Project global diversity training memo

Imagine that you have been employed as a Human Resource Leadership practitioner for the South Asian Google headquarters in Singapore for the last six months. You check your corporate website (http://www.google.com/diversity/workforce.html) and realize that per corporate policies you should develop a training program to address diversity in your regional workforce.
Write a memo to your corporate Human Resource Vice President and Google President:

Explain the required need for developing a diversity training program.
What should the training include?
How should it be designed to address the needs of your regional operation?

Project Overview
Your project is to write a series of memos as a Human Resource Leadership practitioner (HRL) to various stakeholders. Practicing Human Resource Leadership requires particular competencies in communicating ideas clearly, cordially, effectively, and as a consultant/motivator. You will have an opportunity to apply each required HRL communication competency in four different memos.
Due Date
Your final memo is due in Module 05. There will be individual assignments along the way. The modules in which they are due are noted in the time line below.

Module

Assignment

01

Project IntroductionResources for Effective Memo Writing

02

Global Diversity Training Memo

03

Motivational Training Memo

04

Developmental Program Memo

05

Change Memo

 
Requirements
Your memos should be 1-2 pages in length, plus a cover page and a References Page at the end listing your research citations. Please use this template to construct each memo.
Each memo should include:

To: (Intended audience)
Subject: (What the topic is)
Date:
Memo (Write concisely, keeping the intended audience in mind)

As you write each memo for the project, keep the following in mind:

Use clear, concise, complete sentences, transitions between paragraphs, standard spelling, grammar, and punctuation.
Include at least three APA citations from different Online Library data sources.

