Friday, February 21, 2020

Protecting the homeland Essay Example | Topics and Well Written Essays - 3000 words

Protecting the homeland - Essay Example There is no specific way to determine that being prepared will eliminate signs of trouble, disaster, or negative effects. The process simply adjusts the mindset of the individuals involved to meet the adversity head on and with as much resistance that can be managed. In the nations past a preparedness program was successfully demonstrated by President Woodrow Wilson. President Wilson was against the United States being involved in World War I. However, he was denied any advances for an agreement of peace amongst the U.S. and Germany. When terms were not agreed upon the President decided to focus attentions on preparing the Army, marines, and navy for being forced into the war. At the time some individuals felt as though Wilson was planning to push the U.S. into war because of his strategy. In 1917, the President was drawn into the war on Germany despite his â€Å"He Kept Us Out of War†, campaign. The major event here was the amount of readiness the President possessed on behal f of the U.S. With the determination of his armies, Wilson retrieved an Armistice from Germany in efforts to further a peace agreement. With these efforts the President was able to deliver his Fourteen Points speech that would be a big factor to ending the war completely (Woodrow Wilson, p. 1). Based on earlier arguments, it is conceived at this point that although President Wilson took necessary steps to avoid the United States interaction in World War I, he also prepared us for war. Not only did he get his troops in line, the President was well enabled to produce a solution to the issues that spawned a full war in the first place. Wilson was not able to stay out of battle. It actually took him well over a year to get Congress to sign off on his Fourteen Points. This tactic is a good example of what preparedness is about. Fighting and disagreement may not always be completely avoidable, but a solution and plan should readily be prepared to produce a means for an end. It should also be acknowledged that even with preparedness concept efforts there have been several terrorist attacks focused on United States soil. More importantly, there have been attacks directed at symbols of the nations success and power such as the World Trade Center. These types of attack demonstrate a will of terrorists to damage the United States image as a major authority. Being able to defy that authority at whatever level is a specific aim by any attack. The message that terrorists deliver will not be one that seeks to minimize damage to the U.S. or its citizens. In February of 1993 a bombing attack was demonstrated on the World Trade Center. There was a truck positioned beneath the North Tower intended to collapse the North and South Towers of the Trade Center. The bomb did not successfully kill thousands but it did manage to kill nearly ten individuals and injure over one thousand. Then again on September 11 of 2001 there was another significant attack on the World Trade Center. In this case planes hijacked by terrorists were aimed at taking out the Towers. Of the four planes taken two hit the mark and leveled the Twin Towers. This time the terrorists attempts managed to bring about the demise of over three thousand individuals. Attacks like these have attempted to crumble the United States position for decades. In light of all the attempts at the expense of

Wednesday, February 5, 2020

Technology ethis in the classroom Essay Example | Topics and Well Written Essays - 750 words

Technology ethis in the classroom - Essay Example When computers are properly utilized, they can be good tools for education, as well as an investment. Everyday, schools, as well as teachers and students, are reliant on computers in the performance of everyday activities. Teachers can use them in recording student grades, as well as the reception and sending of mail. The individual can use them to create, store, and manage critical information. Therefore, they must be protected from loss, misuse, and damage. For instance, school districts are expected to ensure that a student’s information regarding learning problems, grades, attendance rates, and personal data is protected from loss and maintains confidentiality (Barcalow et al 1). While the use of the internet has significantly revolutionized communication, as well as provided new educational tools for student learning, it has also come with risks and raised ethical issues for all students in different grades (Sandler 1). This has also made for various opportunities for ill egal and inappropriate behavior, as well as behaviors that are deemed unsafe for the students. More K-12 educators, progressively, have come to appreciate the urge and importance of utilizing the internet for instructions, as well as teaching and familiarizing the students with knowledge and critical thinking skills required for production of responsible citizens in and out of school. Some school districts have successfully completed the incorporation of internet safety and security lessons into their curricular, in preparing students from every grade for responsible and ethical behavior when operating online. I would proceed to implement security through teaching students to raise questions on the reliability and authenticity of websites that they access (Sandler 1). The learners need to be provided, as well as permitted to utilize specific websites for research purposes. Additionally, the students need to be provided by a protocol set for which they are required to follow if somet hing that they find appropriate appears on the computer screen. Most of the cover news on issues that have to do with internet safety and security issues are mainly focused on the young learners and, for this reason, it is vital to begin education efforts aimed at this (Conway 1). I would encourage the implementation of web usage education immediately the learners begin using computer technology. Learners and students in the first two grades need to be taught to on application and use of passwords and why this needs to be kept secret. I would also create copyrights with students using agreements in the classroom, as well as parents signing acceptable policies for use that regulate the use of technology in school. The usage of the web would incorporate acceptable policies of use that need to be the first line of defense in order to avert unlawful and insecure use of technology resources in the school (Conway 1). The technology policy must be reliable with in comparison with policies used for other resources that relate to the school, replicating the school’s goals and mission. Three ethical practices would be implemented in the classroom. For one, it would be essential to solicit parent involvement. Not only the learners and tutors will be targeted by internet safety and security education (Vance 1). It is important for school districts to hold, at schools, internet safety rights for both students