.

Thursday, January 30, 2020

My childhood memory that still occurs today Essay Example for Free

My childhood memory that still occurs today Essay I don’t know why I’m surprised about this as it’s happened before and still is today. Looking back at it now has made me a lot more confident and I feel a lot stronger than I was before. This all happened 10 years back from now how I had an operation on my eyes that didn’t go to plan and left me with bad results to my eyes as one was squint and the other was just normal. Knowing I had to go to school with these effects was terrifying, nerve-racking, scary, and I had this gut feeling that I wasn’t going to be good enough for anyone. Every day that went by was emotional and upsetting to not only me but to my mum too as she knew what it felt like to be bullied. Each day I came home from school with tears streaming down my face, she knew something was wrong and as I was so young she had no idea what to do but to comfort me and sometimes it wasn’t always like that she would sometimes and sit there and cry because she wanted to help and also the fact she hated seeing her children cry/ be upset. From day one I was given a nickname which was named 4- eyed Katherine and now growing up it has came to me that my new nickname is cock-eyed Katherine. As it’s been so long ago that this all started I can actually still remember an incident that happened due to the disaffect in my eyes. The school bell rang for home time, I was so happy to be g oing home. I remember running to the door with my big heavy schoolbag that was twice the size of me. I waved all the teachers goodbye and opened the door to see a few guys I knew that were in my class standing just outside to the left of the school doorI hated each and every one of them that were there. One of the boys within the group said hello so I just ignored him and walked on by then I heard someone shout from the group â€Å"oi, Katherine come here†, I didn’t want to go as I just wanted to get home so I ignored them again was halfway down the playground. After having been ignored twice they decided to come over to me, they all circled around me. Next thing I knew I was thrown to the ground; they all spat on me and called me 4-eyes. I seen that they had on roller-blades, they started kicking me with themit hurt me like mad. By this time I was crying and screaming for help. I could hear someone from the far end of the playground shouting â€Å"leave her alone†, the boy s all ran off and I was left in pain, I couldn’t feel parts of my body. One of the teachers came over and helped me up also took me back to the school to get me cleaned up. My mum was called  and was told about what had happened to me .thinking about it gives me butterflies in my tummy. Reflecting back 10 years from now is a huge difference but more to the fact that all the bullying hasn’t stopped as it still proceeds today, just like it has for the past 10 years. As I grew up I learnt that not everyone was perfect; everyone has their own flaws and opinions. Looking back from 10 years to now has mostly not affected me as much as it did before but in reality it’s hard to hold back feelings. As it still happens today I don’t really bother about it as basically I’m used to it but sometimes it can go abit too far and it will eventually get to me. There are times that someone has said something either about me or to me and I just simply walk away as people have their own opinions. I don’t understand why they bully me because if it had happened to them they wouldn’t like it. I still have the nickname of cock-eyed Katherine today, I had to wear glasses ever since I had the operation so it would help my eyes get better but every tim e I took them off everyone just stared at me and laughed and I knew from then that I was going to get bullied and be an easy target. Ever since I had theses glasses everyone kept asking me to take them off just so they could see my eyes and laugh at me. My friends stick by me today and they have for a long time, they have seen me at my worst when all this gets to me and they understand how I’m feeling as they also have been through that stage but not as long as I have though. There is an incident that happened in 1st year where it was in P.E and we were doing swimming, as I can’t really see without my glasses I had to wear them. I jumped into the water and when I rose to the top I noticed I wasn’t wearing my glasses, they must have fallen off and sunk to the bottom of the pool. I turned around to find everyone in my class staring at me and laughing. One pupil had to swim to the bottom and collect them and from that day in high school I was bullied as everyone knew the me under the glasses. I mean there are also times when I am walking in the corridor of school and people just walk by me and say â€Å"look there’s cock-eyed Katherine†, I just don’t listen and just keep on walking. In my own opinion I feel like everyone should be treated equally and fairly, we all came in this world the same way so we should all go out that way too. I would like for all the bullying to stop as I’m fed up of it and it just isnâ€℠¢t fair on me that I’m being picked on when they wouldn’t like it if I were doing it to them.

Wednesday, January 22, 2020

censorhf Censorship of Huckleberry Finn :: Adventures Huckleberry Huck Finn Essays

Censorship of Huckleberry Finn      Ã‚  Ã‚   As parents, it is important for you to know what information your child receives, especially in the learning environment of a classroom. The thought of your child reading a racially offensive book is unacceptable. Some people find Mark Twain's The Adventures of Huckleberry Finn racially offensive. If you as parents perceive this book to be offensive, it may lead some of you to request that teachers and administrators not allow students to read this book in school. I ask that you consider other options before taking this action. The actual reasons for the censorship of Huckleberry Finn depend on many other factors: fear of uneducated or insensitive teachers leading student discussions, school administrators who wish to avoid controversy and discomfort with acknowledging our country's painful history.    What some people find offensive about this story is the language Huck Finn uses. In the story, Huck often refers to Jim as a "nigger," which some groups find unnecessary and reprehensible. In the minds of administrators and teachers, there is an easy solution by using less-controversial books. John Wallace, a school superintendent, writes, "Pejorative terms should not be granted any legitimacy by their use in the classroom under the guise of teaching books of great literary merit, nor for any other reason" (18). Why are we afraid of these "pejorative terms," instead of explaining to students what they mean and why white people used to use them to address African-Americans? Yet instead of finding out why we worry if the children read a derogative term used commonly over a century ago, we ignore the subject and pat ourselves on the backs for saving children's minds. Huckleberry Finn addresses topics dealing with race which are still relevant today. We cannot expect to solve the racial problems today by banning literature that deals directly with these issues. Twain writes about a friendship between a slave and a white youth; he demonstrates the lack of reason behind racist thought. These topics are not harmful to African-Americans, and if taught correctly, can be a positive learning experience.    Instead of addressing these issues, administrators often remove the controversial book from the class reading list and replace it with another book. Former Justice William Douglas is noted for his concern with First Amendment freedoms on the Supreme Court. He writes, "The First Amendment does not say that there is freedom of expression provided the talk is not 'dangerous'.

Tuesday, January 14, 2020

Observation of Equity

One of the many roles of a teacher is to demonstrate sensitivity and equitable treatment towards the diversity in their classroom. In my field experience classroom, I had the opportunity to observe different strategies and techniques used to meet the diverse needs of an ESE (Exceptional Student Education) classroom at Howard A. Doolin Middle School. Mrs. Alcala and her 6th grade EBD (Emotionally Behaviorally Disabled) Math class consist of 7 students, whom are currently learning about Fractions, Decimals, and Percents. Mrs. Alcala implemented a lesson plan that would help her students understand and strengthen their ability to use equivalent forms of Fractions, Decimals, and Percents to solve problems. The lesson began with a warm-up on basic mathematical operations. She gave the students five minutes to try and complete the warm-up, and then asked students to come up to the smart board to solve the problems. After the warm-up, as a class, they went over the vocabulary words for the lesson such as fractions, decimals, and percents. Mrs. Alcala then began teaching the lesson and doing examples projecting them on the smart board. Throughout the lesson the students took turns going up to the smart board to practice examples. Some students were able to solve the problems on their own and some required prompting from the teacher. After the examples, Mrs. Alcala played a ten minute video on the smart board showing the students step by step on how to solve problems involving fractions, decimals, and perce nts. Next, the students were split into two groups of two and one group of three. She passed out manipulatives for the students to do practice problems, and were given fifteen minutes to work as a group. Lastly, Mrs. Alcala took the last five minutes of class to go over examples of each of the concepts she had presented. As the observer I feel that the teacher was extremely sensitive to the diverse needs of the students in her classroom. She was very aware of all the students in the classroom and targeted their specific needs. For example, the teacher used various tools such as the smart board, video, and manipulatives to address not only the different learning styles but the levels as well. During the group work the higher level students were grouped with the lower level students to give them more assistance. Additionally, the classroom was structured in a way that was conducive to learning but motivating in the same way with the use of manipulatives, video, and technology. The students responded well to the video and manipulatives, and enjoyed being able to use the smart board to solve problems. The teacher used cueing before transitioning from activity to activity. This allowed students to know ahead of time what they were doing next. While students were working individually as well as in groups, the teacher walked around the classroom asking the students if they needed any assistance. If she noticed the students were having difficulty she made sure to work one on one with the student. Overall, I felt that the teacher was very respectful towards her students. Occasionally, one specific student would blurt out an inappropriate comment and the teacher would address the misbehavior. From my observation, I can gather that addressing diversity in the classroom takes lots of work, planning, and continuous learning in the profession. Highly effective teachers have high academic expectations for all students. The classroom use of modeling, scaffolding, providing guided practice, frequent monitoring and adjustment of instruction all work together to proactively prevent discipline problems that might occur due to lack of understanding and disengagement. Creating a classroom management system that is sensitive to diversity is a mind set that continually takes into consideration the backgrounds, culture, needs, and strengths that all children bring to the table of learning.

Sunday, January 5, 2020

Network Security And Security Assessment - 1194 Words

Network Security Assessment Network Security is a very dynamic and technical field dealing with all aspects of scanning, hacking and securing systems against intrusion. It is more than just encrypting user data, virtual private networks or installing firewalls. Network security consists of the provision, policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources (Xie, 2013). Network Security assessments are carried out by ethical hackers, to find vulnerabilities in the system’s security that would enable a malicious hacker or intruder access to the network. An Ethical hacker is a security professional that performs pen tests by using software tools and techniques as malicious hackers. Their goal is to exploit vulnerabilities in a system or network to find weakness in one or more if the four elements of security. There are five distinct phases in ethical hacking: Phase I: Reconnaissance: This involves gathering information about a potential target without the targeted company’s knowledge. Phase II: Scanning – This phase involves taking the information discovered during the reconnaissance and using it to examine the network. Phase III: Gaining Access – It is during this phase where the vulnerabilities of the system are exploited to gain access to the target system. Phase IV: Maintaining Access – With access to the system, the hacker then secures their access forShow MoreRelatedVulnerability Assessment Of The Network Security1281 Words   |  6 Pagesincreased security risks. Many of these risks are as result of hacking, improper uses of network resources and network device vulnerabilities. Awareness of the various weaknesses and vulnerabilities is vital to the success of current networks (Kizza, 2013). The network security incidents are increasing at a disturbing rate every year. As the complexity of these threats increases, so do the security measures required to protect networks. Enterprise data center operators and analysts, network administratorsRead MoreNetwork Security Assessment : Questions Essay2284 Words   |  10 Pages Network Security Assessment Prepared for: University of Maryland University College Prepared by: Erik Milkie â€Æ' I. Vulnerability Assessments Use this section to describe any network security vulnerabilities. Use the scenario along with industry standards and best practices to identify the vulnerabilities. Describe why it is vulnerable and what the implication is if it is not mitigated. In this section, we are identifying vulnerabilities of the firm and simple ways to make it safer. I willRead MoreNetwork Security Products : Risk Assessment Report3349 Words   |  14 PagesNetwork Security Products LabNet Risk Assessment Report Submitted to Professor Tolson Capitol Technology University By Samantha Fitzpatrick Submitted: 28 June 2015 EXECUTIVE SUMMARY The Network Security Products (NSP) branch understands that classified, sensitive information cannot be protected unless it has the proper safeguards and security system in place. Capitol Technology University student, Samantha Fitzpatrick, has been tasked to conduct a risk assessment of the LabNetRead MoreCis 502 Technical Paper Week 10 Assignment Risk Assessment897 Words   |  4 PagesTechnical Paper Week 10 Assignment Risk Assessment http://homeworkfy.com/downloads/cis-502-technical-paper-week-10-assignment-risk-assessment/ To Get this Tutorial Copy Paste above URL Into Your Browser Hit Us Email for Any Inquiry at: Homeworkfy@gmail.com Visit our Site for More Tutorials: (http://homeworkfy.com/ ) CIS 502 Technical Paper – Week 10 Assignment Risk Assessment CIS 502 Week 10 Technical Paper Technical Paper: Risk Assessment Global Finance, Inc. Internet OC193 10Gbps Read MoreAirport Security And Security Risk Assessment906 Words   |  4 Pages Airport security risk assessment More than ever businesses rely in a reliable network for their everyday business transactions. Security for a network is the cornerstone of data security, integrity and accessibility. New trends in cyber security and network breaches have impelled stakeholders to implement better security measures and techniques that adapt to many new protocols, manufacturers devices and cyber security laws. Businesses are challenged to providing secured networks and to complyingRead MoreInformation Security Is A Key Component And Main Concern Of Information Technology999 Words   |  4 PagesInformation security is a key component and main concern of Information Technology (IT) professions, nowadays. The protection of data, networks, computers, etc. is a more and more growing field. This has been made even more important with the attacks and breaches noticed earlier 2014. The U.S Bureau of Labor Statistics (BLS) through the â€Å"Occupational Outlook Handbook† predicts that the demand for in formation security analysts will grow by 22 percent in a decade. Thus adding more than 65,700 positionsRead MoreIs4550 Week 5 Lab1611 Words   |  7 Pagesand Audit an Existing IT Security Policy Framework Definition Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify risks, threats, and vulnerabilities in the 7 domains of a typical IT infrastructure * Review existing IT security policies as part of a policy framework definition * Align IT security policies throughout the 7 domains of a typical IT infrastructure as part of a layered security strategy * IdentifyRead MoreRisk Assessment Is The Top Priority For Any Type Is Impenetrable1671 Words   |  7 PagesFindings Networks are very vulnerable to any holes that are within its infrastructure. In fact, many may believe that they have the best security measures in place, but no system or network of any type is impenetrable (Trim Lee, 2014). Risk assessments are extremely necessary so that corrective countermeasures can be applied and overall security can be enhanced (Broder Tucker, 2011). Security should ensure that this is the top priority for any company or organization. A detailed risk assessment showsRead MoreRisk Assessment For Ba Continuum India Private Ltd1305 Words   |  6 Pages Risk Assessment for BA Continuum India Private Ltd. By Sravani Nandyala To Fulfill the Partial Requirements of ITC 6315, CRN 20283 Submitted to Prof. Jason Black Northeastern University – Collage of Professional Studies Abstract An extensive risk assessment for the company which I worked in India. This organization is a subsidiary of Bank of America. Majorly deals with the financial data of the customers. In this paper I would like to introduce a new approach to risk assessment for theRead MoreQuestions On Security Assessment Services1386 Words   |  6 PagesSecurity Assessment Services Checklist and Auditlist related points for an organization called â€Å"Cvent†, whose core business is SaaS and Mobile Application related to System Application Domain. Hence we need to make sure that the application servers are physically and virtually secure and provide round the clock availability and reliable data integrity. There should also be a checklist to ensure due privacy and confidentiality of client data. ïÆ'Ëœ Physical Security The organization should make