Tuesday, January 28, 2020

Cyber attacks and digital terrorism

Cyber attacks and digital terrorism 1.a.Cyber Attack and Digital Terrorism Introduction There are various reasons why people initiate cyber attacks or execute digital terrorisms, whatever it is, the goal is to cause damage and destruction, with motivations that range from anything personal, political, economic or all. Below are list of few reasons why cyber attack and digital terrorism occurs: i.Personal Anger people who are psychologically angry at their organization, for whatever reason for example not being promoted for long time or no increment in the salaries or made redundant. The individual might plant viruses into the companys network or delete some of the important functions of a program which may create problem in the future. It can happen even a superior is pressurizing his subordinate. The subordinate may embed a virus in an e-mail attachment in a view to corrupt the superiors computer as revenge. This type of doings can be categorized as a personal digital terrorism. ii.Hired Service Occasionally individual can hired another individual (usually professionals intruders) to hack into someones computer network and steal important information or destroy the computer by wiping off all digital trails and the intruder is paid substantially. Even then the professional intruder can double-cross by inform the targeted company that the companys network infrastructure is at risk and he can solve the problem. This type of activity can be classified as a professional digital terrorism. iii.Ransom Money Sometime a person might need money desperately and nobody is there to help him, the banks also do not want to give a loan because of poor credit history, even family members do not have money to support him but this person may have special skills. He informs the bank that he have planted a logic bomb into their network which will activate at a certain time and will cause severe damage or even crash the banks networking system. He/she may ask for ransom money. Once the money is received, the de-activate code for the logic bomb will be send to the bank. This type of activity can be classified as a personal desperate digital terrorism. iv.Political War These is typically against There are some people who get politically angry because those in power do not agree with their views or wishes. They want to display their peoples power or dislike by conducting demonstrations etc. One way as a warning is planting logic bombs with a ransom note that says unless the demands are met then the logic bomb will go off. This is typical against governments or organization/union of governments like The G8, APEC Summit, World Economic Forum etc. This type of activity can be classified as a political group digital terrorism. v.Declared War There exist true terrorist organizations that have publicly declared their all out war against countries or organizations. They have named their sworn-out enemies. Conducting cyber attacks is one of their strategies to achieve their aims everything is possible in war. Each side will try to destroy or cripple each others war machineries and capabilities. For example: In the UN against Iraqi War, the whole radar system of Iraq was jammed by the US during the early phases of the war. All electronic and computer communications infrastructure of Iraq were crippled. This type of activity can be classified as an expected political digital war tactics and not really digital terrorism. 1.b. What are viruses, worms, Trojan horses, logic bombs and DOS attacks? Viruses A virus is a small piece of malicious code that attacks a computer program or file. A virus can attack a computer in different ways by attaching itself to other software programs or data files in order to be executed, usually without user knowledge or permission, which can cause clogging computer memory, destroy programs or data, reformat a computer hard disk or can cause a program to run improperly. Virus typically spreads from computer to computer when action such as sending an email attachment or copying an infected file(as we know companies are going online, so uses net is extensively in dealing ). As we know anti-virus softwares are designed to check computer system and drives for the presence of computer viruses. Antivirus programs databases are constantly being updated to combat and prevent such attacks. It is recommended Firms those uses net extensively in dealing with its branches, customers and suppliers, it is highly recommended to continually update their anti-virus softw are with recent virus signature files. Worms A worm is a type of virus that has the ability to multiply or copy itself from one machine to another, gradually over a network. The two key differences between a virus and a worm are the multiplying or copying effect and the spreading across to other computers whereas a virus may not multiply itself and may attack only just one computer. A Trojan horse This is a security-breaking program that is introduced into a computer and serves as a way for an impostor to re-enter the computer in the future. It may be hidden as something innocent such as a screen saver or a game. It can damage, delete, or destroy important files, essentially do anything it is programmed to do. The key thing here is not in the type of damage but in how it enters a computer i.e. by a deceptive way. A logic bomb This is a program that is introduced into a computer and set to take action at a certain time or when a specified event occurs. It can do anything it was programmed to do. A DOS (Denial of Service) attack These are action being implemented by invading a large number of computers on the network (usually internet) and instructing the computers to simultaneously send repeated messages to a target computer, thus either overloading the computers input buffer or jamming the communication lines into the computer so badly that legitimate users cannot obtain access to the targeted computer. The key terms here are jamming the target computer or computers so that those targeted computers can no longer provide services (i.e. users are denied of the services). Some people refer to DOS attacks as the Ping of Death or the Teardrop. Information and Identity theft in the digital world The word Theft is simply obtaining something (materials or non-materials) through illegal means.   