Free Essay

Investigating Special Education Internet Resources

In:

Submitted By risa0725
Words 1327
Pages 6
Running head: INVESTIGATING SPECIAL EDUCATION INTERNET RESOURCES

Investigating Special Education Internet Resources
Heather Cox
Grand Canyon University: SPE-330
January 29, 2012

Investigating Special Education Internet Resources TABLE OF CONTENTS
Special Education Associations Page • National Association of Special Education Teachers (NASET) 4 • National Education Association (NEA) 4 • International Association for Special Education (IASE) 4
Professional Development • Council for Exceptional Children 5
Legal Rights and Resources for Parents • Ed.gov IDEA 5 • Wrights Law 5 • The ARC 6 • National Dissemination Center for Children with Disabilities (NICHCY) 6 • American Academy of Child & Adolescence Psychiatry 6 • Parent Pals.com 7
Educational Resources • ePals 7 • Glogster 7
Individual Disability Resources • Time 4 Learning-ADD/ADHD 8 • Ed.gov- Teaching Children with Attention Deficit Hyperactivity Disorders. 8 • Internet 4 Classrooms-Dyslexia 8 • Autism Speaks 9 • MitoAction 9

Special Education Associations
National Association of Special Education Teachers (2007). Retrieved January 29, 2012, from http://www.naset.org/
The NASET is a national organization that was founded for future, current and former special education teachers when they had absolutely no organization to call their own. NASET gives support to special education teachers, as well as a place to come to stay up to date on current trends and findings in the special education field.

National Education Association (NEA) (2012). IDEA/Special Education. Retrieved January 29, 2012, from http://www.nea.org/specialed
The NEA strives to be the voice for education professionals. The NEA vision is to have a great public school for every single student regardless of their needs. The NEA is supporting the IDEA Full Funding Bill, which if passed, would make funding for special education mandatory and would also gradually increase funding through 2021.

International Association for Special Education (IASE) (n.d.). Retrieved January 29, 2012, from http://www.iase.org/
“Founded in 1989, the IASE is an organization of professionals who are dedicated to improving the quality of life and service delivery for all individuals identified as having special needs. Members include teachers, teacher trainers, professors, speech clinicians, psychologists, health care providers, social workers, counselors, family members and those associated with related disciplines.” (IASE, n.d.)

Professional Development
Council for Exceptional Children (CEC) (2011). Professional Development. Retrieved January 29, 2012, from http://www.cec.sped.org/AM/Template.cfm?Section=Professional_Development
The CEC thrives on helping individuals with disabilities reach their full potential. The CEC also provides ongoing learning opportunities for educators in ways such as webinars and convention/expos. The learning opportunities are geared with busy educators in mind so that they are not too costly or tie consuming.

Legal Rights and Resources for Parents
ED.gov (n.d.). Building the Legacy: IDEA 2004. Retrieved January 29, 2012, from http://idea.ed.gov/explore/home
The IDEA website is great resource for parents regarding their rights regarding their student with disabilities. This website is constantly being updated and can also be cross referenced with other laws such as the NCLB Act.

Wrights Law (n.d.). Retrieved January 29, 2012, from http://www.wrightslaw.com/
Wrights Law website is a place where parents, students, teachers, and even lawyers can come to in order to get accurate and informative information regarding the rights of a student with disabilities. This site also has the dates for the training programs available throughout the United States given by Wrights Law. This website helps advocate for individuals with disabilities.

The Arc (2012). For People with Intellectual and Developmental Disabilities. Retrieved January 29, 2012, from http://www.thearc.org/
The goal of The Arc is full inclusion of individuals with disabilities. They strive to achieve this through support and promoting this goal by allowing individuals with disabilities to participate in their community as much as possible. The Arc believes an individual with disabilities deserves the same respect, dignity, and equality as non-disabled individuals.

National Dissemination Center for Children with Disabilities (NICHCY) (n.d.). Retrieved January 29, 2012, from http://nichcy.org/
The NICHY provides parents with valuable information regarding their child’s education beginning in infancy. The NICHY can provides easy to regard information regarding the laws about special education rights, early intervention rights, and a resource guide listed by state. The NICHY can also answers individual questions when necessary.

American Academy of Child & Adolescence Psychiatry (2010). Services in Schools for Children with Special Needs: What Every Parent Should Know. Retrieved January 29, 2012, from http://www.aacap.org/cs/root/facts_for_families/services_in_school_for_children_wi th_special_needs_what_parents_need_to_know
This is an incredibly valuable resource for parents who are working through the system to get services for their student with special needs. Whether their child is having behavioral problems, emotional problems, learning difficulties, and more this will help guide you on the steps that you should take to get the appropriate services for your child through the public school system.
Parent Pals.com (2010). Retrieved January 29, 2012, from http://parentpals.com/gossamer/pages/Special_Education_Organizations/index.html
This website is a wonderful collection of resource for parents listed by disability. Parents can access this website and then search by their child’s disability in order to gain additional resources as well as connect with other parents who have children with the same disabilities to gain support.

Educational Resources ePals (2010). Global Community. Retrieved January 29, 2012, from http://www.epals.com/ ePals allows classrooms to connect and interact around the world. A benefit to this is that students and teachers both can collaborate with each other and learning things from each other that they may have otherwise not learned. Often times students with disabilities feel alone, so by allowing them to connect through ePals with other students with similar disabilities may help them not feel as if they are the only one who struggles with their specific disability.

Glogster (2011). Retrieved January 29, 2012, from http://www.glogster.com/
Glogster is a website that allows student to create a digital poster online. Glogster can be a helpful way to allow student to display the research that they have gathered on a subject, who may otherwise have trouble compiling into a written report.

Individual Disability Resources
Time 4 Learning (2012). ADD/ADHD Teaching Challenges. Retrieved January 29, 2012, from http://www.time4learning.com/ADD.shtml
Time 4 Learning provides parents with helpful ways to teaching their child who has been diagnosed with ADD/ADHD at home. Children with ADD/ADHD learn differently and this resource helps navigate these differences so the learning is successful.

Ed.gov (2004). Teaching Children with Attention Deficit Hyperactivity Disorders. Retrieved January 29, 2012, from http://www2.ed.gov/teachers/needs/speced/adhd/adhd-resource-pt2.pdf
Teaching Children with Attention Deficit Hyperactivity Disorders is a pdf resource that assists teaching with instructing students with ADHD. This resource starts with an explanation of how to help identify students with ADHD all the way through how to plan and execute lessons successful for students who suffer from ADHD.

Internet 4 Classrooms (2010). Dyslexia-Resources for Teachers. Retrieved January 29, 2012, from http://www.internet4classrooms.com/exceptional_children/dyslexia_teacher_resourc es.htm
This is a wonderful resource for teachers who are struggling to teach and understand students with dyslexia. Knowledge is power so understanding students with disabilities is crucial. This resource depicts how to help dyslexic students who suffer with attention issues, memory, reading, writing, spelling, and may other issues related to dyslexia.
Autism Speaks (2012). It’s Time to Listen. Retrieved January 30, 2012, from http://www.autismspeaks.org/
Autism Speaks is a wonderful website with valuable information for both parents and teachers regarding Autism. Autism speaks explains what autisms is, who it affects, services available for those affected, and how to advocate for individuals with autism, as many affected are unable to advocate for themselves.

MitoAction (n.d.). Retrieved January 30, 2012, from http://www.mitoaction.org/
MitoAction helps parents, students, and teachers understand who mitochondrial disease affects students. It is important for teachers to understand who this disease can affect their student and how the affects can translate into a student’s ability to function at school.

Similar Documents

Premium Essay

Sir Robert Peel

...the lives of citizens. Community policing is based on Peel's concept of prevention. Community policing has been embraced by many law enforcement organizations across our country. Community policing is based on its goal to prevent crime and promote better police-community partnerships. Community policing requires an investment in training with special attention to problem analysis and problem solving, facilitation, community organization; communication, mediation and conflict resolution, resource identification and use, networking and linkages, and cross-cultural competency. Public approval and cooperation is a basis of Sir Robert Peel’s principles of effective policing. Peel stated that the ability of the police to perform their duties is dependent upon public approval of police actions and they must secure the willing co-operation of the public in voluntary observance of the law to be able to secure and maintain the respect of the public. In our diverse society, it is necessary for police to understand the different cultures that make up the communities that they patrol. This can be accomplished through multi-cultural training and education. If police can relate to and understand the different cultures of the community, they will be able to successfully gain public approval. Public approval of the police will increase the effectiveness of law enforcement. Peel stated "the degree of co-operation of the...

Words: 1644 - Pages: 7

Premium Essay

Sir Robert Peel

...the lives of citizens. Community policing is based on Peel's concept of prevention. Community policing has been embraced by many law enforcement organizations across our country. Community policing is based on its goal to prevent crime and promote better police-community partnerships. Community policing requires an investment in training with special attention to problem analysis and problem solving, facilitation, community organization; communication, mediation and conflict resolution, resource identification and use, networking and linkages, and cross-cultural competency. Public approval and cooperation is a basis of Sir Robert Peel’s principles of effective policing. Peel stated that the ability of the police to perform their duties is dependent upon public approval of police actions and they must secure the willing co-operation of the public in voluntary observance of the law to be able to secure and maintain the respect of the public. In our diverse society, it is necessary for police to understand the different cultures that make up the communities that they patrol. This can be accomplished through multi-cultural training and education. If police can relate to and understand the different cultures of the community, they will be able to successfully gain public approval. Public approval of the police will increase the effectiveness of law enforcement. Peel stated "the degree of co-operation of the...

Words: 1644 - Pages: 7

Premium Essay

Community Policing to Prevent Crime

...the lives of citizens. Community policing is based on Peel's concept of prevention. Community policing has been embraced by many law enforcement organizations across our country. Community policing is based on its goal to prevent crime and promote better police-community partnerships. Community policing requires an investment in training with special attention to problem analysis and problem solving, facilitation, community organization; communication, mediation and conflict resolution, resource identification and use, networking and linkages, and cross-cultural competency. Public approval and cooperation is a basis of Sir Robert Peel’s principles of effective policing. Peel stated that the ability of the police to perform their duties is dependent upon public approval of police actions and they must secure the willing co-operation of the public in voluntary observance of the law to be able to secure and maintain the respect of the public. In our diverse society, it is necessary for police to understand the different cultures that make up the communities that they patrol. This can be accomplished through multi-cultural training and education. If police can relate to and understand the different cultures of the community, they will be able to successfully gain public approval. Public approval of the police will increase the effectiveness of law enforcement. Peel stated "the degree of co-operation of the public that can be secured diminishes proportionately to the necessity...

Words: 1628 - Pages: 7

Free Essay

Abakada

...ECONOMIC ENVIRONMENT Over the past 20 years, Mongolia has transformed into a vibrant multiparty democracy with a booming economy. Mongolia is at the threshold of a major transformation driven by the exploitation of its vast mineral resources and the share of mining in GDP today stands at 20 percent, twice the ratio of a decade ago. The Mongolian economy is facing challenges from persistent economic imbalances. Economic growth slowed to 3.0 percent in the first half of 2015 amid declining exports from a continued weakening of the commodity market and slower growth in the key export market of China. Mongolia’s annual GDP growth is expected to slow to 2.3 percent for all of 2015. Poverty has been on a downward trend over the past decade. Most recently, Mongolia’s poverty rate declined from 27.4 percent in 2012 to 21.6 percent in 2014, although many remain near the poverty line. Substantial progress has also been made in regard to several Millennium Development Goals (MDGs) at the national level, though significant regional disparities prevail. To ensure sustainable and inclusive growth, Mongolia will need to strengthen institutional capacity to manage public revenues efficiently and limit the effects of Dutch Disease; allocate its resources effectively among spending, investing, and saving; reduce poverty; and offer equal opportunities to all its citizens in urban and rural areas. It needs to do this in a manner which protects the environment and intergenerational equity...

Words: 4106 - Pages: 17

Free Essay

Information Security

...very convent and easier to do. The Internet is a huge discover for mankind for the commutation barrier. With all of these new products like smartphones, tablets, and computers made this new capability for anyone in the world that can afford at least one of these products. Since this new commutation barrier is being used daily by the human race, this very much-changed the “business world”. Databases of your personal information, such as credit card numbers, social security numbers, and even your address are on the Internet somewhere. IT has proved to be a significant employer. Many people with knowledge of computers have got jobs in this field, and have successfully made a career out of it. Since it has changed the business world in such a dramatic way, Corporations need employees that have the skill to protect this values and private information. Information technology has helped one find cures for several diseases; thereby, serving mankind in plentiful ways. Many other programs have helped individuals that have visual or hearing impairment. Corporations use information in databases to run operating activities day to day. In the world we live in today information technology is only becoming more and integrated in our daily lives, as we know it. To the average human, not much is known about safety of their personal information on the World Wide Web. Since millions of people have all this information on the Internet, it’s only human nature for unethical...

Words: 1443 - Pages: 6

Premium Essay

Tourist Destinations’ Appeal

...Tourism & Hospitality Research Article Research Article Ndivo et al., J Tourism Hospit 2012, 1:5 http://dx.doi.org/10.4172/2167-0269.1000103 Open Access Open Access Examining Kenya’s Tourist Destinations’ Appeal: the Perspectives of Domestic Tourism Market Rayviscic M. Ndivo1*, Judith N. Waudo1 and Fuchaka Waswa2 1 2 School of Hospitality & Tourism Management, Kenyatta University, Kenya School of Environmental Studies, Kenyatta University, Kenya Abstract Kenya’s tourism activity has always been centered on the coastal beaches and a few game parks despite of being endowed with a unique combination of tourist attractions spread throughout the country. Noting this skewed nature of tourism development, this study aimed at investigating the status of appeal of the different Kenya’s tourist regions from the perspective of the domestic market with the goal of examining the efficacy of the destination appeal enhancers. Data was collected using semi-structured questionnaires and analysed using mainly descriptive statistics. The study found out that while majority of Kenyans considered taking a holiday as being important to them, a significant majority of them were not be aware of most of the country’s touristic attractions and hence, frequented only a few of the country’s attractions, mainly the coastal beaches. Further, the study found out that the most important sources of travel information available to Kenyans were personal experience and information from significant others; travel...

Words: 6027 - Pages: 25

Premium Essay

Cyber Crime in India

...Cyber space is a virtual space that has become as important as real space for business, education and politics. The growing danger from crimes committed against computers, or against information on computers, is beginning to claim attention in the India. The digital age has dramatically changed the scope of a crime by adding the electronic component and it comes a new form of science ≴Computer Forensic Science≵. Computer Forensic allows for the evidence of cyber crime to be admissible in court when prosecuting the cyber criminal. In most countries, existing laws are likely to be unenforceable against such crime. Cyber laws, as it stand today, gives rise to both positive & negative consequences. The main negative consequences is the digital soup so vague that many refer to it as the dark sides of technology and that cyber criminal currently have upper hand. The applicability and effectiveness of our existing laws need to be constantly reviewed to face the risk coming from the cyber world. In this paper we are going to firstly describe the computer forensic, cyber crimes, cyber laws of nation & technology challenges. Aim of this paper is to act as a catalyst to raise awareness regarding computer forensic which continues to grow as one of the most important branch of science and help in investigation of cyber crime which continues to grow as one of the most potent threats to the Internet and computer users of the cyber society of 21st century in India Introduction The rapid...

Words: 2686 - Pages: 11

Premium Essay

Dsddddd

...Ministry of Education and Science of the Republic of Kazakhstan Kazakh National University named after Al-Farabi Faculty of Geography and Environmental Sciences Department of Recreation Geography and Tourism SIW №1 Topic: “ASSESSMENT OF INFORMATION WHICH AVAILABLE AND REQUIRED FOR ECOTOURISM IN KAZAKHSTAN” PREPARED BY: ABDULOVA NARGIZ Almaty, 2015 Content | INTRODUCTION | 3 | 1 | A LIST OF INTERNET RESOURCES OF ECOTOURISM IN KAZAKHSTAN | 4 | 2 | A LIST OF COMMERCIALLY AVAILABLE OF THE ADVERTISEMENT-SUPPLEMENTAL AND SPECIAL LITERATURE ABOUT ECOTOURISM IN KAZAKHSTAN (PERIODICALS, DIRECTORIES, GUIDES, BOOKLETS / BROCHURES, MAPS, ETC.). | 10 | 3 | ANSWERING THE QUESTIONS: | 11 | 3 | CONCLUSION | 15 | | | | | | | | | | INTRODUCTION Ecotourism is: "Responsible travel to natural areas that conserves the environment and improves the well-being of local people." (TIES, 1990)  Ecotourism is about uniting conservation, communities, and sustainable travel. This means that those who implement and participate in ecotourism activities should follow the following ecotourism principles:   * Minimize impact. * Build environmental and cultural awareness and respect. * Provide positive experiences for both visitors and hosts. * Provide direct financial benefits for conservation. * Provide financial benefits and empowerment for local people. * Raise sensitivity to host countries' political, environmental, and social climate. ...

Words: 2783 - Pages: 12

Premium Essay

Network Administration

...0-16 -041805-4 -— . . Foreword omputer networks are having dramatic impacts on our lives. What were once esoteric tools used only by scientists and engineers are becoming more widely used in schools, libraries, and businesses. At the same time, researchers are working to develop even more capable networks that promise to change fundamentally the way we communicate. This background paper analyzes technologies for tomorrow’s information superhighways. Advanced networks will first be used to support scientists in their work, linking researchers to supercomputers, databases, and scientific instruments. As the new networks are deployed more widely, they will be used by a broader range of users for business, entertainment, health care, and education applications. The background paper also describes six test networks that are being funded as part of the High Performance Computing and Communications Program. These test networks are a collaboration of government, industry, and academia, and allow researchers to try new approaches to network design and to attack a variety of research questions, Significant progress has been made in the development of technologies that will help achieve the goals of the HighPerformance Computing Act of 1991. This is the third publication from OTA’s assessment on information technology and research, which was requested by the House Committee on Science, Space, and Technology and the Senate Committee on Commerce, Science, and...

Words: 37290 - Pages: 150

Premium Essay

Business Development Planning

...Providing resources for staff and students in higher and further education in the UK and beyond Business Development Plan 2009–2012 EDINA is a JISC National Datacentre Table of Contents 1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 2. MISSION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 3. VALUES . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1 4. CONTEXT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 5. BUSINESS PLAN FOR 2009–2012 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Strategic goal 1: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 To provide added value, high quality services, leveraged by research, enhancement activity and engagement with others Strategic theme 1a: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-7 Providing a managed portfolio...

Words: 9567 - Pages: 39

Premium Essay

Bibliography

...Bibliography for Social Network Sites related thesis Aaltonen, S,, Kakderi, C,, Hausmann, V, and Heinze, A. (2013). Social media in Europe: Lessons from an online survey. In proceedings of the 18th UKAIS Annual Conference: Social Information Systems. (pp. Availalable online). USIR. , and 2013, , in: , 19-20 March 2013, Worcester College, Oxford, UK. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2006). Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook.In Golle, P. and Danezis, G. (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies. (pp. 36--58).Cambridge, U.K. Robinson College. June 28-30. (conference paper) Acquisti, Alessandro, and Gross, Ralph. (2009). Predicting Social Security numbers from public data. Proceedings of the National Academy of Sciences, 106 (27), 10975-10980. (journal article) Adamic, Lada, Buyukkokten,Orkut, and Eytan Adar. (2003). A social network caught in the Web. First Monday, 8 (6). (journal article) Adrien Guille, Hakim Hacid, Cécile Favre, and Djamel A. Zighed. (2013). Information diffusion in online social networks: a survey. SIGMOD Record, 42 (2). (journal article) Agarwal, S., and Mital, M.. (2009). Focus on Business Practices: An Exploratory Study of Indian University Students' Use of Social Networking Web Sites: Implications for the Workplace. Business Communication Quarterly. (journal article) Ahmed OH, Sullivan SJ, Schneiders AG, and McCrory P. (2010). iSupport:...

Words: 18938 - Pages: 76

Free Essay

Secure Cloud Node

...its ability to increase system performance, efficient use of computer resources and also scalability. As with any internet technology, security is a big challenge for cloud computing services. Denial of Service (DoS) attacks targeted at cloud end node systems are possible because of how vulnerable these node systems are. The level of security at the node systems is not matched to that at the server level. Cloud node networks are the major entry points for DoS attacks and other malicious attacks in a cloud computing environment. This paper will discuss various DoS attacks and techniques and also discuss the role of Distributed Denial of Service (DDoS) on distributed computer networks. I will also discuss how DoS attacks are the major threats to cloud services, entry points of DoS which are cloud end nodes and recommend how these attacks can be mitigated. DoS attacks on the cloud node computers are the major security challenges cloud services face. I will also recommend techniques that can prevent DoS on cloud node networks. Introduction Denials of Service (DoS) are malicious attacks made in an attempt to breach security by an intruder on vulnerable computer networks. Malicious messages are broadcasted to occupy the resources of a network node to disable functionality. The affected network node or server processes unwanted computing cycle and thereby network response becomes slow. It keeps node resources unavailable. How...

