Culture, (Post)modernity, and Geography 

1. Discussion Question: In your opinion, in which aspects of society and culture has/is modernism most prevalent?

2. Reading Reflection: Solid ONE-page reflection paper about your thoughts on the reading. This could include a brief summary and your opinion. There are not many guidelines or format (e.g., APA, MLS style) for these weekly reading reflection assignments. But please use 12 point font, Times New Roman, and don’t get ridiculous with the margin settings.

Your post will be the first draft of your Literacy Narrative. You have been reading literacy narratives (Rodriguez, hooks) and reading about literacy narratives (Soliday). Now, it’s your turn to write a literacy narrative. Choose a specific literacy event that shaped you in some way. It might not have taught you something about reading and writing; it could have taught you something else about people, life, and relationships. But, the event must be about reading and writing. Maybe you remember a specific book that was influential to you. Maybe you remember writing something that changed your thinking or being in some way.
In your narrative, be specific about the details and the context of the event–who was there, where was it, how old were you. You must also relate the event, though, to the other literacy narratives you read and Mary Soliday’s ideas about what literacy narratives do and how they work.
Aim for 3-4 pages for this first draft. Make sure you cite the quotes and paraphrases that you use in APA style.

Write a 2-3 page essay on the health of our democracy using your *digital artifact, your peers’ artifacts, and readings(uploaded). (*Digital artifact=some political cartoons which uploaded)Essay is due on Friday at  10AM. There is a grading criteria, please follow the rubric.(uploaded)

Prompt

What is a democracy? Describe 2-3 qualities of a healthy democracy. And, assess the health of our democracy. In your essay, use your digital artifact, reference at least one of your peers’ artifacts, and at least two readings from Weeks 1 and 2.

Essay should also include the following information:

  1. What is a democracy? Draw on what you already know about democracy from your k-12 or your undergraduate courses as well as from anything you looked up in connection for this assignment. When describing the qualities of a healthy democracy that are most important to you, you may draw from the definition of democracy you chose for your artifact post and/or the definitions posted by your peers.
  2. Assess how healthy our democracy is by doing the following:
    • Describe and discuss the artifact you selected to show how well our democracy is currently working, and why our democracy is working that way.
    • Discuss whether our democracy reflects the qualities you described.
    • Incorporate at least one artifact by one of your peers from the course.
    • Use at least two readings support your arguments/claims.
  3. Essays must include in-text citations and a reference page in APA format.

if may help..

my description on my political cartoon:I chose this political cartoon because it reflects the trends of today’s democracy.We all know that democracy is defined as a form of government in which the people are the first and the highest authority. However, not everyone’s voice and opinion can be heard and considered. In addition, digital media become the main concern in people’s daily life. We can get informations and latest issues easily by turning on televisions and social medias. Also, media has become the main source of information transmission and value creation.  Through media,  we can be well informed about our community, countries and the world.But some media reports are not comprehensive, and they like to select news reports based on trends to achieve the highest attention rate. For example, negative news is always easier to catch people’s attention. Therefore, the media will filter the information to expose only a part of the information. Just like this political cartoon, there is obviously a large group of people representing positive information, but those journalists and the media only focus on negative information. So only negative information will be presented. This creates the wrong value and is misleading. Not only that,  in the first paragraph of Foa and Stryuk reading has also reflected such wrong situation.

“For four decades, Die Welt, one of West Germanys leading newspapers, refused to acknowledge the existence of an East German state. Since the papers editors expected the communist regime to collapse within a matter of years, they put scare quotes around its initials when- ever they discussed the German Democratic Republic (GDR). While other papers reported about the policies pursued by the GDR, Die Welt unfailingly wrote about the GDR.” (Foa and Stryuk, page 5).  This passage proves that the newspaper as a source of information transmission refused to acknowledge some informations. However, this behavior is wrong, and the information should be presented to the public fairly.

In this assignment you will use career and job search websites to research the field of social work. You will look in general at the field of social work and then zero in on specific areas and job titles of potential future jobs in which you might be interested. You are to find at least 3 real jobs you would be qualified for when you earn your BA degree and 3 more if/when you earn a MA degree. 

