Radically rewrite each of the letters. Do not simply make minor edits. Even if these letters are written with more or less proper syntax, grammar, and punctuation, they are still ineffective. Your job is to make them as effective as possible, keeping your reader’s needs in mind. General effectiveness and appropriateness to the needs of the readerFaithfulness to the intent and context of the original text (in other words, clarify but never change the intent of the original text; any significant deviations from the intent of the original text will be severely penalized)Conciseness and Clarity (this may involve making decisions about which information is most important)OrganizationSyntax, Grammar, Sentence flow, and Diction Puncutation, but only as it pertains to avoiding sentence fragments and run-on sentences. (There are videos in Module One regarding basic sentence structure, if you need to view or review them)Visually pleasing design and appropriate use of memo or letter style with proper use of address, subject, paragraphs, and topic headers or bullet/numbered points (as may be needed).
Portland Community College General Effectiveness and Appropriateness Paper
*Paper attached*Under the “Week 3” section, the following needs to be added:Enterprise System Integration Analysis
Refine and describe in detail a list of quality assurance considerations that you determine to be ranked highest.
Thoroughly describe 3 potential options that you are considering for moving forward with the Systems Integration Project.
Systems Integration Approach Evaluation and Selection
Select and describe in detail the evaluation method that you plan to use to compare and contrast the 3 options.
Design a table or matrix to perform your evaluation comparison. The evaluation criteria should include quality objectives and organizational capabilities and considerations and should use some type of weighted priority scheme for ranking.
Fill in the table, and use ranking criteria to determine which is the best option for you to proceed with for the system integration project.
Summarize by discussing which is the best option based on the results from the previous step. Deliverable length for the “Week 3” section: 7 pages (including the table)
Requesting additions for System Architecture and Integration paper
1. Give an example of classical conditioning in your life: identify the unconditioned stimulus, unconditioned response, the neutral stimulus and explain the acquisition period to the conditioned stimulus that resulted in a conditioned response.
2. Describe an example of something you learned through operant conditioning-be specific and define in your example the type of consequence involved in this learning.
3. Research has proven that electronics are distracting in a classroom. Give one example that supports that theory and give an example of how modern technology in the hands of students is helpful to learning and retaining information.
4. Make up a mnemonic for something you have learned in any of the chapters you have read in this class. You can do it as a story, poem, Â acronym, jingle, rap song, etc.
Psychology on classical conditioning
Managing Intelligence in National Security
At which stage of the ”intelligence cycle” is failure most likely to occur, and why? The most common, traditional paradigm for managing intelligence ‘flow’ is a cycle of four components: direction, collection, processing, and dissemination. Direction comes from policymakers: heads of government agencies, heads of state, senior government officials tasked with overseeing intelligence, and the like, who provide both specific and general roadmaps to intelligence agencies as to how they should apply their resources to defend national interests both at home and abroad. Collection is the process by which intelligence is gathered in a variety of fashions: via HUMINT – intelligence data collected by personal, human effort ‘on the ground’; electronically, e.g. SIGINT (interception of signals), IMINT (satellite, photographic imagining intelligence), etc. Processing is the analysis of the data obtained in the collection component, the means by which the nature, relevance and relative importance of the collected intelligence is ascertained by means both scientific and intuitive. (Arguably, processing is the most important component of the cycle, but the least amount of money is often budgeted to this component of the cycle.) Dissemination refers to the process by which the relevant information is channeled to the appropriate decision-making party within a timetable commensurate with the importance of the information collected and the results of the processing/analysis. Each of the four components of the cycle is fraught with peril for failure — and failure in any one component can be catastrophic. The two arenas where failure is most likely to occur, however, are collection and analysis. Failures in collection are often due to lack of applied resources, whether technological or human. The debate has raged for decades over whether HUMINT is superior to intelligence data gathered by increasingly advancing technological wizardry. Most likely, a healthy application of and symbiosis between the two is critical. There is no substitute for the personal presence of agents, operatives, and contacts on the ground, substantially integrated with useful components of whichever society in which they are placed. The Central Intelligence Agency (CIA) was woefully lacking in human collection efforts in Afghanistan in the wake of the 9/11 attacks, and in Iraq during the same time period (though to a lesser extent). Compounding matters was the dearth of CIA field operatives or domestically-based personnel who spoke the common languages of the Middle East – Arabic, Farsi, Pashtun, etc. However, rapid advances in computer technology have enabled the collection of vast quantities of raw intelligence data – telephone calls, e-mails, radio transmissions, etc., and intelligence agencies who lack such technology will invariably be at a massive disadvantage. Failures in processing/analysis can occur when the collection apparatus has delivered all of the puzzle pieces, usually due to either a collective/institutional, or individual inability to connect the proverbial dots and turn raw data into actionable intelligence conclusions. The 9/11 attacks are a regrettably perfect example of failures in analysis. Discrete entities in the U.S. intelligence community – the Federal Bureau of Investigation (FBI) and CIA, as well as other government agencies (the Immigration and Naturalization Service and Federal Aviation Administration) – all possessed nuggets of raw data which if analyzed properly, would clearly have indicated (in fact, some say did definitively indicate) that an Al-Qaida attack on the U.S. using airplanes was imminent. However, these entities failed to share this data and collaborate cooperatively to analyze it. Turf warfare, egos, bureaucratic inertia, and competing political agendas can easily cause fatal paralysis in intelligence processing. The costs of covert action tend to outweigh its benefits. Discuss. The question of whether the costs of covert action outweigh its benefits depend greatly on the context of the covert action; is it an ongoing, multi-year low-intensity campaign involving numerous agendas, or is it an urgent, high-priority single mission designed to achieve a massive single strategic goal? Also, the notion of costs must be defined in relative terms – monetary costs, human costs, opportunity costs; indirect costs (unintended consequences); other abstract and intangible costs such as ethics, legal ramifications, etc. The CIA has long been involved in low-intensity covert actions in a variety of nations, with varying degrees of success. The Iran-Contra affair, in which Reagan administration officials diverted proceeds from the sale of arms to Iran to anti-Marxist Nicaraguan rebels in the mid-1980s, was costly in both monetary terms (hundreds of millions of pounds) and legal terms – a number of Reagan administration officials were subjected to criminal charges for their roles in facilitating both the operation itself and the cover-up of the operation (the American Congress had passed a law forbidding U.S. government direct aid to the Contras). However, in the wake of 9/11, when the U.S. government concluded that decisive force was required to respond to Al-Qaida’s attack on U.S. soil, the CIA and DoD (Department of Defense) were authorized by President Bush to spend whatever was necessary to execute some of the most bold covert actions – particularly in HUMINT — undertaken by American intelligence agencies in decades. HUMINT capacity at the CIA eroded as, ironically, the moral excesses of covert activities of the 1960s-1970s caused a backlash that choked off HUMINT funding priority; also, the end of the Cold War led many policymakers to conclude that the CIA’s resources were better spent on electronic means of collection, as covert action can be prohibitively expensive in both time and money. However, the CIA was authorized and ordered to act boldly and within a matter of weeks, had substantial HUMINT on the ground in Afghanistan both collecting data and coordinating with DoD military planners to leverage intelligence into actionable military plans. The goal: to defeat the Taliban, who had hosted Al-Qaida in a darkly symbiotic relationship which held the country in a repressive stranglehold and provided safe haven for the training of thousands of would-be terrorists. Mindful of the failure of the Soviet Union’s 1979 invasion of Afghanistan, CIA realized that only an asymmetrical application of covert power (mirroring Al-Qaida’s approach to the 9/11 attacks, ironically) would be effective, as a conventional ground war could be too costly in both manpower and lives on both sides. A shrewd application of HUMINT, technology, and good old-fashioned money engineered the relatively rapid American triumph in Afghanistan in 2001. CIA operatives on the ground descended into Afghanistan with little support, made contact with sympathetic Afghan warlords, dispensed hundreds of millions of dollars to other warlords and tribal leaders, in some cases simply to bribe them into switching sides and fight against the Taliban and Al-Qaida. These same operatives also used hand-held laser GPS equipment to target enemy strongholds and transmit this location data directly to U.S. aircraft, who in turn dropped laser-guided bombs with deadly efficiency. The cost was in the billions, but the victory was swift, decisive, and – given the ramifications of the triumph – extremely inexpensive, relatively speaking. As such, not all covert operations are too costly to make them worthwhile. Discuss the importance of open sources collection in comparison to clandestine collection. Is clandestine collection indeed more valuable? Open-source(s) collection refers to the collection of actionable or otherwise valuable/relevant intelligence data from publicly available sources. Prior to the advent of the Internet, this methodology was not without value, but in many cases prohibitively time-intensive, and less prone to yield results. Though the type of information available to the public at a local library might surprise a layperson, it is dwarfed