Ohio Christian University Imp

The Impact of Climate Change on Food Security

Overview

The United Nations (UN) has hired you as a consultant, and your task is to assess the impact that global warming is expected to have on population growth and the ability of societies in the developing world to ensure the adequate security of their food supplies.

Case Assessment

As the world’s population nears 10 billion by 2050, the effects of global warming are stripping some natural resources from the environment. As they diminish in number, developing countries will face mounting obstacles to improving the livelihoods of their citizens and stabilizing their access to enough food. The reason these governments are struggling even now is that our climate influences their economic health and the consequent diminishing living standards of their peoples. Climate changes are responsible for the current loss of biodiversity as well as the physical access to some critical farming regions. As such, these changes in global weather patterns diminish agricultural output and the distribution of food to local and international markets. These difficulties will become even more significant for these countries as the Earth’s climate changes for the worse. Temperatures are already increasing incrementally, and polar ice caps are melting, so the salient question is: what does this suggest for developing societies?

The issue before the developing world is not its lack of food, but rather how to gain access to food. Simply put, changes in our climate are affecting the global food chain, and hence, the living standards of entire populations. Added to this is the fact that food is not getting to where it is needed in time to prevent hunger or starvation. In many developing countries, shortages are due to governments’ control over distribution networks rather than an insufficient supply of food itself. In effect, these governments are weaponizing food by favoring certain ethnic or religious groups over others. When added to dramatic climate changes that we are experiencing even now, the future for billions of poor people looks increasingly dim.

Instructions

You are to write a minimum of a 5 page persuasive paper for the UN that addresses the following questions about the relationship between atmospheric weather patterns and food security in the developing world:

  1. Climate change and global warming are often used interchangeably, but they are not the same phenomenon. What are the differences between the two concepts and what leads to the confusion between them?
  2. In 1900, the average global temperature was about 13.7° Celsius (56.7° Fahrenheit) (Osborn, 2021), but as of 2020, the temperature has risen another 1.2°C to 14.9°C (58.9°F). According to the Earth and climate science community, if the Earth’s surface temperature rises another 2°C (3.6°F), we will suffer catastrophic weather patterns that, among other things, will raise sea levels, cause widespread droughts and wildfires, result in plant, insect, and animal extinctions, and reduce agricultural productivity throughout the world (Mastroianni, 2015 and Lindsey & Dahlman, 2020). How much credibility do you place in these projections? Why?
  3. There is no question that the Earth’s food sources are threatened by changes in its weather patterns, but what specific challenges does climate change pose to the food security of people in the developing world?
  4. There is currently a debate among some multinational lending agencies like the International Monetary Fund, UNICEF, and AID over the financial support for food security has been misused by recipient government officials. On the other hand, U.S. authorities insist that misuse of its assistance is not occurring because it has strict monitoring oversight in place. What is your position on this matter? Is there evidence that financial assistance to developing governments is being widely misused by government officials?

Guideline

  1. In order to earn full credit, your paper must be divided into at least four full pages of content (one page to address each of the four questions above), and include at least a one-half page introduction and a one-half page conclusion – making a minimum total of five full pages of text.
  2. You must use at least seven credible sources (excluding Wikipedia, dictionaries, and encyclopedias) that are appropriate for the subjects under discussion.
  3. You must use only double-spacing and not place extra spacing between paragraphs or section headings.
References

Liz Osborn. 2021. History of Changes in the Earth’s Temperature. https://www.currentresults.com/Environment-Facts/c…

Brian Mastroianni. 2015. Why 2 degrees are so important. https://www.cbsnews.com/news/paris-un-climate-talk…

Rebecca Lindsey and LuAnn Dahlman. 2020. Climate change global temperature. https://www.climate.gov/news-features/understandin…

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

SU Wk 5 College Student Focus

Steps to complete: In Week 5, complete and submit your assignment in Blackboard using the following steps: Step 1: New Word Document ● Open Microsoft Word. ● Create a new blank document. ● Type your name at the top of your letter. ● Type the date below your name. ● Address your letter as “Dear Professor,”. ● Save your letter in your Documents folder. (Note: It’s important to save your file before getting too far into your writing so that you don’t inadvertently lose any work. Then, Word will autosave for you—if you have Word set to autosave, that is!) Name the file: Lastname_CIS101_A1 Step 2: Navigate, Select, and Use (Paragraphs 1–4) Remember: Your goal is at the center of the DPP because it’s what each step in the process (Navigate, Select, Use, and Review) is working toward. Before beginning the first step of the DPP, you need to identify your goal, which is provided for you above in the “Your goal for this assignment is to” section. ● Paragraph 1: Share a little bit about yourself. (2–4 sentences) ● Paragraph 2: Share your experience, thoughts, and feelings about being a college student so far. What have you liked? What have you wished was different? What are you learning across your courses so far? (3–4 sentences) ● Paragraph 3: Share any lessons learned or goals that you have as they relate to pursuing a college degree. (2–4 sentences)CIS101 – Navigating a Digital World ● Paragraph 4: Search the Internet for two digital tools that are used for communicating virtually—one web conferencing tool and one instant messaging tool. Describe both tools and make sure you also share links to both websites. (2–4 sentences) Step 3: Review (Paragraph 5) ● State how learning the digital proficiency process has helped you to think about and use technology. (2–3 sentences) ● Conclude your letter with “Sincerely,”. ● Add 4 blank lines and then type your name. Step 4: Use – Formatting ● Right-align your name at the top of your letter. ● Right-align the date in the paragraph below your name. ● Left-align the rest of your letter. ● Single space the paragraphs of your letter. ● Bold the date of your letter. ● Select all of the text and change the font to Times New Roman. ● Select all of the text and change the font size to 12. Step 5: Use – Editing ● Use the Check Document feature in Word to find and correct any spelling errors. ● Proofread your letter and correct any grammar or capitalization errors.

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

MHE 509 TUI What Might Be Som

Discussion Requirements

A substantive comment should be approximately 300 words or more for the response (A total of 1 response).

Read the initial comments posted by your classmates and reflect upon them.

Before writing your comments:

  • Review the Discussion grading rubric to see what is expected for an excellent discussion, in order to earn full credit.
  • Review some resources to help you synthesize, such as the following:

Sullivan, J. (2011). Strategies for Synthesis Writing. Retrieved from http://www.findingdulcinea.com/features/edu/Strategies-for-Synthesis-Writing.html

NOTE: You are required to cite sources and include a reference list for the second post if it is simply your opinion. However, if your opinion is based on facts (as it should be), it is good practice to strengthen your position by citing sources.

Be sure to meet all of the criteria in the rubric, as noted in the instructions above.

Third post for each module discussion:

Read the initial and secondary comments posted by your classmates and reflect upon them.

Directly respond to at least one classmate in a way that extends meaningful discussions, adds new information, and/or offers alternative perspectives.

MY POST

Classmates and Professor,

Drones and Vulnerability Analysis

The use of drones has constantly risen over the past years due to their resilience. Drones can be used for different purposes: capturing images, surveillance, real-time video, transport of goods, and live stream. However, drones have come under a lot of scrutinies as they are not being used exclusively for the right reasons. Still, some individuals leverage this technology for hideous objectives. Drones are easy to manage and can be compromised to accomplish various attacks on unsuspecting individuals.

On the other hand, drones have many security susceptibilities that make them susceptible to hackers and hijackers. Therefore, drones’ vulnerability assessment needs to expound more on identifying and quantifying hazards that can affect the drawn systems, whether natural or derived from human interference. This is because the frequency and probability of UAV attacks are high and can have devastating and fatal effects.

For the vulnerability assessment study of drones to achieve its desired results, they should introduce new objectives. The first object should be to review the incidents to and from drones and the existing measures to counter these attacks. Another fundamental goal is to investigate the emerging risks presented by drones in cyber-attacks and efforts to reduce these attacks. The assessment should also focus on analyzing the exploitation of drone vulnerabilities on smart devices such as phones and tablets. Another objective should be to review the use of Unmanned Aerial vehicles (UAV) in different domains such as civilian, military, terrorism, and other additional purposes (Dolan & Thompson II, 2013). Another objective should be to assess the existing and emerging challenges that arise due to the concerns of safety, security and privacy while using drones or UAVs.

Despite the vulnerabilities, security, and privacy concerns presented by drones, we cannot deny the many benefits the technology has brought to society. The use of the technology is rising, and it is estimated that over ten thousand drones will be used commercially in the next five years (Yaacoub et al., 2020). The objectives presented above are geared towards developing a comprehensive plan to guide drone technology’s safety by identifying effective mitigating drones’ vulnerability and security measures. The goals will allow key stakeholders to adopt and develop new techniques and technologies to enhance drone attacks’ detection and protection. Besides, reviewing the current solutions and countermeasures used in the technology’s mitigation efforts will help identify the existing gaps in UIV technology. This information is crucial if we are to find lasting solutions to reducing drone vulnerability.

