Get help from the best in academic writing.

What the the characteristics of good and bad rulers? Refer to the passages at the beginning of The Epic Essay

What the the characteristics of good and bad rulers? Refer to the passages at the beginning of The Epic of Gilgamesh. Gilgamesh himself is the only ruler in the epic, but he changes from being a bad ruler to a good one. The discussion of Gilgamesh as a ruler, particularly a bad ruler, appears at the beginning of the epic.
One topic of interest in early writings is what makes a good and bad ruler. There is only one king in the epic, and that is Gilgamesh himself. However, because he changes so much as a result of the events portrayed in the epic, he changes from a bad ruler to a good one. His performance as each is discussed in the introductory section of the epic.

Discuss one characteristic of a bad ruler that Gilgamesh demonstrate in the years before the events discussed in the epic OR one characteristic of a good ruler does he demonstrate in the years after the epic concludes.

Make sure to give an example of how Gilgamesh demonstrates the characteristic you discuss, and include the page numbers.
The Epic of Gilgamesh pgs. 89-145 in Volume A
The post must include:

a response to the question
ONE and only one specific example from the work
the page numbers on which your example appears

This is the book

Puchner, Martin, general editor. The Norton Anthology of World Literature, vol.A. 4th ed., Norton, 20018.

This is an opportunity to process and apply both new and familiar concepts. Write a journal response discussing your Essay

This is an opportunity to process and apply both new and familiar concepts. Write a journal response discussing your thoughts on this week’s course material. Be sure to address the assigned video clips and readings. Did you strongly agree or disagree with any particular concepts or ideas? Did you find any aspects surprising? Were there any concepts that you plan to apply or implement to your life? Feel free to include any other thoughts or responses. Upload this assignment to the appropriate Drop Box by the date listed on the course schedule. Your journal response should be sufficient in length to fully address the question, double spaced, written at the college level, adhere to APA guidelines, and include a reference list. Any sources used must be cited properly using in-text citations and referenced at the end of the paper.”

WATCH THIS VIDEOS
http://www.youtube.com/watch?v=d3KOFZeuQmw

https://www.youtube.com/watch?v=WrEApuJ-DTE

https://www.youtube.com/watch?v=1tp_QNCm5m4

This is where you submit your 6-8 page paper proposed during Week 3, complete with bibliography and citations. Be

This is where you submit your 6-8 page paper proposed during Week 3, complete with bibliography and citations. Be sure to demonstrate your command of the content, reasoning and logic, and above all you need a single main point in your introduction that is then substantiated and defended in the body of your paper. Please make your paper as professional as possible, with citations, cover page, etc.

CO-5: Differentiate the fundamental capabilities and limitations of strategic intelligence collection.

General Requirements
1. Document Format.
a. MS Word document
b. One-inch (1″) margins (double-spaced)
c. Times New Roman Font
d. Twelve (12) pitch
2. Citation Format: The Chicago Manual of Style, 17th ed. Chicago: University of Chicago Press, 2017 available online at: http://www.chicagomanualofstyle.org/home.html The Author-Date system is recommended.
3. Graphics are allowed and encouraged (but they don’t count on length).
4. Students must (1) employ imaginative approaches to answer the question being asked; (2) display an impressive command of the subject matter beyond the immediately obvious; (3) demonstrate a high level of critical thinking and reflecting on current and world views, and genuine intellectual development; and (4) excel in explaining all major points using multiple examples from the course readings or individual research.

Name: Dustin Krecklow

Title: Are Current Strategic Intelligence Collection Methods Enough to Keep America Safe?

___X____CO-5: Differentiate the fundamental capabilities and limitations of strategic intelligence collection.

Thesis Statement: Although there are limitations that come with strategic intelligence collection, which could lead to future attacks, there are immense capabilities as well. These capabilities are what helps make America safe and will continue in doing so.

Outline: Limitations of strategic intelligence collection, capabilities of strategic intelligence collection, safety of America.

1. Introduction: Although I was only five years old when 9/11 occurred, I still remember the events from that day. If you ask any American who is old enough to remember that day, they will most likely tell you the same thing. Since America’s existence, we’ve been fortunate that we’ve rarely had to deal with foreign attacks or invasions. Events similar to or as devastating as 9/11 always seemed to happen in far away, desolate countries. 9/11 was a wake-up call for many Americans, it was an attack on our home front. And since that day, the way intelligence has been gathered has drastically changed and grown. This growth in intelligence collection has stopped America from having another 9/11 style attack, but we have still had plenty of other small-scale attacks. From the Boston Bombings to the Orlando Night Club shooting, and various other methods including cyber-attacks. Which bring up the question, are current strategic intelligence strategies enough to keep America Safe? Although there are limitations that come with strategic intelligence collection, which could lead to future attacks, there are immense capabilities as well. These capabilities are what helps make America safe and will continue to do so.

2. Main Point #1: Limitations of strategic intelligence collection
a. There is so much intel to collect, it can be difficult to sort out what is credible. Understanding as an American public, the probability that every attack will be stopped isn’t feasibly possible.
b. By the time intel is collected and understood, is it even possible to make necessary adjustments to counter an attack?
c. Once strategic intelligence does reach policy makers, does it then become politicized? Is it used in the most effective manner?

3. Main Point #2: Capabilities of strategic intelligence collection
a. Changes in technology allow reliable strategic intelligence collection to happen at a much faster rate.
b. The capability to gain multiple types of intelligence, HUMINT, IMINT, MASINT, OSINT, SIGINT.
c. Allows policy makers to make large scale decisions with credible intelligence, which keeps US interests at the forefront.

4 Main point #3: How the capabilities overcome the limitations of strategic intelligence collection and keeps America safe.
a. There hasn’t been a 9/11 scale attack since that day, due to the capabilities of strategic intelligence collection.
b. Massive amounts of funding go to intelligence agencies every year, which helps keep the US safe.
c. Although intelligence can be politicized, safety of the American public is agreed upon by both sides of the political parties.

5. Conclusion: Safety and security is at the forefront when it comes to enabling people to live, work and thrive in society. If we aren’t secure or safe, then there is very little ability to branch out and live the “American Dream.” By understanding what the limitations and capabilities of strategic intelligence collection are, we can not only have a better appreciation for the time and work that is required to sift through endless data to find credible intelligence. We also have a better understanding of the institutions that are in place to help keep us safe. And although it may seem as if America is unsafe due to the endless media attention that hostile acts receive, we live in an incredibly safe time, and this is in large part due to the capabilities of strategic intelligence collection.

FIVE REFERENCES:
Betts, Richard K. “Surprise Despite Warning: Why Sudden Attacks Succeed.” Political Science Quarterly 95, no. 4 (1980): 551–72. https://doi.org/10.2307/2150604.

Clark, J. Ransom. “Chapter 2: How Do We Get Intelligence?” In Intelligence and National Security: A Reference Handbook. Praeger, 2007. https://psi-praeger com.ezproxy2.apus.edu

Devine, Michael. 2019. “Intelligence Community Spending: Trends and Issues.” https://sgp.fas.org/crs/intel/R44381.pdf.

Grabo, Cynthia. 2002. “ANTICIPATING SURPRISE Analysis for Strategic Warning.” https://www.ni-u.edu/ni_press/pdf/Anticipating_Surprise_Analysis.pdf.

Hedley, John Hollister. 2005. “Learning from Intelligence Failures.” International Journal of Intelligence and Counterintelligence 18 (3): 435–50https://doi.org

Johnson, Loch K. “1: What’s Wrong With The Intelligence Cycle?” In Strategic Intelligence: Volume 2, the Intelligence Cycle, the Flow of Secret Information from Overseas to the Highest Councils of Government. Praeger, 2006. https://psi-praeger- com.ezproxy2.apus.edu.

Johnson, Loch K. “8: Intelligence Analysts And Policy Makers: Benefits And Dangers Of Tensions In The Relationship.” In Strategic Intelligence: Volume 2, the Intelligence Cycle, the Flow of Secret Information from Overseas to the Highest Councils of Government. Praeger, 2006. https://psi-praegercom.ezproxy2.apus.edu.

“The Intelligence Community’s Neglect of Strategic Intelligence – CIA.” n.d. www.cia.gov.
https://www.cia.gov/resources/csi/studies-in-intelligence/volume-51-no-2/the- intelligence-communitys-neglect-of-strategic-intelligence.

Above is an outline for the paper which has been approved. Please keep introduction, conclusion and the thesis the same if possible.

Creative Writing Question

Writing Assignment Help I need to write a 6 paragraph essay with a counter argument. My position is that student loans should be forgiven. Currently the only argument I have is that it will help stimulate the economy. I also need a works cited page and for the essay to be in MLA format, attached below is my source. I have nothing written so far.

PROJECT REQUIREMENTS: This project is due in week 3. Your presentation to the class will be made in week Essay

PROJECT REQUIREMENTS:
This project is due in week 3. Your presentation to the class will be made in week 4. Based on your readings, use of technology, research of literature, and other sources make sure your project includes the following:
Prepare a 4-5 page analysis of the country you chose discussing the following:
Compare the accounting profession in your selected country including professional conduct rules
Identify how the accounting standard are set in that country
Identify two financial reporting standards that differ from those of U.S. GAAP
Identify national characteristics unique to the country that influence accounting
For the two financial reporting standards identified in your paper, use Excel to create an applicable supporting schedule that provides an example of the adjustments that would need to be made to your foreign company’s financial statements for it to comply with U.S. GAAP.
Present your project to the class for discussion in week 4.
WRITING REQUIREMENTS:
The report should be should be 4-5 pages in total (not including cover page, abstract, or references) for the entire project, which is split into several weeks.
Include the Excel spreadsheet(s) as exhibits in your paper.
Include a minimum of 2 scholarly sources from the KU Library.
All sources used are to be cited in APA format
Please use the writing center if needed
TECHNOLOGY/COLLABORATIVE ACTIVITY:
You will be using Excel to create the exhibit to your paper
You will be presenting your findings from the project to the class using the voice-over feature in PowerPoint or YouTube. Please be sure the audio is clear and the file or link is accessible in the Week 4 Presentation discussion board.
You will be collaborating with other classmates on their presentations and answering any questions about your own presentation.

We have seen a greater focus on terrorism and online environments. Some of these areas include recruitment, radicalization, funding,

We have seen a greater focus on terrorism and online environments. Some of these areas include recruitment, radicalization, funding, planning and carrying out an attack (cyber and physical locations), and promoting the group to the public. Some of these same technologies are also used for counterterrorism interventions. Many specific areas have been addressed. For example, the Internet has allowed terrorist groups to promote and present their propaganda on Facebook, YouTube, Twitter, and WhatsApp as well as to communicate with each other and work toward their goals. Terrorist groups produce online books, magazines, videos, and games.
For this assignment, please present a case study that focuses on how online technology is used by terrorists or by those working in the counterterrorism field.

error: Content is protected !!