Aspen University Renewable Solar Energy for Homes

5 SOURCES10 pages The topic of the research paper must be about renewable solar energy for homes and it must be written from a Christian perspective. The thesis statement must include the problem, possible approaches or solutions, and the writer?s proposed approach must be expressed in this statement. I would like the thesis statement to be based on the following: eliminating our usage of fossil fuels to generate energy by implementing and utilizing renewable solar energy that provides energy (free-of-charge) to anyone having the necessary equipment to capture it?thus reducing the need of electric public utility companies and creating incentives for people everywhere to stop using them (both the public utility companies and the fossil fuels which pollute and contaminate our environment). The research paper should analyze the data gathered from various sources and reach a conclusion on an issue or problem that has been raised in the thesis statement. I want the conclusion of the research paper to mention that solar energy is the best of all the renewables since every single person on this planet having sunlight, in every climate, location, etc. is able to capture and utilize it using solar panels, an inverter, and store the energy using batteries. With this energy at hand, people are able to charge their electric cars, power their homes, etc. and in some countries they are even able to sell excess energy/feed it back into the national power grid. I also want the conclusion to mention that as stewards of God?s creation, we need to care for and protect the environment with which we have been entrusted and make the first step in ensuring that our planet will be environmentally clean for us and future generations. Please also do mention the recent advancements in solar panel technology and the types that are currently available. The audience of the research paper should be that of the average person, so everything must be written in an understandable manner, and all terms that are unfamiliar must be defined. Please pay special attention to the Outline Guidelines 1-3 that I have uploaded and follow the instructions carefully. A final revision of the general outline should be made to accurately reflect the proper order of the material covered in the final draft of the paper. The final revision would be the detailed outline. It should contain a thesis statement and three main sections (headings) that include subheadings and supporting details. When taking notes, incorporate or delete certain ideas in the outline. In this way you will be able to determine areas you may have neglected or overemphasized. After you have established the accuracy of the general outline, make sure that the points are in the best order. The work must flow logically, and orderliness is a vital aspect. I have uploaded a sample research paper (Sample RP 1-11) to show you the exact way the research paper must look like, and some instructions on the MLA style (MLA-Style Guidelines 1-7 & MLA-Style Guidelines for I.S. 1-2). Please note that the uploaded instructions regarding the MLA style are not exhaustive, so please refer to MLA Handbook for Writers of Research Papers, Sixth Edition (2003) or visit the MLA website at for any questions that might arise. Photocopies of relevant pages from Internet articles or Webpages, articles, books, periodicals, journals, etc. that are cited in the research paper need to be provided. Include only pages that have been cited in the paper, not entire articles or whole sections from books. Words that have been quoted or ideas otherwise cited need to be highlighted in these copies (without these required copies of the source materials?the whole research paper is useless to me). The ?Works Cited? page must contain at least five sources, including two hard copy books, periodicals, or journals. Only one of the five sources may be an encyclopedia. Please note neither Wikipedia nor any film may be used as a source. Please do NOT plagiarize or inspire yourself from another research paper. The writing must be original and unique and all inspiration needs to come from the sources themselves. My school has a zero-tolerance policy for plagiarism even if the plagiarism is not word-for-word. My school considers plagiarism to be the using of ideas from other published researched papers. So please use parenthetical documentation when making a direct quotation, summarizing, paraphrasing, or simply reiterating someone else?s thoughts. If a quote is more than forty words, put it in a block quote and ident one-half inch from the left margin. Please ensure that the paper is clear and flows logically from one paragraph to the next, all thoughts are organized, all parts are in the proper order, each part has been developed at an appropriate length in proportion to its importance, and there are no foggy concepts, weak arguments, or problem areas. The phrases also need to be examined for the appropriate figure of speech and expression of idiom. Please avoid jargon, trite phrases, and wordiness or redundancies. Please check to see that the verbs are bright and alive, and that the nouns are specific and direct. Proofread every word, phrase, sentence, and paragraph for proper usage: spelling, clarity, oneness, cohesion, stress, order, grammar, and mechanics. Please ensure that ALL uploaded and written instructions are carefully read, as well as the sample research paper before the writing process begins. Once this research paper is completed and done to the standards described, I will purchase another one using the same instructions; so please do pay careful attention to all details. If you have any questions, please contact me. Thank you