Pedro

References

Dolan, A., & Thompson II, R. (2013). Integration of Drones into Domestic Airspace: Selected Legal Issues. Fas.org. Retrieved 15 April 2021, from https://fas.org/sgp/crs/natsec/R42940.pdf

Yaacoub, J., Noura, H., Salman, O., & Chehab, A. (2020). Security analysis of drones systems: Attacks, limitations, and recommendations. Internet of Things, 11, 100218. https://doi.org/10.1016/j.iot.2020.100218

RESPONSE 1 (DO NOT ANSWER)

As a follow-up to your posting do you feel that there should be some type of controls / licensing required before drones are used?

THE ANSWER I RESPONDED:

Professor,

Yes, there is the need to have controls of how the drones are being utilized in different locations and purposes. The drones have been used for criminal activities such as thefts, where they study the geographical location of the area before carrying out the crime. Drones have also affected the privacy of people, making them feel insecure. It reveals how people live and their daily activities, which makes some feel unsecured. High usage of drones might also act as obstacles that can affect the signals of the airplanes, and without much control, more accidents of the airlines might be accepted. So it is important to have controls on where, how, and when to use the drones. The users are supposed to be restricted on the height to avoid confusion in the space(Clarke, 2014).

By licensing the use of the drones, the users will be restricted, and it will be easy to identify the drone that was used in a certain activity. The users will not be allowed to take information from restricted areas without approval from the government. This will help in promoting respect and dignity of the people as privacy will be enhanced. The use of drones will be minimized as people will be afraid to be caught using the drones illegally, leading to higher fines or imprisonment.

There should be clear policies on who is supposed to acquire a drone and how events the drones should be used. Huge fines need to be imposed on all those that will violate the policies since this will help in preventing the privacy of the people. The licensing will also help the security agents in keeping records of all the drones in a certain area and the people who have been given the responsibility of using them. If this is not considered, many people will acquire drones since the technology is improving, leading to more crimes (911-Security, 2020). The terrorists will also use them to invade the government institutions leading to mass destruction.

Pedro

Reference

911-Security. (2020). Drone Surveillance: How criminals are using drones to commit crimes. Retrieved from No Drone Zone Federal Aviation Administration: https://www.911security.com/blog/drone-surveillanc…

Clarke, R. (2014). The Regulation of Civilian Drones Impacts on Behavioural Privacy. Computer Law & Security Review, 30(3), 286-305. https://doi.org/10.1016/j.clsr.2014.03.005

NEW QUESTION: (PLEASE RESPOND):

What might be some ways to detect / prevent unlawful drone usage?

_____________________________________________________________________________________________________

Module 2 – Background

THE MILITARY PARTNERSHIPS

Required Reading

Dolan, A. M. and Thompson, R. M. (2013). Integration of drones into domestic airspace: Selected legal issues. Congressional Research Service. Retrieved from https://fas.org/sgp/crs/natsec/R42940.pdf
Read pp. 3-11.

FEMA IS-75: Military Resources in Emergency Management (2011). FEMA. Retrieved from https://training.fema.gov/emiweb/is/is75/student%2…
Read “Integration of Military Resources in Accordance with NIMS and NRF” pp. SM III-8 to SM III-21

The Posse Comitatus Act—fact sheet (2019, September 23), Section 1385 of Title 18, United States Code (USC). U.S. Northern Command. Retrieved from https://www.northcom.mil/Newsroom/Fact-Sheets/Arti…

2018 National Preparedness Report (2018). FEMA.gov. https://www.fema.gov/media-library-data/1541781185…/

Required Websites

American Red Cross: Terrorism Preparedness: http://www.redcross.org/get-help/prepare-for-emerg…

NORAD and U.S. Northern Command Posture Statement:
http://www.northcom.mil/Portals/28/Documents/2014%…

United States Northern Command. http://www.northcom.mil/

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

CMLIT 102W CUNY Queens Colleg

Analysis
of the novel Transit by Anna Seghers

Topic:
Storytelling and Closure

On
page 159 of Anna Segher’s Transit, the narrator says the following about a man
who was in the French Foreign Legion and has just told him his story, about
sailing to Africa and marching into the desert: “I knew that at this very
moment and at this table, my friend was about to bring this past life of his to
a close. For what has been told is finished. Only after he’s told someone about
his journey, will he have crossed that desert once and for all.”

Explain,
with the help of specific examples, how the statement: “For what has been told
is finished” applies to the nameless first-person narrator’s story: What are
his experiences, and how are they told to the reader as the novel develops?
What moments can you identify as part of a process that leads this narrator to
change his understanding of himself in the world? And how does he, gradually,
reach the point of closure as the story arrives at its being “finished”?

Be
sure to include direct quotations from the novel in your paper. Place the page
number in parentheses after the quote.

