Mod 5 Project- Researching topic
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
Q3580
Subject
Computer Science
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by DeanHeatBoar24
1
Module 5: Project Draft- Researching your topic
Riley Lutz
Global Campus, Southern New Hampshire University
IDS-100-R4202: Perspective in Liberal Arts
Professor Kelly Nolan
04/01/2022
2
What I know:
For me personally, I have not dealt much with our justice system much if at all. Maybe get a parking citation or fix it ticket for a busted headlight once but other than that, I tend to try to keep to myself and stay out of trouble. But I have had a personal experience working in health care with a male African American coworker who most of our patients would refuse care from due to personal views and opinions. On the days that I worked with this specific person, the other
staff and I knew that we would have to trade tasks through out the day to accommodate our patients. Breaking this experience down through the four lenses I can see that through the history
and humanities lenses, most of these older patients were not comfortable having a male employee let alone an African American person in their room. They didn’t feel comfortable and had thoughts that this employee would steal their belongings or abuse them. Through the social science lens, one can see how the patients were responding to having a colored employee helping
them and refused the assistance by asking for a different caretaker. Through the natural science lens, at the time I tried to study the patients’ reactions and try to find ways to make them more comfortable in the situation to allow my coworker to assist them. Reassuring them that my coworker was highly skilled and would not be an on staff if they were a thief. What I want to know:
Knowing what I knew prior this assignment, I have some questions that I really would like to know: Why are incarceration rates so high compared to other countries? How much of the incarcerations are drug related? What happens to all the drugs, money, and other contraband that gets confiscated from a drug bust by the police? What type of affect do famous people have on our communities in relation to racism and discrimination? And finally, how can one be
3
confident in a defense attorney and their knowledge of forensic science to help them win their case?
What I have learned:
For the total amount of incarcerations between 1985 and 2000, most of the convictions were drug related with two thirds in the federal system whereas at the state level it was more than
half (Alexander, 2011. Pg 11). Having such high rates of drug incarcerations made me wonder if there is an underlying motivational factor to making arrests with drug busts. According to the federal drug forfeiture laws, states and local law enforcement agencies are allowed to keep up to 80% of cash, cars, and homes seized from drug suspects. (Alexander 2011. Pg 18). With all the additional money coming in from those seizures, you would think that the police force would not
only be motivated to get more drugs off the streets but also bring in extra cash to put towards special projects, additional training, and more staff. At least, that’s what I can see as an outsider. Although, how is one supposed to trust that their lawyer is doing everything that they can
to defend them? From education conferences, polls showed that roughly 5% of lawyers and judges studies science
(Epstein, 2016, p.
2
). What are the odds that everyone would get lucky enough to have a defense counsel that it knowledgeable enough to prove their innocence? The way I see it, zero to none. That sure gives me a load of confidence if I were to ever find myself in
a sticky situation. As far as famous singers and song writers, In today’s day and age, much of our population listen to a variety of music. Ranging from country to hip hop and R&B. I’ve seen it take less than 24 hours for a new song to be released and it have close to 1.5 million listens on any given streaming service or platform. Following George Floyds murder back in 2020, there
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
TO: All Staff
FROM: Jake Ryan, Director, Product Development
DATE: October 23, 2018
SUBJECT: Launch of Product XYZ
Due to extensive customer feedback, and the results of current testing, I wanted to inform you that Product XYZ will be delayed from its original launch date of November 15th, until Q1 2019.
We are confident that time for additional testing will serve to make XYZ more effective in fighting security breaches that customers are facing. For those customers that you believe will now consider a competitor's product, the marketing department is developing a promotional offering, which sales reps can share with their customers to help reduce those who will now go to our competitors.
As disappointing as this news may be, we are confident in our employees, and know the additional time will serve this company well by creating a more successful product.
arrow_forward
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
Listen to the podcast and briefly answer the below questions with
Don’t Panic: The Unit 42 Podcast
Link to the podcast hxxps://unit42.libsyn.com
1) What you learned about this InfoSec topic?2) What further questions you have about this InfoSec topic?3) If you are interested in delving deeper into this InfoSec topic. Why or why not?4) If you think you'll listen to this podcast (or read this blog) in the future. Why or why not?
arrow_forward
"Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning
Please: Don't use Chatgpt
arrow_forward
10
DO NOT COPY FROM OTHER WEBSITES
Correct and detailed answer will be Upvoted else downvoted. Thank you
arrow_forward
Please help me with. I dont understand what to do
Make a university 2nd year type Essay: is an academic paper specifically examining a relevant topic. You are free to write on any relevant issue of the course subject. The suggested topics are: government policy on uniting efforts of the state, business, and society in a country of your choice in dealing with any of the following issues: eradicating poverty and hunger; providing for quality education, good health and well-being; gender equality; decent work and economic growth; sustainable cities and communities; peace, justice, and strong institutions; clean energy; industry, innovation and infrastructure; reducing inequality; climate action; clean water and sanitation; responsible consumption and production. The minimum number of references is six including two books and four academic journal articles (other than the articles required or recommended as the readings in the syllabus). Feel free to additionally refer to other sources of…
arrow_forward
Writing Assignment 9
8/4/2024
10 Points Possible
Attempt 1
In Progress
NEXT UP: Submit Assignment
Add Comment
Computer technology has both advantages and
disadvantages for their users and for society in
general. What do you think are the biggest
advantages and the biggest disadvantages?
Explain.
Write a 4 paragraph essay answering this
question.
Reminders:
1. Write a paragraph introducing the topic with
a thesis statement as the last sentence.
2. Write two body paragraphs answering the
topic with details. (one paragraph for
advantages, one paragraph for disadvantages)
3. Write a conclusion with the thesis statement
arrow_forward
Ten questions are asked. Don't attempted I've recently received a slew of incommplete responses, which is extremely frustrating. Please don't squander your or my time. If you are unable to answer of my questions, please disregard them. I don't want to squander my paid-for post-question time. Also, if you continue to give me incompplete answer, I will give you a thumbs down and will complain. Thank you very much.
1. Why is assembly language not usually used when writing large application programs?
2. Assume that you have three 8-bit storages (memory) named A, B, and C to store binary numbers. Memory A contains 10100100 and memory B contains 10110101. Compute A+B and store the value in C register. What is the content of register, C after the computation? Show the computation in details with carries.
3. Assume that you have 4-bit storage to store the numbers. Calculate the following operations using two's complement method. Show all the computations in details. (assuming 4-bit…
arrow_forward
Computer Science
The time has come to take control of your family business. After years of hard work at IE University, your parents believe you are ready to tackle the big challenge of transforming your company. They've heard that a new trend called digital transformation is here to stay; and that those companies that don't address this transformation run the serious risk of falling behind or even disappearing. Fortunately, they are counting on you, and they know that you have acquired the vision and experience to successfully meet this great challenge. The current company Your company is a chain of 10 restaurants operating in the 10 main cities of Spain (Madrid, Barcelona, Seville, Valencia, Malaga, .....). Your restaurants offer Spanish food with high quality products, but your family would like to incorporate certain changes in order to adapt to the new times and internationalize the business. The company has 150 employees and all the processes involved continue to be done in a…
arrow_forward
Have you ever seen an instance of internet bullying or harassment? To begin with, how did
you feel when you found out about the situation? How did you determine that the person
had been the victim of bullying before you got involved?
arrow_forward
Computer Science
In order to get more familiar with decision support systems, business intelligence, analytics, and knowledge management, I'd like you to do an Internet search to find an article either about a specific decision support system or a type of DSS that you find interesting. Read the article, and then once you've read it, provide a summary (1-3 paragraphs) of the content of the article and why you found it to be interesting. Make sure to include a link to the article in your post
arrow_forward
The use of the Internet as a forum for expressing one's right to free speech has become more significant in recent years. Both Facebook and Twitter are being used by a diverse range of individuals and organizations to facilitate the dissemination of hate speech. Should there be no restrictions put on what people may say in online discussion forums? Where should the line be drawn when it comes to restricting hate speech on social media?
arrow_forward
Have you ever observed someone being harassed or bullied by someone else over the internet? What was your first reaction when you found out about the situation? How did you arrive at the judgment that the person had previously been the target of bullying behavior prior to your intervention?
arrow_forward
Introduction to Computing Group Activity
Can Data Predict Your Grade?
background
As you move through your academic career, you leave an enormous swath of data: which courses
you chose to register for; which ones you looked at but didn't pick; and how you did on each
homework assignment, test, and project. Could this massive amount of data be analyzed to predict
your grade in a course? Could the data suggest which courses you should take next? Should those
predictions be public to your instructor, to you, and to financial aid officers?
research topics to consider
• Course Signals
• Degree Compass, Austin Peay State University
process
1. Divide the class into teams. Each team will select a webbased tool that allows access to
information.