So information theft is obtaining information illegally, for example, without the owners permission. Publicly published information is legally public and therefore, having such information by whatever means is never considered stealing or theft. Identity theft according to the US Federal Trade Commission (FTC) is someone (somebody else) is appropriating your personal information without your knowledge to commit fraud or theft. For example, an identity thief uses information about someone, such name, address, social security number, credit card number and/or other identifying information to impersonate you and obtain loans or purchase items under your credit. Information theft is simply about stealing information for whatever use the thief wants it for, whereas identity theft is the extension of information theft with the user wanting to impersonate you or be identified as you using that stolen identification information to be used for many things, good and mostly bad. A thief can use the stolen identification information for criminal activities including validating against computer software systems: the banks identification system (to steal your money in the bank), the credit card system (to use your credit card to buy things), the immigration system (to run out of the country) and many more. It all looks like it is actually you performing those activities and not the thief. A thief who is also a hacker can do more, for example, penetrate the records registry system (to hack and change your date of birth, your gender status, your parents names, etc), the police crime database system (to hack and say that you committed a crime which you never did), the university records system (to hack and change your grades from A to F, to change your major degrees etc ), the White House Security System (to visit and say hello to the most powerful man in the world), the FBI and CIA computer systems etc. Conclusion: Web application attacks are increasing drastically because there is a lack of knowledge in securing the applications, especially during the development and deployment stages of the applications. To control or avoid this menace, we must ensure that security is being implemented not only during the coding stage, but also the deployment stage. The operations of a Web application must be monitored by the administrator so any exploits can be detected earlier and damages can be minimized or avoided such as using an intrusion detection system to monitor and filter Web traffic. It is also recommended for all organizations to conduct a security audit assessment to ensure that an application is secured before it is published to the public.

Monday, January 20, 2020

To Kill A Mockingbird - Changes in the Characters Thought the Novel :: Kill Mockingbird essays

To Kill A Mockingbird - Changes in the Characters Thought the Novel In the novel "To Kill A Mockingbird" each of the main characters changed quite a bit. Through the experiences each character went through and the natural maturing that occurred in each of them, the characters were altered from the way they were at beginning of the book. The children, Scout and Jem, were the two most dramatically changed characters. However, Scout showed much more change than Jem did because of his mysterious hidden attitude. Scout matured from a helpless and naïve child into a much more experienced and grown-up young lady. As a growing young girl, Scout was learning and experiencing things just like any other child would though growing up. She got older and was able to understand things a lot better as well as being able to apply lessons she had learned in her everyday life. She began to act slightly more grown up in situations such as Aunt Alexandria's dinner party. Scout forgot how much she despised her Aunt and how much she disliked dresses and joined the group of women in their conversations. Despite how she didn't want to "act more like a lady", she played along with her Aunt's "campaign to teach me (Scout) to be a lady" made an exception to please her Aunt and to create some peace between them. Upon hearing the news of Tom's death she concludes "if Aunty could be a lady at a time like this, so could I." This shows how Scout was beginning to act more ladylike for her Aunt. Another way Scout changed a lot was in the way she treated Boo Radley. At the beginning of the book Jem, Dill, and herself enjoyed playing "Boo Radley" as a game and tormenting him by trying to have a chance to see him or prove their bravery by touching the house. As time went on, Scout's fears and apprehensions regarding the Radley place slowly disappeared. She mentions how "the Radley Place had ceased to terrify me (her)..." As she matures and is more able to take care of herself, she realizes more and more that Boo Radley is a human being, just like herself.

Sunday, January 12, 2020

Report of Seasonal Goods

————————————————- American Library Association From Wikipedia, the free encyclopedia American Library Association| ALA Logo| Abbreviation| ALA| Formation| 1876| Type| Non-profit NGO| Purpose/focus| â€Å"To provide leadership for the development, promotion and improvement of library and information services and the profession of librarianship in order to enhance learning and ensure access to information for all. â€Å"[1]| Headquarters| Chicago, Illinois| Location| Chicago, Illinois  andWashington, DC| Region  served| United States| Membership| 59,675[2]|CEO| Keith Michael Fiels| President| Maureen Sullivan| Budget| $33. 5 million[3]| Staff| approx. 300| Website| American Library Association| The  American Library Association  (ALA) is a  non-profit organization  based in the  United States  that promotes  libraries  and library education international ly. It is the oldest and largest library association in the world,[4]  with more than 62,000 members. [5] * | ————————————————- [edit]History Founded by  Justin Winsor,  Charles Ammi Cutter,  Samuel S. Green, James L. Whitney,  Melvil Dewey  (Melvil Dui), Fred B.Perkins and  Thomas W. Bicknell  in 1876 in  Philadelphia  and chartered[6]  in 1879 in  Massachusetts, its head office is now in  Chicago. During the Centennial Exposition in Philadelphia in 1876, 103 librarians, 90 men and 13 women, responded to a call for a â€Å"Convention of Librarians† to be held October 4–6 at the Historical Society of Pennsylvania. At the end of the meeting, according to Ed Holley in his essay â€Å"ALA at 100,† â€Å"the register was passed around for all to sign who wished to become charter members,† making October 6, 1876 to be ALA's birthday.In attendance were 90 men and 13 women, among them Justin Winsor (Boston Public, Harvard), William Frederick Poole (Chicago Public, Newberry), Charles Ammi Cutter (Boston Athenaeum), Melvil Dewey, and Richard Rogers Bowker. Attendees came from as far west as Chicago and from England. [citation needed]  The aim of the Association, in that resolution, was â€Å"to enable librarians to do their present work more easily and at less expense. â€Å"[7]  The Association has worked throughout its history to define, extend, protect and advocate for equity of access to information. 8] Library activists in the 1930s pressured the American Library Association to be more responsive to issues put forth by young members involved with issues such as peace, segregation, library unions and intellectual freedom. In 1931, the Junior Members Round Table (JMRT) was formed to provide a voice for the younger members of the ALA, but much of what they had to say resurfaced in the social respon sibility movement to come years later. 9]  During this period, the first  Library Bill of Rights  (LBR) was drafted by  Forrest Spaulding  to set a standard against censorship and was adopted by the ALA in 1939. This has been recognized as the moment defining modern librarianship as a profession committed to intellectual freedom and the right to read over government dictates. [10]  The ALA formed the Staff Organization's Round Table in 1936 and the Library Unions Round Table in 1940. The ALA appointed a committee to study censorship and recommend policy after the banning of  The Grapes of Wrath  and the implementation of the LBR.The committee reported in 1940 that intellectual freedom and professionalism were linked and recommended a permanent committee – Committee on Intellectual Freedom. [11]  The ALA made revisions to strengthen the LBR in June 1948, approved the Statement on Labeling in 1951 to discourage labeling material as subversive, and adopted the Freedom to Read Statement and the Overseas Library Statement in 1953. [11] In 1961, the ALA took a stand regarding service to  African Americans  and others, advocating for equal library service for all.An amendment was passed to the LBR in 1961 that made clear that an individual's library use should not be denied or abridged because of race, religion, national origin, or political views. Some communities decided to close their doors rather than desegregate. [12]  In 1963, the ALA commissioned a study,  Access to Public Libraries, which found direct and indirect discrimination in American libraries. [13] In 1967 some librarians protested against a pro-Vietnam War  speech given by General  Maxwell D.Taylor  at the annual ALA conference in San Francisco; the former president of  Sarah Lawrence College, Harold Taylor, spoke to the Middle-Atlantic Regional Library Conference about socially responsible professionalism; and less than one year later a group of librarians pr oposed that the ALA schedule a new round table program discussion on the social responsibilities of librarians at its next annual conference in  Kansas City. This group called themselves the Organizing Committee for the ALA Round Table on Social Responsibilities of Libraries.This group drew in many other under-represented groups in the ALA who lacked power, including the Congress for Change in 1969. [14]  This formation of the committee was approved in 1969 and would change its name to the Social Responsibilities Round Table (SRRT) in 1971). After its inception, the Round Table of Social Responsibilities began to press ALA leadership to address issues such as library unions, working conditions, wages, and intellectual freedom. The Freedom to Read Foundation was created by ALA's Executive Board in 1969. 15]  The Black Caucus of the ALA and the Office for Literacy and Outreach were set up in 1970. [16] In June 1990, the ALA approved â€Å"Policy on Library Services to the Poorà ¢â‚¬  and in 1996 the Task Force on Hunger Homelessness, and Poverty was formed to resurrect and promote the ALA guidelines on library services to the poor. [17] The ALA archival materials, non-current records, are currently held in the University of Illinois archives. [18]  These materials can only be used at the University of Illinois. ————————————————- edit]Membership ALA membership is open to any person or organization, though most of its members are  libraries  or librarians. Most members live and work in the United States, with international members comprising 3. 5% of total membership. [19] ————————————————- [edit]Governing structure the ALA is governed by an elected council and an executive board. Since 2002,  Keith Michael Fiels  has been the ALA executive director (CEO). [20]  Policies and programs are administered by various committees and round tables.One of the organization's most visible tasks is overseen by the Office for Accreditation, which formally reviews and authorizes American and Canadian academic institutions that offer degree programs in  library and information science. The ALA's current President is Molly Raphael (2011–2012). [21]  Notable past presidents of the ALA include  Theresa Elmendorf, its first female president (1911–1912),[22]  Clara Stanton Jones, its first African-American president (1976–1977),[23]  Loriene Roy, its first Native American president (2007–2008),[24][25]  Michael Gorman  (2005-6), and  Roberta Stevens. 26](See  List of presidents of the American Library Association. ) [edit]Activities The official purpose of the association is â€Å"to promote library service and librarianship. † Members may join one or more of eleven membe rship divisions that deal with specialized topics such as academic, school, or public libraries, technical or reference services, and library administration. Members may also join any of seventeen round tables that are grouped around more specific interests and issues than the broader set of ALA divisions. [edit]Notable divisions ALA Editions (book publishing)[27] * American Association of School Librarians  (AASL) * Association for Library Collections and Technical Services  (ALCTS) * Association for Library Service to Children  (ALSC) * Association of College and Research Libraries  (ACRL) * Library Information Technology Association  (LITA) * Public Library Association (PLA) * Reference and User Services Association  (RUSA) * Young Adult Library Services Association  (YALSA) [edit]Notable offices * Office of Intellectual Freedom (OIF) * Office for Accreditation (OA) Office for Literacy and Outreach Services (OLOS) * Office for Information Technology Policy (OITP) [e dit]Notable sub-organizations In 1970, the ALA founded the first  lesbian,  gay,  bisexual  and  transgender  professional organization, called the â€Å"Task Force on Gay Liberation†, now known as the GLBT Round Table. [28][29]  In the early 1970s, the Task Force on Gay Liberation campaigned to have books about the gay liberation movement at the  Library of Congress  reclassified from HQ 71–471 (â€Å"Abnormal Sexual Relations, Including Sexual Crimes†).In 1972, after receiving a letter requesting the reclassification, the Library of Congress agreed to make the shift, reclassifying those books into a newly created category, HQ 76. 