Format:
5 pages, 1.5 spaced, 12 point Times New Roman font, 1-inch margins, no spaces
between paragraphs, quotes over 3 lines should be indented and single-spaced.
add your own TITLE for your paper.

No
external resources!!!

The
following quotes may be helpful and You may choose a couple of these.

“Everyone
was fleeing and everything was temporary. We had no idea whether this situation
would last till tomorrow, another couple of weeks, years, or our entire lives.” Pg 38

“When
I realized that the blue gleam at the end of the Canebiere was the Old Harbor
and the Mediterranean, I felt at last, after so much absurdity, madness and
misery, the one genuine happiness that is available to everyone at any time:
the joy of being alive.” Pg 40

“I
felt ancient, thousands of years old. I had experienced all of this before. But
I also felt very young, and eager for all that was yet to come; I felt
immortal.” Pg 73

“I
was struggling to breathe. I didn’t want to get stuck at the bottom of the sea;
I wanted to die up above, together with the others like me.” Pg 80

“I
realized that I had to push the man away from the table, out of the pizzeria,
out of the city, and across the ocean, as quickly and as far as possible.” Pg 99

“A
leaf blowing in the wind would have an easier time finding its old twig again.” Pg
117

“I
value less glittering, less glorious passions more highly…this fleeting thing
called love…this most serious important thing in the world is so intertwined
with something so ephemeral and trivial…an obligation not to abandon or betray
each other. This is an integral part of that questionable, ephemeral,
transitory affair. But it is not questionable or trivial, or transitory.” –Seidler pg
129

“I
felt anxious, the way you do when a dream seems too real and at the same time
something intangible, imperceptible, tells you that whatever makes you feel
happy or sad can never be reality.” Pg
132

“In
my confusion, my foolishness, I even felt there was a secret understanding
between him and the dead man, and that both were silently laughing at me.” Pg
132

“Finally
he couldn’t bear the waiting any longer. Then they said to him: ‘What do you
think you’re waiting for? You’ve been in Hell for a long time already.’ That’s
what it’s been like for me here, a stupid waiting for nothing.” Pg 155

“God
himself, if there was one, would sooner take back a judgement, would sooner
give the lie to His own inscrutable wisdom.” Pg
170

“For the first time I was gripped by a powerful fear of being
left behind.”-Seidler
pg 185

“At
that point I gave up. I couldn’t catch up with the dead man. He’d hold on to
what was his forever, even in death and into eternity.” –Seidler pg
195

“For
the first time back then, I thought about everything seriously. The fast and
the future, both equally unknowable and also this ongoing situation that the
consulates call ‘transitory’ but that we know in everyday language as ‘the
present’.” Pg 199

“It’s
more likely that I’d get tired of waiting than that she’d get tired of her
search for a dead man who can’t be found.” Pg
204

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

UN Supply Chain Management Es

  1. Supply-Chain Management
    Source: Adapted from Gary J. Zenz, Purchasing and the Management of Materials, 7th ed. (NY:John Wiley, 1994), pp. 623-624.

    Factory Enterprises, Inc.
    Factory Enterprises, Inc., makes automobile air conditioners for car dealer installation. The firm owns the patents and makes the product at a sizable markup. As a result, the 20-year-old company pays its private owners very well.
    The enterprise shows growth in overseas sales at the very time that domestic market demand is exploding. This exhausting situation calls for total effort by all company personnel: 8 managers and supervisors, 30 factory workers, and 6 office employees.
    In addition to their regular duties, various people purchase materials and component parts. The production manager buys finned radiators and copper tubing. The shipping supervisor buys mounting assemblies, to which workers attach all of the component parts in the final process. The sales manager buys shipping cartons.
    You have just joined the company as the purchasing manager.

    Questions:
    1. Describe for the president the materials management concept. What would it do for the company and what would it do to the company?

    2. What action steps would you follow to install the material management concept if the president decides to adopt it?

    3. Explain how sales and purchasing can help each other by establishing a good relationship.

    4. European customers insist on ISO 9000 compliance. How should the company respond?

    Note:
    Responses should consist of an in-depth analysis, discussing long-range opportunities and consequences for actions taken by the company in question. Reference Chapter 10 (Supply Chain Management) for support information.Answer the questions above in the form of a 3-4 page business letter to your company president (Mr. Foley). Your task is to convince and persuade Mr. Foley that you, the “new person” can improve upon the success he has already achieved by changing operational relationships, perhaps upsetting other managers, and investing capitol in programs that might not otherwise be considered. The letter should be single-spaced within paragraphs but with a single space between paragraphs – with a 12-point font.

