You are the assistant principal responsible for supervising the school’s custodians (janitors). As with teaching positions, it is extremely difficult to find personnel who are interested in the custodial positions.
Each of the school’s three custodians are expected to meet the expectations developed in the attached job description. Unfortunately, the second shift custodian, Mr. Smith, has not been performing well. In his 4th month in the position, several teachers have complained to you that their rooms are not clean. Teachers in rooms 2, 5, and 7 on June 20th complained that their trash was not removed and that students desk tops were dirty. On June 25, the teacher in room 5 again complained that there was trash on her floor.
You called Mr. Smith into your office on June 26 and verbally warned him of his poor performance.
Your own walkthroughs on July 1 identified that the quality of cleaning work from Mr. Smith was inadequate. Paper and trash were on the floor of classrooms 1, 3, and 4; and four students desk tops had a sticky substance on them in rooms 1, 3, and 7. In addition, trash baskets were full of trash.
Construct an appropriate letter of warning to Mr. Smith. Make sure your letter directs the type of improvement that is expected by Mr. Smith.
Make sure to apply content from Course Den Items 2.0, 2.2, 2.3, 2.4. The content from item 2.2 refers to face to face conversations, however some of it also applies to a written letter.
While not included in the submitted part of this assignment, think about how you will structure the needed conversation with Mr. Smith. Think about how to apply the strategies from item 2.2.
(There is no submission template for this assignment since you are drafting a letter.)
View video as a reference: https://www.youtube.com/watch?v=N4Z27dN3Wvo (Course Den Item 2.2)
(The attachment serves as Course Den item 2.3.)
Author: admin
-
Letter of Warning to Mr. Smith, Second Shift Custodian
-
“Building Bridges: Five Strategies for Improving Police-Minority Relations”
provide a description of five strategies that could potentially enhance the relationship between law enforcement agencies and minority groups in our society
-
“Exploring the Defining Aspects of Film Music: An In-Depth Analysis of the Works of Composer Bill Conti”
discuss defining aspects of that composer’s music, and (using short examples) analyze the music of that composer. Make sure to discuss multiple scores by the composer – not just the film you’ve chosen for your film analysis. And, also, please make sure that your musical analysis is in-depth. Use Rocky and some other film for example
-
Title: Gender and the Law: A Case Study of Retaliation and Sexual Harassment in the Workplace
aper Assignment #2 for Gender and the Law
For Week 5, the syllabus and modules asks you to read the following material.
Week 5: Monday, June 17 – Sunday, June 23
Read: Thomas: Chapter 9/Don’t Shoot the Messenger: Burlington Northern & Santa Fe
Railway Company v. White (2006)
**Paper Assignment Due: Sunday, June 23 by 11:59pm**
Assignment
After reading chapter 9, reviewing the PowerPoint and other materials posted in modules as well
watching the film on the Anita Hill/Clarence Thomas case, write a paper that answers the
following questions.
Cite specific examples from the text to explain why Sheila White filed a lawsuit against her
employer, including the retaliation aspects of the case.
Do you agree or disagree with how this case played out both with her employer and with the
court system? Cite specific examples from the text and explain why you feel as you do.
After reviewing the PowerPoint in modules, consider the following. Many allegations against
people (typically men) who commit sexual harassment are made many years after the incident(s)
happen. Should an alleged victim be able to make an allegation many years – even decades –
after it happened? Explain your thinking.
Review the article I posted on the case of Sean “Diddy” Combs. Is there anything you learned in
this section of the course that provides insights into this case?
If you can access it, watch the following film based on Anita Hill’s early 1990s sexual
harassment allegations against (current) Supreme Court Justice, Clarence Thomas. What is your
reaction to this case? Do you see similarities to points we have learned in this section of the
course on sexual harassment? Do you think the case would have been the same or different if it
happened after the #metoo movement?
Trailer to the film, Confirmation (2016):
(If you cannot access the film, there are many other interviews and documentaries regarding the
Anita Hill/Clarence Thomas case that you can access free online to learn about the case).
https://apnews.com/article/diddy-assault-timeline-cassie-video-dc31b0a748bdcfb43c4eb1cf39109f07 -
Implementation of a Network-Based Security Information System: Enhancing Network Security through Real-Time Monitoring and Automated Threat Response “Building a Network-Based Security Information System: Methodologies, Results, and Recommendations”
Project Proposal: Implementation of a Network-Based Security Information System
BY
Your Name
Reg N0:
PROJECT REPORT SUBMITTED TO DEPARTMENT OF COMPUTER SCIENCE IN FULFILMENT OF REQUIREMENT FOR AWARD OF MASTER OF INFORMATION TECHNOLOGY (MIT); UNIVERSITY OF LAGOS, NIGERIA
June, 2024
Supervisor: Dr. PROBLEM STATEMENT
Background
In today’s digital age, securing network infrastructure has become paramount. Organizations face a growing number of cyber threats, including malware, phishing, and unauthorized access. These threats can lead to significant data breaches, financial losses, and reputational damage. A Network-Based Security Information System (NBSIS) can help mitigate these risks by providing real-time monitoring, threat detection, and automated response capabilities. This project aims to design and implement an NBSIS to enhance the security posture of an organization’s network.
Problem Description
The objective of this project is to develop a network-based security information system that monitors network traffic, identifies potential security threats, and responds to these threats in real-time. By analyzing network data and security logs, we aim to create a system that can detect anomalies, provide alerts, and automatically initiate mitigation actions. This system will help organizations protect their network infrastructure, reduce the risk of cyber attacks, and ensure the integrity and confidentiality of their data.
Key Objectives
Threat Detection: Develop a system that can accurately detect a wide range of network-based threats, including malware, intrusion attempts, and data exfiltration.
Real-Time Monitoring: Implement continuous network monitoring to identify and respond to threats as they occur.
Automated Response: Create mechanisms for automated threat response to minimize the time between threat detection and mitigation.
User-Friendly Interface: Design an intuitive user interface for network administrators to monitor security status, review alerts, and configure system settings.
Scalability: Ensure the system can scale to accommodate large networks and high volumes of data without compromising performance.
Data Description
The project will use a combination of simulated and real-world network traffic data. This data will include:
Network logs (e.g., firewall logs, router logs)
Packet capture data (PCAP files)
Threat intelligence feeds
System logs from servers and workstations
Tasks
Data Collection and Preprocessing Collect network traffic data from various sources.
Preprocess the data to remove noise and irrelevant information.
Normalize data formats to ensure consistency across different sources.
Exploratory Data Analysis (EDA) Conduct exploratory data analysis to identify common patterns and anomalies in the network traffic.
Use visual tools to understand the distribution and correlation of different types of network events.
Model Development Develop machine learning models for threat detection using algorithms such as Random Forest, Support Vector Machines (SVM), and Neural Networks.
Experiment with different feature extraction techniques to improve model accuracy.
System Implementation Design and implement the network monitoring components, including data collection agents and central analysis server.
Develop automated response mechanisms to mitigate detected threats.
Create a user-friendly dashboard for network administrators.
Model Evaluation Evaluate the performance of the threat detection models using metrics such as precision, recall, F1-score, and ROC AUC.
Use cross-validation techniques to ensure model robustness and generalizability.
System Testing and Validation Test the entire system in a controlled environment to ensure all components work together seamlessly.
Validate the system’s effectiveness using simulated attack scenarios.
Documentation and Reporting Document the system architecture, implementation details, and user guide.
Prepare a comprehensive report detailing the project’s objectives, methodologies, results, and recommendations.
Deliverables
Network-Based Security Information System Fully functional NBSIS with real-time monitoring and automated response capabilities.
Source code and configuration files for system deployment.
Comprehensive Report Detailed documentation of the system architecture, model development, and evaluation results.
Insights and recommendations for improving network security.
User Guide A user-friendly manual for network administrators to operate and configure the system.
Success Criteria
Achieving high accuracy in threat detection with minimal false positives and false negatives.
Ensuring real-time monitoring and response capabilities without significant latency.
Providing a user-friendly interface that enhances the operational efficiency of network administrators.
Demonstrating the system’s scalability and robustness through extensive testing.
Stakeholders
University faculty and IT department.
Network administrators and security professionals.
Students and researchers in cybersecurity.
By implementing this Network-Based Security Information System, we aim to provide a robust solution for real-time threat detection and automated response, thereby enhancing the security of organizational networks and contributing to the field of cybersecurity.
Top of Form
Bottom of Form -
“Exploring the Philosophies of Heraclitus and Parmenides: An Analysis of Key Passages” “The Power of Speech and the Limitations of Human Knowledge: Perspectives from Ancient Greek Philosophers”
Following this rubric:
Step One: Introduction
Step Two: Basic Claims
Step Three: List of Key Terms
Step Four: Analysis
COMMENT ON ONE OF THE FOLLOWING PASSAGES:
1) You cannot step twice into the same river, for other waters and yet other go ever flowing one.
(Heraclitus, fr. 21)
2) Much learning does not teach understanding, otherwise it would have taught Hesiod and Pythagoras, Xenophanes and Hectaus. (Heraclitus, fr. 6)
3) People do not understand how that which is at variance with itself agree with itself. There is a harmony in the bending back, as in the cases of the bow and the lyre. (Heraclitus, fr. 117)
4) Although this Logos is eternally valid, men are unable to understand it – not only before hearing it, but even after they have heard it for the first time, that is to say, although all things comes to pass in accordance with this Logos, men seem to be quite without any experience of it – at least if they are judged
in the light of such words and deeds as I am here setting forth according to its nature, and to specify how it behaves. Other men, on the contrary, are as unaware of what they do when awake as they are asleep. (Heraclitus, fr. 1)
5) Wisdom one and the same. It is unwilling and willing to be called by the name of Zeus. (Heraclitus, fr. 121)
6) The way up and the way down is one and the same. (Heraclitus, fr. 68)
7) Men should speak with rational mind and thereby hold strongly to that which is shared in common as a city holds onto its law, and even more strongly. For even more strongly all human laws are nourished by one divine law, which prevails as far as it wishes, suffices for all things, and yet somehow stands above them (Heraclitus, fr. 70)
8) The mares which carry me as far as my spirit ever aspired were escorting me, when they brought me and proceeded along the renowned road of the goddess, which brings a knowing mortal to all cities one by one. On this path I was being brought, on it wise mares were bringing me, straining the chariot, and maidens were guiding the way. The axle in the center of the wheel was shrilling forth the bright sound of a musical pipe, ablaze, for it was being driven forward by two rounded wheels at either end, as the daughters of the Sun, were hastening to escort after leaving the house of Night for the light, having pushed back the veils from their heads with their hands. There are the gates of the roads of Night and Day, and a lintel and a stone threshold contain them. High in the sky they are filled by huge doors of which avenging Justice holds the keys that fit them. The maidens beguiled her with soft words and skillfully persuaded her to push back the bar for them quickly from the gates. They made a gaping gap of the doors when they opened them, swinging in turn in their sockets the bronze posts fastened with bolts and rivets. There, straight through them then, the maidens held the chariot and horses on the broad road. And the goddess received me kindly, took my right hand in hers, and addressed me with these words: ‘Young man, accompanied by immortal charioteers, who reach my house by the horses which bring you, welcome – since it was not an evil destiny that sent you forth to travel this road (for indeed it is far from the beaten path of humans), but Right and justice. There is need for you to learn all things – both the unshaken heart of persuasive Truth and the opinions of mortals, in which there is no true reliance. But nevertheless you will learn these too – that the things. (Parmenides, The Journey)
9) Come now, I will tell you the only ways of inquiry there are for thinking: the one, that it is and that it is not possible for it not to be, is the path of Persuasion (for it attends upon Truth), the other, that it is not and that it is necessary for it not to be, this I point out to you to be a path completely un-learnable, for neither may you know that which is not (for it is not to be accomplished) nor may you declare it. For the same thing is for thinking and for being. That which is there to be spoken and thought of must be. For it is possible for it to be, but not possible for nothing to be. There is still left a single story of a way, that it is.’ (Parmenides, fr. 5)