You are to write a 2 page paper that gives the following information for each job: Job title and description, location, pay, education needed, experience needed and any other information that might be interesting.

In the body of your paper discuss the field of social work in general.  What is the employment outlook like for this field?  Is it a demand job?  What is our local area like?  Will it be hard to find a job?  Will it be hard to find a job in the area in which you want to specialize?  What interested you about these jobs?  Besides finishing your education, what can you do to help get you ready to be hired as a social worker?

Intereste in some sort of cousnelor
mainly drug and alchol cousnelor
must be in areas: tulare ca, and near by there. 45 min away

Obviously, everybody has different skill sets. The goal of this lesson is not to become an Olympic volleyball player. Instead, it is to learn/improve some basic volleyball skills. For this assessment, you should experiment with your passing, serving, and setting. (Perhaps the local YMCA has pick-up volleyball games in which you could participate.)

After you have practiced each of these three skills, respond to the following questions in writing, for each of the three skills. Your essay should be at least 200 words.

What did you find most challenging about mastering this skill? Why?
What did you find easiest about mastering this skill? Why?
Assignment Guidelines:
Your answers should:

clearly demonstrate that you understand the discreet steps of the skills;
specify individual steps that you found both challenging and easy;
demonstrate your ability to effectively reflect on your own athletic abilities; and
be at least one paragraph, (double spaced-12 point font) for each skill.

 two examples of your work from within the last three (3) years (e.g. executive summary of a written report, slide presentation, memo, or other short no more than three pages written communications piece)
 

My experience :  full time student , Ashford University BA in Organizational Management  

Floral experience /employment  :   

Water outside

Scan out older product from yesterday markdowns 

Check for distressed plants flowers

Scan out unsellable product when necessary 

Make sure all fresh cut flowers are down in in water then pull out newer cut flowers from back cooler to fill up.

Clean and wash all rose buckets and bouquet buckets then fill up. 

Make arrangements if necessary. 

Fill balloon displays/ blow up new balloons if necessary

Check and water plants inside if necessary

Water seasonal plants such as Hydrangeas and Mums

Clean-up and straighten cooler for delivery truck next day. 

Sweep inside and outside

Fill up rose bouquets and growers choice display without over-packing buckets. 

Clean case /arrangement glass shelving.

Fill all supplies {latex balloons, ribbon clips, wire and other supplies if needed. 

Process truck. Start with plants, cut flowers, and then bouquet boxes, Price any new product that needs to be priced. 

Upgrade plants with bows if necessary 

Put expiration date that it expires on each bucket with marker and grower choice. 

Place all flowers and growers choice from closest date to further date

Volunteer service:   

  • Assist in rotating and stocking food pantry
  • Presort/organize clothes, and other items in the      thrift store 
  • Conducted cordial interactions with individuals      being assisted.
  • Assist elderly guest on Market Day
  • Pantry maintenance and stocking
  • Pre-sorting and presorting food goods
  • Planned and organized      events 
  • Created event      flyers/posters for the campus
  • Photography around the      campus for event flyers

reply to the below discussions with 250 words

1)  

