Thursday, October 31, 2019

Petroleum Lab Report Example | Topics and Well Written Essays - 1000 words

Petroleum - Lab Report Example The compounds with lower boiling points rise faster and higher on the column while those with higher boiling points evaporate slower and do not reach the top of the tower (the vapours condense on the lower trays). The distillation process separates the constituents of the crude oil on the basis of their difference in their boiling point. Refinery gas, (methane, ethane, propane and butane) is removed as a composite gas mixture on the top of the column (Figure 1 and Table 1). The second fraction, naphtha/gasoline, boils in the range of 40-180oC. As the other fractions have higher boiling points, they collect on the lower trays. Cracking converts heavy fractions from the primary distillation into more useful compounds. For example, when C11H24 is cracked, C9H20 and C2H4 are obtained (Hill, G.C and Holman, J.C, 400-401). C9H20 can be used as gasoline, but more importantly C2H4 can be used as a starting material for the manufacture of products such as plastics, alcohol, diols etc. The cracking process also provides more useful branched-chain alkanes. Catalytic cracking is a process in which long chain alkanes are converted into hydrocarbons of lower molecular weights by the mediation of catalysts at fairly high temperatures. The catalysts normally consist of Al2O3-SiO2 mixtures (Brown, T.L, LeMay, H.E and Bursten, B.E., 947). 4. Platforming Platforming is a process in which linear alkanes are converted into aromatic hydrocarbons. For example, heptane can be converted into toluene in the presence of catalytic amount platinum (Hart, 103). 6 marks 4. The naphtha fraction from the primary distillation is a starting point of the Petrochemical Industry. List 3 useful chemicals that are made from this fraction stating the uses to which they are put. 6 marks Hexane: solvent and fuel Heptane: FuelOctane: Fuel 5. Briefly describe ONE potential source of damage to the environment caused by the Petroleum Industry. 4 marks Crude oil spillage is catastrophic for the environment. It is very rare that an oil tanker spills large quantities of crude oil, but when it does, a large area of the sea gets contaminated by the thick black fluid. Fish, birds, aquatic plants and even mammals living in affected areas suffer from a major oil spillage. Even though the spillage areas are cleaned, a good part of the crude oil remains in the affected areas during several years, which

Tuesday, October 29, 2019

Contemporary Leadership and the Challenges It Faces Essay

Contemporary Leadership and the Challenges It Faces - Essay Example The researcher states that an effective leader is one who is able to train, equip, select, influence his or her followers with diverse skills, abilities, and shape them to be effective workers to ensure that the organization achieves its goals and objectives. Leadership styles are changing rapidly to enable leaders to address the contemporary challenges. This essay aims at evaluating contemporary leadership and the challenges contemporary leaders face in luxury hotels. The current models of leadership include transformational, charismatic, and transactional. Transactional leadership model basis on service exchange for several types of rewards that leaders control. Transactional leaders are those who are able to determine the kinds of rewards that will motivate employees and enable them to meet their objectives and goals. On the other side, transformational leadership refers to the actions that transformative leaders create to empower participants who take part in the process. Transfo rmational leaders have the capability of bringing up significant change to his or her followers. That is, transformational leadership facilitates redefining of individuals’ goals and objectives, renew their dedications, and restructure their process of accomplishing their goals. A charismatic leader has supernatural powers over his or her subordinates. According to Conger and Kanungo, a charismatic leader is a leader who has extraordinary and profound impacts on his or her subordinates due to his or her personal abilities. The subordinate staff of a charismatic leader has loyalty and trust towards the values, visions, and characters of the leader. Charismatic leaders make use of their powers rather than positional powers to encourage subordinates to achieve the organization’s goals and objectives. According to contemporary leadership theories, current leaders should ensure the dynamic relationship between them and their collaborators for leading both parties to extreme levels of moral growth and development and motivation hence evoking â€Å"true† change in an organization.

Sunday, October 27, 2019

Information communication technology

Information communication technology Resistance is Useless Introduction: Todays world or society is changing very fast with the help of ICT (Information Communication Technology). Everyday new technologies were developed to simplify the every days work, but there is a resistance to accept those new technologies among people. This is because of many people doesnt like the CHANGE because they dont like being changed. When change comes it brings resistance and fear to cope up with that or lose something valuable. Even many people could not understand how to use those new technologies or equipments. Many People have natural tendency to stuck with the way of work with whom they used to ,They often change and have faltering to change the way of work or equipments, Some people could not afford to adopt new technology or there is no support to demonstrate the way of   using new technology. In medical field every day new technique or method or equipments were introduced but many physician, nurses and medical personal   does not adopt these new technologies ins tead they continue working in there conventional way. New technologies are invented to reduce the work load as well as significantly improve the patient safety, patient satisfaction in the heath care system and also improve the hospital efficiency. As a example most of the hospital introduce the information database system where the hospital store all the information about the patients medical records, doctors information and all the staffs information about their education, salary, training etc. In medical field or can say in eHealth the amount of resistance for the new technologies or equipments are much larger than other fields. In eHealth new technologies or methods are for better health care and lowered the healthcare costs, but physician, nurses and medical personals are hesitated to adopt these at first time because they came from different background. Even sometime the researchers or developers in medical technologies run out of budget or get budget to go or pass the research stage because of medical personal are unresponsive to those technologies or equipments. Objectives What are the factors while designing a system? How a new system or technology will evaluate? What are the ways to convince the people or the organization staffs who will to use this system or technology? How would an organization introduce the new system or technology and prepare their employees to get the most of the system? What are the reasons behind these resistances to new technology and methods in health care? Discussions: Lecture 4 (slide 46,48) advantages disadvantages + Slide 32-37 (for evaluation) Slide 8 focusing on benefits Slide 24 slide 30 Old people are pessimistic of new technology for usability inconvenience Conclusion: It can be said that resistance is useless. Resistance is the biggest obstacle in developing new technology.   Not only resistance always create problem there are lots of other factor involving to create problem to develop new technology both in medical sector as well as in other sectors. Most of the people have natural tendency to create resistance to the new things because they have fear to change the way of doings jobs. In other since resistance is useful to some extent it helps the developer to develop the new technology in more efficient and user friendly way, So that the end user can get the most of the system. It is more important to have in mind while developing new technology for whom they are developing, in which situation and context the user will use this tools, As well as which task it will solve otherwise resistance will always come to adopt the new technology. Reference: Improve ICT systems in healthcaImprove by Dr. Isabella Scandurra [Ph.D] http://www.icup.org.uk/reports%5CICUP763.pdf http://www.bridges-to-technology.com/page26.html http://www.biomedcentral.com/1472-6947/6/1 http://www.deloitte.com/view/en_US/us/press/Press-Releases/press-release/8696c52c23d85210VgnVCM100000ba42f00aRCRD.htm http://www.1000ventures.com/business_guide/crosscuttings/change_resistance.html http://www.schulersolutions.com/resistance_to_change.html

Friday, October 25, 2019

Essay --

A to Z Index | FAQs | About BLS | Contact Us Submit U.S. Bureau of Labor Statistics Follow Us Follow BLS on Twitter | What's New | Release Calendar | Site Map Search Home Subjects Data Tools Publications Economic Releases Students Beta OOH HOME | OCCUPATION FINDER | OOH FAQ | OOH GLOSSARY | A-Z INDEX | OOH SITE MAP | EN ESPAÑOL Occupational Outlook Handbook Healthcare > Athletic Trainers and Exercise Physiologists PRINTER-FRIENDLY Print EN ESPAÑOL Summary What They Do Work Environment How to Become One Pay Job Outlook Similar Occupations More Info Summary athletic trainers image Both athletic trainers and exercise physiologists can use various forms of physical activity to help patients overcome injuries or chronic health conditions. Quick Facts: Athletic Trainers and Exercise Physiologists 2012 Median Pay $42,690 per year $20.52 per hour Entry-Level Education Bachelor’s degree Work Experience in a Related Occupation None On-the-job Training None Number of Jobs, 2012 28,900 Job Outlook, 2012-22 19% (Faster than average) Employment Change, 2012-22 5,400...

Thursday, October 24, 2019

Symbolism in Guy de Maupassant’s “The Necklace”