Secure cyber communications | Computer Science homework help

II 111TH CONGRESS 1ST SESSION S. 773 To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cyber security defenses against disruption, and for other purposes. IN THE SENATE OF THE UNITED STATES APRIL 1, 2009 Mr. ROCKEFELLER (for himself, Ms. SNOWE, and Mr. NELSON of Florida) introduced the following bill; which was read twice and referred to the Committee on Commerce, Science, and Transportation A BILL To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cybersecurity defenses against disruption, and for other purposes. 1 Be it enacted by the Senate and House of Representa- 2 tives of the United States of America in Congress assembled, VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00001 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 2 •S 773 IS 1 SECTION 1. SHORT TITLE; TABLE OF CONTENTS. 2 (a) SHORT TITLE.—This Act may be cited as the 3 ‘‘Cybersecurity Act of 2009’’. 4 (b) TABLE OF CONTENTS.—The table of contents for 5 this Act is as follows: Sec. 1. Short title; table of contents. Sec. 2. Findings. Sec. 3. Cybersecurity Advisory Panel. Sec. 4. Real-time cybersecurity dashboard. Sec. 5. State and regional cybersecurity enhancement program. Sec. 6. NIST standards development and compliance. Sec. 7. Licensing and certification of cybersecurity professionals. Sec. 8. Review of NTIA domain name contracts. Sec. 9. Secure domain name addressing system. Sec. 10. Promoting cybersecurity awareness. Sec. 11. Federal cybersecurity research and development. Sec. 12. Federal Cyber Scholarship-for-Service program. Sec. 13. Cybersecurity competition and challenge. Sec. 14. Public–private clearinghouse. Sec. 15. Cybersecurity risk management report. Sec. 16. Legal framework review and report. Sec. 17. Authentication and civil liberties report. Sec. 18. Cybersecurity responsibilities and authorities. Sec. 19. Quadrennial cyber review. Sec. 20. Joint intelligence threat assessment. Sec. 21. International norms and cybersecurity deterrence measures. Sec. 22. Federal Secure Products and Services Acquisitions Board. Sec. 23. Definitions. 6 SEC. 2. FINDINGS. 7 The Congress finds the following: 8 (1) America’s failure to protect cyberspace is 9 one of the most urgent national security problems 10 facing the country. 11 (2) Since intellectual property is now often 12 stored in digital form, industrial espionage that ex- 13 ploits weak cybersecurity dilutes our investment in 14 innovation while subsidizing the research and devel- 15 opment efforts of foreign competitors. In the new VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00002 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 3 •S 773 IS 1 global competition, where economic strength and 2 technological leadership are vital components of na- 3 tional power, failing to secure cyberspace puts us at 4 a disadvantage. 5 (3) According to the 2009 Annual Threat As- 6 sessment, ‘‘a successful cyber attack against a major 7 financial service provider could severely impact the 8 national economy, while cyber attacks against phys- 9 ical infrastructure computer systems such as those 10 that control power grids or oil refineries have the po- 11 tential to disrupt services for hours or weeks’’ and 12 that ‘‘Nation states and criminals target our govern- 13 ment and private sector information networks to 14 gain competitive advantage in the commercial sec- 15 tor.’’. 16 (4) The Director of National Intelligence testi- 17 fied before the Congress on February 19, 2009, that 18 ‘‘a growing array of state and non-state adversaries 19 are increasingly targeting-for exploitation and poten- 20 tially disruption or destruction-our information in- 21 frastructure, including the Internet, telecommuni- 22 cations networks, computer systems, and embedded 23 processors and controllers in critical industries’’ and 24 these trends are likely to continue. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00003 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 4 •S 773 IS 1 (5) John Brennan, the Assistant to the Presi- 2 dent for Homeland Security and Counterterrorism 3 wrote on March 2, 2009, that ‘‘our nation’s security 4 and economic prosperity depend on the security, sta- 5 bility, and integrity of communications and informa- 6 tion infrastructure that are largely privately-owned 7 and globally-operated.’’. 8 (6) Paul Kurtz, a Partner and chief operating 9 officer of Good Harbor Consulting as well as a sen- 10 ior advisor to the Obama Transition Team for cyber- 11 security, recently stated that the United States is 12 unprepared to respond to a ‘‘cyber-Katrina’’ and 13 that ‘‘a massive cyber disruption could have a cas- 14 cading, long-term impact without adequate co-ordi- 15 nation between government and the private sector.’’. 16 (7) The Cyber Strategic Inquiry 2008, spon- 17 sored by Business Executives for National Security 18 and executed by Booz Allen Hamilton, recommended 19 to ‘‘establish a single voice for cybersecurity within 20 government’’ concluding that the ‘‘unique nature of 21 cybersecurity requires a new leadership paradigm.’’. 22 (8) Alan Paller, the Director of Research at the 23 SANS Institute, testified before the Congress that 24 ‘‘the fight against cybercrime resembles an arms 25 race where each time the defenders build a new wall, VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00004 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 5 •S 773 IS 1 the attackers create new tools to scale the wall. 2 What is particularly important in this analogy is 3 that, unlike conventional warfare where deployment 4 takes time and money and is quite visible, in the 5 cyber world, when the attackers find a new weapon, 6 they can attack millions of computers, and success- 7 fully infect hundreds of thousands, in a few hours or 8 days, and remain completely hidden.’’. 9 (9) According to the February 2003 National 10 Strategy to Secure Cyberspace, ‘‘our nation’s critical 11 infrastructures are composed of public and private 12 institutions in the sectors of agriculture, food, water, 13 public health, emergency services, government, de- 14 fense industrial base, information and telecommuni- 15 cations, energy, transportation, banking finance, 16 chemicals and hazardous materials, and postal and 17 shipping. Cyberspace is their nervous system—the 18 control system of our country’’ and that ‘‘the corner- 19 stone of America’s cyberspace security strategy is 20 and will remain a public-private partnership.’’. 21 (10) According to the National Journal, Mike 22 McConnell, the former Director of National Intel- 23 ligence, told President Bush in May 2007 that if the 24 9/11 attackers had chosen computers instead of air- 25 planes as their weapons and had waged a massive VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00005 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 6 •S 773 IS 1 assault on a U.S. bank, the economic consequences 2 would have been ‘‘an order of magnitude greater’’ 3 than those cased by the physical attack on the 4 World Trade Center. Mike McConnell has subse- 5 quently referred to cybersecurity as the ‘‘soft under- 6 belly of this country.’’. 7 (11) The Center for Strategic and International 8 Studies report on Cybersecurity for the 44th Presi- 9 dency concluded that (A) cybersecurity is now a 10 major national security problem for the United 11 States, (B) decisions and actions must respect pri- 12 vacy and civil liberties, and (C) only a comprehen- 13 sive national security strategy that embraces both 14 the domestic and international aspects of cybersecu- 15 rity will make us more secure. The report continued 16 stating that the United States faces ‘‘a long-term 17 challenge in cyberspace from foreign intelligence 18 agencies and militaries, criminals, and others, and 19 that losing this struggle will wreak serious damage 20 on the economic health and national security of the 21 United States.’’. 22 (12) James Lewis, Director and Senior Fellow, 23 Technology and Public Policy Program, Center for 24 Strategic and International Studies, testified on be- 25 half of the Center for Strategic and International VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00006 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 7 •S 773 IS 1 Studies that ‘‘the United States is not organized and 2 lacks a coherent national strategy for addressing’’ 3 cybersecurity. 4 (13) President Obama said in a speech at Pur- 5 due University on July 16, 2008, that ‘‘every Amer- 6 ican depends—directly or indirectly—on our system 7 of information networks. They are increasingly the 8 backbone of our economy and our infrastructure; our 9 national security and our personal well-being. But 10 it’s no secret that terrorists could use our computer 11 networks to deal us a crippling blow. We know that 12 cyber-espionage and common crime is already on the 13 rise. And yet while countries like China have been 14 quick to recognize this change, for the last eight 15 years we have been dragging our feet.’’ Moreover, 16 President Obama stated that ‘‘we need to build the 17 capacity to identify, isolate, and respond to any 18 cyber-attack.’’. 19 (14) The President’s Information Technology 20 Advisory Committee reported in 2005 that software 21 is a major vulnerability and that ‘‘software develop- 22 ment methods that have been the norm fail to pro- 23 vide the high-quality, reliable, and secure software 24 that the IT infrastructure requires. . . . Today, as 25 with cancer, vulnerable software can be invaded and VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00007 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 8 •S 773 IS 1 modified to cause damage to previously healthy soft- 2 ware, and infected software can replicate itself and 3 be carried across networks to cause damage in other 4 systems.’’. 5 SEC. 3. CYBERSECURITY ADVISORY PANEL. 6 (a) IN GENERAL.—The President shall establish or 7 designate a Cybersecurity Advisory Panel. 8 (b) QUALIFICATIONS.—The President— 9 (1) shall appoint as members of the panel rep- 10 resentatives of industry, academic, non-profit organi- 11 zations, interest groups and advocacy organizations, 12 and State and local governments who are qualified 13 to provide advice and information on cybersecurity 14 research, development, demonstrations, education, 15 technology transfer, commercial application, or soci- 16 etal and civil liberty concerns; and 17 (2) may seek and give consideration to rec- 18 ommendations from the Congress, industry, the cy- 19 bersecurity community, the defense community, 20 State and local governments, and other appropriate 21 organizations. 22 (c) DUTIES.—The panel shall advise the President on 23 matters relating to the national cybersecurity program 24 and strategy and shall assess— VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00008 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 9 •S 773 IS 1 (1) trends and developments in cybersecurity 2 science research and development; 3 (2) progress made in implementing the strat- 4 egy; 5 (3) the need to revise the strategy; 6 (4) the balance among the components of the 7 national strategy, including funding for program 8 components; 9 (5) whether the strategy, priorities, and goals 10 are helping to maintain United States leadership 11 and defense in cybersecurity; 12 (6) the management, coordination, implementa- 13 tion, and activities of the strategy; and 14 (7) whether societal and civil liberty concerns 15 are adequately addressed. 16 (d) REPORTS.—The panel shall report, not less fre- 17 quently than once every 2 years, to the President on its 18 assessments under subsection (c) and its recommendations 19 for ways to improve the strategy. 20 (e) TRAVEL EXPENSES OF NON-FEDERAL MEM- 21 BERS.—Non-Federal members of the panel, while attend- 22 ing meetings of the panel or while otherwise serving at 23 the request of the head of the panel while away from their 24 homes or regular places of business, may be allowed travel 25 expenses, including per diem in lieu of subsistence, as auVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00009 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 10 •S 773 IS 1 thorized by section 5703 of title 5, United States Code, 2 for individuals in the government serving without pay. 3 Nothing in this subsection shall be construed to prohibit 4 members of the panel who are officers or employees of the 5 United States from being allowed travel expenses, includ- 6 ing per diem in lieu of subsistence, in accordance with law. 7 (f) EXEMPTION FROM FACA SUNSET.—Section 14 8 of the Federal Advisory Committee Act (5 U.S.C. App.) 9 shall not apply to the Advisory Panel. 10 SEC. 4. REAL-TIME CYBERSECURITY DASHBOARD. 11 The Secretary of Commerce shall— 12 (1) in consultation with the Office of Manage- 13 ment and Budget, develop a plan within 90 days 14 after the date of enactment of this Act to implement 15 a system to provide dynamic, comprehensive, real- 16 time cybersecurity status and vulnerability informa- 17 tion of all Federal Government information systems 18 and networks managed by the Department of Com- 19 merce; and 20 (2) implement the plan within 1 year after the 21 date of enactment of this Act. 22 SEC. 5. STATE AND REGIONAL CYBERSECURITY ENHANCE- 23 MENT PROGRAM. 24 (a) CREATION AND SUPPORT OF CYBERSECURITY 25 CENTERS.—The Secretary of Commerce shall provide asVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00010 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 11 •S 773 IS 1 sistance for the creation and support of Regional Cyberse- 2 curity Centers for the promotion and implementation of 3 cybersecurity standards. Each Center shall be affiliated 4 with a United States-based nonprofit institution or organi- 5 zation, or consortium thereof, that applies for and is 6 awarded financial assistance under this section. 7 (b) PURPOSE.—The purpose of the Centers is to en- 8 hance the cybersecurity of small and medium sized busi- 9 nesses in United States through— 10 (1) the transfer of cybersecurity standards, 11 processes, technology, and techniques developed at 12 the National Institute of Standards and Technology 13 to Centers and, through them, to small- and me- 14 dium-sized companies throughout the United States; 15 (2) the participation of individuals from indus- 16 try, universities, State governments, other Federal 17 agencies, and, when appropriate, the Institute in co- 18 operative technology transfer activities; 19 (3) efforts to make new cybersecurity tech- 20 nology, standards, and processes usable by United 21 States-based small- and medium-sized companies; 22 (4) the active dissemination of scientific, engi- 23 neering, technical, and management information 24 about cybersecurity to industrial firms, including 25 small- and medium-sized companies; and VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00011 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 12 •S 773 IS 1 (5) the utilization, when appropriate, of the ex- 2 pertise and capability that exists in Federal labora- 3 tories other than the Institute. 4 (c) ACTIVITIES.—The Centers shall— 5 (1) disseminate cybersecurity technologies, 6 standard, and processes based on research by the In- 7 stitute for the purpose of demonstrations and tech- 8 nology transfer; 9 (2) actively transfer and disseminate cybersecu- 10 rity strategies, best practices, standards, and tech- 11 nologies to protect against and mitigate the risk of 12 cyber attacks to a wide range of companies and en- 13 terprises, particularly small- and medium-sized busi- 14 nesses; and 15 (3) make loans, on a selective, short-term basis, 16 of items of advanced cybersecurity countermeasures 17 to small businesses with less than 100 employees. 