  • Information Technology (IT) infrastructure is identified as a composition of software, hardware, network services and resources, and data centers (Vacca, 2013). IT infrastructure are important when it comes to the operation, existance, and management of enterprise information technology environment. It is understood that the weakest link in the security of an IT infrastruture plays a very important role in its success. When it comes to the secutiry of an IT infrastructure, the human element is considered as the weakest link. Even if the security of an IT infrastruture has a strong anti-virus software, firewall, cryptography, and intrusion detection system, it is only as strong as its weakest link. Human is to err is a common philosophical statement, and intrudors that want to take advanatge of an IT infrastructure are always waiting for this opportunity.   There are various strategies though that an organization may employ to reduce the risks possed, for exampe, organizations may engage in employee training to raise awareness of the various vectors of attack (Vacca, 2013). In addition, management of organizations may implement incentives which will encourage employees to take an active role and attention when it comes to matters security. Organizations may also engage in penetration testing and vulnerability assessment periodically in order to reduce the threat posture. In terms of costs, the whole process of mitigation of a data breach costs less than training and testing processes, and therefore it would be wise for any organization to carry-out the necessary steps in strengthening the weakest link.
    01:25
  • What is the weakest link in the security of an IT infrastructure?  The weakest link in security is the Humans. The chain is the security of the organization and its cyber defense is majorly independent and we already know the link of the weakest part in an organization’s security. As per the report, 78% of the security professional thinks the biggest threat to the endpoints in the security where peoples neglect among the employees’ security practices. Here the percentage also shows us 9.3% of the organization’s threats per month.  We are all humans and we do make mistakes and among these people there are a plethora of people who are always trying to take advantage of any mistakes made by other people which costs the business in financial loss. Any technology and security practices no matter how much sophisticated there will always be the errors made by humans.  How to reduce the vulnerabilities:  In-depth training should be provided to all the employees such that there will be total awareness on all the different attacks.  Any regular people risk assessments of the employees can reduce cyber risk in many ways can help the organization.  To use Hitech mechanism to the employees to keep the attention towards securities.  The periodic vulnerability assessments and penetration testing reduces the threat to the organization.  Many small businesses simply do not have the strict guidelines for creating the passwords in uniquely to all the online accounts. Employees are left to their own devices which always relying on the humans nature that simple develop a single and easy passwords that they use for the accounts that they have in the organization.  Enforcing the passwords management to combat the human errors, where many large companies IT departments force their users to create a complex passwords and builds their passwords not to be stolen easily and its easy to get a new password to create it.  Benefits: Improved Security, Reduced Information Theft, Enhanced Productivity, Compliance.

2) 

Attackers dont span a single way which helps them make their targets compromise. Their biggest weapon lies within the organization but not in the newest technology available in the market. This makes the weakest link in the information security. One such weakest is the emails and the system that manages email. Email is the source for most of threats like phishing, scams, ransomware and any such related malicious code. Even a single email which contains the confidential data goes out of the organization, may lead to the biggest threat and lowers the reputation of the organization. For this, employees should be given a training on what type of emails can be shared with their co-employees and what type of emails can be sent out of the scope of the company. Management should have access to the emails of their employees and should regularly monitor them. 

Some of the strategies that can be applied to reduce the effects of the emails are stated here. Users should be aware of the types of risks caused by the emails. Even if the user clicks the unsafe link unknowingly, that may lead to malware infection or that might give the attacker the access to the system. Humans are the primary cause that leads to email related breaches.  The phishing awareness and training program must replicate the various categories of methods and risks that spread over to other roles in the group so that individuals recognize accurately what to look in for. Just offering the training wont serve the purpose, management should ensure that employees understand their security aspects and are willing to apply in their real time projects.

Guidelines:
Summarize the particular content based on the provided template, but below are some basic areas that should be addressed if applicable:
1.    Basic/key Principles and Assumptions
2.    Strengths and Weaknesses of theoretical perspective
3.    Application to criminal justice or crime-reduction policy
Formatting:
Each page should be single space/ Size 12 font/Times New roman / 1 in. margins
    There are specific quotes or terminology that should be addressed.

I will also attached a thorough look of the instructions below as well as the reading.

Description of the assignment:
For this assignment you are asked to complete a literature review on one of the below topics. You are asked to critically review between 5-7 educational journal articles on your topic and write a 600-800 word literature review on the articles you’ve selected.
The topics are:
    Negotiation & Persuasion
    Team Productivity & Performance
    Creativity & Critical Thinking
    Cross Cultural Communication

Steps to complete your literature review:

1.    Choose a topic that you are interested in reviewing. It should be looked at as an opportunity to develop your skills in that area as well.

2.    Formulate an inquiry question that specifically describes what would like to know about your topic. For example, Discuss the barriers that hinder effective team productivity and provide ways of confronting and preventing those challenges in the future.

3.    Search for and locate academic journal articles and books that include your topic’s information.

4.    Select at least 5-7 academic journal articles to review. Read your articles and begin to sort and classify them according to their findings.

5.    Organize your articles by sorting and classifying their findings in a meaningful way, always considering your original topic and inquiry question.

6.    Write your review.