Monday, September 30, 2019

Network Security Analysis Essay

This article is concerned about network security. It mentions about the present situation of network security and an analysis of the reason that lead to unsafe network environment. Then the article introduces two frequently used protocols in network security: HTTP (Hypertext Transport Protocol) and HTTPS (Hypertext Transfer Protocol over Secure Socket Layer), then compare them and give a brief conclusion. On the other side, the article introduces how firewall protects network security in hardware aspects. Keywords: Network; Security; Analysis; Countermeasures 1. Introduction As technology develops, network is getting more and more mature. It is known to all that security is the second step after that a successful network has been deployed. 1.1 Situation of Computer Network Security With the rapid development of the Internet and the widespread application, the number of computer viruses, Trojan horses is explosive growth. According to Jinshan drug gangsters â€Å"cloud security† center monitoring statistics show that in 2008, Jinshan drug gangsters were intercepted more and more new viruses, Trojans, which grew up 40% compared with 2007. The center statistics also show that 90% of the virus infected users, this attachment web pages that humans are enjoying the network information with the great wealth and convenient at the same time, also be the severe beset by problems of network information security. The lure of wealth that hackers attack is no longer a kind of personal interest, but more and more become an organized, interest driven career crime. Its main means has: online professor viruses, Trojan horses production technology and various network attack technology; Online exchange, trafficking and rental viruses, Trojan horses, zombie network; Online customized viruses, Trojan horses; Internet theft behavior (account Numbers game, bank accounts, QQ number, etc.), sell the trumpets; Internet fraud and extortion; Through the network business platform money laundering profit, etc. Attackers need technical level gradually decrease, means more flexible, joint attacks increase rapidly. Trojan viruses, Trojan virus writers, professional hack personnel, sales channels, professional players have been formed complete gray industrial chain. 1.2 Threats to Computer Network Security The threat to computer network security includes attacks by hackers and computer virus. It mostly presents in the following aspects. Firstly, send fake E-mails to users. It is a common way to cheat the account and password by posing as legitimate websites. Secondly, damage caused by viruses is also a common phenomenon. For e.g. when virus gets into computer, it will cover our hard disk with useless data. Thirdly, it’s about unauthorized accessing. This mainly refers to the normal use or oversteps their authority to use the network equipment and information resources. Fourthly, damage the integrity of the database. Fifthly, interfere with the normal running of the systems. Finally, communication lines are tapped and people are not familiar about safety of network security. The first situation doesn’t occur in common. However, awareness of maintain computer network security is really important. In the article, it mainly analyzes several common situations and introduces what the threat is and how it works. 1.3 Countermeasures of Network Security As network security has a lot of loopholes, people create a lot of methods to protect network. On the side of hardware, people begin to use firewall to protect network. On the side of software, a lot of tools and technologies have been used in this area, such as router filtering. The article introduces how firewall works and two similar protocols: HTTP and HTTPS. By comparing these two protocols, we will find the development of technology. 1.4 Importance of the Study of Network Security It’s important for securing ones computer, keeping important data and profile information protected. Careful web surfing habits may keep you from being a victim of virus attacks and malware, however this is an intensely risky activity and very often people may end up with an infected computer. Some good anti-virus programs will help to keep your computer protected and safe, but users must remember to keep this updated regularly for better protection over new viruses. 2. Related Work 2.1 Network Security Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals. Networks can be private, such as within a company, and others which might be open to public access. Network security is involved in organizations, enterprises, and other types of institutions. It does as its title explains: It secures the network, as well as protecting and over seeing operations being done. The most common and simple way of protecting a network resource is by assigning it a unique name and a corresponding password. 2.2 ISO/OSI model The International Standards Organization (ISO) Open Systems Interconnect (OSI) Reference Model defines seven layers of communications types, and the interfaces among them. (See Figure 1.) Each layer depends on the services provided by the layer below it, all the way down to the physical network hardware, such as the computer’s network interface card, and the wires that connect the cards together. People develop a lot of protocols to each layer. Such as PPTP/L2TP to linked layer, IPSEC to network layer, TLS/SSL to transfer layer. Each protocol includes security information that helps network transfer safer and safer. 2.3 IPV4 protocol The protocol contains a couple aspects which caused problems with its use. These problems do not all relate to security. They are mentioned to gain a comprehensive understanding of the internet protocol and its shortcomings. The causes of problems with the protocol are: 1. Address Space 2. Routing 3. Configuration 4. Security 5. Quality of Service The lack of embedded security within the IPv4 protocol has led to the many attacks seen today. Mechanisms to secure IPv4 do exist, but there are no requirements for their use. IPsec is a specific mechanism used to secure the protocol. IPsec secures the packet payloads by means of cryptography. IPsec provides the services of confidentiality, integrity, and authentication. This form of protection does not account for the skilled hacker who may be able to break the encryption method and obtain the key. 2.4 Types and Sources of Network Threats Denial-of-Service, unauthorized access, executing commands illicitly, confidentiality breaches and destructive behavior are common type of threats to network security. The sources of network threats include 3 aspects. Firstly, the invasion of bad information and pollution. Network is open, even borderless space information network of people in the rich cultural life, but also to the illegal dissemination of information or indecent information provided soil British Middlebury Seck Griffith University, Professor Di Mulai study found that in non-academic information on the Internet, 47% of pornography on These content without restriction for people feel free to browse, not only seriously jeopardize the health of young people, and poison the social atmosphere and hinder the building of a harmonious society in China. In addition, the network’s openness and freedom are often some criminals use, or dissemination of endangering national security, to subvert the government, disrupting social order and security of information, or information network organizing rallies and other anti-social activities. Secondly, Internet ‘hackers’ and computer crime. Hacker wanton rampage information networks, technology and the consequences of its invasion of escalating their use of technical means, or attacks on government sites or military organization’s Web site and endanger national security interests, undermine government image; or steal business, financial institutions, business information to profit illegally, endangering the economic order; or steal personal confidential information, violation of privacy or stolen cash. These acts seriously impede the normal operation of information networks. In addition to outside hackers the use of the Internet, the rampant crime and tort. The use of computer information network system to implement theft, fraud or corruption, embezzlement and other crimes than the traditional criminal methods and tools more subtle complexity, and violation of trade secrets with the network, electronic communications freedoms, civil Privacy and damage the reputation of others and other events are also frequent. Online pyramid schemes, online fraud, etc. These crimes have been on the network posed a serious threat to network security. Thirdly, the existence of their own network security vulnerabilities and risks. Freedom to share and open spirit of the Internet, but also the charm of the Internet The Internet is based on TCP / IP protocol, network devices, operating systems with networking capabilities and openness about the existence inherent vulnerability In addition, the software in the design, it is inevitable there are some defects or flaws, which has become a prime target for hackers, while software programmers deliberately left the ‘back door’ has become a major network security risks network These weaknesses of their own existence, to bring the work of anti-hacker considerable difficulty: on the one hand difficult for scientists to develop a common and effective network security for the protection of technical means on the other hand the lack of implementation of these measures sufficient to protect the social environment. 3. Methods 3.1 Analysis of Network Security System and network technology is a key technology for a wide variety of applications. Security is crucial to networks and applications. Although, network security is a critical requirement in emerging networks, there is a significant lack of security methods that can be easily implemented. There exists a â€Å"communication gap† between the developers of security technology and developers of networks. Network design is a well-developed process that is based on the Open Systems Interface (OSI) model. The OSI model has several advantages when designing networks. It offers modularity, flexibility, ease-of-use, and standardization of protocols. The protocols of different layers can be easily combined to create stacks which allow modular development. The implementation of individual layers can be changed later without making other adjustments, allowing flexibility in development. In contrast to network design, secure network design is not a well-developed process. There isn’t a methodology to manage the complexity of security requirements. Secure network design does not contain the same advantages as network design. When considering network security, it must be emphasized that the whole network is secure. Network security does not only concern the security in the computers at each end of the communication chain. When transmitting data the communication channel should not be vulnerable to attack. A possible hacker could target the communication channel, obtain the data, decrypt it and re-insert a false message. Securing the network is just as important as securing the computers and encrypting the message. When developing a secure network, the following need to be considered: 1. Access – authorized users are provided the means to communicate to and from a particular network. 2. Confidentiality – Information in the network remains private. 3. Authentication – Ensure the users of the network are who they say they are 4. Integrity – Ensure the message has not been modified in transit 5. Non-repudiation – Ensure the user does not refute that he used the network Here we mainly discuss fake websites. Fake websites means phishing. Phishing is attempting to acquire information (and sometimes, indirectly, money) such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Once a victim visits the phishing website, the deception is not over. Some phishing scams use JavaScript commands in order to alter the address bar. This is done either by placing a picture of a legitimate URL over the address bar, or by closing the original address bar and opening a new one with the legitimate URL. An attacker can even use flaws in a trusted website’s own scripts against the victim. These types of attacks (known as cross-site scripting) are particularly problematic, because they direct the user to sign in at their bank or service’s own web page, where everything from the web address to the security certificates appears correct. In reality, the link to the website is crafted to carry out the attack, making it very difficult to spot without specialist knowledge. Just such a flaw was used in 2006 against PayPal. A Universal Man-in-the-middle (MITM) Phishing Kit, discovered in 2007, provides a simple-to-use interface that allows a phisher to convincingly reproduce websites and capture log-in details entered at the fake site. To avoid anti-phishing techniques that scan websites for phishing-related text, phishers have begun to use Flash-based websites. These look much like the real website, but hide the text in a multimedia object. 3.2 Firewall’s Protection A firewall can either be software-based or hardware-based and is used to help keep a network secure. Its primary objective is to control the incoming and outgoing network traffic by analyzing the data packets and determining whether it should be allowed through or not, based on a predetermined rule set. A network’s firewall builds a brigade between an internal network that is assumed to be secure and trusted, and another network, usually an external (inter)network, such as the Internet, that is not assumed to be secure and trusted. In general, some functions that can be done by the firewall are: 1. Doing a packet filter firewall can make the decision whether to accept or reject the incoming data packets. 2. Hiding Network Address (NAT) IP addresses can be used on the internet is a public IP. So to create a client that uses private IP can be translated into public IP. These functions are performed by a firewall, known as NAT. 3. Monitoring and Logging to improve network security and logging on the terms monitoring by a firewall. 3.3 Protocols of Network Security Network security protocols are used to protect computer data and communication in transit. The primary tool used to protect information as it travels across a network is cryptography. Cryptography uses algorithms to encrypt data so that it is not readable by unauthorized users. Generally, cryptography works with a set of procedures or protocols that manage the exchange of data between devices and networks. Together, these cryptographic protocols enhance secure data transfer. Without cryptographic network security protocols, Internet functions such as e-commerce would not be possible. Secure communication is necessary because attackers try to eavesdrop on communications, modify messages in transit, and hijack exchanges between systems. Some of the tasks networks security protocols are commonly used to protect are file transfers, Web communication, and Virtual Private Networks (VPN). The most common method of transferring files is using File Transfer Protocol (FTP). A problem with FTP is that the files are sent in clear text, meaning that they are sent unencrypted and therefore able to be compromised. For example, many webmasters update their sites using FTP; an attacker using a packet sniffer and the website’s IP address can intercept all communications between the webmaster and the site’s server. Here we mainly discuss two similar protocols: HTTP and HTTPS. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. Hypertext is a multi-linear set of objects, building a network by using logical links (the so called hyperlinks) between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer hypertext. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with the SSL/TLS protocol. It provides encrypted communication to prevent eavesdropping and to securely identify the web server with which you are actually communicating. Historically, HTTPS connections were primarily used for payment transactions on the World Wide Web, e-mail and for sensitive transactions in corporate information systems. In the late 2000s and early 2010s, HTTPS began to see widespread use for protecting page authenticity on all types of websites, securing accounts and keeping user communications, identity and browsing history private.

Sunday, September 29, 2019

Ethical Issues in Human Relations counseling Essay

Ethical actions at all levels of human operations [personal or corporate] form the main basement of higher productivity and progress in the society. Kidder points out that the demand for ethical actions has intensified with time as more people become aware of their rights thereby increasing the overall pressure especially to respective authorities in demand for justice (2003, 58-60). Researchers indicate that though cases of unethical professional acts have been increasing with time, over 98%of perpetrators have full knowledge on the same ideologies and principles considerations. According to Cohen, professionals have one of the most important roles of adhering to the demands and requirements of ethics in their duties at all times (1998, 150-155). Understanding of this theory therefore forms the basis of making the correct decisions in resolving different cases and dilemmas that face them in their daily chores. Cohen explains that the theory requires the professionals to assume actions that only result to the greatest good and to the largest number of people at any instance (1998, 175-178). To add to that, it anchors the ability to effectively analyze prevailing situations and prediction of the expected consequences to infer the best decisions. To add to that, the professionals are able to compare their situations with others related cases that took place previously to make up the best decisions in their areas of work. Such comparisons act as major facets upon which the professionals base their calls for change to infer improvements in their areas of work. Taking into consideration that professionals are relied on by other junior staff and the public for guidance, it becomes possible to uphold the rights of all the respective parties without inferring any sense of sabotage. Under the modern system of globalism and fast dynamism in consumerism, the theory would bring out the need for new inclusive decision making systems that incorporates all the people at different levels for acceptance of the decisions made to enhance their further applicability. Professional ethics is a term used to denote the moral issues and obligations that arise from professional specialization and higher levels of knowledge as compared to the rest of the public and/ or the junior staff. As a result many of the scholars tend to define and specify professional ethics on the basis of what they are required to do as opposed to what the concept is really about. Firstly, they are expected to hold professional respect to their clients and their duties at all times through the principle of responsibility. This is generally emphasized because professionals are capable of exploiting their authority and status at the expense of their clients. This notion has often led to the question of the extent to which the professionals should be held accountable for their actions, a notion that has led to major quagmires in the market place. Professional ethics therefore demands operations that are based on true conscience that is not undermined by any commercial underpinning to sabotage the respect and integrity of the clients (American Psychological Association, 2001, 35-37). Kidder (2003, 78-79) explains that professional ethics demand operations within the professional guidelines, seeking the highest possible returns and advice and honesty to the clients. As indicated earlier, professionals hold the helm of national and global development in that they guide their clients on how to progress with different projects. It is therefore considered that failure to effectively give the correct guidance is a direct injustice to the client and the nation in general. To ensure that the professional ethics are adhered to by different professionals, regulatory bodies like engineering society, medical societies and auditors fraternity among others that draw codes of ethics expected for their specialists and address their clients complaints are formed. As indicated earlier, professionals are entrusted with variant responsibilities that demands them to act responsibly even without supervision. In criminal justice, judges have the moral and ethical obligation to ensure that the complainant get the necessary justice while convicted victim get a fair judgment depending with the offenses made. In such cases, the judges should understand that their judgments have further ethical implications to the whole community. To add to that, human resources managers have the ethical responsibilities of ensuring that staff and workers have the correct working environment. Besides, they also have the moral obligations of ensuring that their staff is remunerated appropriately not just as per the law demands, but on their work, motivation considerations and the overall returns of the company. In addition, accountants have the direct moral obligations to give the correct status of a company even if it is making losses as opposed to the general temptations to cover up the problems. This usually leads to to reluctance in addressing the main problem and therefore precipitates to later collapse of the company as it happened with Enron Company (Marianne, 2006, 54-59). Counselors have at times fallen into major temptations to operate against their professional ethics in the course of their duties. Most of them indicate that the main cause for their temptations has been corruption especially by the wealthy individuals who lure them to compromising their decisions (Peterson, 1992, 65-67). Being advanced in form of bribery, unprincipled counselors easily overlook different cases and aspects that could have warranted greater considerations. Besides, they may also be tempted to act less ethically when the end appears highly uncertain and perhaps threatening to them. Cases of life threats that are either directed to counselors and/ or their families may make them to withdraw from such cases or act directly different from what they are expected to. Finally, where there is no goodwill from the clients, the counselors may equally loose the drive to effectively operate ethically in dispose their duties. Though some researchers have indicated their support for to such responses, the notion is indeed very wrong in that counselors should lead in analysis of such situations under the ethical theories and take the best possible courses of actions that lead top the highest good. Presently, there are major cases and issues that face professionals in their different areas of operations that demand careful addressing for ethical progression. If I am faced with such a situation where responsibilities are not immediately clear, I would exploit the following avenues. To begin with, I would seek advice of a friend who has been in the field for a longer time than I and therefore most probably have had such cases and solved them in the past. It is clear that no man is an island and therefore, this relation would be promoted for further later consultations on similar matters. To add to that, I could also seek to get into greater and in depth analysis of the situation by evaluating similar or related cases to make the best decision that will be highly acceptable but within the ethical realms as demanded by the ethical theory. Job market has been dogged with a myriad of unethical issues especially relating to management of workers operations. Many of the ethical issues generally result as the different companies try to reduce the overall costs, evade responsibilities, or stick to different stereotypic notions in their management. Before deciding to form my own company, I was discriminated on the basis of my color immediately after finishing college where I could not secure a job as my white colleagues easily got employed. To add to that, even after getting my first job in the industry, I was soon shifted to work with workers who were far much inferior to me academically until I quit the job. In the later job, similar ethics disregard were encountered as payment was very poor and many of the workers filed their cases in courts against the company. As if that was not enough, the working conditions for the low level workers was very low and we filed more cases in court before the company was closed to upgrade its systems for better working conditions. Conclusion It is from the above consideration that this paper concludes by supporting the thesis statement that ethical actions at all levels of human operations [personal or corporate] form the main basement of higher productivity and progress in the society. Professionals and counselors should uphold the demands of the theory of ethics due to the positions they hold and their main impacts to the society. Indeed, taking ethical responsibilities at all times would stimulate similar actions at the lower levels of the society, a consideration that would reduce the shenanigans of the low ethics at all levels. However, there is need for stronger institutions that guard against exploitation of the same ethics exploitation by the professionals. Finally, it is important to establish a strong relationship between the professionals, counselors, and the public to educate the later on their rights and channels to guard their integrity and dignity. Reference list American Psychological Association (2001). Publication manual of the American Psychological Association (5th ed. ). Washington, DC: American Psychological Association. ISBN 9781557987914. Cohen, G. ed (1998). The Vituous Therapist: Ethical practice of counseling and psychotherapy. Belmont, CA: Thonpsom Wadsworth. ISBN 9780534344085. Kidder, R. (2003). How good people make tough choices: Resolving the dilemma of ethical living. New York: Harper Collins. ISBN 9780688175900 Marianne, J. (2006). The seven signs of ethical collapse: How to spot moral meltdowns in companies before it’s too late. New York: St. Martin’s Press, ISBN0312354304 Peterson, M. (1992). At personal risk: Boundary violations in professional-client relationship. New York: Norton. ISBN 9780393701388.

Saturday, September 28, 2019

Diet Program Research Paper Example | Topics and Well Written Essays - 500 words

Diet Program - Research Paper Example The body burns both fats and carbohydrates, therefore, if carbohydrates are reduced or eliminated the body will start burning fat. On this diet, the amount of food consumed is limitless. The restriction is on the type of food: no refined sugar; milk; white rice; pasta/white flour; and white potato. All the foods rich in fats are allowed to be eaten: meat; eggs; cheese/spread; red meat, fish (including shellfish); fowl; one may cook with butter; use mayo; and olive oil. This is diet of almost pure protein and fats. This diet is divided into four stages; phase one, two, there, and four. The first phase, phase one, lasts two weeks, the dieter eats only proteins and fats. three cups of loosely packed salad, or two cups of salad with two-thirds cup of certain cooked vegetables per day. For phases two, three, and four, carbohydrates, fruits, and vegetables are added gradually, and limitedly. The objective of this is more fats and protein. Dieters must keep checking their weight and decrease their carbohydrate intake if they begin to gain weight. This is a diet that also requires the dieter to take vitamins supplements (WebMD). Obviously this is not a practical diet. A diet with an intake of more protein than carbohydrates ; and is going to last a lifetime, can never be healthy. Exerciser seems to be the only good thing that this diet promotes. The diet is a life sentence; and the dieter can never touch the restricted food again; who wants to be held hostage to a diet for life? Robert H. Nickel, MD, director of the general clinical research center at the University of Colorado Health Sciences Center in Denver, tells WebMD: "Our worries over the Atkins diet go way past the question of whether it is effective for losing weight or even for keeping weight off. We worry that the diet promotes heart disease ... We have concerns over whether this is a healthy diet for preventing heart disease,

Friday, September 27, 2019

Six thousand women missing in top management job, does it matter Essay

Six thousand women missing in top management job, does it matter - Essay Example Burke and Vinnicombe (2006) contend that aging workforce and fewer new entrants has resulted in shortage of qualified leaders, forcing organizations to utilize and develop talents all of its employees. Under the circumstances they cannot afford to artificially limit the career possibilities of women. This itself implies that women are capable but are being denied the opportunities. Management diversity is defined as the proportion of women among the highest-ranking CEOs in firms and on boards of directors (Smith, Smith & Verner, 2006). Female managers are supposed to be best qualified in terms of education for top management posts and to be on the board of directors. Since experiences of women differ from that of men, a diverse board has more alternatives to choose from while taking decision. Women have a better understanding of certain segments and this could lend creativity and innovation to the work place. Women on board of directors have positive impact on firm performance which is the reason why it matters if six thousand women are missing in top management job. Even BBC who claims to be equal opportunity employers has only 10% of their senior staff as female. Despite women making advancements, the ‘glass ceiling’ effect still remains even though they have the desire to progress and posses the necessary educational qualifications (Cornelius & Skinner, 2006). Women have been found to be deficient in the management role and employers feel they should be able to make work their top priority without allowing emotions to interfere. There are other suggestions that women differ from men in their aspirations and expectations in career; they also differ in the definition of success. Some researchers observe that women change their life choices after reaching middle management level. These observations basically stem from men and employers as a means to discourage women from aspiring for the senior level management positions. The HRM

Thursday, September 26, 2019

Why Do Teachers Plan Their Lessons Why is Planning Important Coursework

Why Do Teachers Plan Their Lessons Why is Planning Important - Coursework Example For a teacher to make a good lesson plan, it is necessary that he reflect on what the need of the students in that particular lesson will be so that he can be able to accommodate them in his plan. Although educationalist regards lesson planning as very important in ensuring an effective teaching a learning process during a lesson, some theorists suggests that it is not a good idea since it creates a more fixed teacher centered lessons thus reducing the chance of the students understanding (ITTT 2011). The reasons why lesson planning is an important task can be revealed by looking at the way in which the lesson plan helps the three categories of people involved in a learning process. These three categories of people include the students, the teachers and the principals and supervisors. These three categories of people derive different benefits when a lesson plan is used during a lesson. The reasons for the importance of the lesson plan contributed by its benefits to other people rathe r than the teacher himself who is making it can be regarded as external reason while those that result from the benefits that the teacher himself would gain can be regarded as internal reasons. ... As indicated by previous researches the teachers who prepare the lesson plans always go to class with a better understanding of what they are going to teach compared to those who do not. It also indicates that the teachers who use lesson plan are able to obtain a wide range of knowledge about the subject matter in which to teach about before undertaking the lesson. This enables this kind of teachers to be able to run the teaching process effectively and thus enhancing the learning process among their students. The lesson plan also enables the lesson to run smoothly. Since in a lesson plan each activity is allocated its time a teacher can easily be able to ensure that the lesson is ran smoothly without major interruptions. Moreover, since the activities in a lesson plan are sequentially arranged a lesson plan can help a teacher to avoid running his lesson in a confused manner thus increasing the effectiveness of his teaching process. When the teaching process is run in an orderly and smooth manner, the learning process among the students is enhanced and thus resulting to a greater understanding among the students about the subject matter being taught. Another internal reason why a lesson plan is important is that it can enable a teacher to anticipate problems before they happen.If a lesson plan is well prepared, it is believed that it can enable the teacher to reflect about what problems he anticipates to encounter during a lesson. This is because it reflects on the past such lesson that the teacher held with those particular student, what was achieved in those lesson and the problems that were encountered. When the teacher is able to

Wednesday, September 25, 2019

Analyzing Black Historical Sites Essay Example | Topics and Well Written Essays - 1250 words

Analyzing Black Historical Sites - Essay Example The aftermath of the end of slavery raised the need for various reforms. Racial discriminations still went on in the US, and minor cases of slavery were still prevalent. The African American society held talks and rallies to empower each other and fight for their rights. The bay area in California was a place where radical changes within the African American society that revolutionized the fight against racism. The freeing of prisoners through the underground railroads was prevalent in the bay area. Economic development amongst the African American took root in the bay area leading to the establishment of estates by both men and women. Perhaps the most influential woman of this era was Mary Ellen Pleasant who raked a total sum of US $30,000,000 in the stock market that she used in the fight for equality. She has been christened â€Å"the mother of human and civil rights in California†. Her contribution to black history remains phenomenal as she had a massive amount of wealth t hat she did not hesitate to contribute to the struggle for equality. The Mary Ellen Pleasant Memorial at 1661 Octavia, San Francisco, California, was setup in memory of her dedication to the liberation of the black people in California. Her incessant effort to aid the African American society has ranked among the outspoken women of her era of slavery, segregation and violation of numerous civil and human rights of African Americans. Mary Ellen Pleasant Memorial Park and its Background The Mary Ellen Memorial Park is the smallest park within San Francisco preserved in honor of the abolitionist Mary Ellen Pleasant and her work in the era. The park is adorned with six gigantic eucalyptus blue gum trees that run down along Octavia Street. The six trees the only surviving ones out of the 20 that Ms. Pleasant herself had planted along the street. The City of San Francisco landmarked these trees to protect them from human interference. This street was once filled with the property of Mary Ellen Pleasant along its full length from Bush to Sutter. Her house once occupied this street, boasting 30 rooms and an entertainment avenue for several people back in the day. It was famous for cards, liquor and beautiful women. To others, this boarding house provided jobs for the African Americans. However, this house burnt down in 1925, and in its place Green Eye’s hospital built the Healing Arts Building1. A plaque adorns the front of her former 30-room home in her honor at the intersection of Bush and Octavia Streets. The disc-shaped plaque within the southwest corner of this intersection has a brief history of life and works of Mary Ellen Pleasant written on its cement structure2. The park remains a historical site for African Americans as it stands for the appreciation of the work of Mary Ellen Pleasant, whose philanthropy led to the efficacy of the black struggle in the freeing of slaves and the Civil War. Mary Ellen Pleasant was born at around 1814 as a slave in the East Coast, but she fled by boat in 1852 to San Francisco to establish herself in the bay area. She legally identified herself as white in the society to avoid being bound to slavery again and to empower herself financially. The Fugitive Slave Act would have led to her recapture in California so she developed a new identity with freedom papers, Mrs. Ellen Smith. She mixed with the top crop of the society

Tuesday, September 24, 2019

Personal Competency Assessment for Risk Management Specialist Statement

Competency Assessment for Risk Management Specialist - Personal Statement Example Production of presentations and reports that give details of research findings, explanations of risk position or changes recommended are significant areas of knowledge that improve my effectiveness and performance. Additionally, extensive knowledge of research facilitates me to conduct statistical analysis aimed at quantifying risks by use of statistical models or software. Knowledge of risk management has impacted me with skills and abilities to identify and analyze areas of potential risk to the assets, earning capacity, or success of organizations. Subsequently, the knowledge has been instrumental in developing/implementing risk assessment methodologies/models. It has facilitated me in the development of contingency plans to handle emergencies. Additionally, a wide base of knowledge has increased my efficiency in developing a scenario analysis that determines the impact on risk exposure. Moreover, I have familiarized myself with documentation and communication aspect of risk management. Through documentation, I have gained efficiency in storing an important document in an orderly and easily retrievable manner. On the other hand, proper communication skills knowledge has made me indispensable while dealing with clients. For example, I am able to interact with clients and obtain key information in regard to risks. Furthermore, I am able to communicate risks to clients through oral, reports or presentation to the client and the managers. Additionally, I have the ability to deal with client queries and solve their problems satisfactorily. Definition: Skills: Active listening  Ã¢â‚¬â€ Giving full attention to what other people are saying, taking time to understand the points being made, asking questions as appropriate, and not interrupting at inappropriate times.

Monday, September 23, 2019

Business management Essay Example | Topics and Well Written Essays - 2250 words

Business management - Essay Example Various management practices depend on the trust and empowerment that are designed to increase employee assurance to performance objectives and organizational objectives. The scenario of market place and space are rapidly changing since few years. Therefore these changing scenarios have convinced the management of company and shareholders to adopt a new archetype based on new values. For an example, in banking sector new financial products are jumping up in quick speed. These may create several problems and tough times for the management board in order to compete in this global competitive market. The organization cultures need to change according to the change of market place scenario. It involves understanding the current role, current culture. There is need for greater flexibility and speed that can be achieved through employee involvement in the management decision making. Due to high flexibility, employees get motivated to innovate without any kind of bureaucracy. Red tapes and bureaucracy generally aggravates employees and shuts them down. Employee involvement in management decision making is an old idea that has been frequently invigorated by new generation organizations across the globe. For an example, the oldest system of documented of employee participation is a particular document called â€Å"employee suggestion system† established in 1898. The return of nominal investments comes as superior level of employee motivation, productivity, creativity, and commitment that will shift the organization towards success.

Sunday, September 22, 2019

Thresher Sinking Atlantic Ocean (1963) Essay Example | Topics and Well Written Essays - 3250 words

Thresher Sinking Atlantic Ocean (1963) - Essay Example The disaster is also blamed on an electrical fault that saw vital pumps stop working. Known to be the worst submarine accident in U.S. history, engineers have learnt a lot from the event. Engineers have learnt the importance of upholding standards and procedures, testing procured materials, and prioritizing safety over other factors when it comes to designing and building products. Sinking of the Thresher in the Atlantic Ocean in 1963 Introduction Engineers are credited for designing different machines, equipment and structures that serve to overcome certain specific problems. As they undertake their works, engineers go to great depths to ensure that whatever they design work as efficiently as possible. Understanding the risks that their designs may pose to the public and infrastructure, they often do a lot of calculations and incorporate safety measures wherever they can in their designs. Furthermore, they are tasked with choosing materials that have properties that match the functi ons for which they are to be used. In as much as engineers do their best to ensure that what they design and make work without failing, this is not always the case. Sometimes, engineering systems fail leading to massive losses. One case of failure that resulted from an engineering error is the sinking of Thresher submarine in the Atlantic Ocean. ... Navy at the Portsmouth Naval Shipyard (Bentley, 1975). The submarine, which was at its time, the most advanced, was engaged in several sea trials in the Caribbean sea and the Atlantic Ocean between 1961 and 1962 only to prove its prowess as a war machine. The machine was so technologically advanced that it was rated the fastest and quietest submarine ever to be built in the world then, specifically dedicated to searching and destroying Soviet submarines (Bentley, 1975). Its sonar system had the capacity to detect ships and other submarines as far away as other submarines could not detect. Furthermore, it was installed with a highly technical weapons system which included the newest anti-submarine missile that the U.S. Navy had – the SUBROC. Apart from these amazing characteristics, the Thresher could dive far below any other machine of its ilk. Having been hit by a tug that damaged its ballast tanks while moored at Port Canaveral, Florida, it was necessary for the Thresher to undergo repairs, have its systems examined and before it could be fully certified for use during operations. After the submarine was finally certified to be operational, it was set to undergo routine tests on April, 9, 1963 (Bentley, 1975). Under the command of Lieutenant Commander John Wesley Harvey, the ship left the Portsmouth Naval Shipyard in Maine in the company of a rescue ship, Skylark, at 8 am. The rescue vessel accompanied the Thresher so that it could provide rescue services to those onboard the submarine in case of any problem. The Skylark had the capacity to provide rescue services to the submarine up to a maximum depth of about 850 feet (Bentley, 1975). The submarine

Saturday, September 21, 2019

Public Transportation Essay Example for Free

Public Transportation Essay Public Transportation there are many kinds of commuters on public transportation: there are bus commuters, train commuters, and plain commuters. The first kind of commuter are people who ride the bus. At some point in their lifetime, everyone has had to ride the bus. Children ride the bus to school on a daily basis all the way through adolescence. People who live in large cities, ride the bus just about everywhere they need to go. Local buses bring in large amounts of money for their area and can be very helpful to the people of the town. The second facet of transportation would be the train system. Among the many classifications of train systems, there are subways, trolleys, and rail ways. Subways are utilized by people who live in large areas. Trolleys are used by people who live in smaller areas, like suburbs. Rail ways, broken up in rail roads, are used all across the nation. Rail road cars, drive on train tracks, and have become so popular that collectible toys have even been made after them. Rail ways help transport many of our nations most important goods, and without them we would be facing serious problems. The third type of transportation are airplanes. Air planes are mostly used for long distance traveling. Air planes are the most expensive of the three types, but they are still used very often. The wealthy often use air planes as their main way of traveling. Air planes can be seen by some as dangerous and very risky because of their bad history in the past. Air planes are high flying machines that carry people from city to city and sometimes even across countries. Air planes are used by people in politics, the millitary, and even regular citizens. Air planes are very important to our country and help make our lives much easier. As you can see, there are many diffrent types of transportation, but they all help make our lives easier in their own special way.

Friday, September 20, 2019

Environmental Impact of Tobacco

Environmental Impact of Tobacco Price Anders Environmental Biology Tobacco use is the single largest preventable cause of death and disease in the United States. According to the 2010 U.S. Surgeon Generals report, approximately 443,000 U.S. adults die from smoking-related illnesses each year. In addition, smoking has been estimated to cost the United States $96 billion in direct medical expenses and $97 billion in lost productivity annually (Current Cigarette). These statistics are staggering yes, but beyond the mortal and economic effects of tobacco there is another overlooked downside to the continued use of cigarettes. This is the effects cigarette smoking has on the environment. In this term paper I will discuss the environmental effects of tobacco growing pesticides, tobacco and deforestation, the pollution involved with tobacco products, climate change and tobacco, and tobacco’s effect on food production. I will also discuss possible solutions to this tobacco problem. The pesticides used in the growing of tobacco have the potential to be very dangerous to our soil and wild life. Tobacco plants are delicate and susceptible to many plant diseases. Because of this, farmers who grow tobacco are required to use high levels of fertilizer, herbicide and pesticides (Healton). Among the pesticides commonly used are Imidacloprid, Dichloropropene, Aldicarb, and Methyl Bromide: Imidacloprid is extremely poisonous to fish, birds, and bees. According to the US Environmental Protection Agency, Imidacloprid could potentially contaminate the groundwater surrounding crop land where it is used (Schmitt). Dichloropropene is an extremely dangerous soil fumigant that causes breathing problems, dermal and ocular irritation as well as kidney damage. It is widely used amongst tobacco growers in the United States (Schmitt). Aldicarb is deathly poisonous. One one-thousandth of one ounce is a lethal amount for any human. Aldicarb is also toxic to fish, birds, and bees as well as earthworms. It has been detected in the groundwater of 28 states in the US. In the US it was approved for use on tobacco plants as recently as 2007 (Schmitt). Methyl Bromide is an Ozone diminishing chemical. It is frequently used to disinfect soil before planting the tobacco seeds. In 1997, over five and a half million pounds of methyl bromide was used on tobacco fields worldwide (Schmitt). The majority of tobacco is grown in underdeveloped countries. These countries lack environmental laws, and the farmers don’t have the proper equipment or training for the usage of these dangerous pesticides. Not only are these farmers at risk from contact with these pesticides, but the harmful chemicals sink into the soil, eventually finding their way in to rivers and streams polluting the drinking water and many food chains. These pesticides could also be causing the formation pesticide resistant insects likes flies and mosquitoes. This could make the controlling of diseases such as malaria practically impossible (McLaren). In most western countries there are laws to protect tobacco farmers from any contact with pesticides. Nevertheless using these pesticides still poses a threat to humans, as well as our ecosystems. The chemicals used in tobacco pesticides have also been detected in groundwater in the United States. This is believed to be the cause of many wildlife deaths (M cLaren). As you can see the negative effects of these pesticides are a huge problem for our environment and should be better controlled. While pesticides are a serious problem involved with the production of tobacco products, another major effect that tobacco manufacturing is having on our environment is deforestation. In underdeveloped countries, trees are cut down regularly to provide more space for tobacco farming, and even more trees are chopped down for use throughout the curing process. After reaping, the tobacco plants must be dried, to preserve them for storing, transportation and treating. Sun drying involves leaving the tobacco to dry naturally, but this process can take many months. Most tobacco growers flue cure their tobacco, which involves hanging the plant in specialized curing sheds where hot air removes any moister from the leaves (Healton). Flue curing takes only five to ten days and farmers usually burn wood to heat up the air. Not to mention the wood that is used to build these special sheds and make the paper for smoking tobacco products. Because of all the wood required in this process over 600 million trees are cut down for tobacco production every year. In areas where tobacco farming is common, the further loss of trees causes the land to become even more susceptible to desertification. For example in Brazil, the harmful consequences of tobacco farming are becoming visibly clear in the form of forest destruction, erosion and extremely low water levels (Assistance and Management). When tobacco farmers were confronted with diminishing sources of wood, the tobacco industry tried to address the issue by convincing the tobacco farmers to plant trees. However, the farms set up by tobacco companies in many countries contain non-native, quick growing Eucalyptus and Cypress trees that negatively affect the ecosystems and lower the water levels even more (Assistance and Management). It is clear that the deforestation involved with production of tobacco is very harmful to the environment and needs to be addressed. The next harmful effect of tobacco I wanted to address is the pollution that is involved with the manufacturing and use of tobacco products. The manufacturing of cigarettes and cigars results in large amounts of waste like tobacco slurries, solvents, oils, paper, wood, plastics, packaging materials and airborne pollution. Making cigarettes creates solid, liquid, and airborne waste. These are major causes for environmental concern, but the chemical pollution is the greatest danger to our environment. In the US it was found that the manufacturing of cigarettes produced more than 27 million kilograms of chemical waste. 2 million of which was released into our atmosphere and environment (Schmitt). Not only are the chemicals involved in the production of tobacco products polluting our environment, but cigarette and cigar smoke are also known pollutants. Tobacco smoke is categorized as a Class A carcinogen by the US Environmental Protection Agency (Schmitt). Tobacco smoke also contains tra ces of radioactive material. When a cigarette is smoked this radiation isn’t just spread into the atmosphere, but it is also leached into the soil and waterways from the butts littered by smokers. Cigarette filters are made from a certain type of plastic that takes over 10 years to break down and decompose. It is estimated that around four and a half trillion cigarette butts are littered around the world every year, and have killed millions of birds, fish and other animals (Schmitt). Cigarette butts are the most littered item in the world. According to the Ocean Conservancy 2009 Report of Ocean Debris, cigarette materials accounted for nearly 30% of the total amount of debris collected in their annual clean up. That is more than double the numbers of any other item listed in the report (McLaren). The negative effects of tobacco pollution are extremely visible in our everyday world, and should be taken care of immediately. Another issue that is a little less visible than pollution is the effect tobacco manufacturing and use has on our climate. Every stage of cigarette production and consumption advances global warming, from the growing and curing of tobacco, to the manufacturing, and lastly to the smoking and littering of the finished product, not to mention the deforestation involved. The cutting and burning of wood and other fuels during the curing process involved in the manufacturing of tobacco ads to the global warming. Also tobacco farmers regularly burn trees to clear the land. This burning releases high levels of carbon dioxide into the atmosphere. This burning also means fewer trees available to absorb the excess carbon dioxide being created in the first place. Lastly, cigarette smoke also contains carbon dioxide and methane, thus contributing even more to the greenhouse effect and global warming (Healton). Although effects of smoking on our climate are more long term, they still need to be ad dressed. The final issue I want discuss is the impact tobacco has on food production. When farmers is less developed countries grow tobacco, there is less land available for food crops. Tobacco growing is rotational with other food crops, but tobacco makes soil extremely susceptible to wind and water damage which means that soil will sometimes be incompatible for food crops (Schmitt). Not only does the soil become unfit, but tobacco plants also use way more nutrients than other crops. This causes more soil degradation. It has been estimated that 10 to 20 million people could be fed by food crops grown instead of tobacco (McLaren). Although there is not much information behind this specific issue, the potential benefits of a halt in the growing of tobacco are very evident. Will all of the negative effects smoking has on our environment it is easy to see that something must be done. The easiest way to prevent further harm from being done would be to pass a law stating that the manufacturing of tobacco products is no longer allowed due to its harmful effects on our environment, our people, and our economy. This would eventually halt the growing and curing of tobacco crops because there would be no demand. Unfortunately passing these laws is easier said than done. Policies to increase the price of cigarettes and to restrict smoking in public places are much more feasible and are effective in encouraging many to quit. This is a step in the right direction, but smokers often à ¯Ã‚ ¬Ã‚ nd it difficult to overcome their dependence without help (Department of Health). Effective treatments to promote smoking cessation are available and need to be implemented in primary care, hospitals, pharmacies and other health settings.

Thursday, September 19, 2019

Depression Essay example -- Health, Depressed Individuals

Certain practical issues need to be considered by the clinician during the assessment of MDD, (Dozois & Dobson, 2009). Depressed individuals tend to express their problems in a detailed manner when they are aware of what is expected from them during initial phase of assessment. Warning depressed clients about the possible interruptions at the initial phase along with providing them rationale helps to improve the effectiveness of the assessment (Dozois & Dobson, 2009). As depressed individuals tend to commit cognitive bias (Dozois & Beck, 2008), it is necessary to determine the actual impairment by evaluating patient’s daily routine in terms of different areas of functioning. Each diagnostic criteria needs to be addressed in number of ways (Shea, 1988). Sometimes, the patient describe their symptoms in more idiosyncratic way. So, the clinician needs to translate those concerns in to the nosological system (Dozois & Dobson, 2009). Bolland & Keller (2009) emphasize the need to assess the number of previous episodes and their duration because this information is one the predictor for risk of subsequent relapse (Solomon et al, 2000). Dozois & Dobson (2009) have reported to rely upon information related to previous episode carefully as the client may commit the reporting bias. The reporting bias can be reduced by ensuring that the patient understands the time frame to which he or she refers (Dozois & Dobson, 2009) and providing contextual cues to the patient’s memory (Shea, 1988). The information related to previous treatments, medical history, patient’s motivation for change, etc. may help in identifying resources for change (Dozois & Dobson, 2009). It is also helpful to assess client’s strengths which will help in formulating... ...owever, if Medical conditions worsens the symptoms of depression, then mood disorder is diagnosed as MDD and medical condition is listed on Axis III of the DSM-IV-TR( APA, 2000a). It is difficult to differentiate between depression and dementia (Gualtieri and Johnson, 2008), but certain differences can be noted among two (Dozois and Dobson, 2009). For example, recent memory is more effected in depression than remote memory; such symptoms are not prominent in dementia (Dozois and Dobson, 2009). Conclusion: For the accurate assessment of MDD, the clinician should not rely upon results obtained from one psychometric instrument. Rather, he or she should try to integrate information obtained from multiple sources to get the holistic picture of patient. The clinicians also needs to consider above mentioned practical issues while making assessment related to MDD.

Wednesday, September 18, 2019

Anarchy :: essays papers

Anarchy Anarchy is the theory of life and conduct under which social interactions exist without government interference or assistance. It is not chaos, nor terrorism, and has no connection to senseless violence; anarchy is simply existing without being governed. Harmony in such a society would be obtained not by submission to laws, or by obedience to any form of authority, but by freely entered agreements between individuals. The United States has strong ties to anarchy, a rather paradoxical situation. It was conceived by, and is even to this day constantly being refined by anarchists; people who maintain the view that the highest attainment of humanity is the freedom of individuals to express themselves unhindered by any form of external repression. Men such as the likes of Thomas Jefferson, one of the founding fathers, whose views can best be summarized in something he preached, "If you think people incapable of exercising their choices with wholesome discretion, the solution is not to take away their choices, but to inform their discretion." So where did the concept of anarchy come from? Could it be inherent in human nature, a hold over from adolescence perhaps? Could it be people are naturally opposed to being told what to do? Abraham Lincoln, during the famous Lincoln-Douglas debates, said something that summarizes human view towards being governed, "No man is good enough to govern another man without that other's consent." The modern concept of anarchy as being a sort of ethical civil society came during the French Revolution, around 1848. A man named Pierre Joseph Pfoudhon envisioned a society in which people's ethical nature and sense of moral responsibility would be so highly developed that government would be unnecessary to regulate and protect society, and is thus credited with fathering modern anarchy. Anarchy requires a lot of commitment on the part of the individual. How does the old saying go With freedom comes responsibility. On an individual level, no one wishes to be dominated, but at the same time the individual does not want to be infringed upon by others. A Russian-American anarchist and women's rights activist named Emma Goldman wrote, "I want full freedom and cooperation to evolve as a human being, to gain wisdom and knowledge." She does not refer to freedom of others, merely herself. Greed of freedoms is understandable because it is so hard to trust others to always do what is good. Socrates might respond, "To know the good is to do the good." Can the idea of an ethical civil society, a term coined by Adam Michnik in Anarchy :: essays papers Anarchy Anarchy is the theory of life and conduct under which social interactions exist without government interference or assistance. It is not chaos, nor terrorism, and has no connection to senseless violence; anarchy is simply existing without being governed. Harmony in such a society would be obtained not by submission to laws, or by obedience to any form of authority, but by freely entered agreements between individuals. The United States has strong ties to anarchy, a rather paradoxical situation. It was conceived by, and is even to this day constantly being refined by anarchists; people who maintain the view that the highest attainment of humanity is the freedom of individuals to express themselves unhindered by any form of external repression. Men such as the likes of Thomas Jefferson, one of the founding fathers, whose views can best be summarized in something he preached, "If you think people incapable of exercising their choices with wholesome discretion, the solution is not to take away their choices, but to inform their discretion." So where did the concept of anarchy come from? Could it be inherent in human nature, a hold over from adolescence perhaps? Could it be people are naturally opposed to being told what to do? Abraham Lincoln, during the famous Lincoln-Douglas debates, said something that summarizes human view towards being governed, "No man is good enough to govern another man without that other's consent." The modern concept of anarchy as being a sort of ethical civil society came during the French Revolution, around 1848. A man named Pierre Joseph Pfoudhon envisioned a society in which people's ethical nature and sense of moral responsibility would be so highly developed that government would be unnecessary to regulate and protect society, and is thus credited with fathering modern anarchy. Anarchy requires a lot of commitment on the part of the individual. How does the old saying go With freedom comes responsibility. On an individual level, no one wishes to be dominated, but at the same time the individual does not want to be infringed upon by others. A Russian-American anarchist and women's rights activist named Emma Goldman wrote, "I want full freedom and cooperation to evolve as a human being, to gain wisdom and knowledge." She does not refer to freedom of others, merely herself. Greed of freedoms is understandable because it is so hard to trust others to always do what is good. Socrates might respond, "To know the good is to do the good." Can the idea of an ethical civil society, a term coined by Adam Michnik in

