...1. Personal- The client needs personal to be able to know who he is. This is needed to make sure he knows what is going on with his life. To where if something were to happen to him he could give the information. This works with his school to know what he is doing and what question would be ask about personal information they need for his profile. His work would need this also to keep information about his checking to get his money to him for his paychecks. 2. Virtual- The client needs virtual to use to communicate. This is uses for he must email his teacher about assignment that he had question on. Also, to communicate with other classmates if he has question on what they did for class. For work he needs this to communicate with his boss for...
Words: 369 - Pages: 2
...1. In our culture, the Christian gospel is perceived as basically teaching the same thing as every other religion. This is even further by comments like “Jesus Christ, Jehovah, Allah. These are all names employed to describe an entity that is distinctly the same across the world. For centuries, blood has been needlessly shed because of the desire to segregate our faiths. This, however, should be the very concept which unites us as people, as nations, and as a world bound by faith” by Pope Francis (2015). So is Judaism, Christianity, and Islam just a different route to the same God? Powell (2006) dismisses the idea that all religions are a route/road to God, in chapter 12 stating “all roads lead to their own exclusive destination and do not even intersect”. While we might all worship the same entity: Abraham’s God the theology is very different. These attempt to create religious tolerance create confusion. If someone truly believes that we are all the same and they hold prejudice against one religious they may never open their heart to learning the truth of the Christian Gospel. 2. People who question their sexual orientation or gender identity may reject the Christian gospel for moral reasons. The Lesbian, Gay, Bisexual and Transgender communities are becoming a culturally approved and even church approved lifestyle. The individual may reject the Christian gospel first because they feel accepted so God will accept them as they are. This person may call themselves a Christian...
Words: 561 - Pages: 3
...Imagine a world in which music, did not exist? To put it differently, can you imagine a song with no music, or lyrics present? Then, it would not be a song. Right? I believe the world could end up in this situation if we do not start to take better care of our creative talent. Specifically, when it comes to monetary compensation and overall security. With attention to the “360 Deal”, as Tiffany Simmons Rufus defines it, “contracts that allow the record label to receive a percentage of the earnings from all of an artist’s activities rather than just earnings from record sales.” The above mentioned “multiple rights deals” subject most creative talent within the music industry to losing money while the “big 3 record labels” grow larger....
Words: 321 - Pages: 2
...Discussion 6 Assignment Sarah Sue Calbio Framingham State University Assignment Session VI: Understanding What is and What it can be In this session we will look as the Life World and the System World as described by the philosopher Jugin Habermas and apply his theories to the world of education. Steps Step 1: Reading Assignment Please read Section III: Tools for Learning; pages 75 to 113. Step 2: Lecture The Common Core and How it Should Work Step 3: Discussion Board Activity Please click this link to go to the discussion board activity. My discussion board posting: My stint as Ast. Super for Curriculum, Instruction and Technology lasted half a year. I found myself more and more at loggerheads with the new principal and my old Superintendent. As we have discussed, participatory decision making or, if you prefer, shared decision making or collaborative leadership is dependent upon open and honest discussion. Sometimes discussion can last for several weeks, requires cooling down periods, and compromise. During an early faculty discussion where divergent opinions were...
Words: 761 - Pages: 4
...1) Complete the Ch. 6 focus activity on page 113 of Essentials of Middle and Secondary Social Studies. When it comes to learning, I learn best through example and visuals. Many times throughout high school I was given a learner test, which would help the teacher understand what types of learns they had in their classrooms. For the vast majority of the time, I remember being scored as a visual learner. When the test were a bit more in depth, my learning type would fall in between that of a visual learner and an auditory learner. For the most part, I agree with the idea of being a visual learner; examples, or real world application has always worked best for me. Though, the visual aspect of my learning has never seemed to work with math classes, as I have found myself more of a kinesthetic learner with learning while doing. Even still, throughout my college experiences I have learned to become...
Words: 1284 - Pages: 6
...Unit 5 Portfolio Assignment Would you allow electrodes to be implanted in your brain in order to enhance the user experience and control everyday objects through thought? Why do you need to be a member? Why not? The Neuralink technology that is being discussed in this assignment, with Neuralink, is an interesting approach that could potentially bring it to the masses. Part of this approach is to bring down the cost, using components and methods found in existing technologies such as smartwatches and smartphones. It, therefore, has the potential to make such technology available to the masses, including those with spinal injuries and other disabilities, as this technology could be implemented “on masse”, aided by the installation using an automated process via a surgical robot (CNET, 2021). There are,...