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

ITS 481 Colorado State Univer

Option #1: Final Capstone Portfolio Project – Essay

If you completed the written portions during the previous modules, this is the appropriate option for you.

This is the culmination of your portfolio project. Utilize all of your previous information that you have compiled in your portfolio milestones and write a final addition by writing 2-3 paragraphs discussing the possibility of a cloud integration for part of your cybersecurity process.

Once you have finished adding this final piece, take some time to compile all the pieces from your portfolio milestones together and making them one integrated paper using the various other papers you have written over the past several weeks.

Your final capstone paper should be a 8 page paper (not including the references) that discusses your project in its entirety and showcases the cyber paradigms that you would make use of in the inception of this process.

Your paper should be well-written according to the CSU Global Writing Center (Links to an external site.). Include a reference page that includes all the references you used to write all the pieces to your capstone project. There should be at least eight sources in addition to any course resources you plan to use.===================================================================================================

Option #1: Capstone Essay

This week for your capstone portfolio project, you will develop a two page summary discussing the development processes in your project. Whether this be the utilization of customer off-the-shelf software in conjunction with a few script modules or a full-blown development project, it is necessary for you to discuss what would be needed to secure the application in conjunction with your systems, infrastructure, and processes. Ensure you include a summary of what you would do and how you would do it based upon what you’ve learned this week.

Your paper should be 2 pages in length and must be well-written according to the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these references.==================================================================================================

Choose one of the following two assignments to complete this week. Do not do both assignments. Identify your assignment choice in the title of your submission. To learn more about the Capstone Project please visit Module 8.

Option #1: Capstone Essay

This week, in order to further enhance your capstone project, you will be planning out the assessment of how your system processes and transitions messages. Whether this be through SMTP and email or SMS, it will be necessary for your system to create some sort of process that can alert individuals for problems and basic info.

Write a one-page paper that describes what sort of alerts and general texts would be created and how they would be sent through the network.

Your paper should be 1 page in length and must be well-written according to the CSU Global Writing Center (Links to an external site.). Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these references.===================================================================

Option #1: Capstone Essay

This week for your capstone portfolio project, now that you have discussed hardware, software, scope, and other processes, it is important to begin a discussion on access to the system and authentication. How will you ensure that individuals have access to only what they need?

Using what you learned about authentication and session, write a 2 page paper describing what you would utilize to keep individuals in their appropriate role-based access as well as protecting the confidentiality and integrity and authorization methods inside your project.

Be sure to use what you learned this week in conjunction with your previous weeks materials to complete this milestone paper.

Your paper should be 2-3 pages in length and must be well-written according to the CSU Global Writing Center. (Links to an external site.) Include at least two scholarly references in addition to the course textbook. The CSU Global Library (Links to an external site.) is a good place to find these references.=================================================================================================

Option #1: Propose a Security Policy for an Organization

Preparation: Choose a real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, services, activities, and/or operations. If you work in an organization or field that could benefit from an information network security policy, you might have chosen that company to apply the project to it.

Assignment: Prepare a well-written security policy proposal for your organization that utilizes the concepts learned in the course as a basis for your analysis and policy.

Make sure that your proposal includes these basic elements of a good security policy:

An introduction that describes your organization, its mission, products/services, technical resources, and technical strategy.

Analysis of the organization’s relationships to its clients/customers, staff, management, and owners or other stakeholders.

A vulnerability assessment.

Your security policy recommendation should:

Propose remedial measures as appropriate to the situation. These might include firewall/gateway provisions, authentication and authorization, encryption systems, intrusion detection, virus detection, incident reporting, education/training, etc.

Propose a code of ethics or code of practice to be applied within the organization.

Propose legal/compliance requirements and describe how they will be met.

Propose a security policy statement/summary.

Important: You must justify every element of your proposal in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (how it is good for the organization and why it is good for customers, users, or employees, or the public). You should also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation.

Your paper should be 8-pages in length and conform to APA guidelines in the CSU Global Writing Center (Links to an external site.). Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. The CSU Global Library is a good place to find these references.

Recommendation: You should review Chapter 4 in the course textbook and apply the knowledge therein to planning and drafting the Portfolio Project.

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

GEOL 1305 University of Houst

Calculate the Rate of Seafloor Spreading from the Age of the Seafloor

TECTONIC PLATES ON EARTH move relative to one another, diverging along mid-ocean ridges, converging along subduction zones, and sliding past one another on transform faults. Relative movement of the plates causes most earthquakes and volcanic eruptions and explains the present distribution of continents. A key aspect of plate tectonics involves seafloor spreading, where two plates move apart relative to one another, generating new oceanic crust in the process.

Figure 1 shows the age of seafloor as determined by the measuring of the magnetism and assigning ages by comparing the magnetic patterns to the geomagnetic timescale. Ages

are also determined by collecting and dating samples of rocks and sediment from the seafloor. The youngest seafloor is colored orange, intermediate ages are yellow and green, and the oldest is blue and purple. No seafloor is older than 200 m.y. old because older seafloor has been subducted into the mantle at some point in the past.

Mid-ocean ridges are represented by the dark lines within the most recently formed seafloor (shown in orange). Note how the color patterns representing the age of seafloor are symmetrical with respect to most mid-ocean ridges, such as those in the Atlantic Ocean. The age patterns are locally truncated in the Pacific Ocean where subduction has consumed the eastern part of so e plates. Examine the patterns in each ocean.

Analysis and communication

1. Can you tell which ridge segments are spreading more rapidly than others? (Write a complete answer by using subjects, verbs and appropriate explanation)

We can determine the rate of seafloor spreading if we know the width of oceanic crust that has been generated in a specific length of time. Width divided by time is the rate of spreading:

Spreading Rate = Width of Oceanic Crust / Time During Which That Crust Formed

For example, if a width of a belt of oceanic crust is 80 km, and it took 10 m.y. to form that crust, the equation is:

Spreading Rate = 80km wide/10m.y. duration = 80 km/m.y.

For seafloor spreading, we generally refer to rates in centimeters per year, so we need to convert our units from kilometers (km) to centimeters (cm) and from million years (m.y) to years (y). To convert km to cm:

1 km = 1km · 1,000 m/1km · 100cm/m = 100,000cm

so we multiply km by 100,000 (1 x 105) to get centimeters. To convert millions of years into years, we multiply our value for m.y. by a million (1,000,000 or 1 x 106). The spreading rate equation becomes:

Spreading Rate (cm/yr) = [width (km) · 100,000 cm/km]/[Duration (m.y.) · 1,000,000 (yr/m.y.)]

When you cancel out the zeros (100,000 over 1,000,000) there is one zero left over in the denominator, so to get from km/m.y. to cm/yr, we simply have to divide by 10. Thus, the total process is:

1 – measure the width in kilometers;

2 – note how long it took that oceanic crust to be formed (the duration);

3 – divide the width by the duration;

4 – divide by 10 to get cm/yr.

For our example the result is 8 cm/yr, a typical rate.

Spreading Rate = 80km wide/10m.y. duration = (80 km/m.y.)/10 = 8.0 cm/yr

Representation and manipulation

On the map in Figure 1 there are thick lines across mid-ocean ridges in the Atlantic Ocean (A-D) and Pacific Ocean (E and F).

Table 1 lists widths represented by each line and the duration over which the oceanic crust within that width was formed. Calculate the spreading rate in cm/yr for each line, show your calculations and write your answers in the table.

Table 1. Spreading rates of the oceanic floor

Line Width

(km) Duration

(m.y) Spreading Rate (cm/yr)

A 1050 55

B 5850 180

C 4530 120

D 6130 135

E 3350 20

F 5420 100

2. My calculations:

Analysis, assumptions and communication

3. Which part of the Atlantic Ocean opened first and is that segment’s spreading rate faster slower or the same as those for the other three lines across the Atlantic? When writing your answer use appropriate grammar and use the data in the table to support your statements.

4. How do the two spreading rates for lines C and D compare? Can you explain the difference in rates and why the age widths (and ocean) widen to the south? When writing your answer use appropriate grammar and use the data in the table to support your statements.

5. How do the spreading rates in the Atlantic Ocean compare with those in the Pacific Ocean? When writing your answer use appropriate grammar and use the data in the table to support your statements.

6. The correctness of this exercise relies on a series of assumptions. Order them by the most (1) to the least (5) important:

[_] The endpoint of every line in Figure 1 at some time in the past were in the same location

[_] The spreading rate that we compute is an average between burst of higher activity and dormant phases

[_] The same geologic processes as today occurred millions of years ago

[_] Dating method of the ocean seafloor are reliable

[_] The location of plate boundaries is accurate

Interpretation, analysis and communication

– Look carefully at the location and distribution of colors along the line F

– Look carefully at the location and distribution of colors along the line C

One line is in the northern part of the Pacific Ocean and the other line is in the Atlantic.

7. Use two concept sketches to show the geometry of plate boundaries along line F and line C. Can you identify the spreading centers, the location of a subduction zone and passive margins? Remember to include labels and short sentences explaining the key geologic processes.

[Take pictures of your sketches and insert them on this document. Add pages as needed, make sure all the labels and sentences are clearly readable. If you prefer you can draw on a printed version of this file.]

