Saturday, August 31, 2019

American Civil War was not just the war of ideology

According to fundamentalist historians the American Civil War was not just the war of ideology: freedom versus slavery. The more significant reason was the power struggle initiated between free states and slave states due to the economic and political implications of slavery. Why common people chose to join the forces to fight this war, can be understood more clearly if this rationale is kept in mind. A northerner might have been more concerned about the independence of the south than slavery itself. While the southerner might have felt that secession would prevent the north from empowering the southern culture. This power struggle caused adversity and pain for millions of people, which is almost impossible to determine.As a direct consequence of the war, more than 350,000 Union soldiers were killed, while The Confederacy lost more than 250,000.   The lives of civil war soldiers were specially hard and arduous because they were mostly under-prepared and under-equipped. When they fi rst joined the army, they were housed in spacious barracks, but once they received their marching orders they were condemned the tent. In camp, the soldiers had to live in â€Å"dog tents† made from two pieces of canvas buttoned together. A majority of confederate soldiers weren’t issued any tents, so most of them had to contend with tents captured from the Union soldiers. In the winter, several soldiers would live in wooden huts made from logs and mud with a roof made from canvas or sawn boards (Gettysburg).Reveille was sounded to begin the day at 5 AM, followed by an assembly for morning roll call and breakfast call. Sick call was sounded soon after breakfast, followed by assemblies for guard duty, drill, or to begin the march. Drummers were also important on the march to keep soldiers in step during parades and to call them to attention. In battle, drums were sometimes used to signal maneuvers and give signals for the ranks to load and fire their weapons. Soldiers d rilled as squads and in company formations, each man getting accustomed to orders and formations such as marching in column and in a â€Å"company front†, how to face properly, dress the line, and interact with his fellow soldiers. After an hour of drill on that level, the company moved onto regimental level drills and parades.The Union private’s salary was $13 per month until June '64, after which he got $16. The Confederate private was paid at the pre-war rate of $11 per month until June '64, when the pay raised $7 per month. Soldiers were supposed to be paid every two months in the field, but they were lucky if they got their pay at four-month intervals (in the Union Army) and sometimes they even went six to eight months without being paid. Payment in the Confederate Army was even slower and less regular (Boatner).The types of food that were provided to the soldiers were limited because as they did not have any way of preserving the food. Meats were salted or smoked while other items such as fruits and vegetables were dried or canned. Daily rations for Union soldiers included 12 oz of pork or bacon or 1 lb. 4 oz of fresh or salt beef; 1 lb. 6 oz of soft bread or flour, 1 lb. of hard bread, or 1 lb. 4 oz of cornmeal. Per every 100 rations there was issued 1 peck of beans or peas; 10 lb. of rice or hominy; 10 lb. of green coffee, 8 lb. of roasted and ground coffee, or 1 lb. 8 oz of tea; 15 lb. of sugar; 1 lb. 4 oz of candles, 4 lb. of soap; 1 qt of molasses. In addition to or as substitutes for other items, dried vegetables, fruit, pickles, or pickled cabbage might be issued (Boatner).Confederate rations were smaller in quantity but essentially the same. It was up to the soldiers to find ways of cooking their own food. The most common diet of both armies was hard bread, or â€Å"hardtack.† This was the easiest for the soldiers to carry when on the march. The hardtack cracker became an item of humor to the soldiers of both sides because it was such an outrage. With rations sometimes being issued at an irregular rate, the soldier had to turn to foraging. Turkeys, geese, chickens, ham, bread and anything edible was taken (Vasile). Some men turned into obsessive foragers, spending most of the day reinforcing their possessions in any way possible. Most of these were never to be found on the field of battle.The soldiers were not provided with summer fatigues as were during later wars. The basic uniform material was wool. The average Union soldier had to carry about fifty pounds of gear and clothing which included: a musket, bayonet, cartridge box (40 rounds), belt, cap, pouch, haversack, canteen, knapsack, blanket, shelter half, winter greatcoat, tin cup and plate, and leggings. This cost the Federal Government about forty-two dollars per man in 1861 (Vasile). The soldiers would get rid some of the more unnecessary items, but would later regret throwing away the items like the greatcoat come winter.Most of the free time w as spent writing letters home at every opportunity. It was the only method of communication with family. Some even sent home money to support their families. Mail day caused huge celebration in the camp and distress when it was delayed. Union soldiers could so to the sutler's store to barter for toiletries, canned fruit, etc at inflated prices. Confederates did not have the luxury of sutlers, which disappeared soon after the war began. Instead they depended on the generosity of folks at home or farmers and businessmen near the camps (Gettysburg).Many of the men attended church services on a regular basis and some even carried small testaments with the rest of their baggage.Discipline in the military was very strict. Petty offenses such as shirking camp duty or not keeping equipment in good order were usually treated with extra duties such as digging latrines, chopping wood, or standing extra hours on guard duty. â€Å"Bucking and gagging† was also common punishment- the soldi er’s limbs were bound and he was gagged so he could not speak. In the artillery, the guilty person might be tied to the spare wheel on the back of a caisson. Desertion, spying, treachery, murder, or threats on an officer's life were the most serious offenses to which the perpetrator was condemned to military prison or shot by a firing squad. Crimes committed against civilians were also punishable by the army and felons were executed by hanging before a formation of soldiers.The boredom of camp life, the drill, the sickness and loneliness all became secondary and seemed to be forgotten on the day of the battle. Although fighting consumed a small portion of the soldier's actual time in the service, the thought of it was never far from his mind. They were all afraid. But they were not only afraid of being killed or wounded. They also had a dread of losing their nerve in combat and running from the battlefield. This would bring shame upon themselves and their regiments (Vasile).T he lack of medical knowledge, failure to provide ample antiseptics to wounds and the horrible effects of modern weapons forced doctors to favor amputation in most cases. Unsanitary conditions existed virtually in every soldier’s camp during the war. Unsuitable or inadequate clothing, unhealthy food and contaminated water contributed to diseases. The adoption of an ambulance corps and field hospital system also helped the wounded in their time of need. Until it was established, there was no way for the wounded to be evacuated to the rear and receive proper medical care (Vasile).The end of the war in 1865 brought a welcome peace, especially for the men who served as soldiers. Armies were disbanded and regiments mustered out of service. Former soldiers returned to the farms and stores they had left so long ago

