Chapter 2 Questions & Answers

In: Social Issues

Submitted By linzcessor
Words 344
Pages 2
Linsey Cessor
EDUC 2253
Dr. Shahan
January 28, 2015

Professional Practice
Chapter 2: Question for Discussion

2. Why is membership in an ethnic group more important to some individuals than to others? What characteristics might an educator look for to determine a student’s ethnic background and its importance in that student’s life?

* Individuals may have multiples reasons of being more in tuned to their ethnicity than others. Most are drawn to their ethnic group because that is what is familiar to them. When the elderly generation is a dominate part of their raising then the younger generation has more information about their heritage. * Others are not so luck to grow up with the elderly generation influence and have are disconnected with their ethnic groups. Some people are a merge of two different ethnic groups and this causes confusion for the individual. With the merging of different ethnic groups, some people tend to loners. Not ever finding that “prefect” ethnic group that they belong in.

As an educator there are many characteristics that will reveal the ethnicity of a student such as a student’s gender, race and religion. However, with all of this being said I do not think that the ethnicity of a student is completely important for an effective teacher. An effective teacher teaches on the level of their students, and then begins helping the student’s excel. An effective teacher is able to teacher all the curriculum to the students without biases to any ethnic group.

7. Why do school officials seek teachers who believe that all students can learn? Schools search for teachers that believe that all students are capable of learning regardless of any of their diversities. Students need an educator that is willing to assess their education stands and willing to take them to the next level. Teachers that believe all students can…...

Similar Documents

Chapter 2 Answers to Questions - Financial Accounting

...* Chapter 2 ANSWERS TO QUESTIONS 1. A conceptual framework is a coherent system of interrelated objectives and fundamentals that can lead to consistent standards and that prescribes the nature, function, and limits of financial accounting and financial statements. A conceptual framework is necessary in financial accounting for the following reasons: (1) It will enable the FASB to issue more useful and consistent standards in the future. (2) New issues will be more quickly solvable by reference to an existing framework of basic theory. (3) It will increase financial statement users’ understanding of and confidence in financial reporting. (4) It will enhance comparability among companies’ financial statements. 2. The primary objectives of financial reporting are as follows: (1) Provide information useful in investment and credit decisions for individuals who have a reasonable understanding of business. (2) Provide information useful in assessing future cash flows. (3) Provide information about enterprise resources, claims to these resources, and changes in them. 3. “Qualitative characteristics of accounting information” are those characteristics which contribute to the quality or value of the information. The overriding qualitative characteristic of accounting information is usefulness for decision making. 4. Relevance and reliability are the two primary qualities of useful accounting information. For informa-tion to be relevant, it should......

Words: 5662 - Pages: 23

Lab #2 Questions and Answers

...Lab 2 1. What is the application ZenMap GUI typically used for? Describe a scenario in which you would use this type of application. It’s used for port scanning. It can be used to see what hosts are on the network and to see what services they are running. 2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? Threats and vulnerabilities lead risks, if you don’t have then then you don’t have any risk of anyone getting into your network 3. Which application is used for Step #2 in the hacking process to perform a vulnerability assessment scan? That would be Nessus is the application used. 4. Before you conduct an ethical hacking process or penetration test on a live production network, what must you do prior to performing the reconnaissance and probing and scanning procedures? You must get written permission 5. What is a CVE listing? Who hosts and who sponsors the CVE database listing website? A CVE (Common Vulnerabilities and Exposures) are known vulnerabilities and also show you how to patch them. They are from the Mitre Corporation but are under contract for Homeland Security and NCSD. 6. Can ZenMap GUI detect what operating systems are present on IP servers and workstations? What would that option look like in the command line if running a scan on 172.30.0.10? Yes it can detect what OS are being used. The command would be –o.......

Words: 401 - Pages: 2

Chapter 4 Review Question Answers

...Chapter 4 Review Questions 1. What are the five questions typically used in fact-finding? What additional questions can be asked during this process? The five questions are who, what, where, why, how. * Who? Who performs each of the procedures within the system? Why? Are the correct people performing the activity? Could other people perform the task more effectively? * What? What is being done? What procedures are being followed? Why is that process necessary? Often, Procedures are being followed for many years and no one knows why. You should question why a procedure is being followed at all. * Where? Where are operations being performed? * Why? Where could they be performed? Could they be performed more efficiently elsewhere? When? When is a procedure performed? Why is it being performed at this time? Is this the best time? * How? How is a procedure performed? Why is it performed in that manner? Could it be performed better, more efficiently, or less expensively in some other manner 2. What is a systems requirement, and how are systems requirements classified? A System Requirement is characteristic or feature that must be included in an information system to satisfy business requirements and be acceptable to users. System requirements serve as benchmarks to measure the overall acceptability of the finished system. System requirements fall into five general categories: outputs, inputs processes, performance, and controls. 3.......

Words: 1585 - Pages: 7

Chapter 2 Review Question

...chapter 2 1. Why is information security a management problem? What can management do that Technology cannot? Management is an information problem due to the fact that policymaking and training of securing systems from users fall into the responsibility of their role. These responsibilities can include limiting access as well as disabling certain functions that are not related to the organizations’ function. Management can set policies that may arise due to improper uses or manipulations of systems and asses the threats that are unknown due to the introduction of new hardware and software. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protection? The integrity of the data is most important because it relates to the overall company operations. Securing the data from people not authorized to see or change it ensures that the correct information about the company is being generated without interference or manipulations of data. Other important assets that requires protection are the computer terminals, networking infrastructure, which need to be protected from misuse from internal and external threats whether intentional or not. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? The responsibility relies on several management groups such as CIO, who is responsible for the overall protection of system, but the......

Words: 1762 - Pages: 8

Chapter 2 Problem Answers

...CHAPTER 2 FINANCIAL STATEMENTS, TAXES, AND CASH FLOWS Learning Objectives LO1 The difference between accounting value (or “book” value) and market value. LO2 The difference between accounting income and cash flow. LO3 How to determine a firm’s cash flow from its financial statements. LO4 The difference between average and marginal tax rates. LO5 The basics of Capital Cost Allowance (CCA) and Undepreciated Capital Cost (UCC). Answers to Concepts Review and Critical Thinking Questions   1. (LO1) Liquidity measures how quickly and easily an asset can be converted to cash without significant loss in value. It’s desirable for firms to have high liquidity so that they have a large factor of safety in meeting short-term creditor demands. However, since liquidity also has an opportunity cost associated with it—namely that higher returns can generally be found by investing the cash into productive assets—low liquidity levels are also desirable to the firm. It’s up to the firm’s financial management staff to find a reasonable compromise between these opposing needs.   2. (LO2) The recognition and matching principles in financial accounting call for revenues, and the costs associated with producing those revenues, to be “booked” when the revenue process is essentially complete, not necessarily when the cash is collected or bills are paid. Note that this way is not necessarily correct; it’s the way accountants have chosen to do it.   3. (LO1) Historical costs can be...

Words: 3822 - Pages: 16

Answers to End-of Chapter Questions and Exercises

...ANSWERS TO End-of chapter QUESTIONS AND exercises Answers to Questions for Review 1. (Explicit and Implicit Costs) Amos McCoy is currently raising corn on his 100-acre farm and earning an accounting profit of $100 per acre. However, if he raised soybeans, he could earn $200 per acre. Is he currently earning an economic profit? Why or why not? Amos McCoy is not currently making an economic profit, despite the fact that he is making an accounting profit. This is so, because the accounting profit calculation does not take into account an important implicit cost—the opportunity cost of not raising soybeans. Actually, McCoy is experiencing an economic loss. According to our theory, he should get out of the corn business and begin growing soybeans. This question highlights the important distinction between accounting profit and economic profit. 2. (Explicit and Implicit Costs) Determine whether each of the following is an explicit cost or an implicit cost: a) Payments for labor purchased in the labor market b) A firm’s use of a warehouse that it owns and could rent to another firm c) Rent paid for the use of a warehouse not owned by the firm d) The wages that owners could earn if they did not work for themselves a) explicit; b) implicit; c) explicit; d) implicit 3. (Alternative Measures of Profit) Calculate the accounting profit or loss as well as the economic profit or loss in each of the following situations: ...

Words: 3245 - Pages: 13

Chapter 2 Question

...Stacy Edelman Chapter 2 Questions 1. In what ways do Different ideologies and political systems influence the environment in which MNCs operate? In each country has there are own government controls and laws that have to be followed. You have to take the countries religious views into consideration. Whether the company is domestic, national, international, large or small political factors of the country it is located in will have an impact on it. A government could restrict a company's activity by intimidating and banning activities. 2. How do the following legal principles impact MNC operations. 1. The principle of sovereignty: An international principle of law which holds that governments have the right to rule themselves as they see fit. Implies that one countries court system cannot be used to determine wrongful conduct or impose penalties in another unless that country agrees. Each country has it's own rules and if that person was a U.S. citizen working in a different country and was providing equal opportunity, the employee has no right to sue the employer. 2. Nationality Principle: Recognizes a nations interest in maintaining some degree of control over it's citizen residing in different countries. Managers who violate American foreign corrupt practices when traveling could be found guilty in the U.S. 3. The territoriality Principle: accepted in the united states but not in all countries. each country has the right to it's own jurisdiction within...

Words: 318 - Pages: 2

Week 2 Questions and Answers

...Week 2 Assignment Question /Answers HRM320: Employment Law Professor:  Justin Lawrence DeVry University Michael Nealy January 16, 2015 1. What do you think are some of the factors in the modern workplace that contribute to a theft of time? How can those factors be managed? * There are many factors that can contribute to theft of time in the modern day workplace, for instance should you decide to take an extended coffee break, or if you search the internet a little too long when you should be working on other projects that’s considered to be theft of company time. Should you find yourself using the company phone for personal use such as talking to family members and friends rather than staying on task with the work that is at hand then you are guilty of the offense of theft of time. You are in fact stealing the employer’s money by not managing good use of the time that you have. * Here are some way that can best manage those scenarios. Where I work there are three bells that ring that at different times that lets you know when it is break time and when to return from break. The first bell lets you know that’s it’s time for break, the second bell lets you know that you should be returning from break and finally the third bell lets you know that you should be at your workstation. Should be caught too many times not at your work station you could be disciplined. That is one way to manage your time. As for the second scenario the best way to manage the......

Words: 1121 - Pages: 5

Chapter 2 Quick Answer Question

...Quick Study 1 1. Q: Define culture. How does ethnocentricity distort one’s view of other cultures? ANSWER: Culture is a set of values, beliefs, rules, and institutions held by a specific group of people. Ethnocentricity distorts one’s view of other cultures by believing that one’s own culture is superior to the culture of others, tending to make people to neglect important cultural differences. 2. Q: What is cultural literacy? Why should businesspeople understand other cultures? ANSWER: Cultural literacy is the detailed knowledge about a culture that allows a person to work effectively within it. Businesspeople should understand other cultures because it would improve their ability to manage employees, market products, and conduct negotiations in other countries. It also helps managers to attend local needs and desires, improving the company’s competitiveness as globalization continues. 3. Q: How do nation-states and subcultures influence a people’s overall cultural image? ANSWER: When it comes to culture, we tend to invoke the concept of the nation-states that support and promote the concept of national culture by building museums and monuments to preserve the legacies of important events and people, and that also intervene in business to preserve national culture. While the subculture that is a group of people that share a unique way of life within a larger culture (including language, race, lifestyle, attitudes, or other characteristics)...

Words: 2352 - Pages: 10

Chapter 2 Bio Answers

...ioCHAPTER 2 Conceptual Framework for Financial Reporting ASSIGNMENT CLASSIFICATION TABLE (BY TOPIC) Topics Questions 1. Conceptual framework– general. 1, 7 2. Objective of financial reporting. 2 3. Qualitative characteristics of accounting. 3, 4, 5, 6, 8 4. Elements of financial statements. 5. 6. Brief Exercises Exercises Concepts for Analysis 1, 2 1, 2 3 1, 2, 3, 4 2, 3, 4 4, 9 9, 10, 11 6, 10, 12 5 Basic assumptions. 12, 13, 14 5, 7 6, 7 Basic principles: a. Measurement. b. Revenue recognition. c. Expense recognition. d. Full disclosure. 15, 16, 17, 18 19, 20, 21, 22, 23 24 25, 26, 27 8, 9, 11 8 8, 11 8, 11 6, 7 7 6, 7 6, 7, 8 7. Accounting principles– comprehensive. 8. Cost constraint. 9. Assumptions, principles, and constraints. Copyright © 2013 John Wiley & Sons, Inc. 5 5 5, 6, 7, 8, 10 10 9, 10 28, 29, 30 3, 6, 7 10 11 6, 7 Kieso, Intermediate Accounting, 15/e, Solutions Manual (For Instructor Use Only) 2-1 ASSIGNMENT CLASSIFICATION TABLE (BY LEARNING OBJECTIVE) Learning Objectives Questions 1. Describe the usefulness of a conceptual framework. 1 2. Describe the FASB’s efforts to construct a conceptual framework. 3. Understand the objectives of financial reporting. 2 4. Identify the qualitative characteristics of accounting information. 3, 4, 5, 6, 8 5...

Words: 16128 - Pages: 65

Chapter 1,2,3 – Answers to Assigned End of the Chapter Questions

...Chapter 1,2,3 – Answers to Assigned End of the Chapter Questions 1-1. Shareholder (owner) wealth maximization is the most widely cited business goal. The justification for shareholder wealth maximization is that managers are hired by the owners (shareholders) and serve as their agents. In addition, the well-being of the managers is closely tied to the wealth of the shareholders. In perfect competition, shareholder wealth maximizing behavior is necessary just to survive. 1-2. a. Wealth maximization for a single-period decision is measured by economic profit which is the excess of earnings or cash flow over that which could have been earned on investments of similar risk. b. Wealth maximization for a multi-period decision is measured by discounting the expected future economic profits (which is the excess of earnings or cash flow for each period over that which could have been earned on investments of similar risk for that period) back to present. 1-4. Present value is either a single future amount discounted back to present or the sum of a number of future amounts discounted back to present. Net present value is the sum of the present value and the initial outlay or outlays necessary to produce the future amount(s). 1-5. A capital investment is an outlay that is expected to result in benefits extending more than one year into the future. Capital budgeting is the process of selecting capital investments. 1-6. Steps in capital budgeting......

Words: 1219 - Pages: 5

Chapter 2 Review Question

...Gunther Documet 9/14/2015 Applications in Info Security Chapter 4 Review Questions: 1)It might depend on the risk, although all risks should be addressed. The conditions that an organization might have is if they don't have a risk management plan or if they don't have the money to identify and mitigate the risk 2) 3)Alignment is important because it can align organizational goals with ICT works. The benefits to an organization as a whole is that it can align security processes with business goals. 4)Evaluation is important because it can determine if your team is achieving the objectives and this is usually done through gathering data and then analyzing it. Organizations benefit by collecting quantitative data because it can be used to evaluate the options and implications of a decision. 5)A contract is an agreement between a customer and a supplier, while the RFP is technically a bid solicitation. 6)Typically a subcontractor role is to perform specific tasks given by a general contractor. They can be controlled by the supplier to follow the right procedures that are given in the contract. 7)The problem resolution is important because it involves two parties in agreeing that all problems are identified, analyzed, managed, and controlled to resolution. 8)There are two types of reviews: Formal Reviews Informal Reviews In a formal review, the ICT is presented to a team or to an individual before the actual review. In the other hand the informal......

Words: 334 - Pages: 2

Chapter 2 Review Questions

...Chapter 2 Review Questions 1. Why is information security a management problem? What can management do that technology cannot? Managing information security has more to do with policy and enforcement rather than technology. Management must address information security in terms of business impact and the cost. 2. Why is data the most important asset an organization possesses? What other assets in the organization require protect? Data in an organization represents its transaction records and its ability to deliver to its customer. Without this the organization would not be able to carry out day to day work. 3. Which management groups are responsible for implementing information security to protect the organization’s ability to function? Both management and IT management are responsible for implementing security to protect an organizations ability to function. 4. Has the implementation of networking technology created more or less risk for businesses that use information technology? Why? Networking is usually considered to have created more risk for businesses that use information security. The reason is that potential attackers have reader access to the information system. 5. What is information extortion? Describe how such an attack can cause losses, using an example not found in the text Information extortion is the act of an attacker or trusted insider who steals information from a computer system and demand compensation for its return or for an......

Words: 1152 - Pages: 5

Chapter C: 2 Answers

...Chapter C:2 Formation of the Corporation Discussion Questions C:2-1 A new business can be conducted as a sole proprietorship, partnership, C corporation, S corporation, LLC, or LLP. Each form has tax and nontax advantages and disadvantages. See pages C:2-2 through C:2-7 for a listing of the tax advantages and disadvantages of each form. A comparison of the C corporation, S corporation, and partnership alternative business forms appears in Appendix F. pp. C:2-2 through C:2-8. C:2-2 Alice and Bill should consider forming a corporation and making an S corporation election. An S corporation election will permit the losses incurred during the first few years to be passed through to Alice and Bill and be used to offset income from other sources. The corporate form allows them limited liability. As an alternative to incorporating, Alice and Bill might consider a limited liability company that is taxed as a partnership. pp. C:2-6 through C:2-8. C:2-3 The only default tax classification for the LLC is a partnership. Because the LLC has two owners, it cannot be taxed as a sole proprietorship. The entity can elect to be taxed as a C corporation or an S corporation. If the entity makes such an election, Sec. 351 applies to the deemed corporate formation. The entity would have to make a separate election to be treated as an S corporation. pp. C:2-8 and C:2-9. C:2-4 The default tax classification for White Corporation is a C corporation. White can elect to......

Words: 14473 - Pages: 58

Chapter 2 Review Questions

...Chapter 1 PLD Review questions Multiple choice 1. A program is a set of instructions that a computer follows to perform a task. 2. The physical devices that a computer is made of are referred to as Hardware. 3. The part of a computer that runs programs is called the CPU. 4. Today, CPUS are small chips known as Microprocessors. 5. The computer stores a program while the program is running, as well as the data that the program is working with, in Main memory. 6. This is a volatile type of memory that is used only for temporary storage while a program is running. A. RAM 7. A type of memory that can hold data for long periods of time—even when there is no power to the computer—is called Secondary storage. 8. A component that collects data from people or other devices and sends it to the computer is called an input device. 9. A video display is a(n)output device. 10. A byte is enough memory to store a letter of the alphabet or a small number. 11. A byte is made up of eight bits. 12. In a binary numbering system, all numeric values are written as sequences of 0s and 1s. 13. A bit that is turned off represents the following value: 0 14. A set of 128 numeric codes that represent the English letters, various punctuation marks, and other characters is ASCII. 15. An extensive encoding scheme that can represent the characters of many of the languages in the world is Unicode. 16. Negative......

Words: 727 - Pages: 3