by what is now available on the Internet to anyone with a personal computer. In some cases, an intelligence analyst sitting at a desk in London can gather valuable, reliable information about conditions on the ground in a city halfway across the globe – weather conditions, local news, political and business developments, cultural idiosyncracies. Other sources of OSINT, as it is termed, include diverse sources as consultations with experts in various fields within academia or the business world, professional associations, professional conventions, to simple thoughtful Google searches and reading of blogs. The trend globally is towards an ever-increasing amount of openness of information exchange thanks to the Internet. Increasingly sophisticated ‘sweeper’ data-mining software technology, which is often used to collect and in some cases process large volumes of conventional communication traffic, are being utilized by the CIA to scan millions of websites, searching for key terms, phrases, contexts, which might indicate that human review would be advantageous or essential. Instructions to make improvised explosive devices can easily be posted on websites, and 21st century intelligence collection must conform to this new reality. In comparison, the best use of clandestine intelligence vis-à-vis OSINT efforts is to obtain highly specialized or esoteric intelligence information that is either intentionally kept confidential (classified government secrets, for example). OISINT processing and analysis can help frame and answer a number of general questions and/or analyze larger patterns and trends, whereas clandestine intelligence can help answer targeted, specific questions that cannot be ascertained by either human or computer OSINT efforts. For example, in response to the intelligence reforms demanded in the wake of the failure to anticipate and prevent the 9/11 attacks, the CIA formed an “Open Source Center” (OSC) to focus specifically on OSINT. In 2004, OSC used OSINT technology to discover that a new, powerful Chinese submarine had been constructed in an underground location heretofore unknown to the American military and intelligence community. The tip-off? Chinese military bloggers, one of whom posted a photograph of the impressive new Chinese submarine (the Yuan-class attack submarine) on a publicly viewable website. CIA in turn employed HUMINT and electronic surveillance to ascertain where the submarine had been constructed and what its operational abilities might be. In a less dramatic example, OSC searched Iraqi websites for postings related to the use of IEDs (Improvised Explosive Devices), in some cases gathering actionable data which helped avert the use of these deadly terrorist tools. (The inadvertent destruction of the Chinese embassy in Belgrade in 1999 by NATO bombs might have been averted by some of the most rudimentary OSINT – having a human operative walk down the street to make sure the military target’s address was correct.) Clandestine collection activities, particularly HUMINT efforts, will always have their place, but in a world where information is available anywhere, anytime, at the click of a mouse, intelligence agencies must dedicate significant resources to OSINT.
Newcastle College Event Management and Planning Issues Discussion
essay writing help Newcastle College Event Management and Planning Issues Discussion.
write a detailed report on one event of your choice. This assessment requires you to apply both planning and operational management theoretical and practical knowledge to your work. Attempt to compare theory with practice and support your work with academic references. Your report should include, a discussion of the following: Introduction The planning process and planning issues associated with the event. Event health, safety and risk management. Managing volunteers and staff (i.e. a discussion of operational issues, staffing, teams and volunteers for the event) Event funding and sponsorship. Evaluation, conclusions and recommendations. Your report should be a maximum of 3,500 words and must be correctly referenced. 20 more references APA format
Newcastle College Event Management and Planning Issues Discussion
Biography of Billie Jean King
Biography of Billie Jean King. Queen of the Court Recognized by many, Billie Jean King dominated women’s tennis as America’s most influential tennis player for more than two decades. King, born as Billie Jean Moffit, was born on November 22, 1943. She began playing tennis at the modest age of eleven. By the time she reached her twenties, Billie Jean King was the first female athlete to receive over $100,000 in cash prize (BJK Enterprises). On September 20, 1973, she proved that women were equally competitive as men, both athletically and in the media, by defeating Bobby Riggs during the Battle of the Sexes. King’s success during the time of her professional tennis player career resulted in activism and influence which has forever transformed the opportunities for females to achieve in sports and beyond. A year prior, in 1972, she won the U.S. Open but received $15,000 less than her male counterpart, Ilie Nastase. She pushed for an equal cash prize to both genders and strongly encouraged the U.S. Open to do so. A year later, the U.S. Open was the first prominent competition to give an equal cash prize to both genders (BJK Enterprises). Although from time to time, women still get paid less than men, King made it so women could earn an equal amount of prize money in renowned tennis tournaments. This gave women a shot at ‘equal pay for equal play’ against male rivals (Barajas). Women like Serena and Venus