Friday, August 30, 2019

Globalization & Getting a handle Essay

We cannot overstate the effects of the trend of globalization on our thinking, culture and the media. From the television ads and shows, our style of dressing and the way we converse and communicate with each other in our own country and people from overseas. What is this phenom that we call globalization? How does it affect us now and in the future? What are its benefits as well as its drawbacks? This paper will try to put a body, a face if you will, on the globalization trend. II. DEFINITIONS: Globalization refers to† increasing global connectivity, integration and interdependence in the social, economic, technological cultural, political and ecological spheres. † It can also be defined as a â€Å"comprehensive term for the emergence of a global society in which economic, political, environmental and cultural events in one part of the world quickly come to have significance in other parts of the world†. Now basing from the definitions given, it can mean that globalization can come to mean a trend toward the interconnectivity or interdependence on one another even if we are in two different places. This is its basic concept that is to establish more and better lines by which the world can be bought together in ever increasing ways and means. Now for the questions on how this trend affects the media industry, we can just take a look at the Internet. This system is ready at hand to connect different peoples and cultures with the touch of a button, as it can connect us more swiftly rather than the traditional modes of communication. III. THE EFFECTS ON THE FILM, RADIO AND TELEVISION INDUSTRIES: The entertainment industry have focused their energies on the larger overseas markets for the sale and the promotion of their current offerings, movies, radio shows, television shows have already become a staple in some countries that these have seemed to replace the local industries for the share for the slice of the local market in that country. At the core of the entertainment industry-film, music, television-there is a growing dominance of U. S. products. It can be seen in most parts of the world, products such as KFC, McDonalds or Coca- Cola just to name a few of the transnational companies doing business in other nations aside form the local market. These companies shop around other countries that have lower costs for doing business, thus spurring the local employment and talent pool from those countries to adapt their educational and training pools to the needs of the incoming foreign investors. Some companies, for example, America Online and Time Warner merged to form AOL Time, matching AOL’s Internet businesses and Time’s massive holdings in media, entertainment and news concerns. More and more of these companies ten to look overseas to promote their products and services abroad. But while the trend is focusing on global interconnectivity, that in our modern day environment, time and distance are a negligible factor in terms of dispensing media to other parts of the world. According to Professor Kalyani Chadha at the Philip Merill College of Journalism; â€Å"While popular rhetoric suggest that we live in an increasingly interconnected globalized world in which time and space have collapsed and media experiences are increasingly uniform, the reality is often different†¦ Media systems in different countries continue to be characterized by significant differences in press and broadcasting laws, business and economic structure, access to technology and to nature of journalistic practices, resulting often in variations in both content and perspective. † In a nutshell, it is saying that what may be true and acceptable in other countries and regions might not be acceptable, even palatable in some others. The difference may stem from the traditional as well as the cultural background in the country itself or in some belief system that this particular society holds. But in the discussion of the trend of globalization, the problem herein lies in the fact that in the march for interconnectivity, some of these traditions might have to give way. IV. EFFECTS ON CULTURE: The Webster’s Third New International Dictionary defines culture as the â€Å"the total pattern of human behavior and its products embodied in speech, action and artifacts and dependent upon man’s capacity for learning and transmitting knowledge to succeeding generations† Thus, cultural globalization can thus be defined as the worldwide cultural standardization. Also, it can refer to the postcolonial culture, cultural pluralism and â€Å"hybridization†, or bringing two or more cultures together to create a new one. In the picture of globalization, we must recognize that the global view will effect the change in the cultural standings of some nations. In the long run of things, we must be resigned to the fact that some of these traditions must give way. Remember that globalization is linked to affecting the global community concept, a â€Å"global village†, if you permit the phrase. ( Marshall McLuhan popularized this belief to highlight his observations that an electronic nervous system ( the media) was rapidly integrating the planet—events in one part of the world could be experienced from other parts in real-time, which is the human experience was like when we lived in small villages). In this â€Å"village†, everybody was with the same beliefs and held to the same traditions, at least most of the time. But in the set up of the globalization concept, those beliefs and traditions sometimes, if not most of the time, have to give way to the establishment of a unified set of beliefs from a strong or stronger source. That is cultural hegemony, wherein the stronger or predominant influence will produce ways of thinking and seeing, and especially eliminating alternative views to reinforce the status quo, meaning the status quo of the more predominant influence. Some people fear a loss of cultural diversity as U. S. companies become dominant. Such companies tend to â€Å"bundle† their products, meaning they ship their products in wholesale form. Movies, television shows audio products all come into the local market and compete with the local industry, thus competing for the attention of that market. These tend to replace local alternatives. This would explain in part the prevalence of the media especially the visual media to promote their advertisements in other countries without thinking of the sensibilities that the ad might be offending. Video games and television games flash ever more violent images that seem to engross kids from many nations that were not ready to absorb these kinds of media. All day long, hey would sit in front of the television and just either stare at the monitor watching these violent shows and absorb the values of the characters of the shows’ characters or sit endlessly at video games and get in to the violence that these game icons display. Local culture and social culture are now shaped by large and powerful commercial interests that earlier anthropologists could not have imagined. Early anthropologists thought of societies and their cultures as fully independent systems. But today, many nations are multicultural societies, composed of numerous subcultures. These subcultures are present and very visible to us, in the forms of food, clothes and even in the places that we often frequent. Rarely do we don’t see that in any of the places that we go, there is not one member of these subcultures that we don’t come across. And we tend to borrow these things, if you will, in the way that we prepare our food, the way we buy our clothes and shoes and other accessories, in our choice of products that seem to satisfy our craving to be what the television stars portray on camera. The values that seem to be displayed out there want to look like them, that we can somehow imitate the way they look to be what these companies want us to believe to be acceptable. People are therefore more biased in the products that they purchase or services that they get for themselves so the image that is bought in to them are to look like the people they see. The transnational companies can manipulate the way that people think of themselves also by making us think that standards have to be met in order for us to be acceptable, or part of what is acceptable in the eyes of the global society as a whole. In short, they dictate what constitutes the â€Å"good life†. For example, if you don’t have a certain kind of piece of clothing such a shirt or pair of sneakers, you’re supposed to feel left out of the loop. Or, in the case that you still wear a shirt that is not in fashion, and this is still dictated by the multinational companies abroad, you’re still going to be left out. Or if you don’t drive a certain brand of car or model of that car, it’s an antique they’ll say. In many instances, this trend of cultural globalization tends to make us want these companies say that we have to be to be happy. From whatever the products or producers say, is what we have been conditioned to think, that these are the keys to be living it up. It is argued that one of the consequences of globalization will be the end of cultural diversity, and the triumph of uni-polar culture serving the needs of transnational corporations. Hence, the world drinks Coca-Cola, watches American movies and eats American junk food.

Thursday, August 29, 2019

Ccot Essay

CCOT Essay: China 100 CE-600 CE China’s culture and it’s values have stayed as mostly continuities and few or little changes. The teachings and values of Confucianism that were so strong that they have lasted throughout the centuries of Chinese history and is still well-known today. These values included guidelines on respect. Chinese civilization during the classical civilization was a patriarchy and with the Confucius teaching which created the outline of how a good family should work like. Patriarchy was continuity for Chinese civilization.Many of Confucius’ beliefs and values will survive and withstand many potential changes to come. One of these changes were Buddhism, which came into China through many different paths such as the Silk Road. The Han Dynasty fell, causing China to go into a three year period of chaos. China’s cultural unity was threatened by the spread of Buddhism, though it was tone of the one ideas that was imported into China before the 20th century. Fortunately for China’s streak of continuity, the three century period of chaos would end which would also revive Confucianism.The rising and falling of dynasties were continuity. Confucianism took China’s social pieces and put them together. Even though China had many changes that took place from 100 C. E. to 600 C. E. , they always evened out culturally. They also remained in their streak of cultural continuity thanks to Confucius and his teachings. One of these continuities was the dynamic cycles, like the Zhou dynasty, the Qin dynasty, and the Han dynasty, because it had lasted throughout the Classical Era. Many things were changing around the time period.The first of these things was that the bureaucratic system. It was becoming more and more corrupt. Peasants and the regular people of China became poor. After germs and disease came, people started to die as well. Then nomads came, and due to the unstable government of China at the time, the army was not able to push them. Therefore, the Han dynasty was overthrown completely. The same sort of overthrowing by nomadic invasions happened in Rome as well. The Germanic invaders came in and broke Rome apart. Rome was then divided into three areas and was never completely revived ever again.After the three century period of chaos, the T’ang dynasty came later, in 618 C. E. to revive Confucianism and the bureaucratic system. During the classical era, the Chinese civilization underwent major governmental change. In China still physically remained strong and united. The reason for this is because China had a very solid social and political system that was based off of Confucianism. The cause of these major radical changes in China’s government is because of the weakened government; the nomadic invasions did not help either.