2. Team members should each think of a situation where a person would benefit from the type
of results data mining can bring to a campus and a situation where it might be undesirable.
3. Team members should select the most powerful and best-constructed…
arrow_forward
Please help me with I dont understand what to do
Make a university 2nd year type Essay: is an academic paper specifically examining a relevant topic. Write about the government policy on uniting efforts of the state, business, and society in a country of your choice in dealing with any of the following issues: eradicating poverty and hunger; providing for quality education, good health and well-being; gender equality; decent work and economic growth; sustainable cities and communities; peace, justice, and strong institutions; clean energy; industry, innovation and infrastructure; reducing inequality; climate action; clean water and sanitation; responsible consumption and production. The minimum number of references is six including two books and four academic journal articles (other than the articles required or recommended as the readings in the syllabus). Feel free to additionally refer to other sources of relevant information including mass media, policy papers, etc. It is very…
arrow_forward
legal aspects of cybersecurity
Taissa, Sophie, Natalie, Misty, and Jackie all share a house in downtown Dayton. Duringthe great blizzard of 2023, all five co-habitants were snowed in and quickly ran out offood. Jackie tried to leave the house to get food, but quickly fell in the snow. Jackie’sroommates then murdered Jackie, and ate some of her remains to survive. Now the snowhas melted, and the girls are worried about the police finding out what they did.
Taissa wants to keep some evidence to blackmail her friends just in case things turnsour in the future. Whenever the girls discuss Jackie’s murder, Taissa surreptitiouslyrecords the discussions on her iPhone without anyone else knowing. Which of thefollowing best describes Taissa’s actions?A. Taissa committed an unconstitutional act.B. Taissa violated the Wiretap ActC. Taissa violated the Electronic Communications Privacy ActD. Taissa’s actions recording her friends are legal in most states.
arrow_forward
legal aspects of cybersecurity
Taissa, Sophie, Natalie, Misty, and Jackie all share a house in downtown Dayton. Duringthe great blizzard of 2023, all five co-habitants were snowed in and quickly ran out offood. Jackie tried to leave the house to get food, but quickly fell in the snow. Jackie’sroommates then murdered Jackie, and ate some of her remains to survive. Now the snowhas melted, and the girls are worried about the police finding out what they did.
Natalie has had enough. She takes Jackie’s remains, throws them in a black, thick,hefty bag, and tosses them into the Rumpke dumpster she wheels from the side of thehouse, past the fence surrounding her house, and onto the curb in front of her house thenight before trash collection. Police have been waiting in a car on the street andimmediately search the hefty bag as soon as Natalie goes inside the house. Police findthe remains, obtain a warrant for the home, and arrest the girls. Did the police commitany Fourth Amendment…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education
Related Questions
- TO: All Staff FROM: Jake Ryan, Director, Product Development DATE: October 23, 2018 SUBJECT: Launch of Product XYZ Due to extensive customer feedback, and the results of current testing, I wanted to inform you that Product XYZ will be delayed from its original launch date of November 15th, until Q1 2019. We are confident that time for additional testing will serve to make XYZ more effective in fighting security breaches that customers are facing. For those customers that you believe will now consider a competitor's product, the marketing department is developing a promotional offering, which sales reps can share with their customers to help reduce those who will now go to our competitors. As disappointing as this news may be, we are confident in our employees, and know the additional time will serve this company well by creating a more successful product.arrow_forward"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events. Hint: Please don't use chat gptarrow_forwardListen to the podcast and briefly answer the below questions with Don’t Panic: The Unit 42 Podcast Link to the podcast hxxps://unit42.libsyn.com 1) What you learned about this InfoSec topic?2) What further questions you have about this InfoSec topic?3) If you are interested in delving deeper into this InfoSec topic. Why or why not?4) If you think you'll listen to this podcast (or read this blog) in the future. Why or why not?arrow_forward
