Preview

Isllc Standard 2

Satisfactory Essays
Open Document
Open Document
293 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Isllc Standard 2
Running Head: BENCHMARK ASSESSMENT YELLOW GROUP

Understanding by Design: ISLLC Standard 2

Benchmark Assessment:

Deborah D. Harris

Grand Canyon University: EDA 534: Educational Administration Foundation and Framework

September 12, 2012

Unwrapping the ISLLC Standards: Standard 2

Concepts and Skills T Chart

What administrators “need to know” and “be able to do”

|Concepts (Nouns) – underline |Skills (Verbs) – highlight/circle |
|“knowledge” |“admin will be able to do” |
|List Concept (list specific knowledge of concept) |Record Skills |Level of Blooms |
| | | |
| | | |
| | | |
| | | |

Big Ideas/Enduring Understandings: Represent the main ideas, conclusions, or generalizations about the “unwrapped” concepts and skills in a focused instructional unit of study. Ask yourself: “What do is the big idea of the standard? What do I want my staff to remember long after they leave the

You May Also Find These Documents Helpful

  • Better Essays

    Is3350 Final Exam

    • 1039 Words
    • 5 Pages

    Rationale: The client should focus on a distant object in order to promote pupil dilation. The ophthalmoscope should be set on the 0 lens to…

    • 1039 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Penetration testing should be done to test the network for vulnerabilities. There are several types of penetration testing. “An automated port based scan is generally one of the first steps in a traditional penetration test because it helps obtain a basic overview of what may be available on the target network or host. Port based scanners check to determine whether a port on a remote host is able to receive a connection. Generally, this will involve the protocols which utilize IP (such as TCP, UDP, ICMP, etc.), However, ports on other network protocols could be present as well dependent on the environment (for example, it’s quite common in large mainframe environments for SNA to be in use). Typically, a port can have one of two possible states: open – the port is able to receive data and closed – the port is not able to receive data. A service based vulnerability scanner is one which utilizes specific protocols to communicate with open ports on a remote host, to determine…

    • 550 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3440 Project Part 1

    • 3157 Words
    • 13 Pages

    First World Savings and Loan is a financial institution that processes credit card transactions and loan applications online. We are currently considering implementing an open source infrastructure. This could potentially save us over $4,000,000 per year in licensing fees for the software we are currently using. However, due to our business needs; we must still comply with the Sarbanes-Oxley Act (SOX), Payment Card Industry - Data Security Standard (PCI-DSS), and the Gramm-Leach-Bliley Act (GLBA). We must comply with SOX, because we are a publicly-traded financial institution; PCI-DSS, because we process online credit card transactions; and GLBA, because we are a financial institution. All of the regulations of these three compliancy laws must be met, while still maintaining the Confidentiality, Integrity, and Availability (CIA) triad.…

    • 3157 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Manual/ White Box: In this technique, a thorough code review is performed over the whole code, which may become a very tedious and tiresome process. But in this process, logical flaws may be identified which may not be possible using automated tools, such as business logic problems. Automated tools are mostly capable of finding technical flaws such as injection attacks but may miss flaws like authorization problems. In this process, instead of going line by line through whole code base, we can concentrate on potential problems in the code. Those potential vulnerabilities can be given a high priority. For example, in C/C++, if we try to find any copying function in the code and check whether it’s using functions such as, strcpy() for performing copy function. As we know, strcpy() is known to be vulnerable to buffer overflow attacks. We may also want to check if any customized encryption is being used in the application, which automated tools may miss as they can identify standard algorithms only…

    • 813 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    IS4560 part 6

    • 474 Words
    • 2 Pages

    My defense plan at AHC will include a counter attack from external and internal threats; the vulnerability and security threats that exist inside AHC IT infrastructure. In order the deal with these kinds of threats, we will need to train and create and incident report and handling plan with our IT management. I will also help them to create and implement a more secure and dependable Disaster recovery plan that will be available somewhere offsite. My team will setup an incident guideline and procedure that AHC can follow whenever the system is breach or any kind of natural disaster occurred. Some of these examples are Malware, viruses, worms, Trojans and hacking attacks take place or security breach from an inside employee. The external attackers can be counter by our Intrusion detection systems but can be block by our firewall and Intrusion prevents systems. We will fortify our application securities as well with the implementation of a strong access control list. This is an outline we will Use TCP/IP and IPsec filters for defense in depth. Configure IDS to prevent information disclosure through banner grabbing. Use IDS that can be configured to pick up foot printing patterns and reject suspicious traffic. You can put tight constraints on user inputs. But the best method of preventing SQL injection is to avoid the use of dynamically generated SQL in your code. Instead use stored or canned procedures. Raising security awareness also help members of an organization possess regarding the protection of the physical and especially, information assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually. I will set the router and firewall ACLs to block all inbound access that is not specifically required, especially to the windows specific ports. Always ensure that…

    • 474 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3440 project part 1

    • 305 Words
    • 2 Pages

    The account policy for first World Bank would be a very simple and easy policy. Basically all personnel will only have one account at a time, each person will only have their account on the system that they have business being on. You can be assigned to multiple groups within the system if need be. Before anyone can be added to the system, they will have to read and sign the User Account Policy; this will make sure that no one can say that they “didn’t know”.…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    According to the FTC (Federal Trade Commission), they “Empowers consumers with free information to help them exercise their rights and spot and avoid fraud and deception”. http://www.ftc.gov/bcp/. Consumer protection policies can’t be designed based only on what policymakers think consumers need. They must be grounded in the reality of consumers’ lives, based on solid research that shows how people really act and interact with their financial services, and which provides insights into their vulnerabilities. For example, recent research in behavioral economics has revealed that all types of consumers can behave in certain irrational ways, impacting consumers’ ability to make sound financial decisions. These behavioral biases therefore have important consequences for consumer protection, pointing to the need for first-hand consumer research to measure these patterns and test the effectiveness of consumer protection tools, such as disclosure forms, in their presence.…

    • 648 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISCOM 305 Entire Course

    • 450 Words
    • 3 Pages

    In this work of ISCOM 305 Entire Course you will find the next docs: ISCOM-305-21st-Century-Process-Management-Article.doc ISCOM-305-Week-3-DQ-1.doc ISCOM-305-FINAL-EXAM-TEST-use-to-study.pdf ISCOM-305-FINAL-EXAM.doc ISCOM-305-Week-1-DQs.doc…

    • 450 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Social Studies Standards

    • 1406 Words
    • 6 Pages

    However, they can both relate in the fact that both standards have the following component in their principle: “Understand” it is an indicator throughout the Social Studies Standards. It denotes to various levels on Bloom’s taxonomy as well as it was utilized on purpose to function as an umbrella term for the cognitive demand which could be outlined by the descriptors underneath the performance meters. We must seek to the descriptors who define the cognitive level of claim for pupil performance. The social studies standards all truly denote to numerous nations, parts of the world, individuals, themes as well as historical eras. School organization components must grow local curricula which assist pupils in obtaining a coherent, wide viewpoint on diverse nations, regions, historical eras as well as durable themes. In fact, the term “Major enduring themes” applies to numerous settings in the Social Studies Standards. This term could be referred to universal subjects as well as concerns that have been related over a long course of time. Utilizing a steady set of themes could function as a wide agenda within which other theories, subjects as well as facts that could be organized. It could assist pupils create associations among events across and within historical eras as well as utilize history to…

    • 1406 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    • You must research this context and write down how the results of your investigation might be useful, e.g.…

    • 704 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    8. It is the dominant idea, explanation, evaluation, or recommendation that you want to impress upon your readers.…

    • 958 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Question: Describe one idea that you thought was worth learning about. Explain why it was worth learning about in the text as a whole.…

    • 990 Words
    • 3 Pages
    Good Essays