Williams have also lobbied alongside King for an equal cash prize, and that’s what they got. In the early 2000s, both Wimbledon and the French Open then came to terms with giving equivalent amounts of cash prize to both men and women alike. In 1974, King started her establishment called The Women’s Sports Foundation. The WSF is committed to elevating the lives of female individuals through physical activity and sports and provides financial support to future athletes (King). The WSF gives privileges to many aspiring female athletes worldwide and has encouraged more females into the field of sports and has even given rise to other known female athletes such as former professional boxer, Laila Ali; Muhammad Ali’s daughter, paralympic track and field athlete Scout Basset, and many more. King also has a desire for equal rights, opportunities, and freedom for all people. She influenced people to gain support for people in the LGBT community and people living with AIDS by giving knowledge of the hardships they face on a day-to-day basis. Moreover, she raised large sums of money for AIDS prevention, advocated to battle homophobia in schools, and raised awareness of the LGBT community to lower teenage suicide rates. In addition to this, she contributed to the Elton John AIDS Foundation and the National AIDS Fund. King created tennis events nationwide specifically for the cause of raising money to local AIDS charities and the Elton John Foundation (LGBT Hall of Fame). She has been an influence on people in the LGBT community to better accept themselves and know that many people accept them as they are. In 1981, she became the first openly gay prominent female athlete, and in 2009 she received the Presidential Medal of Freedom from President Barack Obama for her work supporting the rights of women and the LGBT community (BJK Enterprises). Billie Jean King transformed the fields of sports and activism by influencing hundreds of thousands of people to feel their power and worth as individuals. Overall, King’s influence not only women in sports but women across America will be remembered for many generations to come. Her influence in the fields of sports and activism has changed American society. Women and girls across the country have now been given equal opportunities through King’s Women’s Sports Foundation. One of the most world-renowned tournaments, the U.S. Open, now offers an equal cash prize to men and women; $3.85 million for winning singles (Barajas). She has endeavored towards raising money and awareness for the AIDS funds and foundations and LGBT equality as well. To conclude, King’s biggest impact in American society changed the judgment of women’s rights in sports and changed the views of many on how women are perceived to this day. Works Cited AllAuthor, editor. All Author. LMN Technology, 2020, allauthor.com/quotes/19784/. Accessed 10 Feb. 2020. Barajas, Joshua. “Equal pay for equal play. What the sport of tennis got right.” PBS News Hour, Barajas, 12 Apr. 2016, www.pbs.org/newshour/economy/equal-pay-for-equal-play-what-the-sport-of-tennis-got-right. Accessed 22 Jan. 2020. Billie Jean King Enterprises. “Billie Jean King Biography.” Billie Jean King, Billie Jean King Enterprises, 2017, www.billiejeanking.com/biography/. Accessed 6 Feb. 2020. Chicago LBGT Hall of Fame. “Billie Jean King, Individual | Inducted 1999.” The Chicago LBGT Hall of Fame, 2019, chicagolgbthalloffame.org/king-billie-jean/. Accessed 11 Feb. 2020. King, Billie Jean. “Women’s Sports Foundation.” Women’s Sports Foundation, edited by Women’s Sports Foundation, 2020, www.womenssportsfoundation.org/. Accessed 11 Feb. 2020. Mitchell, Pat. “How the ‘Battle of the Sexes’ influenced a generation of men.” TED Blog, TED Conferences, 23 Sept. 2017, blog.ted.com/how-the-battle-of-the-sexes-influenced-a-generation-of-men-billie-jean-kings-tedwomen-update/. Accessed 12 Feb. 2020. Ott, Tim. “‘Battle of the Sexes’: The True Story of How Billie Jean King Struck a Blow for Women’s Sports.” Biography, 19 Sept. 2017, www.biography.com/ news/battle-of-the-sexes-true-story-facts. Accessed 11 Feb. 2020. Sweeney, Sarah. “Appreciating Billie Jean King’s contribution to second-wave feminism.” The Harvard Gazette, 20 Nov. 2008, news.harvard.edu/gazette/story/2008/11/appreciating-billie-jean-kings-contribution-to-second-wave-feminism/. Accessed 10 Feb. 2020. Biography of Billie Jean King
Tourism Trend Paper for San Francisco/Bay Area: While answering the questions “Why do people travel to SF?” students are expected
Tourism Trend Paper for San Francisco/Bay Area: While answering the questions “Why do people travel to SF?” students are expected to identify a tourism driver for SF/Bay Area and analyze the topic in depth. While doing this, the restrictions and concerns by COVID-19 needs to be taken into consideration. This will be an APA Style GROUP (Same as the case) – Research Paper not more than 5 Pages where Page #1 will be Introduction and Page # 5 will be Summary of Learning Experience. The other requirements for the paper are: – Each paper must have a cover page with the following: – Assignment name, topic title, student names and ID in alphabetical order, group name and group number, date, and professor name, class number and class name. – Each paper must have section headings throughout paper (please avoid one long 2-page paragraph). Ex) “Introduction” or “What is Tourism?” or “Findings” etc… – Paper must use 5 external references minimum. – Note: do not just use “on-line” citations in the external references. – The final paper/project writing format must follow the APA (American Psychological Association) writing style.