понедельник, 28 декабря 2015 г.

INF 103 Week 5 Final Paper ****NEW****


Focus of the Final Paper
For the Final Paper, you will select one topic from the list below. You will want to choose a topic that is important or interesting to you.
Instructions for completing the Final Paper:
  1. Please select from one of the following topics, which are addressed in the course textbook, Introduction to Computer Literacy:
    •   Collaborative Technologies (covered in Chapter 1)
    •   Ethical Concerns in Computing (covered in Chapter 1)
    •   The Digital Divide (covered in Chapter 1)
    •   Open Source Software (covered in Chapter 3)
    •   The Impact of Mobile Computing (covered in Chapter 4)
    •   Social Networks (covered in Chapter 7)
    •   Protecting Copyrights and Intellectual Property (covered in Chapter 8)
    •   The Future of Cloud Computing (covered in Chapter 9)
  2. Return to the textbook and review the pages in the chapter that pertain to your selected topic.
  3. Next, log in to the Ashford University Library and conduct a search on that topic.
 The INF103. tutorial will walk you through the basic steps of doing a search for scholarly articles within the Ashford University Library. A transcript of this video can be accessed through your online course.
  1. Select two scholarly articles to use in your paper. For each article, write down the author information, date of publication, title of the article, the publication information (journal title), and the database from which you retrieved the article. You will need this information when you create your references for the sources.
  2. Begin the writing process. You are going to compare the points of view offered by these authors (the author of your textbook and the authors of the two articles you have selected) on your selected topic, and then offer your own point of view based upon your analysis of the readings.  
 

INF 103 Week 5 Final Paper


For the Final Paper, you will select one topic from the list below. You will want to choose a topic that is important or interesting to you.
Instructions for completing the Final Paper:
  1. Please select from one of the following topics, which are addressed in the course textbook,Introduction to Computer Literacy:
    Collaborative Technologies (covered in Chapter 1)
    Ethical Concerns in Computing (covered in Chapter 1)
    The Digital Divide (covered in Chapter 1)
    Open Source Software (covered in Chapter 3)
    The Impact of Mobile Computing (covered in Chapter 4)
    Social Networks (covered in Chapter 7)
    Protecting Copyrights and Intellectual Property (covered in Chapter 8) Plagiarism and Online Education (covered in Chapter 8)
    The Future of Cloud Computing (covered in Chapter 9)
  2. Return to the textbook and review the pages in the chapter that pertain to your selected topic.
  3. Next, log in to the Ashford University Library and conduct a search on that topic.
    The INF103. tutorial will walk you through the basic steps of doing a search for scholarly articles within
    the Ashford University Library. A transcript of this video can be accessed through your online course.
  4. Select two scholarly articles to use in your paper. For each article, write down the author information, date of
    publication, title of the article, the publication information (journal title), and the database from which you
    retrieved the article. You will need this information when you create your references for the sources.
  5. Begin the writing process. You are going to compare the points of view offered by these authors (the author of your textbook and the authors of the two articles you have selected) on your selected topic, and then offer your
    own point of view based upon your analysis of the readings. 
    The Ashford Writing Center (AWC) offers assistance with the writing process. The AWC contains many tutorials and offers online guides for how to develop an academic paper. Click on the Writing Center link under “Learning Resources” in the left navigation of this course to visit the AWC. 

INF 103 Week 5 DQ 2 Reflection Question – Computer Use in Career Fields


Reflection Question – Computer Use in Career Fields. There are many careers that require computer literacy. In fact, most jobs today require some knowledge of information technology. What computer skills should you develop to help advance your personal career goals? 

INF 103 Week 5 DQ 1 Emerging Information Technology


Emerging Information Technology. Discuss some of the emerging trends in information technology (e.g. computer hardware, software, data analysis). What impact may they have on your daily life (e.g., workplace, school, recreation)? 

INF 103 Week 4 Quiz


 What is the best term to describe an increasingly intense and vicious debate online?
2. What is a graphical representation of a real person in a virtual community called?
3. Encryption is BEST described as a:
4. Which of the following is NOT one of Facebook’s main features?
5. Which of the following is NOT one of the MOST common uses of Twitter?
6. The ideal PowerPoint presentation is defined by the 10/20/30 rule. Which of the following BEST describes this rule?
7. When Twitter is used to gather a large group for a face-to-face meeting it is called a:
8. The Online learning model that allows students to choose when they will log on instead of having pre-set times is referred to as:
9. The term cyberspace originated where?
10. What is the MOST important precaution to take when using social networking sites like Facebook?

INF 103 Week 4 DQ 2 Web 2.0


Web 2.0. Facebook, Twitter, YouTube, and other Web 2.0 tools (file sharing, cloud- services, etc.) provide ways for us to connect with individuals and share information in almost real time. Describe how you use these tools in your life today. How do you think these tools will work in the future? How will they impact major societal concerns like education, jobs, or the economy? 

INF 103 Week 4 DQ 1 Computer Ethics


Computer Ethics. Find a current news article that appears in a reputable, mainstream magazine, newspaper, or online news publication (e.g. Forbes, The New York TimesBusinessweek, or The Wall Street Journal) about an ethical issue that involves computer technology, or involves a technology company. 

INF 103 Week 4 Computer Ethics PowerPoint


Computer Ethics PowerPoint. Review your initial post from this week’s discussion activity on computer ethics. Use Microsoft PowerPoint to create a presentation based on your initial computer ethics discussion and associated research.
Your presentation Should:
  1. Identify the key points you want to highlight.
  2. Contain a minimum of three slides in the body of the presentation.
    Each slide in the body of the presentation should have no more than three bullet points.
    Each slide must include animation.
  3. Include graphics, audio, video or embedded links as needed to support and enhance your topics.
In addition: 
  1. Create a title slide that that includes a topic, your name, instructor’s name, date it was prepared, and the course title.
  2. Create a reference slide that identifies all sources used within the presentation (including graphics or other multimedia)
  3. Format your references according to APA style as outline in the Ashford Writing Center, and use in-text citations where necessary throughout the body of your presentation. 

INF 103 Week 3 Using Microsoft Excel


Using Microsoft Excel. Plagiarism, whether intentional or unintentional, is a big problem for universities. Not only is it an issue of unfair use of copyrighted material, it speaks to an ethical issue of cheating. (Please refer to the Microsoft Excel tutorials in the appendices of the Constellation text.)
Consider the following statistics. According to the plagiarism.org (2013), a survey conducted by Donald McCabe between 2002 and 2005 that included 63,700 US undergraduates and 9,250 graduate students revealed the following data:
  1. 36% of undergraduate and 24% of graduate students admit to “paraphrasing/copying few sentences from Internet source without footnoting it.”
  2. 38% of undergraduate and 25% of graduate students admit to “paraphrasing/copying few sentences from written source without footnoting it.”
  3. 14% of undergraduate students and 7% of graduate students admit to “fabricating/falsifying a bibliography.
  4. 7% of undergraduate and 4% of graduate students self-report copying materials “almost word for word from a written source without citation.”
  5. 7% of undergraduate and 3% of graduate students self-report “turning in work done by another.”
  6. 3% of undergraduate and 2% of graduate students report “obtaining paper from term paper mill.”
In Excel, create a worksheet that addresses the following:
  1. In cell A1, enter the following title for this worksheet: Student Plagiarism Statistics.
  2. In cell A3, enter the following: Form of Plagiarism.
  3. In cell B3, enter the following: Undergraduate.
  4. In cell C3, enter the following: Graduate.
  5. In cell D4, enter the total number of undergraduate students that participated in the study 63,700.
  6. In cell E4, enter the total number of graduate students that participated n the study 9,250. 
     