Wednesday, August 28, 2019

Quiet Torrential Sound by Joan Ackermann and a Seinfeld episode Essay

Quiet Torrential Sound by Joan Ackermann and a Seinfeld episode written by Larry David - Essay Example Of course, the main character of the story is Jerry Seinfeld, named after the writer and the producer. He is regarded as the â€Å"voice of reason† (buddychai, n.p). The entire story revolves around this life, and he has appeared consistently in all the episodes of all the different seasons. He is one of those characters, who have a focal point in the lives of the people around him, which include his best friend, his neighbor and his ex-girlfriend. The character of Jerry Seinfeld is mirrored after a real person, for his career in the show remains, that of a stand-up comedian, which also forms the career of the actual person. Jerry brings life to the sitcom, with his comments about his friend’s habits, who are to the say the least, quite quirky and live a very laidback life. This makes the character of Jerry quite observational. One would also find it interesting to observe that Jerry’s identity is closely intertwined with that of his friends. Jerry’s chara cter is shown in the light, through his social network. Prying by George into Jerry’s life shows the viewers about Jerry’s insecurities. Elaine always remarks on how Jerry breaks up with women almost every week, because he always finds reasons to break up with women, including the fact that he breaks up with a woman, because she had manly hands. Moreover, one can also notice Jerry’s stubbornness, for example, when he buys his parent’s car repeatedly, which actually affected him financially. However, any viewer would realize that although the show was meant to be about â€Å"nothing†, it actually shows everything there is about to life that is wholly represented by Jerry’s character. Although he is often frustrated with his friends’ habits, he always finds love and care for them. For example, in one episode â€Å"The Invitations†, Jerry became deeply worried, when George was about to get married because he felt that their group will not be the same

Dell Strategic Audit Essay Example | Topics and Well Written Essays - 500 words

Dell Strategic Audit - Essay Example After twenty years in the industry, Dell Computer Corporation changed their name to Dell Inc. in 2003. To reach as many global markets as possible, Dell under the management of Michael ensured that they had manufacturing plants and customer service stations in Asia, North America and Europe. Michael endorsed a new chief executive officer, Kevin Rollins in 2004. Kevin made sure that Dell Inc. continued with the same focus linked with driving costs out of supply chain and reaching more foreign markets. Between 2005 and 2007, Dell started to face loses in the market share because the competitors had found ways to imitate its innovations. In addition, the company faced negative new coverage with so much investigation by the Exchange and Securities Commission for irregularities linked to accounting. Rollins could not stand the poor financial performances and decided to resign in 2007 and Michael was up for the task once more. It is evident that this poor performance by Dell was as a result of irregularities in the financial statements from 2003 to 2006. By the time Rollins resigned, Dell had relinquished the position of market share leadership and dropped to become a resurgent competitor. In order to recover, Michael decided to branch out into providing personal computers by retailing. At that time, Dell was operating on a cost reduction plan of three billion dollars annually. Michael announced on September that the company was going to sell most of its manufacturing facilities within one and a half years. This strategy was initiated to try and get back Dell on track and see the stock price growing again. Dell inc. lost its competitive advantage to Hewlett-Packard that became the top supplier of personal computers. Dell Inc. modified its manufacturing model to boost the retail efforts. In addition, the company’s focus became manufacturing high volume products. By 2008, Dell Inc. had sold out more than 12, 000 of its facilities. The focus was

Tuesday, August 27, 2019

Ratio Analysis Case Speech or Presentation Example | Topics and Well Written Essays - 750 words

Ratio Analysis Case - Speech or Presentation Example Investors of the company regard it as a poor investment because it has poor current and future performance. They anticipate lower growth in the future. As far as the well-being of the common stockholders are concerned, the company is able to provide them some returns in the form of dividends even though it might be lower than that of other companies in the industry. Stephens Company has a higher gross margin percentage implying reasonable profit as the company is keeping overhead costs in control. In terms of liquidity, the firm is relatively liquid. Its current ratio is greater than one meaning it is able to meet its near-term obligations with lots of ease. Its quick ratio is less than one implying that it  is unable to meet its short-term using its most liquid assets. The company is less liquid than other companies in the industry because it has lower quick and current ratios. In terms of efficiency, the company is less efficient in managing its liabilities and using its assets to generate income. Its average collection and sales period are more than that of other companies in the industry. The company’s efficiency in collecting its receivable is less than that of the industry. Additionally, the company has higher days’ inventory on hand. In terms of leverage, the company uses more debt than equity. It has a debt to equity ratio of 2. It is highly leveraged than other companies. Even, though it is highly leveraged, it has more cover for the interest expense (TIE=3.08 times), but the cover is less than that of other companies in the industry. In general, the company is able to pay both the long-term and short-term debts. The loan should be approved. First the company makes a reasonable profit which is sufficient enough for its daily operations. Secondly, the company has higher cover the for the interest expense implying lower risk as a result of bankruptcy. Finally, the company is able to provide common

Monday, August 26, 2019

BFS 3430-09D, PRINCIPLES OF FIRE BEHAVIOR (BFS3430-09D) Essay

BFS 3430-09D, PRINCIPLES OF FIRE BEHAVIOR (BFS3430-09D) - Essay Example Fire research is conducted because the authorities of United States must be willing to analyze the impacts of the measures that are taken in order to handle any fire related situations. The fire researches are conducted in order to check the efficacy of fire department in reducing any threats of fire outbreak. In addition, the authorities are also interested to know and assess whether any further measures and advancements are required to cope the issue of fire outbreak or not. Fire researches are also there because the USFA wants to know the precautionary steps that are taken by people in order to construct any buildings. The buildings must be constructed by considering the risk of fire outbreak and there must be sufficient measures for safety of lives. Therefore, it is quite clear that fire research in the United States is conducted in order to gain awareness about the authenticity of present developments related to fire handling and to assess the effectiveness of fire department in resolving any fire related situation. The fire researches are also there to make the performance of fire department better. Walton, William D., Bryner, Nelson and Jason, Nora H. (Ed.) (2000). Fire Research Needs Workshop Proceedings. Gaithersburg: National Institute of Standards and Technology. Accessed on 20th June 2009 from

Sunday, August 25, 2019

Reward and Development Assignment Example | Topics and Well Written Essays - 1500 words

Reward and Development - Assignment Example This experience is also an outcome of learning from one’s peers, therefore we can safely state that experience passes on through generations. Building a Learning Organization One of the models identified for building a learning organization encompasses the organization, people, knowledge and technology as the four key pillars on which organizational learning is based (Serrat, 2009). This model states that people are required for the learning within an organization through the transfer of knowledge amongst them and through the implementation of innovative technology. Charles Darwin once said that the species most responsive to change is the one that is bound to thrive in a competitive world, and how right he was. Over the years the ever increasing progress in technology has pressed for the need to have skilled and knowledge workers, this has also been a key point of interest of training and development programs within and beyond organizations. There are several different theori es of organizational development that have been proposed by theorists, let us take a look at a few of them: The Humanistic Approach In response to the limitations that accompanied the psychodynamic theories, the concerns raised by some renowned philosophers such as Abraham Maslow led to the development of the humanistic perspective. This perspective aimed to incorporate the aspects of human needs within the theoretical framework. A comparison of the humanistic perspective to the Economic-Based Model of the firm revealed few differences regarding the approach of the two models towards the people aspect of a firm. The most important difference lies in the fact that the Economic-Based Model assumed that human beings are motivated only by self-interest which leads to a very profit oriented organizational focus, as opposed to the Humanistic perspective which emphasizes on an organization that comprised of empowered employees who when working in the organization feel that they are adequat ely applying themselves in the work and are not treated as money minting machines. This difference in the two models makes the Humanistic Model more pro Organizational Learning and Development as opposed to the Economic-Based Model (Rosanas, 2009). This perspective is strongly knitted to the Human Relations Approach to organizational development, which emphasizes on the need of good working relationships amongst employees and good leadership which is pivotal for the progress of the organization (Approaches to Organization And Management, 2009). Performance Management Moreover, we have the classical perspective which is similar to performance management. In this approach the emphasis lays towards achieving the goals that have been set out by the organization, formal management hierarchy is maintained and employee empowerment is reduced compared to the humanistic perspective. The â€Å"Psychological Contract† is a subjective expectation and belief of the employees regarding how they see their relationship with their organization. This psychological contract determines the employees’ level of satisfaction within the organization and his/ her level of motivation (Coyle-Shapiro, 2002). This is not a written contract however; this tacit agreement has many powerful behavioural and attitudinal outcomes. Employees feel attached to their

