Hie 208 4-1-1

In: Historical Events

Submitted By pjroo
Words 1012
Pages 5
HIE 208 – Canadian Military History
Assignment 4-1-1

Canadian Armed Forces at the Outbreak of War in 1939?
Lessons Learned and Relearned from Great War

Royal Military College of Canada (RMC)

To discuss the condition of the Canadian Armed Forces prior to the outbreak of

World War II we must first look at the political climate, culture and economy leading up to

1939. During this time Canada was in a policy of Isolationism after recovering form the

massive loss of life in the Great War.1 An anti-war sentiment stemmed from the

war time losses of over 60,000 Canadians – great losses for a country with only 8 million

people at that time. This Isolationist policy was further strengthened by closer economical

ties with the United States who were investing heavily in Canada and providing markets for

Canadian exports. Nevertheless, the economy was devastated during the Great Depression

and importance was placed on saving the economy and not developing the military.

Therefore, with the average Canadian having a bad image of the Great War and an economy

on the verge of collapse the Canadian Armed Forces in 1939 was in a sorry state, much

similar to its state prior to the Great War and many lessons had to be relearned. Canada had

to relearn its preparedness, conscription and technology lessons all over again.

It is clear to see that the military situation leading up to 1939 was poor and the worst

state since prior to World War I. “The professional army had just 4000 troops; the navy,

3000; and the air force, only 1000”2 The Army went from training for war to constantly

being used for aid to civil power such as the coal strikes in Cape Breton in 1922 and 1923.3

In 1936 many of the Regiments disappeared when the militia had…...

Similar Documents

Case 4-1

...Case 41: PC Depot Note: This case is unchanged from the Eleventh Edition. Approach This is a way of easing gently into the debitcredit mechanism and the complete accounting cycle. Students usually need such a simple problem to build up their confidence in journalizing and posting transactions. Comments on Questions Question 1 Students should describe each transaction along the lines: “Barbara Thompson started PC Depot by investing $65,000 of her own money and $100,000 borrowed from the bank, so her initial cash balance was $165,000.” Question 2 (These accounts are shown under question 3.) Question 3 General Journal (cont’d) | | (9) | Cash | 38,000 | | | Sales | | 38,000 | (10) | Accounts Receivable | 14,850 | | | Sales | | 14,850 | (11) | Cash | 3,614 | | | Accounts Receivable | | 3,614 | (12) | Accounts Payable | 96,195 | | | Cash | | 96,195 | (13) | Merchandise Inventory | 49,940 | | | Accounts Payable | | 49,940 | (14) | Cost of Sales | 38,140 | | | Merchandise Inventory | | 38,140 | (15) | Wages Expense | 688 | | | Cash | | 688 | (16) | Wages Expense | 440 | | | Accrued Wages | | 440 | (17) | Prepaid Rent | 1,485 | | | Cash | | 1,485 | (18) | Prepaid Insurance | 2,310 | | | Cash | | 2,310 | (19) | Utilities Expense | 226 | | | Accounts Payable | | 226 | (20) | Furniture and Fixtures | 1,760 | ...

Words: 978 - Pages: 4

Netw 208 Week 1 Yd

...NetW208 - Week 1 You Decide Transcript Congratulations, you have recently been promoted to coordinate the design and installation of a new network at your company's satellite offices in Cleveland. The manager at this location (Kim) is a “hands on” type of person, but possesses little technical knowledge of data communications. Kim has requested that you keep her updated along each step in the networks design and configuration process. She has also requested that you explain each of the available options, along with the advantages and disadvantages of each decision that you have made. Your Role/Assignment After reviewing chapter 7, provide Kim with a 2 page detailed report of how you plan to start this project, and a complete explanation of the options available to assign IP addresses. While Kim is marketing genius, keep in mind that she is not a tech savvy person. Be sure to explain this very clearly so Kim is not frustrated and lost during the first phase of this project. Ken Rogers, Corporate Manager, Pittsburgh, PA office. Ken has control over the new Cleveland branch office on a corporate level. Even though Kim is the branch manager of the Pittsburgh office, she has to get final approval on all designs (especially in the area of technology); and purchases from Ken . Kim Brown, Branch Manager Kim Brown is the branch manager for the new Cleveland office and oversees all the designs (especially in the area of technology) and purchases for it. Even though Ken......

Words: 495 - Pages: 2

Week 4 Assignment 1

...Week 4 Assignment #1 Me’Shaw A. Taylor Dr. Anne Keyes REL 212 4/29/12 Discuss the criteria you will employ to determine if people on earth are religious — in other words, what does religion look like? Religion is a collection of cultural systems, belief systems, and worldviews that relate humanity to spirituality and sometimes, to moral values (Talal, 1982). Religions most notably are represented by symbols, stories, traditions or anything that tends to explain the meaning of life or the creation of earth and its beings. Each religion has its take on morality, ethics, religious laws, and lifestyle. Many religions have determined behaviors which include meetings or worship services. During these services they are worshipping their deity or praying to him or her. In observing religion, you may also see other services that members may be involved in which include sacrifices, revivals, feasts or dinners, initiations, funerals, marriage ceremonies, meditations, music, dances, and art. Describe three (3) examples of behaviors or beliefs you observe that meet the criteria you established above. 1. Baptism is a Christian rite or ceremony that Christians participate in. It is a form of rebirth and it done by water and the Holy Spirit. 2. Ramadan is another belief for Muslims which is a month of fasting in which they refrain from eating or drinking during the daytime. It is practiced to teach members about patience and submissiveness to their god. 3.......

Words: 410 - Pages: 2

Netw 208 Week 1 Ilab

...NETW208 Week 1 iLab Report There are two sections to this iLab. * Section 1: Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) * Section 2: Managing Remote Access Sessions vLab (20 points) Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) Review the grading rubric below, and then complete the work for each step as indicated. Category | Points | Description | Section 1Configuring a Dedicated VPN Using a Tunnel and Data Encryption—20 points * Task 5: Step 3 * Related Explanation or Response * Task 10: Step 1 * Related Explanation or Response * Task 10: Step 2 * Related Explanation or Response * Task 10: Step 4 * Related Explanation or Response * Summary Paragraph | 121212128 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about configuring a dedicated VPN using a tunnel and data encryption. | Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. (8 points) By completing this lab, I learned......

Words: 1237 - Pages: 5

Knowledge Assessment 1-4

...Lesson 1 Overview of Active Directory Domain Services Knowledge Assessment Fill in the Blank Complete the following sentences by writing the correct word or words in the blanks provided. 1. The Active Directory database is stored on each domain controller in a file called _____ntds.dit____. 2. The Active Directory __forest____ is considered the security boundary for an Active Directory environment. 3. To provide fault tolerance, Active Directory utilizes a _multimaster_ replication model. 4. To create a trust relationship with an NT4 domain, you will configure a(n) __external trust__. 5. The _ Domain_ naming context is replicated across the domain. 6. Each object in the schema must have a unique ___OID___. 7. A(n) __cross-forest trust__ provides a two-way transitive trust relationship between all domains within two forests. 8. Each domain in an Active Directory forest has a(n) ___two-way transitive___ trust relationship with every other domain in a forest. 9. ___Universal group caching___ allows a user at a remote site to be able to log into Active Directory without needing to contact a global catalog server. 10. Active Directory clients rely on ___SRV records___ in DNS to locate Active Directory resources such as domain controllers and global catalog servers. Multiple Choice Circle the correct choice. 1. Which of the following items is a valid leaf object in Active Directory? a. Domain b. User c. Application partition d. OU Except for a user object...

