Unit 1 Ip

In: Social Issues

Submitted By cannibalsmack
Words 598
Pages 3
Charity Vogue
Unit 1 Individual Project
March 22, 2014
CRJS205 - 1402A – 02

The U.S. Constitution protects all people, both foreign and domestic from unlawful arrest and procedures. This is to ensure equality and fairness through the legal system. Under the due process law, any evidence obtained illegally becomes inadmissible. “The fifth, sixth and fourteenth amendment of the Constitution are the basis of which the due process stands and implies that the progression of events from point of arrest to conviction will follow procedures in accordance to the rules and forms established for the protection of individual rights” (Schmalleger, 2014, p. 12).

To: Mrs. Singh
From: Charity Vogue
AIU Law Office
March 24, 2014

Dear Mrs. Singh; The charge against you is breach of the peace, also known as disorderly conduct. This being your first offense, I can understand your concerns and hope that this information will clear up any questions you have. I will inform you about the differences between a felony and a misdemeanor and the differences in consequences, in addition to explaining the possible outcome of your charges. The difference between a misdemeanor and a felony is the severity of the crime and the consequences that follows conviction. The Uniform Crime Reporting lists crimes in two categories, which are part one and part two offenses. Part one offenses are crimes that result in a felony conviction. A felony is any crime serious enough to warrant more than one year in confinement and up to life in prison or the death penalty. Felonious crimes listed as part one offenses are, criminal homicide, rape, robbery, aggravated assault, larceny, breaking and entering, arson and motor vehicle theft (Appendix II – Offenses in Uniform Crime Reporting, 2004). Misdemeanors are called part two offenses and result in less than one-year…...

Similar Documents

Unit 1 Ip English

...Margaret Burnett IP English Human Trafficking Margaret Burnett AIU-Online Pro. Slotemaker Thesis: While Human trafficking is the second and fastest growing criminal industry in the world, we must find ways to stop this brutal crime. This article, “Forced Sex and labor Trafficking,” by Rebecca Clarren, talks about the investigations into human trafficking. The feminist groups plays a large part in helping with human trafficking. In 2000, Congress passed the Trafficking Victims Protection Act (TVPA), which gives a special “T-vista”, that lets victims of sex and labor trafficking to remain temporarily in the U.S., and agree to assist in the investigation and prosecution of their traffickers, after 3 years , the attorney general will give them permanent residence. But it didn’t last long, for the Bush administration had failed to fund its provision in a way that was meaningful. There has been such a lack of traffic investigations, 639 were opened by the Department of Justice between 2001 and 2006. Yet only 360 defendants were charged and only 238 convictions. My assessment on the integrity of this article is that the information is accurate and to the point. The author is legitimate. I definitely find that it is public service information. I will use this information because it is stating why human trafficking is in a slow process of being solved. This article, The Crusade Against Sex Trafficking, by Noy Thrupkaeu, is about efforts that are trying to......

Words: 1148 - Pages: 5

Unit 1 Ip

...Unit 1 Individual Project Psychology Persectives Desiree DuBose American InterContinental University Author Note Desiree DuBose, Department of Information Technology, American InterContinental University Online This research was supported by Yahoo Search, AIU Library Resources Correspondence concerning this article should be addressed to Desiree DuBose, Department of Information Technology, American InterContinental University Online, Hoffman Estates, IL 60192 Contact: desiree.dubose1@aiu.edu Behaviorism is an approach with psychology that is based on the proposition that behavior in human beings as well as animals can be researched and understood without recourse to inner mental states (New World Encyclopedia, 2008). There are three major figures that led to this development they are Ivan Pavlov, John B. Watson, and B.F. Skinner. Behaviorism is developed with the order that only observations that satisfied the criteria of the scientific method were to be allowable as evidence. One of the hypotheses many behaviorists hold is that free will is an illusion. As the result of this behaviorism orders that all behavior is determined by a combination of genetic factors and the environment is either through classical or operant conditioning. Classical conditioning is a technique used in behavioral training in which a naturally occurring stimulus is paired with a response. Operant conditioning is a method of learning that occurs......

Words: 897 - Pages: 4

Unit 1 Ip

...Unit 1 – Introduction to Managerial Accounting Genean Benders American InterContinental University Memo An internal managerial accounting system consists of information that management uses to make decisions about the operations of the business. As per the request of the CEO, I am writing a memo to provide information of the characteristics of managerial accounting and why it is necessary for another managing accountant within our company. The Seven Characteristics of Managerial Accounting There are seven characteristics of an managerial accounting system which is comprised of users and decision makers, purpose of information, flexibility of practice, timeliness of information, time dimension, the focus of information and the nature of information (Wild & Shaw, 2012). There is often confusion between financial and managerial accounting, therefore, the following will give detail of the explanation of the seven characteristics of managerial accounting versus financial accounting. This information should also aid with the understanding of why another managing accountant is needed. Users and decision makers. In managerial accounting, this characteristic refers to the internal management, unlike financial accounting that involves external users such as investors and creditors (Wild & Shaw, 2012). Purpose of Information. Management uses informational reports of the company’s financial activities to make important decisions about the ongoing operations of......

Words: 781 - Pages: 4

Unit 1 Ip

...NYSE – Euronext and the NASDAQ Name: Robert E. Smith American Intercontinental University FINA 310 – Financial Management Unit 1 Individual Project September 1, 2013 Abstract This report, providing information by study of financial management, makes a comparison of the New York Stock Exchange and the National Association of Securities Dealers Automated Quotations. We will provide a perspective difference between NYSE and NASDAQ by information used in making comparison. We will further describe the Public Company Accounting Protection Act of 2002, and provide a description of the law. Memo: To: Brokers Association From: American Intercontinental University Subject: NYSE and NASDAQ RE: Orientation Date: 08/31/2013 Introduction: In orientating our newest brokers, we provide a detailed introduction to the New York Stock Exchange and the National Association of Securities Dealers Automated Quotations, Identified best by most by abbreviation as NYSE, and NASDAQ, a report detailing the similarities of these two organizations and their differences. We further provide discussion of the “Public Company Accounting and Investor Protection Act of 2002 in describing this law as it was established and reason. Overview NYSE-Euronext and NASDAQ similarities: We begin by providing an overview of both exchange operators in making comparison determining what similarities there are in these operators of financial markets. First, the NYSE is stated to be a global......

Words: 989 - Pages: 4

Engl107 Unit 1 Ip

...criminals engaging in human trafficking and law enforcement stopping human trafficking. The victims and the purposes for human trafficking were pointed out. The reasons that the criminals are engaging in these crimes was pointed out also and law enforcements role in stopping the criminals and bringing them to justice was explained. With this evaluation of human trafficking it can now be addressed as an issue. I. Introduction A. Slavery B. The End Of The Slave Trade For an understanding of the term human trafficking, an interpretation of the issue would be needed to give an explanation of the Adult and Child victims, Criminals Engaging in Human Trafficking and law enforcement stopping human trafficking. Body Paragraph 1: Adult And Child Victims C. Men for Labor Exploitation D. Women And Children for Sexual Exploitation III. Body Paragraph 2: Criminals Engaging in Human Trafficking A. Money Is Why They Do This B. Leads To Other Criminal Activity IV. Body paragraph 3: law Enforcement Stopping Human Trafficking A. Laws on Human trafficking B. Prevention Conclusion A. Wrapping up the interpretation B. The Understanding Of Human Trafficking Can now Be Understood....

Words: 652 - Pages: 3

Unit 1 Ip

...Criminal Justice System Idellar Camel Criminal Justice Unit 1 IP September 1, 2013 ABSTRACT Unfortunately everyone doesn’t abide by the laws that are set and rules that are made. Therefore, a mean of protecting the innocent and punishing the violators must be established to carry out the process. The structure of processes would be the Criminal Justice System. It is composed of several different components that work on different levels of duty. This paper would describe the different parts of this much needed system such as law enforcement, attorneys of prosecution duties, defense advocates or counsels, Magistrates or judges on three different levels of government, federal, state, and local. Also, this paper would confer the two different structures of the system of the criminal courts. Last, it would give the stages of interactions of the prosecutorial and investigative process with a lawbreaker defendant. Officers: Law Enforcement There are different kinds of agents of law enforcement in the federal level of government. The FBI, Federal Bureau of Investigation, United States Marshall, USSS, the Bureau of Alcohol, Tobacco, Firearms, and Explosives, and Drugs Enforcement Agency are support staffs and special agents of the federal government. They protect the White House, the President and his family, Vice President, the White House. Also, there are some agencies including the IRS, Bureau of Indian Affairs that assist these law agencies on suspicious activities...

Words: 1118 - Pages: 5

Art Appreciation Unit 1 Ip

...Running head: ART APPRECIATION UNIT 1 IP Unit 1 Individual Project Nathan Bates AIU Online Abstract This paper will define the word “art” from two different internet sources complete with proper quotations and citations. Secondly, it will explore 8 examples of art created by well-known artists or found in a museum. Contained within will be explanations and descriptions of each and why they were used. Art Appreciation – Unit I Definition of Art #1 Art: noun “the making or doing of something whose purpose is to bring pleasure to people through their enjoyment of what is beautiful and interesting, or things often made for this purpose, such as paintings, drawings, or sculptures.” (Cambridge Dictionary, 2013). Definition of Art #2 Art: noun “1. the expression or application of human creative skill and imagination, typically in a visual form such as painting or sculpture, producing works to be appreciated primarily for their beauty or emotional power: the art of the Renaissance great art is concerned with moral imperfections she studied art in Paris A) works produced by human creative skill and imagination: his collection of modern art an exhibition of Mexican art [as modifier]:an art critic B) creative activity resulting in the production of paintings, drawings, or sculpture: she’s good at art 2. (the arts) the various branches of creative......

Words: 765 - Pages: 4

Unit 1 Ip Addressing Scenario

...UNIT 1: IP ADDRESSING SCENARIO First to start off with this scenario you should think about the design. When designing I would use one floor with a single data closet. This will be able to have one hundred and fifty users. There’s a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video. The subnet range would be one-hundred and forty five from one-hundred and forty six. The network number would be one-hundred and forty four. Also the broadcast number will be one-hundred and forty seven. In this case as far as which class it would be is class B. In the case of the how the IP addresses would be assigned I would consider choosing statically. A static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that they’re easy to use and less expensive. When it comes to maintaining and obtaining they’re easier to have as well. In answering the question about having one or more network/subnets to be used, I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. If you keep everything at its minimum size or space then that’s all you have to work with. If you make sure that you have extra space,......

Words: 289 - Pages: 2

Econ Unit 1 Ip

...Unit 5 Individual Project Page 1 Shuntina Heard September 28, 2014 Macroeconomics 224-1404A-02 Unit 5 Individual Project Page 2 Hong Kong and Singapore are both tremendously small, but extremely open to international trade. Both countries are also very advanced. Both countries are very parallel in many ways. Both countries at one point served as major trading ports. Hong Kong’s economy is usually the same. At one point they suffered an international economic crisis. A few years after the crisis the economic grate rate rose to 6.8 percent. Hong Kong is considered to be the Gateway for China when it comes to trading. World Bank mission is to help progress and grasp goals of its people by working with its associates to improve poverty. Some of the methods the use to help economic growth is knowledge and learning, post conflict and fragile states, global public goods, and focusing on the poorest country. Both Singapore and Hong Kong must have a market economy because they are industrialized. Knowledge and learning would be a good methods for Hong Kong. Learning what to do and what not to do when it comes to trading. Trying to stay ahead of other countries with similarities and who are considered trading ports. Singapore has a promising economic location and accomplished workforce. Singapore most fast emerging sectors of its economy is communication transport, trade and exports. Unit 5 Individual Project Page 3 References IMF. (2010). World Economic Outlook. International......

Words: 254 - Pages: 2

Unit 1 Ip

...Abstract This paper explains my view on the “War on Terror” and the effects that it has had on our freedoms in America and ways we can change the “War on Terror” to gain our freedom back and maybe help secure our country in a more effective way. Introduction While we have the more freedom and rights than most countries our freedoms have definitely been effective in recent years due to the September 1, 2001; with the on terror and the efforts to make our country safer, Americans have been more willing to give up many more freedoms in exchange for this safety. My Topic is: The “War on Terror” has become a war on American Freedoms, and my Thesis is: The “War on Terror” has reduced more of our freedoms in America and has done little to catch Terrorist: we should eliminate the TSA and reevaluate all the other amendments that are being infringed upon and restore our freedom. Main Point 1: The idea behind the “War on Terror” was sparked by the events of September 11, 1999 when the World Trade Center was attack by terrorist, the idea behind it was a good one but failed in many ways. The American people are really the people that are punished the most by the “War on Terror”, we can no longer travel freely without being subjected to uncomfortable pat downs or invasive scanners by the TSA. Main Point 2: Why have flight restrictions with the TSA when our boarders are wide open? This makes no since, Americans are being restricted by flight, stopped at road blocks and checked for......

Words: 442 - Pages: 2

Unit 1 Exercise 1 Ip Addressing Scenario

...ITT TECH INSTITUTE OF TECHNOLOGY, LATHROP | NT1330 Client Server Networking II | Unit 1 Exercise 1 IP Addressing Scenario | | Joel Vargas, Julia Duque, Jonathan Beckman, Marwan Sayyah | Due Date 06/25/2016 | | Exercise 1. IP Addressing Scenario When designing I would use one floor with a single server rack, IDF box, or some type of data closet. I would start by creating a list of equipment and software that’s needed. A core network, networks for your firewall, server network, voice network, wireless network. Also networks for other services you have not yet identified, like security, cameras, fire, door and video.  In the case of the how the IP addressed would be assigned I would consider choosing statically. Why because a static IP address is a number that is assigned to a computer by an internet service provider to be its permanent address on the internet. Also an advantage of having statically IP addresses is that there easy to use and less expensive. I use them for my job working at Save Mart Corporations as a Bench Technician to tests our lane equipment and NIC’s on our network systems. When it comes to maintaining and obtaining static IP addresses they are easier to use as well. I would think that you should use multiple network or subnets just in case you want to expand the size of your IP addresses. Also you should take this into consideration. If you keep everything at its minimum size or space then that’s all you have to work with. If you...

Words: 541 - Pages: 3

Unit 1 Ip

...Unit 1 Individual Project for ITCO299-1203A01 Comprehensive IT Project Introduction 2–6 pages | Details: | Scenario You have been asked to be the project manager for the development of an information technology (IT) project. The system to be developed will allow a large company to coordinate and maintain its records of the professional development of its employees. The company has over 30,000 employees, who are located in four sites: Florida, Colorado, Illinois, and Texas. The system must allow employees to locate and schedule professional-development activities that are relevant to their positions. Sophisticated search capabilities are required, and the ability to add scheduled events to the employees' calendars is desired. The system needs to support social networking, which will allow employees to determine who is attending various conferences and events. This will promote the fostering of relationships and ensure that the company has representation at important conferences.Once an activity has been completed, employees will use the system to submit the documentation. The system should support notifications, which will allow managers to receive notice whenever their direct reports have submitted documentation. The system should also notify employees if their deadline to complete professional-development requirement is approaching and it has not yet been completed. * Project charter: Using the above scenario, develop a project charter. Include the problem......

Words: 257 - Pages: 2

Busn 300 Unit 1 Ip

...William Blevins American Intercontinental University Unit 1 Individual Project BUSN 300 – Lower Division Capstone 1/7/2012 Global Warming Outline 1. What is the theory of global warming? 2. Theory of man-made global warming is credible a. Evidence b. Causes c. Effects of global warming 3. Theory of man-made global warming is not credible Global Warming Global warming is a hotly debated theory that states that there is an increase in the earth's average atmospheric temperature (Global Warming). The tedious bickering over if global warming is occurring has stopped with science showing that average temperatures have risen. The argument has now shifted to whether humans are contributing to the warming. Also at debate is whether or not global warming is causing Earth’s climate to change. Both sides of the debate attempt to use science and logic to support their viewpoints. Proponents to the belief that humans are causing global warming attribute the earth’s temperature rise to emissions/pollutants that collect in the atmosphere, trapping the sun's heat and causing the planet to warm up (Global Warming Basics). .The science behind global warming is simple. Global temperatures have shown a temperature increase over the last 100 years, with a very steep increase in the last three decades. Likewise, NASA has shown the average United States temperatures have increased steadily over the same time period. Other scientists and science......

Words: 864 - Pages: 4

Bus105 Unit 1 Ip

...Running Head: ACADEMIC HONESTY AND PLAGIARISM 1 Running Head: ACADEMIC HONESTY AND PLAGIARISM 2 People are sometimes accused of plagiarism, and some are unaware that they are plagiarizing unintentionally. Therefore, it is important for someone to learn to use the correct citations and paraphrasing to avoid unintentional plagiarism. In a 2007 article Avoiding Unintentional Plagiarism, (Foster 2007) “Avoiding plagiarism is simple, but for most of us, writing is difficult” (page #2). According to Foster, to avoid plagiarism, you must give credit whenever you use another person’s idea, opinion, theory, facts, information and quotations of another person’s spoken words (page #1). Foster is emphasizing that we must use proper citations in order to avoid plagiarism. Therefore, addressing the key elements of writing while to ensure academic honesty. For an example, one element is using the proper citation guidelines, therefore, “if you include a statement that is identical to the original work, either quote the material exactly and use quotation marks, or if you change words to better fit your style, omit the quotation marks but add the page number in the text citation” (page #1). The other element is telling the reader where the information came from, whether it’s referencing the author and article and or where you found it. By following this method, this will emphasis the originality of your work, therefore, giving the author credit. While plagiarism is...

Words: 571 - Pages: 3

Unit 1 Ip

...Abstract This paper will evaluate and demonstrate a manufacturing company options about launching a new product. This will be determined using the payback period that they plan to invest in this adventure. This will be performed by figuring out the company net present value and cash flow to determine if a project should be accepted within a three year payback period. The formula that was used to find the payback period was Payback Period = Investment (Total Cost of the Project) / Annual Cash Inflow. The formula used to calculate the net present value is as followed (1+r) ^t. Please click link to view excel spreadsheet for the assignment financial management unit 4 IP excell.xlsx. In order for a project to be accepted using the Payback rule the project according to Brooks, (2010) states that it is okay to accept a project if the payback period is less than maximum years the company is willing to accept. On that, same note if the payback period is longer than the three year that is required by the company then the project need to be rejected. For example, the payback period for this assignment is at 2.9 which mean that the project can be accepted because it is under the three years that the company requires. By the project being boarder line, I would like more clarity because if a person would round the payback period then the project would be denied. When evaluating the net present value a person has to take into considers the......

Words: 530 - Pages: 3