Thursday, October 31, 2019

Protection of research participants Essay Example | Topics and Well Written Essays - 250 words

Protection of research participants - Essay Example Research participants have several rights over the researchers, which include informed consent and voluntary participation. The participants should be informed about â€Å"the degree to which the information will be kept confidential†, according to Human Research Participation Program (2009, par.3). Rubin and Babbie (2009, p.263) mention important measures that the researchers should take to protect participants’ information. They state that sensitive information collected from participants should only be used for professional purposes, and should only be discussed with individuals who are concerned with the study professionally (p.263). They also state that participants should be guaranteed the anonymity and confidentiality of their information, and they should also be informed about the measures that the researchers would be taking to protect the data (p.263). Identifying information should be omitted as soon as possible or used only after participants’ consent . My research agenda is that I would only use sensitive information after taking participants’ consent, and will take proper measures to protect the data in every possible

Tuesday, October 29, 2019

Time Management Research Paper Example | Topics and Well Written Essays - 500 words

Time Management - Research Paper Example I ensure that what I am doing is done to a high standard and therefore many details have to be approved by myself. Having acknowledged this challenge, I have decided not to emphasize so much on the finer details though not encouraging mediocrity. Delegation of duties will also assist me improve in this area since I do not have to go through all my tasks especially on my personal life. I will need to get a trustworthy person who I can delegate to some of my duties that do not require my immediate attention. This will enable me to focus on more tasks that require my full attention. This will also help me in both school and career since I will have plenty of time to focus on more, salient school and career issues. Since time is of the essence, delegation will avail more time for me to concentrate on more urgent matters. Part of this time can be used for my online studies and career development, which is truly paramount (Harris, 2008). After completing the Flash Activity, some of the unanticipated events and obligations that will occur in my life include emergencies, which could arise due to unavoidable circumstances. Some of these emergencies include falling sick unexpectedly, additional work either in school or at work, a pressing family emergency and an external factor that I would not have control. The only way I can plan for these events are by being flexible and to be adequately prepared for them in advance. This will enable me to handle the emergencies with ease since am prepared and flexible. I will also set an emergency fund to cater for any financial obligation that may arise from these events (Mancini, 2007). Using Prime Times, the strategy I would use for planning, managing time, and studying effectively will be the SMART strategy. The SMART strategy states that my time management goals should be set in line with the strategy. This means that my goals

Sunday, October 27, 2019

Comparison Of Taoism V Socrates

Comparison Of Taoism V Socrates Historically, Oriental and western philosophies developed in isolation from each other. The geographical and cultural distance between oriental and western civilization determined substantial differences between oriental and western philosophies. On the other hand, works of ancient Greek philosophers, such as Socrates, and some oriental philosophies, such as Taoism, do have some common ideas and concepts, although, regardless of some similarities, differences between oriental and western philosophies are distinctive. In this regard, it is possible to dwell upon the philosophy developed by Socrates and Taoism as two different philosophies, which respected the strife of individuals for the improvement of their life and self-perfection but still had quite different views, beliefs and concepts. In such a way, Taoism worshiped Toa as the first-cause of the universe and developed the philosophy, which worshiped Tao and promoted the self-perfection of individuals to meet Taoist ideals, wher eas Socrates stood on the ground that individuals should seek for wisdom as the way of self-perfection, taking care of their souls to reach harmony and spiritual balance. Socrates principles As the matter of fact, Socrates is one of the most influential philosophers of ancient Greece that defined, to a significant extent, the development of not only ancient philosophy but also the western philosophy at large. Socrates laid the foundation to basic principles of western philosophy, which were modified, changed and adapted by other philosophers. At the same time, his views were, in a way, universal because Socrates focused on the development of ideas, concepts and values which were universal and applicable to different cultures. Hence, Socrates philosophy persisted throughout times and places for centuries. In such a context, it is important to dwell upon basic principles of Socrates philosophy and to compare them to fundamental principles of Taoist philosophy. First of all, Socrates stressed the importance of wisdom and knowledge. He insisted that people should learn the surrounding world, themselves and phenomena around them. He developed the idea that the unexamined life is not worth living. At the same time, he remained very critical in regard to himself and his knowledge. On analyzing his knowledge he estimated I am the wisest man alive, for I know one thing, and that is that I know nothing. In such a way, Socrates stood on the ground that human mind can hardly become absolutely wise. In other words, Socrates had doubts that people could know everything. At this point, his views were close to Taoism, which respected Tao as the wisest deity, whose wisdom is not achievable for ordinary humans. In such a context, it is worth mentioning the fact that Socrates insisted that wisdom should not be the ultimate goal of human life but what made the life purposeful was the search for wisdom, learning: I decided that it was not wisdom that enabled poets to write their poetry, but a kind of instinct or inspiration, such as you find in seers and prophets who deliver all their sublime messages without knowing in the least what they mean. At the same time, Socrates argued that the most important task in life is caring for the soul: All mens souls are immortal, but the souls of the righteous are immortal and divine. Therefore, Socrates argued that people should take care of their souls and lead a virtuous life to be good and happy. Socrates places emphasis on the fact that people should work on their self-improvement and self-perfection to take care of their soul and to live a happy life. At this point, another principle of Socrates is of the utmost importance. Socrates believed that a good person could not be harmed by other people. In this regard, the material well-being of a person was not important for Socrates since: He is richest who is content with the least, for content is the wealth of nature. Therefore, Socrates believed that it is through the virtuous life people could be happy and live in harmony with their self and with other people. Principles of Taoism In fact, fundamental principles of Taoism are, in a way, similar to that of Socrates, although Taoist principles are built up on the religious ground. To put it more precisely, Taoist believe that Tao is the first-cause of the universe: We believe in the formless and eternal Tao, and we recognize all personified deities as being mere human constructs. We reject hatred, intolerance, and unnecessary violence, and embrace harmony, love and learning, as we are taught by Nature. We place our trust and our lives in the Tao, that we may live in peace and balance with the Universe, both in this mortal life and beyond. In this regard, Taoist views are quite different from that of Socrates because Taoist viewed Tao as the Supreme Being, deity that rules the world and humans, whereas Socrates insisted on the power of human mind. Therefore, Socrates was more anthropocentric compared to Taoists who viewed Tao as the supreme deity. At the same time, goals of human life and existence in Taoism were, in a way, similar to that of Socrates. Taoist stood on the ground that a believers goal was to harmonize themselves with Tao. This means that Taoist are supposed to seek for harmony and self-perfection to harmonize with Tao as Socrates suggested to seek for knowledge and self-perfection to take care of the soul. At the same time, Socrates was apparently concerned with the spiritual life of people above all, whereas physical aspects of human existence were secondary to him. He insisted on the necessity to develop knowledge and wisdom of humans. In contrast, Taoism stressed the importance of health and vitality in contrast to Socrates soul. In such a way, Taoist believed that the happiness is impossible without health and vitality, whereas Socrates was more concerned with knowledge, wisdom and soul of people, instead of their physical body, health and vitality. Nevertheless, Taoist developed believes which were close to Socrates philosophy. To put it more precisely, Taoist viewed the development of virtue as ones chief task. What is meant here is the fact that Taoist should lead a virtuous lifestyle to reach the harmony with Toa. In contrast, sinful life lead to misfortunes and problems people could not cope with in their life. Hence, Taoist developed the belief that people should plan in advance and consider carefully their actions before making them. In this regard, the belief of planning human actions is intertwined with Socrates emphasis on the importance of wisdom in human life. On the other hand, Taoist focus on the importance of actions planning were determined by the belief that actions tend to be reciprocated that means that good actions of an individual lead to good actions committed by other people in regard to the individual and, vice versa, bad actions provoke misfortunes and bad actions committed in regard to the individual. Similarity between Taoism and Socrates Socrates and Toaism still have some similarities. For instance, both Socrates and Taoism believed that a person with great wisdom can still be uninformed And to act on that ignorance under the pretense that it is knowledge, both held, is folly that leads not to progress and betterment within the individual and society but to the opposite effect (Moore Bruder, 2005, p. 503). Therefore, wisdom is not achievable but worth striving for, while, in case of Socrates, striving for wisdom makes the life of people purposeful. At the same time, both Socrates and Taoism stressed the importance of the virtuous life. Socrates insisted on the virtuous life as a part of caring for the soul, whereas Taoist viewed virtuous life as a way to reach harmony with Tao. In such a way, both philosophies viewed virtuous life as essential because without virtuous lifestyle people could not be happy in their life. At this point, the virtuous life is one of the fundamental concepts of both philosophies. On the other hand, it is worth mentioning the fact that the ways of the achievement of the virtuous life and happiness differed in Socrates and Taoist philosophy. To put it more precisely, Socrates believed in wisdom and knowledge as the main tool with the help of which people could become virtuous, whereas Taoist believed that it was through worshipping of Tao and respecting principles of Taoism people can be virtuous and, therefore, happy. Conclusion Thus, taking into account all above mentioned, it is important to place emphasis on the fact that Socrates and Taoism developed philosophies, which had both similarities and differences. At first glance, Socrates philosophy and Taoism are absolutely different, especially in regard to the role of religious beliefs in the life of people. On the one hand, Socrates viewed knowledge and wisdom as issues worth living of and without which human life is pointless. On the other hand, Taoism viewed worshipping of Tao and living according to principles of Taoism as the only way of life for true Taoists. In such a situation, it is quite noteworthy that Socrates and Taoists developed views, which were, to a certain extent, similar. In this regard, it is worth mentioning the fact that both Socrates and Taoism viewed virtuous life as essential concepts for the happiness of people. At the same time, both Socrates and Taoism agreed that people, in spite of their efforts to learn and strife for knowle dge, cannot always be wise and wise people can be uninformed.

