I’m trying to learn for my English class and I’m stuck. Can you help?

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

Audio: https://drive.google.com/file/d/13hGyZc5TWtc8_R3xg…

Using this AUDIO example from Unit 3: Indonesia and write a 150 word journal about it. Include information about the audio example including the genre or style, instruments and form. What culture creates this music? What behaviors or activities are associated with this music? Also include your personal thoughts or feelings about your chosen audio example. Do you like it/dislike it? Why did you choose this particular example?

Your Journal should be around 150 words (5 pts), cover all of the topic points (5 pts), and be submitted on time (5 pts). There are 15 points possible for this assignment.



I need help with a Political Science question. All explanations and answers will be used to help me learn.

Read/review the following resources for this activity:

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

As discussed earlier, the overall target of our collection efforts is the capabilities and intentions of the countries, organizations, and, now, individuals that threaten our national security. The United States has a robust technology capability (e.g. SIGINT, MASINT) that costs big money.

Initial Post
Based on your knowledge of intelligence gathering and collection, what would you assess as necessary to do the job?

Use the reference materials or outside resources to support your response.

Secondary Posts

postings provided by your instructor or fellow students. Read and respond to the conclusions drawn by your classmates. Remember to read the feedback to your own major postings and reply throughout the week.

Writing Requirements

  • In addition to one initial post, respond to at least two peers.
  • Initial Post Length: minimum of 250 words
  • Secondary Post Length: minimum of 200 words per post
  • Using APA format, provide at least one citation with corresponding references page and use appropriate in-text citation(s) referring to the academic concept for the initial post.

Grading and Assessment
Meeting the minimum number of posting does not guarantee an A; you must present an in-depth discussion of high quality, integrate sources to support your assertions, and refer to peers’ comments in your secondary posts to build on concepts.

This activity will be graded using the Discussion Forum Grading Rubric.

Learning Outcome(s): 1, 5
1. Assess the theoretical effectiveness of intelligence and covert action with regard to analyzing governmental structure and national security


5. Examine the history and structure of U.S. intelligence.

Student 1 : “One of the very necessary steps to intelligence gathering is to make sure the funds can be acquired. Everything costs money, but technology and employment of something as huge as this means huge funds. Satellites, for example, are important pieces for intelligence gathering. They are also very costly. I expected that they would cost a few million, which is still a ton of money, but they actually can cost up to $500 million each launch. (Lowenthal, 2016, pg. 93). Where this is a massive cost alone, there are still so many other parts of this process that will continue to add to the bill. The employees who will be looking at this information and evaluating it will also have to be paid, for example. The information that they are gathering with these $500 million dollar satellites is nothing without these people. Not only do the people need to be paid but there are bills for the buildings to be up and running, proper and secure transportation for vulnerable information or people, all of these “small” things that are not often thought of that also add to the bill.
All of these fees have to fit into the budget that has to be approved by Congress. Since this is not the cold war era anymore, Congress has backed off from funding large intelligence-gathering technologies as much. What is even tougher, is when asking for more funds for new technologies Congress will want the gatherers to bring in and evaluate more intelligence, which can not always be promised. Not only can it not be promised, but there is already an existing issue of having too much information coming in anyways. Funding is just one of the many tough things needed to do the job”.

Lowenthal, M. (2016). Intelligence, 7th Edition. CQ Press.

student 2: ” The overall target of our nation’s collection efforts is the capabilities and intentions of people or groups that threaten America, our people, and our assets. With this goal in mind, there is so much that would be considered necessary for our national security collection efforts. For instance, there is no argument that one of the most common collection capabilities is human intelligence (HUMINT). That is to say, the interviews and interrogations that net information have always been commonplace in the collection of intelligence. However, as we know, our capabilities are not limited to HUMINT. The United States also has the ability to collect through signal intelligence (SIGINT) communications intelligence (COMINT), imagery intelligence (IMINT), geospatial intelligence (GEOINT), measurement and signatures intelligence (MASINT), and open source intelligence (OSINT) (College, U.S. Naval War, 2019). Again, this displays that there are a number of capabilities that are possible for the U.S.’s intelligence collection. I would asses that all of the previously stated collection types are necessary for intelligence gathering. For example, if there is information being gathered on a possible hack into CIA, or any other intelligence dealing agency, we have the systems in place to be able to detect this. This could be done through COMINT, by intercepting the communications between the would-be hackers. Also, IMINT capabilities could come into play through the use of satellite imagery and un-manned aerial vehicles (UAVs); which could locate where the hackers are operating from and individuals that are working with them. This is where HUMINT comes in, once individuals are discovered then they can be brought in, in accordance to legislation will determine whether enough information must be gathered to get a warrant for an individual. Once again, every capability available to the intelligence community is necessary to get the job done”.


College, U.S. Naval War. (2019, October 8). Intelligence Studies: Types of Intelligence Collection. Retrieved from U.S. Naval War College: https://usnwc.libguides.com/c.php?g=494120&p=33814…