Concept sketch 1 – Plate boundaries along line F

Concept sketch 2 – Plate boundaries along line C

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

Writing Question

ASSIGNMENT EXPECTATIONS

Write an organized and well-supported essay (no less than four pages in length) with an original thesis statement that finds connections among the concepts addressed in Modules 1-4.

Proofread the essay for errors in grammar, diction (word choice), punctuation, and spelling.

Assignment Overview

Case 4 is an essay in which students will communicate using their own thoughts, words, and ideas to demonstrate their ability to interpret text and organize ideas. In addition, the student will demonstrate the ability to integrate others’ words and ideas coherently into one’s own writing, using APA Style format.

More specifically, students will document their professional and educational journey, and construct an evidence-based narrative that displays future strategic plans for professional growth in relation to education and career.

Case Assignment

Case 4 is a final essay – a culmination of the course in which students consider their SLP responses as well as Case 3, as they answer the question, Where am I going and how have my work and educational experiences impacted the journey?

As a reminder, the SLP’s addressed:

  • The ways in which all of your past work experiences have shaped who you are today, preparing you for your educational and/or career plans.
  • The ways in which your educational experience at Trident has shaped influenced and shaped you, preparing you for future educational and/or career plans.
  • The ways in which the assigned readings and videos have influenced and/or impacted you as you consider your educational and/or career plans.
  • Your personal educational and/or career goals. What’s next and how are you going to get there? What excites you? Will there be barriers? If so, how will you overcome them? How do finances play a role? Do you have a support system? What is the timeline and where do you see yourself two, four, eight years from now?

Case 3 addressed concepts such as stereotype, hiding, courage, generosity, humor, reality, worst moments, good life, and problems as they related to your own life experiences – past, present, and/or future – growing up, family, relationships, education, work, military, etc.

A well-organized essay has a beginning, middle, and an end. Much of what you have already written will make up the body of the essay. Still, one must think of the best way to organize it and tie it all together in an orderly fashion for the reader. In addition, an introduction much be written to attract the readers’ attention and include a thesis that states the main point of the essay. What is your message to the reader based on all you have read and written in this session? Finally, the essay must close with a conclusion that not only summarizes the main point of the essay, but may also provide some advice, based on your years of experience.

As always, be sure to proofread your essay and edit for proper grammar, punctuation, diction (word choice), and spelling, as errors in sentence skills will lower a final grade. A grade will be determined based on the Module Case expectations and the Trident University General Education rubric for English.
Papers must be double-spaced in Times or Times New Roman font (12 cpi) with standard one-inch margins.

When citing secondary source material within the essay, APA Style citations and a Works Cited page are required.

Assignment Expectations

Write an organized and well-supported essay (no less than four pages in length) with an original thesis statement that finds connections among the concepts addressed in Modules 1-4.

Proofread the essay for errors in grammar, diction (word choice), punctuation, and spelling.

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

Grossmont College President B

there are 5 different assignments where each one needs 250 words answer based on videos provided.

1:

Watch President Joe Biden’s inauguration address delivered on January 20, 2021.

In 250 words or more answer the following questions:

Were any of the five major themes of American religious and political life (i.e., the Puritan temper, religious freedom and pluralism, the evangelical dimension, the populist dimension, and/or spiritual and religious individualism) event in the speech? If no themes were present or some were, how might you, if you were the speech writer, incorporate one or more or a mix of the themes in to enhance or alter the speech to mark the special occasion?

(Hint: Be sure to reread Fowler, “Religion and Politics in America: The Historical Legacy to the Present,” pp. 1-23)

This post-synchronous lecture assignment is due between 3 p.m. on January 25 and 3 p.m. on January 27.

(After you submit your work within the timeframe you’re supposed to post, you’ll receive the participation point in your gradebook after the due date has passed).

Video

2:

Watch the “God’s Christian Warriors: Evangelicals” videos, part 1 and part 2.

In 250 words or more answer the following questions:

How would you describe Jerry Falwell’s brand of evangelism compared to the various styles or branches of evangelical Protestantism? What are possible pros and/or cons of the evangelical attitude toward politics and society from your point of view? If you attended a private religious institution like Liberty University, like students in the video, how do you think your own worldview, thinking, and values might be different, if at all, than they are now?

[Hint: reread Fowler, “Christianity and Its Major Branches,” pp. 25-54,188-191]

This post-synchronous lecture assignment is due between 3 p.m. on February 1 and 3 p.m. on February 3.

(After you submit your work within the timeframe you’re supposed to post, you’ll receive the participation point in your gradebook

Videos

https://www.youtube.com/watch?v=6uD86cieOaU&t=2s

https://www.youtube.com/watch?v=29slkz48Vic

3:

Watch the “God Bless America” videos, part 1 and part 2.