Friday, October 25, 2019

Plagiarism Essay -- essays research papers

Plagiarism:   Ã‚  Ã‚  Ã‚  Ã‚   Writing can be a difficult task for some people. For those people, before they start writing, the first thing they do is probably idea gathering, maybe looking for relate article on newspaper or magazine, look up some definition in the dictionary, check the World Wide Web, or even take a trip to the library. Often, they found what they are looking for, and before they know it, they start copying it, maybe a couple of word, few sentence, other people ¡Ã‚ ¦s idea, or they even copy the whole thing. People often want to take things they like, it is part of human nature. But there are a big different between wanting to than actually taking it without permission, this kind of action is called plagiarism. Plagiarism is defined as an act of stealing or using another writer ¡Ã‚ ¦s ideas or words without that writer ¡Ã‚ ¦s permission or giving that writer credit for those ideas or words. It doesn ¡Ã‚ ¦t matter whether you copied an entire article or you just copied a sentence, without proper citation to show another writer ¡Ã‚ ¦s credit, you have committed a crime of stealing. Just like the ordinary law, it is not what or how much you have stole, it is the action and the intention of stealing. There are different kinds of plagiarism, laziness and sloppiness usually cause some people starting plagiarizing without even realizing they are doing it, this. It is usually the act of copying ideas or the sentences of another writer. These kinds of people are the one...

Thursday, October 24, 2019

A Case Study of the Boscastle Floods

Where? Boscastle is in North Cornwall, in the South West of England. A small seaside town, it faces out onto the Atlantic Ocean. What? Flash floods hit the town on Monday 16th August 2004 in a 1 in 50 year occurrence. This caused 120mm of rain in 7 hours, twice the monthly average and causing the river to rise 8/9 feet. Understandably the river broke its banks, flooding Boscastle severely. Causes? The main cause was quite simply the fact that there was a lot of rain. 120mm of it in fact. Seeing as it had been raining for a few weeks before, saturating the ground, the water had nowhere to go but down the 2 steep valleys surrounding the village into the river. Or rivers – Boscastle is at the confluence of 3 rivers, the Valency and the Jordan. These understandably burst and the water was funnelled into the main road. Although this particular storm wasn't down the global warming, we are getting more heavy storms in recent years which is very likely to be to do with global warming. Impacts? Because of the enormous volume of the water and the shape of the hills, the water went very fast towards the sea, as high as 3 metres, and a speed of 40mph, leaving destruction behind. These speeds can move cars, 100 actually through the village, emptying and destroying the car park, washing them into the harbour and sea, or just leaving them dumped in the village. The amazing rush of water coupled with cars acting as out of control cannon balls, caused homes and businesses to be knocked down or washed away. One 16th century building was completely destroyed by a run away camper van. Water rushed easily into homes, destroying everything inside. With the main road turned into a river, the tarmac was destroyed, likewise bridges and signs etc. Although resembling something like a production from the Doctor Who Special Effects team, miraculously nobody was hurt or killed, probably because of the event happening in the day, unlike the Lynmouth flood in Devon 52 years to the day which took the lives of 34 people. They also have the emergency services to thank, who rescued 120 people, many of whom scrambled onto their roofs. 60 people were evacuated to a nearby village. Longer term impacts of the floods affect both the authorities and the people. People will be put off holidaying in Boscastle, an area almost totally reliant on tourism, costing their economy and the jobs and livelihood of people. The authorities will also have to replace damaged roads etc. and think about flood defences for the future. Insurance companies predict the clean up bill will run into millions of pounds. For the inhabitants of Boscastle, not only have their businesses been destroyed. The floods have damaged houses not only through pure destruction, but through damp as well. Possessions will have to be replaced as well as the floods having a great emotional impact on people. Reduction Methods? Considering Boscastle is a small village, which has only been flooded severely once, not much money can be allowed to be spent on stopping future floods. However, small reduction methods could be made such as deepening the river so it can hold more water. The material dug out can be used to create embankments to further deepen it. The course of the rivers could be changed, such as straightening them to make the water reach the sea faster without so many meanders to turn round. The river could be pumped underground in large pipes, although Boscastle would lose the river, which is one of the tourist appeals of the place. The authorities have actually spent à ¯Ã‚ ¿Ã‚ ½0.8m on widening and lowering the river Valency. They've also put a relief channel underground which can take water away from the river when there is a lot of rainfall. Finally, they've inserted a tree catcher so trees cannot create dams downstream if washed into the river.

Wednesday, October 23, 2019

Bill Clinton’s Doctrine of Enlargement of Foreign Policies

Bill Clinton’s Doctrine of Enlargement of Foreign Policies Tommy Wong American History Mr. McCarthy May 2, 2011 During his inauguration from 1993 to 2001, United States President William Jefferson Clinton, also known as Bill Clinton, promoted democracy and improved foreign relationships by using non-aggressive policies. These policies were based on Clinton’s belief and principle, which was also known as the Doctrine of Enlargement. The Doctrine of Enlargement asked for a free competition in global trade and promoting democracy with minimum intervention in foreign political affairs while America to be remaining as the global leader.Clinton had planned and created this doctrine of enlargement before he inaugurated as the President of United States. His education at the Georgetown School of Foreign Service also marked his specialty in dealing with foreign affairs. In a speech he made before the congress on February 17, 1993, only a month since his inauguration, Clinton gav e his view on global economy: Standing as we are on the edge of a new century, we know that economic growth depends as never before on opening up new markets overseas and expanding the volume of world trade.And so, we will insist on fair trade rules in international markets as a part of a national economic strategy to expand trade, including the successful completion of the latest round of world trade talks and the successful completion of a North American Free Trade Agreement with appropriate safeguards for our workers and for the environment. In his speech, Clinton implied that a free global economy is the key to American’s economical growth. During his presidency, Clinton will follow his doctrine and reform the American financial system and foreign relationships.When he first became President in 1993, Bill Clinton had made decisions in foreign affairs that damaged his reputation, although he did not cause the problem in the first place. One of which was the humanitarian mi ssion in Somalia sent by the previous President George W. Bush a few weeks before Clinton’s inauguration. Since the American troops showed little effect on solving the situation in Somalia, Clinton withdrew the entire force next year, which the embarrassment led to the resignation of the Secretary of Defense Les Aspin and damaged Clinton’s reputation.Yet Clinton had only withdrew the troops in order to decrease deficiency and unnecessary deficit. His action is also based on his beliefs of minimizing intervention in foreign affairs. Despite of some missteps in issues in Somalia early on in his presidency, Clinton did bring some exceptional accomplishments in foreign affairs. In 1994, he successfully persuaded Russia to withdraw its troops from Baltic Republic of Estonia and Latvia. In dealing with Russia, Clinton help created the North Atlantic Treaty Organization including Poland, Hungary and the Czech Republic.It restricted the number of troops and nuclear weapons all owed into the Russian regions. Together with the Nunn-Lugar Act, which reduced Russia’s nuclear weapons, Clinton helped unbuilt the tension developing between Europe’s greater powers, thus decreasing the possibility of a devastating world war of nuclear weapons in the near future. Clinton’s Doctrine of Enlargement also planed to keep peace in the world by international alliances and intervene foreign affairs only if necessary. An organization that represents such qualities is the United Nations.In his remarks to the U. N. general assembly in the White House on October 22, 1995, Clinton gave a speech of his thoughts about the United Nations: The U. N. helps the peacemakers, the care providers, the defenders of freedom and human rights, the architects of economic prosperity, and the protectors of our planet to spread the risk, share the burden and increase the impact of our common efforts . . . the United Nations has not ended war, but it has made it less likely, and helped many nations to turn from war to peace.The United Nations has not stopped human suffering, but it has healed the wounds and lengthened the lives of millions of human beings. The United Nations has not banished repression or poverty from the Earth, but it has advanced the cause of freedom and prosperity on every continent. The United Nations has not been all that we wished it would be, but it has been a force for good and a bulwark against evil. From his speech Clinton explained the importance of the United Nations is and what effects it has brought and can bring to the world.Clinton actively participated in the United Nations during his presidency as a fulfillment of his doctrine. He believed that reforming the United Nations is an efficient way to make the world a better and safer place. William Clinton, as a part of his Doctrine of Enlargement, encouraged free global trade, which America has always not been able to do. He promoted several plans to allow free trade with other countries. One of which was the North American Free Trade Agreement (NAFTA) in December 1993, which removed the trading barriers with Mexico and Canada.The NAFTA was an extended version of the Canada-United States Free Trade Agreement, and the purpose was to foster trade between the three countries by lowering the tariffs, and thus creating American jobs over the borders. While the agreement sounded beneficial to the American economy, some argued that it would lead to moving American jobs to Mexico, where the wages and working conditions were lower than that of United States. Some also argued that the lack of antipollution laws in Mexico would also damage the environment.President Clinton made his remarks to such arguments in the White House: So when people say that this trade agreement is just about how to move jobs to Mexico so nobody can make a living, how do they explain the fact that Mexicans keep buying more products made in America every year? Go out and tell the Americ an people that. Mexican citizens with lower incomes spend more money — real dollars, not percentage of their income — more money on American products than Germans, Japanese, and Canadians. That is a fact. And there will be more if they have more money to spend. That is what expanding trade is all about.His response to the anti free-trade argument explained how the NAFTA would bring more financial benefit to the American economy, and losing some jobs is inevitable. The trading deficit of United States with Mexico has decreased from 5. 7 billion dollars in 1987 to 5. 4 billion surplus in 1993 after efforts lowering the tariff by the President Salinas of Mexico, even though they had lower wages than many other nations. Mexico was also the largest consumer of US products per capita. Clinton also believed that the first five years of NAFTA would create a millions jobs by looking at previous trends.The side agreement of the NAFTA would also sanction countries that did not en force the environmental laws. The establishment of NAFTA was America’s attempt to prosper from the global economy by lowering tariffs, thus creating jobs. While the NAFTA promoted trading with Mexico and Canada, the Asia-Pacific Economic Cooperation (APEC) focused on promoting trade with Asia-Pacific countries. President Clinton was also actively involved in the cooperation. Currently the Member Economies consisted of United States, Australia, China, Canada, Japan, Russia, and other countries to a total of twenty-one countries.The three pillars of the APEC were trade liberty, business facilitation, and economic cooperation, which were the also the goals of the Doctrine of Enlargement. Clinton started the trend of annual APEC Economic Leaders’ Meetings, which increased the significance of the APEC. The meetings generated ideas to reduce trading barrier among the country members. The APEC had reduced the average trade barrier from 16. 9% at the beginning of establishment to only 5. 5% in 2004. Clinton’s contribution to APEC helped promoted global trade, which was a part of his doctrine.Clinton’s administration also changed the relationship between America and China. American government has been reluctant to trade freely with China because of its human right violations and its influence on local industries. In 1999, however, Clinton signed an agreement with China to lower trade barriers. Although both democrats and republicans hesitated to support free trade with China, the congress voted in 2000 to share permanent normal trading with China and support China’s World Trade Organization membership. This soon became beneficial to the America’s economy as it opened a billion people market.Aside from promoting global trade, Bill Clinton also improved foreign relations by offering financial aid. During his presidency, Clinton organized several loans to help out countries in trouble. In the January of 1995, he organized a 50 bil lion loan to the Mexican government to overcome a financial crisis, which the price Mexican currency peso drops significantly. The Mexican government repaid all the money in 1995, three years before the proposed schedule. The International Monetary Fund together with the World Bank and Japan organized a 17. 1 billion dollar loan despite the unpopularity.In 1997 to 1998 Clinton helped also a currency crisis in Thailand, South Korea, and several other Asian countries by giving more power to the International Monetary Fund, assisting developing economies to build regulations, and asking private sectors to assist the situation. Clinton helped other countries that were financially struggling by organizing loans, thus improving the global economy and relations. Clinton’s administration proved to be a success in globalization by promoting free trade, reducing mass destructive weapons, and offering assistance to countries in financial crisis.These achievements were based on the belie fs of Clinton’s Doctrine of Enlargement. Bill Clinton was the first democratic president for over thirty years to be reelected for the second term of office. Footnotes Clinton, William Jefferson. â€Å"Address Before a Joint Session of Congress. †   Ã‚  Ã‚  Ã‚  Ã‚  Speech, U. S. Congress, February 17, 1993 2 William Jefferson Clinton â€Å"Remarks by the President to the U. N. General Assembly † (speech, United Nations, General Assembly Hall United Nations Headquarters, October 22, 1995). William Jefferson Clinton â€Å"Remarks by the President Clinton, President Bush, President Carter, and Vice President Gore in signing of NAFTA Side Agreements† (speech, United States, White House, September 14, 1993). Bibliography 1. â€Å"REMARKS BY THE PRESIDENT TO THE U. N. GENERAL ASSEMBLY . †   Ã‚  Ã‚  Ã‚  Ã‚  Speech, United Nations, General Assembly Hall United Nations Headquarters, October 22, 1995. 2. Issues and Controversies. â€Å"Key Events in Cli nton's First Term, 1993-96   Ã‚  Ã‚  Ã‚  Ã‚  (sidebar). † Issues and Controversies. Last modified February 2, 2001. http://www. 2facts. com/icof_story. aspx? PIN=ib600110&term=clinton. 3.Issues and Controversies on File. â€Å"The Clinton Presidency. † Issues and   Ã‚  Ã‚  Ã‚  Ã‚  Controversies. Last modified February 2, 2001. http://www. 2facts. com/   Ã‚  Ã‚  Ã‚  Ã‚  icof_story. aspx? PIN=i0600100&term=clinton. 4. Melanson, Richard A. â€Å"Post-cold War Policy. † Encyclopedia of American Foreign   Ã‚  Ã‚  Ã‚  Ã‚  Policy. Last modified 2002. http://ic. galegroup. com/ic/uhic/ReferenceDetailsPage/ReferenceDetailsWindow? displayGroupName=Reference&prodId=UHIC&action=e&windowstate=normal&catId=&documentId=GALE|CX3402300118&mode=view. 5. NEUMANN, CARYN. â€Å"Clinton Administration (1993–2001), United States National Security Policy. In Encyclopedia of Espionage, Intelligence and Security, edited by Brenda Wilmoth Lerner and Lee Lerner. Vol. 1. Detr oit: Gale, 2004, 3 Mar. 2011. http://ic. galegroup. com/ic/uhic/ReferenceDetailsPage/ReferenceDetailsWindow? displayGroupName=Reference;prodId=UHIC;action=e;windowstate=normal;catId=;documentId=GALE%7CCX3403300152;mode=view;userGroupName=s0965;jsid =3436a7b1e80c61f11c08c92784b65d74. 6. University of Virginia. â€Å"Bill Clinton: Foreign Affairs. † Miller Center Public Affairs. http://millercenter. org/president/clinton/essays/biography/5. 7. CNN Politics. â€Å"Clinton to sign China trade bill Tuesday. CNN. http://articles. cnn. com/2000-10-10/politics/clinton. pntr_1_wto-membership-china-global-trade-regime? _s=PM:ALLPOLITICS 8. Deng, Yong. â€Å"Promoting Asia-Pacific Economic Cooperation, Perspectives from East Asia†. Gale U. S. History In Context. http://ic. galegroup. com/ic/uhic/AcademicJournalsDetailsPage/AcademicJournalsDetailsWindow? displayGroupName=Journals;disableHighlighting=false;prodId=UHIC;action=e;windowstate=normal;catId=;documentId=GALE|A21135725;mo de=view ——————————————– [ 1 ]. Clinton, William Jefferson. â€Å"Address Before a Joint Session of

Tuesday, October 22, 2019

Torah Scripture Essays - Book Of Exodus, Covenant, Free Essays

Torah Scripture Essays - Book Of Exodus, Covenant, Free Essays Torah Scripture Introduction to the Torah Scripture Introduction to Scriptures in general and Hebrew Scriptures in particular The Torah A. Introduction to the Torah B. Begin exploring the Torah's themes and content The Torah in the New Testament and the Book of Common Prayer Part I Introduction Scripture In General Doctrine of Inspiration The Bible is: A single Divine revelation, with two Testaments, better called covenants or agreements between God and his people. Three necessary theological constituents of inspiration: God's causality: The prime mover in inspiration is God. The Bible tells us that "no prophecy ever came by human will, but men and women moved by the Holy Spirit spoke from God (II Peter 1:21). In other words, God revealed and people repeated the revelation orally or in written form. See BCP, p. 236. The Human agency: People play an important role in the overall process of inspiration; they were the means through which God spoke. God used people to convey his propositions. In inspiration, then, God is the original cause, and the human agent is the instrumental cause. Scriptural authority: This is the third and final product of God's causality and the human agency. God not only spoke to the writers of Holy Scripture, but he continues to speak through their God-inspired writing. See BCP, p. 853. A working definition of the doctrine of inspiration might be this: "A process whereby God causes his Word to work through the mind and pen of a human being, without overriding their personality and style, to produce divinely authoritative writings." The Bible has a unifying theme - Redemption: There is a two-fold meaning of the word redemption. it infers deliverance; and it implies a price paid for that deliverance, the ransom. Redemption ultimately is from: the penalty of sin: from the power of Satan and evil, cf, BCP, p. 302; by the price Jesus paid on the cross. How the Books of the Hebrew Bible are Organized (Chart) Part II Introducing The Torah The books of the Bible have not always been numbered or grouped as they are today. The earliest division of the Old Testament was a simple twofold division of Law and Prophets. The first five books were called the Law of Moses and all the other books were called the Prophets. (C.f., the Summary of the Law, BCP, p. 324) The names given to the first five books of the Bible are several: They are called: The Law The Torah The Books of Moses or the Pentateuch. The time covered in the Books of Moses or Torah: Genesis - from the creation to the bondage of Israel in Egypt, about 1860 BC. Exodus - from the sojourn of Israel in Egypt to Mt. Sinai (c. 1860-1447 BC.) Leviticus - one month between Exodus and Numbers Numbers - from Mount Sinai to the end of the forty-years "wandering" (c. 1447-1407 BC) Deuteronomy - from the end of the wandering to after Moses' funeral (about two months). The heart of the Pentateuch is found in the book of Exodus, which deals with the exodus from Egypt and the sojourn at Mount Sinai. All Jewish tradition reaches back to these "root experiences." They constitute the basic understanding of Jewish identity and of the identity and character of God. Covenant and Law Two themes fundamental to the Old Testament: covenant and Law, are closely related. Covenant signifies many things, including an agreement between nations or individuals, but above all it refers to the pact between Yahweh and Israel sealed at Mount Sinai. The language concerning that covenant has much in common with that of ancient Near Eastern treaties; both are sworn agreements sealed by oaths. Yahweh is seen to have taken the initiative in granting the covenant by electing a people. Perhaps the simplest formulation of the covenant is the sentence: ?I will take you for my people, and I will be your God? (Exodus 6:7). The law was understood to have been given as a part of the covenant, the means by which Israel became and remained the people of God. The law contains regulations for behavior in relation to other human beings as well as rules concerning religious practices, but by no means does it give a full set of instructions for life. Rather, it seems to set forth the limits beyond which the people could not go without breaking the covenant. Scholars