The Concept of Outsource Manufacturing Discussion Responses

This week’s discussion is about “Outsourcing and Procurement”:1-)Hello Everyone,After the watching the video I can observe that outsource manufacturing consists of hiring people outside of the company to assemble parts of, or build an entire product. The main reason why companies chose to do this is to cut costs. Labor is often among any company?s largest costs. Outsourcing parts of the production line to a third party in a lower cost location leads to a significant decrease in production costs.Disadvantages of Outsourcing:Although there are several reasons to outsource, according to Webb (2017) there are also disadvantages to the practice such as:Make or Buy Decisions for Manufacturing Industries:The make-or-buy question has always been a concern of complex nature which represents a fundamental dilemma faced by many companies. The cut-throat competition compels all the manufacturing and services companies to re-evaluate their existing processes, technologies, products and services in order to find an opportunity to positively impact the bottom line by making strategically drawn out make-or-buy decisions (Sillanpaa, 2015). The make-or-buy decision is the act of making a strategic choice between producing an item internally (in-house) or buying it externally (from an outside vendor). The video described that, outsourcing decisions are based on the difference in the cost of purchasing or buying a product or service from an external supplier compared to the cost of producing the item or providing the service in house. One important aspect of cost management is determining whether to make or buy components in a product. A complete and correct assessment of the various elements of the cost is essential to make sound economic decisions.Kraljic?s Supply Matrix:The supplier suffers from a range of risks depending on its geographic location, business model and supply chain length. If the vendor is based in Switzerland, it is unlikely that political uncertainty or logistical delay will impact upon operations. On the other hand, facilities based in the developing world may be subject to legislative risk, political upheaval and unreliable transportation routes. According to Webb (2017), all such risk factors have bearing upon the buying company. Profitability describes the impact of a supply item upon the bottom line. For certain areas of spend, such as stationery, supplies have only a negligible effect on profits. In other categories, a single source of supply can make or break a business. For Apple, a large proportion of its profits are determined by Foxconn?s ability to manufacture the scale of products required to a precise specification.2-)Outsourcing and ProcurementIn this video Dr. Millar present topics on outsourcing, names of some companies that outsource, the products they outsource, reason for outsourcing, issues with outsourcing, benefits and risks involved, framework for make-buy model, hierarchical model for outsourcing decision, procurement strategy, link between procurement and outsourcing, and types of e-market . Outsourcing is a common activity and is on the rise due to its use by manufacturing and electronic industry. The concepts learned from this video are benefits of outsourcing, risks of outsourcing, Hierarchical Model for outsourcing decision and Kraljic Supply Matrix.Benefits of OutsourcingEconomies of scale allows cost to decrease both in purchasing and manufacturing due to bigger orders or multiple orders. In other words, as the business grows or due to bulk product ordering cost of product can be reduced thus increasing profit.Risk pooling is the ability for suppliers to spread the risk of demand and supply. Outsourcing allows transferring the risk of uncertainty to suppliers through the effect of risk-pooling.Reduce capital investment allows to save the money allocated for the function or support of an activity. By transferring some of the non-core activities to the supplier, the cost of maintaining those activities are also transferred to the supplier.Focus on core competency allows focusing on the talent available inside the organization so that performance can be increased.Increased flexibility allows making use of talent available outside the organization (Millar, 2013, February 22).Risks of outsourcingLoss of competitive knowledge even though outsourcing can be considered an effective way to compete in the business world. Care must be taken not to outsource the processes at what the company is specialized at.Conflicting objectives when an organization outsources only product and services are transferred not the responsibility of meeting quality and customer satisfaction. Therefore the organization can lose visibility as well as direct control on its transferred operations (Millar, 2013, February 22).3-)In the shared video, Miller has explained procurement and outsourcing with few examples. Below are the few points which are discussed in the video:Outsourcing:Outsourcing is a process where an organization assign or delegate some organization?s activities to outside company by seeking benefits or fulfill some business need. Initially, manufacturing used to outsource, nowadays product design and innovation get outsourced. Benefits can get in terms of cost savings, competitive advantage, focus on core business etc. Likewise, outsourcing provides many advantages to organizations, whereas it can bring dependency issues. It can be competitive knowledge sharing to competitors. Therefore, in outsourcing secondary activities of business outsourced to other companies.In general, there are two main reasons to outsourcing; dependency on capacity (Knowledge and Skills) and dependency on knowledge. Based on the product is modular or integral, outsourcing decision may differ. There are few parameters that need to consider while outsourcing, those are customer importance, component clock speed, competitive position, capable suppliers and architecture.Procurement:Procurement is the process of finding and acquiring the goods, services or works from the external organizations. Procurement decision should be made considering few parameters like types of products the firm is purchasing, level of risks and uncertainty involved.Kraljic?s Supply Matrix:This matrix works on two dimensions; one is profit impact and another is supply risk. Using these two dimensions, firm can decide where they land while procuring any service or product.E-market:In a procurement process, getting suitable suppliers to business is challenging. Suppliers price negotiation depends on demand and supply gap. If the demand of procurement thing is high and supply is less, then suppliers offers high prices and vice versa. E-market provides a platform where may suppliers easily accessible and firm can find suitable suppliers easily. Advantages of e-market are; flexible revenue model and open market. There are two ways e-market service is accessible; one is licensing fees and second is subscription fee. Install.com for food service industry and Pefa.com for a fresh fish market are two examples of e-market.

Bus 225 section 1 review problems solutions chapter 1 to 3

ÿÿ
Chapter #1
PROBLEMS (p. 24-25)
(Note: Some of these problems require the use of the Time Value of Money Tables in the Chapter 1 Appendix, pp. 40-43).
1. Using the rule of 72, approximate the following amounts.
a. If the value of land in an area is increasing 6 percent a year, how long will it take for property values to double?
ÿb. If you earn 10 percent on your investments, how long will it take for your money to double?
ÿc. At an annual interest rate of 5 percent, how long will it take for your savings to double?
ÿÿ
2. In 2013, selected automobiles had an average cost of $16,000. The average cost of those same automobiles is now $20,000. What was the rate of increase for these automobiles between the two time periods?
3. A family spends $46,000 a year for living expenses. If prices increase by 3 percent a year for the next three years, what amount will the family need for their living expenses after three years?
ÿÿ
4. Ben Collins plans to buy a house for $220,000. If that real estate is expected to increase in value by 2 percent each year, what will its approximate value be seven years from now?
ÿÿ
5. What would be the yearly earnings for a person with $8,000 in savings at an annual interest rate of 1.5 percent?
ÿÿ
6. Using time value of money tables (Exhibit 1-3 or Chapter Appendix tables-Pages 40-43), calculate the following:
a. The future value of $550 six years from now at 7 percent.
b. The future value of $700 saved each year for 10 years at 8 percent.
c. The amount that a person would have to deposit today (present value) at a 5 percent interest rate in order to have $1,000 five years from now.
d. The amount that a person would have to deposit today in order to be able to take out $500 a year for 10 years from an account earning 8 percent.
7. If you desire to have $10,000 for a down payment for a house in five years, what amount would you need to deposit today? Assume that your money will earn 4 percent.
8. Pete Morton is planning to go to graduate school in a program of study that will take three years. Pete wants to have $8,000 available each year for various school and living expenses. If he earns 3 percent on his money, how much must be deposit at the start of his studies to be able to withdraw $8,000 a year for three years?
9. Carla Lopez deposits $3,000 a year into her retirement account. If these funds have an average earning of 7 percent over the 40 years until her retirement, what will be the value of her retirement account?
10. If a person spends $10 a week on coffee (assume $500 a year), what would be the future value of that amount over ten years if the funds were deposited in an account earning 3 percent?
ÿÿ
Chapter #2
PROBLEMS (p. 65-66)
1. Based on the following data, determine the amount of total assets, total liabilities, and net worth.ÿ
Liquid assets, $3,870 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿInvestment assets, $8,340
Current liabilities, $2,670 ÿÿÿÿÿÿÿÿÿHousehold assets, $87,890ÿ
Long-term liabilities, $76,230
ÿÿ
a. Total assetsÿ
b. Total liabilities
c. Net worth
2. Using the following balance sheet items and amounts, calculate the total liquid assets and total current liabilities: Money market account $2,600 Medical bills $262
Mortgage $158,000 Checking account $780
Retirement account $87,400 Credit card balance $489
a. Total liquid assetsÿ
b. Total current liabilitiesÿ
ÿ3. Use the following items to determine the total assets, total liabilities, net worth, total cash inflows, and total cash outflows.
Rent for the month, $650 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿMonthly take-home salary, $2,185 ÿÿÿ
Spending for food, $345 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCash in checking account, $450
Savings account balance, $1,890 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿBalance of educational loan, $2,160ÿ
Current value of automobile, $8,800 ÿÿÿÿÿÿÿÿÿÿÿÿTelephone bill paid for month, $65ÿ
Credit card balance, $235 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿLoan payment, $80
Auto insurance, $230 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿHousehold possessions, $3,400
Video equipment, $2,350 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿPayment for electricity, $90
Lunches/parking at work, $180 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿDonations, $160
Personal computer, $1,200 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿValue of stock investment, $860
Clothing purchase, $110 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿRestaurant spending, $130
ÿÿ
a. Total assets =ÿ
b. Total liabilities =ÿ
c. Net worth =ÿ
a. Total cash inflows =ÿ
e. Total cash outflows =ÿ
ÿÿ
4. For each of the following situations, compute the missing amount.
ÿÿ
a. Assets $65,000; liabilities $18,000; net worth=??
ÿÿ
b. Assets $86,500; liabilities=?? net worth $18,700.
ÿÿ
c. Assets $34,280; liabilities $12,965; net worth=??
ÿÿ
d. Assets=?? liabilities $38,345; net worth $52,654
5. Based on this financial data, calculate the ratios requested: (Page 51) Liabilities $7,800 Net worth $58,000
Liquid assets $4,600 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿCurrent liabilities $1,300
Monthly credit payments $640 ÿÿÿÿÿÿÿÿÿÿÿTake-home pay $2,575
Monthly savings $130 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿGross income $2,850

ÿÿ
a. Debt ratioÿ
b. Current ratio
c. Debt-payments ratioÿ
d. Savings ratio
ÿÿ
10. Fran Powers created the following budget and reported the actual spending listed. Calculate the variance for each of these categories, and indicate whether it was a deficit or a surplus.
ÿÿÿÿÿ
Item ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿBudgeted ÿÿÿÿÿÿÿÿÿActual ÿÿÿÿÿÿVariance ÿÿÿÿÿÿÿDeficit/Surplus
ÿ
Food ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ$360 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ$298 ÿÿÿÿÿÿÿÿÿÿÿ
ÿ
Transportation ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ320 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ334 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ
ÿ
Housing ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ950 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ982 ÿÿÿ
ÿ
Clothing ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ110 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ134 ÿÿ
ÿ
Personal ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ275 ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ231 ÿ
ÿÿ
Note: A deficit in one category means that another category will have to make up the difference.
ÿÿ
Chapter #3
PROBLEMS (p.100-101)
2. If Samantha Jones had the following itemized deductions, should she use Schedule A or the standard deduction? The standard deduction for her tax situation is $6,350.
Donations to church and other charities, $3,050
Medical and dental expenses exceeding 10 percent of adjusted gross income, $450ÿ
State income tax, $920
Job-related expenses exceeding 2 percent of adjusted gross income, $1,450
3. What would be the average tax rate for a person who paid taxes of $6,435 on a taxable income of $40,780?
5. If $4,323 was withheld during the year and taxes owed were $4,122, would the person owe an additional amount or receive a refund? What is the amount?
9. Using the tax table in Exhibit 3?5, determine the amount of taxes for the following situations:
a. A head of household with taxable income of $62,525.
b. A single person with taxable income of $62,001.
c. A married person filing a separate return with taxable income of $62,365.
10. Wendy Brooks prepares her own income tax return each year. A tax preparer would charge her $75 for this service. Over a period of 10 years, how much does Wendy gain from preparing her own tax return? Assume she can earn 3 percent on her savings. (LO 3.3)
11. Julia Sims has $30,000 of adjusted gross income and $5,000 of medical expenses. She will be itemizing her tax deductions this year. The most recent tax year has a medical expenses floor of 10%. How much of a tax deduction will Julia be able to deduct?
ÿÿ
***Tax Law Change: Medical and Dental expenses that can be itemized have changed over the years from 7.5% to 10%, back to 7.5% You will be told in all problems whether to use 7.5% or 10% for your calculations.
ÿÿ
14. On December 30, you decide to make a $3,000 charitable donation. (LO 3.4)
a. If you are in the 28 percent tax bracket, how much will you save in taxes for the current year?
b. If you deposit that tax savings in a savings account for the next five years at 8 percent, what will be the future value of that account?

AC Prejudice and Discrimination Literature Review

Prejudice and Discrimination Introduction In many parts of the world and throughout history, prejudice and discrimination exist in different forms. Racism, nepotism, gender discrimination and discrimination against people with disabilities are examples of prejudice and discrimination. Prejudice concerns the irrational and inflexible feelings or thoughts retained by a particular individual or group of persons towards an individual or group of people. Discrimination is the act of developing unwarranted behavior while directing them towards an individual or group of persons. This research project determines the various causes of discrimination and prejudice in contemporary society. The idea is to determine the various ways in which discrimination and prejudice present itself in society together with its effects on society. Literature review Because of the existing differences among the societies in the world as well as the differences within the workplaces, many researchers have conducted extensive surveys to determine the sources of differences. As a result, comprehensive literature on discrimination and prejudice is born including the major causes of these kinds of discrimination and prejudice as well as the possible mitigation measures to avoid extremes of the prejudices and discrimination. According to the study by Snellman(2007), discrimination and prejudice emerge from different sources. Although the study determines that, there exists no precise cause of discrimination and prejudice, subconscious attitudes and perceptions influence people to develop feelings of discontentment concerning others while directing the feelings towards the target population. Discriminating individuals often use other people as scapegoats. The research shows that discrimination and prejudice exist in a very complex state demonstrating the diverse factors and behaviors causing different forms of discrimination including nepotism, racism, ethnicity, stereotyping and other forms of prejudice.  The conclusions from the research by Tileag? (2015) reveal that economic benefits and socialization are major predictors and causes of prejudice and discrimination. For example, the differences in income between individuals influence the formation of a particular social class. Notably, the rise in lifestyle somewhat makes people develop a certain attitude towards low-income earners or people without adequate money to spend. In this regard, the rise in lifestyle not only influence exclusion and seclusions but also makes people have some perceptions towards other individuals. Consequently, a particular group of people develops attitudes towards the other while discriminating each other. Whitley Jr. & Kite (2016) determines that ethnocentrism is a major cause of prejudice and discrimination throughout history. Ethnocentrism concerns the behavior of evaluating other people?s cultural practices basing on the assessor?s culture. For example, since the 15th century, racism has very apparent in the United States. Many people develop certain stereotypes for African Americans, Asian Americans and other immigrants majorly because of the differences in cultures. While some people concentrate on the color of the skin of a certain group of people, others consider the practices of people from where the target group comes from. For example, racists evaluate the conducts, practices, and behaviors of the Africans with the aim to establish the difference with their original culture. The latter develops a particular perception of the target group. The literature also reveals that group closures or the development of boundaries for a particular population increase discrimination. It is notable that likeminded people often form groups to drive some interests. As such, the members often define some boundaries that restrict others from joining the group. With these kinds of boundaries, some people develop some negative feelings and attitude towards the group. Similarly, people may form a group with the aim to block the association with others. This way, people continue to have negative perceptions and attitudes towards each other. The developed attitudes influence some conducts and behaviors. The respective parties direct the formed behaviors towards the target group bringing forth discrimination and other forms of prejudice (Dovidio, Hewstone, Glick& Esses, 2010). Another major source of discrimination and prejudice as depicted by Snellman (2007) is the social status. Sometimes, people develop a sense of self-satisfaction or lack thereof. When people determine their abilities to satisfy their needs, they mainly grow some attitudes towards others. While the sense of self-satisfaction may influence the need for power and authority, the feelings may lead to undermining other people’s abilities or lack of integration with certain individuals. As such, people continue to form some distances and stereotypes concerning other groups. Consequently, the people end up discriminating one another in various events and life situations. In workplaces, for example, discrimination and prejudice force the employer to turn down job application from specific communities, races or gender mainly because of the undue perceptions against the jobseekers.   According to the existing literature, people with authoritarian personalities largely have tendencies to influence discrimination and prejudice. Primarily, authoritarian personalities make people reject openly any person they feel are inferior (Whitley Jr. & Kite, 2016). Similarly, the authoritarian people submit without questions to the people they feel that they have some flourishing energies, drive or power. This kind of rejection of a particular group of persons is a form of prejudice and discrimination and that the rejected persons are likely to develop some attitudes or perceptions towards the authoritarian persons. The formed perceptions, feelings, thoughts, and attitudes lead to discrimination and prejudice. According to a recent survey by Whitley Jr. & Kite (2016), various theories provide solutions to discrimination and prejudice. The self-esteem theory determines that increased knowledge and self-esteem decreases the development of prejudice and discrimination. Whitley Jr. & Kite (2016) argue that education increases the level of understanding among people. Additionally, socialization requires a high level of self-esteem among people. In this regard, combining education and self-esteem, people will not only understand each other but also will improve their interpersonal and intergroup relations thus avoiding any possible conflicts that may trigger unwarranted feelings attitudes and perceptions about each other. The latter would avoid discrimination and prejudice.  The cooperation hypothesis determines that conflicting groups must learn to develop strategies and a shared objective while foregoing their interests for the benefit of the group (Tileag?, 2015). According to this theory, it is apparent that members of a group are likely to enhance their relationship by establishing a common goal, foregoing their interests and committing to the group’s effectiveness. The legal theory determines that creating and enforcing laws against unwanted behaviors can eliminate discrimination and prejudice in society. it is apparent that people have different interests and feelings towards different situations in life. However, every society needs to establish acceptable practices and the penalties for contradicting the set social standards.   Conclusion As determined above, prejudice and discrimination are a historical, social disorder that has a greater impact on the economic and other aspects of life. The literature reveals that subconscious attitudes and perceptions influence people to develop feelings of discontentment concerning others while directing the feelings towards the target population. Page Break References Dovidio, J. F., Hewstone, M., Glick, P., & Esses, V. M. (2010). Prejudice, stereotyping and discrimination: a theoretical and empirical overview. The SAGE handbook of prejudice, stereotyping and discrimination, 3-29. Retrieved from: Snellman, A., (2007). Social Hierarchies, Prejudice, and Discrimination. Retrieved from: Tileag?, C. (2015).?The nature of prejudice: Society, discrimination and moral exclusion. Routledge. Whitley Jr, B. E., & Kite, M. E. (2016).?Psychology of prejudice and discrimination. Routledge.

MGT 317 Rules of Experimentation Discussion

SOURCE: Interactive: Entrepreneurship: The Practice and Mindset Interactive eBookby: Heidi M. Neck; Christopher P. Neck; Emma L. MurrayChapter 7!!Case StudyMarissa Mayer, Yahoo Inc. CEOIn 2013, Fortune magazine listed Marissa Mayer in the #1 slot on their prestigious 40 Under 40 list, ahead of well-known Internet tycoons such as Mark Zuckerberg (Facebook), Ben Silberman (Pinterest), and Kevin Systrom (Instagram). In 2014, Fortune magazine listed Mayer as #14 on its Most Powerful Women in Business list, and #18 on its Most Influential Women in the World list. Yet, by 2015, her star quality seemed to be getting tarnished.Hailing from the farmland of central Wisconsin, Marissa Mayer had a typical small-town American upbringing. In high school, she was active in extracurricular activities, where she demonstrated leadership abilities as captain of her school?s successful debate team and pom-pom squad. She continued in her upward trajectory of success at Stanford University, where she initially studied to become a doctor but earned both a bachelor?s and master?s degree in computer science.Mayer?s successes coming out of college opened many doors of opportunity. Despite receiving 14 different job offers from a variety of prestigious organizations, Mayer chose to accept an offer with a computer startup company called Google, which at the time was still in its infancy. When Mayer joined Google in 1999, she was only the 20th person hired by the company, which had been incorporated just a year previously.An entrepreneur at heart, Mayer made contributions to Google in the early days of the company that were prominent, far-reaching, and in many ways foundational to the overarching success the company has enjoyed. She started out as a programmer writing code. Over time, however, she became increasingly involved in leadership roles that allowed her to experiment with policy strategies that proved highly successful. For example, her leadership and example led to clearer communication between executives and floor-level employees, and to the development of a mentoring program that has since been replicated at numerous other tech companies.During her decade-plus stint with Google, Mayer became known for ?her work ethic, eye for detail and vision? (Marissa Mayer Biography, 2016). Her perfectionism led her to experiment and research until she had found design, market, and policy solutions that met her unusually high standards. For example, Mayer once ?wanted to test out 41 shades of blue for the toolbar on Google pages to see which one appealed the most to the user.? While such fastidious decision-making processes have surely caused anxiety among some of her colleaguesover the years, they seem to have ultimately served her?and the companies she has worked for?very well.Like all entrepreneurs, Mayer has always kept her eyes open for new opportunities.In a 2008 interview . . . she seemed to [already] be looking ahead to her next act. ?I helped build Google,? Mayer said, ?but I don?t like to rest on [my] laurels. I think the most interesting thing is what happens next (Marissa Mayer Biography, 2016).What happened next caught the attention of Silicon Valley and the rest of Corporate America in unprecedented fashion. In July 2012, Yahoo Inc.?the search engine giant and competitor of Google?hired Mayer to be its new CEO. With the hire, Mayer became one of only 20 female CEOs in the Fortune 500. And at only 37 years of age, Mayer became the youngest of all Fortune 500 CEOs, male and female.Yahoo hired Mayer for her entrepreneurial vision hoping she could turn around a troubled company that was facing ?a lack of innovation? and ?a culture problem.? Innovation and culture building were two things Mayer had excelled in at Google, and she immediately went to work. Her immediate shake-up of Yahoo included a line of executive firings and several new hires to replace them.With her new leadership team in place, Mayer began leading Yahoo in a series of substantial investments and acquisitions. However, one decision made before she came on board was the sale of over $7 billion dollars of Yahoo stock to the Chinese e-commerce giant Alibaba in order to increase Yahoo?s cash reserves. With added capital for experimentation and expansion, Mayer spent her first year on the job overseeing the acquisition of over 20 smaller companies. The company?s highest profile, and most expensive, move was to acquire the hugely successful microblogging company Tumblr for a price of just over a billion dollars. Ever willing to demonstrate her entrepreneurial capacity for flexibility and experimentation, Mayer pioneered a new path for Yahoo with her nod to acquire Tumblr?a move that ?analysts hailed . . . as a shift in industrial strategy? (Riggins, 2014).After only 22 months at the helm, Mayer was able to announce an 84% profit rise from the previous year. Observers commented that Yahoo?s decision to place its future in the hands of a young and gifted math and science whiz from Upstate Wisconsin had been touched by King Midas. And Marissa Mayer, worth an estimated $300 million, was goldenly compensated for her leadership as well.Given such accolades, it was a shock to many when, in the summer of 2014, Mayer was forced to announce Yahoo?s lowest quarterly earnings in a decade. By the end of 2014, analysts were questioning not only Yahoo?s financial viability but also Mayer?s leadership.She may be a woman of power, but she?s been heavily criticised [sic] for her lack of support in helping other women break through the glass ceiling of her industry?s heavily male-dominated hierarchy. Meanwhile, her cold, calculated style has continued to chase some of Yahoo?s most talented engineers into the arms of rivals like Google and Facebook. (Riggins, 2014)No stranger to ambition and audacity, Mayer was known for following a personal working style that includes the following two principles: ?a) work with the smartest people she can find, and b) go for a challenge that makes her feel like she?s in over her head.? As impressive as it is for a woman under the age of 40 to have taken over one of the most prominent tech companies in the world, Mayer faced the risk of being blamed for Yahoo?s demise. Nevertheless, if the company were to be sold, she would take with her a severance package valued at over $150 million.Critical Thinking QuestionsMarissa Mayer?s early successes were rooted in her proficiency as a student in math and science. Why are subjects like math, statistics, logic, and critical thinking essential to product experimentation and market hypotheses?How might you apply the ?Rules of Experimentation? to discovering and developing your own entrepreneurship and leadership skills?Data generation is critical to market research and product experimentation. What ?Data? might you begin collecting to better prepare yourself for a career in entrepreneurship (journal writing, subscribing to a professional journal or blog, asking questions of entrepreneurial role models, seeking out a mentor, etc.)?Marissa Mayer?s executive opportunity at Yahoo came about because of her outstanding work at Google, and skilled marketing of her own career along the way. In what ways are you currently expanding or contracting future opportunities for yourself based on your present performance as a student, employee, entrepreneur, networker, friend, and human being. Secondly, how are you marketing your own career to achieve future success?

Responses week 1 | Computer Science homework help

Provide (4) 150 words substantive response with a minimum of 1 APA references for RESPONSES 1, 2, 3 and 4 below. Ensure you list and break down each response in a word document. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
ISSC 471
1. What is IT Security Auditing? What does it involve?
An IT security audit is a comprehensive examination and assessment of an information security system. By conducting regular audits, organizations can identify weak spots and vulnerabilities in their IT infrastructure, verify security controls, ensure regulatory compliance, and more. It involves running scans on IT resources like file-sharing services, database servers and SaaS applications to assess network security, data access levels, user access rights and other system configurations. It includes physically inspecting data centers for resilience to fires, floods, and power surges as part of a disaster recovery evaluation. Finally, it involves interviewing employees outside the IT team to assess their knowledge of security concerns and adherence to company security policy.
2. Why are Governance and Compliance Important?
To ensure that businesses protect their information, have consistent cohesion departmentally, and follow all governmental regulations, a governance, risk, and compliance program is important. This helps to minimize the threats and risks that companies are exposed to on a daily basis.
3. Explain in detail the roles and responsibilities in an organization associated with the following:
According to our lesson, the risk manager, auditor, and executive manager have the following responsibilities:

Risk Manager – responsible ÿÿÿÿÿfor identifying organizational risk.
Auditor – responsible for ÿÿÿÿÿconducting information assurance audit and applying frameworks to the ÿÿÿÿÿseven domains to align with compliance.
Executive Manager – responsible ÿÿÿÿÿfor aligning external or internal compliance with governance requirements.

4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.
It is my understanding that the C&A process is outdated, and we now use assessment and authorization (A&A) to follow terminology in the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF). In my job, we follow NIST guidelines, and all of our accreditation processes follow the RMF process. The C& process was initiation and planning, certi?cation, accreditation, and then continuous monitoring. Though I never worked with the C&A process, I have been working with RMF for about 2 years now, and it is very involved.
References:
Tierney, M. (2020, Aug 5) IT Security Audits: The Key to Success. Retrieved from: https://blog.netwrix.com/2020/04/09/it-security-audit/
Hall, K.T. (n.d.) Why a Governance, Risk, and Compliance Program is Important for Your Business. Retrieved from: https://www.scripted.com/writing-samples/why-a-governance-risk-and-compliance-program-is-important-for-your-business
Sengupta, S. (2018, Apr 13) Cyber Security ? Certification and Accreditation. Retrieved from: https://www.nxtkey.com/cyber-security-certification-and-accreditation
-JAMIE
RESPONSE 2:
1. What is IT Security Auditing? What does it involve?
According to the reading this week an IT Security Audit is an internal assessment of an organizations policies, controls, and activities. An audit ensures that an organization is in compliance with legal regulations and that their security controls are adequate. Audits can involve any number of aspects within a business? activities including finances, compliance, operations, investigations and information technology. An IT Security Audit also involves three goals, providing an objective and review of policies, providing reasonable assurance controls are in place, and recommendations for improvement.
ÿ2. Why are Governance and Compliance Important?
As businesses become ever more reliant on technology governance and compliance become a more integral part of business function. Governance of IT systems ensures proper use as well as compliance and risk management, all vital to the success in a business environment. Compliance is important and beneficial to all aspects of a business, it ensures the reliability as well as public trust of a business which is vital to the business? success.
ÿ3. Explain in details the roles and responsibilities in an organization associated with the following:
ÿÿÿRisk Manager- A risk manager is familiar with the risks and vulnerabilities that an organization faces, as well as creating and evaluating risk management procedures. They are also responsible for knowing auditing controls as well as reporting procedures (Patel, 2016)ÿÿÿÿAuditor- The roles and responsibilities of an auditor include assessing current security controls and risk management procedures, advise management on how to improve security controls, evaluate risks, and analyze internal operations (Kumar, 2017)ÿÿÿÿExecutive Manager- The Executive Manager is responsible for ensuring their department is aligned with company vision and goals. They help to create and implement policies and procedures, and they make business decisions, such as security policy changes, based on the information received from the risk manager and auditor (Woodman, 2018)
4. Define the Certification and Accreditation (C&A) Process and briefly discuss the phases of C&A.
The Certification and Accreditation process is a standardized process, activities, and management to validate, implement and ensure security. The phases of the C&A process include Phase I Initiation and Planning: Which defines the C&A effort, it documents the steps needed to achieve the desired accreditation. Phase II Certification: This phase verifies system compliance with the identified security standards. Phase III Accreditation: Here validation is made that the system is compliant and security accreditation is achieved. Phase IV Post Accreditation: This phase continuously monitors the system to ensure it remains compliant with accreditation standards (QTS, 2019).
Alysha Macleod
Kumar N. (2017) Roles and Responsibilities of an Internal Auditor. EnterSlice

Roles and Responsibilities of Internal Auditor


Patel N. (2016) A Risk Manager?s Role in Strategic Leadership. NIC State.
https://erm.ncsu.edu/library/article/risk-manager-strategic-leadership
QTS. (2019) The Four Phases of the Certification and Accreditation Process. QTS
https://www.qtsdatacenters.com/resources/articles/the-four-phases-of-the-certification-and-accreditation-process
Woodman C. (2018) Job Description of an Executive Manager. Career Trend
https://careertrend.com/about-6507018-executive-manager-job-description.html
ISSC 341
RESPONSE 3:
There are 7 layers to the Open Systems Interconnection (OSI) model, but I will be discussing layers one and two. The first layer, physical layer, is responsible for the physical cable or wireless connection between the network nodes. It defines the connector, the electrical cable or wireless technology connecting the devices, and is responsible for transmission of raw data (Os and 1s). The second layer, data link layer, establishes and terminates a connection between two physically connected nodes on a network. It is comprised of two parts, Logical Link Control (LLC) which identifies protocols and performs error checking/synchronizes frames. Media Access Control (MAC) uses MAC addresses to connect devices and define permissions to transmit and receive data.
ÿÿÿÿÿÿÿÿÿÿÿIPv6 is the latest version of internet protocol and was introduced in 1998 by the Internet Engineering Task Force (IETF) to solve address space exhaustion. IPv6 uses 128-bit addressing instead of IPv4 32-bit addressing scheme. What that means is IPv4 address method uses four sets of one-to-three-digit number (192.0.2.146), and IPv6 uses eight groups of four hexadecimal digits (2001:0db8:85a3:0000:0000:8a2e:0370:7334). While IPv6 may seem more secure and will eventually replace IPv4 one day, the adoption of it has been delayed because there?s a dual stack requirement. IPv6 is not backwards compatible with IPv4. There is a problem with the network address translation (NAT), which takes private IP address and turns them into public IP addresses.
ÿÿÿÿÿÿÿÿÿÿÿIPv4 allows for a variation of the network and host segments of an IP address, known as subnetting. It can be used to design a network physically and logically. Subnetwork addresses enhance local routing capabilities, while reducing number of address required. The subnet mask is used to show what part of the addresses is the network portion and what part is the host portion. In IPv4, there are 3 default subnet masks corresponding to three classes of IP address.
ÿÿÿÿÿÿÿÿÿÿÿHope everyone is having a great start to their week!
Regards,
Al
Works Cited:
McKeever, G., Sillam, Y., R.M., Hathaway, M., Houcheime, W., P.W., Kerman, D., Lynch, B., Hewitt, N., & Ray, T. (2020, June 10). What is OSI Model | 7 Layers Explained | Imperva. Learning Center. https://www.imperva.com/learn/application-security/osi-model/
Fruhlinger, K. S. A. J. (2020, August 26). What is IPv6, and why aren?t we there yet? Network World. https://www.networkworld.com/article/3254575/what-is-ipv6-and-why-aren-t-we-there-yet.html
Google IPv6 adoption Statistics. (2020). IPv6. https://nfware.com/blog-what-is-ipv6
IPv4 subnetting. (2021). IPv4 Subnetting. https://www.ibm.com/docs/en/zos/2.4.0?topic=internetworking-ipv4-subnetting
-ALI
RESPONSE 4:
1. For this discussion, compare and contrast two layers of the Open Systems Interconnection (OSI) Reference Model, including the protocols that run on each layer.ÿ
The Open Systems Interconnection (OSI) Reference Model consist of 7 layers and they are from top to bottom application, presentation, session, transport, network, data link and physical. The architecture of the OSI reference model is separated into 7 layers so it aids in development, design, and troubleshooting and provides changes in one layer without effecting the other therefor all layers are equally important. These 7 layers of OSI reference model are divided into 2 groups upper (top 3 layers) and lower layers (bottom 4 layers). The upper layers define communication between the applications of the end users and the lower layers define how the data is transmitted between the two applications. Common protocols used in the layers are TCP, IP/IPX and Ethernet for the lower group and for the upper group HTPP, SSL and RPC just to name a few.ÿ
2. What was the reason that IPv6 was introduced? Why do you think many organizations are not
upgrading their network solely to IPv6 and run that protocol instead of running IPv4?
IPv6 was introduced for its capacity over the IPv4, IPv4 is out of IP addresses and holds 4.3 billion addresses. With the growing devices like the smartphone, tablets, computer and other devices IPv4 was not able to support which gave birth to IPv6 which supports 128 bit addressing. Many organizations are not upgrading because IPv4 is enough for the company and because the internet at large doesn?t support IPv6 end to end there is a need to encapsulate IPv6 traffic into IPv4.
3. What is the purpose of subnetting when using IPv4 addressing? What role does subnet mask play in subnetting of IPv4?
Subnetting provides network security, better performance while providing clean separation for troubleshooting. Subnet mask plays important part of masking the IP address. Looking forward to reading other post and learning the role of IPv4 and 6 as my knowledge on the subject is limited. Have a good rest of the week.
References:
Imperva. (n.d.). What is OSI Model | 7 Layers Explained | Imperva? Learning Center. Retrieved from https://www.imperva.com/learn/application-security/osi-model/
PARR, B. (2011, February 03). IPv4 & IPv6: A Short Guide. Retrieved March 05, 2019, from Mashable:
https://mashable.com/2011/02/03/ipv4-ipv6-guide/#MFRFxeOnk
-TAVEN