Words: 586 - Pages: 3
...These past two weeks, I continued to work with the team on a new project implementation and I also worked with the database admin on daily task. I was doing both tasks every week and tried to cover as much as I could without neglecting my other job. The new project implementation consisted of many processes. I worked with the account manager to understand these process and help to implement them. As I learned in Walsh in my software security class, implementation is a critical phase and need to be handled carefully. I was not involved in all of them. But worked on critical one such as testing. Before that, I checked with the programmer manager on how she assists in designing the application. I started this process last week and this week we continued to check the project design excel sheet to track all the changes that needed to be done. The product we provided was already tested and needed to be modified to serve this client. However, we still tested the site to make sure that there are no surprises when we launch it next week. The website is a claim processing system, so I executed multiple tests to make sure the claims are being processed to SQL database. I also tested the design part of the website, where users can create their customer mailing. I found out some a bug in this system. When we load a high-resolution template in IE, it tends to crash. The bug was reported to software developers. After testing, I attend the meeting to discuss client training method. We discussed...
Words: 510 - Pages: 3
...1. What is the situation being analyzed? Class just begun and Mrs. Andrea got called to the office for an important phone call. She instructed me to watch over the class and complete the writing assignment. I noticed that one student seemed very upset and wasn’t working on her reading assignment. I questioned her about why she wasn’t doing her assignment and she mentioned that she didn’t understand how to find context clues within a passage. I began to explain the assignment to her and she began crying. I decided to have her step outside the class and explain what was going on. She mentioned that she wasn’t crying because she didn’t understand the assignment, but she was crying because she can’t take school anymore. She explained that school is overwhelming, and she’s failing a couple classes and isn’t sure if she will make it to Thibodaux High. She explained that her main problem is that she has many problems at home. The student was not able to...
Words: 793 - Pages: 4
...B. Methodology - B1. Participants or Stakeholders: Because this is an applied research project with a focus on the evaluation of curricular practices, I am the main and active participant. There are an additional three other stakeholders in my proposed capstone research, which includes administrators, students, and the community where I teach. This is because my research will affect these individuals when I get to the application portion of my capstone research. Likewise, two characteristics of my stakeholders relevant to my problem statement include being both supportive and hesitant. First, my stakeholders are supportive. I have felt very supported as the art educator in my school district by administration, students, and the community. This is relevant to the problem statement in Part A because I know I have the support to create curriculum in my classroom. I know that if I asked for resources or help with my curriculum, that it would be provided. Second, my stakeholders are also hesitant. I believe that they would be hesitant specifically to make a change in my curriculum. This goes back to my problem statement because I am responsible for the curriculum I create. This means that if I decide to change the curriculum currently in place at my school, I believe there will be hesitancy with administration, students, and the community. While these stakeholders support me, change can be scary for some individuals. I believe there is an expectation from these individuals to continue...
Words: 1052 - Pages: 5
...Problem Statement For this problem we are trying to find how many rebounds and corners it will take the ball to go into a pocket. We are also trying to find out what pocket the ball will land in,and if there are any patterns that meet that criteria. The rules include that you have to start at the lower left corner , and at a 45 degree angle. Also you have to start with whole number dimensions(4 by4 , 2 by 3), and there is only 4 pockets on the pool table. Process We had each member of our group draw out the pool table and try different whole number dimensions . Afterwards , we looked at each of our examples and charts and compared them to make a bigger chart with all the dimensions of 1-4 . We did this just to figure out if there were any common patterns within the the pictures and tables. Making a super pool table and coming up with our own patterns within the dimensions and rebounds was something we also did, by doing this we got to see if one of our patterns can match a bigger size dimension pool table along with the other dimensions. In conclusion we made a mini poster explaining our thoughts about this problem, within this project we got to go around to see what our classmates also had in mind. Solution...
Words: 436 - Pages: 2
...Assignment Ans A: LDD is used in NMOS only, LDD is used to reduce the electric field strength, the gate-drain capacitance and the hot electron impact ionisation effect. LDD reduces the drain-bulk depletion region at the reversed biased junction diode. Therefore LDD reduces leakage current through this diode B: The value of SPACE.MULT is the amount by which the grid spacing specified in the ATHENA Mesh Define menu is multiplied. A value for SPACE.MULT that is greater than will reduce the total number of grid points. A SPACE.MULT value that is less than will create a finer mesh throughout the initial structure. Reducing the number of grid nodes greatly increases speed. C: Just the doping below the gate has a significant influence on the final...
Words: 645 - Pages: 3
... Because the cluster head will perform the additional task of data aggregation it will dissipate more energy and if it will remain the Cluster head permanently then it will die quickly. LEACH will face this problem by randomly rotating cluster head to save the battery of individual node. Each node uses a particular algorithm at each round to decide whether to become a cluster head or not. In order to become a cluster head, that node should have higher energy level than others. Thus the ultimate goal of LEACH protocol is to increase the lifetime of whole system by selecting cluster head among more powerful sensor network. The process of implementation of LEACH includes many rounds. Each round contains two phase a) cluster set-up phase b) steady phase a) CLUSTER SET-UP PHASE: in this phase organization of cluster take place. It will work in three steps. • Advertisement phase: each node will decide based on the formula whether to become a cluster head or not for the current round. After this each elected CH node will send a broadcast message advertizing all nodes. After this member nodes will decide to which it will belong depending upon the signal strength and distance for the current round. • Joining phase: Once the cluster head has been selected , all the nodes join the corresponding cluster by sending a message to CH informing that it will be a member of that cluster • Schedule creation: CH will receive all the messages from the nodes that would like to be in its cluster. Once...
Words: 527 - Pages: 3
...Unit 6: Written Assignment Question 1. Read the following historical article about the development of nuclear energy: http://www.world-nuclear.org/info/inf54.html Read multiple time. Question 2. As you read, take notes on the article using one of the note taking strategies presented in this unit. Note taken Question 3. Explain which strategy you are using and why you are using it. Answer: The strategy I used is the MIND MAPS, it is also called the mind mapping, concept mapping, spray diagrams, or spider diagrams. This strategy is very good in summering larger unorganized information, and also helps in making connections when dealing with scientific or creative problems. This strategy is very effective in thinking through complex and very difficult problems, it helps to consolidate large information and give them directions. Having pages of information without knowing how they fit together is where MIND MAPS work best, “by using mind maps one can quickly understand the structure of a subject,” ( Mind Maps, n.d, p. 5). This strategy was made popular by Tony Buzan, and sometimes looks like a work of art....
Words: 428 - Pages: 2
...January 6, 2015 January 6, 2015 Todd Eppes NT1310 Todd Eppes NT1310 Service Provider types Unit 2 Assignment 1 Service Provider types Unit 2 Assignment 1 Todd Eppes January 1, 2015 NT1310 Unit 2 Assignment 1 Service Provider Types RBOCS stands for Regional Bell operating company. It was one of the United States regional telephone companies that were created as a result of the breakup of AT&T. They are allowed to compete for long distance telephone traffic under certain circumstances. RBOCs are generally in competition for digital data and internet traffic with wireless service providers and cable TV companies. ILEC is short for incumbent local exchange carrier. IT is a telephone company that was providing local service when the Telecommunications Act of 1996 was enacted. They are in contradistinction to CLEC. GTE was the second largest ILEC after “The Baby Bells” but has since been absorbed into Verizon. CLEC stands for competitive local exchange carrier. IT is a telecommunications provider company competing with other, already established carriers. CLECs have evolved from the competitive access providers that began to offer private line and special access services in competition with the ILECs beginning in 1985. MSO is short for multiple-system operator. This is an operator of multiple cable or direct-broadcast satellite television systems. Though in the strictest sense any cable company that serves multiple communities is an...
Words: 274 - Pages: 2
...to Networking or equivalent Course Description: This course introduces operating principles for the client-server based networking systems. Students will examine processes and procedures involving the installation, configuration, maintanence, troublshooting and routine adminstrative tasks of popular desktop operating system(s) for standalone and network client computers, and related aspects of typical network server functions. Client-Server Networking I Syllabus Where Does This Course Belong? 1st QTR GS1140 NT1110 GS1145 Problem Solving Theory Computer Structure and Logic Strategies for the Technical Professional 2nd QTR NT1210 Introduction to Networking NT1230 Client-Server Networking I MA1210 College Mathematics I 3rd QTR NT1310 NT1330 MA1310 4th QTR PT1420 NT1430 EN1320 5th QTR PT2520 NT2580 EN1420 6th QTR NT2640 NT2670 CO2520 7th QTR NT2799 SP2750 Physical Networking Client-Server Networking II College Mathematics II Introduction to Programming Linux Networking Composition I Database Concepts Introduction to Information Security Composition II IP Networking Email and Web Services Communications Network Systems Administration Capstone Project Group Theory The follow diagram indicates how this course relates to other courses in the NSA program: 1 Date: 8/31/2012 Client-Server Networking I Syllabus NT2799 NSA Capstone Project NT2580 Introduction to Information Security NT2670 Email and Web Services NT2640 IP Networking PT2520 Database...
Words: 1834 - Pages: 8