Module 2 Writing Activity FINAL1
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
400
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
3
Uploaded by GeneralSeaUrchin2288
1
A Description of diversity in a local basketball team.
Matt McGee
Southern New Hampshire University
IDS 400 Diversity
Dr. Arron Grow
Submission Date
2
Diversity in a local basketball team.
Description of Population Significant to diversity in a local basketball team.
I will be collaborating with a local activist group that promotes the rights of the vertically
challenged. Currently the basketball team has an implicit bias to tall individuals this is evident
within their team, having no one under 6 foot tall on it. This greatly affects the individual who
are vertically challenged as some are good players in the sport but still not selected for the team. How diversity in a local basketball team has Shaped the Lives and Experiences of the
people who are vertically challenged.
The lack of diversity in height on the local basketball team has greatly affected the population in a negative way. The players not picked for the team based on their height have missed out on the life experience that is playing sports and being part of a team. A Look at diversity in a local basketball team through the historical Lens
I choose to view the lack of diversity in the basketball team though the historical lens. I don’t
think this was a hard choice as we can learn a lot from history and when debating the a topic
history leave very little room for interpretation making easy work for the debating parties. Project Thesis Statement
The thesis statement for my project is the lack of diversity in the local basketball team. This influences the populations of vertically challenged individuals as they do not get selected to be on the team. The cultural issue that has led to this possible implicit bias of tall people is that historically tall people have been better at basketball. This historical evidence has led me to view
the issue though the historical lens to see if we can affect change and diversity the local basketball team.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
10
DO NOT COPY FROM OTHER WEBSITES
Correct and detailed answer will be Upvoted else downvoted. Thank you
arrow_forward
Please help with the following:
Make two acceptance test for each user story card.
1.As an employee, I want to be able to delete a blog post so that I can maintain only relevant posts
2.As a supervisor, I want to be able to login so that I can access functionalities restricted to supervisors
arrow_forward
"Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning
Please: Don't use Chatgpt
arrow_forward
Case Report on SBRU Summer Breaks 'R' Us (SBRU) represents an online travel service provider that books summer break trips to resorts for university students. Students have booked summer break trips for decades, but changes in technology have transformed the travel business in recent years. SBRU moved away from having campus representatives with posted fliers and moved to the Web. The basic idea is to get a group of students to book a room at a resort for one of the traditional summer break weeks. SBRU contracts with dozens of resorts in key summer break (Dec- Feb) destinations in Bali, Bangkok, Dubai, Istanbul, Hawaii, and the Caribbean. Its website shows information on each resort and includes prices, room availability, and special features. Students can research and book a room, enter contract information, pay deposits, and make final payments through the system. SBRU provides updated booking information, resort information updates, and travel information for booked students when…
arrow_forward
TO: All Staff
FROM: Jake Ryan, Director, Product Development
DATE: October 23, 2018
SUBJECT: Launch of Product XYZ
Due to extensive customer feedback, and the results of current testing, I wanted to inform you that Product XYZ will be delayed from its original launch date of November 15th, until Q1 2019.
We are confident that time for additional testing will serve to make XYZ more effective in fighting security breaches that customers are facing. For those customers that you believe will now consider a competitor's product, the marketing department is developing a promotional offering, which sales reps can share with their customers to help reduce those who will now go to our competitors.
As disappointing as this news may be, we are confident in our employees, and know the additional time will serve this company well by creating a more successful product.
arrow_forward
Facebook is one of many online companies that employ databases. In 2011, Facebook announced that it was adding a new feature—facial recognition. Photos added to a Facebook post or wall are often tagged. When a person is tagged in a photo, the person is identified and a link is created to that user’s Facebook account. To make this job easier, Facebook is using facial recognition software to identify people in the photos. Critics of this say that this is an invasion of privacy. Research the debate online. Write a short paper discussing the implications this could have on a Facebook user’s privacy.
Suggested source website:
https://abcnews.go.com/Technology/facebook-facial-recognition-feature-raises-eyebrows/story?id=13792666
https://www.pcworld.com/article/485225/facebook_photo_tagging_a_privacy_guide.html#tk.hp_pop
https://www.pcworld.com/article/485206/facebook_on_face_recognition_sorry_we_screwed_up.html
arrow_forward
DQ format 250 words (no less than 200 no more than 300)
Relationship between privacy, security and risk as it plays out in your selected compliance of either Finance or Healthcare.
arrow_forward
14
DO NOT COPY FROM OTHER WEBSITES
Correct and detailed answer will be Upvoted else downvoted. Thank you
arrow_forward
if you will be assigned as one of the authorized body to create the "robotics Code', give at least five areas or stipulations that you want to focus on the code and why?.
minimum of 250 words
arrow_forward
Have you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?
arrow_forward
Even though privacy is highly valued in today's culture, there are conflicting opinions on it. Do you believe that there is still more that can be done to protect online privacy? Do you, for instance, think that laws are adequate?
arrow_forward
Church Information System
XYZ Church is a fast-growing church in Grand Rapids area. Over the past three years, since the popular Reverend Timothy Becker has taken over leadership of the congregation, the church has more than doubled in size. It now has approximately 400 registered households. Reverend John Howard has also recently been added as a second minister. Since the Church was rather small in the past, most of its records have been kept on paper forms. However, the Church’s Business Manager, Margie Roberts, has suggested to Reverend Becker that a computerized system might help the Church better meet its information needs and manage its activities.
In addition to Ms. Roberts, the Church employs a part-time administrative assistant, Mabel McGregory. Mabel performs clerical duties such as filing, record keeping, answering phone calls, and typing the weekly church bulletin using WordPerfect for Windows on the Church’s only personal computer. A retiree, Leroy Stricty, is employed…
arrow_forward
Do you know anybody who has been the victim of online bullying or harassment? When you initially learned about the issue, what did you think? Specifically, how did you get to the conclusion that this individual had been the subject of bullying before you became involved?
arrow_forward
Please limit your comments to no more than three or four. What does it mean to prioritise human rights as part of a plan for science, technology, and development?
arrow_forward
QUESTION ONE Visual Basic AutoClick Limited (ACL) operates a used automotive sales garage in Accra with two categories of customers, namely Individual and wholesale Dealers. A whole sale dealer is a term used to describe another used automotive dealer who buys from ACL. All whole sale dealers are offered wholesale dealer discount. ACL also runs a vehicle trade-in policy whereby an individual customer who owns a vehicle can trade in their vehicle at a negotiated price. Additionally, ACL add interior extras, such as Paint Touch-up, Undercoat, etc. and exterior extras such as wheel upgrades, new tires, etc., on the request of their customers at an additional cost. Management requires an application that will manage the sale of its used vehicles. You are tasked to develop this app, create a Visual Basic Application that will take as input for each vehicle its lot number, Make, Model, Year, Millage, Engine Capacity and Price. For each Extra its ID, Name, Type (interior or Exterior) and…
arrow_forward
QUESTION ONE Visual Basic
AutoClick Limited (ACL) operates a used automotive sales garage in Accra with two categories of customers, namely Individual and wholesale Dealers. A whole sale dealer is a term used to describe another used automotive dealer who buys from ACL. All whole sale dealers are offered wholesale dealer discount.
ACL also runs a vehicle trade-in policy whereby an individual customer who owns a vehicle can trade in their vehicle at a negotiated price.
Additionally, ACL add interior extras, such as Paint Touch-up, Undercoat, etc. and exterior extras such as wheel upgrades, new tires, etc., on the request of their customers at an additional cost.
Management requires an application that will manage the sale of its used vehicles. You are tasked to develop this app, create a Visual Basic Application that will take as input for each vehicle its lot number, Make, Model, Year, Millage, Engine Capacity and Price. For each Extra its ID, Name, Type (interior or Exterior) and…
arrow_forward
"The impact of hacking on life" - For the last several years cyber-attacks/hacking are in the news on a seemingly continuous basis. Some of the most recent/largest hacking events include the Solarwinds hack that was the conduit for the major breach of many US Federal agencies and the disturbing Equifax hack from 2017. Have these events and the subsequent reporting caused you to change any habits/behaviors? Please provide your thoughts on this along with why you have or have not made any changes as a result of these events.
Hint: Please don't use chat gpt
arrow_forward
Continuing Case: PersonalTrainer,Inc.Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centershave done well, and the company is planning an international expansion by opening a new“supercenter” in the Toronto area. Personal Trainer’s president, Cassia Umi, hired an ITconsultant, Susan Park, to help develop an information system for the new facility. During theproject, Susan will work closely with Gray Lewis, who will manage the new operation.BackgroundAt their initial meeting, Susan and Gray discussed some initial steps in planning an informationsystem for the new facility. The next morning, they worked together on a business profile, drew anorganization chart, discussed feasibility issues, and talked about various types of informationsystems that would provide the best support for the supercenter’s operations. Their main objectivewas to carry out a preliminary investigation of the new system and report their recommendationsto Personal…
arrow_forward
16
DO NOT COPY FROM OTHER WEBSITES
Correct and detailed answer will be Upvoted else downvoted. Thank you!
arrow_forward
Privacy is a difficult concept for which 2 of the following reasons.
choose all that apply
a.Users freely give up privacy for free products and services.
b. Privacy is determined by law; there is not inherent right of privacy.
c. Privacy is a universal right that transcends national boundaries and cultures.
d. Privacy and community conflict in the sense that our communities know much about us and our personal lives; hence no privacy.
In terms of Privacy which one of the following elements is critical to a Privacy discussion:
pick the best answer
a. Businesses use our data to sell us goods and services to us.
b. Businesses economically depend on our data.
c. Businesses use our data to sell us goods and services to others.
d. Businesses use our data to sell goods and services to us.
e. Our data is an expense for businesses which they attempt to recover.
Businesses use our data for their own purposes.
arrow_forward
Question 3
I need help creating a conceptual model for Turo, the car rental/sharing company. I also would very much appreciate it if also helped with creating supertypes and subtypes for the company Turo. Thank you!