5 (â€Å"Homosexuality, Lesbianism—Gay Liberation Movement, Homophile Movement†). On July 23, 1976, the Committee on the Status of Women in Librarianship was established as a Council Committee of the ALA on recommendation of the Ad Hoc Committee with the same name (which had been appointed by the Presid ent of the ALA in December 1975) and of the Committee on Organization.The Committee on the Status of Women in Librarianship works to â€Å"officially represent the diversity of women's interest within ALA and to ensure that the Association considers the rights of the majority (women) in the library field; to promote and initiate the collection, analysis, dissemination, and coordination of information on the status of women in librarianship; to coordinate the activities of ALA units which consider questions of special relevance for women; to identify lags, gaps, and possible discrimination in resources and programs relating to women; in cooperation with other ALA units, to help develop and evaluate tools, guidelines, and programs designed to enhance the opportunities and the image of women in the library profession, thus raising the level of consciousness concerning women; to establish contacts with committees on women within other professional groups and to officially represent ALA concerns at interdisciplinary meetings on women's equality; and to provide Council and Membership with reports needed for establishment of policies and actions related to the status of women in librarianship; and to monitor ALA units to ensure consideration of the rights of women. †Ã‚  [30][31]  In 1979 the Committee on the Status of Women in Librarianship received the Bailey K. Howard – World Book Encyclopedia – ALA Goal Award to develop a profile of ALA personal members, known as the COSWL Study. In 1980 the Committee on the Status of Women in Librarianship was awarded the J. Morris Jones – World Book Encyclopedia – ALA Goals Award with the OLPR Advisory Committee to undertake a special project on equal pay for work of equal value. [31] [edit]National outreach The ALA is affiliated with regional, state, and student chapters across the country.It organizes conferences, participates in library standards development, and publishes a number of book s and periodicals. The ALA publishes the magazines  American Libraries  and  Booklist. Along with other organizations, it sponsors the annual  Banned Books Week  the last week of September. Young Adult Library Services Association  (YALSA) also sponsors  Teen Read Week, the third week of each October, and  Teen Tech Week, the second week of each March [edit]Awards Main article:  List of ALA awards The ALA annually confers numerous book and media awards, primarily through its children's and young adult divisions (others are the  Dartmouth Medal,  Coretta Scott King Awards, Schneider Book Awards, and  Stonewall Book Award).The children's division ALSC administers the  Caldecott Medal,  Newbery Medal,  Batchelder Award,  Belpre Awards,  Geisel Award, and  Sibert Medal, all annual book awards;[32]  the Odyssey Award for best audiobook (joint with YALSA), and the (U. S. )  Carnegie Medal  and for best video. There are also two ALSC lifetime recog nitions, the  Wilder Medal  and the  Arbuthnot Lecture. The  young-adult  division YALSA administers the  Margaret Edwards Award  for significant and lasting contribution to YA literature, a lifetime recognition of one author annually, and some annual awards that recognize particular works: the  Michael L. Printz Award  for a YA book judged on literary merit alone, the  William C. Morris Award  for an author's first YA book, the new â€Å"YALSA Award for Excellence in Nonfiction for Young Adults†, and the â€Å"Alex Award† list of ten adult books having special appeal for teens.Jointly with the children's division ALSC there is the  Odyssey Award  for excellence in  audiobookproduction. [33] The award for YA nonfiction was inaugurated in 2012, defined by ages 12 to 18 and publication year November 2010 to October 2011. The first winner was ‘The Notorious Benedict Arnold: A True Story of Adventure, Heroism ; Treachery  by Steve Sheink in (Roaring Brook Press, November 2010) and four other finalists were named. [34][35] Beside the Alex Awards, ALA disseminates some annual lists of  Ã¢â‚¬Å"Notable†Ã‚  and â€Å"Best† books and other media. The annual awards roster includes the  John Cotton Dana Award  for excellence in library public relations.In 2000 the Office for Literacy and Outreach Services (OLOS) launched the  Jean E. Coleman Library Outreach Lecture  in tribute to the work of the first OLOS director, Dr. Jean E. Coleman. Barbara J. ford gave the inaugural lecture, â€Å"Libraries, Literacy, Outreach and the Digital Divide. † From 2006 the ALA annually selects a class of Emerging Leaders, typically comprising about 100 librarians and library school students. This minor distinction is a form of organizational outreach to new librarians. The Emerging Leaders are allocated to project groups tasked with developing solutions to specified problems within ALA divisions. The class meets at the ALA Midwinter and Annual Meetings, commonly January and June.Project teams may present posters of their completed projects at the Annual. [36] [edit]Conferences The ALA and its divisions hold numerous conferences throughout the year. The two largest conferences are the annual conference and the midwinter meeting. The latter is typically held in January and focused on internal business, while the annual conference is typically held in June and focused on exhibits and presentations. The ALA annual conference is notable for being one of the largest professional conferences in existence, typically drawing over 25,000 attendees. [37] ————————————————- [edit]Political positions ALA Seal|The ALA  advocates  positions on  United States  political issues that it believes are related to libraries and librarianship. For court cases that touch on issues about which the organization holds positions, the ALA often files  amici curiae  briefs, voluntarily offering information on some aspect of the case to assist the court in deciding a matter before it. The ALA has an office in  Washington, D. C. , that  lobbies  Congress  on issues relating to libraries, information and communication. It also provides materials to libraries that may include information on how to apply for grants, how to comply with the law, and how to oppose a law. [38] [edit]Intellectual freedom See also:  Book censorship in the United StatesThe primary documented expressions of the ALA's intellectual freedom principles are the Freedom to Read Statement[39]  and the  Library Bill of Rights; the Library Bill of Rights urges libraries to â€Å"challenge censorship in the fulfillment of their responsibility to provide information and enlightenment. â€Å"[40]  The ALA Code of Ethics also calls on librarians to â€Å"uphold the principles of intellectual freedom and resist all efforts to censor library resources. â€Å"[41] The ALA maintains an Office for Intellectual Freedom (OIF) headed by Barbara M. Jones, former University Librarian for Wesleyan University and internationally known intellectual freedom advocate and author. 42]  She is the second director of the Office for Intellectual Freedom, succeeding  Judith Krug, who headed the office for four decades. OIF is charged with â€Å"implementing ALA policies concerning the concept of  intellectual freedom,†[43]  that the ALA defines as â€Å"the right of every individual to both seek and receive information from all points of view without restriction. It provides for free access to all expressions of ideas through which any and all sides of a question, cause or movement may be explored. â€Å"[44]  Its goal is â€Å"to educate librarians and the general public about the nature and importance of intellectual freedom in libraries. †Ã‚  [43]  The OIF compiles lists of challenged books as reported in the media and submitted to them by librarians across the country. 45] In 1999, radio personality  Laura Schlessinger  campaigned publicly against the ALA's intellectual freedom policy, specifically in regard to the ALA's refusal to remove a link on its web site to a specific sex-education site for teens. [46]  Sharon Presley  said, however, that Schlessinger â€Å"distorted and misrepresented the ALA stand to make it sound like the ALA was saying porno for ‘children' is O. K. â€Å"[47] In 2002, the ALA filed suit with library users and the ACLU against the United States  Children's Internet Protection Act  (CIPA), which required libraries receiving federal E-rate discounts for Internet access to install a â€Å"technology protection measure† to prevent children from accessing â€Å"visual depictions that are obscene, child pornography, or harmful to minors. [48]  At trial, the federal district court struck down the law as unconstitutional. [49]  The government appealed this decision, and on June 23, 2003, the  Supreme Court of the United States  upheld the law as constitutional as a condition imposed on institutions in exchange for government funding. In upholding the law, the Supreme Court, adopting the interpretation urged by the U. S. Solicitor General at oral argument, made it clear that the constitutionality of CIPA would be upheld only â€Å"if, as the Government represents, a librarian will unblock filtered material or disable the Internet software filter without significant delay on an adult user's request. â€Å"[50] [edit]PrivacyIn 2003, the ALA passed a resolution opposing the  USA PATRIOT Act, which called sections of the law â€Å"a present danger to the constitutional rights and privacy rights of library users†. [51]  Since then, the ALA and its members have sought to change the law by working with members of Congress and educating their communities and the press about the law's potential to violate the privacy rights of library users. ALA has also participated as an  amicus curiae  in lawsuits filed by individuals challenging the constitutionality of the USA PATRIOT Act, including a lawsuit filed by four Connecticut librarians after the library consortium they managed was served with a National Security Letter seeking information about library users. 52]  After several months of litigation, the lawsuit was dismissed when the FBI decided to withdraw the National Security Letter. [53]  In 2007 the â€Å"Connecticut Four† were honored by the ALA with the Paul Howard Award for Courage for their challenge to the National Security Letter and gag order provision of the USA PATRIOT Act. [54] In 2006, the ALA sold humorous â€Å"radical militant librarian† buttons for librarians to wear in support of the ALA's stances on intellectual freedom, privacy, and civil liberties. [55]  Inspiration for the button’s desig n came from documents obtained from the FBI by the  Electronic Privacy Information Center  (EPIC) through a  Freedom of Information Act  (FOIA) request. The request revealed a series of e-mails in which FBI agents complained about

Friday, January 3, 2020

Teacher Interview And Observation Of A Kindergarten Math...

Teacher Interview and Observation The teacher interviewed and observed was Mrs. Linda Grill, she has twenty-eight years of experience. Her first ten years of teaching were at an inner city school in Los Angeles, where she said, â€Å"I was the only white person there.† For the last eighteen years she has been teaching a variety of grade levels at Aurthur Hapgood Elementary in Lompoc, current she teaches kindergarten. As I work at the same school as Mrs. Grill, I interview her almost daily, for the purpose of this paper the majority of the interview was completed two days before the observation. The formal observation of a kindergarten math lesson occurred on Friday September 16th at 10:10 am, immediately following the morning recess. Teacher Interview Summary Mrs. Grill was able to provide an abundance of useful information regarding her kindergarten class and also explained how she acquires this information, as many of her students are entering school for the first time. The students’ linguistic background is identified at enrollment, by the parents and the teacher is provided with and English Learner roster. The EL students are then given a formal assessment, by bilingual team and rated as either beginner, intermediate or advanced in their ability to speak and understand English. Content knowledge and skills are assessed at kindergarten registration and again at the beginning of the school year. The assessment consists of letter names and sounds, shapes, colors, roteShow MoreRelatedKindergarten Classroom Observation1220 Words   |  5 Pageselements of a Kindergarten classroom that I observed in Miss. Phillips classroom. I will cover over the school, the student’s participation, and the teach er’s overall. I will also include a Building report card. I will discuss how much the experience had an impact on me. For my observation, I was assigned to Swaney Elementary and it is located in Derby, KS. Swaney serves 304 students starting at Early Childhood – 5th Grade and that includes an Interrelated program. The student teacher ratio is 14:1Read MoreAdvanced Seminar On Early Childhood Special Education810 Words   |  4 PagesPROFESSOR: MONICA GIGANTE FEBRUARY 25, 2015 ADIE S. JAMES (SHARON) Overview Observation and interview for this assignment were conducted at P.S. 95Q – The Eastwood School, a New York City Department of Education public elementary school, located at 179-01 90th Avenue, Jamaica, N.Y. 11432. The hosts grades Kindergarten to 5th Grade, and has a population of 1,484 students.. School personnel include the administrative staff, teachers, special service providers, custodial staff, janitorial staff, and cafeteriaRead MoreA Dual Immersion Program For Hispanic Children From Kindergarten From Barbour Dual Language Immersion Academy1010 Words   |  5 PagesThis quarter I am continuing my observations with Heather Cyrus from Barbour