  7. Beginning in cell A5, enter each of the six categories of plagiarism identified by this report, one in each row. (These categories are found under the “Academic Integrity in College and Graduate School” section showing the results of the survey done by Donald McCabe.)
  8. Beginning in cell B5, calculate the number of students that admitted to each offense. To do this, you will need to calculate the number of students based on the percentage provided.
  9. For example, if there were 63,700 undergraduate students that participated in the survey and 36% admitted to paraphrasing/copying a few sentences from an Internet source, then that would mean that 22,932 students admitted to the offense (63,700 * .36). Complete these calculations for all six categories. Be sure to enter formulas and use proper cell referencing, e.g. = D4*.36
  10. Calculate the same data for graduate students beginning in cell C5.
  11. Format all cells with the appropriate data types. Set numeric fields with no decimals.
  12. Once you have completed the calculations, select the data cells in the table to create your chart.
Create a chart that will visually depict the data, in a way that makes it easy to see the largest areas of
plagiarism problems. A good example might be a column chart that shows undergraduate and graduate
data side by side. The choice of chart is your own.
Finalize your worksheet by making sure all columns are formatted to accommodate the size of the data.
Format your chart as needed to assure that the chart looks clean and neat. Be sure that your worksheet
looks professional and polished. 

INF 103 Week 3 Quiz


1. Beginning in the upper left corner of a spread sheet, where would you look to find cell C6?
2. A high bandwidth gives you faster:
3. The Internet originated from which of the following?
4. Which of the following would be useful to understand if you wanted to build a web page?
5. Which of the following can be used to determine how much traffic a website is getting?
6. Which of the following is NOT essential for individuals to have to build their own web page?
7. A killer app is BEST described as:
8. Which of the following is NOT a computer protocol?
9. Which of the following tasks would you MOST likely use a spreadsheet to complete?
10. People who are physically disabled are able to use the Internet due to:

INF 103 Week 3 DQ 2 Connecting your home network to the Internet


Connecting Your Home Network to the Internet. The author of your text suggests that the ability to connect to the Internet via Wi-Fi is available everywhere Bowles, (2013). As such, there are risks to your data and personally identifiable information. These considerations are especially important when we consider connecting our home network to the Internet. We may take for granted such functionality as online banking, e-commerce, and other transactions where we share personally identifiable information. 

INF 103 Week 3 DQ 1 Information security and privacy


Information Security and Privacy. Facebook, email, electronic commerce, and collaborative sites for both work and leisure are a normal part of our everyday computing activities. Personal information entered on these websites become partially owned by the sites themselves. Deleting items never really gets rid of them.
After reading this week’s course materials, describe what Internet users should know about one of the following topics:
  1. What should you know about website privacy?
  2. How do you know when an online transaction is secure?
  3. Why is Anti-spyware software important to my online security? 

INF 103 Week 2 Using Microsoft Word What Does the Library Have to Offer


Using Microsoft Word: What Does the Library Have to Offer? Write a one-to two-page essay that describes the benefits of using the Ashford University Library. What are the differences between scholarly resources and popular resources? What are some key things to remember when searching for sources within the Ashford University Library (e.g. databases, FindIt@AU search tool)? How will you be most effective and efficient in finding resources that fit your research needs? 

INF 103 Week 2 Quiz


Google uses what strategy for matching web pages to your searching requests?
2. If you wanted to look up an article from the Chicago Tribune the best place to start would be:
3. When a video becomes so popular online that people begin tweeting, blogging, and emailing their friends about it, it is called:
4. The members of the first professional group devoted to information management with computing machines were known as:
5. In 2007 Google Maps unveiled Street View. What does this feature allow you to do?
6. Boole’s theories of logic set the foundation for what aspect of computing today?
7. Famed science fiction writer H. G. Wells once envisioned something to store vast amounts of information. What did he call it?  
8. What is the name of the personal digital assistant in Apple’s smart phone?
9. Of the following individuals, who was the most recent to develop information searching tools online?
10. A custom information field that helps users to find a specific document is called a:

INF 103 Week 2 DQ 2 Searching for Information


Searching for Information. What are the benefits of using search engines, such as Google, Yahoo!, or Bing? What are some of the limitations and dangers of using information that is widely available on the Web? 

