Benchmark ELA Unit Plan Worksheet
Special educators must be able to effectively plan for students at all ages and abilities, using data and anecdotal information. An effective plan takes into consideration a students developmental level, age, strengths, needs, learning preferences, culture, and interests. Interventions that are well planned for students and are based on these factors are far more effective than interventions that narrowly focus only on the students academic skill deficiencies.In this assignment, practice developing ELA instruction that is appropriate for the students described in the Class Profile by designing a comprehensive ELA unit plan using the 5-Day Unit Plan Template.Part 1: Unit PlanDevelop a 5-day unit plan that integrates vocabulary, reading, grammar, writing, listening and speaking, and technology, for the Class Profile students, choosing either the resource or self-contained learning environment. In a typical resource or self-contained learning environment the teacher would differentiate for every student. For this assignment, choose three students for whom you will differentiate the instruction. Align your unit to a 6-12 grade level ELA standard from the Arizona or another state academic content standards.Design the unit plan to include: National/State Learning Standards: Select standards that address reading, writing, speaking, and listening integration skills.Multiple Means of Representation: Select strategies that allow opportunities to develop oral and written language for students with disabilities. Incorporate individual abilities, interests, learning environments, and cultural and linguistic factors in the section.Multiple Means of Engagement: Select strategies to enhance language development and communication skills.Multiple Means of Expression: Use technically sound formal and informal assessment.Support your findings with a minimum of three scholarly resources.
BUS 445 Global Total Quality Quality Management Continuous Improvement Paper
Begin your journal entry with the label: Unit 3: Continuous ImprovementResearch the following topics related to Kaizen:1. Seiri2. Seiton3. Seiso4. Seiketsu5. ShitsukeSelect three of the topics listed and compose three paragraphs describing the topics, one paragraph per selected topic, based on the course material, and additional research you conduct online.
Identify some possible questions for research study. lady taylor phd
Many sources exist that are triggers for theory development through the study of concepts and their related propositions. One such trigger is the research process, which, while it answers many questions, generates others based on research outcomes. Identify some possible questions for research study, the answers to which would serve to generate theory.
This is for a discussion/forum. Only 1 1/2 page.
Communication essay | Human Resource Management homework help
Begin by watching this short video from YouTube: https://www.youtube.com/watch?v=xusemZImx3c
Identify at least two channels of nonverbal communication used by either Amy or Sheldon in the video. Specifically explain how Amy or Sheldon used that channel of nonverbal communication. Be sure to define each of the channels you chose in your post and explain why your example fits the definition.
Now explain how the nonverbal communication helped them to reinforce their verbal messages or how their nonverbal communication disagreed with their verbal communication. What was the overall impact of the nonverbal communication on the conversation?
Incorporate the key chapter terms in your answer, these terms should be defined and properly cited in the post. Think carefully about your answer before you hit the post button. Remember: you cannot see what your classmates have written until you have posted your own answer.
should be around 600 words.
Cis 512 week 10 term paper virtualization*****a++ rated tutorial
Term Paper: Virtualization
Due Week 10 and worth 210 points
This assignment contains two (2) sections: Written Report and PowerPoint Presentation. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment it is written for. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.
According to a TechRepublic survey performed in 2013, (located at http://www.techrepublic.com/blog/data-center/research-desktop-virtualization-growing-in-popularity/#) desktop virtualization is growing in popularity. Use the Internet and Strayer Library to research this technique. Research the top three (3) selling brands of virtualization software.
Imagine that the Chief Technology Officer (CTO) of your organization, or of an organization in which you are familiar, has tasked you with researching the potential for using virtualization in the organization. You must write a report that the CTO and many others within the organization will read. You must also summarize the paper and share your key ideas, via a PowerPoint presentation, with the CTO and steering committee of the organization.
This paper and presentation should enlighten the organization as to whether or not virtualization is a worthwhile investment that could yield eventual savings to the organization.
Section 1: Written Report
Write an six to eight (6-8) page paper in which you:
Compare and contrast the top three (3) brands of virtualization software available. Focus your efforts on components such as standard configuration, hardware requirements price, and associated costs.
Examine the major pros and major cons of each of the top three (3) software packages available. Recommend the virtualization software that you feel is most appropriate for the organization. Provide a rationale for your recommendation.
Explore the major advantages and major disadvantages that your chosen organization may experience when using virtualization software. Give your opinion on whether or not you believe virtualization software is the right fit for your chosen company. Provide a rationale for your response.
Create a Microsoft Word table that identifies the advantages, disadvantages, computer requirements, initial costs, and future savings for an organization considering an engagement in virtualization.
Use at least six (6) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the students name, the professors name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
Section 2: PowerPoint Presentation
Create a twelve (12) to sixteen (16) slide PowerPoint in which you:
Illustrate the concepts from your written report in Section 1 of this assignment.
Create bulleted speaking notes for your presentation to the CTO and steering committee in the Notes section of the PowerPoint. Note: You may create or assume any fictitious names, data, or scenarios that have not been established throughout this assignment for a realistic flow of communication.
Use a professional, technically written style to graphically convey the information.
The specific course learning outcomes associated with this assignment are:
Analyze the types of organizational and computer architectures for integrating systems.
Analyze the main classes of hardware and system software components in an enterprise context.
Discuss common input / output technologies.
Describe computing technology, architecture, and future trends in processing.
Use technology and information resources to research issues in enterprise architecture.
Write clearly and concisely about Advanced Computer Architecture topics using proper writing mechanics and technical style conventions.
Csis discussion and replies | Computer Science homework help
Instructions
Write a thread containing a thoughtful answer to 1 question. Answer should contain at least 400 words. If necessary, you may list within your thread any concepts on which you need further clarification as well. Also, you must reply to at least 2 threads below. Each reply should contain at least 200 words. Additionally, all posts (thread and replies) should reflect professional writing, current APA standards, include at least 1 scholarly reference (e.g., peer-reviewed journal articles), and integration of at least 1 biblical principle.
Thread Question: (in 400 words at least)
Why should the IT department not be solely responsible for business continuity?
Replies(Reply to each thread in at least 200 words EACH)
Thread #1
Business Continuity and Disaster Recovery Goal
Cybersecurity revolves around the CIA triad and protecting the information by ensuring its confidentiality, integrity and availability. The Triads purpose is to guide the information security practitioner in creating policies and controls that protect systems against outside and inside intrusion, as well as, natural disaster. Business Continuity planning and Disaster recovery efforts number one goal is to protect the availability of information in the CIA Triad. Business Continuity Plans a as well as Disaster Recovery plans must be defined and understood, to understand the necessity of policies that protect the availability of information, and their importance in the overall goals of information security.
Business continuity planning is the process of identifying the potential losses from external threats and consequential losses due to the loss of key business processes from an accident, attack, disaster, or physical damage to essential hardware and software (Pinata, 2011). Business continuity planning would identify all the potential impacts from a disaster and would direct the upper level management to identify specific targets for policies that would mitigate the damage and ensure systems are available quickly.
Disaster Recovery Planning restores the operability of systems that support mission-critical processes as quickly as possible (Bahan, 2003). Disaster recover planning occurs before a disaster occurs, and addresses the targets identified during the business continuity process. Disasters can be anything from natural disaster to malware attacks, such as ransomware, that encrypt all data in servers.
A business continuity plan should address the acceptable amount of downtime and thus the Disaster recovery policy should attempt to recover systems in that amount of time. Systems should be backed up regularly and the backups should be tested to ensure the availability of information in the case of a disaster occurring. If systems are not tested regularly the plan would only be theoretical and would not ensure the availability of information in an emergency.
Ransomware attacks, as the one recently seen in Baltimore, is becoming a common attack and organizations must take business continuity and disaster recovery planning serious to ensure that mission-critical systems are up and running quickly and does not prevent normal operations for a long period of time.
Thread #2
As organizations and information systems (IS) increasingly commingle, any incident with organization IS may cause significant organizational damage. (Niemimaa, 2015). That is why the notification procedures must be clearly documented for a number of reasons ranging from informing stakeholders to ensuring staffing requirements during a disaster. In the event of a disaster or emergency situation, certain individuals on multiple levels of an organization may need to be informed or report to work to deal with these issues. This can range from a first-line supervisor to the CEO of the organization, but the contingency plan should have in place a definitive notification procedure to ensure all personnel that need to be informed are informed. According to Gregory, all parties involved with an organization that may be affected by the disaster should be notified, to include: employees, suppliers, customers, regulators, authorities and stakeholders (2015). While the who of the notification procedure makes up the bulk of the material, how those individuals are notified can be a pressing matter as well. Depending on the type and severity of a disaster, the responses can range from e-mail notifications to phone calls to in-person visits. Depending on the cost, type and severity of a disaster, it can dictate how individuals should be contacted, or it can dictate if they would like to be contacted at all.
In the organization I currently work in, our contingency plan is based off the severity of the incident, the time/day of week and how large the incident is. All of those factors dictate whether we call anyone at all, whether we call just the administrators to fix the issues, or whether we call the administrators and the organizations leaders. The contingency plan should lay the groundwork for notification procedures, but it should also put into place the details around different types of problems and disasters. As I mentioned above about my organization, different people wish to be notified at different levels or degrees that evolve over the lifetime of a problem or disaster. For this reason, a corresponding list of notification instructions should be kept and updated frequently to ensure that correct means of communication are still accurate and when one of these individuals would like to be notified in the event of a problem or disaster. On a side note, ways of communicating to designated personnel should be closely adhered. Notifying personnel to little or to much can de-simplify the issue, or it can cause the issue to seem larger than it is prompting an inaccurate response.