Monday, October 21, 2019

Emilia in Shakespeares Othello

Emilia in Shakespeare's 'Othello' From her first introduction, Emilia in Shakespeares Othello is ridiculed and chided by her husband Iago: â€Å"Sir, would she give you so much of her lips/As of her tongue she oft bestows on me,/You would have enough† (Iago, Act 2, Scene 1). This particular line is prophetic in that Emilia’s testimony at the end of the play, relating to how Cassio came by the handkerchief, leads directly to Iago’s downfall. Emilia Analysis Emilia is perceptive and cynical, maybe as a result of her relationship with Iago. She is the first to suggest that somebody is telling Othello untruths about Desdemona; â€Å"The Moor’s abused by some most villainous knave./Some base, notorious knave† (Act 4 Scene 2, Line 143-5).​ Unfortunately, she does not identify her own husband as the perpetrator until it is too late: â€Å"You told a lie, an odious, damned lie† (Act 5 Scene 2, Line 187). In order to please him, Emilia gives Iago Desdemona’s handkerchief, which leads to her best friend’s condemnation, but this is not done out of spite but to garner a little praise or love from her husband Iago, who rewards her with the line; â€Å"O good wench give it to me† (Act 3 Scene 3, Line 319). In a conversation with Desdemona, Emilia does not condemn a woman for having an affair: But I do think it is their husbands faultsIf wives do fall: say that they slack their duties,And pour our treasures into foreign laps,Or else break out in peevish jealousies,Throwing restraint upon us; or say they strike us,Or scant our former having in despite;Why, we have galls, and though we have some grace,Yet have we some revenge. Let husbands knowTheir wives have sense like them: they see and smellAnd have their palates both for sweet and sour,As husbands have. What is it that they doWhen they change us for others? Is it sport?I think it is: and doth affection breed it?I think it doth: ist frailty that thus errs?It is so too: and have not we affections,Desires for sport, and frailty, as men have?Then let them use us well: else let them know,The ills we do, their ills instruct us so (Act 5 Scene 1). Emilia blames the man in the relationship for driving her to it. â€Å"But I do think it is their husband’s faults If wives do fall.† This speaks volumes for her relationship with Iago and does insinuate that she would not be averse to the idea of an affair; which corroborates the rumors about her and Othello, although she denies them. Also, her loyalty to Desdemona may belie this rumor too. An audience would not judge Emilia too harshly for her views, knowing Iago’s true nature. Emilia and Othello Emilia judges jealous Othello’s behavior harshly and warns Desdemona off him; â€Å"I would you had never seen him† (Act 4 Scene 2, Line 17). This demonstrates her loyalty and that she judges men based on her own experience. Having said this, it may well have been better if Desdemona had never set eyes on Othello, given the outcome. Emilia even bravely challenges Othello when she discovers he has murdered Desdemona: â€Å"O the more angel she, and you the blacker devil!† (Act 5 Scene 2, Line 140). Emilia’s role in Othello is key, her part in taking the handkerchief leads to Othello falling for Iago’s lies more fully. She discovers Othello as Desdemona’s murderer and uncovers her husband’s plot which she exposes; â€Å"I will not charm my tongue. I am bound to speak† (Act 5 Scene 2, Line 191). This leads to Iago’s eventual downfall and sadly her own murder as her husband kills her. She demonstrates her strength and honesty by exposing her husband and challenging Othello for his behavior. She remains loyal to her mistress throughout and even asks to join her on her deathbed as she herself dies. Unfortunately, these two strong, perceptive, loyal women are killed off but, at the same time, they could be considered the heroes of the piece.

Sunday, October 20, 2019

The Prison-Industrial Complex

The Prison-Industrial Complex Is prison overcrowding a vexing problem or a tempting opportunity? It depends on whether you see the  nearly 2  million Americans locked in prison cells  as  a  tragic  collection of misspent lives or a  vast self-sustaining supply of cheap labor. To be sure, the growing prison-industrial complex, for better or worse, views the inmate population as the latter. Derived from the  Cold War-era  term â€Å"military-industrial complex,† the term â€Å"prison-industrial complex† (PIC) refers to a combination of private-sector and government interests that profit from  increased  spending on prisons, whether it is truly justified or not. Rather than a covert conspiracy, the PIC is criticized as a convergence of self-serving special interest groups that openly encourage new prison construction, while discouraging the advancement of reforms intended to reduce the inmate population. In general, the prison-industrial complex is made up of: Politicians who play on fear by running on â€Å"get tough on crime† platforms.State and federal  lobbyists  who represent prison industries and the companies that profit from cheap prison labor.Depressed rural areas that depend on prisons for their economic survival.Private  companies that view the  $35 billion spent each year on corrections  as creating a lucrative market, rather than imposing a drain on taxpayers. Influenced by prison industry lobbyists, some members of Congress may be persuaded to press for  harsher federal sentencing laws  that will send more non-violent offenders to prison, while opposing prison reform and inmate rights legislation. Prison Inmate Jobs   As the only Americans not protected from slavery and forced labor by the  Thirteenth Amendment  to the U.S. Constitution, prison inmates have historically been required to perform  routine prison maintenance jobs. Today, however, many inmates take part in work programs that make products and provide services for the private sector and government agencies. Typically paid far below the  federal minimum wage, inmates now build furniture, make clothing, operate telemarketing call centers, raise and harvest crops, and produce  uniforms for the U.S. military. For example, the signature line of jeans and t-shirts Prison  Blues  is produced by inmate-workers at the Eastern Oregon Correctional Institute. Employing more than 14,000 inmates nationwide, one government-managed prison labor agency produces equipment for the U.S. Department of Defense. Wages Paid to Inmate Workers   According to the U.S. Bureau of Labor Statistics (BLS), inmates in prison work programs earn from 95 cents to $4.73 per day. Federal law allows the prisons to deduct up to 80% of their wages for taxes, government programs to assist crime victims, and the costs of incarceration. Prisons also deduct small amounts of money from inmates required to pay child support. In addition, some prisons deduct money for mandatory savings accounts intended to help convicts become re-established in the free community after their release. After deductions, participating inmates netted about $4.1 million of the $10.5 million total wages paid by prison work programs from April to  June  2012, according to the BLS. In privately-run prisons, inmate workers typically make as little as 17 cents per hour for a six-hour day, a total of about $20 per month. As a result, inmate workers in federally-operated prisons find their wages quite generous. Earning an average of $1.25 an hour for an eight-hour day with occasional overtime, federal inmates can net from $200-$300 per month. The Pros and Cons   Proponents of the prison-industrial complex argue that rather than unfairly making the best of a bad situation, prison work programs contribute to the inmates’ rehabilitation by providing job training opportunities. Prison jobs keep inmates busy and out of trouble, and money generated from the sales of prison industries products and services help maintain the prison system, thus easing the burden on taxpayers. Opponents of the prison-industrial complex  contend  that the typically low-skill jobs and minimal training offered by prison work programs simply do not prepare inmates to enter the workforce in the communities to which they will eventually return after their release. In addition, the growing trend toward privately-operated prisons has forced states to pay for the cost of contracts for outsourced incarceration. Money deducted from wages paid to inmates goes to increase the profits of the private prison companies rather than decreasing the cost of incarceration to taxpayers. According to its critics, the effect of the prison-industrial complex can be seen in the stark statistic that while the violent crime rate in the  United States has fallen by about  20% since 1991, the number of inmates in U.S. prisons and jails has grown by 50%. How Businesses View Prison Labor   Private sector businesses that use inmate workers profit from significantly lower labor costs. For example, an Ohio company that supplies parts to Honda pays its prison workers $2 an hour for the same work regular union  auto  workers  are paid $20 to $30 an hour. Konica-Minolta pays its prison workers 50 cents an hour to repair its copiers. In addition, businesses are not required to provide benefits like vacations, health care, and sick leave for inmate workers. Similarly, businesses are free to hire, terminate, and set pay rates for inmate workers without the collective bargaining limitations often imposed by  labor unions. On the downside, small businesses often lose manufacturing contracts to prison industries because they are unable to match the low production costs of a vast pool of low-paid convict workers. Since 2012, several small companies that had historically produced uniforms for the U.S. military have been forced to lay off workers after losing contracts to UNICOR, a government-owned prison labor program. Civil Rights Civil rights groups argue that the practices of the prison-industrial complex  lead to the building, expanding prisons mainly for the purpose of creating employment opportunities utilizing prisoner labor at the expense of the inmates themselves. For example, the American Civil Liberties Union (ACLU) contends that the prison-industrial complex’s drive for profit through privatization of prisons has actually contributed to the continued growth of America’s prison population. In addition, the ACLU argues that the construction of new prisons solely for their profit potential will ultimately  result  in  the often unjust and lengthy imprisonment of  millions  of additional  Americans, with a disproportionately high number of the poor and people of color being jailed.

Saturday, October 19, 2019

Health care of vulnerable persons Essay Example | Topics and Well Written Essays - 3000 words

Health care of vulnerable persons - Essay Example It can be due to individual capacities, such as level of educational attainment, income or wealth, and mental or physical capabilities. For example, those who have lower levels of educational attainment have significantly less knowledge or preparation to deal with disasters, and are thus vulnerable. The availability of support is also a significant factor in vulnerability. Those who have no families or social networks to rely on are more prone to being harmed than those who can draw support from others. Access to neighbourhood and community resources is also an important factor in assessing whether an individual or group is vulnerable. Other sources of vulnerability may include poverty and race and physical location. This is largely related to access to resources and care. This paper focuses on children who are victims of abuse as a vulnerable group. Children, due to their developmental state, are very fragile. They are usually weaker than adults, are less mentally developed, and hav e no or little means to defend themselves. Due to their age, physical and mental limitations, they are more dependent on others, making them susceptible to abuse and neglect (Reichert 2006). The Child Welfare Information Gateway (2009) defines child abuse as consisting of acts of parents or caretakers that result in death or harm of a child. It may also include the omission of certain acts, or neglect to do something. There are several types of abuse: physical, neglect or failure to provide for a child’s needs, sexual or exploitation, and emotional. Some states also include parental substance abuse as a form of child abuse. There are certain risk factors that make a child susceptible to abuse. Goldman et al (2003) describes four general categories of risk factors: parent or caregiver factors, family factors, child factors, and environmental factors. Parent factors include personality traits such as aggression, impatience, or dominance, and psychological disorders. A personal history of abuse, substance abuse, and faulty attitudes and knowledge are also factors. Families with single parents or constantly changing compositions have been found to be more prone to having abused children. Marital conflict and domestic violence, presence of stress, and flawed parent-child interactions are also risk factors. Child factors that contribute to child abuse are age, developmental stage, and presence of disabilities. Environmental factors include poverty, unemployment, social isolation, lack of social support, and being in dangerous neighbourhoods. This paper describes policies that work towards helping child abuse victims. It also goes into strategies that would prevent child abuse, offer help for victims, and address their vulnerabilities. Policies In 1989, the United Nations created the Convention on the Rights of the Child, which specifies the basic rights that every child, regardless of race or gender, should enjoy. Among these rights are: a right not to be dis criminated against; a right to have best interests primarily considered; a right to a name, nationality, and parents; a right to have own views and freely express self; a right to be free from interference with privacy; a right to adequate health care, education, rest, and leisure; and, most relevant to this paper, a right to be protected from abuse (Reichert 2006). Since the creation of the Convention on

Friday, October 18, 2019

Project Management Plan Essay & Presentation Example | Topics and Well Written Essays - 250 words

Project Management Plan & Presentation - Essay Example Application of these systems have proved to be insufficient in operations of Qatar Hospitals and requires improvement. As such, this current system will be replaced by an Integrated Hospital System (HS) in order to improve the performance of the hospital operations. The new systems seeks to update the hospital system in the wake of technological advancement especially during emergencies. The purpose of Request for Quotes is to request proposal to replace the current Qatar Hospitals Systems with a new integrated Hospital System (HS) for greater functionality and integration with other vital information systems. The Request for Quotes indicates the basic requirements of the project, hardware and software and description of RFQ process. The resolution of this document is to express the communications strategies and goals of the sustainable integration project. These advanced goals and strategies are anticipated to offer direction in planning and evaluating results of the present and forthcoming communications efforts. The sustainable packaging project Communications Management Plan (CMP) expresses the project’s organization and procedures of information screening, collection, distribution and formatting of project information. The communication log for this project helps track communication as follows. The plan will be aimed to document the tools, processes and procedures that will be used to achieve and control those events that could have a negative effect on this project. All the risks that are related to the project. The details regarding identifying the risk, assessing, risk tracking and reporting as well as risk contingency plan will be included. The identified risks are presented as

How ERP Can Help Companies Become Lean Coursework

How ERP Can Help Companies Become Lean - Coursework Example In the current economic climate, there is cut-throat competition and a rat race has emerged to capture and retain a large customer base. The larger a firm’s customer base, the stronger it shall become. A firm’s customers are its most valuable asset, as they are the ones who spread positive word of mouth if the company is delivering good value and this in turn drives demand and subsequently the growth of an organization. Firms nowadays recognize the importance of delivering ‘customer delight’ more than ever before and this has led a change in their business strategies whereby companies are striving to eliminate as many costs as possible and streamline their business processes in order to provide better service at lower costs and pass this benefit down to their customers. Availability of information, or rather the lack of it, is often cited as one of the main reasons why delays occur in business processes and often results in two or more departments doing sim ilar paperwork thus duplicating the work, something which is totally unnecessary and only consumes more time and money than necessary. An ERP system in this case shall be an ideal addition to the company’s resources as it makes available information across all functional departments thus ensuring transparency and availability of information at all times. ... fers and are adopting measures to integrate this system into their operations or, in case of those using older computer systems, migrate to the newer ERP platform. The proponents of Lean have recognized that ERP can help organizations achieve the objective of becoming lean. The five basic principles that form the basis of the idea of Lean - value definition and specification, value stream mapping, uninterrupted flow, customer pull and the pursuit of perfection - are â€Å"all supported and enhanced by comprehensive information control and management tools that an end-to-end enterprise software suite delivers.† How an ERP system streamlines a company’s business processes An ERP system can help a company move towards a lean structure in many ways. These include helping reduce waste, moving towards continuous improvement, exploiting and satisfying sales and customer service opportunities, keeping suppliers and production up-to-date with the use of order less manufacturing and Kanban and creating an environment of perfect information and collaboration. Waste Reduction An ERP system, if implemented, becomes the main information carrying artery of a company, carrying data pertaining do day-to-day activities, measuring progress and using metrics to identify opportunities where a company can improve its processes. Some ERP systems also allow companies to conduct ‘What-If’ analyses and help determine activities that have the quickest payback times. A transparent system with perfect information flow allows all departments to visibly see where each activity lies in terms of progress and ensures that duplication of work doesn’t take place. With an ERP system in place, firms can effectively use the most efficient methods of routing and workflow such as using the most

Analysis on how healthcare is delivered in the United States as Essay

Analysis on how healthcare is delivered in the United States as compared to how healthcare is delivered in three other countries - Essay Example to healthcare delivery in United Kingdom (National Health System/Service), the Netherlands (Socialized Health Insurance), and Canada (National Health Insurance). The United States is a capitalist nation and this has been transferred to healthcare delivery, i.e., the patient has to pay for the service as they receive it from the doctor. According to Tanner (2008), this is an indicator that healthcare in the U.S is private-based with an estimated 85% of the population covered by insurance plans. Private companies exist in the U.S to provide health insurance where clients pay monthly fee for insurance and the company pays the client’s doctor for services rendered. Clients pay according to the risk they are willing to insure; thus, if a client pays more for an expense, then the company will charge less for the insurance and vice versa (Tanner, 2008). Most employers in the U.S pay for worker’s insurance which is considered as an employment benefit that adds up to the employee’s salary. However, few Americans can pay for their own insurance owing to high cost relative to their income. Another insurance provider is the government itself as it allocates considerable funds from the budget to healthcare programs. In addition, Tanner (2008) asserts that those who are not insured as a result of poverty receive medical cover via Medicaid which is funded by both the federal and state taxes. On the other hand, the aged and children receive medical cover via Medicare which is funded by taxes from federal income. Of all the developed countries, the U.S is believed to have the highest medical expenses (Tanner, 2008). This is another capitalist country which applies the fee-for-service system of medical delivery only that the administration of the plan is done by government entities (Tanner, 2008). This system sees the healthcare services of the country covered universally and coverage for all citizens is achieved for all ten provinces. In Canada, Tanner (2008) reveals that

Thursday, October 17, 2019

The Impacts the opening of Terminal 5 has had on Terminal 3 and the Essay

The Impacts the opening of Terminal 5 has had on Terminal 3 and the Staff managerial structure - Essay Example Paton & McCalman (2008) in Change Management deal with the managers perspective in such change and state that the "problem more often than not is a less than competent management of the change situation." (p.39.) This competent management, as mentioned, was clearly lacking in the areas that we highlighted with respect to proper information being disseminated to the staff regarding their parking area, as well as the proper and effective management of the Information Technology process pertaining to the baggage sorting and handling. Paton & McCalman further state that the change management aspect is in fact a "multi-disciplinary activity" where key elements and skills that should be possessed and displayed include effective communication, maintaining motivation, facilitation and orchestration of group and individual activities, negotiation and influence and possibly most importantly the planning and control elements of the entire change. (p.40) Based on the results of the opening day o f Terminal 5, we believe that a number of these elements were in fact missing, especially that of the communication and the effective planning – this is displayed in the results that were produced on opening day. From the perspective of our research, the respondents mostly agreed that such change was required and in analyzing the size and complexities of BAs operations within Terminal 3 we believe that such change was needed. The respondents did not really reveal any negative feedback regarding such change, with the only notable feedback being that of the mentioned automation of deployment and the reshuffling of staff as well as the fact that the staff were no longer working in teams. These responses were not specifically relayed as negative but rather of how the situation is now. One has to accept that the company has employed technologically advanced means in

Wednesday, October 16, 2019

International Human Resources Management Presentation Speech or - 1

International Human Resources Management - Speech or Presentation Example Nevertheless, how do these Union responses to the aging workforce? In order of these trade unions to come up with a clear and realistic tool for identifying the best practice to initiate, advocate and implement in their respective area of operation, methodological and theoretical approaches are used in relation to empirical evidences and findings from other Europe countries. For example, the UK and German trade union tries to design their responses to the aging workforces based on the research conducted from multiple dimensions. However, how do they arrive at the best resolution? According to Matthew Flynn & Martin Upchurch (2012) methodological approach for the aging workforce, the UK, and the German trade union relies on the Companies’ case studies, institutional case studies, international literature reviews and contextualization of the best workforce practices from reports and interviews conducted. Based on the hypothetical specificity and sensitivity of the studies conducted by the trade union in response to their aging workforces, understanding the patterns and trends in which these trade unions response to the aging workforce becomes quite apparent. For example, when adapting to the pension system or regulating employees by norm setting, the UK trade union intend to raise the retirement ages for 68 years enclosing the withdrawal routes. In this regard, they increase the number of old workers in its workforce by 1 million in conjunction to enacting laws that prohibit discriminative working by age. In response, the UK government initiates welfare systems as well as tax initiatives that encourage the old generation to return to work. Comparatively, how do German trade union response to the aging workforce? The German trade union is directly opposite of what happens in the UK trade unions. German trade unions systems are inclusive providing negotiation

The Impacts the opening of Terminal 5 has had on Terminal 3 and the Essay

The Impacts the opening of Terminal 5 has had on Terminal 3 and the Staff managerial structure - Essay Example Paton & McCalman (2008) in Change Management deal with the managers perspective in such change and state that the "problem more often than not is a less than competent management of the change situation." (p.39.) This competent management, as mentioned, was clearly lacking in the areas that we highlighted with respect to proper information being disseminated to the staff regarding their parking area, as well as the proper and effective management of the Information Technology process pertaining to the baggage sorting and handling. Paton & McCalman further state that the change management aspect is in fact a "multi-disciplinary activity" where key elements and skills that should be possessed and displayed include effective communication, maintaining motivation, facilitation and orchestration of group and individual activities, negotiation and influence and possibly most importantly the planning and control elements of the entire change. (p.40) Based on the results of the opening day o f Terminal 5, we believe that a number of these elements were in fact missing, especially that of the communication and the effective planning – this is displayed in the results that were produced on opening day. From the perspective of our research, the respondents mostly agreed that such change was required and in analyzing the size and complexities of BAs operations within Terminal 3 we believe that such change was needed. The respondents did not really reveal any negative feedback regarding such change, with the only notable feedback being that of the mentioned automation of deployment and the reshuffling of staff as well as the fact that the staff were no longer working in teams. These responses were not specifically relayed as negative but rather of how the situation is now. One has to accept that the company has employed technologically advanced means in

Tuesday, October 15, 2019

Literacy Essay Essay Example for Free

Literacy Essay Essay For as long as I can remember literature has always played an important role in my life. As a young child, I can remember how excited I’d be at story time each night before bed. My interest in literature carried on throughout my school years from kindergarten when I was placed in the red bird group, which was the group of strongest readers†¦. to high school†¦when I had the benefit of being taught by one of the best English teachers ever, Ms. Irena King. Now as an adult and professional, I am very appreciative of the literary foundation that was laid for me by my family and my teachers. I understand how important literacy is in everyday life. First, as a young child, literacy played a very important role in my life even before I could read. I was always fond of books of all kinds. Coloring books, magazines, and picture books†¦I loved them all. I remember each trip to the grocery store; I would always get a new Little Golden Book. I absolutely had to have the entire collection and would want them read to me each night before bed. My favorite of this collection was The Gingerbread Man. I would sit for hours and look at the pictures. My mother would often encourage me to keep an interest in books. She always kept a subscription of Highlights Magazine for me and I would watch the mail each day in hopes that a new issue had arrived. As I grew older, my love for books did not change, but the type of books I wanted did. I had the largest collection of Sweet Valley High books and was a faithful subscriber to Fresh Magazine. I think that these are some of my fondest memories from my childhood, and I am so appreciative of my familys support of my passion for reading. Next, my interest for literature carried on from my early years to my school years. This was very evident when I started kindergarten. I vividly remember there were different groups within our kindergarten class.

Monday, October 14, 2019

Distributed Denial Of Service DDOS Attack Computer Science Essay

Distributed Denial Of Service DDOS Attack Computer Science Essay Information technology is an exciting and emerging day by day technology which requires communication systems for data and services exchange. As nowadays every services and products uses computer and internet as a medium to interchange data or money in an open internet, hence prone to vulnerabilities. Distributed Denial of Service (DDoS) attack is an attack to the availability of the resources available, so that authenticated users do not use those resources. This paper intended to explore the existing threats and vulnerabilities of DDoS with possible solutions and recommendations plus overview and architecture methodology of this kind of attack. Confidentiality, Integrity and Availability are the three main features of the any computer network communication systems. DDoS which is a subset of Denial of service (DoS) attack, which result in overwhelming the victim machine and deny the services to its legitimate users results in Unavailability of the resources and services for concern clients. Some examples are smurf attack, SYN UDP floods and ping of death. DDoS is a type of DoS attack but uses distributed computers from different location to attack on a particular victim may be a server or client which results into the stopping of its functionality to provide services, hence unavailability of the server ultimately results loss in monetary plus status of the organization. It works by flooding all the network of the given organization with unwanted traffic, the first well known DDoS was identified in 2000 on yahoo.com which goes down to around two hours. The DDoS is a result of weakness of internet which prone to several vulne rabilities as internet was designed only for functionality but not concern about any security. As internet is an open network everything is open and is shared among authenticated users. Another big problem is that it is not centralized network different organization, different countries have their own rules and regulation regarding internet. DDoS Layer Involved The DDoS attack mainly occurs in three layers of the OSI model which are layer 3 (Network) layer 4 (transport) and layer 7 (application). In transport layer what exactly happens is that attacker uses a forged IP address to request for connection so in typical connection, 3 way TCP handshake is done but in this attack it does not complete 3 way handshake but send connection request over and over server reserves resources for each attempt and results in out of connection requires for the legitimate users. In network layer it includes ping of death and ICMP requests, where as in application layer is kind of effective DDoS attack and hard to detect because it passes the 3 way handshake and treated as authenticated user to the concern server, so attacker requests a large amount of data continuously through HTTP and results in avoiding its legitimate users as got busy with those false requests. In DDoS attack a combination of those three layers results in an effective attack that results i n some really drastic effects. Application Layer Presentation Layer Session Layer Transport Layer Network Layer Data link Layer Physical Layer Fig: 1-Layers Involved in DDoS DDoS Architecture The main purpose of DDoS attack is to overwhelm the related server and makes it down, it can be for benefit or for fun only but in both case legitimate clients suffered as bandwidth, resources, memory and CPU got wasted. DDoS attack architecture consists of hierarchy pattern to attack; the four main components of DDoS are as follows: Attacker Master Machines/Handler Zombie Machines Victim First of all attacker scans thousands of computers on the internet independent of the origin of the systems for known vulnerabilities that is which have minimum security aspect on the computer and makes Master machines or handlers, its consists of more than two systems to many depends upon how sophisticated is attack, after making handlers rest scans for the vulnerable systems is done by these handlers, which results in thousands of zombies across the globe without knowledge of concern users and when these zombies are ready attacker can execute for attack and makes the victim down. Attacker Master Machines/Handlers Zombie Machines Victim Fig: 2- DDoS Architecture As seen from the above figure attacker takes control of one or more than one masters which then take control over thousands zombies and when triggered at a specific time these zombies flood the victim. These attack results with the use of some tools (software or malware) which to be install on the masters and zombies so that attacker can take controls through these tools and monopoly the systems. Here above the communication between attacker and master machines is done through TCP protocol whereas between master machines to zombie and zombie machines to victim use UDP protocol for communication, as UDP is unreliable protocol so does not hold any state and results in no trace back, it uses TCP for initial communication because it needs to organize other subordinates with master machines. DDoS Tools The tools used by DDoS attack are very sophisticated as it runs in background or in foreground with the systems program name and is not visible or very hard to detect by administrators. Trin00, tribal flood network, stacheldraht, tribal flood network 2000, trinity, wintrin00, MStream and etc are the examples of such kind of tools used in DDoS attack, by this tools attacker installed and executes accordingly. It also helps him to facilitates co ordination between masters and zombie, and execute timer also to bombards at a fixed time, so that all zombies attacks the victim. Trin00 scans for buffer overflows in systems and install attack shell daemon through remote shell, it communicate through unencrypted UDP. In tribal flood network, it installs the daemon which carries out the multiple attacks like ICMP flood, UDP flood, SYN flood, communication done through ICMP ECHO and REPLY. List of zombies daemon IP address is encrypted in later version of TFN. Stacheldraht uses the combination of trin00 and TFN. Encryption takes place between attacker and masterà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s communication and attacks are similar to TFN. Trinity floods through UDP, SYN, and ACK through Internet Relay Chat (IRC) has a backdoor program which monitors TCP port. MStream uses forged TCP packets with ACK flag set, it uses TCP and UDP floods with no encryption in between but master machines are kept password protected. Beside these tools various other program and tools are readily available for such kind of attack which leaves no residue to trace back. DDoS Types DDoS are acts differently but mainly classified in two main categories according to their attack pattern which are as follows: Bandwidth Depletion attack Resource Depletion attack In bandwidth depletion attack the main targeted area is the bandwidth of the concern victim by overwhelming with unwanted traffic more than 10 Gbps (It depends) and prevents the legitimate users from gaining access for the services. Some examples of such attacks are UDP flood, ping flood, Smurf and reflection attacks which bombards with unwanted traffic to make unavailability of the services. Whereas in resource depletion attack, the main concern area are the resources available. This attack leads to the out of resource available for the concern users by TCP SYN attack, PUSH ACK attack, Teardrop attack. These attacks through the requests like SYN to the concern server which in return reserves resources for this request, but attacker bombards the same again and again and hence server goes out resources. DDoS Detection The very first question about this attack is that, how to know if DDoS attack happened in any organization or in any machine. So following are some ways to know if it occurs: Performance of CPU, Memory and bandwidth degrades abnormally. Services become unavailable or partially available. Cannot access given resources properly. These above are preliminary steps to know the DDoS attack. It can be monitor through the continuously analyzing of the systems. DDoS Defense Practically speaking it is impossible to prevent DDoS attack but what we can do is to reduce its effect or tries to make security strong as much as possible. The following are very basic defense mechanism against DDoS attacks are: Prevention Detection Classification Justifying Tracing back The first phase called prevention which means to prevent from DDoS attack as much as possible that is to prevent itself to be part of the attack architecture, so not to become handler. It is done through the continuous monitor of the systems but every user is not aware of the security issues. The second phase describes to know that if the systems are under attack by verifying abnormal activities like CPU or bandwidth uses, it can done through firewalls or routers. The third phase is classification of the detected attack according to its prototypes like IP Addresses, protocol used and packet type used; it can be done through the use of Intrusion Detection System for future countermeasure. The fourth mechanism is justifying the detected attack that is how to deal with the known or detected attack one way is to block the whole traffic from those addresses by using access control list on gateways or react accordingly another approach is to trace back the detected packet so that source ca n be identified. The final part of our defense mechanism is trace back which will be covered in later section of this paper. DDoS trace back DDoS trace back is possible to zombies only but may be if done in proper way can leads to the attacker, chances are very rare as it is independent of the location. Some of the methods are as follows: Link Testing Controlled Flooding ICMP Trace back IP Trace back In link testing, when attack is in progress routers can co ordinates with each other to determines which router originated the attack traffic and can trace to the upstream but requires inter ISP co operations as different connections are maintained by different ISP. Whereas in controlled flooding it floods each incoming links of the router to determines the source but needs router co operation and better network map, similarly in ICMP and IP trace back a reverse path is generated to identify the source but path can be long and packet format space is limited to cope. DDoS Security measures As currently various research are going on to stop DDoS attack and it may takes time but DDoS becoming deadly day by day and is considered second in financial losses due to attack after viruses but comparison to virus it is very new and have vast effect with no remedy. So only option we got is to make it harder for attacker to penetrate into the systems, and following are some security precaution we should follow: Install and update continuously antivirus and spyware software from trusted authority and run regularly. Patches the security components of the systems continuously and be always ready for up gradation of systems. A well set network infrastructure with proper installation of firewalls and routers with appropriate policies, so that unwanted traffic and organization traffic can be separated clearly. Filters incoming traffic on routers or rate-limit certain types of traffic like ICMP and SYN packets. Monitors continuously incoming and outgoing packets and if some abnormality seen then react accordingly. Use Network Address Translation (NAT) to hide internal IP addresses. Use Intrusion detection systems (IDS) implement host based IDS plus network based IDS in a mix pattern to filter and detect abnormalities in the network. Egress and Ingress filtering, these are filtering mechanism implement on IP traffic. Egress sets the ranges of IPs leaving the organizationà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒ ¢Ã¢â‚¬Å¾Ã‚ ¢s network whereas in ingress a set of IP address ranges are allowed to move into the network. Using of SYN and RST cookies to verifies both communication parties with the help of cookies, so that legitimate clients can access the resources. Use a proxy server in between the network so that a request goes via proxy to server and proxy filters it according the rules implemented on it. Implement Honeypots systems, these are the systems in an organization with open security and are separated with internal network to know the attack pattern. At last but not least literate the users or clients about the security concerns. Conclusion DDoS Attack is an attack on availability of the resources and services which results in financial losses, loss of organization reputation, and disturbance in work flow environment. The bitter truth is that the security technologies like firewall, routers and IDS are very week to prevent DDoS as it cannot differentiate between original and fake traffic. Another factor is that it uses IP spoofing, difficult to verify with original packets plus the routing involved is stateless. Hence results in very strong attack. In this paper we have gone through the DDoS overview with its architecture layouts plus types and tools involved in DDoS attack. We have highlighted the DDoS detection part and visualize the security aspects and implementation to safeguard the assets against such attack plus a brief summary to how to trace back. To compete with DDoS one way effort cannot prevent or defeat it, it needs all round support to tackle with it like among different internet communities, different countries to enforce such laws and regulation strictly to cope with it. suggestions DDoS is a newer and disastrous attack, so to prevent it I would suggest that very carefully implement DDoS security measures which are defined above. Beside these IPSec and SSL/TLS protocols implementation can helps a lot to prevent. VPNs can be added for secure channel communications. Use Mozilla Firefox as browser instead of others.