- "Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning Please: Don't use Chatgptarrow_forward10 DO NOT COPY FROM OTHER WEBSITES Correct and detailed answer will be Upvoted else downvoted. Thank youarrow_forwardPlease help me with. I dont understand what to do Make a university 2nd year type Essay: is an academic paper specifically examining a relevant topic. You are free to write on any relevant issue of the course subject. The suggested topics are: government policy on uniting efforts of the state, business, and society in a country of your choice in dealing with any of the following issues: eradicating poverty and hunger; providing for quality education, good health and well-being; gender equality; decent work and economic growth; sustainable cities and communities; peace, justice, and strong institutions; clean energy; industry, innovation and infrastructure; reducing inequality; climate action; clean water and sanitation; responsible consumption and production. The minimum number of references is six including two books and four academic journal articles (other than the articles required or recommended as the readings in the syllabus). Feel free to additionally refer to other sources of…arrow_forward
- Writing Assignment 9 8/4/2024 10 Points Possible Attempt 1 In Progress NEXT UP: Submit Assignment Add Comment Computer technology has both advantages and disadvantages for their users and for society in general. What do you think are the biggest advantages and the biggest disadvantages? Explain. Write a 4 paragraph essay answering this question. Reminders: 1. Write a paragraph introducing the topic with a thesis statement as the last sentence. 2. Write two body paragraphs answering the topic with details. (one paragraph for advantages, one paragraph for disadvantages) 3. Write a conclusion with the thesis statementarrow_forwardTen questions are asked. Don't attempted I've recently received a slew of incommplete responses, which is extremely frustrating. Please don't squander your or my time. If you are unable to answer of my questions, please disregard them. I don't want to squander my paid-for post-question time. Also, if you continue to give me incompplete answer, I will give you a thumbs down and will complain. Thank you very much. 1. Why is assembly language not usually used when writing large application programs? 2. Assume that you have three 8-bit storages (memory) named A, B, and C to store binary numbers. Memory A contains 10100100 and memory B contains 10110101. Compute A+B and store the value in C register. What is the content of register, C after the computation? Show the computation in details with carries. 3. Assume that you have 4-bit storage to store the numbers. Calculate the following operations using two's complement method. Show all the computations in details. (assuming 4-bit…arrow_forwardComputer Science The time has come to take control of your family business. After years of hard work at IE University, your parents believe you are ready to tackle the big challenge of transforming your company. They've heard that a new trend called digital transformation is here to stay; and that those companies that don't address this transformation run the serious risk of falling behind or even disappearing. Fortunately, they are counting on you, and they know that you have acquired the vision and experience to successfully meet this great challenge. The current company Your company is a chain of 10 restaurants operating in the 10 main cities of Spain (Madrid, Barcelona, Seville, Valencia, Malaga, .....). Your restaurants offer Spanish food with high quality products, but your family would like to incorporate certain changes in order to adapt to the new times and internationalize the business. The company has 150 employees and all the processes involved continue to be done in a…arrow_forward
- Have you ever seen an instance of internet bullying or harassment? To begin with, how did you feel when you found out about the situation? How did you determine that the person had been the victim of bullying before you got involved?arrow_forwardComputer Science In order to get more familiar with decision support systems, business intelligence, analytics, and knowledge management, I'd like you to do an Internet search to find an article either about a specific decision support system or a type of DSS that you find interesting. Read the article, and then once you've read it, provide a summary (1-3 paragraphs) of the content of the article and why you found it to be interesting. Make sure to include a link to the article in your postarrow_forwardThe use of the Internet as a forum for expressing one's right to free speech has become more significant in recent years. Both Facebook and Twitter are being used by a diverse range of individuals and organizations to facilitate the dissemination of hate speech. Should there be no restrictions put on what people may say in online discussion forums? Where should the line be drawn when it comes to restricting hate speech on social media?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education