18 (c) DURATION AND AMOUNT OF SUPPORT; PROGRAM 19 DESCRIPTIONS; APPLICATIONS; MERIT REVIEW; EVALUA- 20 TIONS OF ASSISTANCE.— 21 (1) FINANCIAL SUPPORT.—The Secretary may 22 provide financial support, not to exceed 50 percent 23 of its annual operating and maintenance costs, to 24 any Center for a period not to exceed 6 years (ex- 25 cept as provided in paragraph (5)(D)). VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00012 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 13 •S 773 IS 1 (2) PROGRAM DESCRIPTION.—Within 90 days 2 after the date of enactment of this Act, the Sec- 3 retary shall publish in the Federal Register a draft 4 description of a program for establishing Centers 5 and, after a 30-day comment period, shall publish a 6 final description of the program. The description 7 shall include— 8 (A) a description of the program; 9 (B) procedures to be followed by appli- 10 cants; 11 (C) criteria for determining qualified appli- 12 cants; 13 (D) criteria, including those described in 14 paragraph (4), for choosing recipients of finan- 15 cial assistance under this section from among 16 the qualified applicants; and 17 (E) maximum support levels expected to be 18 available to Centers under the program in the 19 fourth through sixth years of assistance under 20 this section. 21 (3) APPLICATIONS; SUPPORT COMMITMENT.— 22 Any nonprofit institution, or consortia of nonprofit 23 institutions, may submit to the Secretary an applica- 24 tion for financial support under this section, in ac- 25 cordance with the procedures established by the SecVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00013 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 14 •S 773 IS 1 retary. In order to receive assistance under this sec- 2 tion, an applicant shall provide adequate assurances 3 that it will contribute 50 percent or more of the pro- 4 posed Center’s annual operating and maintenance 5 costs for the first 3 years and an increasing share 6 for each of the next 3 years. 7 (4) AWARD CRITERIA.—Awards shall be made 8 on a competitive, merit-based review. In making a 9 decision whether to approve an application and pro- 10 vide financial support under this section, the Sec- 11 retary shall consider, at a minimum— 12 (A) the merits of the application, particu- 13 larly those portions of the application regarding 14 technology transfer, training and education, and 15 adaptation of cybersecurity technologies to the 16 needs of particular industrial sectors; 17 (B) the quality of service to be provided; 18 (C) geographical diversity and extent of 19 service area; and 20 (D) the percentage of funding and amount 21 of in-kind commitment from other sources. 22 (5) THIRD YEAR EVALUATION.— 23 (A) IN GENERAL.—Each Center which re- 24 ceives financial assistance under this section 25 shall be evaluated during its third year of operVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00014 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 15 •S 773 IS 1 ation by an evaluation panel appointed by the 2 Secretary. 3 (B) EVALUATION PANEL.—Each evalua- 4 tion panel shall be composed of private experts, 5 none of whom shall be connected with the in- 6 volved Center, and Federal officials. An official 7 of the Institute shall chair the panel. Each eval- 8 uation panel shall measure the Center’s per- 9 formance against the objectives specified in this 10 section. 11 (C) POSITIVE EVALUATION REQUIRED FOR 12 CONTINUED FUNDING.—The Secretary may not 13 provide funding for the fourth through the sixth 14 years of a Center’s operation unless the evalua- 15 tion by the evaluation panel is positive. If the 16 evaluation is positive, the Secretary may pro- 17 vide continued funding through the sixth year 18 at declining levels. 19 (D) FUNDING AFTER SIXTH YEAR.—After 20 the sixth year, the Secretary may provide addi- 21 tional financial support to a Center if it has re- 22 ceived a positive evaluation through an inde- 23 pendent review, under procedures established by 24 the Institute. An additional independent review 25 shall be required at least every 2 years after the VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00015 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 16 •S 773 IS 1 sixth year of operation. Funding received for a 2 fiscal year under this section after the sixth 3 year of operation may not exceed one third of 4 the annual operating and maintenance costs of 5 the Center. 6 (6) PATENT RIGHTS TO INVENTIONS.—The pro- 7 visions of chapter 18 of title 35, United States Code, 8 shall (to the extent not inconsistent with this sec- 9 tion) apply to the promotion of technology from re- 10 search by Centers under this section except for con- 11 tracts for such specific technology extension or 12 transfer services as may be specified by statute or 13 by the President, or the President’s designee. 14 (d) ACCEPTANCE OF FUNDS FROM OTHER FEDERAL 15 DEPARTMENTS AND AGENCIES.—In addition to such 16 sums as may be authorized and appropriated to the Sec- 17 retary and President, or the President’s designee, to oper- 18 ate the Centers program, the Secretary and the President, 19 or the President’s designee, also may accept funds from 20 other Federal departments and agencies for the purpose 21 of providing Federal funds to support Centers. Any Center 22 which is supported with funds which originally came from 23 other Federal departments and agencies shall be selected 24 and operated according to the provisions of this section. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00016 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 17 •S 773 IS 1 SEC. 6. NIST STANDARDS DEVELOPMENT AND COMPLI- 2 ANCE. 3 (a) IN GENERAL.—Within 1 year after the date of 4 enactment of this Act, the National Institute of Standards 5 and Technology shall establish measurable and auditable 6 cybersecurity standards for all Federal Government, gov- 7 ernment contractor, or grantee critical infrastructure in- 8 formation systems and networks in the following areas: 9 (1) CYBERSECURITY METRICS RESEARCH.—The 10 Director of the National Institute of Standards and 11 Technology shall establish a research program to de- 12 velop cybersecurity metrics and benchmarks that can 13 assess the economic impact of cybersecurity. These 14 metrics should measure risk reduction and the cost 15 of defense. The research shall include the develop- 16 ment automated tools to assess vulnerability and 17 compliance. 18 (2) SECURITY CONTROLS.—The Institute shall 19 establish standards for continuously measuring the 20 effectiveness of a prioritized set of security controls 21 that are known to block or mitigate known attacks. 22 (3) SOFTWARE SECURITY.—The Institute shall 23 establish standards for measuring the software secu- 24 rity using a prioritized list of software weaknesses 25 known to lead to exploited and exploitable 26 vulnerabilities. The Institute will also establish a VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00017 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 18 •S 773 IS 1 separate set of such standards for measuring secu- 2 rity in embedded software such as that found in in- 3 dustrial control systems. 4 (4) SOFTWARE CONFIGURATION SPECIFICATION 5 LANGUAGE.—The Institute shall, establish standard 6 computer-readable language for completely speci- 7 fying the configuration of software on computer sys- 8 tems widely used in the Federal Government, by 9 government contractors and grantees, and in private 10 sector owned critical infrastructure information sys- 11 tems and networks. 12 (5) STANDARD SOFTWARE CONFIGURATION.— 13 The Institute shall establish standard configurations 14 consisting of security settings for operating system 15 software and software utilities widely used in the 16 Federal Government, by government contractors and 17 grantees, and in private sector owned critical infra- 18 structure information systems and networks. 19 (6) VULNERABILITY SPECIFICATION LAN- 20 GUAGE.—The Institute shall establish standard com- 21 puter-readable language for specifying vulnerabilities 22 in software to enable software vendors to commu- 23 nicate vulnerability data to software users in real 24 time. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00018 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 19 •S 773 IS 1 (7) NATIONAL COMPLIANCE STANDARDS FOR 2 ALL SOFTWARE.— 3 (A) PROTOCOL.—The Institute shall estab- 4 lish a standard testing and accreditation pro- 5 tocol for software built by or for the Federal 6 Government, its contractors, and grantees, and 7 private sector owned critical infrastructure in- 8 formation systems and networks. to ensure that 9 it— 10 (i) meets the software security stand- 11 ards of paragraph (2); and 12 (ii) does not require or cause any 13 changes to be made in the standard con- 14 figurations described in paragraph (4). 15 (B) COMPLIANCE.—The Institute shall de- 16 velop a process or procedure to verify that— 17 (i) software development organizations 18 comply with the protocol established under 19 subparagraph (A) during the software de- 20 velopment process; and 21 (ii) testing results showing evidence of 22 adequate testing and defect reduction are 23 provided to the Federal Government prior 24 to deployment of software. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00019 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 20 •S 773 IS 1 (b) CRITERIA FOR STANDARDS.—Notwithstanding 2 any other provision of law (including any Executive 3 Order), rule, regulation, or guideline, in establishing 4 standards under this section, the Institute shall disregard 5 the designation of an information system or network as 6 a national security system or on the basis of presence of 7 classified or confidential information, and shall establish 8 standards based on risk profiles. 9 (c) INTERNATIONAL STANDARDS.—The Director, 10 through the Institute and in coordination with appropriate 11 Federal agencies, shall be responsible for United States 12 representation in all international standards development 13 related to cybersecurity, and shall develop and implement 14 a strategy to optimize the United States position with re- 15 spect to international cybersecurity standards. 16 (d) COMPLIANCE ENFORCEMENT.—The Director 17 shall— 18 (1) enforce compliance with the standards de- 19 veloped by the Institute under this section by soft- 20 ware manufacturers, distributors, and vendors; and 21 (2) shall require each Federal agency, and each 22 operator of an information system or network des- 23 ignated by the President as a critical infrastructure 24 information system or network, periodically to demVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00020 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 21 •S 773 IS 1 onstrate compliance with the standards established 2 under this section. 3 (e) FCC NATIONAL BROADBAND PLAN.—In devel- 4 oping the national broadband plan pursuant to section 5 6001(k) of the American Recovery and Reinvestment Act 6 of 2009, the Federal Communications Commission shall 7 report on the most effective and efficient means to ensure 8 the cybersecurity of commercial broadband networks, in- 9 cluding consideration of consumer education and outreach 10 programs. 11 SEC. 7. LICENSING AND CERTIFICATION OF CYBERSECU- 12 RITY PROFESSIONALS. 13 (a) IN GENERAL.—Within 1 year after the date of 14 enactment of this Act, the Secretary of Commerce shall 15 develop or coordinate and integrate a national licensing, 16 certification, and periodic recertification program for cy- 17 bersecurity professionals. 18 (b) MANDATORY LICENSING.—Beginning 3 years 19 after the date of enactment of this Act, it shall be unlawful 20 for any individual to engage in business in the United 21 States, or to be employed in the United States, as a pro- 22 vider of cybersecurity services to any Federal agency or 23 an information system or network designated by the Presi- 24 dent, or the President’s designee, as a critical infrastrucVerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00021 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 22 •S 773 IS 1 ture information system or network, who is not licensed 2 and certified under the program. 3 SEC. 8. REVIEW OF NTIA DOMAIN NAME CONTRACTS. 4 (a) IN GENERAL.—No action by the Assistant Sec- 5 retary of Commerce for Communications and Information 6 after the date of enactment of this Act with respect to 7 the renewal or modification of a contract related to the 8 operation of the Internet Assigned Numbers Authority, 9 shall be final until the Advisory Panel— 10 (1) has reviewed the action; 11 (2) considered the commercial and national se- 12 curity implications of the action; and 13 (3) approved the action. 14 (b) APPROVAL PROCEDURE.—If the Advisory Panel 15 does not approve such an action, it shall immediately no- 16 tify the Assistant Secretary in writing of the disapproval 17 and the reasons therefor. The Advisory Panel may provide 18 recommendations to the Assistant Secretary in the notice 19 for any modifications the it deems necessary to secure ap- 20 proval of the action. 21 SEC. 9. SECURE DOMAIN NAME ADDRESSING SYSTEM. 22 (a) IN GENERAL.—Within 3 years after the date of 23 enactment of this Act, the Assistant Secretary of Com- 24 merce for Communications and Information shall develop 25 a strategy to implement a secure domain name addressing VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00022 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 23 •S 773 IS 1 system. The Assistant Secretary shall publish notice of the 2 system requirements in the Federal Register together with 3 an implementation schedule for Federal agencies and in- 4 formation systems or networks designated by the Presi- 5 dent, or the President’s designee, as critical infrastructure 6 information systems or networks. 7 (b) COMPLIANCE REQUIRED.—The President shall 8 ensure that each Federal agency and each such system 9 or network implements the secure domain name address- 10 ing system in accordance with the schedule published by 11 the Assistant Secretary. 12 SEC. 10. PROMOTING CYBERSECURITY AWARENESS. 13 The Secretary of Commerce shall develop and imple- 14 ment a national cybersecurity awareness campaign that— 15 (1) is designed to heighten public awareness of 16 cybersecurity issues and concerns; 17 (2) communicates the Federal Government’s 18 role in securing the Internet and protecting privacy 19 and civil liberties with respect to Internet-related ac- 20 tivities; and 21 (3) utilizes public and private sector means of 22 providing information to the public, including public 23 service announcements. VerDate Nov 24 2008 03:46 Apr 03, 2009 Jkt 079200 PO 00000 Frm 00023 Fmt 6652 Sfmt 6201 E:BILLSS773.IS S773 smartinez on PROD1PC64 with BILLS 24 •S 773 IS 1 SEC. 11. FEDERAL CYBERSECURITY RESEARCH AND DE- 2 VELOPMENT. 3 (a) FUNDAMENTAL CYBERSECURITY RESEARCH.— 4 The Director of the National Science Foundation shall 5 give priority to computer and information science and en- 6 gineering research to ensure substantial support is pro- 7 vided to meet the following challenges in cybersecurity: 8 (1) How to design and build complex software- 9 intensive systems that are secure and reliable when 10 first deployed. 11 (2) How to test and verify that software, 12 whether developed locally or obtained from a third 13 party, is free of significant known security flaws. 14 (3) How to test and verify that software ob- 15 tained from a third party correctly implements stat- 16 ed functionality, and only that functionality. 17 (4) How to guarantee the privacy of a

