Author name: Rosemary Mosco

President role

President role

Please respond to the following discussion,

Very few would argue with the claim that the President’s role as Commander-in-Chief is the greatest formal power that a president possesses. Yet, in the Constitution, only Congress has the authority to formally “declare war.” Presidents for the last 60-70 years have openly stated that they do not need Congressional authorization to use the military to pursue America’s interests on the global stage. As proof, America has not formally declared war since WWII. So, Korea, Vietnam, Gulf War, Iraq War, Afghanistan, and now Syria have all been military exercises, but not wars in the Constitutional sense.

Has the power of the President of the United States as Commander-in-Chief exceeded constitutional boundaries and should those powers be curtailed, given the constant state of war we find ourselves in? Or should the President’s military powers continue to expand to address the growing chaos in our world, despite the Constitution or in congruence with the Constitution? Explain your answer.

Your initial discussion postings (250-300 words) should demonstrate an understanding and analysis of the assigned readings and video. It may be helpful to reference the assigned material in your response demonstrating connections between your thoughts and the course resources. In addition, you will also need to post two substantial responses (about 150-200words) to at least two of your classmates’ posts.

President role Read More »

Educating Children with Disabilities

Educating Children with Disabilities

What are three things you believe teachers can and should do when working with the parents and families of children with disabilities?

What added challenges would you anticipate if these children are also of racial, cultural, or linguistic minorities?

This is access to the book the information for the discussion board is in purple Chapters 3 and 4

Educating Children with Disabilities Read More »

CriticalIssues in CriminalJusticeSystem

CriticalIssues in CriminalJusticeSystem

As you complete this course and the program, it is time to look ahead at the critical issues facing the criminal justice system. Many of today’s critical issues have either arisen or worsened as a result of the 9/11 attacks. This assignment will require you to build on your assignment by applying the concepts of the course to the following four areas:

  • Using the Internet, research and analyze a major national-level street gang, such as MS-13 or the Bloods. Describe the challenges such gangs present to law enforcement. Also, analyze how theories such as social disorganization and strain theory describe factors that lead juveniles to join such gangs.
  • Another key issue is the use of deoxyribonucleic acid (DNA) evidence to exonerate wrongfully-convicted offenders. Advances in technology in recent years have allowed investigators to use old crime scene evidence to prove the evidence of some death-row inmates. For this portion of the assignment, describe the efforts being made by citizens outside the criminal justice system to ensure that innocent people are not wrongfully executed. Be sure to include the “Innocence Project.”
  • The above issue raises the question of how innocent men and women might have been convicted in the first place. For the third portion of this assignment, analyze and discuss the most common causes of wrongful convictions.
  • For the final part of this paper, examine a post-9/11 critical issue that corresponds to your area of interest. Once you have selected an issue:
    • How the community influences this issue?
    • Are the lawmakers and politicians addressing the issue appropriately?
    • Have any improvements been made in recent years?
    • Given what you have learned throughout his program, what are your thoughts on the issue?
    • Some issues you might wish to choose may include the President’s use of drones to kill the US citizens suspected of terrorism without due process; the use of GPS devices and “sneak-and-peek” searches to investigate suspects; cyber-attacks from foreign countries; the use of Supermax prisons to house convicted terrorists; legislation to restrict private ownership of certain types of guns.

Submission Details:

  • Provide the answers in 5–6 pages Microsoft Word document.
Please make sure that everything is explained correctly and concise. This is the final paper for the class. Please read & follow everything that is in bold and also underlined; also include examples

 

CriticalIssues in CriminalJusticeSystem Read More »

Topic: Activities

Topic: Activities

Below is a list of possible first-grade topics for a unit on transportation. Without gathering specific materials, develop a hypothetical activity sequence for these topics.

Provide a variety of activities for each topic that assists children in understanding the “Topics List.”

Topic List:

Your original post (thread) to the Discussion Board Forum question posed should be 400–500 words. This parameter helps to promote writing that is both thorough and yet concise enough to permit other candidates to read all the posts. Appropriate references should be made in APA format. First person is allowed in your posts.

Topic: Activities Read More »

Have a network security project report i need help with

Have a network security project report i need help with

In this section, students will address each of the following.

Define the physical security requirements, propose a solution, and justify the solution.

At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.

o At a minimum, students should discuss the three main factors of prevention, detection, and recovery; and include the appropriate control measure.

o Students should include smartphones, laptops, tablets, or any other mobile device that may be introduced in the UMUC environment. Students should also include the considerations and their implications.

o Students should consider the different types of attacks, security appliances, and the network configuration to implement.

  • Define the network defense requirements, propose a solution, and justify the solution.

o Students should discuss common network devices, their vulnerabilities, and propose defensive solutions.

  • Define the host defense requirements, propose a solution, and justify the solution.

o Students should the types of attacks hosts are susceptible to, and proposal defensive solutions.

Have a network security project report i need help with Read More »

Scroll to Top