Words: 2565 - Pages: 11

Premium Essay

Uses of Ict in Nigeria

...The Role of Information and Communication Technology in Language Teaching and Learning In University Education Introduction: In 2000, Nigeria developed a policy on Information Technology (IT), with the aim of making Nigeria an IT adapted country in Africa and also a leading player in the use of ICT as an implement for sustainable development and global competitiveness. Since then Information and Communication Technology has been on the lips of every academic. The world is about to leave behind anyone that is not ICT compliant. ICT has various forms and roles which it performs in learning, especially in the teaching and learning of language. It is a powerful tool which can take the form of texts, pictures, tables, graphs, emails, fax, chat groups, discussion groups, SMSs, socializing portals, dictionaries, e-encyclopaedia, Power Point presentations, websites and audio-videos, etc. It can play instructional roles which include making learners feel more relaxed to learn various topics and tasks and making them active as learning is technologically based. The problem which we have identified in the use of ICT in tertiary education is lack of infrastructure and trained manpower (personnel) to use the ICT tools in teaching and learning. Most lecturers, technologists and students who are supposed to use the ICT tools are ignorant of what they are and their uses. Previous researches on ICT have focused on the hardware, software, professional development and support services....

Words: 4988 - Pages: 20

Premium Essay

Social Network Sites: Definition, History, and Scholarship

...Social Network Sites: Definition, History, and Scholarship  danah m. boyd  School of Information University of California-Berkeley  Nicole B. Ellison  Department of Telecommunication, Information Studies, and Media  Michigan State University    ------------------------------------------------- Top of Form                         Bottom of Form Abstract Social network sites (SNSs) are increasingly attracting the attention of academic and industry researchers intrigued by their affordances and reach. This special theme section of theJournal of Computer-Mediated Communication brings together scholarship on these emergent phenomena. In this introductory article, we describe features of SNSs and propose a comprehensive definition. We then present one perspective on the history of such sites, discussing key changes and developments. After briefly summarizing existing scholarship concerning SNSs, we discuss the articles in this special section and conclude with considerations for future research. Introduction Since their introduction, social network sites (SNSs) such as MySpace, Facebook, Cyworld, and Bebo have attracted millions of users, many of whom have integrated these sites into their daily practices. As of this writing, there are hundreds of SNSs, with various technological affordances, supporting a wide range of interests and practices. While their key technological features are fairly consistent, the cultures that emerge around SNSs are varied. Most sites...

Words: 14098 - Pages: 57

Premium Essay

Reademe

...| UNIVERSITY OF SOUTH AUSTRALIA Assignment Cover Sheet – External | An Assignment cover sheet needs to be included with each assignment. Please complete all details clearly. Please check your Course Information Booklet or contact your School Office for assignment submission locations. ADDRESS DETAILS: Full name: | Raj Kamal | Address: | 4, Baroota Avenue | | Rostrevor, SA | Postcode:5073 | | If you are submitting the assignment on paper, please staple this sheet to the front of each assignment. If you are submitting the assignment online, please ensure this cover sheet is included at the start of your document. (This is preferable to a separate attachment.) Student ID |  1 | 1 | 0 | 0 | 7 | 4 | 4 | 1 | 7 | Email: kamry007@mymail.unisa.edu.au | Course code and title: Strategic Information Systems M (INFS 5058) | School: School of Computer and Information Science | Program Code: LMCB | Course Coordinator: Dr Don Falconer | Tutor: Dr Don Falconer | Assignment number: Two (2) | Due date: 08th Nov 2013, 10:00 PM | Assignment topic as stated in Course Information Booklet: Essay : Information and Communication Technology (ICT) on National Level | Further Information: (e.g. state if extension was granted and attach evidence of approval, Revised Submission Date)  N.A. | I declare that the work contained in this assignment is my own, except where acknowledgement of sources is made. I authorise the University to test any work submitted...

Words: 3165 - Pages: 13