INF 103 Week 2 DQ 1 Copyright and Fair Use


Copyright and Fair Use. Take a few minutes to explore the Copyright Clearing Center’s Copyright Basics tutorial.
Briefly describe copyright, public domain, and fair use. Provide a unique example of fair use. Provide an example of when copyright would be violated. Be sure not to duplicate an example that is already posted by one of your classmates. 

INF 103 Week 1 Quiz


A significant and powerful aspect of the Java language is the:
2. Which of the following is an example of computer phishing?
3. Many people describe computers as “complex” machines. What can this mean?
4. In the 1970s which company developed computer innovations such as the mouse, graphical user interface, and word processors?
5. Which of the following terms describes powering a computer up from an “off” state?
6. A computer worm is MOST likely to attack your computer’s:
7. Which of the following is NOT an example of debugging?
8. The term “computer literacy” dates back to what decade?
9. Which of the following is NOT an example of systems software?
10. The term “clone” is a reference to a computer’s:

INF 103 Week 1 DQ 2 Innovations in Hardware and Software


Innovations in Hardware and Software.Using the Timeline - CHM Revolutionwebsite, identify and describe what you believe to be the two most important hardware innovations. What do you consider the two most important software innovations? Explain why they are so important. 

INF 103 Week 1 DQ 1 How do you currently use information technology


How Do You Currently Use Information Technology? Information technology is the process of using computers or computing devices to obtain and handle information and data. Using this technology is something that is performed daily by people all over the world. What is the impact of information technology in your daily life? How do you use technology in your daily life? 

INF 103 Entire Course


INF 103 Week 1 DQ 1 How do you currently use information technology
INF 103 Week 1 DQ 2 Innovations in Hardware and Software
INF 103 Week 1 Quiz 
INF 103 Week 2 DQ 1 Copyright and Fair Use
INF 103 Week 2 DQ 2 Searching for Information
INF 103 Week 2 Quiz 
INF 103 Week 2 Using Microsoft Word What Does the Library Have to Offer
INF 103 Week 3 DQ 1 Information security and privacy
INF 103 Week 3 DQ 2 Connecting your home network to the Internet
INF 103 Week 3 Quiz 
INF 103 Week 3 Using Microsoft Excel
INF 103 Week 4 Computer Ethics PowerPoint
INF 103 Week 4 DQ 1 Computer Ethics
INF 103 Week 4 DQ 2 Web 2.0
INF 103 Week 4 Quiz 
INF 103 Week 5 DQ 1 Emerging Information Technology
INF 103 Week 5 DQ 2 Reflection Question – Computer Use in Career Fields
INF 103 Week 5 Final Paper

Product Reviews

HSM 435 Week 5 Final Paper


Evaluate and prepare an analysis of the 9/11 terrorist attacks and Hurricane Katrina that includes the following:
  •   A brief summary of each disaster
  •   A detailed description of at least three psychological symptoms victims experienced from each disaster
  •   An explanation of at least three resources available to treat and assist victims from each disaster (e.g., local, state,
    federal, and/or non-profit organizational resources. Did the Red Cross or FEMA provide resources to victims to
    aid in their recovery?)
  •   An analysis of the long term affects these disasters have had on victims and rescue workers’ mental health and
    overall well-being
  •   A description of how the trauma from these disasters have affected children
  •   A brief explanation the role the media played in either agitating the psychological symptoms victims experienced
    from these disasters or helping to reduce the symptoms
    All sources must be properly cited, and the Final Paper must be formatted according the APA style. If you would like to refer to APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar, in your online course. 