Dual-Language Immersion Academy. She is a unique second grade teacher for Spanish and English speaking students. In my prior fieldwork assignments, I have not met another teacher who has been so ahead of her peers in evolving the classroom for successful, 21st century education. Barbour runs a dual immersion program for Latino children from kindergarten through eighth grade. Starting in the lower grades more Spanish instructionRead MoreApplication Of A Computer Lab Availability832 Words   |  4 PagesFrom observation within the school I can see that both teacher and students are given multiple technological tools that can be used throughout the learning process in all grades. There are such availabilities everyday to this population such as Chromebooks, a computer lab, Google Applications, a technological support team and PC computers with a variety of preinstalled, district-funded programs. Every teacher in the building has a PC computer with Windows 7 installed. As I observed, I noticed thatRead MoreThe Community School For Eight Years As The Assistant Principal, Director Of Instruction, Technology, And Curriculum Essay1728 Words   |  7 Pages Duckett’s first years as the Superintendent/Principal.While Mr. Duckett holds many jobs and â€Å"whe re many hats†, his most rewarding aspect of them all is achieving students success through improving test scores. Eastampton Community School is a kindergarten through eighth grade one building district that serves just over 600 students. ECS has a special education population of about 20 percent and approximately 25 percent of the students are on the free or reduced lunch and breakfast program. In suchRead MoreEvaluation Of The Elementary English Language Learners And Special Education1738 Words   |  7 Pagesassessments and teaching strategies becomes imperative and basically mandatory. When entering the kindergarten English Language Learners classroom at Sprout State School of the Arts, the head teacher was able to give inciteful information in regards to the many educational questions that were asked concerning the different facets of education in the classroom. Through a lengthy interview with the teacher, information was gained concerning indicators of exceptionality in ELL students, information pertainingRead More Student Achievement Essay1351 Words   |  6 Pagescontroversial this is sue is. It shows the actual findings of two studies. My paper shows how younger kids are benefiting from the smaller classes. There is still ongoing research to really decide if smaller really is better. Many parents and teachers desire smaller classes for their children. However, are smaller classes necessarily increasing student achievement? It has been an assumption that if a student is in a small class setting, there are fewer distractions and the learning experienceRead MoreActive Age Of Pre K2274 Words   |  10 Pages During my program observation, I observed the local elementary. This elementary educates level Pre-Kindergarten to Second Grade. For my project, I chose the aware and active age of Pre-K. This specific classroom held a variety of ages preparing for kindergarten, starting at five to six years old, with 14 children. While I was observing, the main teacher taught many of the centers, and lessons, although there was another supervisor that would stop in and take one student who hadRead MoreUnderstanding the Standards-Based Individualized Education Program2226 Words   |  9 PagesIndividual Educational Plans (IEPS) are a way in which teachers and the school system can address special services that provide programs for children with delayed skills or disabilities. A child that has difficulty learning and functioning and may be identified as a special needs student is the type of candidate for an IEP. However, in order for there to be a fairer way to administer and develop programs so that children may take advantage of them, there is a process and set of procedures necessaryRead MoreClassroom Management and Pull-out Services: Research questions and Personal View on the Research Topic1706 Words   |  7 PagesResearch Questions and Supporting Resources Through my research, I created fifteen interview questions related to my topic of choice. Each of my research articles directly address my topic for this project, however some are specifically related to a particular aspect of my topic. In short, I compiled research and empirical studies on classroom management--the importance and influence it has on the everyday, overall functioning of the classroom and techniques and characteristics for effective