I would like it to be in this kind of format!
Full explain this question and text typing work only thanks
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- 10 DO NOT COPY FROM OTHER WEBSITES Correct and detailed answer will be Upvoted else downvoted. Thank youarrow_forwardPlease help with the following: Make two acceptance test for each user story card. 1.As an employee, I want to be able to delete a blog post so that I can maintain only relevant posts 2.As a supervisor, I want to be able to login so that I can access functionalities restricted to supervisorsarrow_forward"Accountability" - As we've started discussing IT security breaches are continually in the news. Several of these events have led to Personally Identifiable Information (PII) being leaked such as social security numbers, credit card information or simply embarrassing personal details. In many of these cases company Executives have been fired or forced to resign. Do you think that these dismissals have or have not been warranted? Please explain your reasoning Please: Don't use Chatgptarrow_forward
- Case Report on SBRU Summer Breaks 'R' Us (SBRU) represents an online travel service provider that books summer break trips to resorts for university students. Students have booked summer break trips for decades, but changes in technology have transformed the travel business in recent years. SBRU moved away from having campus representatives with posted fliers and moved to the Web. The basic idea is to get a group of students to book a room at a resort for one of the traditional summer break weeks. SBRU contracts with dozens of resorts in key summer break (Dec- Feb) destinations in Bali, Bangkok, Dubai, Istanbul, Hawaii, and the Caribbean. Its website shows information on each resort and includes prices, room availability, and special features. Students can research and book a room, enter contract information, pay deposits, and make final payments through the system. SBRU provides updated booking information, resort information updates, and travel information for booked students when…arrow_forwardTO: All Staff FROM: Jake Ryan, Director, Product Development DATE: October 23, 2018 SUBJECT: Launch of Product XYZ Due to extensive customer feedback, and the results of current testing, I wanted to inform you that Product XYZ will be delayed from its original launch date of November 15th, until Q1 2019. We are confident that time for additional testing will serve to make XYZ more effective in fighting security breaches that customers are facing. For those customers that you believe will now consider a competitor's product, the marketing department is developing a promotional offering, which sales reps can share with their customers to help reduce those who will now go to our competitors. As disappointing as this news may be, we are confident in our employees, and know the additional time will serve this company well by creating a more successful product.arrow_forwardFacebook is one of many online companies that employ databases. In 2011, Facebook announced that it was adding a new feature—facial recognition. Photos added to a Facebook post or wall are often tagged. When a person is tagged in a photo, the person is identified and a link is created to that user’s Facebook account. To make this job easier, Facebook is using facial recognition software to identify people in the photos. Critics of this say that this is an invasion of privacy. Research the debate online. Write a short paper discussing the implications this could have on a Facebook user’s privacy. Suggested source website: https://abcnews.go.com/Technology/facebook-facial-recognition-feature-raises-eyebrows/story?id=13792666 https://www.pcworld.com/article/485225/facebook_photo_tagging_a_privacy_guide.html#tk.hp_pop https://www.pcworld.com/article/485206/facebook_on_face_recognition_sorry_we_screwed_up.htmlarrow_forward
- DQ format 250 words (no less than 200 no more than 300) Relationship between privacy, security and risk as it plays out in your selected compliance of either Finance or Healthcare.arrow_forward14 DO NOT COPY FROM OTHER WEBSITES Correct and detailed answer will be Upvoted else downvoted. Thank youarrow_forwardif you will be assigned as one of the authorized body to create the "robotics Code', give at least five areas or stipulations that you want to focus on the code and why?. minimum of 250 wordsarrow_forward
- Have you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?arrow_forwardEven though privacy is highly valued in today's culture, there are conflicting opinions on it. Do you believe that there is still more that can be done to protect online privacy? Do you, for instance, think that laws are adequate?arrow_forwardChurch Information System XYZ Church is a fast-growing church in Grand Rapids area. Over the past three years, since the popular Reverend Timothy Becker has taken over leadership of the congregation, the church has more than doubled in size. It now has approximately 400 registered households. Reverend John Howard has also recently been added as a second minister. Since the Church was rather small in the past, most of its records have been kept on paper forms. However, the Church’s Business Manager, Margie Roberts, has suggested to Reverend Becker that a computerized system might help the Church better meet its information needs and manage its activities. In addition to Ms. Roberts, the Church employs a part-time administrative assistant, Mabel McGregory. Mabel performs clerical duties such as filing, record keeping, answering phone calls, and typing the weekly church bulletin using WordPerfect for Windows on the Church’s only personal computer. A retiree, Leroy Stricty, is employed…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE LDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781305627482Author:Carlos Coronel, Steven MorrisPublisher:Cengage Learning
- Database Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781285196145Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos CoronelPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781305627482
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781285196145
Author:Steven, Steven Morris, Carlos Coronel, Carlos, Coronel, Carlos; Morris, Carlos Coronel and Steven Morris, Carlos Coronel; Steven Morris, Steven Morris; Carlos Coronel
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning