anguage acquisition, structure, and function

Review on language acquisition, structure, and function. For this assignment, you are a teacher’s assistant at a local university. For the upcoming final on theories of acquisition, you need to prepare a review for the class using a 12-15 slide PowerPoint presentation. The presenter notes should thoroughly explain the bullet points on each slide. The presentation should adhere to APA style. Be sure to include information about the structure and function of language.

discussion question and response

answer discussion questions Use information from Lesson 2 to explain what the mechanisms may be. and response one group member’s answer

movie assignment 1

Select and watch one of the movies listed below. You may choose to substitute a movie not on

this list but you must contact the instructor prior to completing the assignment to get

permission.

Write an essay on three of the following discussion topics and how that topic was covered in

the film. Each topic must a minimum of three paragraphs.

Your

assignment must be TYPED,

12-point font with a cover sheet and Stapled.

Listed below is a summary of possible topics from the class that you could address in your

assignment. Following that is a list of possible movies that you can view.

A. Possible Discussion Topics

1. Societal trends and changes and child rearing patterns

2. Methods of socialization and child outcomes

3. Temperament

4. Erikson’s psychosocial stages of development

5. Stress and child outcomes

6. Divorce and child outcomes

7. Grandparents raising grandchildren

8. Socioeconomic status and child rearing

values and behaviors

9. Culture/Ethnicity/Heritage and child rearing values and behaviors

10. Parenting styles and child outcomes

11. Bidirectional parent/child relationships

12. Birth order and child outcomes

13. Dysfunctional parenting: causes and effects

14. Child care and child outcomes

15. School goals

16. School’s methods of socializing children

17. Teaching styles

18. Friendship development

19. Education and…

culture

disability

children “at risk”

family involvement

20. Peers …

as a socializing agent

and conformity

and children’s play

– negative and positive influences

B. Possible movies:

1. Breaking Away

2. Nebraska

3. The Virgin Suicides

4. Boyhood

5. Still Alice

6. Dangerous Minds

7. Dad

8. Witness

9. Parenthood

10. The Long Walk Home

11. The Color Purple

12. Mean Girls

13. What’s Eating Gilbert Grape

14. Pinocchio

15. Stand by Me

16. Alika and the Bees

17. Little Miss Sunshine

18. This Boy’s Life

19. The Help

20. The Great Santini

21. The Royal Tenenbaums

22. The Butler

23. Cinema Paradiso

24. The Joy Luck Club

25. Mr. Holland’s Opus

26. Thirteen

27. Girl, Interrupted

28. The Ice Storm

29. The House of Yes

30. The Squid and the Whale

31. Dad

32. August: Osaga County

I would suggest that you watch the movie with your family if possible.

Discuss with them before answering the questions. You may find the

reviews of the plots of the movies you are not familiar with before

making your selection.

This essay must including introduction and conclusion.

system security need 12 hours

Information Systems Security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall. The daily operation of a pharmacy is a unique business that requires a combination of both physical and logical access controls geared towards protecting medication and funds located on the premises, as well as the personally identifiable information and protected health information of your customers that resides on your system. Your supervisor has tasked you with identifying inherent risks associated with your pharmacy and establishing strong physical and logical access control methods to mitigate the identified risks.

1) Firewall (1)

4) Desktop computers (4)

2) Windows 2012 Active Directory Domain Controllers (DC) (1)

5) Dedicated T1 Connection (1)

3) File Server (1)

 

 

Write an eight to ten (8-10) page paper in which you:

  1. Identify at least five (5) potential physical threats that require attention.
  2. Determine the impact of at least five (5) potential logical threats that require attention.
  3. Detail the security controls (i.e., administrative, preventative, detective, and corrective) that the pharmacy could implement in order to protect it from the five (5) selected physical threats.
  4. Explain in detail the security controls (i.e., administrative, preventative, detective, and corrective) that could be implemented to protect from the five (5) selected logical threats.
  5. For each of the five (5) selected physical threats, choose a strategy for addressing the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
  6. For each of the five (5) selected logical threats, choose a strategy for handling the risk (i.e., risk mitigation, risk assignment, risk acceptance, or risk avoidance). Justify your chosen strategies.
  7. Use at least five (5) quality resources in this assignment (no more than 2-3 years old) from material outside the textbook. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

 

  • Explain the concepts of information systems security as applied to an IT infrastructure.
  • Describe how malicious attacks, threats, and vulnerabilities impact an IT infrastructure.
  • Explain the means attackers use to compromise systems and networks, and defenses used by organizations.
  • Explain the role of access controls in implementing a security policy.
  • Explain how businesses apply cryptography in maintaining information security.
  • Analyze the importance of network principles and architecture to security operations.
  • Use technology and information resources to research issues in information systems security.
  • Write clearly and concisely about network security topics using proper writing mechanics and technical style conventions

1 page paper essay for play writing

ESSAY QUESTION CHOICES: You will pick two of these and answer them in essay format. They should be half a page each. You can do them in advance and bring them if you’d like.