tactical crime analysis matrix and data analysis

ÿ
You will create a Tactical Plan for reducing crime in a specific jurisdiction in the greater metro area of Madison, WI.
Multiple police departments on the outskirts of Madison, Wisconsin have noticed an increase in theft in the areas near their police stations. The Police chiefs for Madison, Shorewood Hills, and Maple Bluff would like you to conduct an analysis to see if this trend is also occurring in the vicinity of Lake Mendota and to create a plan to reduce crime near the police stations.
Locate the address of the main police station for the Madison, Shorewood Hills, and Maple Bluff police departments. For each of the three police stations, do the following:
Access the LexisNexis Community Crime Map. http://communitycrimemap.com/ÿ

Put the address of the police station into the ?address bar? under Search Address.
Check ?Buffer? on; check ?0.5 miles? under Buffer. Check ?Only display events within the buffer.?
Under the ?Event? tab, select ?Theft? only. If the type of Theft is not specified, infer the type of theft by following the steps below for more information:

ÿGo to Google Maps and put in the address of the crime, for ?x? put in ?0.?
When the address appears, click on ?Satellite map.?
Zoom in on the building to determine what type of building it is and what type of neighborhood it is.
This process will give you a clue as to the type of theft that occurred.

For ?Dates Range,? search the previous 6 months from today?s date.
Access the Tactical Crime Analysis Matrix. You will need to record in the matrix, up to 10 incidents for each police station; be sure to choose those incidents closet to the police station.
Use the results as the data for your Tactical Plan.

Complete the Tactical Crime Analysis Matrix using the data from the three police departments.
Complete the written prompt at the bottom of the Matrix document.
Be sure to cite three to five relevant scholarly sources in support of your content. Use only sources found at government websites, or those provided in Topic Materials.
ÿÿ
Utilize the Village of Shorewood Hills Police Department website as a resource for the Topic 7 assignments.
URL:http://villageofmaplebluff.com/village-departments/police-department/
Utilize the Village of Shorewood Hills Police Department website as a resource for the Topic 7 assignments.
URL:http://shorewoodhillswi.govoffice3.com/police
ÿUtilize the LexisNexis Community Crime Map as a resource for the Topic 7 assignments.
URL:http://communitycrimemap.com/
Utilize the City of Madison Police Department website as a resource for the Topic 7 assignments.
URL:https://www.cityofmadison.com/police/ÿ

UCB Science The Gasses Hydrogen and Helium Causes Questions

(1) Jupiter and Saturn vs. Uranus and Neptune We have compared the Terrestrial Planets and the Giant or Jovian Planets, but when we look at the 4 Giant Planets we can see that they can be paired into Jupiter and Saturn vs. Uranus and Neptune.(2 pts.) (1a) Explain 3 similarities shared by all 4 giant planets.(2 pts.) (1b) Explain 3 ways in which Uranus and Neptune differ from Jupiter and Saturn. (2) Jupiter’s Great Red Spot The GRS rotates completely in six days.(3 pts.) (2a) If the spot is circular (not quite true, but a reasonable approximation for this matter) and 16,300 km in diameter, what are the wind speeds at the outer edges of the storm? Give you answer in km/hr. (Hints: Speed = distanceötime. How far does does a cloud on the edge of the spot move in one rotation? )(1 pt.) (2b) How do these speeds compare with winds in terrestrial hurricanes where wind speeds can be 120 mph = 200 km/hr?(3) Convince me! (4 pts.) We know that Saturn has a density less than that of water – so the planet would float in a giant bath tub. If you tell your friends that a planet could float, they are likely to laugh at you. Describe HOW we know the density of Saturn is less than that of water by observing it from here on Earth – what quantities have been measured (units?)? Which formula (or formulae) is (are) used?(4) Layers upon layers. (3 pts.) Jupiter have several distinct layers of clouds. Why are these clouds separated into several distinct layers, so that clouds composed of a highly volatile gas such as ammonia found higher in the atmosphere than water? (5) Colors. (3 pts.) (5a) What gives Jupiter and Saturn their yellow/red colors?(1 pts.) (5b) Describe the physical process(es) that make Uranus and Neptune look bluish.(6) Receiving Signals from Jupiter.(3 pts.) The distance from the Earth to Jupiter varies as the two planets orbit the Sun. Suppose we measure the distance to Jupiter and find that it is at a distance of 4.6 AU from the Earth,. How much time will it take for radio signals from a probe orbiting Jupiter to travel through space to reach us? Give your answer in minutes.(7) Changes. (2 pts.) Why does Uranus’ atmosphere show strong variations over the course of its orbit, Neptune and Saturn have moderate changes while Jupiter’s atmosphere appears pretty much the same, year in and year out? Please discuss each of these four planets by name in your response.(8) The Solar System(6 pts.) (8 a) In another solar system, we discover two terrestrial planets both with atmospheres made of 99% carbon dioxide. However, one planet has ten times more atmosphere than the other. Propose three hypotheses to explain why they would differ so much in their quantities of atmosphere.(4 pts.) (8 b) Our solar system contains 4 terrestrial planets and 4 jovian planets. Suppose we discover another solar system with 8 terrestrial planets and no jovian planets. Propose a hypothesis to explain why the formation of that solar system would have turned out so differently from our own.(4 pts.) (8 c) Why would astronomers be surprised to discover an active volcano on an asteroid?

Statistics 332 spss week 5 assignment

1.ÿEnter the data named Chapter 11 Data Set 2 (pp. 372-373).
a.ÿIdentify and test the research hypothesis at the .05 level of significance that boys raise their hands in class more often than girls. Remember to first decide whether this is a one- or two-tailed test. What is your conclusion regarding the research hypothesis?ÿ Copy and paste the results in this document. b.ÿUsing the data set Chapter 11 Data Set 2, test the research hypothesis at the .01 level of significance that there is a difference between boys and girls in the number of times they raise their hands in class. What is your conclusion regarding the research hypothesis? Copy and paste the results below.
c.ÿYou used the same data for both parts a and b, but you have a different hypothesis (one is directional and the other is nondirectional). How do the results differ and why?
2.ÿEnter the data below, and then complete the tasks and/or answer the following questions.
In-Home TreatmentÿOut-of-Home Treatment3ÿ74ÿ61ÿ71ÿ81ÿ73ÿ63ÿ56ÿ65ÿ41ÿ24ÿ55ÿ44ÿ34ÿ63ÿ76ÿ57ÿ47ÿ37ÿ88ÿ7
a.ÿWrite a brief paragraph about whether the in-home counseling is equally effective as the out-of-home treatment for two separate groups. The outcome variable is level of anxiety after treatment on a scale from 1 to 10.ÿ Copy and paste your results below.
3.ÿUsing the data named Chapter 11 Data Set 4 (p. 374) test the null hypothesis that there is no difference in group means between the number of words spelled correctly for two groups of fourth graders?ÿ What is your conclusion?ÿÿ Copy and paste your results below.
Tests Between the Means of Related Groups
Review and follow the steps in pages 214-217 or your text.
4.ÿFor the data set Chapter 12 Data Set 2 (p. 375), compute the t value using SPSS and write a conclusion as to whether there was a change in tons of paper used as a function of the recycling program in 25 different districts. (Hint: before and after become the two levels of treatment). Test the hypothesis at the .01 level.ÿ Copy and paste the results below.5.ÿFor the dataset Chapter 12 Data Set 3 (p. 376), compute the t value and write a conclusion as to whether there is a difference in satisfaction level in a group of families? use of service centers following a social service intervention on a scale from 1 to 15. Report the exact probability of the outcome.ÿ Copy and paste the results below.
ÿ

Texas redistricting | Government homework help

ÿ
Redistricting in Texas has been an issue of significant controversy since 2000 ( and even before but not as dramatic and consequential).ÿ First read some of the issues involved in 2000 and then read the issues involved in 2010 redistricting controversies including court cases responding to all questions concerning both separate but in many ways very connectedÿ cases, incidents and processes.
Redistricting is a highly partisan activity mandated indirectly by the required reapportionment of the constitution every decade. The House of Representatives state member allocations is dependent on an accurate population count and subsequent redistricting. ?The primary reason for taking the census is to comply with the U.S. Constitutional mandate for data needed to reapportion the 435 seats in the U.S. House of Representatives. With the census data tapes in hand, states swiftly began to draw a seemingly infinite number of state legislative and congressional district plans to use in theÿ elections.
In 2001-2004 following the 2000 mandated censusÿ redistricting in Texas adopted and thenÿ re adopted redistricting plans in an unusual manner.ÿ Eventually, state legislators adopted plans that were carefully crafted to satisfy a wide range of criteria including compliance with one-person one-vote, the federal Voting Rights Act and traditional redistricting principles such as compact and contiguous districts. In addition, legislators meticulously designed plans to further political goals without violating federal and state statutes. A couple of states, New Jersey and Virginia, had to draw plans for 2001 elections and almost all states had plans in place for the 2002 elections with the exception of Maine and Montana where redistricting is done prior to the 2004 election.” (NCLR) However, Texas re drew its districts at least twice. The first redistricting effort was under the direction of the courts and the other instance and latest with a new republican majority in the legislature.
This action of redistricting has been litigated in the Supreme Court (as often Texas legislation and policies are?with many found unconstitutional). The Supreme Court has ruled that much if not most of what Texasÿ enacted ÿduring ÿthe 2000 decade was in fact constitutional but with one exception also a violation of minority voting rights.
The process with a little less drama repeated itself in 2010 but with different relevant Supreme Court rulings and a new interpretation of the voting rights act. 2010 again was the beginning of a decade in whichÿ Texas attempt to redistrict was again found incongruous with minority voting rights.
Discuss, after conducting your own research on the issues involved, that decision and the process in the U.S. Supreme Court. REMEMBER that the decisions and opinions of the Supreme Court change . Should the last ( following the 2010 census)ÿ redistricting of Texas congressional seats by the Texas legislature have been found in violation of the constitution and civil rights laws?
The most recentÿ 2010-2012 process did in fact result in the plan being rejected over and over and over again. Outline the current (2010-2012 rejection of Texas redistricting efforts) and determine the fatal flaws and underlying values which undermine that process.ÿ What could be done toÿ prevent this from occurring again?
The process is again heating with disputes still over data and boundaries and maps regarding current congressional ( and state legislative) districts. The basic argument again focuses on denial of minorities ( particularly in these cases Latino) voting rights.
see below:
https://www.texastribune.org/2017/08/18/brief-aug-18/
https://www.texastribune.org/2017/08/18/paxton-redistricting-filing/
You must show depth in your arguments and demonstrate your research so very long and many paragraphs with numerous academic citationsÿ are expected.
You do not have to discuss the concept/practice ofÿ redistricting or reapportionment but focus on the Texas process and the aftermaths of recent census on that process both in terms of legislative/political actions and court decisons.

× How can I help you?