Assignments due monday before 11:59 pm

Flowchart/Graphic Organizer of Special Education Process 

The process and timelines required for referral, evaluation, eligibility determination, placement, development of the IEP, and implementation of services is prescribed by law and all members of the IEP team are responsible for understanding the process.

Obtain information and materials for families of individuals with disabilities. Based on the materials provided to the families, create a flowchart/graphic organizer depicting the special education process and laws followed within a school. The flowchart/graphic should depict the processes of referral, evaluation, determination of eligibility, placement, development and implementation of the IEP, progress monitoring, and the reevaluation process. Timelines and required parental should be included.

In addition to your completed flowchart or graphic organizer, write a 500-750 word parent-friendly letter about the special education process. In the letter, explain the roles of the school, the parents, and the students.

Support your flowchart/graphic organizer with a minimum of two resources.

While APA format is not required for the body of this assignment, solid academic writing is expected, and in-text citations and references should be presented using APA documentation guidelines, which can be found in the APA Style Guide, located in the Student Success Center.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Field Experience B: Special Education Teacher and General Education Teacher Interviews 

The role of the special education professional is a collaborative role and requires a specific skill set and understanding of the laws and regulations that prescribe the procedures and processes to ensure a free appropriate public education to students with disabilities.

This is a Block 1 Field Experience. In this block, your field experience must be completed before or after school, or other designated times when students are not present.

You will interview a special education teacher and a general education teacher for this assignment to gain a better understanding of the roles and responsibilities of these service providers in the school setting.

Allocate at least 3 hours in the field to support this field experience.

Interview a certified special education teacher and a general education teacher from a K-12 setting about the following:

  1. What is your role in the IEP process?
  2. What steps need to be followed prior to an IEP being created for an individual with disabilities?
  3. How do you involve parents in the special education process?
  4. What support do you offer parents of individuals with disabilities?
  5. How do you collaborate with the school psychologist and administration in the special education process?
  6. What resources and training does the district provide teachers regarding special education?
  7. How do you collect data for IEP progress monitoring?

Additionally, ask the special education teacher the following

  • How do you collaborate with general education teachers to meet the needs of your students?

Ask the general education teacher the following:

  • How do you collaborate with the special education teacher to meet the needs of your students?

In 500-750 words, identify the school setting, summarize, and reflect upon your interviews and explain how you will use your findings in your future professional practice.

Prepare this assignment according to the guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.

This assignment uses a rubric. Review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.

You are required to submit this assignment to LopesWrite. Refer to the LopesWrite Technical Support articles for assistance.

Document the locations and hours you spend in the field on your Clinical Field Experience Verification Form.

Submit the Clinical Field Experience Verification Form to the LMS in the last topic. Directions for submitting can be found on the College of Education site in the Student Success Center.

Journal: conflict in the field

In your journal, consider how what you have learned about multiple role relationships could apply to your professional life.

What would be one multiple-role relationship conflict you can anticipate coming up in your chosen field of work as a Criminal profiler or Forensic Psychologist? Is there any way to prepare for this conflict ahead of time? What strategies could you develop to avoid this ethical conflict?

Journal assignments should be 300 words or less. Submit assignment as a Word document with double spacing, 12-point Times New Roman font, and one-inch margins. 

For additional details, please refer to the Journal Guidelines and Rubric PDF document attached.

Assignment paper | Information Systems homework help

*****
2.4 Threat Analysis (Phase 1)
*****

Getting Started

In this assignment, you will develop an initial cybersecurity analysis that will become a part of the final project due in the last workshop of this course.

Upon successful completion of this assignment, you will be able to:

  • Describe and classify the types of threats to an organization’s infrastructure and data.
  • Select appropriate security frameworks to design a comprehensive security posture.
  • Implement strategies to mitigate threats and contain any attacks that may infect the computing environment.