In 250 words or more answer the following questions:

How would you describe President Obama’s and liberal/progressive Democrats’ approach to or style of religion compared to the various styles or brands seen in the conservative, evangelical Protestantism? What are possible pros and/or cons of the liberal/progressive attitude toward religion, politics, and society from your point of view? Can religion and politics properly address or be the answer for the major problems facing American society and the world today from your point of view? If so, how so? If not, why not?

[Hint: reread Butler, “The New Century,” pp. 311-324 and “The Age of Militancy,” pp. 325-342]

[Hint: review Fowler, “Christianity and Its Major Branches,” pp. 25-54,188-191]

This post-synchronous lecture assignment is due between 3 p.m. on February 8 and 3 p.m. on February 10.

(After you submit your work within the timeframe you’re supposed to post, you’ll receive the participation point in your gradebook after the due date has passed).

Video

https://www.youtube.com/watch?v=Z4VX-jI0sz0

https://www.youtube.com/watch?v=PCDvpZRjQzo&t=2s

4:

Write a 250 word or more response to one of the following questions

(i.e., there are five questions in total below, you only need to answer one of them):

[Hint: Reread Fowler, “Gender, Religion, and Politics” (pp. 275-299)]

  1. What is the value of understanding gender in religion and politics in the U.S.?
  2. How would you outline the religious women’s diverging perspectives on American politics?
  3. What are pros and cons of women’s ordination in your estimation?

[Hint: Reread Butler, “Religion in the Age of Upheaval” (pp. 382-399)]

  1. What does the idea of “religion in the age of upheaval” suggest to you?
  2. How does this chapter relate to other chapters or topics in the class?

Answer an be based from your own understanding.

5:

Write a 250 word or more response to one of the following questions

(i.e., there are five questions in total below, you only need to answer one of them):

Fowler, “Latino and African American Religion and Politics”

(pp. 249-273)

  1. How would you compare the Latino and African American experience regarding religion and politics in America?
  2. What can you surmise from either the Latino religion or the African American experience in American political life?

Butler, “Religion in the New Frontier”

(pp. 363-381)

  1. What is the main idea of the chapter in your estimation?
  2. What do you remember about the “Autobiography of Malcolm X”?
  3. What can you infer from the concept of religion in the “new frontier”?

Answer can be based from your own understanding.

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized

Walden University Healthcare

Assignment: Assessing a Healthcare Program/Policy Evaluation

Program/policy evaluation is a valuable tool that can help strengthen the quality of programs/policies and improve outcomes for the populations they serve. Program/policy evaluation answers basic questions about program/policy effectiveness. It involves collecting and analyzing information about program/policy activities, characteristics, and outcomes. This information can be used to ultimately improve program services or policy initiatives.

Nurses can play a very important role assessing program/policy evaluation for the same reasons that they can be so important to program/policy design. Nurses bring expertise and patient advocacy that can add significant insight and impact. In this Assignment, you will practice applying this expertise and insight by selecting an existing healthcare program or policy evaluation and reflecting on the criteria used to measure the effectiveness of the program/policy.

To Prepare:

  • Review the Healthcare Program/Policy Evaluation Analysis Template provided in the Resources.
  • Select an existing healthcare program or policy evaluation or choose one of interest to you.
  • Review community, state, or federal policy evaluation and reflect on the criteria used to measure the effectiveness of the program or policy described.

The Assignment: (2–3 pages)

Based on the program or policy evaluation you selected, complete the Healthcare Program/Policy Evaluation Analysis Template. Be sure to address the following:

  • Describe the healthcare program or policy outcomes.
  • How was the success of the program or policy measured?
  • How many people were reached by the program or policy selected?
  • How much of an impact was realized with the program or policy selected?
  • At what point in program implementation was the program or policy evaluation conducted?
  • What data was used to conduct the program or policy evaluation?
  • What specific information on unintended consequences was identified?
  • What stakeholders were identified in the evaluation of the program or policy? Who would benefit most from the results and reporting of the program or policy evaluation? Be specific and provide examples.
  • Did the program or policy meet the original intent and objectives? Why or why not?
  • Would you recommend implementing this program or policy in your place of work? Why or why not?
  • Identify at least two ways that you, as a nurse advocate, could become involved in evaluating a program or policy after 1 year of implementation.

By Day 7 of Week 10

Submit your completed healthcare program/policy evaluation analysis.

Order this or a similar paper and get 20 % discount. Use coupon: GET20

 

Posted in Uncategorized