Words: 5416 - Pages: 22

Netw 208 Week 1 Ilab

...NETW208 Week 1 iLab Report There are two sections to this iLab. * Section 1: Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) * Section 2: Managing Remote Access Sessions vLab (20 points) Configuring a Dedicated VPN Using a Tunnel and Data Encryption vLab (20 points) Review the grading rubric below, and then complete the work for each step as indicated. Category | Points | Description | Section 1Configuring a Dedicated VPN Using a Tunnel and Data Encryption—20 points * Task 5: Step 3 * Related Explanation or Response * Task 10: Step 1 * Related Explanation or Response * Task 10: Step 2 * Related Explanation or Response * Task 10: Step 4 * Related Explanation or Response * Summary Paragraph | 121212128 | Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.Paste the requested screenshot.Provide the requested answer.In your own words, summarize what you have learned about configuring a dedicated VPN using a tunnel and data encryption. | Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab; what you learned by performing it; how it relates to this week’s TCOs and other course material; and, just as important, how you feel it will benefit you in your academic and professional career. (8 points) In this lab we learned how to......

Words: 1257 - Pages: 6

Bmis 208 Bmis208 Bmis/208 Programming Assignment 1

... BMIS 208 BMIS208 BMIS/208 Programming Assignment 1 http://helpido.com/bmis-208-programming-assignment-1/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 2 http://helpido.com/bmis-208-week-2-programming-assignment-2/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 3 http://helpido.com/bmis-208-week-3-write-a-visual-basic-2010-program-to-analyze-a-mortgage-the-user/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 4 http://helpido.com/bmis-208-week-4-a-furniture-manufacturer-makes-two-types-of-furniture-chairs-and/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 5 http://helpido.com/bmis-208-programming-assignment-5/#5 BMIS 208 BMIS208 BMIS/208 Programming Assignment 5 (NEW VERSION) http://helpido.com/bmis-208-programming-assignment-5-new-version/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 6 http://helpido.com/bmis-208-week-6-the-figures-below-show-the-output-of-a-visual-basic-program-that/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 6 (NEW VERSION) http://helpido.com/bmis-208-programming-assignment-6/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 7 http://helpido.com/bmis-208-programming-assignment-7/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 7 (NEW VERSION) http://helpido.com/bmis-208-programming-assignment-7-new/ BMIS 208 BMIS208 BMIS/208 Programming Assignment 7 (Another NEW......

Words: 362 - Pages: 2

Unit 4 Assignment 1

...Roy Emerson Unit 4 Assignment 1 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman investments' network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc. 2.0 Scope This policy applies to all Richman investments employees, contractors, vendors and agents with a Richman investments owned or personally-owned computer or workstation used to connect to the Richman investments network. This policy applies to remote access connections used to do work on behalf of Richman investments, including reading or sending an email and viewing intranet web resources. Remote access implementations that are covered by this policy include but are not limited to, dial-in modems, frame relay, ISDN, DSL, VPN, SSH, and cable modems, etc. 3.0 Policy 3.1 General 1. It is the responsibility of Richman investments employees, contractors, vendors and agents with remote access privileges to Richman investments's corporate network to ensure that their remote access connection is given the same consideration as the user's on-site connection to Richman investments. 2. General access to the Internet for recreational use by immediate household members......

Words: 726 - Pages: 3

Module 4 Lab 1

...Week 4 Lab 1 This lab involves research on the size, speed, and slot type for RAM, as well as the model, interface type, capacity, and transfer rate of hard disks and optical disks in your computer system. Required Setup and Tools In this laboratory, you need: * A desktop or notebook computer * Access to the Internet for research Recommended Procedures Task 1: Examining RAM To find out the types of RAM available to upgrade your computer, follow these steps: 1. Acquire computer information: Determine the make, model, and serial number of your computer by physically examining it. On a desktop computer, these numbers are on the back of the computer. For a laptop computer, this information is on the bottom of the computer. If the model and serial number are not clearly visible, refer to the manufacturer’s website for this information; otherwise, select a laptop you would consider buying for yourself and use its model number to obtain the information. a. Service Tag FPR5SW1 b. Computer Model Inspiron N7010 1 In Microsoft 10 go to life at a glance. 2 Go to settings 3 System 4 about That is where you will find it very simple. 1. Check the commercial RAM website: Search the Internet for the commercial website of the manufacturer of the RAM by its name. Go to the RAM memory website and type in the make, model, and serial number, if required, of your computer. Search for the information on......

Words: 539 - Pages: 3

Econ 1 Assignment 4

...Econ 1 Assignment 4 1-) (Categories of Price Elasticity of Demand) For each of the following absolute values of price elasticity of demand, indicate whether demand is elastic, inelastic, perfectly elastic, perfectly inelastic, or unit elastic. In addition, determine what would happen to total revenue if a firm raised its price in each elasticity range identified.
 a) ED = 2.5:elastic b) ED = 0.8:inelastic 2-) (Price Elasticity of Supply) Calculate the price elasticity of supply for each of the following combinations of price and quantity supplied. In each case, determine whether supply is elastic, inelastic, perfectly elastic, perfectly inelastic, or unit elastic in each case. Please give details to your numeric answers.
 a) Price falls from $2.25 to $1.75; quantity supplied falls from 600 units to 400 units. 200/600= 1/3=33.3/22.2=.667 b) Price falls from $2.25 to $1.75; quantity supplied falls from 600 units to 500 units.
100/600=.1667 / 2.25/1.75=.757 3-) Consider the following pairs of goods. Which would you expect to have the more elastic demand? Why?
 a) water or diamonds=water b) insulin or nasal decongestant spray=insulin
 c) food in general or breakfast cereal=food d) gasoline over the course of a week or gasoline over the course of a year

= week 4-) Outsourcing Inpatient Care to India The Wall Street Journal, Monday April 26, 2004. Global health care has arrived. During 2003, Canadian resident Terry Salo flew to India to have......

Words: 347 - Pages: 2

4 Es and 1 P

...Abstract The purpose of this document is to candidly assess myself on each of Jack Welch's 4 Es and 1P, including my strengths, weaknesses, and what I can do to improve. I will provide examples of occasions during my career when I demonstrated my strengths, and when my weaknesses came into play. Introduction Using Jack Welch’s 4Es and 1 P, I will provide a candid assessment. Jack Welch uses this framework because he found this was consistently effective, year after year, across businesses and borders (J. Welch, & S. Welch, n.d.). Therefore, this assessment will include my strengths, weaknesses, and what I can do to improve my performance. This document will provide examples of occasions during my career when I demonstrated my strengths, and when my weaknesses came into play. Energy Energy is one of my fundamental character traits. Several of my performance appraisals describe my energetic attitude toward getting the job done and leading my team. My supervisors have loved having me work in their organization because I bring energy to the team, and it is contagious. Actually, I have had supervisors tell me to treat my job as a marathon and not a sprint because they do not want me to get burned out. I then inform them that I am always this energetic and will be as long as I am around. I demonstrated my high energy level when I was a human resources leader on a deployment in the war zone. When we are in the war zone, we sleep, eat, work, and......

Words: 2097 - Pages: 9

Unit 4 Task 1

...[pic] BTEC Level 3 Subsidiary/Diploma in HEALTH & SOCIAL CARE UNIT 4 DEVELOPMENT THROUGH THE LIFE STAGES Name : …………………….. Target Grade ………………. Current Grade ……………… January – April 2014 |Pass |Merit |Distinction |Attempted |Complete | |P1 – Produce a series of posters that|M1 : Write a report that discusses |D1 : As a conclusion to your report, |P1 | | |describe physical, intellectual, |the nature – nurture debate in |evaluate how nature and nurture may | | | |emotional and social development for |relation to the development of the |affect the physical, intellectual, |M1 | | |each of the life stages of an |individual |emotional and social development of 2| | | |individual | |stages of the development on an |D1 | | | | |individual | | | |P2 – Using examples from someone’s | | |P2 | | |life, explain the......