Tuesday, September 17, 2019

stock :: essays research papers

Khaled Bitar What were the causes of the 1929 stock market crash and the 1987 stock market crash? What are the differences between the causes?   Ã‚  Ã‚  Ã‚  Ã‚  In the 1920s stock was first issued by companies. Companies issued stock after they went public in order to make money. When traders buy stock, they were buying from the company and a stake in the company. On October 24, 1929, (a.k.a. Black Thursday) the stock market fell 9% and five days later the market fell an unprecedented 17.3%. About 29 million shares of stock changed owners causing, at the time, the biggest stock market crash in the history of the United States.   Ã‚  Ã‚  Ã‚  Ã‚  In the decade before the crash, America was thriving and production was soaring. The GNP increased by 40% and average income grew 30% throughout the decade. There was an abnormally high level of investment and traders were overwhelmed with confidence.   Ã‚  Ã‚  Ã‚  Ã‚  When the stock market crashed on Black Thursday, traders were still confident because of President Hoover’s declaration that a recovery was imminent.   Ã‚  Ã‚  Ã‚  Ã‚  Despite the general optimism, the market crashed again causing the great depression. The effects were devastating. Over the next three years, the unemployment rate rose to 13.6 million people and GNP decreased 45 million dollars.   Ã‚  Ã‚  Ã‚  Ã‚  There are many causes to the 1929 stock market crash including speculation, WWI, Foreign investment, and a scandal that could have played a minor role.   Ã‚  Ã‚  Ã‚  Ã‚  The 1929 stock market was a bull market fueled by speculation. Speculation inflated stock prices beyond what they were worth because of the large amount of traders. Speculation is when traders think that a stock has much more value and potential then it really does. Traders would buy a stock that they think is thriving and when they realize that the company is losing money, they sell causing the market to decrease. (i.e. people investing in ebay and then selling after seeing ebay’s earnings.)   Ã‚  Ã‚  Ã‚  Ã‚  Many investors were not very experienced and they believed that whenever their stock went down, they felt selling was the best option which fueled the crash even further.   Ã‚  Ã‚  Ã‚  Ã‚  Because of the thriving market, many loaned money from banks and invested in the stock market. When it crashed, they could not pay back the loans and the banks lost money. The market misled the banks as they thought loaning traders money would be very lucrative. The Federal Reserve was a cause of the 1929 stock market crash because it essentially owned the government and fueled the speculation.

Monday, September 16, 2019

Child Labour Essay

INTRODUCTION GOD has given human beings the boon of wisdom and discreation to think upon the signs of the universe and to draw conclusions. That is the reasons why they disclose the hidden facts of it and its structure.Children are the flowers of heaven they are the most beautiful and purest creation.They are the beauty of this world.They are innocent.but there are such kind of students who cannot go to schooldue to financial problems.They only watch others go to school and can merely wish to seek knowledge.it is due to many difficulties,desperate conditions that they face in life DEFINATION Child labour can also be defined as the full time employment of children who are under a minimum legal age. Where does most child labour occur? OF an estimated 215 child labourers around the globe: approximately 115 million(53%) are in Asia and the pacific;14 million(7%) line in latin America; and 65 million (30%) live in Africa. Works on it. Many organizations like UNICEIF, ILO, whoes main object is to prevent child labour .These are the international organization which prevent child labour globaly. INTERVIEW I visited The Eatspot, a roadside restaurant , this weekend. No, this story is not a restaurant review about the dry biryani or hot lassi. It is not about the silly waiters dressed like nervous fresh MBA grads from a college, with white shirts and uncomfortable ties. It is about Nizamuddin. The little boy who poured water into my glass and cleared out my table. He was too small, skinny. His hairs were dry and rough and certainly would not have been oiled for months now.He was hardly four and a half feet tall, not a trace of facial hair. He couldn’t have been a day older than 12 .His shirt on his body was there for namesake and his trouser did not fit him. One of his hands used to hold it on his waist and he had the innovative technique of fastening it with a rope of brittle plastic threads. He was standing expressionless just like an old stuffed toy.He walked around nervously with a heavy jug of water. His eyes darted across the room like a scared rabbit, scanning the place for empty tumblers that needed a refill. . He caught me staring at him and looked back, wondering whether to smile, or look away. And then, with those wide innocent eyes filled with confusion, he gave me a slow, hesitant smile then he came to me started pouring water into jug. There was this c hild here pouring water and removing used plates from tables when he should have been kicking around a football on that hot Saturday afternoon. He was trying to satisfy strangers in that dark restaurant when should have been out with his friends, laughing and teasing his school teachers. The Eatspot was one of those dirty roadside eateries that gave a damn about the laws of the land, The dormant social activist in me got all fired up, and I summoned the boy and asked him What’s your age? (Twelve) he said. Then i said that you can’t work here.Because its against law listening to what I said that he cannot work any longer, tears started flowing from the young chap’s eyes. The little chap was looking at me still. (you do understand urdu, are not you?) I asked him do you have any problem. I don’t have any but the Government has Sir, it’s difficult at home. Dad committed  suicide, mom washes clothes for others, two sisters at home, I am studying by doing work at here, I get some money that is too critical for us†¦) I had no answers. Now, it was my turn to stand there blankly I understand your problem brother No!†¦) he interrupted  you wont understand my problem. I want to study, for that I am ready to work. But you force me to become a beggar. You are forcing me to beg. If your kids sing or dance in TV, they get money, fame and are appreciated in papers.. But if I wanted to work.nobody helps me How can you explain me this?) I never expected a kid t o talk like this but I realized that his experiences in life made him speak so. the restaurent owner called him so he walked away holding his trousers with both hands. All I could do is to stare at him silently, helplessly. I said to myself, â€Å"i should find out the definition for child labor. Reasons Lack of earning during learning. Unemployment. Excess population. Lack of laws against child oppression. Orphans. Drop outs of schools. Illiteracy and uneducated people. Large family size and unemployment people. Urbanization. Poverty. SUGGESTIONS Primary education. Get rid poverty. Our overseas aid. Ban the worst forms. Give the jobs of child workers to their adult relations could be build homes for those children that are living in the streets. Government should make laws to prevent child labour and find solutions. OUR POINT OF VIEW The present goverment has made elementry education compulsory along with this ,the goverment has distributed free books in primary schools so that parents,who cannot afford thier children ‘s school expenses,send their children to schools.The major point is that this decion must be acted upon at all levels.There is strict need to stop child labour in this country.Awareness must be raised and the attentionof parents ought to be diverted to the education of their children.Child labour laws should be put into practice strictly.The orphans and other deserving children must be helped financially on a prolonged basis. IF we suceed to act upon these principals,our country can easily get rid of this problem and that is child labour.