HSM 435 Week 4 Local and Federal Disaster Resources


Local and Federal Disaster Resources. Visit your local city’s web page (e.g., New York City’s web page is www.nyc.gov and the city of Miami’s web page is www.miamigov.com), state’s web page (e.g., www.texas.gov or www.ca.gov), and FEMA | Federal Emergency Management Agency.
  1. Identify two resources offered by your city and two resources offered by FEMA to aid victims recovering from a terrorist attack or natural disaster.
  2. Explain how these resources work and how victims can utilize and find these resources.
  3. Explain how local, state, and federal agencies could better advertise and be more organized to provide
    meaningful mental health and trauma support to victims of disasters.
The paper must be five pages in length and formatted according to APA style. You must use at least three scholarly resources other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar, in your online course. 

HSM 435 Week 2 Terrorism and the Media


Terrorism and the Media. In a minimum of five pages (not including title and reference pages): a. Discuss how broadcasting terrorist activities and successes psychologically impacts individuals (e.g.,
victims, recovery teams, first responders, the general population). 
  1. Discuss whether broadcasts of terrorist activities should be limited to reduce potential impact on victims and non-victims. If it is limited, how would this affect freedom of information and freedom of speech?
  2. Explain how media coverage of terrorist attacks affects children.
You must use at least two scholarly resources other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar, in your online course. 

HSM 433 Week 4 Counterterrorism and American Presence Overseas


Counterterrorism and American Presence Overseas. Describe the strategy, tactics, and tools that are available to agencies within the U. S. to perform counterterrorism operation, as well as the strategy, tactics, and tools that are available to U. S. agencies and the military to perform counterterrorism operations abroad. Note key differences between counterterrorism strategy, tactics, and tools in and outside the U. S. Explain why it is or is not necessary for the U. S. to maintain a presence abroad to perform counterterrorism operations. 

HSM 433 Week 3 Role of U.S. Agencies in Counterterrorism


Role of U.S. Agencies in Counterterrorism. Select one United States agency from the list below and explain the agency’s role in counterterrorism operations in the U. S. Agencies to choose from include:
 National Security Agency (NSA) Department of the Treasury, Department of Homeland Security Department of Energy, Department of State, or Defense Intelligence Agency (DIA)
In the essay, explain the function of the agency as it relates to counterterrorism operations inside the United States as well as the tools available to the agency to conduct counterterrorism operations. Also, explain how your selected agency interacts with at least one other agency to perform counterterrorism operations. Briefly describe any Justice Department implications of available counterterrorism tools. Make at least one suggestion for how your selected agency could coordinate with emergency responders to minimize casualties.
The paper must be five pages in length and formatted according to APA style. You must use at least three scholarly resources other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar, in your online course. 

HSM 433 Week 1 Terrorist Attack against the United States


Terrorist Attack against the United States. Select one terrorist attack from the following list and address the elements listed below that are specific to your chosen attack:
 Weather Underground Organization attacks during the 1960s-1970s  1983 attack on the Marine barracks in Lebanon 1998 attack on U. S. embassies in Tanzania and Kenya 2009 attack on U. S. Army Post, Ft. Hood
 1993 attack on the World Trade Center 1970 attack carried out by the Students for a Democratic Society
The essay should include the following elements:
  •   Briefly describe the attack (where, when, what was used to conduct the attack, casualties, injuries,
    structural damage, etc.)
  •   Explain why your chosen attack classifies as a terrorist attack
  •   Identify the group responsible for this attack and explain their motives behind the attack, detailing what
    the group hoped to achieve
  •   Explain the United States’ response to this attack (If there was no response provide suggestions for
    appropriate responses)
  •   APA (6th ed.) style title page and reference page
    The paper must be five pages in length and formatted according to APA style. You must use at least three scholarly resources other than the textbook to support your claims and subclaims. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation toolbar, in your online course. 
 

