Saturday, December 28, 2019

Reflection - 1253 Words

Since my hire at Cleveland State University I have attempted to enhance my teaching and supervision of clinical instruction in two ways: 1) by improving my pedagogy, and 2) by enriching my own content knowledge by attending professional conferences and continuing education courses and through the process of maintaining or obtaining professional certifications. Summary of Activities Completed to Improve Pedagogy Through formal and informal endeavors, including mentoring from my colleagues, I have learned and applied various methods to enhance my teaching abilities. The following content will provide details of my participation in three formal workshops and the resultant changes implemented in the courses I instruct (see workshop†¦show more content†¦Various other PowerPoint slides contain graphs and pictures to represent important content or as a content booster. A positioning lab is also conducted during the second part of this class as an active learning strategy. Students are divided into groups and then provided a case study with the task to position a child (baby doll) using adaptive equipment and positioning aids. Moreover, I organize additional opportunities outside of class for students to attend an observational session in a neonatal intensive care unit. Positive, qualitative comments were made regarding this multi-modal structure for teaching this content (see example s of student evaluations in Section II.C.3). Throughout the spring and summer of 2014, I also participated a workshop through the Center for Faculty Development and Leadership at Cleveland State University, to develop a Teaching Portfolio. The changes that resulted included a major redesign in the organization and structure for DPT 662: Interactions I- Patient-Practitioner Interactions. With the implementation of a flipped classroom format, I took into consideration how the curricular content would be presented, including the use of web-based platforms toShow MoreRelatedReflection1650 Words   |  7 PagesIan-Bradley Tancred This essay analyses and describes what reflection is and how it supports your personal and professional learning. It elaborates upon how and why recognizing your strengths and weaknesses are important and how they can enhance lifelong learning. It describes what arguments and assertions are, what the differences are between them and which one is better. Debnath describes reflection as a means of self-examination to learn from knowledge and experiences which will help transformRead MoreReflection1479 Words   |  6 PagesReflections Both simple and complex reflections were used. A simple reflection used towards the beginning of the interview transpired into, â€Å"pretty active out doing a lot of things.† Alternatively, a complex reflection used when reflecting on Sarah’s feelings about what her friends think about her not socializing subsisted of, â€Å"it bothers you thinking about them, wondering about your intentions.† I used twice as many complex reflections as simple reflections. Unfortunately, I should have usedRead MoreReflection On The Word Reflection 701 Words   |  3 PagesFor me the word ‘reflection’ means taking time to really dig deep into my thoughts, to contemplate something meaningful and significant, to make a decision that often involves me and my future. It has a personal and emotional connection. Daudelin (1996) uses the word ‘reflection’ to encourage managers to create time to recognise the value of learning from past and current work s ituations (‘experience’) and to adapt this learning to new situations. I would prefer to choose the words ‘thought’ or ‘consideration’Read MoreReflection1218 Words   |  5 PagesReflection on your personal development Reflection is a major factor in developing self-awareness to improve services provided to everyone around me, this is to develop my own understanding in realising the good and bad made previously. Moving forward with a better understanding, as well as rectifying the mistake whilst recognizing the good points, (Horton-Deutsch and Sherwood, 2008). Working in a domiciliary setting and visiting vulnerable adults within their homes, I am constantly tryingRead Morereflection703 Words   |  3 Pageshelpful/ inspiring. Your completed template form and content should be a CRITICAL reflection of the paper/ chapter content but NOT merely summarize what you have read. TEMPLATE FOR REFLECTIONS ON EXPERIENCES DATE: PLACE: The experience 1. What experience are you reflecting on (class session, project group meeting, particular piece of reading, other)? Give a brief account of this experience. 2. 3. Reflections on Experience 4. 2. Looking back, what was particularly memorable/ interestingRead MoreReflection Of Illusion1635 Words   |  7 Pages Shattering a Reflection of Illusion I stare blankly at the blinking caret. Propped up snugly against three quilted pillows and one calculus textbook is my laptop. To be more specific, a laptop opened to an empty Microsoft Word document. Writing a speech is no easy task, but writing a valedictory address is like playing darts with spaghetti. Humbly accepting the position as the class valedictorian, I have been graced with the task of writing an excerpt that would fill my classmates’ hearts withRead MoreNursing reflection.12855 Words   |  52 PagesReflective Essay This essay will look at reflection on a critical incident that has promoted a positive outcome. It is not a very major incident but it stands out as it has a potential for learning. This essay will identify and explain Johns (1994) model of reflection and explain what reflection is and why reflective practice is necessary and how it can be used. Schone (1983) recommended reflection on critical incidence as a valuable term, sited in Ghaye and Lillyman (1997) a critical incidentRead MoreReflection Essay1616 Words   |  7 Pagesintegral part of nursing. It will also demonstrate how reflection enabled me to make sense of and learn from this experience, as well as identify any further learning developments needed to improve my practice and achieve the level of competency needed for when I qualify as an assistant practitioner. While discussing the knowledge underpinning practice, evidence based literature will be reviewed to support my discussion and for the purpose of reflection the essay will be written in the first person. SpouseRead MoreReflection On Self Development Through Reflection1854 Words   |  8 Pagesthrough reflection is a key issue of education and learning (Kennison, 2012), where you learn through experience (Tashiro, Shimpuku, Naruse and Matsutani, 2013), learn to self-evaluate (Duffy, 2013), identify gaps in knowledge and detect where further training or study is required to improve practice (Olarerin, 2013). Ultimately reflection is thought to be constant learning from practice, thus refining knowledge and experiences and putting them into practice (Naidoo, 2013). Within my reflection examplesRead MoreReflection Essay781 Words   |  4 PagesI determined that I needed a new interest, something to keep my mind engaged and challenged. I enrolled in the Doctor of Business Administration (DBA) through the Columbia Southern University (CSU) just for fulfillment. This reflection assignment exercise proves to be the catalyst for my future college endeavors. The assignment to reflect on DBA program dreamed of taking steps towards realizing those ideas and course accomplishments right now. Due to time some course assignments, I will embrace,

Friday, December 20, 2019

Teen Pregnancy is a Growing Problem in the United States

Among many of the preventable diseases and health problems there is one in particular that is rooted deep within my hometown. I am a part of the graduating class of 2013 from Seaside high school, located in a tourist town on the northern Oregon coast, where according to the United States Census Bureau the median income as of 2012 was $24,201 (table 1).I remember in high school there was always a girl I knew who was pregnant, but it was not until recently when I noticed so many of my classmates and friends announcing due dates. According to Medline Plus, adolescent or teen pregnancy can be defined as â€Å"pregnancy in girls age 19 or younger† (para. 1). According to the CDC’s â€Å"Births: Final Data for 2012† report, for girls between the ages of 15-19 there were 305,388 live births, or 29.4 live births per 1,000 population (para. 1,2). Between the years of 2010 and 2012 there were 39 pregnancies recorded for girls between the ages of 10 and 19 in Seaside, Orego n and for the same time period and age group there were 110 pregnancies in Clatsop County (the county that Seaside resides within) according to the â€Å"Oregon Teen Pregnancy Count† (table 1). Teen pregnancy is preventable and yet it is still a major problem, especially in rural counties. Teen pregnancy is a growing problem in the United States and while it is constantly being addressed by school’s sex education classes and by public speakers, there really is not enough information about how expensive and painful having a childShow MoreRelatedTeen Pregnancy Research Paper820 Words   |  4 PagesTeenage Pregnancy in America Teen pregnancy is a growing epidemic in the United States. Teen girls are becoming pregnant at an alarming rate, with a lot of the pregnancies planned. With television shows broadcasting shows such as â€Å"16 and Pregnant† and â€Å"Teen Mom†, it is giving teenage girls the idea that it is alright to have premarital sex and become pregnant. It is in a way condoning teen pregnancy. I am interested in discussing teen pregnancy and the options that are out there for theRead MoreEssay on Teenage Pregnancy and Prevention1320 Words   |  6 Pagescare and support teenage births. Although teen pregnancy has declined in the past, the United States is still number one out of all industrialized countries of teen pregnancies. Therefore, implementing an in depth sex education class covering parenting in schools will allow teens to fully understand he consequences of having protected or unprotected sex. All children deserve love and care from their parents. The United States has a higher rate of teen pregnancy than other countries because one is notRead MoreTeen Pregnancy Costs The United States1577 Words   |  7 Pages Section One: â€Å"Why?† The United States has the highest rates of teen pregnancy and births in the western industrialized world. Teen pregnancy costs the United States at least $7 billion annually. Family First Aid has stated that â€Å"thirty-four percent of young women become pregnant at least once before they reach the age of 20 — about 820,000 a year. Eight in ten of these teen pregnancies are unintended and 79 percent are to unmarried teens.† You may ask why so many teens are pregnant. It may be becauseRead MoreEssay on Is Teen Pregnancy a Problem?1044 Words   |  5 PagesHow many pregnant teens have there been? Over the years more girls are becoming teen moms. In Oklahoma teen pregnancy has become a problem. Recently Oklahoma has had a pregnancy rate of 47.5% (Tulsa World). Not only is it an issue in Oklahoma but an issue in the United States as a whole. The lack of awareness and how to prevent pregnancy is a reason to blame for the increasing numbers. The more we don’t make people aware of the increasing teen pregnancy rate and how to prevent then the numbers willRead MoreSexual Education And Teen Pregnancy1238 Words   |  5 PagesSexual education need to be inforce more properly because it is causing a rapid growth in teen pregnancy and STD’S. Teen pregnancy is a female under the age of 20. Teen pregnancy is found more common between the ages of 13-18 years of age. Today there is over 250,000 teen mothers in the United States. The main reason for teen pregnancy is because of lack of sexual education, lack of safe sex, lack of support from the parents or guardians, lack of protection, and lack using of birth control. SexualRead MoreTeen Pregnancy Essay1660 Words   |  7 PagesEach year approximately 750,000 adolescents (ages 15-19) in the United States will become pregnant and about 400,000 of those adolescents will give birth. Out of all the developed nations in the world, the United States has the highest incidence of teen pregnancy. Although there has been a decline in the number of pregnancies among adolescents, teen pregnancy is still a serious health concern that needs continued intervention. It is widely agreed upon that becoming pregnant at a young age has negativeRead MoreTeenage Pregnancy Sections I And II1738 Words   |  7 PagesTopic: Teenage Pregnancy Sections I and II Primary Audience: My primary audience is the citizens of the U.S.; this includes tax payers, parents, state officials, education officials and teen moms. In the U.S. we have several teens that are experiencing unprotected sex, without any knowledge of pregnancy prevention or sex education. When teen girls become pregnant, this also affects the parents. This is a huge responsibility and burden for all involved parties. Health benefits are needed forRead MoreEssay on Babies Having Babies1538 Words   |  7 Pagesthough the teen pregnancy and birth rates have dropped by one-third over the past decade, teen pregnancy in the United States is a growing problem. According to data by the National Center for Health Statistics and other official data, one in three girls still become pregnant by the age of twenty (Brown lines 1-3). In the United States one million adolescent girls become pregnant every year causing the U.S. to be the leader of the developed world in teen pregnancy. One in four of these teen girls willRead MoreEssay Teen Pregnancy1403 Words   |  6 PagesThere is a lot of teen mothers growing up in this world wondering, what if I would have stayed in school? W hat could I have become? Would it have made my life easier if I had thought first? There is many causes for teen pregnancy. They lead to the need for the desire of love by another person. One might have a poor home life and would want something like their peers have. A teen may have a low self-esteem and simply be looking for acceptance. However, many teens that have a wonderfulRead MoreTeenage Pregnancy And Teen Pregnancy1341 Words   |  6 PagesTeenage pregnancy is a prominent dilemma in our nation because it continues to place adolescents into delinquency. According to the United States Health and Human Services, three out of ten American teen girls will become pregnant at least once before they reach the age of twenty. That is nearly 750,000 teen pregnancies in a year (1) (HHS Pg.2 2014). Also according to U.S. Department of State, teen pregnancy budgets the United States and tax payers approximately seven billion dollars annually (2)

Thursday, December 12, 2019

English as Foreign Language-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Importance of English as a Foreign Language. Answer: Introduction This report reflects the importance of English as a foreign language which is being taught in the mainstream schools around the world. However, with the increasing use of English language and complexity of linguistic landscape, many people and students are inclined towards learning English as an essential language. In this report, study has been prepared to determine which form of knowledge such as declarative or procedural is more effective for the students to learn English language. ESL/EFL Class which form of knowledge, Declarative or Procedural is more effective This divergent thinking and innovative ideas will surely help students to learn English language and its core aspects. However, if declarative procedure is used in English as more than foreign language class then it would surely increase the overall learning phase of students. For instance, if teachers in classroom put emphasis upon explaining the key concept of English language to their students then this will surely help them to learn a critical phase of English language and they will easily identify the clear path of learning English in their communication process. Another example could be taken; Teachers could only help students to rectify their mistakes and grammatical problems. Other problems like fluency in speaking and using sophisticated words while communicating with others will be learned by them only they are well versed with this English language (Cohen, et al. 2016). There are several problems which are faced by students such as wrong learning path, no proper sentence s tructuring and make their perceptions complicated with the help of their cumbersome words and wrong pronunciation. Nonetheless, there is another method which could be used by teachers in EFL classes is procedural method (Beauchamp, Bowie, and Arnold, 2004).This method will help teachers to start with zero level with their students while imparting knowledge to their students regard with English language. It is evaluated that if students are given ample time to learn particular activities with right guidance then they could easily grasp a critical understanding on particular subject matter. For instance, in the starting of this learning phase, teachers could teach tenses to their students after a certain period of time meaning and vocabulary power of students could also be managed. In the end of this procedural training program all the students in EFL will be forced to communicate and talk with other students only in English language (Addis, 2009). This type of procedural plan will su rely increase the effectiveness of English language in EFL class and will increase the overall English performance. Therefore, it could be inferred that proper level of planning process and procedural steps will surely increase the overall performance of students in learning English language. However, with a view to make learning path more effective for students a proper teaching session could be conducted (Furedi, 2015). Grammar item and design an activity Tense teaching session Particular Starting time (Daily) Ending time( Daily) Objective Age Writing down grammatical issues in note book 10:am 10:30 am Improvement in writing skills 10 years- 15 years Teaching factors of tenses 10:30 am 11:00am Making teaching improved 20 years to 35 years Identifying students issues in tenses 11:00am 11:30am Increase their learning skills Why have you decided to teach the item this way This tense teaching session has been conducted in this way because of the complexity of the subject matter (Hall, 2013). Students in EFL classes are from different culture and places. Therefore, it could be inferred that proper level of session will not only help students to learn English langue in effective manner but also provide them opportunity to solve their problems in easy and determined approach. Furthermore, students in EFL classes need to practice the chapters they learned therefore, This 1:30 hours session will help them to learn and practice at the same time. If students are left at their liberty then this will not only impact their learning English language intents but also will ruin their procedural learning path. Now in the end, it could be inferred that this action plan prepared to teach English to the students of EFL will not only help in learning English language fast but as well provide a clear understanding in determined approach (Furedi, 2015). Syllabus for teaching pronunciation There are several methods which could be taken into consideration for teaching pronunciation to students in EFL classes. It is observed that speaking English in correct manner could be difficult for the new comers. However, in the starting of this session for teaching pronunciation sound of lax vowels of English with superasementals would be taken. After teaching this part, Schwa would be undertaken for the students so that they could learn tense vowels and diphthongs. It is considered that each lesion in this syllabus for teaching pronunciation would be divided into two parts one is to learn vowels and another one is consisted with practice the same. In the first part of syllabus suprasegmentals, jazz rhythm would be taught to students and in other parts practice of the same will be made. This procedural practice will help students to learn the practical part of the pronunciation which will surely increase their efficiency to use proper pronunciation in speaking English in easy and determined approach. Now in the end, it could be inferred that these Syllabus for teaching pronunciation will be accompanied with systematic process which will be used to identify eh proper divergent and innovative thinking process to use right level of pronunciation for the different and effective learning process in classes (McNally, 2013). Conclusion This report has assisted in determining the clear path which could be undertaken by the teachers to impart knowledge regarding the English language to their students. The procedural method is the best method which could be useful for students to learn English language. Now in the end, it would be inferred that each and every students should be indulged in proper level of training program for learning the English language in easy and effective manner. However, effectiveness of EFL classes would be based on the teachers and methods they use while imparting knowledge to students. References Addis, S., 2009. Creativity and innovation.Rough Notes,152(4), pp.78-80. Beauchamp, T.L., Bowie, N.E. and Arnold, D.G. eds., 2004. Ethical theory and business. Brown, V.B. and Shannon, T.J., 2016. Going to the Source: The Bedford Reader in American History. Cohen, K.B., Fort, K., Adda, G., Zhou, S. and Farri, D., 2016, May. Ethical issues in corpus Furedi, F., 2015.Power of Reading: From Socrates to Twitter. Bloomsbury Publishing. Hall, S (ed.) 2013, Representation: Cultural Practices and Signifying Practices, The Open University, London pp.234-238. McNally, L., 2013.Reading Theories in Contemporary Fiction. AC Black.

Wednesday, December 4, 2019

Forensic Analysis of Data Remnants †Free Samples to Students

Question: Discuss about the Forensic Analysis of Data Remnants. Answer: Introduction Smartphones play a significant role in this generation. Almost everyone in this generation uses smartphones for the purpose of communicating with others and also carries out several other works. Smartphones consists of cloud applications that can be used for storage purposes. This facilitates the users to access their own data whenever required. Criminals have started to use these smartphones for carrying out illegal and criminal activities (Poisel, Malzer Tjoa, 2013). The mobile devices that have been used by the criminals can be used for the purpose of investigating any traditional or cyber crime. MEGA is considered to be a cloud application that can store data just like Dropbox and Google Drive (Daryabar, Dehghantanha Choo, 2017). This report examines and analyzes a scenario that is based on cloud forensics. This report is based on the case study of the MEGA cloud application. It discusses about the cloud forensics concepts. It also discusses about the various usages of cloud forensics. This report critically analyzes the case study of MEGA app and attempts to find out the type of modification of the metadata that will take place when the file will be uploaded and downloaded. It also tries to find out how will the evidences that are present on an iOS and an android platform gets affected. This report also discusses the findings of the analysis. Cloud forensics forms a part of digital forensics. This field is the combination of cloud computing along with the field of digital forensics. In digital forensics, data is identified, collected, examined and analyzed for the purpose of preserving its integrity and value (De Marco, Kechadi Ferrucci, 2013). In cloud computing, users are allowed to share resources over the web depending on their demand by paying the price as per their usage. Cloud forensics can be considered to be a sub part of the network forensics. Cloud forensics has three dimensions called legal, technical and organizational dimension. Mobile phones often use cloud storage services. Mobile applications are able to store data and leave a trace of criminal activities. This can be helpful for the purpose of investigating any criminal act. It also plays a major role in criminal litigation as well as civil litigation. An organizational structure consists of several types of staffs like internal and external employees and staffs. These staffs play a major role in digital forensic processes (Ruan Carthy, 2012). Investigators are the most important and significant staff that participate in the process of digital forensics. They are highly qualified and experienced individuals who are capable of investigating a criminal activity by using the capabilities of forensics. IT professionals also play a major role in the process of investigation. They assist the investigators and help them when the knowledge of information technology is required. Another main role in the process of digital forensics is played by the legal advisors. These professionals help in identifying the criminals. Cloud Forensics Usage There are several usages of cloud forensics. Some of them are as follows: Investigation: This is the most important usage of cloud forensics. Crimes can be investigated in the cloud environments by using cloud forensics. If there is any violation of policy then that can also be investigated by taking the help of cloud storage forensics (Ruan et al., 2013). Cloud forensics will help to gather evidences for presenting it in the court. Data recovery: The cloud applications can store data. Sometimes these data might get deleted accidentally or unintentionally. Cloud forensics has the capability to recover data after it has got deleted. Cloud forensics can also be used for recovering encrypted data. Troubleshooting: Cloud forensics has made it simple for the users to locate files and documents physically as well as virtually. Log monitoring: Cloud forensics play a significant role in monitoring logs (Thorpe et al., 2013). It helps in the process of regulatory compliance as well as auditing. The process of cloud forensics uses certain procedures like: Data collection: Forensic data is identified as well as acquired from several information sources that exist in the cloud environment. The data can be either from the side of the provider or from the client side. There are different cloud platforms and a single tool cannot be applied in all the platforms. Different tools can be used in the different cloud service models. The collection of data is done in a sequential way and it depends upon the volatility of the data. At first the data with high volatility is collected and after that the low volatile data is collected. Elastic and static forensics: Resources can be provisioned based on the client demand. The cloud forensics tools have an elastic nature. The static and live forensic tools are the most used tools in case of cloud storage forensics. E-discovery, data acquisition as well as data recovery are such examples where such tools are used. Investigation: Data can be retrieved by cloud forensics and these data can be investigated. The data in the cloud platforms are highly susceptible to various kinds of threats and attacks. Pro-active preparation: Forensic-aware cloud applications are designed in this stage. This stage also involves access-control records, tracking authentication and design principles. The framework of investigation of MEGA case study is discussed below: Identification cum collection: The internal storage of iPad as well as that of Samsung Galaxy tab II had been discovered for the collecting evidences. TCPDump had been used for the purpose of monitoring and capturing network traffic. Preservation: The file was acquired and verified by finding out the MD5 hash values. Examination cum analysis: MEGA app was used on Android and iOS devices and then images present in the internal storage were examined. There have been ten experiments where the resetting of the devises had been done. Hex Workshop and 0xED were used for Android devices and iOS devices respectively for carrying out analysis of the internal storage. EDRM was used in the experiment. The experiments that have been conducted on the iOS and Android devices are presented in a table format (Appendix 1 and 2). Researchers have stated that data remnants like file names, usernames had been recovered from iPhone 4 that used iOS version 4.3.5 and from Motorola Droid that used Android version 2.2.2. Data had also been recovered from Windows PC as well as Mac PC (Grispos, Glisson Storer, 2015). Dropbox, Evernote, Google Docs as well as Amazon S3 are the models that play a significant role in the cloud storage application investigation (Chung et al., 2012). Investigation on Windows 7 was conducted in order to find out forensic data from PicasaWeb, Flickr, Dropbox and Google Docs (Marturana, Me Tacconi, 2012). Researchers have said that it is possible to insert forensic tools into the VMs of the Amazon EC2 platform (Dykstra Sherman, 2012). Client analysis and server analysis can also be conducted (Martini Choo, 2013). There are different models of cloud forensics that can be useful in finding out whether any alteration or modification of file contents has taken place (Quick Choo, 2014). It wa s found out that the non-preinstalled app file contents of the iCloud remained same and unchanged. Data can be collected in a programmed way and from a remote or distant location by using a six steps procedure (Martini Choo, 2014). The research of cloud forensics is depicted in a table format (Appendix 3). A sound forensic process has to satisfy the following criteria as mentioned below: Meaning: The real meaning of the data that is collected for investigation purpose must not be lost. Errors: Detection of error is very important in order to maintain the validity of the data. Hash functions play a major role in this process. Transparency: A transparent forensic process will help to carry out an effective as well as honest investigation. Experience: The experience of the investigators and other professionals who play a significant role in investigation must be taken into account. Experienced individuals will help to take a correct decision. The MD5 hash values of the original as well as the downloaded files were determined in the MEGA case study. These has values were compared to find out if any changes had been made or not. Hash values of the files of iOS and Android devices were compared. After this the timestamps of the files were also compared. Findings of Android devices are given below: It has been found out that when a user logs in an application then the username gets saved in the internal storage of the Android device (Daryabar, Dehghantanha Choo, 2017). Determination of decrypted files was also possible. One of the main findings was that it was possible for the Android devices to create and save shared URL links to the files. Findings of iOS devices are given below: Recovery of uploaded files was possible. Recovery of mega.ios.plist documents and files was also possible. It was possible to find out the login details as well (Daryabar, Dehghantanha Choo, 2017). It can be said from the findings that modification of the contents of the downloaded files was not possible by the MEGA app. After comparing the hash values of the original and the downloaded documents it was found out that it remained the same. The timestamps of the original and the downloaded files differed (Quick Choo, 2013). The timestamps of the files had been modified to the timestamps of the destination folders of the devices. The timestamps can be compared for detecting if the files have been modified or not. It is possible to determine the URLs and IP addresses that have been used by the app. It is also possible to determine the server names, certification provider and the timestamps that have been used by cloud storage platforms and devices. Conclusion This report concluded that it was not possible for the MEGA app to modify the contents of the files that have been downloaded. This report discussed about the cloud forensics concepts. It also discussed about the various usages of cloud forensics. This report critically analyzed the case study of MEGA app and found out the type of modification of the metadata that will take place when the file will be uploaded and downloaded. This report discussed about the findings from the case study of MEGA app. This report discussed about the criteria that needs to be satisfied by a sound forensic process. It said that the hash values of the original and downloaded files remained same but the timestamps differed. It also found out how will the evidences that are present on an iOS and an android platform gets affected. This report also gave an overview of the steps to be carried out in a forensic process. References Chung, H., Park, J., Lee, S., Kang, C. (2012). Digital forensic investigation of cloud storage services.Digital investigation,9(2), 81-95. Daryabar, F., Dehghantanha, A., Choo, K. K. R. (2017). Cloud storage forensics: MEGA as a case study.Australian Journal of Forensic Sciences,49(3), 344-357. De Marco, L., Kechadi, M. T., Ferrucci, F. (2013, September). Cloud forensic readiness: Foundations. InInternational Conference on Digital Forensics and Cyber Crime(pp. 237-244). Springer, Cham. Dykstra, J., Sherman, A. T. (2012). Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques.Digital Investigation,9, S90-S98. Grispos, G., Glisson, W. B., Storer, T. (2015). Recovering residual forensic data from smartphone interactions with cloud storage providers.arXiv preprint arXiv:1506.02268. Martini, B., Choo, K. K. R. (2013). Cloud storage forensics: ownCloud as a case study.Digital Investigation,10(4), 287-299. Martini, B., Choo, K. K. R. (2014, September). Remote programmatic vCloud forensics: a six-step collection process and a proof of concept. InTrust, Security and Privacy in Computing and Communications (TrustCom), 2014 IEEE 13th International Conference on(pp. 935-942). IEEE. Marturana, F., Me, G., Tacconi, S. (2012, October). A case study on digital forensics in the cloud. InCyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2012 International Conference on(pp. 111-116). IEEE. Poisel, R., Malzer, E., Tjoa, S. (2013). Evidence and Cloud Computing: The Virtual Machine Introspection Approach.JoWua,4(1), 135-152. Quick, D., Choo, K. K. R. (2013). Forensic collection of cloud storage data: Does the act of collection result in changes to the data or its metadata?.Digital Investigation,10(3), 266-277. Quick, D., Choo, K. K. R. (2014). Google drive: forensic analysis of data remnants.Journal of Network and Computer Applications,40, 179-193. Ruan, K., Carthy, J. (2012, October). Cloud forensic maturity model. InInternational Conference on Digital Forensics and Cyber Crime(pp. 22-41). Springer, Berlin, Heidelberg. Ruan, K., Carthy, J., Kechadi, T., Baggili, I. (2013). Cloud forensics definitions and critical criteria for cloud forensic capability: An overview of survey results.Digital Investigation,10(1), 34-43. Thorpe, S., Grandison, T., Campbell, A., Williams, J., Burrell, K., Ray, I. (2013, June). Towards a forensic-based service oriented architecture framework for auditing of cloud logs. InServices (SERVICES), 203 IEEE Ninth World Congress on(pp. 75-83). IEEE.