Module 3 case study_sm-computers | Computer Science homework help
MUST BE LESS THAN 7% TURN IT IN SCORE AND SAFEASSIGN
Groupware is software that was developed to support teams by providing team
members with powerful and convenient ways to schedule their interactions,
communicate with each other, and record and update group output. Another (less
catchy) name for computer supported collaborative work (CSCW) is computer
supported teamwork. Much of the early research in this area was focused on
understanding the complex relationships between the social aspects of teamwork
and the technical features of groupware and looking for ways to improve the quality
both of the teamwork and the groupware. In more recent years, economists have
begun to examine groupware and CSCW as well in the interest of determining
efficient methods of organizing cooperative work and using groupware.
Here are a couple of good introductory articles on the special problems of databases
used to support group applications:
Heer, J. Viegas, F. B., and Wattenburg, M. (2009). Voyagers and voyeurs:
Supporting asynchronous collaborative visualization. Communications of the ACM,
52(1), 87-97.
Nistor, C. and Nistor, R. (2006). Groupware- modern information managerial
method, Marketing Management, 95-100. ISSN 1841 2416
But the fact remains that many groupware applications and the data that support
them are improvised or otherwise knocked together:
Microsoft (2011). CSCW in Microsoft research group. Enabling cross-lingual
conversation in real time: http://research.microsoft.com/enus/
news/features/translator-052714.aspx
Having read about computer-supported work groups, describe the latest software to
support the computer-supported work groups. Describe how information is shared
across the groups and what databases they use to support this collaborative work.
Focus your response on global corporations and how they manage projects where
members of the collaborative work group could be separated by many time zones
and have to deal with different cultures and different languages.
Your paper should be between three and five pages. Take a definite stand on the
issues, and develop your supporting argument carefully. Using material from the
background information and any other sources you can find to support specific
points in your argument is highly recommended; try to avoid making assertions for
which you can find no support other than your own opinion.
Your paper is to be structured as a point/counterpoint argument, in the following
manner.
Begin this paper by stating your position on this question clearly and concisely
Citing appropriate sources, present the reasons why you take this position. Be
sure to make the most effective case you can-MUST HAVE IN TEXT CITATIONS TO MATCH REFERENCES.
Then present the best evidence you can, again citing appropriate sources,
against your position that is, establish what counterarguments can be made to
your original position.
Finally, review your original position in light of the counterarguments, showing
how they are inadequate to rebut your original statement.
By the end of your paper, you should be able to unequivocally re-affirm your original position.
Watch tedtalk video and write a thesis statement on..
WATCH: TED Talks: Gary Lauder: New Traffic Sign Take Turns (4:27)
I am looking for a well thought, well written, thesis as a response to this 10 point question. Watch Gary Lauders New Traffic Sign: Take Turns. Notice how he makes his point using Statistical References in order to create change.
I would like you to do the same thing! I want to know how you would change your field and I would like you to back it up with research from the field and tell me the source. In other words, in order to CHANGE/IMPROVE your field (addiction/counseling), you would do the following based on what STATISTICAL INFORMATION ???
I want you to reference the STATISTICAL INFORMATION (a minimum of 3 references: 2 Peer-reviewed Journal articles from the professional literature and 1 website Respected by your profession).
If you are unsure about what a peer-reviewed Journal article is, or do not know how to use the University of Buffalo online library to find peer-reviewed Journal articles, please use the library link in course documents. Im looking forward to reading your thoughts and the statistics you reference!!!
The purpose of this post is to demonstrate your ability to reference the professional literature with statistical support for your thesis. If you reference studies from literature (which by the way you have to do in order to succeed at this assignment), I will want to know about significant results and the statistical test that was used.
M5_a1 | Psychology homework help
Read everything
Forensic Psychologists and the USIC
The forensic psychological professional can add great value when considering perspectives of national intelligence. However, there is a debate over how involved forensic psychologists should be in the US Intelligence Community (USIC).
Using the module readings, the University online library resources, and independent resources, research the roles and responsibilities of the forensic psychology professional in the USIC.
Tasks:
In a minimum of 300 words, respond to the following:
Explain both sides of the debate on how involved forensic psychologists should be in the USIC.
Provide your perspective on the issue and the side with which you concur. There is no right or wrong side.
Give reasons in support of your responses. Be sure to cite your sources.
Week 4 assignemt | HIM 420 Health Information Governance Strategic Planning
Encryption
It is common in todays environment for healthcare providers and patients to use email or texting to communicate with each other. Prepare a procedure on secure messaging. What are the key components of the federal regulation 45 CFR Part 170.314(e) (3) Secure messaging? Include a summary of what information between provider and patient must be encrypted. Where is the certification criterion from for encryption? How would you test for intrusion of the messaging system? What requirements would you require for password management?
The Encryption assignment