Instructions

  1. Review the rubric to make sure you understand the criteria for earning your grade.
  2. Phase 1 of Final Project: Develop a comprehensive analysis that identifies threats and vulnerabilities to the information systems infrastructure and organizational data.
  3. You may use a fictitious company, one that you researched on the Internet, or your own workplace (although you should use an alias for the company name).
  4. Conduct Internet research for formats that are used for a threat analysis.
    1. Include a short executive summary for this assignment, although you will need to revise this summary for the final paper.
    2. The threat analysis should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.
    3. You may use tables or other graphic representations.
    4. The paper should include references to any material used in preparing the paper. References are to be cited within your paper as well as on the Reference page using APA format.
    5. You should use online resources to develop your plans; just make sure to cite these sources. All written work should be your own.
    6. Consider using Grammarly before you submit your paper. Grammarly checks grammar, provides suggestions for corrections, and reviews references.

 

Getting Started

In this assignment, you will develop a mitigation strategy that will later be utilized in the final project, due in the last week of the course.

Upon successful completion of this assignment, you will be able to:

  • Select appropriate security frameworks to design a comprehensive security posture.
  • Implement strategies to mitigate threats and contain any attacks that may infect the computing environment.

Instructions

  1. Review the rubric to make sure you understand the criteria for earning your grade.
  2. Phase 2 of Final Project: Provide a comprehensive mitigation strategy based on the threat analysis done in Assignment 2.4.
  3. As mentioned in Assignment 2.4, you may use a fictitious company, one that you researched on the Internet, or your own workplace (with an alias used for the company name).
  4. Conduct Internet research for formats that are used for developing and categorizing a security mitigation strategy.
    1. Include a short executive summary for this assignment, which you will revise later for use in the final paper.
    2. The mitigation strategy should be approximately 4 to 5 pages in length, in APA format, and double-spaced for the narrative.
    3. You may use tables or other graphic representations; however, these additions to the paper should not be included in the page count.
    4. The paper should include references to any material used in preparing the paper. You should use online resources to develop your plans; just make sure to cite these sources. All written work should be your own.
    5. Consider using Grammarly before you submit your paper. Grammarly checks grammar, provides suggestions for corrections, and reviews references.

*****
5.3 Business Continuity Plan (Phase 3)
*****

Getting Started

This assignment covers the topics of disaster recovery and business continuity concepts and practices, as well as developing an understanding of risk and change management, and concepts related to the development of secure software.

Upon successful completion of this assignment, you will be able to:

  • Select appropriate security frameworks to design a comprehensive security posture.
  • Implement strategies to mitigate threats and contain any attacks that may infect the computing environment.

Instructions

  1. Review the rubric to make sure you understand the criteria for earning your grade.
  2. Phase 3 of Final Project: Write a two- to four-page paper that addresses and reflects upon the following:
    1. Describe the concepts and practices of designing and implementing a business continuity and disaster recovery plan.
    2. How might you test a disaster recovery plan?
    3. What should a risk management plan include?
    4. How does a change management plan impact the overall risk strategy?
    5. What are the important concepts that should be included in a security plan for the development of secure software?
  3. Support your writing with at least two outside sources. The paper should be in APA format.
  4. Consider using Grammarly before you submit your paper. Grammarly checks grammar, provides suggestions for corrections, and reviews references.

 

*****

Getting Started

Phase 4 of the Final Project will provide the student with the opportunity to put into practice the concepts covered in this course. This includes identifying threats to information systems assets (including data), developing mitigation strategies, and assuring compliance to policies set forth.

Upon successful completion of this assignment, you will be able to:

  • Describe and classify the types of threats to an organization’s infrastructure and data.
  • Select appropriate security frameworks to design a comprehensive security posture.
  • Implement strategies to mitigate threats and contain any attacks that may infect the computing environment.
  • Design a comprehensive training and awareness plan to educate the user community on security policies and procedures.

Background Information

In the previous assignments in this course, you submitted a security threat analysis, a plan to mitigate those threats, and a business continuity plan summary. For this final paper/proposal, you will integrate work from the previous assignments into this assignment.