Sunday, October 13, 2019

The Coal War, by upton sinclair :: essays research papers

THE COAL WAR Book 1, The Social Chasm By: Upton Sinclair Upton Sinclair wrote The Coal War in 1976 being published by Colorado Associated University Press. Book One; "The Social Chasm," contained 69 pages while the entirety of The Coal War had 399 pages with two other Books. "The Social Chasm" was easy to follow and had an intriguing beginning. The Coal War portrays many situations common to the people of the coal fields and those making an effort to improve its conditions. This sequential story takes place in Western City and Harrigan College, where Hal attends. Through Hal, the main character of Upton Sinclair's story, Sinclair reveals his optimism as Hal's determination to fight the coal and mine laborers. The idea of Hal working alone to see that the fields and mines improve shows a general optimistic view. The Social Chasm tells of the hole that has been dug between the social classes. Hal, a wealthy man that has come from a prosperous and classy family, has heard of the cruelty and chaos that has been taking place at the coal camps in North Valley. Hearing stories of corruption, beatings, and even murders, Hal is convinced that the laborers' treatment be acknowledged and somehow improved. All of Hal's family and friends and even his fiancà ©e, Jessie Arthur, think his troubles and efforts are nothing more than stirring up controversy and disorder. Hal's first plan to expose the North Valley mistreatment was to use a poor boy that had lived in the coal camps and knew of its harm and neglect, named Little Jerry. His father, Jerry, had been beaten by guards who had found out he was a union leader, and was left to die. He recovered eventually, but incidents such as these were common in the camps and Hal was going to make sure that Little Jerry told everyone who could stop such treat ment, particularly those attending the Arthur party. The boy, however, just aroused sympathy and compassion from the higher classed people. He was just an unfortunate boy whom Santa Clause had not visited, and so the classy people filled his stomach with food, his hands with toys, and his eyes with glorious sites as he was given a tour of the Arthur estate. Now, having the actual crimes exposed, Hal wished to see the number of people who wanted to help him in his efforts to improve the camps and fields increase.

Saturday, October 12, 2019

Are College Students Getting the Grades They Deserve? :: School Education Essays

Are College Students Getting the Grades They Deserve? Students at Boston University complain of grade deflation College students work hard assuming that they will get the grade they deserve but this is not always the case. Caroline Boulanger, a sophomore business administration and management major at Boston University studies hard. In her freshmen economics class, her final grade was based on three exams. She received two "A's" and an "A-" on these exams. However, at the end of the semester, she ended up with a final grade of a "B-." She tried contacting her professor and he has still not gotten back to her, so she assumes her grade was deflated. Boulanger is not the only person who has had this problem as a result of the grading policy of Boston University. â€Å"I’ve heard that getting a 4.0 at this school is about as likely as winning the lottery or getting struck by lightening. It could be considered an act of god,† said Haley Goucher, a freshman premed student at Boston University. If a student does receive a 4.0 at Boston University they are in the minority. In a survey of 100 Boston University students, only 23% received an "A" in any one of their classes and 0% of the students had a GPA of 4.0. Many of these students expressed that this sudden decline of grades made them lose confidence in their work and themselves. â€Å"People who did well in high school have trouble transitioning sometimes. They work hard and they still feel stupid,† said Alex Corhan, a sophomore journalism major at Boston University. There is no formal grading policy at Boston University but the university does give several guidelines for professors to follow. â€Å"Don’t be a grade-inflater! Grades should reflect the distribution of effort and success in the class †¦ If your distribution of grades is skewed toward the high end, it might imply that either an 'A' does not require a high level of achievement in the course or you are demanding too little of your students,† the Boston University College of Arts and Sciences â€Å"Information for Faculty Instructors† states. Not only does Boston University strongly discourage grade inflation, but they evaluate their professors by how high they grade their students. This leads to problems for both professors and students. â€Å"The individual colleges monitor the grade distribution of courses and let instructors know if their grades seem to be considerably higher or lower than the norm. Are College Students Getting the Grades They Deserve? :: School Education Essays Are College Students Getting the Grades They Deserve? Students at Boston University complain of grade deflation College students work hard assuming that they will get the grade they deserve but this is not always the case. Caroline Boulanger, a sophomore business administration and management major at Boston University studies hard. In her freshmen economics class, her final grade was based on three exams. She received two "A's" and an "A-" on these exams. However, at the end of the semester, she ended up with a final grade of a "B-." She tried contacting her professor and he has still not gotten back to her, so she assumes her grade was deflated. Boulanger is not the only person who has had this problem as a result of the grading policy of Boston University. â€Å"I’ve heard that getting a 4.0 at this school is about as likely as winning the lottery or getting struck by lightening. It could be considered an act of god,† said Haley Goucher, a freshman premed student at Boston University. If a student does receive a 4.0 at Boston University they are in the minority. In a survey of 100 Boston University students, only 23% received an "A" in any one of their classes and 0% of the students had a GPA of 4.0. Many of these students expressed that this sudden decline of grades made them lose confidence in their work and themselves. â€Å"People who did well in high school have trouble transitioning sometimes. They work hard and they still feel stupid,† said Alex Corhan, a sophomore journalism major at Boston University. There is no formal grading policy at Boston University but the university does give several guidelines for professors to follow. â€Å"Don’t be a grade-inflater! Grades should reflect the distribution of effort and success in the class †¦ If your distribution of grades is skewed toward the high end, it might imply that either an 'A' does not require a high level of achievement in the course or you are demanding too little of your students,† the Boston University College of Arts and Sciences â€Å"Information for Faculty Instructors† states. Not only does Boston University strongly discourage grade inflation, but they evaluate their professors by how high they grade their students. This leads to problems for both professors and students. â€Å"The individual colleges monitor the grade distribution of courses and let instructors know if their grades seem to be considerably higher or lower than the norm.

Friday, October 11, 2019

Deception Point Page 57

â€Å"Where†¦ are we?† Rachel managed, the simple act of trying to speak bringing on a crashing headache. The man massaging her replied, â€Å"You're on the medical deck of a Los Angeles class-â€Å" â€Å"On deck!† someone called out. Rachel sensed a sudden commotion all around her, and she tried to sit up. One of the men in blue helped, propping her up, and pulling the blankets up around her. Rachel rubbed her eyes and saw someone striding into the room. The newcomer was a powerful African-American man. Handsome and authoritative. His uniform was khaki. â€Å"At ease,† he declared, moving toward Rachel, stopping over her and gazing down at her with strong black eyes. â€Å"Harold Brown,† he said, his voice deep and commanding. â€Å"Captain of the U.S.S. Charlotte. And you are?† U.S.S. Charlotte, Rachel thought. The name seemed vaguely familiar. â€Å"Sexton†¦,† she replied. â€Å"I'm Rachel Sexton.† The man looked puzzled. He stepped closer, studying her more carefully. â€Å"I'll be damned. So you are.† Rachel felt lost. He knows me? Rachel was certain she did not recognize the man, although as her eyes dropped from his face to the patch on his chest, she saw the familiar emblem of an eagle clutching an anchor surrounded by the words U.S. NAVY. It now registered why she knew the name Charlotte. â€Å"Welcome aboard, Ms. Sexton,† the captain said. â€Å"You've gisted a number of this ship's recon reports. I know who you are.† â€Å"But what are you doing in these waters?† she stammered. His face hardened somewhat. â€Å"Frankly, Ms. Sexton, I was about to ask you the same question.† Tolland sat up slowly now, opening his mouth to speak. Rachel silenced him with a firm shake of her head. Not here. Not now. She had no doubt the first thing Tolland and Corky would want to talk about was the meteorite and the attack, but this was certainly not a topic to discuss in front of a Navy submarine crew. In the world of intelligence, regardless of crisis, CLEARANCE remained king; the meteorite situation remained highly classified. â€Å"I need to speak to NRO director William Pickering,† she told the captain. â€Å"In private, and immediately.† The captain arched his eyebrows, apparently unaccustomed to taking orders on his own ship. â€Å"I have classified information I need to share.† The captain studied her a long moment. â€Å"Let's get your body temperature back, and then I'll put you in contact with the NRO director.† â€Å"It's urgent, sir. I-† Rachel stopped short. Her eyes had just seen a clock on the wall over the pharmaceutical closet. 19:51 HOURS. Rachel blinked, staring. â€Å"Is†¦ is that clock right?† â€Å"You're on a navy vessel, ma'am. Our clocks are accurate.† â€Å"And is that†¦ Eastern time?† â€Å"7:51 P.M. Eastern Standard. We're out of Norfolk.† My God! she thought, stunned. It's only 7:51 P.M.? Rachel had the impression hours had passed since she passed out. It was not even past eight o'clock? The President has not yet gone public about the meteorite! I still have time to stop him! She immediately slid down off the bed, wrapping the blanket around her. Her legs felt shaky. â€Å"I need to speak to the President right away.† The captain looked confused. â€Å"The president of what?† â€Å"Of the United States!† â€Å"I thought you wanted William Pickering.† â€Å"I don't have time. I need the President.† The captain did not move, his huge frame blocking her way. â€Å"My understanding is that the President is about to give a very important live press conference. I doubt he's taking personal phone calls.† Rachel stood as straight as she could on her wobbly legs and fixed her eyes on the captain. â€Å"Sir, you do not have the clearance for me to explain the situation, but the President is about to make a terrible mistake. I have information he desperately needs to hear. Now. You need to trust me.† The captain stared at her a long moment. Frowning, he checked the clock again. â€Å"Nine minutes? I can't get you a secure connection to the White House in that short a time. All I could offer is a radiophone. Unsecured. And we'd have to go to antenna depth, which will take a few-â€Å" â€Å"Do it! Now!† 67 The White House telephone switchboard was located on the lower level of the East Wing. Three switchboard operators were always on duty. At the moment, only two were seated at the controls. The third operator was at a full sprint toward the Briefing Room. In her hand, she carried a cordless phone. She'd tried to patch the call through to the Oval Office, but the President was already en route to the press conference. She'd tried to call his aides on their cellulars, but before televised briefings, all cellular phones in and around the Briefing Room were turned off so as not to interrupt the proceedings. Running a cordless phone directly to the President at a time like this seemed questionable at best, and yet when the White House's NRO liaison called claiming she had emergency information that the President must get before going live, the operator had little doubt she needed to jump. The question now was whether she would get there in time. In a small medical office onboard the U.S.S. Charlotte, Rachel Sexton clutched a phone receiver to her ear and waited to talk to the President. Tolland and Corky sat nearby, still looking shaken. Corky had five stitches and a deep bruise on his cheekbone. All three of them had been helped into Thinsulate thermal underwear, heavy navy flight suits, oversized wool socks, and deck boots. With a hot cup of stale coffee in her hand, Rachel was starting to feel almost human again. â€Å"What's the holdup?† Tolland pressed. â€Å"It's seven fifty-six!† Rachel could not imagine. She had successfully reached one of the White House operators, explained who she was and that this was an emergency. The operator seemed sympathetic, had placed Rachel on hold, and was now, supposedly, making it her top priority to patch Rachel through to the President. Four minutes, Rachel thought. Hurry up! Closing her eyes, Rachel tried to gather her thoughts. It had been one hell of a day. I'm on a nuclear submarine, she said to herself, knowing she was damned lucky to be anywhere at all. According to the submarine captain, the Charlotte had been on a routine patrol in the Bering Sea two days ago and had picked up anomalous underwater sounds coming from the Milne Ice Shelf-drilling, jet noise, lots of encrypted radio traffic. They had been redirected and told to lie quietly and listen. An hour or so ago, they'd heard an explosion in the ice shelf and moved in to check it out. That was when they heard Rachel's SOS call. â€Å"Three minutes left!† Tolland sounded anxious now as he monitored the clock. Rachel was definitely getting nervous now. What was taking so long? Why hadn't the President taken her call? If Zach Herney went public with the data as it stood- Rachel forced the thought from her mind and shook the receiver. Pick up! As the White House operator dashed toward the stage entrance of the Briefing Room, she was met with a gathering throng of staff members. Everyone here was talking excitedly, making final preparations. She could see the President twenty yards away waiting at the entrance. The makeup people were still primping. â€Å"Coming through!† the operator said, trying to get through the crowd. â€Å"Call for the President. Excuse me. Coming through!† â€Å"Live in two minutes!† a media coordinator called out. Clutching the phone, the operator shoved her way toward the President. â€Å"Call for the President!† she panted. â€Å"Coming through!† A towering roadblock stepped into her path. Marjorie Tench. The senior adviser's long face grimaced down in disapproval. â€Å"What's going on?†

Thursday, October 10, 2019

The National Origins Act of 1924

The National Origins Act of 1924 was a law that restricted the number of immigrants allowed to enter the U.S. by establishing a system of national quotas that blatantly discriminated against immigrants. The Immigrants that was restricted were from southern and eastern Europe and which then virtually excluded Asians. The policy stayed in effect until the 1960s. The National Origins Act established a system of immigration, which required immigrants to have a visa issued by an American consular officer abroad before immigrating to the United States. It completely changed the patterns of immigration throughout the twentieth century. This measure sharply reduced immigration to America, and especially targeted those from southern and eastern Europe. Which it did not affect America per say, really affected people from Europe who wanted to migrate to the United States. The 1965 Immigration Act is the foundation of America's current legal immigration system. It abolished the Immigration Act of 1924 that had been in place in the United States since 1924. Overriding past quota systems that heavily favored Europeans. It was the act declared that no person shall receive any preference or priority or be discriminated against in the issuance of an immigrant visa because of the person's race, sex, nationality, place of birth or place of their residence. The Act based on reuniting immigrant families and attracting skilled labor to the United States. They are coming from a range of countries and cultures and are transforming cities, suburbs, and rural areas and are affecting schools, religions, politics, and health care. A higher proportion now already have professional skills and college degrees. Part 2: Labor Immigrants Labor Immigrants are immigrants that come to the United States undocumented, not all of them are undocumented but many come to America undocumented. Many of them are EWI's, visa abusers, and some come over as temporary workers. Some who are undocumented, they may have regularized status. Labor Immigrants often come to America from poorer countries. Immigrants come through family reunification or as refugees. They are drawn by the lure of higher wages in the United States from their country. Often in other foreign countries, they're pay scales do not compare as the United States pay scale. That's why often foreigners come  over to America to work in order to provide for their families due to better pay. Labor Immigrants occupation consists of agriculture, construction, garment and   omestic. Compared to both the native and overall foreign-born worker population, Mexican and Central American workers are less likely to be employed in professional and related industries. They are more likely to be employed in the construction and non-durable goods manufacturing industries. Often times, labor immigrants live in small apartments complex's or in small homes which a Lot of immigrants will live together and help to pay rent. Typically, Immigrants will live in cities or nearby than versus living out in rural areas. Many do receive some aid in housing by the federal government because they are given visa's to work in America. The biggest problem many show is speaking English, because they haven't learned English. So a few speak enough English to get by or often I seen many of times, is that they have a friend that speaks English pretty decent and then tells them what to do in their language in order to complete task. Part 2 continued: Professional Immigrants Professional Immigrants are highly trained individuals who move to fill an economic niche in a middle-class profession often marked by shortages in the receiving country. The United States Immigration policy encourages this type of immigration. Therefore, most in this category come illegally in the United States. Many immigrants find too few professional  opportunities in their home countries so that's why they come to America to work. Most of the professional immigrants have college degrees or either some-sort of degree in a trade to obtain knowledge or in order to work for companies. They are very hard workers in this field.  Often enter at the bottom of their fields in the United States which refers to brain drain. You see many professional immigrants working in construction such as working on building new omes. Many of these immigrants go to school to learn that type of trade or even companies will hire them and train them as they progress. I will hear when some companies will even pay for their schooling in order to move them up in ranks. Often professional immigrants live in small apartments complex's or in small homes which a Lot of immigrants will live together and help to pay rent. They will also live with their  families in a house while the husband goes to work and the wife stays home and takes care of their children if they have any. Typically, Immigrants will live in cities or nearby than versus living out in rural areas. Yet again, the biggest problem many show is speaking English, because they haven't learned English. So a few speak enough English to get by or often I seen many of times, is that they have a friend that speaks English pretty decent and then tells them what to do in their language in order to complete task. Part 3: I chose the documentary film, In â€Å"Dollars and Dreams: West Africans in New York†, the immigrants all start in the same place but they all ended up going in many different directions. From dishwashers, to house builders, to construction workers, and to entrepreneurs making millions. The location of New York fulfilled the expectations of some immigrants because of many different jobs, but some did not feel that way. The America dream is hard to achieve and a lot of hard work to achieve what you want in life which several of these immigrants did. I definitely agree in hard work because I think you can achieve greatness through hard work. In the podcast â€Å"This America Life: Immigration† the narrator discusses how Mexican immigrants revolutionized/evolved the chicken industry in the south in the United States. More importantly in a small town in Albertville located in Alabama. Soon after, Mexican immigrants started to funnel in and take positions in the factory from other workers who had worked there for years. Therefore, it would cause conflict amongst workers inside the work place. One of the black workers said for the first time he had felt unified working with the white workers to fight against this issue. The other workers felt that Mexicans were taking their positions because they were harder workers and fearing being fired unlike the white people. This particular podcast did very well in showing both sides of the argument. This helped me to understand not only the views on what I heard about Mexicans taking America jobs, but also showed how the Mexicans revolutionized this industry to benefit themselves and as well as their families. I Totally agree with Mexicans/ foreigners being hard workers because my dad is real estate appraiser and I will go with him while he does his work. I would just sit in the truck sometimes and watch them work and they do work very hard and very long days versus a white worker. Lastly, I chose â€Å"Maeve in America: children of Immigrants, Listen to your Parents† explores case by case of examples how immigrants children share several similarities in how they were raised as a child by their parents. The children experienced parents who lacked to share culture and thus redistricted their children from developing. For example, an Indian parent did want their child to participate in going over friend's house in spending a night over a friend's house. Hearing these stories about how the immigrant parents helped me connect what I learned in class to what actually happens in today's society and what actually really goes on. It just made me sit back and think that I'm really grateful for what I have in my life and what I have learned so far.