HSM 421 Week 5 Final Paper


Use the following structure and answer all elements of this design template:
1. What is the Homeland Security Research question?
a. There should be only one research question that you are trying to answer. (1⁄2 page)
  1. Establish at least two hypotheses that you will research and analyze in an attempt to answer you research question. Explain in a brief paragraph the logic for the generation of your hypotheses. (1 page)
  2. Conduct a literature review related to your homeland security research question and your hypotheses. Discuss the findings of this literature review. (1-2 pages)
  3. Create a reference page that accounts for all sources you identified relating to your research topic. Your literature review must have no less than 8 fully documented resources.
  4. Establish variables that you will use to evaluate your hypotheses. Identify these variables and how they will be measured. (1-2 pages)
  5. Determine the method by which you will gather the data that informs your research. Identify the quantitative and qualitative methods you will use to collect the data on your variables. For example, will you conduct a survey? Use existing statistics? Or, create a focus group. (1 page)
  6. Identify the method you will use to analyze your variables and what techniques you will use to verify that your data is valid and representative of the population or theory you are examining.
  7. Finally, describe where you believe the greatest challenge will be in conducting research and analysis on your homeland security topic.  

HSM 421 Week 3 Comparing Homeland Security Research Products


Comparing Homeland Security Research Products. Since the attacks of 9/11/2001 and the creation of the Department of Homeland Security, there have been massive amounts of homeland security research and information created. Now that you have studied the design and execution of research, you will compare and contrast two homeland security research products and evaluate their effectiveness.
First, read and evaluate the research of the New York Police Department’s report: “Radicalization in the West: The Homegrown Threat.” Read and evaluate the executive summary on pages 5-14. This report examines the incidence of homegrown terrorists within the borders of the U.S.
Next, read and evaluate the research of the Department of Homeland Security report: “Rightwing extremism: Current economic and political climate fueling resurgence in radicalization and recruitment.” This report provides an assessment of the threat of homegrown extremism from right wing groups. 

 

HSM 320 Week 5 Final Paper

Focus of the Final Paper
Develop a comprehensive Recovery Plan for one of the four scenarios listed below. Please note all of the Recovery Plan Scenarios listed below are hypothetical. No additional knowledge of the places named is required to complete the Recovery Plan. All of the information you need to create the Recovery Plan is contained within the hypothetical scenarios.
1. Chemical Scenario: Chemical Attack on the Super Bowl 
The New England Patriots are taking on the New Orleans Saints in the Super Bowl, located in the Louisiana Superdome. The Superdome’s capacity for a football game is approximately 72,000; and the stadium is packed to capacity with excited football fans.
At the beginning of the second quarter fans report a bitter almond smell coming from both the men and women’s bathrooms. Hydrogen cyanide (HCN), a colorless gas form of cyanide, has been released into the stadium via the vents in the Stadium bathrooms. Fans that have visited the bathrooms are experiencing the worst symptoms, while all fans and players are beginning to display symptoms of cyanide poisoning.
Create a recovery plan based on this scenario, which is specific to a chemical attack. Address all of the necessary criteria for the Recovery Plan as it relates to this chemical scenario.
  1. Biological Scenario: Biological attack in the US Congress
    The US Congress consists of three Senate Office Buildings and three House Office Buildings, in addition to the Capital building. The Rayburn House Office Building has a large cafeteria, which primarily consists of a generous salad bar and a few food stations that offer hot items. This cafeteria is open to Members of Congress, Congressional staffers, and visitors, including lobbyists and constituents.
    After the cafeteria has closed for the afternoon, Capital Police receive a phone call informing them all food in the Rayburn cafeteria was tainted with clostridia, which is a major source of botulinum toxin.
    Create a recovery plan based on this scenario, which is specific to a biological attack. Address all of the necessary criteria for the Recovery Plan as it relates to this biological scenario.
  2. Radiological Scenario: A Dirty Bomb in the Mall of America
    It is the day after Thanksgiving, commonly referred to as Black Friday in America, and the busiest shopping day of the year. The Mall of America in Bloomington, Minnesota is crowded with eager shoppers. The Santa Clause exhibit, which allows young children to have their picture taken with Santa, is equally crowded. A substantial number of parents and children have formed a line to wait for a picture with Santa.