What other defenses could french have deployed to protect

Assignment Help Computer Engineering
Reference no: EM13929332

Case Study to read and questions to answer:

The Maginot Line was built between 1929 and 1940 to protect France from her longtime enemy, Germany, and to defend the traditional invasion routes across France's eastern frontier. It was built to provide time for the French army to mobilize and to make up for a potentially disastrous shortfall of manpower that was predicted for the late 1930s. Most of all, it was built to provide a place behind which the French army could hide, a so-called Great Wall of France where the nation could feel secure in a doctrine that would become known as the Maginot mentality. The World War II German invasion plan of 1940 was designed to deal with the line. A decoy force sat opposite the line while a second army group cut through the Low Countries of Belgium and The Netherlands, as well as through the Ardennes Forest, which lay north of the main French defenses, thus bypassing the Maginot Line and going around it. The Germans were able to avoid assaulting the Maginot Line directly. Attacking from May 10, the German forces were well into France within 5 days, and they continued to advance until May 24, when they stopped near Dunkirk. By early June, the German forces had cut the line off from the rest of France, and the French government was preparing for surrender. This famous story highlights several of the principles found in the chapter, the most notable one being defense in depth.

What other defenses could the French have deployed to protect their entire border? What other principles did the French violate that led to such catastrophic results?

Reference no: EM13929332

Questions Cloud

Self-assessment of communication skills : Self-assessment of Communication Skills In this assignment, you will develop an understanding of how good listening is crucial to effective communication and career success. In addition, you will perform a personal assessment of your communication sk..
Show the effects of the three above transactions : Show the effects of the three above transactions in a horizontal statements model like the one shown below:
Develop a hopscotch method for the linear convection : Derive the modified differential equation corresponding to the difference equation. Confirm that the method is consistent and compute the effective diffusivity.
What are the motivational benefits of intrinsic rewards : What are employee involvement programs? How might they increase employee motivation? Explain. with examples, What are the motivational benefits of intrinsic rewards? Explain.with examples
What other defenses could french have deployed to protect : What other defenses could the French have deployed to protect their entire border? What other principles did the French violate that led to such catastrophic results
What attitudes or behaviors lead you to this conclusion : Describe what happened when you tried to discuss the promotion with the other side, from your perspective. Was it successful? Were you more concerned with distributive, procedural or interactional justice?
Write the finite-difference equations : Write the difference equation for the BTBC-CS method where a backward difference is used for the convection term and a central difference is used for the diffusion term. Assess the stability of the method.
What are the four basic types of conflict : What are the four basic types of conflict? Describe them. Which type of conflict did you witness or experience?  What are the five levels of conflict? Describe them. What was the level of conflict in your situation?
Administration exercises : 1. Operations, promoting, and back capacity freely of one another in many associations.2. Products delivering associations are not included in administration exercises.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Make use of method iteration to find a formula expressing

How several elementary operations are used in the following algorithm? The elementary operations are comparison operations (such as > and

  Write down an e-mail explaining the five elements of

imagine you have been hired by a small well-funded startup company to help with their it-enabled business strategy.

  When an entity has the relationship to itself

The presence of one or more foreign keys in a relation prevents. When an entity has a relationship to itself, we have a?

  Determine the max value of range for this data set

Values of Q should be accepted in degrees and then converted to radians within the function body for use in the formula. Be sure to structure your function in a way that will accept both scalar and vector inputs.

  You have been hired by tmi to design an application using

you have been hired by tmi to design an application using shell script programs. tmi case projects needs you to design

  Questioncreate an employee class with enough numbers of

questioncreate an employee class with enough numbers of data members to store employee data of following structure-id

  Compute the total resistance in a circuit

A program is needed to calculate the total resistance in a circuit. The resistors can either be in series or in parallel but not both. The number of resistors in the circuit can range from 2 to 10. How do I get started?

  You made a sorting algorithm its running time turned out to

you created a sorting algorithm. its running time turned out to be on2. how much better can you make this algorithm ?

  What ethical social and political issues arise with the use

information is data that is framed in a specific context. in this sense information is contextual data that has a level

  Factors affecting the group process and outcome

In class, we introduced different factors which may affect group process and outcome, like group size and the status effect.

  Write a program that determines the offset address

Write a program that determines the offset address for an n-dimensional array (0

  How to maintain inventory data on resources stored

give an eLibrary system where patrons can search a database to retrieve either the location of an actual resource in the library or an electronic copy of the source.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd