What other defenses could french have deployed to protect

Assignment Help Computer Engineering
Reference no: EM13929332

Case Study to read and questions to answer:

The Maginot Line was built between 1929 and 1940 to protect France from her longtime enemy, Germany, and to defend the traditional invasion routes across France's eastern frontier. It was built to provide time for the French army to mobilize and to make up for a potentially disastrous shortfall of manpower that was predicted for the late 1930s. Most of all, it was built to provide a place behind which the French army could hide, a so-called Great Wall of France where the nation could feel secure in a doctrine that would become known as the Maginot mentality. The World War II German invasion plan of 1940 was designed to deal with the line. A decoy force sat opposite the line while a second army group cut through the Low Countries of Belgium and The Netherlands, as well as through the Ardennes Forest, which lay north of the main French defenses, thus bypassing the Maginot Line and going around it. The Germans were able to avoid assaulting the Maginot Line directly. Attacking from May 10, the German forces were well into France within 5 days, and they continued to advance until May 24, when they stopped near Dunkirk. By early June, the German forces had cut the line off from the rest of France, and the French government was preparing for surrender. This famous story highlights several of the principles found in the chapter, the most notable one being defense in depth.

What other defenses could the French have deployed to protect their entire border? What other principles did the French violate that led to such catastrophic results?

Reference no: EM13929332

Questions Cloud

Self-assessment of communication skills : Self-assessment of Communication Skills In this assignment, you will develop an understanding of how good listening is crucial to effective communication and career success. In addition, you will perform a personal assessment of your communication sk..
Show the effects of the three above transactions : Show the effects of the three above transactions in a horizontal statements model like the one shown below:
Develop a hopscotch method for the linear convection : Derive the modified differential equation corresponding to the difference equation. Confirm that the method is consistent and compute the effective diffusivity.
What are the motivational benefits of intrinsic rewards : What are employee involvement programs? How might they increase employee motivation? Explain. with examples, What are the motivational benefits of intrinsic rewards? Explain.with examples
What other defenses could french have deployed to protect : What other defenses could the French have deployed to protect their entire border? What other principles did the French violate that led to such catastrophic results
What attitudes or behaviors lead you to this conclusion : Describe what happened when you tried to discuss the promotion with the other side, from your perspective. Was it successful? Were you more concerned with distributive, procedural or interactional justice?
Write the finite-difference equations : Write the difference equation for the BTBC-CS method where a backward difference is used for the convection term and a central difference is used for the diffusion term. Assess the stability of the method.
What are the four basic types of conflict : What are the four basic types of conflict? Describe them. Which type of conflict did you witness or experience?  What are the five levels of conflict? Describe them. What was the level of conflict in your situation?
Administration exercises : 1. Operations, promoting, and back capacity freely of one another in many associations.2. Products delivering associations are not included in administration exercises.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd