barner was that after 10 years of working to prevent child labor among IKEA’s suppliers— introducing a clear code of conduct, developing internal controls and third-party audits, training its suppliers, supporting their corrective actions, and instituting stiff sanctions against offenders—the company was still finding cases of child labor in its supply chain. The latest issue had been drawn to Barner’s attention by Kaisa Mattson, the head of IKEA’s compliance office in south Asia. Like Barner herself a decade before, Mattson was facing the decision of whether to terminate a relationship with a long-standing major supplier. This one, however, had violated not one but several items in IKEA’s detailed code of conduct, known as “The IKEA Way on Purchasing Products”—or IWAY for short. Venkat Industries was a textile mill with over 10,000 workers, and a recent audit had shown that it had stopped using the water treatment plant it had...
Words: 8055 - Pages: 33
...projects with which they have been acquainted. Although not a comprehensive compilation of failure causes, this article outlines several areas that should demand your attention. few years ago marked the rollout of what could have been called a Titanic of military projects, except the original Titanic was ahead of schedule when it sank. Hundreds of millions of dollars over budget and years behind schedule, the first phase of this huge military system was finally "tossed over the wall" and over the top of a network of separate programs used by thousands of practitioners. Although long hampered by quality problems, big hopes were again riding on the system once it passed acceptance testing. The intended users refused to use the system. It lacked features they said were essential to their jobs while requiring steps they considered unnecessary or burdensome. The project eventually died a visible, painful death amid litigation and congressional inquiries. This failed project was not atypical of chronic problems in the software industry. According to the Standish Group [1], in 1995, U.S. government and businesses spent approximately $81 billion on canceled software projects, and another $59 billion for budget overruns. Their survey claimed that in the United States, only about one-sixth of all projects were completed on time and within budget, nearly one third...
Words: 3797 - Pages: 16
...Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure P-1 Figure P-2 Figure P-3 Figure P-4 Figure P-5 Figure P-6 Figure P-7 1: Leadership . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 Figure 1-1 Figure 1-2 Figure 1-3 Figure 1-4 Figure 1-5 Figure 1-6 Figure 1-7 Figure 1-8 2: Strategic Planning 3: Customer and Market Focus 4: Measurement, Analysis, and Knowledge Management Measurement Architecture Sources & Uses of Comparative Data Information Systems Knowledge Management Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Figure 5-1 Figure 5-2 Figure 5-3 Figure 5-4 Figure 5-5 6: Process Management Customer Listening Approaches Customer Contact Mechanisms Customer Survey Approaches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Figure 4-1 Figure 4-2 Figure 4-3 Figure 4-4 5: Human Resource Focus Strategic Planning Process Strategies and Action Plans Performance Projections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Figure 3-1 Figure 3-2 Figure 3-3 30 Compensation Systems Performance and Development Process/Career Management Training and Delivery Methods ...
Words: 39947 - Pages: 160
...Chaptet t ft.lutian t)t Huranr F.rorr.e r\.hr.rqen)rnr .jird Hil/5 conlercnce sponsored by the Socrety [or Human Resources Management (SHRM) and remember how ar HRIS rnay be what you needl As this chapter and the ones that follow w ll ne lsactvtesandthedemands' ol the human capital ol the orgarrzal on Thrs aLrtomairon he ps develop the capabr t es to es an HR deparlmenl to streaml rlunrale. af HRlS enab placed on rt by automating lhe HR dala and pro.esses necessary for the management prodlce rn[ormation and reports on lhe r€quests contained n the memos in the v gn€tte and lhese reports wri lac lrtate efliclent afd eflective manageria dec s on mak ng WhiLe an HR 5 canfol make the ludgement ca ls in terms ol whom lo recru I or promote, it can cerlarnLy lacrl lale better inputt fg integratiof afd use ol employee data, wh ch wil reduce the admrn strat ve blrrden oI keeping detailed records and should aid and enhance dec srons about stclegic d rections Need for an HRIS in Decision Situations ll you read the above memos again. you w ll recogn ze iha! each one has a request lor HRI\4 nfornraton lhal wil be used n a decston stlaton The inlormatror rcquested n Memo I wil help the egal depa(menl delermne the compafys potertal labr ty vad n a workplace gender disc(m nat on s tLat on Thrs rlomat on rnay help to determrne whether the company shoLr d decide lo rect ly lhe silual on in lerms ol an nforma sett e' mertwth the lemale statf membels orto defend...
Words: 4270 - Pages: 18
...Approaches to Process Performance Modeling: A Summary from the SEI Series of Workshops on CMMI High Maturity Measurement and Analysis Robert W. Stoddard II Dennis R. Goldenson January 2010 TECHNICAL REPORT CMU/SEI-2009-TR-021 ESC-TR-2009-021 Software Engineering Measurement and Analysis Unlimited distribution subject to the copyright. http://www.sei.cmu.edu This report was prepared for the SEI Administrative Agent ESC/XPK 5 Eglin Street Hanscom AFB, MA 01731-2100 The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2010 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on...
Words: 27376 - Pages: 110
...1. D. The top priority of any software designer is to design a program that is useful to the end user. 2. C. Spreadsheets are too complicated for young children. As a result, it is typically more appropriate to start them out with a simpler file format such as a database. 3. A. Students should be familiar with common phishing ploys as well as the process of authenticating websites. 4. C. A peripheral is a device outside of the computer that either brings information into the system or allows the system to create an output. 5. B. Students can learn new computer programs much faster when they are allowed to participate and make progress through trial and error. 6. D. In the early years of school, children should only use software that reinforces the concepts that they have acquired through traditional instruction. 7. A. A virus hidden in a seemingly harmless program is known as a Trojan horse. Students should learn how to scan programs with anti-virus software to minimize the risk of Trojan horses. 8. B. Students need to work together in order to obtain all of the social and cognitive benefits that technology offers. 9. B. Social networking sites, blogs, and wikis are all considered to be part of Web 2.0. 10. D. Websites that are created and updated by users on their own browsers are typically called wikis. The best known wiki is Wikipedia, the user-generated encyclopedia. However, it is important to remember that the information on wikis is not always trustworthy. 11...
Words: 5636 - Pages: 23
...Pre-Clinical Assignment Anita Mall Delaware Technical Community College Diagnosis Pneumonia: * Definition- Inflammation of the respiratory bronchioles and alveoli * Signs & Symptoms- Cough (productive or nonproductive), increased sputum (rust colored, discolored, purulent, bloody, or mucoid) production, fever, pleuritic chest pain, dyspnea, chills, headache, myalgia, and confusion in older adults * Assessment/Interventions- * Provide patient teaching and education on exercises (breathing and physical) that help prevent infection or pneumonia. * Have patient in Semi-Fowler’s or High-Fowlers position, especially during meals and drinking * Turn patient every 2 hours * Assess patient’respiratory status and vital signs every 4 hours * Provide adequate fluid intake * Administer prescribed meds (including oxygen) and monitor effects Diabetes: * Definition- (Mellitus) a group of chronic metabolic disorders characterized by inappropriate hyperglycemia * Signs & Symptoms- severe dehydration, hypovolemic shock (hypotension, weak and rapid pulse), severe hyperglycemia, shallow respirations, altered mental health status, abd pain * Assessment/Interventions- * Assess patient’s blood glucose before meals and before sleeping at night * Assess patient’s vital signs (especially BP) every 4 hours * Assess patient’s feet everyday * Provide patient teaching and education on the importance...
Words: 7909 - Pages: 32