Ce101 Unit 1 Discussion

In: Other Topics

Submitted By Pixiepink
Words 334
Pages 2
Part 1: After reading Chapter 1, please share two new or interesting facts that you learned about the field of early childhood education.
Part 2: Think back to when you were in school, and about one of your favorite teachers. o What do you recall about your favorite teacher? o Has this teacher influenced your career choice? Why or why not?
Part 3: Explain your reasons for seeking a degree in child development/or for selecting this class as an elective.

Part 1:

After reading the first chapter of the text book I have found that it’s very interesting that teaching children isn’t like a one size fits all because you have to learn so many ways to be able to communicate and teach each child to their learning ability. I have also found it to be interesting that some teachers pick and choose between children whether it’s the teacher’s beliefs or not they shouldn’t be telling a child who can or can’t marry. Pretending is a very big part of a child’s imagination, if they had no imagination then where would the world be.

Part 2:

When I was in high school my special Ed teacher Mrs. Gaudette was awesome to me and all of her students. She would go above and beyond the duties of her job. If I had a concert or if I was signing at my church she would go to listen and to show her support. She would also let me talk to her privately about my stresses at home and she would give me advice to overcome what was stressing me out. We still stay in touch today like we have always been the best of friends. I would like to be just like that to my students someday.

Part 3:

The reason that I am seeking a degree in early childhood education is to gain the knowledge and understanding that I will need to be a successful teacher’s assistant and role model for the…...

Similar Documents

Unit 5 Assignment 1 Cabling Factors and Tolls Discussion

...Unit 5 Assignment 1 Cabling Factors and Tolls Discussion Flexibility What type of install is the cable going into? Is everything in a fixed position? If you have an install where items are moved around without being disconnected, using highly flexible cable is necessary. Cables in these scenarios need to be flexible to meet those demands of mobility, and also for the life of the wire so that it does not crack, break, fray or short. We had a job at a university where we moved flat panels on a track system to create different screen sizes, and for that we had to make sure the cable would meet the demand. Capacitance Cat 6 is not always better than Cat 5. If a video extender is made for Cat 5e, using Cat 6 may cause you a problem. The electrical properties are different, and the circuitry inside may not be able to reconcile the increased capacitance. You should confirm with the manufacturer before making a substitute in a Category cable. Jacket What type of jacket does your cable need? You have plenum, riser, PVC/non-plenum and direct burial. Plenum cable is often required in commercial work, especially in buildings where there are open-air returns; it is essential to meeting code. Integrators will often use riser grade at the riser, and then transfer to plenum in the plenum space. This saves some cost, but I recommend you second-guess saving that few cents per foot in most cases. The chances of mixing up a box of cable and pulling riser in the plenum space may......

Words: 318 - Pages: 2

Unit 1

...Unit 1: Unit 1: Introduction: Defining Careers in Health Science - Discussion Throughout this course, many discussion opportunities come up where you need to respond to other people's opinions and comments. Respond to your Discussion topic after you have completed your reading. Please review the Discussion Board Participation Grading Rubric in your course Syllabus. This is important information that will ensure that you earn maximum points. Your postings should be qualitative and provide substantive depth that advances the discussion. Learn More About Your Career Path Go to this website: http://www.collegeboard.com/student/csearch/majors_careers/index.html and type keywords related to your degree program in the search field (for example, medical assistant, medical coder.). Read the information before you respond to these topics. Tell us which keyword you typed in. What new information did you learn about your field? How will you “get ready” to meet these requirements? What are you most excited about learning, and why? When commenting on your peers’ answers, discuss how these health professions might work together. My keyword that I typed in was Medical Coders, I can’t really say that I learned anything new about this particular field as I have been interested in this profession for quite some time and have thoroughly researched this field. Medical Coding seems like it will be a rewarding job, I actually had the opportunity to perform coding at my last......

Words: 309 - Pages: 2

Discussion Board Unit 1

...Discussion Board Unit 1 COMP101/1401B Introduction to Computers Discussion Board Unit 1 A. Questions for weekly discussions and conclusions 1. Which features or functions of MS Word do you find particularly useful as a college student, and why? I’m still learning how to use MS Word 2010. I have mainly used MS Document to write outlines and research papers. When I have typed up outlines, it seems to be pretty easy. It automatically gives the options between bullets, numbering or multilevel listing. I’m sure with this class I will be able to learn this program successfully. 2. Which features or functions of MS Word do you think you will use most often as a professional in your chosen discipline after graduation? I’m not sure exactly but I’m sure that I will use the tools that I will learn. As of right now I use MS Word to make flyers for advertising my business. 3. How can Word help you with producing correct APA documents? Do you think Word’s APA features are useful? Why or why not? Word has helped in many ways. The autocorrect feature is great when I misspell words or misuse sentence endings. It also lets me know if the sentence I typed is fragmented. Word is good for writing different types of papers I need. I just realized that I’m not sure if I have the right setup for APA. I have to double click to double space sentences and I have to manually indent paragraphs. Is there a way to setup MS Word for APA? B. What kind......

Words: 417 - Pages: 2

Acct311 Unit 1 Discussion Board

...The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion. At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation. The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit. Consider the following scenario: A small equipment company is preparing its annual financial......

Words: 759 - Pages: 4

Acct311 Unit 1 Discussion Board

...of Financial Accounting ACCT311 UNIT 1 DISCUSSION BOARD The Discussion Board (DB) is part of the core of online learning. Classroom discussion in an online environment requires the active participation of students and the instructor to create robust interaction and dialogue. Every student is expected to create an original response to the open-ended DB question as well as engage in dialogue by responding to posts created by others throughout the week. At the end of each unit, DB participation will be assessed based on both level of engagement and the quality of the contribution to the discussion. At a minimum, each student will be expected to post an original and thoughtful response to the DB question and contribute to the weekly dialogue by responding to at least two other posts from students. The first contribution must be posted before midnight (Central Time) on Wednesday of each week. Two additional responses are required after Wednesday of each week. Students are highly encouraged to engage on the Discussion Board early and often, as that is the primary way the university tracks class attendance and participation. The purpose of the Discussion Board is to allow students to learn through sharing ideas and experiences as they relate to course content and the DB question. Because it is not possible to engage in two-way dialogue after a conversation has ended, no posts to the DB will be accepted after the end of each unit. Consider the following......

Words: 761 - Pages: 4

Unit 3 Discussion 1: Access Control Models

...Scenarios: 1. Shovels and Shingles is a small construction company consisting of 12 computers that have internet access. Discretionary Access Controls should be used in this scenario because the company is small and not in need of high security environment. This solution is the simplest to maintain and monitor for a small business. 2. Top Ads is a small advertising company consisting of 12 computers that have internet access. All employees communicate using smart phones. Mandatory Access Controls should be used in this scenario because the employees primarily communicate using smart phones, which opens up a security risk. Mandatory Access Controls are a step up stronger than Discretionary Access Controls, but are still relatively simple to monitor for a small business. 3. NetSecIT is a multinational IT services company consisting of 120,000 computers that have internet access and 45,000 servers. All employees communicate using smart phones and e-mail. Many employees work from home and travel extensively. Role Based Access Control should be used in this scenario because this is a large company with employees who travel and work from home. The roles should be controlled by a Security Administrator who could provide different levels of security to individual users. There would be some overhead in startup to get up and running but once in place this should be easy to manage. 4. Backordered Parts is a defense contractor that builds communication parts for the military. All......

Words: 407 - Pages: 2

Unit 1 Discussion Board-Advanced Entrepreneurship

...Unit 1 Discussion Board Presented in Partial Fulfillment Of the Requirements for the Class MGMT422-1101B-01 Advanced Entrepreneurship By Joseph VanTrease American Intercontinental University Online 21 March 2011 Dictionary.com defines the word innovation as something new or different introduced; a new method or device. The businessdictionary.com defines the same word as a process by which an idea or invention is translated into a good or service for which people will pay. The product that I chose is the luxurious Cadillac. It sold in more than 50 countries and territories, but mainly in North America. The Cadillac is marquee owned by General Motors. It is the second oldest American automobile manufacturer behind Buick, and among the oldest brands in the world. Cadillac’s inception to the world came in 1902 by Henry Leland, a master mechanic and entrepreneur. He named the company after his ancestor, Antoine de la Mothe Cadillac; who was born Antoine Laumet, Detroit’s founder. General Motors purchased Cadillac in 1909 and within six years it became the foundation for the modern mass production of automobiles by demonstrating the complete interchangeability of its precision parts. It was also concluded that Cadillac was America’s premier luxury car. The crest on Cadillac is also an inspiration of Detroit’s founder around the time of his marriage in Quebec in 1687; however, there is no ancient family who holds the name “Cadillac”, nor is there a coat of arms in France...

Words: 603 - Pages: 3

Unit 1 Discussion 1: Importance of Security Policies

...Unit 1 Discussion 1: Importance of Security Policies The important part of deployment is planning. It’s not possible to plan for security, however, until a full risk assessment has been performed. Security planning involves developing security policies and implementing controls to prevent computer risks from becoming reality. The policies outlined in this paper are merely guidelines. Each organization is different and will need to plan create policies based upon its individual security goals and needs: The discussion of tools and technologies in this paper is focused on features rather than technology. This emphasis allows security officials and IT managers to choose which tools and techniques are best suited to their organizations' security needs. Developing Security Polices and Controls A company's security plan consists of security policies. Security policies give specific guidelines for areas of responsibility, and consist of plans that provide steps to take and rules to follow to implement the policies. Policies should define what you consider valuable, and should specify what steps should be taken to safeguard those assets. Policies can be drafted in many ways. One example is a general policy of only a few pages that covers most possibilities. Another example is a draft policy for different sets of assets, including e-mail policies, password policies, Internet access policies, and remote access policies. Two common problems with organizational policies are: ......

Words: 432 - Pages: 2

Unit 9 Discussion 1: Risk Analysis

...Gustavo Ochoa John Webb Dani Deandresi Unit 9 Discussion 1: Risk Analysis To protect information, businesses need to implement rules and controls for the protection of information and the systems that store and process this information. This is achieved through the implementation of information security policies, standards, guidelines and procedures. This document states how a company will protect its physical and information assets. It is a living document, meaning that the document is never finished. This document can include an acceptable use policy, a description of how the company plans to educate its employees about protecting the company’s assets, an explanation of how security measurements will be carried out and enforced, and a procedure for evaluating the effectiveness of the security policy. A security policy should be written by senior management. This plan also outlines security roles and responsibilities. System characterization is used to expedite the risk analysis. It is the process of identifying which information assets need protecting either because of their criticality to the business and/or because ePHI is processed and stored on the system. This process includes conducting an inventory of major applications and general support systems—any systems that process or store PHI. A major application is an application that is critical to an organization or stores PHI. Generally, the “owner” for a major application is the director of the department......

Words: 350 - Pages: 2

Unit 3 Discussion 1: Access Control Models

...Unit 3 Discussion 1: Access Control Models Scenario 1: (DAC) Discretionary Access Control. Being that the business is small and not in need of higher security measures, it would be the easiest to maintain and monitor for a small business. Scenario 2: (MAC) Mandatory Access Control. The employees primarily communicate using smartphones; which proves as a possible security risk. MAC is stronger than DAC but, still easily monitored for a small business; which makes this the top choice for Top Ads. Scenario 3: (RBAC) Role Based Access Control. With the company being as large as it is and the employees traveling and/or working from home, the roles set by a Security Administrator would be the most secure and efficient way of providing different levels of clearance to individual users. It would take time to start from nothing but, once the security measures are in place it would be easy to monitor and to manage. Scenario 4: Content-Dependent Access Control. Since everything that the company does depends on the individual material being manufactured the above Access Control type should be apparent. Giving permissions by what is contained in each individual file is more costly but, a lot more secure. It also allows the company to monitor the data sent less as each document is given its own set of roles. Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this......

Words: 295 - Pages: 2

Unit 4 Discussion 1 Is 3230

...James A Bas IS 3230 Week 4 Discussion 1 Security Breach Evaluation Companies that have critical information assets such as customer data, birth dates, ethnicities, learning disabilities, as well as test performance data, the risk of a data breach is very likely than ever before. To monitor and protect information from hackers, malicious and well-meaning insiders, EducationS will need to select solutions based on an operational model for security that is risk-based and content-aware. Stop incursion by targeted attacks- To prevent incursions, it is necessary to shut down each of these avenues into the organization’s information assets. Core systems protection, IT compliance controls assessment automation, and endpoint management, in addition to endpoint, Web, and messaging security solutions, should be combined to stop targeted attacks. (Why) Because the top four means of hacker incursion into a company’s network are through exploiting system vulnerabilities, default password violations, SQL injections, and targeted malware attacks  Identify threats by correlating real-time alerts with global intelligence- To help identify and respond to the threat of a targeted attack, security information and event management systems can flag suspicious network activity for investigation. (Why) The value of such real-time alerts is much greater when the information they provide can be correlated in real time with current research and analysis of the worldwide threat environment.  ...

Words: 460 - Pages: 2

Unit 1 Discussion 1 Importance of Security Policies

...Unit 1 Discussion 1: Importance of Security Policies There can definitely be a problem if an organization has no Internet use policy. Having all of the internet sites available can lead to many problems. The first of the problems is possibly downloading malware. If a user downloads a third-party software from the internet, for example, it could contain malicious code that could damage the system and/or infect the network. Another problem I see is having access to personal email accounts through the internet, as people could easily use these and transfer sensitive data to them from a personal email account, thus taking the data off-site which could potentially be used against the organization. An issue with external devices, is similar to Internet usage policy, in that the user can use this external device, like a Universal Serial Bus (USB) to take company data and copy it onto the drive which can be taken off-site , as well as potentially downloading third-party data to the drive that may contain malware. An Employee Identity policy is necessary for companies so that there is some sort of authentication necessary to log into the computers and not just anyone can access them. An example of an Employee Identification would be a Common Access Card (CAC) that has a pin associated with it, or more common, a username and password that must meet a certain complexity (ex. 16 characters minimum; 1 special character minimum). Computer use policy kind of goes alongside the......

Words: 331 - Pages: 2

Unit 2 Discussion 1

...Unit 2 Discussion 1: Familiar Domains As an IT Admin you mainly deal with all seven domains, but the ones I deal with currently are work station, user domain and remote access. In any environment that you work with any of these 7 domains countermeasures are needed. It’s very important to make sure your network is secure and there are quite a few actions to take to ensure that it is safe as possible. Although no domains are 100% secured it’s always good to make sure all updates and patches are up to the most recent. I will also name a few other ways to protect certain domains in a typical IT infrastructure. Some countermeasures to take for user domain are making sure to have all users aware of security. Also have restricted access for a company’s terminal server and observe abnormal employee activity. Anti-virus is also needed to make sure the computers servers aren’t infected with malicious programs that cause loss in important documents. With a work station you can add a firewall to prevent unwanted traffic from infiltrating the network. Ensuring that your workstation has the latest service packs and patches update will also help protect any holes that could lead to hacking. Also with remote access it’s good to make sure only that person has access to certain files and must keep their password secure and not make a weak password so it does not get compromised. All these......

Words: 267 - Pages: 2

Unit Discussion

...future. To add, they assess if funds were spent wisely. Through managing funds and proper documentation, this limits transparency of circulation of taxpayers’ money. To conclude, the bulk of current laws should be crafted and introduced by the country’s Parliament because of the aforementioned functions that they are mandated to execute and to help construct a functioning society in which we civilians must co-exist. References Bahamas, The : Constitution and politics. (n.d.). Retrieved January 24, 2016, from http://thecommonwealth.org/our-member-countries/bahamas/constitution-politics Beetham, D. (2006). Parliament and democracy in the twenty-first century. Geneva: Inter-Parliamentary Union Glenn, H., Dame. (2016, January 24). Lecture 1 Part 1: What is law? Lecture, London. Retrieved January 24, 2016, from http://www.youtube.com/watch?v=1_ecJOUlHCY Johnson, J. K. (2005). The Role of Parliament in Government. Washington: The International Bank for Reconstruction and Development/The World Bank. Retrieved January 24, 2016, from http://siteresources.worldbank.org/PSGLP/Resources/RoleofParliamentinGovernment.pdf Merriam-webster.com. (2015). Retrieved January 24, 2016, from http://www.merriam-webster.com/dictionary/parliament...

Words: 580 - Pages: 3

Unit 3 Discussion 1: Access Control Models

...Unit 3 Assignment 1: Remote Access Control Policy Definition Learning Objectives and Outcomes * You will learn how to design a remote access control policy definition for an IT infrastructure. Assignment Requirements Richman Investments is an investment and consulting firm. The company wants to expand its business operations both in the U.S. and in foreign countries. It intends to eventually have 10,000 employees in 20 countries. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: * Atlanta, Georgia * Chicago, Illinois * Cincinnati, Ohio * Denver, Colorado * Los Angeles, California * Montreal, Canada * New York City, New York * Washington, D.C. The North American offices have a total of 5,000 employees who use desktops, mobile computers, and wireless devices. The Phoenix office has an Internet connection to all remote offices because redundancy is extremely important to the company. There are several sensitive applications that all offices use. The management from each office share application information that is hosted at the corporate office. Design a remote access control policy for Richman using the appropriate access controls for systems, applications, and data access. Include the design and justification for using the selected access controls for systems, applications, and data access. Required Resources * None Submission Requirements ...

Words: 277 - Pages: 2

Más detalles | Natsume Yuujinchou | The End of the F***ing World