Helping Others

Helping others can be very rewarding and beneficial to both parties. After going to the Alcoholics Anonymous Meeting and Our Community Place (OCP), I have realized the benefits of helping others and I have gained new perspectives on others. While I was there I met some very interesting people that might not have the best lives but they know how to make the best of what they have. I felt like I gained some knowledge and insight on different things and it made me feel good to help them out.In my lifetime I feel as though I have overcome many obsticles and accomplished many goals and as I looked around at others that were less fortunate than me I became even more thankful and more willing to help others. It made me feel good to see others happier and to make their day and things a little better. On Sunday night my roommate and I went to the Alcoholics Anonymous Meeting in a building downtown Harrisonburg called the Club with my friend Joseph. The place did not look like a club where you party at but it looked like just a normal building with a lot of cars there.If you drove by you would not know that it was an Alcoholics Anonymous Meeting location. When I first went in I did not expect to see that there were so many normal people in there. This place seems like a place that you have to go to when you are in trouble and have nothing else to do. There was a range of people from my age to elderly people. The people that looked like they had the most trouble were the older people and the younger ones were in there because they might have been more curious of what goes on in the meetings. The open meetings are a place where anyone can go to get help or support others.I went with my friend for support and to gain knowledge about the truth behind alcoholism and to see what it’s like in real life versus the movies and television. It was very different from what I expected. I wasn’t expecting such real problems and people in the situations. I feel like in rea l life people don’t go through all these bad things due to that I see it happen so much in everyday life that everyone lives as actors and goes home to a normal life and not this sad, difficult problem. The largest part of the meeting was support orientated and sharing stories, struggles and success.I got to hear how they got there and what they are doing to stay strong. The stories that were told were confidential and very heart breaking. It made alcohol seem like such a controlling substance that can become deadly if used too much or in large amounts at one time. Alcohol is never seen as being bad or controlling until people start binge drinking and it gets out of hand and we need help. I feel that if college kids would listen to some of the situations and the real struggles of others then they would feel less obligated to get drunk all the time.Some of these people have hit rock bottom and you could see who they really were and the struggles they went through. There were m any different stories on how they got to where they were and what pushed them to go the right way. Some were their kids and families or someone who took the time to help them and show them things could get better. There were a few parents there that wanted more information about how the kids in this generation were abusing alcohol so they knew what to look for in their own children. This type of meeting for the community is very helpful due to that everything is confidential and you can get help for free.I feel like if I could change something about the meeting is making it so that you don’t have to say your name in the beginning because it makes people seem insecure about themselves. Our community Center us a place for those to go who could need help in a variety of ways. Some see it as a church or a counseling center. It is a place to go for enjoyment and help. They provide food and exercising as well as plays, activities or talent shows. The shelter is a place for homeless people in the city and a place for them to pray and seek religious insight.The leader of the OCP is Ron Copland and is a great supporter and motivator for this shelter. He wants everyone to feel closer and equal. He has had many great ideas to make this place a successful shelter and made him a respectable leader and achiever. He is extremely dedicated and spends most of his time and money into this volunteer only facility. He is a very inspirational man and has done so much in his lifetime to help others that time I was there I wanted to help and show my gratitude and respect for all he has done. He is a wonderful man and he has succeeded in life.The OCP is a group that uses caring experiences and working together to help others. Recovering alcoholics and current alcoholics come here to work together and keep busy while trying to get over their problem. They use agriculture and other jobs to show them how to move on and work together. They use a program called OCM which is our com munity works. They learn to work with each other versus doing it all alone. The center does many activities and programs to get everyone involved and help them run these programs and volunteers like my self help keep this wonderful place in the right direction.When I went to the center there was a talent show. Everyone there had a job to do for the show to be put on. They were people from little kids to older adults and they all worked together like they were best friends who know each other forever. OCP is an effective program that is steadily spreading to more individuals. It brings not only people without homes together but those people of the community. It makes us thankful for what we have and realize they are real people. We don’t see homeless people we see every day plain-Jane citizens.We see our community in new light. Each Program had its own approach to the problem at hand. The alcoholics anonymous meeting was depressing and awkward. People were sad and uncomfortabl e and no one sounded like they wanted to be there. The OCP was much more upbeat and happy. I feel that it is a much better way to get over alcoholism. It gives you activities to keep your mind off drinking and keeps you happy. I would rather forget about a drink than talk about it in an awkward group meeting. I think MR.Copland was onto something when he opened the OCP. But just like any idea it may not work for everyone. Both of these situations have shown me another side of the tracks. Both community programs help others and have me a different perspective on alcoholics and their situations. Hearing their stories was very sad and I could not imagine what they go through. Mr. Copland and his hard work made me inspired to work to help others. He has helped so many people and it felt good to show people that they are equal and can get their problems taken care of.

Sunday, September 15, 2019

Philippine literature Essay

Philippine Literature is a diverse and rich group of works that has evolved side-by-side with the country’s history. Literature had started with fables and legends made by the ancient Filipinos long before the arrival of Spanish influence. The main themes of Philippine literature focus on the country’s pre-colonial cultural traditions and the socio-political histories of its colonial and contemporary traditions. It is not a secret that many Filipinos are unfamiliar with much of the country’s literary heritage, especially those that were written long before the Spaniards arrived in our country. This is due to the fact that the stories of ancient time were not written, but rather passed on from generation to generation through word of mouth. Only during 1521 did the early Filipinos became acquainted with literature due to the influence of the Spaniards on us. But the literature that the Filipinos became acquainted with are not Philippine-made, rather, they were wor ks of Spanish authors. So successful were the efforts of colonists to blot out the memory of the country’s largely oral past that present-day Filipino writers, artists and journalists are trying to correct this inequity by recognizing the country’s wealth of ethnic traditions and disseminating them in schools through mass media. The rise of nationalistic pride in the 1960s and 1970s also helped bring about this change of attitude among a new breed of Filipinos concerned about the â€Å"Filipino identity.† Philippine literature is written in Spanish, English, Tagalog, and/or other native Philippine Languages. Why do we need to study Philippine Literature? Whatever nationality you are it is always very important to study the literature of your country. In doing so you are not only learning about the historical aspects of your land, but you are also keeping alive the thoughts, beliefs and cultural variations of your ancestors that differentiate your country from the rest of the world. A country’s literature also tells us about its civilization in a form other than straight fact.

Saturday, September 14, 2019

History of Black Nurses Essay

Trained schools for students who wanted to pursue a career in nursing came about in the 1800s when Florence Nightingale advocated the idea. The only students that were accepted into these programs where white students, blacks were not allowed any education during this time. Blacks were not given equal rights as the white people, and were denied the right to have an education. There were many black young women who were very interested in nursing, and were dedicated to pursue their dream, and wouldn’t stop trying until they were given equal rights and accepted into these nursing programs. Some black women would follow along with the black soldiers in the Civil War and provide care to these wounded soldiers, as well as provide food, and also teach them to read and right. The first school of nursing was formed after two black men in Chicago, Illinois won the support of their community, and made a hospital out of a small brick building. The black people also came together to form the National Association of Colored Graduate Nurses, an organization formed to protect the black nursing profession, and to stop discrimination towards them. History of Black Nurses During the early 1800s nursing was mainly caring for the sick by family members or slaves. Nurses provided care in homes, and when World War I and II came about, nurses were sent off to provide care to the wounded soldiers. There was not a trained system for nurses to learn and gain experience in the profession, so all of the care that the sick were provided was by untrained nurses. It wasn’t until Florence Nightingale recognized the idea of providing a trained, organized system for nurses to learn before they worked as a professional nurse. Many schools arose out of her idea, however white students were only accepted into these nursing schools, blacks were not accepted. Black people were not given equal rights as the whites, and were denied the right for education and were therefore, denied acceptance into these nursing programs. Mary Eliza Mahoney was born to Charles and Mary Jane Mahoney in 1845, in Boston, Massachusetts. She began to show an interest in nursing when she was a teenager, and worked at the New England Hospital for Women and Children as an unofficial nurse aid, a cook, janitor, and washerwoman. When she was thirty-three years old, she was accepted to a nursing program. as one of forty-two, being the only black student, (Hines, 2004). Although she had to deal with racial discrimination and long hours of lectures and patient care, she made it to the end of the program as one of four. In 1879, she graduated from the New England Hospital for Women and Children in Boston, making her the first black professional nurse in the United States. After Mary Mahoney graduated from nursing school, she worked mainly as a private duty nurse for the next thirty years. Her work became widespread as a private duty nurse. Her patient’s loved her calmness, and professionalism, and she began receiving requests from different states, (Haltey, 2010). After working for private duty for thirty years, Mahoney opened a director of an orphanage in Long Island, New York, and remained there for the next ten years. In 1908, she became a cofounder to the National Association of Colored Graduate Nurses, (Hines, 2004). Mary Mahoney became an inspiration to many black women wanting to pursue a career in nursing. She fought through discrimination, as well as the pressures of nursing school, and graduated with a nursing degree. She helped to open the door for the black population that wanted to become a professional nurse and put an end to the discrimination. Susie King Taylor was born a slave in 1848 on the Grest family farm in Georgia. When Susie was seven years old her owner, Mr. Grest, allowed her to move to Savannah with her Grandmother who had been previously freed by him, (MacLean, 2007). Susie was denied education because she was black , however, her Grandmother would not let this stop her from becoming educated. Susie was sent next door to the neighbor who taught her how to read and write for the next two years, and after she learned this, she was sent to a few other people to become educated. At 14 years old, Susie was taken by boat by Union Soldiers to St. Simon’s Island. Here she met her future husband, Edward King, an army sergeant. She worked with the First Regiment of South Carolina Volunteers, which was made up of slaves, who had been freed by the Union Army. Susie was asked to start a school for children on St. Simon’s Island, and she willingly agreed. Susie taught about forty children, and she also taught adults at night. (MacLean, 2007). In 1863, Susie traveled with her husband’s regiment. She became the first black nurse during the Civil War, and helped to care for wounded soldiers. During her off hours she taught the soldiers how to read and write, and also cooked and laundered for them. She wrote in her diary about the nursing shortages during the war, and was happy to provide nursing care to the sick soldiers. She continued to serve as a nurse until the war ended in 1865. (MacLean, 2007). When the war was over, her and her husband moved to Savannah, Georgie. In 1866 she opened a school for freed black children. Shortly after the school opened, and Susie gave birth to her son, her husband Edward King passed away. In the 1870s, Susie moved to Boston and remarried nine years later. She also joined and became president of the Women’s Relief Corps, which was an association for the Veterans of the Civil War. After being asked by the Women’s Relief Corps, as well as the Army, she agreed to write an autobiography about her experiences during the war. In 1902, Susie King Taylor published her autobiography, Reminiscneces of my Life in Camp: A Black Woman’s Civil War Memoirs, (MacLean, 2007). In 1902, Susie received a letter from the commanding officer in the First South Carolina volunteers stating, â€Å"I most sincerely regret that through a technicality you are barred from having your name placed on the roll of pensioners, as an Army nurse; for among all the number of heroic women whom the government is now rewarding, I know of no one more deserving than yourself,† (MacLean, 2007). Adah Thoms was born in 1870 in Richmond, Virginia. Before she pursued a nursing career, she attended school studying elocution and speech at Cooper Union. Shorty after, she attended the Women’s Infirmary and School of Therapeutic Massage and graduated in 1900. She was the only black woman of thirty students, (White, 2010). She also attended the Lincoln Hospital and Home School of Nursing. After graduating she became assistant superintendent of nurses at the Lincoln Hospital and Home School of Nursing for eighteen years. During her years there, she added another course to the nursing curriculum, public health, and made public health a recognized field of nursing, (White, 2010). Adah Thoms helped with Martha Franklin, and Mary Mahoney to organize the National Association for Colored Graduate Nurses, and was appointed as its first treasurer, and was later president of the organization for seven years. She was also very dedicated to ensuring equal opportunities for black nurses, and worked hard to try and achieve these rights. Thoms worked with the chairmen of the American Red Cross to convince the Surgeon General to allow black nurses to enroll in the Army Nurse Corps, (White, 2010). Black women would enlist to try and serve as nurses during World War I, however the Surgeon General refused to let any black nurses serve. Eighteen black women were eventually accepted to serve as nurses during WWI due to the nursing shortages, and were only allowed to provide care to black soldiers. (White, 2010). Thoms was recognized for her dedication to obtaining equal rights for black nurses. She added to the nursing curriculum, served in the NAGCN as treasurer and president, worked with the Red Cross to campaign for equal rights of black nurses, and opened the door for nurses to serve in the military. For her bravery and commitment, she was the first to receive the Mary Mahoney award when it was established in 1936, and was also inducted into the American Nursing Hall of Fame in 1976, (White, 2010) Mabel Keaton Staupers was born in 1890, in Barbados. In 1903 she moved with her family to the United States, and made a home in Harlem. She graduated from Freedman’s Hospital School of Nursing in Washington, DC in 1917, and began her nursing career as a private duty nurse. In 1920, she collaborated with Dr. Louis T. Wright, and Dr. James Wilson, to organize the Booker T. Washington Sanatorium, which was the first facility in Harlem where black doctors could treat black patients, (American Nurses Association, 2010). In 1922 she was assigned to create a survey for the Harlem area for the health needs of the community. With the results of this survey, the New York Tuberculosis and Health Association was organized, and Mabel Staupers was the first Executive Secretary, and kept this position for the next twelve years, (American Nurses Association, 2010). In 1934, Mabel was appointed as the first nurse executive of the NACGN. During this time she began a campaign for nurses to gain integration into the Armed Forces Nurses Corps, and by 1941 black nurses were allowed into the Army, but not with full integration, and the US navy continued to prevent black nurses from enrolling. Staupers gained the help of Eleanor Roosevelt, who was first lady at the time, and wrote a letter to Franklin D. Roosevelt to recognize black nurses. With support from the public, the Army and Navy both accepted black nurses by January, 1945, (American Nurses Association, 2010). Mabel Staupers is recognized for ending the discrimination of colored nurses, and allowing the colored nurses full integration into the Armed Forces Nurses Corps. She was appointed president of the NACGN in 1949, and the association voted itself out in 1951, and merged with the American Nurses Association after their goal of full professional integration had been met. In 1951, Staupers was given the award for the Spingarn Medal from the National Association for the Advancement of Colored People, and published an autobiography in 1961 called, No Time for Prejudice: A Story of the Integration of Negroes in Nursing in the United States, (American Nurses Association, 2010). The first school of nursing for blacks was formed in 1891 in Chicago Illinois, (Provident Hospital History, 2010). Emma Reynolds was a young black women trying to gain an education to pursue a career in nursing. She applied to nursing schools in Chicago, and had been denied by everyone, for the simple fact that she was a black woman. Her brother was Reverend Louis Reynolds, who felt that something should be done so that black women could be educated in nursing. He sought help from a respected black surgeon in Chicago, Dr. Daniel Hale Williams. The two of them gained support from their community, many blacks, and a few white citizens. They were given donations of supplies, equipment, and financial support. The Armour Meat Packing Company had secured a down payment on a three story brick house with twelve beds, that they turned into the first school of nursing for blacks, Provident Hospital, (Provident Hospital History, 2010). Many black nurses have made history as they were struggling for equal rights for their profession. During this struggle, the National Association of Colored Graduate Nurses was formed in 1908, (Massey, 1993). The founder of this association was Martha Franklin, with cofounders Mary Eliza Mahoney, and Adah Thoms. This association was founded to fight discrimination towards black people who wanted an education in nursing, as well as being a part of the American Nurses Association. The association fought long and hard for their rights as equals, and led campaigns across the United States. One of its biggest achievements was successfully fighting for full integration of black nurses into the Armed Forces Nurses Corps. After black nurses were allowed to serve in the US Army and Navy, they were also allowed full integration into the ANA. After this association gained their right to become educated in nursing, be a part of the nurses in the US Army and Navy, and join the ANA, they voted their selves out and merged with the American Nurses Association in 1951, (Massey, 1993). The black population in the 1800s were not given equal rights as the white population. They were denied many rights, and education was one of them. Many brave women struggled to fight to put an end to discrimination, and to be able to pursue a career in the field that they loved, nursing. It took a lot of hard work and dedication, however they made it happened. These women opened the doors for other black people who wanted to become a professional nurse, and because of them all minorities are now welcome into the field of nursing.

Friday, September 13, 2019

Southwest Airlines Essay Example | Topics and Well Written Essays - 1250 words

Southwest Airlines - Essay Example red of every individual employee while interacting with colleagues internally as well as their engagements with the external community, which includes but not limited to the business partners. The organizational code of ethics sums up a working culture that binds individuals from different backgrounds into delivering the core mandate of an organization to its clientele. The Southwest Airlines is one of the companies that has provided a structured, coded guidelines of conduct to its workforce as a way of ensuring that it offers quality services to the satisfaction of its customers, with eyes set on the ultimate prize of cultivating a mass of loyal customers (Kelly, 2008). With a slogan that that reads â€Å"Doing the right thing,† Southwest Airlines has tailored its code of ethics towards ensuring that honesty, integrity, and personal responsibility prevails in all of its services rendered by its employees and/or its co-partners. The binding codes of conduct and behavior guarantees above board engagements with customers and government officials with explicit conformity with the laws the land and those of international trade/business governing its operations (â€Å"Code of Ethics†). The code of ethics also clearly states the controls that regulate how individual employees are expected to respond to the different situations encountered while on duty. A law abiding company, Southwest Airlines recognizes the supremacy of the law, and as such gives it outright weight in situations where its code of ethics incidentally conflicts with the latter (â€Å"Code of Ethics†). In its endeavors to comply with Laws, Rules, and Regulations govern ing its operations, Southwest Airlines overtly prohibits insider trading, particularly the use of non-public information [valuable company information/asset] in gaining personal benefit either directly or indirectly. The company thus expects a high degree of responsibility from its employees in protecting information that relates to the

Thursday, September 12, 2019

Bonus 4 assignment Essay Example | Topics and Well Written Essays - 500 words

Bonus 4 assignment - Essay Example The study will focus on bars as the centers to pick the subjects. For the study, three bars have been identified. At the first bar, the researcher sits down, asks a provocative question so as to watch who are the possible subjects at the bar (Dryfoos, 1991). Question: Who hates high school life? After the question, at least a response will be raised and then the respondents will be questioned personally whether they dropped out of school. The choice of the three bars is also based on the information that high school dropouts frequent them. For the study, five subjects are needed from each bar. At the first bar, after questioning those who responded to the first question, it is likely to get a 2/4 school dropout number as the timing will be 11 am – 12 Noon, when non-working, non-school going, dropouts frequent the bar. After identifying the five subjects, they will be assured of their confidentiality, then the survey forms will be administered so the subjects will fill it out (Dryfoos, 1991). The questions will include: How much do you drink and smoke? What were the causes for starting to drink and when? Why did you drop out of school – were you suspended or expelled for drug use, and had you started drinking before dropping out? What effect did the company you kept after dropping out of school play? Did you have trouble during early years of school? Did you perform well at school, and did you have problems at home during your schooling time? (b). Purposive sampling: will involve the study of the entire groups at the three bars during our timing of study: 11 am -12 noon. From interviewing all the members at the bars during that time, the school dropouts will be identified and the information from them compiled. The questions to be asked during the interview include: Are you a high school dropout? If yes, the interview will continue, if NO, they