Hayley Hughes Professor Fowler English 1102 9 February 2013 Short Story Essay Guy de Maupassant’s short story â€Å"The Necklace† uses a diamond necklace to symbolize two different things. The first thing the necklace represents is that deceiving others will lead to one’s downfall. The necklace also symbolizes how the effects of greed can change a person. In the story, the reader sees the main character’s personal growth from beginning to end due to losing a diamond necklace.Mathilde Loisel’s life is turned upside down because she was materialistic, but by the end of the story Mathilde is wiser and more admirable. Mathilde changed in ways that could not have been possible had she not lost the necklace. The story opens with the beautiful Mathilde Loisel fantasizing about luxuries she and her husband cannot afford. When her husband comes home with an invitation to an exclusive party, she is upset because she does not have anything fancy to wear. Even after her husband gives her some money for a dress, she then complains about not having jewelry.Since she does not own any expensive jewlery, Mathilde goes to her friend Madame Forestier and borrows a diamond necklace. She absolutely loves the necklace and when she and her husband attend the party, everyone notices her and the necklace. After they return from the party, Mathilde is sees she has lost the necklace. However, instead of telling Madame Forestier that the necklace had been lost, Mathilde buys a replacement necklace worth 40,000 francs and gives that to her friend hoping she would not see the difference.She and her husband then spend the next ten years working to pay for the cost of the necklace only to find out that the original necklace had been a fake. Even though her hardship could have been avoided completely, Mathilde became a better person from of losing the necklace. The necklace is the main symbol in â€Å"The Necklace. † What is a symbol? According to Lite rature: An Introduction to Reading and Writing, â€Å"a symbol is a substitute for the elements being signified,† (Roberts and Zweig, 382). The necklace could be considered a cultural symbol.A cultural symbol is universally recognized (Roberts and Zweig, 383). Out of all the jewelry Mathilde could have chosen, she chose the diamond necklace. Maupassant most likely chose a diamond necklace because people would recognize the gravity of the situation in the story; most people could understand the value of a diamond necklace as opposed to some of the other jewelry mentioned in the story, which makes the diamond necklace a cultural symbol. The necklace could also be considered a contextual symbol.Unlike a cultural symbol, a contextual symbol gets its meaning from the story (Roberts and Zweig, 383-384). In this story, the necklace represents the fact that appearances are not always what they seem and that the bitter truth of reality can lead to one’s downfall. Mathilde wants to wear a diamond necklace in order for people to think she is wealthier than she is. When she borrows it from Madame Forestier, who is wealthier than Mathilde, she has no reason to believe that the necklace is a fake.Because Mathilde thinks the diamonds as being real, she thinks that others will believe she is wealthy too. In deceiving others of her wealth, she essentially deceives herself. For example, when it is time for them to leave the party her husband gives her the shawl she brought; she does not want anyone to see her wearing the shawl because it reminded her that she was not wealthy and she did not want anyone to find out. She wants to live out this fantasy as long as she possibly can and runs outside with the shawl hoping no one will notice.When she loses the necklace, she is brought back to reality and must deal with the consequences. Instead of accepting her reality that she was not wealthy and being greedy, she set herself up for disaster. The necklace symbolizes gree d and how it can affect a person. In the beginning of the story, Mathilde is greedy. She pities herself for not being born into a wealthy family, claiming it was an â€Å"error of destiny,† (Maupassant, 200). She and her husband are most likely middle-class, but she is still unhappy with their financial status. Her husband, Mr. Loisel, is the exact opposite.He takes pleasure in the little things, even praising his wife’s beef stew while she daydreamed about the finest cuisines (Maupassant, 200). All he wants to do is please his wife, but Mathilde is never satisfied. It is because of her greed that she ends up borrowing the necklace in the first place. After losing the necklace and giving the replacement to her friend, not only had the Loisels’ lifestyle changed, but Mathilde also started to change. She had to do cleaning jobs to earn money, dressed in cheap clothes, and argued with food vendors about the price of their goods in order to save every penny.After th e ten years of hard labor, the story describes Mathilde as â€Å"the strong, hard, and rude woman of poor households,† (Maupassant, 204). Even though she still reminisced about the party, unlike before where she pitied herself for not being wealthy, now she contemplates what her life would be like had she not been so greedy in borrowing the necklace. She questions how something as small as a necklace could have such a big impact on her life saying â€Å"How little a thing it takes to destroy you or to save you,† (Maupassant, 204).The necklace both destroyed her and saved her. Even though she had to deal with ten long years of working to pay back the money, losing the necklace symbolizes Mathilde losing her greediness and gaining the knowledge that money does not lead to happiness. Works Cited Page De Maupassant, Guy. â€Å"The Necklace. † Literature: An Introduction to Reading and Writing. Roberts, Edgar V. , and Robert Zweig. 10th ed. Illinois: Pearson, 2012. 2 00-205. Print. Roberts, Edgar V. , and Robert Zweig. Literature: An Introduction to Reading and Writing. 10th ed. Illinois: Pearson, 2012. Print.

Wednesday, October 23, 2019

Juveniles rights to a jury Essay

There are very few states in the United States that extend the right to a jury of their peers for juveniles. Why shouldn’t juveniles be able to stand a trial with a jury of their peers? By law, minors are incapable of representing themselves or making decisions that are based on the current law presiding for the circumstances. Which basically means that juveniles are only children, children that don’t really know what responsibility or breaking the law is yet. Plus a juvenile’s record is private so if they stood in front of a jury then it wouldn’t be so private now would it? Also, juveniles aren’t convicted for the offenses they engage in, they are convicted for the delinquent actions as a minor. The two exceptions, that I myself have found, are either if the crime is serious enough to try the juvenile as an adult or, as said earlier, the state allows juveniles a trial in which a jury is present. I chose this reason because many people do not understand that juveniles are children, not adults. These days parents treat their children as adults so the children commit crimes as if they were an adult. That being said, people need to realize that juveniles are exactly that. Although they have been taught things about the community, the world, laws, right/wrong, and so forth, they haven’t actually lived to understand all these things so why should they be tried by a jury of peers that don’t understand that fact? This brings me to the next question, why do I believe there are differences in the adult and juvenile justice system and why do I believe so? The answer is basically what I’ve just stated in this whole discussion. Juveniles are children, children who hasn’t actually lived enough in this world to â€Å"know†. Adults â€Å"know better†. So does it make any sense to try people in the court of law whom don’t know any better the s ame as a person who does know?

Tuesday, October 22, 2019

Free Essays on Judicial Fairness

There are many aspects of the law that attempt to make a sure a jury or a judge is fair in handling legal matters. The Fifth and Fourteenth amendments provide that no person shall be deprived of â€Å"life, liberty, or property, without due process of law.† The procedural due process aspect of this amendment requires that government decisions to deprive a person of life, liberty or property must be done fairly. The procedural due process law gives an accused person the chance to object to his accusation before a fair and neutral decision-making body. The Sixth amendment also guarantees rights for the Muslim defendants to a jury trial and to a public trial. Through our legal history, we have created legal methods and traditions to apply these freedoms in a court of law. In our legal system, the two main sources of neutral decision makers are juries and judges. The law has a way of ensuring that these bodies are neutral and unbiased in their decision-making. While it will be impossible to gain complete neutrality, the law provides mechanisms within which fairness can be maximized. The process of voir dire attempts to minimize the bias a jury can have. Voir dire is the process of jury selection, which takes place before a trial can begin. In this process the attorneys for the defendant and plaintiff ask a group of potential jurors questions to determine whether that jury member has any bias towards his or her client. In the context of Muslim and Arab-Americans, the attorney for the defendant can probe the prospective jurors on his or her sentiments towards Muslims and determine whether his or her feeling would bring a bias into her decision making process. If the attorney for a Muslim or Arab-American defendant instinctively feels that a juror is biased, the attorney is afforded by the legal system the peremptorily challenge. With a peremptorily challenge, an attorney can ask that a potential juror not be sworn in without pr... Free Essays on Judicial Fairness Free Essays on Judicial Fairness There are many aspects of the law that attempt to make a sure a jury or a judge is fair in handling legal matters. The Fifth and Fourteenth amendments provide that no person shall be deprived of â€Å"life, liberty, or property, without due process of law.† The procedural due process aspect of this amendment requires that government decisions to deprive a person of life, liberty or property must be done fairly. The procedural due process law gives an accused person the chance to object to his accusation before a fair and neutral decision-making body. The Sixth amendment also guarantees rights for the Muslim defendants to a jury trial and to a public trial. Through our legal history, we have created legal methods and traditions to apply these freedoms in a court of law. In our legal system, the two main sources of neutral decision makers are juries and judges. The law has a way of ensuring that these bodies are neutral and unbiased in their decision-making. While it will be impossible to gain complete neutrality, the law provides mechanisms within which fairness can be maximized. The process of voir dire attempts to minimize the bias a jury can have. Voir dire is the process of jury selection, which takes place before a trial can begin. In this process the attorneys for the defendant and plaintiff ask a group of potential jurors questions to determine whether that jury member has any bias towards his or her client. In the context of Muslim and Arab-Americans, the attorney for the defendant can probe the prospective jurors on his or her sentiments towards Muslims and determine whether his or her feeling would bring a bias into her decision making process. If the attorney for a Muslim or Arab-American defendant instinctively feels that a juror is biased, the attorney is afforded by the legal system the peremptorily challenge. With a peremptorily challenge, an attorney can ask that a potential juror not be sworn in without pr...

Monday, October 21, 2019

Botany of desire essays

Botany of desire essays In the Botany of Desire by Michael Pollan chapter one The Apple and chapter four The potato emphasizes on how humans have taken stand in trying to control nature by the use of technology such as genetic engineering. The dream of controlling the seed of plants such as apples and potato's to satisfy the human desire for perfection. A process that goes farther back then genetic engineering, it goes back to farmers and simply planting a seed. The way Johnny Appleseed planted apples in the new world and the Europeans introduced the potato to the Irish. America's desire for sweet, beautiful apples and for long french fries is leading us towards an agricultural disaster in the future. As ambitious scientist strive to convince the world that altering foods by using technology such as genetic engineering will benefit human kind, public opinion or environmentalists such as Pollan argue that they pose a threat to human kind and the planet. Human have tried to alter their environment ever since the beginning of time to make their lives easier by growing their own food. A world were technology is the answer to almost everything and humans have committed to rely on science to solve the problems that science itself has caused. For instance foods like the New leaf potato, created by Monsanto, that have natural insecticide built into their genes to protect themselves from insects and disease without the help of pesticides. The New Leaf potato has Bt to create a toxin that kills the Colorado potato beetle. What will happen when these beetles develop a resistant to this insecticide? It will become useless, and scientist will have to fix that problem by developing a stron ger insecticide that could cause dangers to human health.Organic growers use this because its natural, but after insects grow resistant to it , they will know longer be able to protect there crops. One could suggest to go completely organic. It could be done ...

Sunday, October 20, 2019

How to use GoToWebinar - Emphasis

How to use GoToWebinar How to use GoToWebinar On Wednesday 23 November, Emphasis CEO Rob Ashton will be holding an online seminar: How to supercharge any sentence in 60 seconds. Here is some information for participants. When you join the session, you will see a control panel on the right side of your screen that looks something like this: To watch and hear the presentation, you shouldnt need to do anything just listen through your headset and watch the screen. If you have any questions, you can raise your hand to ask a question by pressing the raise hand button: When Rob is ready to take your question, he will un-mute your microphone. You can also ask a question by typing it into the box, as shown below: We look forward to seeing you there. If you missed the session but would like to watch a recording of it, you can do so here.

Saturday, October 19, 2019

Consumer Behaviour in South Korea Essay Example | Topics and Well Written Essays - 1250 words

Consumer Behaviour in South Korea - Essay Example Even world-class businesses have failed to understand South Korean consumer behavior, but their culture has a big influence upon it. Introduction: The Importance of Consumer Behavior Research Understanding consumer behavior is a very important ability for marketers to have. This knowledge helps them plan marketing strategies that are effective for their target audience thereby increasing their ability to produce sufficient profits. Products have to be produced and presented in a manner that is appealing to potential buyers. In order to understand what the definition of appealing is to various consumers studies have to be undertaken that will reveal this information. Consumer behavior can vary greatly based on a wide variety of factors. Failure to understand consumer behavior has lead to the failure of many businesses and resulted in high amounts of monetary loss. To avoid the negative consequences of such ignorance, many companies perform market research before, during, and after the implementation of their plans. South Korea: Consumer Behavior and Culture One of the areas that have presented problems for companies seeking to expand their territories is the South Korean market. This is because consumer behavior is very different than that of those in other developed countries. South Korea has a culture all its own and it has effected consumer tastes. Companies who wish do business in this country and move hastily may find that they experience disastrous results. In order to properly and effectively enter into the South Korean market, companies should make sure that they perform thorough research. Even business giant Wal-Mart that has succeeded in establishing stores in many countries had to close and sell the stores that they opened in South Korea (Gandolfi & Strach 2009). The problem was that Wal-Mart had relied on the formula that had brought them so much success in other markets and failed to tailor their business to better suit the consumers in South Korea. The company, not accustomed to failure, had tried to save their sinking stores only to finally resign. While it is odd to think that a world-class company like Wal-Mart would lapse so greatly on a basic consideration like generation a proper understanding of the consumer behavior of the country in which they seek to practice business, that is exactly what happened. As Yakup (2011) reported, â€Å"International marketers believe that consumers would increasingly resemble each other and that they will eat the same food, wear same clothes, and watch the same television programs to an increasing proportion. But the reality is very different†. Somehow Wal-Mart assumed that they could peddle their culture in the South Korean market and be assimilated into it. However, South Korea consumers are not at all interested in adapting to a new culture in their own country. They, while being innovative consumers of products that fit in with their culture, have very traditional tastes. More specifically, the consumer behavior in South Korea reflects a preference to keep in line with what is culturally familiar. And, while it is true that many cultures can be divided into various sub-cultures that can be targeted and that people are subject to their own personal styles and tasted, the culture of South Korea is not individualistic. Rather, people there more or less follow the crowd. South Koreans carry more of a group identity, making it harder to introduce things of

Friday, October 18, 2019

Introduction to Philosophy Essay Example | Topics and Well Written Essays - 2250 words

Introduction to Philosophy - Essay Example The next part in Plato’s model is ‘belief’. At that part, reality or ‘truth’ is made based on one’s superstition, views of reality, and actual objects. Belief is an emotional state that becomes a part of an individual because of the powerful influences of culture, religion, or any widely believed aspect of the period. Beliefs that are based on religion are impossible to challenge because knowledge is strongly tied by the influences of religion. A person’s belief in heaven and hell and the presence of saints are some examples of knowledge at this part. The third stage is ‘scientific knowledge’. This stage is shown by mathematical formula, research, and empirical data. Some examples are medicine, law of inertia, gravity, and so on. The top part of knowledge is ‘reasoning’, defined as the rational combination of all forms of knowledge. The vertical line from the lowest stage to the highest one shows that there is a certain extent of knowledge gain at every stage, but as the line moves from the bottom kinds of truth to the top, there is a related movement from the lowest level of reality to the highest. The line is broken up into two very different parts. The higher and bigger part is a symbol for the intelligible area and the lower, smaller part is a symbol for the visible part. This unbalanced separation represents the lower level of truth as located in the visible part in comparison to the higher reality in the intelligible domain. As shown in the earlier diagram, the lowest kind of knowledge is ‘eikasia’ (imagination). Imagination is the shallowest kind of brain work where the mind deals with impression or the least level of truth. Obviously, imagining may refer to the act outside plain appearances of objects to their inner truth. However, Plato defines imagining as the senses view of appearances i n which such appearances are understood as the truth. On the other hand,

Growing up Hidden and made-up story about best friend who is gay Essay

Growing up Hidden and made-up story about best friend who is gay - Essay Example The paper tells that Linnea Due’s essay titled â€Å"Growing Up Hidden† is an indication of she struggled with being gay. According to the opinion of many, being gay is a phase that society intends one to outgrow but as Due insists she did not have to conform to the ideas of society. On the other hand, Miguel’s life is one that was different from that of Due as Miguel comes from Argentina where being gay is acceptable. In essence, the aspect of being gay in America becomes a challenge for those in America as the antagonists seem to have their ideas peeled. According to Due, she spent most of her life living a lie by attempting to develop an attraction for the male gender as a way of entertaining the existing norms in the American society. She found herself in heterosexual relationships that were not working since she was living a lie. However, Miguel’s gay aspect makes him coexist peacefully with those in his society as Argentine’s are not judgmenta l regarding one's sexual preference. On the contrary, defies the idea of one needs to conform to societal beliefs and attributes as a way of influencing society into accepting him. Moreover, the family experiences between Miguel and Due are quite different as Due experienced minimal love and acceptance from her family because of her being gay. Essentially, the essay presents the fact that she only was part of the family when she pretended to be heterosexual and when she finally revealed her sexual orientation, Due’s family sidelined her.... In essence, hers was a double life that led her to struggle for a substantive portion of her life as she had to keep her act in check. On the other hand, the essay on Miguel has a difference in experience as there is no one time in Miguel’s life that he had to pretend as his parents were proud of him irrespective of him being gay. They accredited his performance in school as they saw him as a child like all the other within their family and received equal treatment as his siblings. Due’s essay portrays, her quest to be a normal child despite her being gay to which her parents denied her constantly. In fact, Due’s parents ought to have shown unconditional support for their daughter as opening up to society forms the trickiest aspect of revealing one’s gay nature to society. This becomes harsh for gay individuals as they aren’t accepted both at home and in their common surrounding. Nevertheless, Due’s friends are as judgmental as a closed minde d society would be in that they are not supportive of her gay attribute. Instead, they alienate her for having stopped to live a life that is not the lie that they had all believed. In contrast, Miguel has a supportive friend as the hard times that he has had in his life he could share and receive encouragement to move forward. In essence, the American culture defies the acceptance of a gay individual in society, and it becomes emotional especially when one is not an American native. Subsequently, Miguel struggled to live his life as he had accustomed himself to because he found himself faced with the possibility of toning down his gay appearances. However, Miguel experienced few problems with acquiring friendship

Thursday, October 17, 2019

Mabeche Company Term Paper Example | Topics and Well Written Essays - 1250 words

Mabeche Company - Term Paper Example Although with the tricky operating surroundings, particularly throughout the summer of the year 2013 and rising competition in the segment, the Mabeche Group was competent to attain remarkable financial outcomes that reflect positively on the company’s on-going revolution schemes and strong routine from our entire auxiliary in the region. The revolution plan initiated by the director’s board in the financial year is yielding incredibly fine results for the company’s dealings and transactions. The chief focal point of the plan is to amplify business yield, improve innovational activities, improve quality of clients’ service and raise the company’s market shareholding. The good results were anchored on multiplied market share, robust performance from all regional businesses and therefore the reduction in the company’s cost to the financial gain magnitude and attributable to improved efficiencies in our operations.The accountant and the bookkeep ers normally set up the annual and monthly financial reports and statements for distribution to the manager in charge of operations. The reports and statements include: income statement, balance sheet, and expenses budgeted report for every program in the company’s dealings, accounts receivable register, accounts owed register, cash flow projection, and other requested and related reports (Greuning, 2006). Periodic and annual financial reports will be delivered to the Committee of Finance and of Directors Board for review and endorsement.

Resonsibilities imposed on contractors by Regulation 2 of the Case Study

Resonsibilities imposed on contractors by Regulation 2 of the Construction Sites (Safety) Regulations - Case Study Example This research aims to evaluate and present the responsibilities imposed on contractors by Regulation 2 of the Construction Sites (Safety) Regulations. Construction is considered amongst one of the most dangerous land based activities in the working sector of Japan. Although the working population in the construction sector is only about 10%, it still accounts for 30% of the work casualties and 40% of the fatalities in Japan. Hong Kong has the highest construction hazard rates. Falls from height, crashes, excavation accidents, being hit by an object etc are common construction hazards. Even after the rate dropped from 350 per 1000 workers in mid 1980 to 60 per 1000 workers in 2007, it still accounted for nearly 20% of all the industrial accidents in Hong Kong. To attain a level of zero fatalities while on construction sites, has been set as a political goal by the government of Japan. Hong Kong has had a very poor safety record. The lack of awareness/low level of education of the cons truction workers, multi level subcontracting, high mobility of workforce etc can be considered prime reasons for theses construction hazards amongst others. Even though Hong Kong has passed its own laws and ordinances to help decrease the number of fatal accidents in the construction working sector, it will only have an impact depending on how it is enforced. Mr John Wu, an architect, signed a contract with Hung Ki Dvelopment company to design and develop a 50 storey building. Mr Wu then assigned Lap Ming Ltd to be the contractor for the builder work, which will take up to 85% of the total contract sum for the formation of the building. Since the scenario doesn't specify, we will make the assumption that the architect John Wu entered a contract with Sunny Construction Ltd, specialist contractors for the building services works. Building services engineers are responsible for the design, installation, operation and monitoring of the mechanical, electrical and public health systems re quired for the safe, comfortable and environmentally friendly operation of modern buildings2. Lap Ming Ltd then signed a subcontract with Star Decorator Ltd, also specialist contractors, to complete the internal decorations. The construction work began on 2.10.03 after the application was approved by the building authorities, submitted by Lap Ming. On 1.8.05, the operations of the building works and the internal decorations were in full swing when the foolish behavior of Chan Sam, led to a fatal accident of a casual worker. Chan Sam, a direct employees of the fire services subcontractor, used an excavator to move some iron piping to a workplace near the pump house on ground floor level. He was being accompanied by a female worker, and in order to entertain her, he drove the excavator in a zigzag manner. Suddenly the iron bars swung out, and fell near a moving lorry, being driven by Mak Sam, who was lowering the tiles needed for the internal decorations. The sudden loud noise sent Ma k Sam into a shock, causing him to lose his balance and accidently push the wrong control lever, which resulted in the crane to move in some other direction and hit the head of a casual worker, Li Yick, who was pronounced dead upon his arrival to the hospital. Both the workers from the builder services (Cham Sam) and the internal decorators (Mak Sam) are directly involved in this accident. According to our assumption, Sunny builder services were hired by the architect John Wu, upon clients request, and the internal decorators Star Ltd entered into a subcontract with Lap Ming Ltd, making both John Wu and Lap Ming to be indirectly involved with the accident. Since Hung Ki was assigned to overlook the construction of the building, he is also indirectly involved. Mr John Wu is just an architect by profession, his job is to design the

Wednesday, October 16, 2019

How newspapers will use social media and internet to expand readership Term Paper - 1

How newspapers will use social media and internet to expand readership in the future - Term Paper Example avvy world thus, the social media is strong enough to take over the traditional forms of transmission of news like newspapers, radio, television etc due to faster and better communication among people, rapidity of spread of news, an increase in readership, as well as a growing need to adapt and become environment friendly. Newspapers and radio channels are far behind than television today in terms of the spread of news for the sole reason that with the click of a channel or press of a button one can both see or hear the news on the go, as and when it takes place. Newspapers, even though they provide the audience with a chance to spend time reading and enhancing their knowledge, arrive a day later, by which time the person may already be well versed with the news. Newspapers however have a tangible form that many people are attached to and not willing to give up. Yet, it must be understood that newspapers can make use of the social media in order to expand their readership in the future as more and more people are logged onto the internet these days. Students, workers as well as professionals and home makers – almost everyone and anyone have an account on a social networking website. Thus in order to tap the potential, newspapers can exploit these platforms and display their news banner there, a ttracting readers onto their websites and thus help them in enriching themselves by displaying their news. (Rani Malla) Today, a number of newspapers have online editions, like Wall Street Journal and New York Times to name a few; these newspapers put up everything and more on their online versions, where people may subscribe and get hourly updates on the world’s events. Newspapers can also take over social networking websites to attract more readers by creating their pages and groups and involving forums for communication over the news among various people. Moreover, blogs and online journals are encouraged by newspaper reporters and writers in order to increase

Resonsibilities imposed on contractors by Regulation 2 of the Case Study

Resonsibilities imposed on contractors by Regulation 2 of the Construction Sites (Safety) Regulations - Case Study Example This research aims to evaluate and present the responsibilities imposed on contractors by Regulation 2 of the Construction Sites (Safety) Regulations. Construction is considered amongst one of the most dangerous land based activities in the working sector of Japan. Although the working population in the construction sector is only about 10%, it still accounts for 30% of the work casualties and 40% of the fatalities in Japan. Hong Kong has the highest construction hazard rates. Falls from height, crashes, excavation accidents, being hit by an object etc are common construction hazards. Even after the rate dropped from 350 per 1000 workers in mid 1980 to 60 per 1000 workers in 2007, it still accounted for nearly 20% of all the industrial accidents in Hong Kong. To attain a level of zero fatalities while on construction sites, has been set as a political goal by the government of Japan. Hong Kong has had a very poor safety record. The lack of awareness/low level of education of the cons truction workers, multi level subcontracting, high mobility of workforce etc can be considered prime reasons for theses construction hazards amongst others. Even though Hong Kong has passed its own laws and ordinances to help decrease the number of fatal accidents in the construction working sector, it will only have an impact depending on how it is enforced. Mr John Wu, an architect, signed a contract with Hung Ki Dvelopment company to design and develop a 50 storey building. Mr Wu then assigned Lap Ming Ltd to be the contractor for the builder work, which will take up to 85% of the total contract sum for the formation of the building. Since the scenario doesn't specify, we will make the assumption that the architect John Wu entered a contract with Sunny Construction Ltd, specialist contractors for the building services works. Building services engineers are responsible for the design, installation, operation and monitoring of the mechanical, electrical and public health systems re quired for the safe, comfortable and environmentally friendly operation of modern buildings2. Lap Ming Ltd then signed a subcontract with Star Decorator Ltd, also specialist contractors, to complete the internal decorations. The construction work began on 2.10.03 after the application was approved by the building authorities, submitted by Lap Ming. On 1.8.05, the operations of the building works and the internal decorations were in full swing when the foolish behavior of Chan Sam, led to a fatal accident of a casual worker. Chan Sam, a direct employees of the fire services subcontractor, used an excavator to move some iron piping to a workplace near the pump house on ground floor level. He was being accompanied by a female worker, and in order to entertain her, he drove the excavator in a zigzag manner. Suddenly the iron bars swung out, and fell near a moving lorry, being driven by Mak Sam, who was lowering the tiles needed for the internal decorations. The sudden loud noise sent Ma k Sam into a shock, causing him to lose his balance and accidently push the wrong control lever, which resulted in the crane to move in some other direction and hit the head of a casual worker, Li Yick, who was pronounced dead upon his arrival to the hospital. Both the workers from the builder services (Cham Sam) and the internal decorators (Mak Sam) are directly involved in this accident. According to our assumption, Sunny builder services were hired by the architect John Wu, upon clients request, and the internal decorators Star Ltd entered into a subcontract with Lap Ming Ltd, making both John Wu and Lap Ming to be indirectly involved with the accident. Since Hung Ki was assigned to overlook the construction of the building, he is also indirectly involved. Mr John Wu is just an architect by profession, his job is to design the

Tuesday, October 15, 2019

A ball is dropped from affects the re-bounce of it Essay Example for Free

A ball is dropped from affects the re-bounce of it Essay Analysis:As the results and the graph attached overleaf shows, the line of best fit indicates that my prediction was correct, although due to experimental error it is not exact. However, as the end column displaying the percentage loses shows, although the percentage losses vary they are all around the same point. I think air resistance did have an affect and slow the ball down, this meant it was unable to pick up a lot of speed, meaning it didnt have much kinetic energy and what it did have was lost when it was still for a split second as it squashed; released more energy in the form of heat. Therefore the percentage loss increases near the end as the drop height increases. I think that my prediction about the percentage loss was right because the end column shows no big anomalies, which means that the ball was constantly losing the same amount of energy wherever I drop the ball. This indicates that the air resistance did not have as bid affect as I thought. Towards the end of my experiment, the graph shows a clear place where a factor influenced my results. The last three points are some what away form the trend of the rest; this could be because I had reached a point where terminal velocity concluded. I think this because they are significantly lower than the rest of the points. This leads me to believe that air resistance had an affect of the bounce height due to terminal velocity no longer being in control. These last results are anomalies as they do not follow the trend of the rest, and are notably away from the line of best fit. I would expect to get a result of approximately 22 when dropping from one metre; however I actually got about 21. 5. consequently, I believe Moreover, I expected that if I dropped it from 100cm it would be double that of the bounce from 50cm. This was incorrect, as 12. 3 x 2 does not equal 20. 407. I believe this was because in this case air resistance did have an affect, or the heat I expected to transfer from my hand did not, maybe due to it me doing the experiment in the middle of winter. On the other hand, in my prediction I stated that the bounce height would increase as the drop height increases, and the straight line defiantly shows this. In my opinion, at the end of the graph, the gradient increases causing a steeper end to the graph. This is probably because I did these heights at the end of the experiment, therefore the ball will have had time to warm up, causing the molecules inside to move around and make the outer edge of the ball harder, meaning it bounces higher. I believe that my graph does not have a very steep gradient due to that when I drop the ball higher; the friction against the air coincidently increased. I decided to draw my graph from the origin point, as that is the only point of the graph that is free of experimental error, as you cant drop a ball from nothing and expect it to bounce, as it has no GPE. Evaluation: Overall, I do not think this experiment was very reliable, as there were so many factors that were out of my control to manage. These were such things as the air temperature, the air resistance, heat, and the pressure inside the ball. The air temperature could have affected the activity of the molecules inside the ball, and brought into action the Kinetic theory. The kinetic theory is that of the molecules gaining more energy and exerting it on moving around, consequently colliding with each other and making the ball harder due to the increase in the pressure. This may have made the ball bounce harder as it got hotter through the experiment. Although I said pressure would be one of my controls, I did not take into account the pressure building up due to the heat transferred. Moreover, I could not control the air resistance, although this should have stayed constant, I cant be sure. If the air temperature increased through the experiment, maybe because of the body heat given off, it would mean that the air resistance increased. This is because the heat gives the molecules energy, so the ball would have to use more energy to push past them. This energy is then lost, and means that the ball does not have as much energy as it would if it were cooler. Furthermore, I think because we used our eyesight to determine the height of the re-bounce, this made our results even more unreliable. Yet, on-the-other-hand, I also think my results were as reliable as could I could get them. This is due to the limited time and equipment. For instance, because we used a clamp and stand to hold up the ruler, it made the results trustworthier than someone holding it up. Also, the only thing we varied was the height we dropped the ball, everything else was kept exactly the same, for example, the ball we used, and the surface we worked on. Whats more, I followed the procedure correctly and missed nothing out. I measured the height of the re-bounce from the bottom of the ball instead of the top, as when we dropped it the bottom was inline with the top of the ruler. Moreover, because I got an average, it reduced the affect of anomalous results, which meant my result are unlikely to be flawed due to me as the dropper. I do not think the way I measured the height was very accurate, as it depends on individual eyesight, and everyones level of eyesight is different. Although, they way I dropped the ball, and how we went about trying to record the closest measurement was accurate. This is because I used only my finger and thumb to hold the ball, this was to pass as little heat over as possible, and stop dropping the ball with an added force. I believe this worked, as on my graph there are no obvious anomalies, the line is not straight, but that is due to only a small bit of experimental error. If I repeated the experiment there would be lots of things that I would do differently. I would conduct the experiment on the floor instead of on the bench, as maybe the increase G. P. E on the bench influenced my results. Also, I would find some way of controlling the air temperature, and the air resistance, although this would have to be done outside of the lab. I think that the temperature and the air resistance did have an effect on my results as the percentage of energy lost increased as I dropped the ball from higher positions. Moreover, I would find a way to measure the level of the re-bounce that would be more dependable than using my own eyesight. This is because, as I have said, eyesight is not consistent as things such as the light intensity, which may affect the recording of the results, can influence it. Furthermore, I would increase my drop heights to 200cm, as I think if I carried on longer, my graph would show a definite point where terminal velocity came into action, and also that that graph would perhaps increase its gradient as the ball got hotter through the experiment. This would be useful as it would mean my results could be analysed further and draw a conclusion more valid. Although, if I did do the investigation again, I would keep the squash ball in my experiments. I believe it gave reliable results subject to the terms and conditions that applied freely. Also, I would use the same unit of measurements, as they showed the results clearly and were more appropriate than other methods. I could repeat the experiment under converse conditions by for instance changing the surface, or the air temperature. I could also vary the ball I used, as this would allow me to compare different bounce heights from the same drop height. This would mean I could calculate the efficiency of the balls I used. Whats more I could change how I measure the height it bounces back, or actually what I measure. I could measure the efficiency of the ball, and how the height I drop it from affects the amount of energy is lost.

Monday, October 14, 2019

Operation Buckshot Yankee

Operation Buckshot Yankee Operation Buckshot Yankee: The Primary Point of Weakness By Jeffrey Higa Abstract Operation Buckshot Yankee is a catastrophic event that was a turning point in cyber security for the U.S. government. This incident established the current dominating war fighting domain known as cyberspace and established the need for increased cyber security. I would like to highlight the event known as Operation Buckshot Yankee, how and why it happened, a possible solution that could have prevented this, and similar events synonymous to this situation. I would like to highlight the main point of weakness from my perspective on the situation and propose how this weakness can be strengthened with proper people management and training. I will provide explanations and examples to provide a clear view on how this situation could have possibly be prevented, and statistical data to back up my findings as well as a personal example of a real situation recently occurring in my career. By being able to estimate the possible costs of damages in both monetary and reputational damage caused in these situations, these numbers can prove how valuable data can be and what the costs of a simple mistake such as using a mysterious flash drive can cause. In conclusion, I would like to mention a possible solution to the problem and my personal view on the situation and how it applies to us not only in this event, but also has an impact on our everyday lives in the field of IT and IT security. Essay Operation Buckshot Yankee is based on a cyber security incident which took place in the Middle East in 2008. This cyber attack event was a turning point in the history of U.S. cyber defense, and caused drastic losses of data from secret government databases. Operation Buckshot Yankee was the name of the operation to stop a malicious code that was contained on a flash drive an American soldier found in the Middle East. This flash drive was then inserted by a government employee to a laptop connected to Central Command networks and caused the code to spread throughout classified and unclassified military networks allowing the enemy to steal valuable information on these systems. According to an article by Lynn (2010), U.S. government systems are constantly probed and scanned by adversaries millions of times daily, but this attack was an example of a successful cyber attack. The military lost thousands of data files including weapon and operational plans as well as surveillance data stored on classifieds U.S. networks. Having this incident happen, the government has realized the need for increased cyber security and work to create a secure international network. In response to this attack, the government declared cyberspace as an official war fighting domain, and initiated plans to regulate cyberspace crimes and safety. Up to this attack in 2008, Operation Buckshot Yankee is said to have been the most significant breach of U.S. military computers to date according to an article by Nakashima (2010). According to Lynn (2010) this type of attack is the introduction of a new type of war fighting that opens up the new domain known as cyberspace where traditional war laws do not apply. Cyberspace has now become the primary point of attack, as these types of attacks are relatively inexpensive as they only required trained individuals and computers, rather than large expensive equipment such as tanks and jets. According to another article by Nakashima, the NSA was alerted by a signal in the U.S. system trying to send messages back to the code creator. The NA then found a program that infected their classified network and was sending data out. They sourced the code to the aforementioned thumb drive and found that the code would look for important documents and spread itself to other thumb drives connected to the network. The malicious program was called Agent.btz and infected the host computer and spread over the network to other computers. Any other flash drives connected to already infected computers were then also infected and caused further spread throughout the network. The article also mentions that the code had already been out for months prior to the attack, and was floating around the internet but did not have access to government systems due to them being isolated from the public networks. Due to the government not being able to scan public networks thoroughly, the code was bypass ed until the incident. This situation highlights the danger of insider threats, whether intentional or accidental. In the case of Buckshot Yankee, the carelessness of an individual was the cause of the insider threat which compromised an otherwise secure system isolated from outsider threats. Operation Buckshot Yankee is the planned government operation of shutting down Agent.btz and putting a stop to the stealing of government data. The government analyzed the code and saw that it was looking instructions on what actions to take. The NSA Tailored Access Operations team created a plan to force the code to deactivate itself by sending their instructions for it to shut down. The operation was a success and the instructions were sent out across the network once testing as done, and the malicious code was shut down. Though this code was put to a stop, many important government documents had already been stolen, but the incident was put to a halt. This incident led to the banning of thumb drives on Department of Defense systems as a security measure from preventing a similar incident from happening again. The flash drive was sourced in the Middle East and according to an article by Goodin (2010) the source code was said to have been from Russia but there is no solid evidence directly proving this. The article by Goodin also describes that Government systems are constantly under the threat of cyber attack, and that a dozen computer hackers could drastically cripple U.S. government networks if a network vulnerability is found. This is a perfect example of how drastically times have changed, and that cyberspace is the new arena to commence attacks. According to the article as an example, a dozen people at computers could possibly bring a country down in an extremely cost and labor efficient manner. Losses of life would be minimal for adversaries compared to a kinetic attack, and damages caused could be in the form of disruption o f services or staling of valuable data as described in Buckshot Yankee. A great example of disruption of services would be the event in Estonia as described by Richards (2009). A Distributed Denial of Service attack was launched against Estonia in protest of moving a politically valued statue. These attacks lasted three weeks and were strategically launched targeting banks and other essential services to cripple the technological systems of Estonia. Having essential services shut down can cause chaos and leave a country vulnerable to attacks if an adversary were to take advantage of the situation. Taking that into account, resulting damages of cyber warfare and cyber attacks could essentially have worse effects than kinetic war or possibly result in additional kinetic war. Operation Buckshot Yankee is a perfect example of how battles will most likely be fought in this current era and going into the future. Cyber attacks are en extremely inexpensive and efficient method of causing a significant amount of damage with minimal effort. Due to the nature of cyberspace, attacks are also very difficult to pinpoint and regulate. Traditional laws do not apply here as there are no clear boundaries in the world of cyberspace. As described in an article by Mjr. Gen. Charles J. Dunlap USAF (2009), the definition of cyberspace itself is yet very unclear and undefined. Without proper definition, it is difficult to make accurate laws to apply to this new war fighting domain. The only real protection as mentioned in this article is for nations to take responsibility for their own actions and their citizens. In the case of Operation Buckshot Yankee, this was the unintentional irresponsibility of a U.S. citizen. Due to difficulty in specifically sourcing threats and the l imitless boundaries of cyberspace, it is almost impossible to place blame on a certain country or individual, especially if they are located in another country. As in the case of Buckshot Yankee, though the incident was caused in the Middle East, the code is theoretically sourced from Russia, but there is no way to truly prove it. This brings me to the point that the primary point of any cyber security system is human error. I believe that people cause the most problems in any technology environment regardless of the situation. Computers are controlled by people that cause the problems. Another great and synonymous example is the recent event of credit card information being stolen from Target. An article by Riley, Elgin and Matlack (2014) malware had been installed on Target’s computer system to steal credit card information as it was swiped. Target had installed a detection system by FireEye to detect malware prior to the event happening, but the system was ignored even when alerts were given to the companies’ IT and management. According to the article, about 40 million credit card numbers and 70 million other pieces of information were stolen before the situation was acted upon. This is another prime example of a system working properly but being held back by people. Had this situation been a cted upon as soon as the alert was announced, many peoples’ valuable information would have been saved, and the company would have saved possibly avoidable expenses. As described in a book by Harris,S., Kumar,P.V. (2013), the most important part of cyber security is people. Operation Buckshot Yankee is a perfect example of how human error can cause catastrophic damage. Whether it be due to improper training or carelessness, this event started with the actions of a single person and turned into a widespread situation with catastrophic damages. If proper training was initiated and due diligence was practiced, this situation could have been avoided. Most would consider a random flash drive found in an adversary country to be suspicious and would not try to plug it into any computer, let alone a secure government system, but user errors such as this are the primary cause of incidents regarding technology. Wilshusen (2013) shows statistics from government agencies explaining that 20% of cyber incidents are due to improper usage; only secondary to incidents still unexplained or under investigation. This statistical data is a definite indicator that people are the primary cause for problems in even federal government agencies. By having solid statistics based on real reports from 2012, it is irrefutable evidence that people are the primary cause of concern and outlines the need for continuous training and testing of knowledge. By keeping people properly trained and reducing the number of unknowing individuals having access to network resources above their knowledge these numbers could possibly be greatly reduced. A great personal example is at my place of employment. I work for a government sponsored healthcare company which handles patient data on a daily basis that is regulated by HIPAA. There are a few employees who are older aged (50-60) and are relatively unfamiliar with computers regardless of training given. A prime example is one employee in particular who is in upper management. I cannot think of a more perfect example of a prime target for any type of cyber attack, from social engineering to spam emails, she has fallen victim to them all and constantly does to this day. Upon sitting at her computer, all her usernames and passwords can be found on sticky notes on her desk or under her keyboard. She also opens every email and attachment regardless of what it says or who it is from. We recently had a couple simultaneous incidents happen with her in the past few weeks. The first sign was her email account being locked by our service provider. We called and they said her email was being used to send thousands of spam emails while logged in from China. Upon fixing this and changing her passwords etc., we scanned her computer only to find more than 17,000 malware installed on her computer. We constantly inform her about how to properly inspect email and about not giving out personal information or opening every attachment. Even with antispam programs on our server, some emails will always slip through, and she will always open them. I find this to be a prime example of human error and carelessness to perfectly describe how an incident such as Buckshot Yankee can occur. The statistical cost provided in an article by Ponemon Institute (2012) has shown in a survey that the average cost to a company of a successful cyber attack is about $214,000. This shows that the damages can be significant, and that data is extremely valuable. In the case of buckshot Yankee, the data which was stolen containing weapon plans, and confidential operations and surveillance data is of significant value and could result in catastrophic damages to the U.S. in both costs and possibly loss of life. If this data is placed in the wrong hands it could be used maliciously and the damage could be limitless. In the situation of my workplace, losing patient data could also be a significant loss, leading to possible lawsuits and compromising of patients’ personal information. In the case of target, had the situation been handled properly and the security system been utilized, it could have prevented the significant leaking of data. In a journal by Espenchied (2012) of Microso ft, Operation Buckshot Yankee took almost 14 months to clean up from Department of Defense and Pentagon networks. In all of these situations damages would not only cause significant monetary damage, but also damage the reputation of the data holder. For companies like Target, fixing the damages caused has resulted in an estimated $61 million in expenses and 9 lawsuits according to Riley, Elgin, and Matlack (2014). Had they acted quickly, these damages as well as damage to their reputation could have been minimized. Conclusion In conclusion to these findings, I would like to stress the importance of proper continued training of employees in any type of computer related job, as proper use of computer systems is the best method of preventing such events from occurring. Though proper training can be expensive, it can end up saving more money as well as reputation of the company as exampled given in each situation mentioned. Though the U.S. government has a highly sophisticated and expensive cyber security system, it was compromised by a simple mistake. The importance of due diligence and due care is extremely relevant to Operation Buckshot Yankee, as had the zero source individual been informed, they would have considered the mysterious flash drive a threat, and would not have compromised the system by carelessly using it. Because of how difficult it is to find and hold any party responsible in the domain of cyberspace, the best preventative measure is to make sure that your systems are not exposed to internal threats. Most threats from outside can be filtered with hardware and software, but inside threats are the largest problem. As described by Wilshusen (2013), user error is the leading known cause of cyber incidents in federal agencies at 20%, followed by malicious code at 18% also due to user carelessness; with direct threats such as unauthorized access and probing last at 17% and 7% respectively. The personal example I had given in my place of employment is another example of an insider threat compromising the network due to user misuse and carelessness. The only solution to keeping U.S. cyberspace safe is by ensuring that all hardware and software systems are up to date with current threats, and properly maintained in addition to informed system users. By regulating who has access to data resources, and making sure they are trained to the necessary level of knowledge, we can prevent these future mistakes from happening, and minimize possible damages due to data loss. These concepts apply not only in a government setting, but apply to use at work and even on our personal computers at home. Keeping cyberspace safe is the responsibility of all computer users, and is of utmost importance in this era where we are so dependent on computers. References Beidleman, Lt. Cl. Scott W. DEFINING AND DETERRING CYBER WAR†, (2009): 1-40 Espenchied,J.A. (2012). A Discussion of Threat Behavior: Attackers Patterns. Goodin, D. (2010, August 25). Pentagon confirms attack breached classified network †¢ The Register. Retrieved from http://www.theregister.co.uk/2010/08/25/military_networks_breached/ Harris,S., Kumar,P.V. (2013). CISSP all-in-one exam guide, sixth edition.  New York: McGraw-Hill. Lynn, W. J. (2010, October). Defending a New Domain | Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new- domain Nakashima, E. (2011, December 8). Cyber-intruder sparks response, debate The Washington Post. Retrieved from http://www.washingtonpost.com/national/national- security/cyber-intruder-sparks-response-debate/2011/12/06/gIQAxLuFgO_story.html Nakashima, E. (2010, August 24). Defense official discloses cyberattack. Retrieved from http://www.washingtonpost.com/wp- dyn/content/article/2010/08/24/AR2010082406495.html Ponemon Institute (2012, May 24). Infosecurity Cybercrime costs companies an average of $214,000 per attack. Retrieved from http://www.infosecurity- magazine.com/view/25966/cybercrime-costs-companies-an-average-of-214000-per- attack/ Richards, J. (2009). Denial-of-Service: The Estonian Cyberwar and Its Implications for U.S. National Security. Retrieved from http://www.iar-gwu.org/node/65 Riley,M., Elgin,B., Matlack,C. (2014, March 13). Target Missed Warnings in Epic Hack of Credit Card Data Businessweek. Retrieved from http://www.businessweek.com/articles/2014-03- 13/target-missed-alarms-in-epic-hack-of-credit-card-data Wilshusen, G. C. (2013). CYBERSECURITY. A Better Defined and Implemented National Strategy Is Needed to Address Persistent Challenges, 36. Wilson, G. C. (2013). CYBERSECURITY. A Better Defined and Implemented National Strategy Is Needed to Address Persistent Challenges, 36

Sunday, October 13, 2019

Analysis of Peter Brimelows Thank You for Smoking? Essay example -- S

Analysis of Peter Brimelow's Thank You for Smoking Growing up with a best friend who has been smoking since middle school, I have seen many of the negative effects it has on a person. Football was a passion and way of life for Andy; however, smoking caused him to struggle with breathing while running up and down the field. He would cut down on his daily amount of cigarettes before and during the season, but cutting down was little help for him. Not only was his breathing affected by smoking, but he also had yellow teeth, smoker’s cough, and would get â€Å"the shakes† when in need of a smoke. The essay â€Å"Thank You for Smoking,† written by Peter Brimelow, is far from an influential essay on why people should smoke. Through this essay, he gives many examples as to why â€Å"smoking might be, in some small ways, good for you† (Brimelow 141). A lower risk of developing Alzheimer’s, Parkinson’s disease, osteoarthritis, and different types of cancer are examples of benefits of smoking given by Brimelow (Brimelow 142). Brimelow compares smoking to driving cars because driving also has risks and can be a cause of death. Would you consider that a wise comparison? If he were going to compare smoking to driving, he would be better off comparing it to something along the same lines such as drinking and chewing tobacco. At least these are also optional habits like smoking, where people chose to do it. Very little, if any, good can come from these, whereas driving is a common action in which accidents can happen. Health Issues: Brimelow states in his article â€Å"Smoking seems also to offer subtler health rewards to balance against its undisputed risks† (Brimelow 142). A few of these include a reduced risk of diseases such as Par... .... This is why we have freedom, and everyone has the right to decide for themselves. Works Cited: Action on Smoking and Health. 4 Oct. 2003 http://www.ash.org.uk/html/factsheets/html/fact02.html American Lung Association. â€Å"Smoking and Pregnancy.† June 2003. 5 Oct. 2003. http://www.lungusa.org/tobacco/pregnancy_factsheet99.html Clark, I. L. (1998). â€Å"Thank You for Smoking†¦?† The genre of argument. Boston:Thompson/Heinle. P. 141-143 Kovac, Rachel. "Study Shows Ignorance of Smoking Hazards." Knoxville News-Sentinel (2003) : Lexus-Nexus. 1 July 2003. McFadden, J. Introduction to Toulmin. Lecture. (Sept. 12 & 14). Buena Vista University. Storm Lake, IA. "Pregnancy and Childbirth," Microsoft Encarta Online Encyclopedia 2003 http://encarta.msn.com/encnet/refpages/RefArticle.aspx?refid=761557963&pn=1 ¶=3#p3 1997-2003.

Saturday, October 12, 2019

This Way To The Gas versus On My First Son Essay -- Tadeusz Borowski B

The short story, â€Å"This Way To The Gas, Ladies And Gentlemen† by Tadeusz Borowski and the poem â€Å"On My First Son† by Ben Johnson, both deal with death. They are very different types of death and are told in different ways but through some similar approaches, a similar feeling is portrayed to the reader of each. One of the first similarities of the two is that they are both told in the first person as well as being personal accounts. Ben speaks, as himself, about the death of his son and Borowski tells of events at a death camp that he was in during WWII. They both tell their stories through their own voices which adds a lot to the experience of reading. It allows the reader to except just how real the story is. Once the reader accepts that, then the reader is able to more fully understand and relate to the feelings of the authors especially because of how reality based they are. For example, in â€Å"On My First Son†, when Johnson says â€Å"Oh, could I lose all father now!†(Johnson, ln.5), the reader is able to feel the deep sorrow in that line. That is because it is told to the reader by Ben Johnson, the father of a dead son. When the story is made that personal, it is impossible to not share the passionate feelings that are expressed. Borowski causes this type of reaction i n the reader as well but in a more indirect way. He does through his personal descriptions rather than personal expressions of feelings. One example is when he describes the dead babies in the box cars and explain...

Friday, October 11, 2019

A Day in the Life of a Teacher Essay

I hear the sound of my alarm clock at 6:30am. Time to get up! I wish it was Saturday, no school! No, I’m not a child, nor a student, but a teacher! You don’t think we enjoy everyday at work, do you? No. That’s rubbish. Let me continue with my story of a day in the life of a teacher.  As I force myself out of bed, a chilling thought comes over me. It’s Wednesday. This means I still have three whole days to get through until the weekend. Better get a move on if I want to make it on time. First, I take a shower. I do this every morning to liven myself up and to prepare for the day ahead of me. Today first up we have a whole school assembly. That’s one reason why I don’t like Wednesdays. The other few reasons I particularly don’t like the day Wednesday is that I have recess yard duty and in the afternoon is the paper parade. I step out of the shower, thinking such thoughts of what has been happening in the last few days and what I have to do today. I get dressed and go out to have breakfast. Mmm, I like breakfast, my last chance in the morning to relax and not think about work, but it eventually creeps into my head anyway. Once I am finished I remember and organize, well I try to remember and organize everything that I will need. Which is a lot. When I arrive at school, about 10 to 8 I park, load up my stuff and walk to the front office. In the staff room I have a social chat to the other teachers, we talk about assembly, make our coffee or tea and get ready to leave. With a mug in one hand, handbag and everything else in the other, we back onto the staff door and out the front office. You can always tell a new teacher, they haven’t got the art of getting out the staff door in the morning perfected yet. I make my way to class avoiding the students and setup and wait in the class until the bell goes at half past 8. Outside the kids are eagerly waiting to be let inside, like a pack of puppies waiting for you to open the door just so they can jump all over you with their muddy paws. What do they eat, must be something like froot-loops. Which would explain not just the sugar rush but a for a few others something else too. As soon as we are all in class, which doesn’t take long, I give announcements and ask the class to take their chairs to assembly. When we arrive I round up my class, and once everyone is seated its time to go home. I wish! Though it is about 20minutes later. At the beginning of every assembly we stand and sing the national anthem. Which doesn’t sound like an anthem at all. Instead of sounding like we are proud and free, it’s sung in a droning tone. When we sit down I shush all the chatters and the assembly begins. As a teacher it’s our duty to listen to what is happening around the school while also keeping a small eye, quite like a hawks, on the class. We all usually sit back, act interested and see all the small things that go on. Like the two kids who like each other keep pretending to ‘look around the room’ but are really trying to catch a smile. Then there are the bad kids, who are trying to make peashooters and all the usual blabbermouths who can’t even wait until recess to talk. Since this assembly is so boring and I am bored I will go over, grab the troublemakers and sit them next to me. The rest of assembly goes on like this and is pretty much a huge waste of time and effort. At the end we ask our class to move off. We head off and back to class, when we are all finally in class I give out a quick spelling test. It’s really a time waster and a fill in until recess. When the bell goes I think of how nice it will be to relax in the staff room. Then a student comes up and mentions something about handing a form in today, Wednesday. It hits me then that I have to do.. yard duty. Out I go, trying to avoid the smaller kids who seem to want to follow me around, some even cling my leg . At the end of recess I have a 5minute break in the staff room. Some break! I quickly get a drink and then hear the bell, time to go to class. Back in class its maths time. Everyone lines up, and then I tell him or her to go inside. I ask my class to sit on the mat after about 10minutes and 2 disagreements everyone is seated. I have release time so I wait for the principal to come, because he is taking over my class. Release time, although it is called ‘release’ is a time where we just do things that aren’t done yet. Like marking work, writing a program, or putting together all the things we need to. I have reports to write, since it is the end of the term. There are a few simple things to do when writing reports to make the process as simple, easy and stress free as possible. First sort out the kids. There’s the good, the bad and the in between. The in between are really good kids, which you personally don’t like and torture for the fun of it. Then write a set paragraph for each of the groups, with 3-5 different wordings, which really mean the same thing. Once children are categorized the fun begins. Comment after comment is inserted into the report, but when I feel that a student stands out, I add my own personal touch. Two words -Be creative. After report writing I have to mark work, this is a very slow and boring process. After a few minutes a fellow teacher of mine comes into the computer room to tell me that the Principal has left for a meeting and I will have to go back and take my class, even though there is only 10minutes until the lunch bell rings.

Thursday, October 10, 2019

Constitutions and by Laws of Ssg

Northside High School Science Club Constitution and By-Laws Article I: Purpose of the Northside High School Science Club The primary purpose of the NHS Science Club is to encourage scholastic effort, foster scientific literacy and interest in science. Article II: Membership Membership in the NHS Science Club is open to students presently enrolled in a science course or were enrolled in a science course the previous semester, has/had an average of 80 and has shown interest in science. Once a student becomes a member, he/she must participate as an active member of the club.Failure to maintain at least an average of 80 each nine weeks will result in probation during which time the student cannot participate in club activities. If the student fails to improve the science course grade to an 80 average for the second consecutive grading period, the student will be dropped from the club membership roll. Activities in which the student must participate may include club meetings, Science Olym piad, Envirothon, other science competitions, and special projects. Article III: Dues Each member must pay a $20. 0 membership fee for dues by the first meeting of the school year. Article IV: Attendance Club members must report to club meetings on the designated days and must remain during the entire time period of the meeting. If a member is not eligible to attend or desires not to attend a meeting, he/she must attend the regular scheduled class for that period when held during the regular school day. A majority of the meetings will be held during nonschool hours for guest speakers, practice for competitions and/or special projects.Failure of a club member to attend club meetings and participate in special projects may result in a student being ineligible for future club membership. Article V: Advisors The Science Club advisor(s) must be a science teacher. He/she must attend scheduled club meetings. The advisor(s) must show an interest for the betterment of the club. The advisors( s) must approve the agenda for each meeting. Article VI: Projects All club projects must be approved and voted on by a two-thirds majority vote.The club will choose whether or not to have a fund-raising project. Article VII: Officers Section 1. Officers will be elected by secret ballot. Nominations will be made at the first meeting of the school year. The advisor(s) will tally the votes and announce the winning officers. Section 2. President The president of the club will be a junior or senior. He/she will preside over all meetings using order to conduct all procedures. It is the president’s responsibility to plan social activities for the club meetings. Section 3.Vice President The vice president’s job will be to assist the president as needed, to help maintain order, and to preside over meetings in the president’s absence. Section 4. Secretary The secretary will be responsible for all club correspondences, keep accurate records of meetings and an accurate roll of members. Section 5. Treasurer The treasurer is to keep accurate records of money collected and spent. All money is to be turned into the advisor(s) so that it can be deposited into the club account. Section 6. The Executive CommitteeThe executive committee will be made up of the four officers listed above and the advisor(s). The committee will plan projects and activities for the club. Article VIII: Goal It is the goal of the Science Club to strive to promote excellence in scholastic achievement in the science courses offered at Northside High School. As well, the club members will strive to provide opportunities for students to further their interest in all fields of science and to educate the student body of Northside High School and the community about the preservation of the environment and its natural resources.

Wednesday, October 9, 2019

Speech to the Young, Speech to the Progress-Toward

Bryce Donahue Professor Harsh English 102 16 March 2013 Speech to the Young. Speech to the Progress-Toward The poem â€Å"Speech to the Young, Speech to the Progress- Toward† by Gwendolyn Brooks is about keeping your head up and living each day to the fullest. The poem, given the time period, is most likely aimed towards African American people, but can now be related to anyone who may be having a rough day.Gwendolyn starts off the poem with four specific epithets. Gwendolyn states, â€Å"Say to the down-keepers, the sun-slappers, the self-soilers, the harmony-hushers† (398)†¦ All of these epithets are used to describe negative people or someone who will try and get you down. She is trying to say don’t listen to what people say just go and live your life. Gwendolyn continues with, â€Å"’Even if you are not ready for day it cannot always be night† (398). Related article: Having Children While YoungShe tries to use night as a symbol of unhappiness and says if you are not ready to get over what has happened or whatever is making you feel down, you will have to at some point because the day, or happiness, will have to come at some point. Gwendolyn writes, â€Å"You will be right. For that is the hard home-run† (398). Gwendolyn uses a home-run to describe something that is hard to obtain, meaning that it will not always be easy to be happy, but you have to fight for it.Gwendolyn ends her poem with, â€Å"Live not for battles won. Live not for the-end-of-the-song. Live in the along† (398). In these final three lines Gwendolyn tries to tell people not to be stuck in the past, but do not try to rush through life, instead live in the moment and enjoy life and all the great things life has to offer. Work Cited Pearson. Backpack Literature: An Introduction to Fiction, Poetry, Drama, and Writing. Fourth ed. New Jersey: Kennedy Gio ia, 2010. Print.

Tuesday, October 8, 2019

3000 words essay Example | Topics and Well Written Essays - 3000 words - 1

3000 words - Essay Example Experiences of stress may change the way a person thinks about everything, they way they behave and their pattern of physiological activities. The changes under certain circumstances can lead to the increase of risks associated with psychological, social and physical ill-health and at times behaviours that are inappropriate (Houdmont and Leka, 2010, p37). Stress can be defined as the non-specific response by the body as a result of any demand made on it. Demand in this case is defined as a stressor which may arise from a stimulus or an event. Stressors come in many different ways and they range from time pressure, extreme pressure, and extreme temperature to physical assault. When an individual is exposed to such a stressor, a physiological stress response occurs. The response can be measured through observation by different measures such as dilated pupils, increased heart rate and increased blood pressure according to Hosek, Kavanagh and Miller (2006, p23). Physiological manifestations of stress are identical regardless of the type of external demand but its effect on performance varies among individuals. The effect on performance ranges from physical impairments and cognitive reactions. Stress-performance relationship models indicate quite different scenarios. There is U-shaped and negative linear stress-relationship models. In the U-shaped model, performance improves when the stimulus reaches a moderate level and decreases when the stimulus levels increase beyond the moderate levels. Although this is the case, individual differences that exist may alter the shape of the curve. According to a research done, evidence showed that an inverted-U relationship exists in the industrial sector especially on job performance. In a negative linear relationship, stress regardless of the level reduces work performance through draining the person’s energy, time and concentration.

Monday, October 7, 2019

Writing Assignmet Essay Example | Topics and Well Written Essays - 500 words - 1

Writing Assignmet - Essay Example CQR critics, like Beeson, point out that Section 15 of the US Patriot Act violates the 1st and 4th Amendments of the constitution by curbing the rights of interfering in a citizen’s personal data without his or her knowledge. The right in this provision helps the law to identify suspects and terrorists as soon a possible. It is a god idea because it helps in obviating terrorist acts and by taking preventive measures. According to the CQR, such powers encompass the civil liberties related to the infringement of political and free speech rights. The Bush and Obama administrators were criticized for abusing civil liberties in the wake of their war on terrorism. The major civil liberties purported to be abused were the liberties related to free speech. The FBI and the CIA conducted an enquiry into the civil rights. The international group has strongly criticized the interference in a person’s fundamental rights and has stated that the individual rights always take a backseat and suffer due to these actions. 7. How does the Brandon Mayfield case support or reject this claim? You will need to look up Brandon Mayfield as he is not mentioned in this chapter. I recommend that you type his name into the Google search engine. Please avoid Wikipedia throughout the course. The Brandon Mayfield case supports the claim because Brendon was arrested not after investigation, but based on the assumption that he played a fundamental role in the bombings. Brandon Mayfield case was simply linked to a bombing case without any evidence and his credibility was hampered due to the arrest. The US law did nothing to counter the harm done to Brandon’s personality. 8. Compare the case of another detainee, Mahr Arar, (mentioned in CQR but not in the chapter associated with this assignment) with that of Brandon Mayfield: How are their cases similar and how are they different? I recommend

Sunday, October 6, 2019

Comprehensive Lesson Plan & Learning Activity Compilation Research Paper

Comprehensive Lesson Plan & Learning Activity Compilation - Research Paper Example Although English Language Learners (ELLs) are limited in terms of their proficiency in English, go to school with colossal disparity in terms of their home language skills, either from full literate and oral proficiency (Wright, 2010). These students also possess exceptionally limited skill sets; hence rich English-language instruction, which offers students written and oral access to their native languages, is at its core the epitome of effective and comprehensive instruction. This lesson plan focuses intently on students from the Filipino culture who speak Tagalog. In essence, the lesson will consider fourth grade students whose native or first language is Tagalog. The proficiency of fourth grade Filipino students deters their effective access to complex English material and content, hence the need to appreciate their native language to present such material in their native language so as to assist the students grasp the content sufficiently in English. Teaching English language arts, as well as reading to ELLs entails a variety of elements such as reading, writing, research, listening and speaking and written and oral conventions. Reading essentially entails students interpreting and comprehending a wide array of informational and literary texts. Writing, on the other hand, entails students composing an array of written texts by following a concise idea, sufficient detail and coherent organization of written content. The lesson plan will also take into account the significance of research through which students are meant to become knowledgeable of effective ways of locating an array of relevant sources and appraising, amalgamating and present ing information and ideas. The lesson plan also appreciates the importance of speaking and listening in terms of teaching English language arts and reading to Filipino ELLs (Caine & Caine, 1994). Listening and speaking involve students listening and reacting to other people’s idea while

Saturday, October 5, 2019

9-3b LOGISTIC CASE STUDY Example | Topics and Well Written Essays - 750 words

9-3b LOGISTIC - Case Study Example roduction, it is on demand, 100’s of request changes for every day, low carbon foot shaped impression and waste finally it has no base request amounts (Qg.com, 2015). In a mechanical setting, it can possibly change packaging design, stock management, and has the ability to react quickly to evolving the design, brand administration, and regulatory requirements. In 2008, various business visionaries from different foundations met up with a perspective to exploring this potential. They set up Mediaware Digital LTD that gave business provision of reconfiguring their inventory network and displaying the capacity to upgrade effectiveness and responsiveness through new and dynamic creative methodologies. This model of mediaware determined the packaging as an affair, which came out to be on demand as a procedure that clients got to a virtual system for packaging via an exceptional interface (Qg.com, 2015). Digital technology has been known to eliminate the surplus stock and overruns, reduces waste, enhances budget, reduces headcount, spares space and eliminates pre-processes like plate generation. The following are improvements to the supply chain; make for ordering zero inventory levels and model, the original factors for safety, product incapability, make sales to make exact approach towards the developed products, the product mix, the programs that foster sustainability, reduction of the freight together with storage costs (Pods.com, 2015). Mediaware has collaborated with Xerox equipment manufacturing to produce Xerox Gallop digital packaging with digital packaging with customized workflows. Its framework could acknowledge orders through a scope of computerized interfaces, print in numerous dialects, rapidly switch dialects and deliver small batches with significant purchaser information. This decreases least request quantities. Using its modified work process, Mediaware integrated with supply chain to convey what was required when required, and exact amount

Friday, October 4, 2019

Discuss the history of the oil industry in the Middle East, including Essay

Discuss the history of the oil industry in the Middle East, including North Africa - Essay Example The production capacity between these two sides is looked into details to give a precise account of the history of oil production. Analysis Oil deposits were discovered in the Middle East and were collected for a variety of uses; by then there was no venture of exploitation for commercial purpose. This was the period of 18th century and the petroleum found was used as a new source of fuel. Oil exploitation for commercial purposes started officially in the 19th century. It was discovered that the Middle East had great oil reserves and, therefore, this impacted the decision of oil exploitation (Beltran, 234-239). When it was noted that Persia had oil deposits, the British business man called D’Arcy William asked the Persian government to grant him a concession to be able to explore oil in the country. They agreed at sharing the profit from the oil that would be extracted and share at a given percentage. He started officially extracting oil and making great sales within the perio d but along the way he ran bankrupt and, therefore, sorted assistance from the British government. During that period, around 1905, a British company named Burmah Oil was the only one operating in that region and was in a stable condition and able to ran the exploitation processes efficiently. Therefore the British government pressurized the company to give William the necessary assistance that he required to continue with the extraction processes so as to avoid a situation where he could have sold it another state or company. The company accepted the offer and several ventures were made to exploit the oil deposits. After 1905, several advances were conducted within the Middle East and large amounts of oil deposits were discovered. These lead to an increase in the percentage of oil production within the Middle East. Oil was further discovered in the areas of Arabia, peninsula Caspian Sea, Iraq and Kuwait. Till this period, the exploitation and extraction were only done by the compan ies and the countries only received concessions. These means that the countries were receiving so much less of the actual produce profit. The problem arose to the fact that the money received from the share profit of the oil extraction was poorly used by the corrupt members of government. The end result was that the whole nation was not benefiting from the oil extraction projects, but only the elite members of the country. These led to backward growth of the economy of the countries. Take, for example, Venezuela: it was faced by extreme corruption and overexploitation of the only resource that was supposed to support the whole country which led to the crumbling of the economy. Within the Middle East, politics started taking tall and affecting oil exploitation. Another problem arose at the start of the World War II where oil deposits were being bombed to cripple the energy sector of the army. The U.S and Europe which was producing plenty of petroleum decided to fuel its allies in the war, which created a big problem to the Middle East. The Muslims were unable to concentrate in the production of oil and the U.S found a chance to control the oil exploitation (Cook, 56-76). A report that was conducted by the team of DeGoyler reported to the state department that Saud Arabia was sitting on oil deposits worth 20 billion dollars. The real estimate of oil

Thursday, October 3, 2019

Han China and Gupta India Essay Example for Free

Han China and Gupta India Essay Han China differed from Gupta India politically, developing a strong bureaucratic system while India allowed local rulers to stay in control, but the Guptas focused more on trade and made more intellectual achievements than China, especially in mathematics. They established empires that were successful, but also distinct in their own ways. Although these two civilizations were notably different politically, economically, and intellectually, both were successful in bringing prosperity to their empires. During the Han dynasty, China successfully improved its bureaucracy, but in India local rulers maintained regional control. India’s territory never grew to be as large as China’s, so different forms of government were needed for each civilization. Han China retained the centralized government formed by the Qin, and expanded the bureaucracy. The bureaucratic system suited China, because it was able to support the civilization as it expanded into a large empire. The emperor Wu Ti created civil service examinations for his bureaucrats, which could be taken by any male. Wu Ti also urged Confucianism in order to gain support, as it urged respect for the government. On the other hand, India lacked an extensive bureaucracy, and local rulers were allowed to keep control as long as they remained loyal to Gupta authority. Because of its separated regions, it was very difficult to politically unify India. Similar to China, the Gupta rulers turned to religion to strengthen support for the government. In contrast to China, they favored Hinduism because they claimed to be appointed by Hindu gods. Additionally, Hinduism encouraged the rigid caste system. The empires were also similar because political power was given to landowners. Although the Gupta period is considered the golden age of India, providing its greatest period of political stability, it never developed the solid bureaucracy that Han China did. Although trade is vital to any civilization’s success, India emphasized trade far more than China did. China’s economy focused on extensive internal trade, while India developed more maritime trade. Trade gradually became more important during the Han dynasty, focusing on luxury items for the upper class such as silks, leather, and jewelry. Internal trade was made easier by the standardization of currency and circulation of copper coins. Han rulers expanded the empire, which allowed trade with more places. Some merchants even took profitable trips to India. Even though they were important, trade and the merchant class did not become the focal points of Chinese economy. This was due to the emphasis on Confucianism, which frowned upon a life devoted to moneymaking. On the other hand, the Guptas established a strong economy. It was partly based on technological sophistication, new inventions, and production. For example, Indian artisans were the first to manufacture cotton cloth, calico, and cashmere. In these areas, India and China were rivaling, but the India’s economy became more vigorous. Merchant activity was greater in India than in China, with merchants at a relatively high caste status. They traveled by land, and also by sea, increasing maritime trade. Han China and Gupta India’s economies can be compared as firmly agricultural, both relying on a large peasant class, organized into cooperative close-knit villages. Han rulers regulated agricultural supplies by storing extra grain and rice in good times, preventing price increases when harvests were bad. The Gupta period in India was known for its wealth, which was due to extensive trading both internally and by sea, as opposed to Han China’s economy, which relied more on technological innovations. The Hans and Guptas both made many important intellectual achievements, but there was more academic success in India, especially in mathematics. The Chinese studied astronomy, calculating the movement of planets, as well as observing sunspots. During the Han dynasty, scientists invented a seismograph to register earthquakes. In addition, they actively researched medicine, studying principles of hygiene that would support longer lives. Generally, the Chinese focused their studies on practical findings, such as discovering how things worked. They studied the mathematics of music that led to advances in acoustics. Like China, Indian scientists also progressed in astronomy and medicine. Many astronomical discoveries were made, such as the calculation of the solar year, the circumference and daily rotation of Earth, a theory of gravity, and the discovery of seven planets. In medicine, hospitals also stressed cleanliness, like China. India surpassed China in mathematical discoveries. Scholars created a numbering system and the concepts of zero and negative numbers. Mathematicians also calculated square roots and a more accurate value of pi. These advances in both civilizations were possible because of support from the government. In China, the government sponsored intellectual life, organizing research in astronomy. The Guptas had a vast university center in Nalanda featuring lecture halls, libraries, and an observatory. This supported the new discoveries that were being made. Both civilizations made important intellectual achievements that were advanced by world standards, but Gupta India especially excelled in mathematics. The Han and Gupta dynasties were both successful periods in China and India. Their success was due to different causes, because their societies were very unlike each other. China’s government centered on its strong bureaucracy developed during the Han dynasty, while India never advanced a decent bureaucratic system. Both civilizations had strong economies, but India focused more on over-sea trade than China did. Also, Gupta India made more intellectual achievements particularly in science and mathematics. The Han and Gupta periods were similar in some ways, but their civilizations showed distinct differences politically, economically, and intellectually.