1) Where is the turning point for you when you feel like Medea crossed the line in her revenge

plan? Or is there not one? Prove your point with evidence from the script.

2) Is Jason a hero, or did he only become one because of Medea’s help? Discuss his character

and whether he is sympathetic, or just pathetic.

3) Does Hamlet love Ophelia? Discuss why you think so or not, and use evidence from the text.

4) What are Hamlet’s conflicts in the play? You can discuss internal and external conflicts he

has in the story.

MLA citiation and must be follow the statment.( Exp: In the play Media, what happing in the play and explain the question and why.)

reflections on being helped

  1. Think of an experience in which you received help of any kind (not necessarily from a mental health professional). Then, in a 2-3 pages paper, please complete the following:
  • Rate the helper using the “Helper Rating Form” attached. Make sure to attach the completed form to your paper.
  • Select 4 of the ratings on the Rating Form, and explain how they relate to your experience.
  • What expectations, assumptions and did you bring to the helping process?
  • What assumptions and expectations do you think the helper brought to it?
  • How has the experience shaped your skills as a counselor in training?

5 qs quot odes of the 1st order quot

remember before u handle this work, this work is so important to me, so i will revise it many times before i turn it in and i will rate u depend on your work quality such as providing correct and full answers and meet all requirements in the attached instructions. Please avoid the Lack of depth in your response.

see the attachment picture then answer it in a WORD document fully.

SOLVE them all with full response with all steps

need help cis332

Assignment 2: Virtualize?

Imagine you are a senior systems administrator who has been tasked with considering whether or not to implement server virtualization into your organization’s computing operations of multiple sites with a server count of more than 400.

Write a two to three (2-3) page paper in which you:

  1. Specify the most significant advantages and disadvantages that could be realized by the organization in adopting a server virtualization infrastructure.
  2. Prepare a plan for implementing Hyper-V (or an alternate solution, such as VMware) as a solution for your organization. Provide a rationale for the plan decisions.
  3. Determine the strategy you would use to explain the concepts of server virtualization to senior management so that they understand the concepts and can form an opinion on the solution. Provide a rationale for using your chosen strategy.
  4. Based on your plan for implementation and the specifics of the organization of which you are aware, determine whether or not you should move forward with the implementation of a virtual infrastructure. Justify your response.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. 

The specific course learning outcomes associated with this assignment are:

  • Demonstrate the ability to prepare, install, configure, maintain, and update a computer system for use as a server.  
  • Describe and configure secure systems, networks, and computing applications.
  • Analyze the creation, configuration, and maintenance of virtual servers, storage, and networks.
  • Develop a server migration plan to address and solve a proposed business problem.
  • Demonstrate the ability to configure and deploy Active Directory, DNS, and DHCP services.
  • Use technology and information resources to research issues in server environments.
  • Write clearly and concisely about server administration topics using proper writing mechanics and technical style conventions.

 Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment.

security architecture and design discussion

The attached document is an interesting deep dive into threat modeling the potential of encrypted network traffic to be malicious based on it is meta data and use of TLS. Factors, like the client that was used (Mozilla, Tor, IE, Opera, etc.,), the cipher suite that was offered (RC4, DES, 3DES, AES, etc.).

What are your thoughts on the approach outlined in the article? Do you see any chance for false positives?

tell me why it is important to understand hris if you worked as a hr director of a large corporation

Assignment Instructions

Week Two Paper

3-5 page Paper

For this assignment, you should focus on the reading material for week 2.

The breakdown of your paper should be as follows:

Introduction:

Tell me why it is important to understand HRIS if you worked as a HR Director of a large corporation

• What did you learn about e-recruiting in our class? Why would it be important to Understand as an HR director? What are the positives and negatives of e-recruiting? Cite examples that you find from research in our library about the positives and negatives of e-recruiting. What are some of the resources that you could use for e-recruiting in an organization? Use our library and research different e-recruiting tools. Discuss three of these e-recruiting tools in this section of your paper and discuss specific providers that you might find during your research. What are some of the considerations that would be important when making decisions about e-recruiting?

Paper Format:

A. Abstract

B. Title Page – Include a title page with your name, student number, title of your review, course number, course name, session, section, semester and date.

C. Introductory Paragraph – Include an introductory paragraph.

D. Font and Spacing – Use Arial or Times New Roman 12 pitch font with double spaced lines.

E. Length – Write a 2 page review not including the title page and citation page.

F. Reference Page – Include all sources on a Reference page

2. Utilize the APA Style for the review and to documenting sources.

3. Punctuation, essay format (thesis, supporting paragraphs with transition and topic sentences, and summary) grammar and documentation count toward your grade.