Words: 2321 - Pages: 10

Unit 4 Assignment 1

...1 Running head: UNIT 4 ASSIGNMENT 1 Fundamentals of Finance BUS 3062 Rodtrice Johnson 3/7/16 Unit 4 Assignment 1 Dennis Hart 1. Q: Proficient-level: "How do Cornett, Adair, and Nofsinger define risk in the M: Finance textbook and how is it measured?" (Cornett, Adair, & Nofsinger, 2016). Distinguished-level: Describe the risk relationship between stocks, bonds, and T-bills, using the standard deviation of returns as the measure of risk. Answer Proficient-level: Risk is defined as the volatility of an asset’s returns over time. Specifically, the standard deviation of returns is used to measure risk. This computation measures the deviation from the average return. The idea is to use standard deviation, a measure of volatility of past returns to proxy for how variable returns are expected to be in the future. Answer Distinguished-level: Stocks and bonds have very different risk-return characteristics. In general, while stocks are more volatile than bonds, over the long run, stocks are expected to yield higher returns than bonds. By varying the mix of stocks and bonds in a portfolio, an investor can achieve her desired level of risk exposure. However, the level of risk in a portfolio depends not only on the risks of individual assets, but also on the movements of the individual assets in the portfolio. 2. Q: Proficient-level: "What is the source of firm-specific risk? What is the source of market risk?" (Cornett, Adair, & Nofsinger, 2016,......

Words: 1067 - Pages: 5

Week 4 Assignmnet 1

...Week 4 Assignment 1 Discussion Taylor Dean Principles of Macro-economic ECO2071 SOL South University Online Professor Joseph Brandt May 13, 2016 1. Using Template A, construct a table that describes the various characteristics of each market structure. | Perfect Competition | Monopolistic Competition | Oligopoly | Monopoly | Number of Firms | Many sellers | Many sellers | Few large sellers | One seller | Pricing Decisions | Firms are price takers | May have some control as the product is slightly different | Have price control; however depends on its rivals | Have price control | Output | Optimal output | Slightly lower than perfect competition as the demand curve is downward sloping | Lowers output for higher profit | Produces less | Decisions | Depends on the market | A little independent | Depends on its rivals | Depends on itself | Profit | Normal | Abnormal | Abnormal | Depends on itself | Demand Curve | Horizontal | Downward sloping | Kinked | Downward sloping | Ease of Entry | Easy to enter and exit | Easy to enter and exit | Difficult many barriers are presented | Not possible, as they hold a patient of government permit | Product Differentiation | Homogenous | Differentiated products | Homogenous and sometimes differentiated | Single seller, therefore, a unique product | 2. Identify a firm for each of these market structures and explain why each firm belongs in the market structure......

Words: 458 - Pages: 2

Colossians 3:1-4

...Colossians 3:1-4 1.) What did the text mean to the Biblical audience? According to the AMG Concise Bible Commentary at the time that this letter was written, Paul was in a Roman prison awaiting his trial. He wrote the letter in response to accounts of a church in Colosse being persuaded by false religious teachers and leaders. People were mixing Christian doctrine with pagan mythology. "The teaching was an early form of Gnosticism, a heresy that created serious trouble throughout the church during the 2nd century¹.” The established church was very new in its formation and it was easily swayed by non-Christian influences. The reason for this letter was to pull the false teachings out of the church and reinstate the real truths of God's Word and its principles. It was also written to establish the authority and role of Jesus Christ. This particular passage was a reminder that we are dead to the old way of life as an unbeliever and born to a new life in Christ. The passage before 3:1-4 says to avoid "outer religion" and the one preceding tells us to live a Godly life. 2.) Measuring the width of the river to cross: The difference between our situation today and that of the Biblical audience in that time I believe is that they didn't have as many resources and support. Today we have plenty of churches, Christian bookstores, Christian leaders, Biblical studies, etc. In that time period I imagine that church communities felt isolated,......

Words: 570 - Pages: 3

From I"s Episode 1 English Dubbed | Midnight Sun | Barnes and Noble