Instructions

  1. Review the rubric to make sure you understand the criteria for earning your grade.
  2. Phase 4 of the Final Project is a proposal to provide a comprehensive security plan for your organization.
  3. As the final step of this proposal, you will prepare a comprehensive Security Awareness and business continuity plan (taking what you did in Assignment 5.3 and expanding upon the summary) that will be used throughout the organization. The plan should address awareness from the perspective of employee expectations. The business continuity plan should address the requirements needed to recover from potential disasters, whether through natural causes (weather, fire, etc.) or a security breach. The paper should be outlined as follows:
    1. Executive Summary/Introduction
    2. Threat Analysis (Assignment 2.4)
    3. Mitigation Strategies (Assignment 4.4)
    4. Business Continuity Plan (Assignment 5.3 was an overview)
    5. Security Awareness Program Plan/Overview
    6. Conclusion
  4. Provide transitions between these six sections. The total length of the paper should be 15–20 pages. You may use graphics or other features within your paper; however, these do not count toward the 15–20 page total.
  5. Make sure the paper is double-spaced and in  APA format. The paper should have a minimum of five references, which should be cited correctly within the paper as well as on the Reference page using APA format.
  6. Consider using Grammarly before you submit your paper. Grammarly checks grammar, provides suggestions for corrections, and reviews references.

Final 6 | Information Systems homework help

Hello,

I hope everyone is well. I need help with the items listed below. Please read the instructions carefully before accepting the bid. As usual Plagiarism will be checked, thanks.

Part 1:

 

Prior to beginning work on this discussion, review Chapters 8, 9, and 11 in the text book, read the Patterson  (Links to an external site.)(2015) article for CNN well as the United Nations Key Findings – The State of Broadband 2015: Broadband as a Foundation for Sustainable Report (Links to an external site.), and review any relevant information in this week’s lecture.

Big tech companies like Google, Facebook, and OneWeb are on a mission to make the Internet accessible to the world’s population. Their goal is to develop different technologies that can beam high-speed Internet connectivity to places that have never been able to take advantage of the internet before. Using the information provided in the required articles conduct additional online research to find at least two more credible sources that discuss these topics. (Access the MISM Credible Resource Guide for assistance with finding additional appropriate credible professional resources.)

Evaluate the effects broadband internet access has on business opportunities. Review the U.N. report as well as the most current list of Least Developed Countries (Links to an external site.) as published by the United Nations. Choose an underrepresented country from the list. Evaluate the potential advantages that broadband internet access might have on businesses operating in your chosen country. Compare the current potential of businesses operating within your chosen country to those operating in areas where broadband internet access is common. Provide at least two examples of advantages that internet connectivity would create for businesses within your chosen country. Explain how these advantages and opportunities would impact the personal and professional lives of your chosen country’s population.

Must be at least 300 words.

Part 2:

 

Network Upgrade Plan

For this assignment, you will apply telecommunication and network technical knowledge in the creation of a network upgrade plan. To create this plan you will assess your leadership role as the IT Project Manager in the design and implementation phases of this network upgrade project.

For this project, you will assume the role of one of the Senior IT Project Managers for Mont Saint Michelle Consulting Company (MSMCC) working in the IT professional services arm of the company. Your firm has been hired by an existing company to assist them in upgrading their current network. The existing company has three office locations: New York, NY, Denver, CO, and Palo Alto, CA. Each location consists of a two-story building that includes local wired and wireless access to about 50 employees. The current wireless setup is insufficient in terms of protocols, security, and encryption levels. All three sites are connected via a wide area network (WAN) to help carry data, voice, and video. The throughput on this current environment is T1. The firm is looking at MSMCC for your expert skills in this type of network upgrade and wants the best value solutions in order to make the most financially responsible and sustainable decision. As the senior IT project manager on this project, you need to work with your team to come up with a network upgrade plan to solve their outdated technology issues.

You must use the ISM640 Network Upgrade Plan TemplatePreview the document in the creation of your assignment. For each section of the template, include the content required as listed below.

Document History

The information in this section will be pre-populated in the template. The only required content will be your name and date.

Executive Summary

Summarize the project parameters including a short description of each of the following sections: Requirements, Milestones, Budget, and Risks. (There is a sample of an Executive Summary (Links to an external site.) on the Ashford Writing Center website.)