10) But if it was speech which persuaded Helen and deceived her heart, not even to this is it difficult to make an answer and to banish blame as follows. Speech is a powerful lord, which by means of the finest and most invisible body effects the divinest works: it can stop fear and banish grief and create joy and nurture pity. I shall show how this is the case, since it is necessary to offer proof to the opinion of my hearers: I both deem and define all poetry as speech with meter. Fearful shuddering and tearful pity and grievous longing come upon its hearers, and at the actions and physical sufferings of others in good fortunes and in evil fortunes, through the agency of words, the soul is wont to experience a suffering of its own. But come, I shall turn from one argument to another. Sacred incantations sung with words are bearers of pleasure and banishers of pain, for, merging with opinion in the soul, the power of the incantation is wont to beguile it and persuade it and alter it by witchcraft. There have been discovered two arts of witchcraft and magic: one consists of errors of soul and the other of deceptions of opinion. All who have and do persuade people of things do so by molding a false argument. For if all men on all subjects
had both memory of things past and awareness of things present and foreknowledge of the future, speech would not be similarly similar, since as things are now it is not easy for them to recall the past nor to consider the present nor to predict the future. (Gorgias, The Encomium of Helen)
11) There never was nor will be a man who has plain knowledge about the gods and about all the things I speak of. Even if he should chance to say the complete truth, yet he himself knows not that it is so. But all may have their fancy. (Xenophanes, Fr. 10) -
“Unhealthy Lifestyle and Its Impact on Cardiovascular Health: A Case Study of Jane Doe”
Jane Doe, a 45-year-old woman, has been experiencing episodes of chest pain, shortness of breath, and occasional dizziness over the past few weeks. She also reports feeling fatigued and notices swelling in her ankles by the end of the day. Her family history includes heart disease, and she admits to having an unhealthy diet and a sedentary lifestyle. She is a non-smoker but occasionally consumes alcohol. Her blood pressure readings have been slightly elevated during her visits to the clinic.
Considering Jane Doe’s symptoms and her medical history, how might her unhealthy lifestyle contribute to the development of potential cardiovascular issues? In what ways can lifestyle modifications play a role in both preventing and managing these issues? Please provide specific examples and explanations based on your understanding of the cardiovascular system -
“Exploring the Phenomenon of Adult Neurogenesis: A Comprehensive Review” 1. “The Discovery of Adult Neurogenesis: Historical Context and Milestones” 2. “Neuroplasticity and Neurogenesis: Understanding the Brain’s Ability
Describe and discuss the research on adult neurogenesis. Describe both early and current research that investigated this topic, and the conclusions reached.
frame a small title list any 10 . -
Title: Applying Filter Theory and Sternberg’s Theory of Love to a Romantic Comedy Clip In the romantic comedy clip, we see a couple, Jamie and Dylan, who have been friends for years but are now starting to develop romantic feelings for each
Apply filter theory and Sternberg’s Theory of Love to this clip. What aspects of the theories do you see in the clip? Provide examples as evidence. What do you not see? Why do you think that is?
Your answer to the above questions should be written in narrative form in one to one and a half pages, double spaced. Attach as a doc. or docx.
This assignment relates to SLO 1, 3, 4, 5, 6, and 7 and the following Learning Objective: Apply theories related to establishing love relationships.
Clips : https://youtu.be/uaNFsZAdPbc & https://www.youtube.com/watch?v=ezTFYSan6cM -
“Creating Healthy Stress: Implementing Change Management in the Workplace” In today’s fast-paced and ever-changing business landscape, organizations must constantly adapt to stay competitive. This often involves implementing changes in processes, systems, and structures, which can be met with
Discussions: The days of working on an individual basis in the workplace are over. Positions that are not involved in a team, committee, or work group at some point during the year are extremely rare. Unless formal training is provided for a team, it is common to find dysfunction within a team.
Based on your readings this week (see Content – Week 7 – Reading and Resources), how can organizations address change management in the workplace such that healthy stress is created? Be creative in your answer!
You may find appropriate articles at the end of each chapter, and/or identify articles through the APUS online Library. Finally, be sure that all discussions are answered in full, in order to ensure the best possible grade based on the work submitted.