EDU555 W1 D NO MORE THAN 400 WORDS Your Approach to Curriculum”

Question Description

EDU555 W1 DNO MORE THAN 400 WORDSYour Approach to Curriculum” Please respond to the following:Review the six approaches to curriculum (e.g., behavioral, systems,humanistic, etc.) and discuss the approach or approaches you (or yourinstitution) follow. Provide reasons and examples to support yourresponse. (If you are not in an educational environment, discuss how youwould prefer to approach curriculum.)Describe any roles you have had in curriculum design and / ordevelopment. (If you have not had experience in this area, discuss rolesyou would prefer to have in curriculum design and / or development.)

research method class – ​This week’s discussion is focused on your key learning points to date

Question Description

This week’s discussion is focused on your key learning points to date. I want you to take some time and really consider what you have learned thus far in this class. Additionally, I want you to elaborate on point(s) where you may still need clarification. Please think critically about this assignment and incorporate at least two references to substantiate your points. As always, your discussions should be well-thought out and well-written.

You can talk about how to write the literature review or talk about their contain in the picture.

The Establishment Clause in the 1st Amendment

Question Description

From your reading of the Bill of Rights in chapter four, you know that the Establishment Clause in the 1st Amendment creates a separation between church and state. However, as your text also explains, there are basically two different interpretations of the Establishment Clause in American politics: the Accommodationist view and the Separationist view. For this discussion topic, I would like you to elaborate on each view, discuss which view the U.S. Supreme Court has adopted, and give your opinion as to which view should take precedence and why.

Karthik disas — I need a discussion on the below topic

Question Description

Include at least 250 words in your posting and at least 250 words in your reply. Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Module 5 Discussion Question

Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?

APA format anf references are importnat

The external opportunities and threats your team identified and how the company responded to these factors from a total rewards perspective

Question Description

This is a team project and I have two questions.

1-The external opportunities and threats your team identified and how the company responded to these factors from a total rewards perspective

2-Recommendations regarding an expansion of the benefits programs offered at the company that would further align HR with the accomplishment of organizational goals and values.

I have included the instructions. The Professor did not state single or double spaced. I have to complete 3-4 power point slides per question. If you have any questions please ask.

Create a 10- to 15-slide Microsoft® PowerPoint® presentation, including speaker notes, detailing your proposal. Address recommendations for all aspects of the system, including: Community involvement Law enforcement Courts and sentencing Corrections

Question Description

You are a juvenile justice consultant creating a proposal that will be presented to the state legislature concerning the future of the juvenile justice system.

Create a 10- to 15-slide Microsoft® PowerPoint® presentation, including speaker notes, detailing your proposal. Address recommendations for all aspects of the system, including:

  • Community involvement
  • Law enforcement
  • Courts and sentencing
  • Corrections

Include a justification for the system based on history, trends, causation theories, and potential for reform.

Contact your instructor for approval if you wish to use a different presentation delivery method, such as Prezi.

Format your presentation consistent with APA guidelines.

Week 2 Laboratory Activity – Network Security

Question Description

Laboratory #2: Awareness of the Availability of Security Solutions to Secure Computer Networks

Goal: To make students aware of the availability of an array of solutions to secure computer networks

Nature: Exploratory

Duration: 1 Week

Deliverables: 5 double spaced page

Research and study the available software and hardware techniques to deter, if not eliminate, computer systems attacks. Write a comparative discussion paper on five (5) such techniques.

Pay attention to the following:

  • Encryption techniques (DNSSEC, IPSec, PGP, S/MIME)
  • Techniques for fault detection, isolation and repair
  • Intrusion Detection and Network Forensics
  • Firewalls (DMZ)
  • Secure network infrastructure services: DNS, NTP, SNMP

Essay writing

Question Description

Instructions: you need to use Perspectives on Early America: An Interactive Reader to answer these questions. Each answer should be 2-3 paragraphs and you need to use examples from the essays in your answer. You need to answer TWO of these questions.

  1. Gonda- Colonial Women. Describe the situation of colonial women in North America and use examples from the essay to illustrate your answer.

  1. McMichael- Abigail Adams. Write a biography of Abigail Adams from the information in this essay with examples from her life and times.

Can you write a Microsoft Word document ​​

Question Description

  • 3.1 List three approaches to message authentication.
  • 3.2 What is a message authentication code?
  • 3.4 What properties must a hash function have to be useful for message authentication?
  • 3.5 In the context of a hash function, what is a compression function?
  • 3.6 What are the principal ingredients of a public-key cryptosystem?
  • 3.7 List and briefly define three uses of a public-key cryptosystem.
  • 3.8 What is the difference between a private key and a secret key?
  • 3.9 What is a digital signature?

Can you write a Microsoft Word document

Vinay disas — I need a discussion on the below topic

Question Description

Include at least 250 words in your posting and at least 250 words in your reply. Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.

Module 5 Discussion Question

Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?

APA format and references are important