Various internet technologies | Computer Science homework help

Question 1: The address depletion of IPv4 and other shortcomings of this protocol prompted a new version of IP known as IPv6. Explain the advantages of this new IPv6 when compared to IPv4?
Question 2: Migrating from IPv4 to IPv6 is known as transition from version 4 to version 6 and requires formal strategies to handle this transition. Explain each of the strategies for this migration process using appropriate examples.Question 3: In a peer-to-peer (P2P) network, Internet users that are ready to share their resources become peers and form a network. Describe the differences between centralised and decentralised P2P networks? Discuss the advantages and disadvantages of both networks.Question 4:What is a Distributed Hash Table (DHT) and how is it used in P2P networks? Briefly explain how a DHT works with an example of a P2P network. Question 5: In the client-server paradigm, explain which entity provides the service and which entity receives the service. Why should a server be run all the time, but a client can be run when it is needed? Question 6: When an HTTP server receives a request message from an HTTP client, how does the server know when all headers have arrived and the body of the message is to follow?
Rationale
This assessment consists of six questions assessing a basic understanding of network data communication models, next generation IP and application layer paradigm. This assessment covers the following learning objectives:

define and explain various Internet technologies;
describe and analyse the role and importance of Internet technologies in the modern world; and
explain how different application layer services such as client-server and peer-to-peer paradigms work in the Internet.

Infrastructure and functional requirements of a digital business

CIS8100 Assignment 2 PROJECT (PROTOTYPE) REPORT

Description

Marks out of

Wtg(%)

Word limit

Due date

Assignment 2

100

30

Approx. 3000

4 April 2014

Learning objectives and graduate skills tested
This assignment relates to your understanding of the key issues in relation to the infrastructure and functional requirements of a digital business and to allow you to demonstrate your ability to research, synthesise and specify the infrastructure and functional requirements of an e-commerce website in a report.

 
Assignment 2 and the subsequent Assignment 4 require you to plan and develop an e-commerce strategy including building a prototype website of your choice to facilitate your proposed online business.
 
You will be required to design, install, configure and populate your proposed e-commerce site using the Joomla content management system using a URL in cloudaccess.net that will be supplied to you by the Course Leader.
 

 
Assignment 2 specifications
 
Assignment 2 is made up of THREE tasks:
 
TASK 1 – Assignment 2 Journal
 
Maintain a journal of the activities and research that you have engaged in in the completion of this assignment.
 
The journal must document the progress that you have made from start to the conclusion of this assignment.
 
Use the Journal Template provided in the CIS8100 StudyDesk.
 
The journal entries will include, in date order, the following:
 
? Date of project/research activity
? Project/research activity
? Duration
? Description/Discussion of the project/research activity
? Follow up task arising from this activity
(10 marks)
 
 
TASK 2 – Preliminary analysis of proposed online business and e-commerce strategy
 
For Task 2 you are required to conduct a preliminary analysis of your proposed online business (of your own choosing) and develop an e-commerce strategy and prototype web site.
 
The report must address the following:
 
1.      Conduct an environmental analysis of your proposed e-commerce presence, keeping in mind the potential for global e?Business and  focusing on the following:
a.      Value propositions of your e-commerce strategy
b.      Core competencies that can be enabled/enhanced through an e-commerce presence
c.       Market analysis and trends regarding your proposed e-commerce strategy
d.      Evaluation of your e-commerce strategy in terms of Porter’s competitive forces model (http://www.buildmyonlinestore.com/articles/how-defensible-is-your-e-commerce-business-model/).
2.      List and describe how the strategic goals and objectives of your organisation will be addressed in your proposed e-commerce website.
3.      Identify what key stakeholders/customers will want from your proposed e-commerce website, and how this fits with the goals of the e-commerce website and the organization
4.      Briefly describe and justify the e-Commerce business model(s) that will be used in your e-commerce website.
5.      List and briefly describe the potential risks associated with your proposed e-commerce strategy and presence.
(50 marks)
 
NOTE: The word length for this task is about 2500 words, so ensure you cover all the above topics adequately and concisely while taking this constraint into consideration.
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
TASK 3 Briefing document of required Joomla! Activities undertaken for Assignment 2
Prepare and submit a briefing document (about 500 words) on completion of the following activities using your assigned Joomla!2.5 website:
1.      Use the assigned URL supplied to you by your Course Leader to commence the first steps in familiarising yourself with Joomla as a content management system and to develop a preliminary prototype of your proposed e-commerce website. (State the URL in the first part of the report)
2.      Configure the e-commerce site and create a home page (include the name of the your proposed e-commerce business or entity) with a menu and links and describe the steps required to achieve this (include snapshots in your document).
3.      List all the Joomla! components and features you are likely to use for Assignment 4 and why (see a selection of Joomla! features below).
4.      List and briefly describe any links and resources that you have used or are likely to  use to research and build your e-commerce website.
 
 

You will not be required to install the Jooma! system on your computer.
Instead you will be provided access to a pre-installed Joomla! development environment provided by cloudaccess.net via an url link assigned to each student.
Instructions to access your cloudaccess.net website will be provided on the StudyDesk.

 
To complete this task you will need to familiarise yourself with the features of the Joomla! Content Management System by studying one or more of the following online resources, (1) Cloudaccess.net Knowledge base for Joomla!2.5 , (2) Joomla! explained : your step-by-step guide / Stephen Burge (can be purchased as aKindle Edition, ebook or in hard copy) (3), Official Joomla! Book 2nd Edn Jennifer Marriot Ein Waring as aKindle Edition as ebook or in hard copy and (4)Joomla! Beginner’s Guide 2.5  free e-book.
(40 marks)
 
ASSSIGNMENT 2 TOTAL MARKS: 100
 
JOOMLA FEATURES
 

 
Setup
·         Using Cloudaccess.net
·         Installing Joomla
Creating content
·         Adding pages to the front page
·         Creating a Sitemap
·         Adding external and internal links
·         Deleting or hiding content
Creating Sections and Categories
·         Organising content in to sections and categories
·         Choosing content layout
·         Adding meta data for search engines
Global configurations
·         Configuring articles parameters
·         Ordering articles
·         Setting global configuration
Creating Menus
·         Adding navigation menus
·         Creating sub menus
·         Maintaining menus
·         Linking menus
·         Deleting menus

Working with Modules
·         Creating sidebar modules
·         Configuring modules
·         Creating login modules
·         Creating breadcrumbs modules
·         Working with other modules
Using Components
·         Adding contact us page
·         Adding polls
Users
·         Adding users
·         User permissions
Using Templates
·         Working with templates
·         Choosing different templates
·         Adjusting templates
Extending Joomla!
·         Using plug-in
·         Using extensions
·         Go Live
 

 
 
Submission Requirements
 
Your solution
Your solution should conform to the guidelines laid out in Summers, J Smith, B 2010, Communication skills handbook, 3rd edn, John Wiley Sons, Milton, Queensland.
Cautions
 
Originality of submission
 
· This assignment must be the expression of your own work. It is acceptable to discuss course content with others to improve your understanding and clarify requirements, but solutions to assignment questions must be done on your own. This also means that it is not sufficient to merely paraphrase the entire assignment content from a textbook or other source. Your assignment answers need be a reflection and synthesis of your research of the associated topics. This should be evident in your annotated bibliography.
 
· You need to demonstrate your understanding of associated topics for each assignment. You must not copy from anyone, including tutors and fellow students, nor provide copies of your work to others. Assignments that do not adhere to this requirement will be deemed as being the result of collusion or plagiarism. This may lead to severe academic penalties as outlined in Academic Regulation 5.10 of the USQ Handbook. It is your own responsibility to ensure the integrity of your work. Refer to the Faculty of Business policy for further details.
 
· An indiscriminate overuse of incorrectly referenced or cited web pages in your assignment will result in poor marks.
 
 
Late submission of assignment work
 
Late assignments will be penalised unless permission has been granted by the course leader BEFORE the assignment due date. Late assignments may be penalised by reducing the allocated mark by 5% per day late.
 
 
Other submission requirements
 
1)      Formatting
a.      Page size should be A4. Allow for TOP MARGIN – 2.5 cm; BOTTOM MARGIN – 2.5 cm; SIDE MARGINS – 2.5 cm
b.      Major headings should be in upper case, 14 point Times New Roman Bold
c.       Minor headings should be in lower case, 12 point Times New Roman Bold
d.      Body text should be formatted to 12 point, Times New Roman
e.      Use single or one and half line spacing
f.        Assignments should be in one of the following formats:
                                                              i.      Microsoft Word (2010)
                                                            ii.      Microsoft Word (2007)
                                                          iii.      Rich Text Format (RTF)
                                                           iv.      Portable Document Format (PDF)
 
 
2)      BEFORE submitting your FINAL version of the assignment to the online submission system (EASE) you must upload your draft copies to the online TURNITIN system (see the course StudyDesk for details on accessing and using the TURNITIN system).
a.      TURNITIN produces an Originality Report that shows your overall similarity index. If the index is less than 25 percent, your assignment is considered to be plagiarism-free. If not, you will have to rework your assignment, using the feedback in the Originality Report as a guide, and then resubmit it to TURNITIN for another round of checks until you are satisfied that it meets the requirements.
 
3)      The file naming guidelines are as follows:
a.      It is important that you use this convention to ensure that assignments can be tracked: Familyname_studentnumber_CIS8100_A2_XXXXXXXXX
b.      Replace ‘familyname’ with YOUR family or surname
c.       Replace ‘studentnumber’ with YOUR student number (which starts with ‘00’)
d.      Replace ‘XXXXXXXXXX’ with
                                                              i.      Task 1
                                                            ii.      Task 2
                                                          iii.      Task 3
                                                           iv.      TURNITIN
 
4)      Once you have obtained a plagiarism-free assignment you should submit the Originality Report (in pdf format) along with your FINAL assignment (in WORD or pdf format) electronically through the online assignment submission system (EASE). No hardcopy submissions will be accepted. See the course StudyDesk for instructions on uploading your assignment. 
 
 
 
 

Edu week 6 full | English homework help

Discussion 1
Course Reflection
In this final discussion, reflect upon your overall learning experience and relate it to your earned specialization and/or advanced degree as well as your current or future practice serving at-risk children and families. Your reflection must include the learning you have gained about the topics of this course and learning from the creation of your website. Review the Week Six Instructor Guidance to further support your response to this discussion. You may respond to this discussion in written form, or through a video and/or audio recording of yourself using the digital technology of your choosing.
Initial Post: Create an initial post that addresses the following:

What new insights have you obtained about at-risk children and families overall? 
What specific concepts have you learned that have left a more lasting impression or impact on you? How and/or why have these concepts impacted you more significantly than others?
What affirmations have you gained about your current or future role working with at-risk children and families from reflecting on your learning? Be sure to indicate what your professional focus is (e.g., education, early childhood education, family and community service, etc.).
How has the construction and review of others’ websites added value to your learning experience? Include challenges you may have experienced during the process and how you overcame them.

Assignment
Creating a Web-Based Resource for a Population At-Risk
Throughout this course, you have had the opportunity to examine various populations at risk and learn about strategies and resources to support these groups. You have reviewed many websites that offer services for a variety of populations at risk as well, which have hopefully served as models for your website that is finalized for this Final Project. In the Final Project, you will demonstrate mastery of the five course learning outcomes by completing the website resource you have been designing throughout the course that describes what you learned about children and families at risk as well as a specific population you selected as a focus during Week Five. Additionally, the website you create here may be an effective artifact to include in your MAED program eportfolio during your enrollment in the Capstone, EDU695, and will likely be useful to you as a resource for future professional work with your chosen population at risk from this project. 
Create your Final Project to using the content and written communication instructions below. Use the Grading Rubric to review your Final Project before submission to ensure you have met the distinguished performance for each of the components described below. For additional assistance, review the Week Six Instructor Guidance page and, if needed, contact the instructor for further clarifications using the Ask Your Instructor discussion before the last day of the course when this Final Project is due.
Content InstructionsYou must use the same website that you have been constructing throughout the course for this Final Project. Your website will have several “pages” or links including:

Homepage/General Information Page (2 points): Create a homepage or opening page that includes;

A title for the page.
Your working definition of at risk.
A professional mission statement, which is your statement about your current or anticipated professional role working with children and families at risk.
An Autobiography, which is a brief introduction about you including professional or volunteer experiences related to social, educational, or other related fields pertaining to groups at risk and your professional goals. In this autobiography, share how you intend to use what you know about groups at risk in your current or future professional role. If you lack experience in related fields, share your professional goals including the field and/or role you intend to pursue and how you intend to use what you know about groups at risk in that role. As an option, include a picture of yourself. Ensure the image is one you would want visible on the website, which may be viewed by potential employers.
A logically organized menu list that links to the pages in the website.

PagePoverty (2 points): Summarize what you learned from the Week One Discussion; Evaluating the Impact of Poverty including; (a) an overview of the impact poverty has on children and families, (b) a description of at least one source of support such as a program, policy, or model, or approach, and (c) the additional resource previously located and shared during Week One. Consider the feedback provided during the discussion to enhance your original thinking and response. A distinguished response would also describe how this knowledge will serve you professionally when working with children or families at risk.
PageChild Protection Services Child Maltreatment (2 points): Include (a) an Overview that is one-to-two paragraphs and describes the role of child protection agencies and policies that protect children, (b) support your overview with an example of a parenting program that you reviewed in Week Two Discussion Two, and (c) resources, including at least one source to support the description and one from the Rubin (2012) text supporting the parental program. Add the Child Protection Agencies Infographic. The Child Maltreatment brochure from Week Three will already have been uploaded as an attachment or link during Week Three. A distinguished response would also describe how this knowledge will serve you professionally when working with children or families at risk.
PageHomelessness (2 points): Use what was discussed in Week Three role-play discussion to inform this page. Include; (a) an Overview that is one-to-two paragraphs summarizing what you learned while comparing and contrasting issues of homelessness in New York and Chicago. A distinguished response will include enhancements to your original discussion response from Week Three based on the reciprocal feedback received during the discussion; (b) your perspective about the supports reviewed such as programs or policies and their overall effectiveness as well as either the recommendation you made for the cities or your ideas for potentially applying what you learned to another city; (c) at least three resources, including at least one resource from your own state or city of residence, and last, (d) the visual compare/contrast graphic created during Week Three.
Page—Students At-Risk (1 point): Include an introduction of the School-Based Efforts: A Plan to Support Youth At-Risk assignment completed during Week Four that describes changes or enhancements you made to the presentation following its evaluation and the feedback you received during Week Four. Also, describe how the information learned about students at risk will serve you professionally when working with children or families at risk. Include your presentation as an attachment or link on this page.
Specialization Pages Instructions: Create three additional pages in your website linked from the Homepage. Title the pages specifically for your selected group at risk as shown in Content Expectations below.
Page Specialization Group: Overview (4 points): Create a page titled with the name of your Specialization Group (e.g.: Child Refugees: Overview). Include a two-to-three paragraph description of the chosen population at risk including risk indicators, statistical data, and associated short and long-term implications and at least one suitable graphic. A minimum of two references must be cited in-text.
PageSpecialization Group: Strategies (4 points): Create a page titled Strategies that is linked from the Homepage. Include on this page

resilience indicators that may target solutions.
a description of at least two strategies (i.e., frameworks, models, approaches, strategies, programs, or interventions) that can be used to effectively work with the chosen population at risk including at least one derived from the Rubin (2012) text.
explanation of the potential or intended outcomes of the two strategies.
supporting evidence from at least two additional scholarly sources to support the explanations

PageSpecialization Group: Resources (4 points): Create a page titled Resources that provides a minimum of five resources including the Rubin (2012) text, offering information and support for the chosen population at risk. Ensure this page includes resources appropriate for an audience of educational and/or community-based professionals serving the chosen population at risk as well as members of the population and that these resources are formatted in APA. Each resource must be annotated with a two-to-three sentence description saying what the resource is and how it might be used for supporting or for direct support to the chosen population at risk.
Text Version (3 points): Provide a text version of the website in a Microsoft Word document that includes a link to the website you created for this final project. The text version of your website or other multimedia creation will be eight-to-ten pages in length if you have created the content requested. The purpose of the text version is to provide a document to check the content of your site for originality through the TurnItIn software and to provide a place for your instructor to give you embedded feedback comments about the content of your website.
Written Communication Instructions Use these instructions to guide your creation of the content components of the final project.

APA Formatting (0.5 point): Use APA formatting consistently throughout the assignment, such as for the title page, references page, headings for page content, and citations in the content on the website.
Syntax and Mechanics (0.75 point): Display meticulous comprehension and organization of syntax and mechanics, such as spelling and grammar. Written work contains no errors and is very easy to understand.

Required Resources
Text
·        Rubin, A. (2012). Clinician’s guide to evidence-based practice: Programs and interventions for maltreated children and families at risk. Hoboken, NJ: Wiley and Sons.
·         Use any of the chapters within the text to support enhancements made to any of the work included in your website as well as to inform your work on the specific group at risk you will select as a focus.
 
 

Clinical psychology interview | Psychology homework help

Profession Interview and Response
 
Refer to the University of Phoenix Material: Professional Interview and Response Guidelines for assignment guidelines.
 
Interview two helping service professionals from two different settings, such as a school, hospital, or prison. Ensure that at least one of the interviewees is a clinical psychologist.
Provide the name and work environment of the two professionals you interviewed.
 
Ask the following questions to each of your interviewees:
 
In what setting do you practice? How long have you been practicing?
What are your specialties or areas of clinical focus?
What are the most common disorders you treat?
Do you have any special certifications or training beyond your original graduate coursework?
How do you approach therapy or treatment? Do you use specific modalities, techniques, or interventions?
What ethical and legal issues do you think are the most challenging or common?
Do you have an opinion on where you think the field of psychology is heading?
What do you enjoy most about your work?
What advice would you provide an aspiring psychologist or therapist?
 
Discuss, in a 350- to 700-word response, the similarities and differences of how these professionals approach treatment in their settings.
 
 
Format your paper consistent with APA guidelines.

Childcare | English homework help

The ideal setting for childcare

What constitutes an ideal childcare setting for a 6 month old?

Due

 

Course Objectives Addressed

5. Demonstrate the ability to research a controversial topic in the field, and come to an evidence-based conclusion.

Description of assignment

Suppose you were seeking a child-care setting for your 6-month-old baby. What would you want it to be like, and why? Address issues such as (but not limited to):

Physical setting
Personnel qualifications
Health, safety, and nutrition
Mental, emotional, and cognitive stimulation
Cost
Proximity

Support your opinions with citations from at least three academic sources (not websites or popular press).
 

Format

Word document with separate title page and reference list, not included in the word count

Length

1200-1500 words

Grading Rubric

 

Possible grade

Student grade

The paper addresses the issues specified by the assignment

30

 

The author shows insight and sophistication in thinking and writing

40

 

Paper was well organized and easy to follow. Paper was the required length. Cover page, paper body, citations and Reference list were in the correct APA format, and not included in the word count.

20

 

Few to no spelling, grammar, punctuation or other writing structure errors

10

 

TOTAL

100

 

C++ Programming Worksheet Code

TITLEUpdating Accounts Using Doubly Linked ListTOPICSDoubly Linked ListDESCRIPTIONGeneralWrite a program that will update bank accounts stored in a master file using updates from a transaction file. The program will maintain accounts using a doubly linked list.The input data will consist of two text files: a master file and a transaction file. See data in Test section below. The master file will contain only the current account data. For each account, it will contain account id, first name, last name and the current balance. The transaction file will contain updates. Each update will consist of an account id, first name, last name and a plus or minus balance update. A plus update value will indicates a deposit and minus a withdrawal.Building ListAt the beginning, the program will input account data from the master file and build a doubly linked list. Each node in the list will contain data relating to one account and the whole list will be kept sorted by account id.For building the list, the program will input account information from the master file one account at a time. It will create a node containing the account data and add it to the list at the appropriate position in the list so that the list will remain sorted in ascending order by account id.Updating ListAfter the list is built as described above, the program will read updates from the Update file and update the list accordingly. It will input one account update at a time and update the list using this update before inputting the next update.For moving from account to account during updates, it will use a global cursor. For each update, it will determine whether the target account is in the forward or backward direction from the current position. It will then move the cursor in the appropriate direction using either the forward or backward links of the doubly linked list. It will move the cursor till it reaches the target account or an account past the target account (in the case that the target account does not exist).Depending upon the account id provided in the update, the program will do one of the following:·If the account specified in the update is not found in the list, it will create a new account, initialize its fields with the values in the update and insert it in the list at appropriate position so that the list will remain sorted in ascending order by account id.·If the account specified in the update is found in the list, it will update its current balance according to the plus or minus value specified in the update (i.e. it will add a plus value and subtract a minus value).·On completing the update, if an account balance becomes 0 or negative, the program will delete that account.Logging UpdateBefore starting any updates, the program will log the following to the log file:·It will log the contents of the whole doubly linked list.Then for each update, it will log the following information to the log file:·Before the update, it will log a line containing the contents of the update to be performed.·After the update, it will log the contents of the whole doubly linked list.For logging the contents of an update, it will output one line of text containing account id, account name and the update value.For logging the contents of the whole doubly linked list, it will output one line for each account containing account id, account name and account balance. For the contents of a sample log file, see the Sample Log File section. It contains the partial contents of a sample log file.New Master FileWhen all updates are completed, the program will save the contents of the updated linked list to a new master file. (Do not save the link values).IMPLEMENTATIONImplement the account list using a Circular Doubly Linked List with a Dummy Node.Account IdUse a long for account id.Circular Doubly Linked List With A Dummy NodeImplement the list for keeping the account as a Circular Doubly Linked List with a Dummy Node.In a Circular Dummy Node implementation of a doubly linked list, the head points to a dummy node. The dummy node looks like any other node but its data fields do not contain any useful values. It’s forward link points to the first node in the list and back link points to the last node in the list. Initially, in an empty list, both its forward and back links points to itself (i.e. to the dummy node).For doing a sorted insertion in such a list, do the following. Point the insertion pointer to the first real node. Move the insertion pointer forward as needed, till you reach the Point Of Insertion Node. (The Point Of Insertion Node is that node before which you intend to insert the new node) After the insertion pointer is at the Point of Insertion Node, insert the new node just before it. In performing the insertion, only the links in the Point Of Insertion node and the links in the node that is one before the Point Of Insertion node will change. Links in other nodes will not change. Because of the presence of a dummy node and the circular nature of the list, in all insert cases, there will always exist a node (either a real or dummy node ) before the Point of Insertion node. It will be the links of this node and that of the Point of Insertion node that will change. Therefore, the code for inserting a new node will be the same in all cases including: empty list, head insertion, mid insertion and end insertion. For each of these cases, the point of insertion node and the node prior to the Point of Insertion Node are listed below:·For an empty list, both point of insertion node and the node prior to the point Of insertion node are the same namely the dummy node.·For a head insertion, the point of insertion node is the first node and the node prior to the point of insertion node is the dummy node.·For a mid insertion, the point of insertion node is a real node before which the new node is being inserted and the node prior to the point of insertion node is another real node after which the new node is being inserted.·For end insertion, the point of insertion node is the dummy node and the node prior to the point of insertion node is a real node after which the new node is being inserted. In all of the above case, both the point of insertion node and the node prior to the point of insertion node are identical in format and have the same format as all other nodes. Therefore, the code for inserting a node in all of the above cases is the same.Doubly Linked List ClassCreate a class to encapsulate circular doubly linked list with a dummy node and to provide the following. Global CursorProvide a global cursor (pointer) that points to a working account. This cursor will be used during updates.Building Initial ListProvide a method for building a linked list while reading from the master file. The algorithm for this method is provided later below.Updating ListProvide a method for performing updates while reading from the transaction file. For doing an update, move the global cursor forwards or backwards as needed from account to account till you either reach the target node or a node past that node. Then carry out the required update (update, insert or delete). The algorithm for this method is provided later belowALGORITHMBuilding Initial ListThe code below can be used for building a sorted list while reading from the master file. It works for all cases: empty list, head insertion, mid and tail insertion.In the code below, cur and prev are two local pointers (not instance variables). newPtr is a local pointer that points to the node to be inserted. head is an instance variable that points to the dummy node. head – flink points to the first node in the list.//Using cur, locate the Point of insertion node.for ( cur = head-flink; cur != head; cur = cur – flink ) if (targetid cur-id ) //found the Point of Insertion Node break;//cur is now pointing to the Point of Insertion node.//Using cur, initialize prev that will point to the node just before the cur node.prev = cur – blink;//Now using cur and prev, insert the new node.//Create the two forward linksnewPtr – flink = prev – flink;prev – flink = newPtr;//Create the two back linksnewPtr – blink = cur – blink;cur – blink = newPtr;//The new node is now inserted just before the Point Of Insertion Node.Updating ListThe pseudo code below can be used for performing an update transaction read from the transaction file.In case cursor is left at a dummy node from previous transaction, move it to the first node. For example, this may happen if you removed the last node in the list and then moved the cursor forward by one.if (cursor is at dummy node) Move it to the first node.//case: cursor is at the target nodeif (cursor id == target id ) perform the update if (balance = 0) remove the account.//case: target node is in the forward directionelse if (cursor id target id) //locate the target node or point of insertion node while (cursor not reached dummy node) if (target id = cursor id ) break; //case: found target node if (target id == cursor id) perform the update if (balance 0) remove the account and move the cursor forward by 1. //case: target node does not exist else insert the new node before the cursor node//case: target node is in the backward direction //locate target node or point of insertion node while (cursor nor reached dummy node) if (target id = cursor id ) break; //case: target node found if (target id == cursor id) perform the update if (balance 0) delete account. //case: target node does not exist else move the cursor one node forward. (do this to point it to the correct point of insertion node) insert the node before the cursor nodeTESTINGTest Run 1Use the following file contents for a test run.Master File Contents (master.txt)27183 Teresa Wong 1234.5612345 Jeff Lee 211.2231456 Jack Smith 1200.0014142 James Bond 1500.0031623 Norris Hunt 1500.0010203 Mindy Ho 2000.0020103 Ed Sullivan 3000.0030102 Ray Baldwin 3824.3630201 Susan Woo 9646.7522345 Norma Patel 2496.24Transaction File Contents (tran.txt)31623 Norris Hunt -1500.0020301 Joe Hammil +500.0031416 Becky Wu +100.0010203 Mindy Ho -2000.0014142 James Bond +1500.0027183 Teresa Wong -1234.5610101 Judy Malik +1000.0031416 Becky Wu +100.0032123 John Doe +900.0010101 Judy Malik -200.0022222 Joanne Doe +2750.02SAMPLE LOG FILEFor a sample, the contents of the log file at the end of completing the first and the second update are presented below:List At Start:10203 Mindy Ho 200012345 Jeff Lee 211.2214142 James Bond 150020103 Ed Sullivan 300022345 Norma Patel 2496.2427183 Teresa Wong 1234.5630102 Ray Baldwin 3824.3630201 Susan Woo 9646.7531456 Jack Smith 1200 31623 Norris Hunt 1500Update #131623 Norris Hunt -1500List After Update #1:10203 Mindy Ho 200012345 Jeff Lee 211.2214142 James Bond 150020103 Ed Sullivan 300022345 Norma Patel 2496.2427183 Teresa Wong 1234.5630102 Ray Baldwin 3824.3630201 Susan Woo 9646.7531456 Jack Smith 1200 Update #220301 Joe Hammil +500.00List After Update #2:10203 Mindy Ho 200012345 Jeff Lee 211.2214142 James Bond 150020103 Ed Sullivan 300020301 Joe Hammil +500.0022345 Norma Patel 2496.2427183 Teresa Wong 1234.5630102 Ray Baldwin 3824.3630201 Susan Woo 9646.7531456 Jack Smith 1200 SUBMITSubmit the following:·Source code·Contents of file log.txt·Contents of the updated new master file.

Write a 2-3 page paper discussing the measurement scale for each

MBA 5652 Unit VI Discussion Board Question And Unit VI Mini Project
 
 
 
MBA 5652 Unit VI DQ
 
List three research obligations for research participants, researchers, and research clients; explain why these obligations are important.
250 Words
 
MBA 5652 Unit VI Mini Project
 
Write a 2-3 page paper discussing the measurement scale for each question in the survey developed in the Unit III assignment. Decide if you will use composite scale score or a summated scale score. Justify your decision. How will you measure reliability, validity, and sensitivity?
 
Explain how you will deal with ethical dilemmas during the research process (confidentiality, anonymity, conflicts of interest, informed consent, debriefing, experiments on human subjects, and so forth).
You must use correct APA formatting when writing your paper. All references used, including the textbook, must be cited.
 
 
NOTE: This assignment is part of the Unit VIII Research Proposal. This assignment must be submitted in sequence (i.e., Unit VI must be submitted and graded by the professor, who will provide feedback to the student before he or she can progress to the Unit VII assignment). The student assignment will be graded according to the assigned rubric. The professor will grade and annotate items that need to be corrected by the student. This feedback from the professor will help the student correct any discrepancies before compiling this assignment to the Research Proposal. This will help the student achieve a better review/grading for the Research Proposal.

Business Law Impact of Miscommunication on Workplace Conflict Essay

Exercise – Project Development Framework Select a project development framework and summarize the following:Provide an overview of the framework (i.e. Stages of development)Summarize the Pros and Cons of using the frameworkSummarize some of the best practices implementing a project management methodology/frameworkHow does the framework guide the project development i.e. timelines, resource allocation, critical path, etc..