Requirements

Evaluate the current telecommunication and network capabilities of the existing company and propose solutions for their outdated technology issues. The individual requirements must include the scope of hardware solutions, software solutions, network protocols, security options, and encryption levels. Provide a rationale for each of the choices made using information from a minimum of two scholarly or professional sources in addition to the course text to support your statements.

Create a network diagram of the proposed solution using applied standard principles of design.

Milestones

Create a high-level table of milestones involved in the implementation of the upgrade including a sequence of realistic completion dates and expected accomplishments.

Budget Create a budget that provides a realistic estimate of the cost of the upgrade plan. Utilize the table in the template, as well as conduct online research for estimated costs.

Risks

Explain a minimum of three potential risks related to your network upgrade plan as well as the corresponding opportunities that would mitigate these risks.

The Network Upgrade Plan

  • Must be 8 double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Writing Center (Links to an external site.).
  • Must include a separate title page with the following:
    • Title of paper
    • Student’s name
    • Course name and number
    • Instructor’s name
    • Date submitted
  • Must use at least two scholarly or professional sources, in addition to the course text.
  • Must document all sources in APA style as outlined in the  Writing Center.
  • Must include a separate references page that is formatted according to APA style as outlined in the Writing Center.

Criminal enforcement website and find a major criminal case

Please respond completely to the following questions and input your answers into this discussion.  

1. Go to the EPA – Criminal Enforcement website and find a Major Criminal Case that the EPA has investigated (within the last year). Post a link to the report and give a one paragraph synopsis explaining the outcome of the investigation.

2. You read all about Bernie Madoff and the elaborate ponzi scheme he created to steal hundreds of millions of dollars from everyday Americans. You might think that this type of high profile, white-collar crime only happens in big cities, think again. Read the following article: Dayton Ponzi Scheme, about the Bernie Madoff of Dayton. After reading the article:

a. Categorize and define the various types of crimes committed by the Defendant.

b. Explain the criminal aspects and civil ramifications of the Defendant’ actions.

c. Explain what crimes employee’s of the Defendant could be charged with.

d. The defendant in Dayton was convicted under Federal Law. Attempt to identify what crimes the Defendant could have been charged with under Ohio law. (Hint: Start here ORC Title 29)

NOTE: You must post your ideas directly in the discussion. DO NOT link or upload a document!

Provide your original post and replies to classmates in this discussion.  The directions are on the page preceding this discussion.

You must provide your original post and replies to at least two classmate posts.

This discussion is worth 20 points.

*segmentation analysis | Financial markets homework help

Analyze your decision-making process for the persona you created. Why is he/she a good target audience for the product? How has focusing on this persona helped you better understand how to target your offering? What are some pitfalls you see of using personas, and how can you avoid them? Tie in marketing concepts from your readings and resources throughout the week.

This paper should be written as an academic analysis of your strategic decision-making process. The final result will be a 2-3 page critical analysis, double-spaced in 12-point Arial font, written in APA style, with references appropriately cited. Cover page and bibliography do not count toward required length.

Resources:

discussion: statistical significance and meaningfulness

Once you start to understand how exciting the world of statistics can be, it is tempting to fall into the trap of chasing statistical significance. That is, you may be tempted always to look for relationships that are statistically significant and believe they are valuable solely because of their significance. Although statistical hypothesis testing does help you evaluate claims, it is important to understand the limitations of statistical significance and to interpret the results within the context of the research and its pragmatic, “real world” application. 

As a scholar-practitioner, it is important for you to understand that just because a hypothesis test indicates a relationship exists between an intervention and an outcome, there is a difference between groups, or there is a correlation between two constructs, it does not always provide a default measure for its importance. Although relationships are significant, they can be very minute relationships, very small differences, or very weak correlations. In the end, we need to ask whether the relationships or differences observed are large enough that we should make some practical change in policy or practice.

For this Discussion, you will explore statistical significance and meaningfulness.

To prepare for this Discussion:

· Review the Learning Resources related to hypothesis testing, meaningfulness, and statistical significance.

· Review Magnusson’s web blog found in the Learning Resources to further your visualization and understanding of statistical power and significance testing.

· Review the American Statistical Association’s press release and consider the misconceptions and misuse of p-values.

· Consider the scenario: 

o A research paper claims a meaningful contribution to the literature based on finding statistically significant relationships between predictor and response variables. In the footnotes, you see the following statement, “given this research was exploratory in nature, traditional levels of significance to reject the null hypotheses were relaxed to the .10 level.”

By Day 3

Post your response to the scenario in which you critically evaluate this footnote. As a reader/reviewer, what response would you provide to the authors about this footnote?

Be sure to support your Main Post and Response Post with reference to the week’s Learning Resources and other scholarly evidence in APA Style.

Frankfort-Nachmias, C., & Leon-Guerrero, A. (2018). Social statistics for a diverse society (8th ed.). Thousand Oaks, CA: Sage Publications.

· Chapter 8, “Testing Hypothesis” (pp. 203-204)

Wagner, W. E. (2016). Using IBM® SPSS® statistics for research methods and social science statistics (6th ed.). Thousand Oaks, CA: Sage Publications.

· Chapter 6, “Testing Hypotheses Using Means and Cross-Tabulation” 

Warner, R. M. (2012). Applied statistics from bivariate through multivariate techniques (2nd ed.). Thousand Oaks, CA: Sage Publications.

Applied Statistics From Bivariate Through Multivariate Techniques, 2nd Edition by Warner, R.M. Copyright 2012 by Sage College. Reprinted by permission of Sage College via the Copyright Clearance Center.

· Chapter 3, “Statistical Significance Testing” (pp. 81–124)

Magnusson, K. (n.d.). Welcome to Kristoffer Magnusson’s blog about R, Statistics, Psychology, Open Science, Data Visualization [blog]. Retrieved from http://rpsychologist.com/index.html

As you review this web blog, select [Updated] Statistical Power and Significance Testing Visualization link, once you select the link, follow the instructions to view the interactive for statistical power. This interactive website will help you to visualize and understand statistical power and significance testing.

Note: This is Kristoffer Magnusson’s personal blog and his views may not necessarily reflect the views of Walden University faculty.  

Stages of change management – 8-10 page paper

Stages of Change Management 

Read the following online article: Know the Stages in Change Management? Use a Change Management Checklist to Guide Your Efforts in Managing Change (Heathfield, 2015) https://www.thebalance.com/know-the-stages-in-change-management-1917802     

Discuss each of the 6 stages in change management as outlined by Heathfield (initiation, investigation, intention, introduction, implementation, integration). Identify potential limitations barriers which may occur in each stage, as well as identify strategies for successfully achieving each stage. In your discussion, use examples from your workplace pertaining to current change that is taking place or change that you wish to implement. 

Develop an 8-10 page paper and support the discussion through additional research (5-7 references).

Week 4: critical thinking: negotiation strategy and tactics

 

Working individually, students should complete the Critical Thinking questions per the list assigned. 

Prepare responses to the questions below after viewing the Negotiation Strategy and Tactics Tutorial in this week’s Lesson. In drafting your answers to the questions, make sure that you apply course concepts in your answers (this means providing in-text references of your sources as well as bibliography with full citations).

  • Part A: What are the objectives of both parties in the exchanges? How would you describe the general tone of the exchanges?
  • Part B: Were Marilyn’s objectives achieved in the first exchange? Were Len’s objectives achieved in the first exchange? What do you project the outcome of the first exchange to be?
  • Part C: Were Marilyn’s objectives achieved in the second exchange? Were Len’s objectives achieved in the second exchange? What do you project the outcome of the second exchange to be?
  • Part D: Identify two points of transition in each exchange and analyze the impact of the transitions on the negotiation.

The paper should be a minimum of 3 to 4 pages. APA is required.

Case study: the problems of multitasking

Read the case study attached on the Word Document and answer the below listed questions. All questions must be answered. Please answer the questions on the word document below case study!! 

This is due tomorrow morning no later than 9am EST!!! 

1)  How does multitasking confuse the resource availability of project team personnel? 

2) In modern organizations, it is impossible to eliminate multitasking for the average employee. Why? 

3) How would resource loading or resource leveling help address multitasking situations?