Saturday, August 24, 2019

Human gene Essay Example | Topics and Well Written Essays - 750 words

Human gene - Essay Example This paper attempts to explore the organization, structure, history and regulatory elements associated with the GALT gene, and understand how a mutation will lead to occurrence of galactosemia. GALT is the official symbol for the galactose-1-phosphate uridyl transferase gene. The position of GALT is 13 on the shorter p arm of the chromosome 9. The more exact molecular positioning of GALT on chromosome 9 can be described as starting at base pair 34,646,585 till ending at base pair 34,650,594 (Genetics Home Reference). The organization of GALT encompasses 11 exons spanning approximately 4-4.3 kb. The GALT gene encodes proteins with a 43 kDa molecular mass, consisting of about 379 amino acids length. Two molecules or a dimer make up an active GALT enzyme and contain a molecular mass of around 88 kDa. It has been found that disruption in the Q188R region is the most common mutation found to cause classic galactosemia with a relative frequency of 60%. It is because a His-Pro-His motif is present at exon 6 in the functional site, which significantly impairs the entire gene functioning if mutation occurs proximal to this region of the gene (Calderon, 939-40). People with classic galactosemia have been identified with over 180 mutations in the GALT gene. The structural illustration of GALT gene is presented in fig 01. Figure 01. GALT Gene Structure. Source: AGCOH (2009). The genetic deficiency is inherited in an autosomal recessive manner requiring the copy of GALT sequence from both carrier parents (Elsas). Though the incidence rate of GALT deficiency is different among nations, about 1 in every 62 000 has been estimated in pan-ethnic populations. The incidence rate in travelers from the Irish populations is also significant (Murphy et al., 550). The GALT gene is responsible for the synthesis of GALT enzyme in the liver. The GALT enzyme catalyzes the breakdown of galactose-1-phosphate into available glucose as an energy source in the second step of the Leloir metaboli sm pathway (Reichardt, 194). Galactose is a product of the larger sugar Lactose found in all milk and dairy products. The reaction also produces UDP-galactose that is further employed in the formation of sugar containing proteins and fats. These galactose-containing proteins and fats have multiple roles in various body functions such as chemical signaling pathways, construction of cell structure, molecule transportation and energy production (Genetics Home Reference). The GALT enzyme reveals a ping-pong, bi-bi kinetics that describes the binding of one domain of enzyme with uridine diphosphate (UDP) glucose, which forms enzyme-UDP-glucose intermediate. The uridine monophosphate stays attached to GALT and the glucose-1-phosphate becomes free. The GALT uridine monophosphate then binds galactose-l-phosphate to develop GALT-UDP-galactose. The UDP-galactose becomes free of the GALT, and allows it to cycle the next reaction (Elsas and Lai, 40). The failure of GALT enzyme to metabolize gal actose results in building up of Galactose-1-phosphate to toxic levels in the body, which can give rise to several health issues such as jaundice, feeding issues, weight faltering, liver damage, bleeding, hyperammonemia, sepsis, infections, cataracts, dyspraxia, ovarian failure, and neural abnormalities

Friday, August 23, 2019

CCNA Basic (Final Assignment) Essay Example | Topics and Well Written Essays - 1000 words

CCNA Basic (Final Assignment) - Essay Example 4. Define redistribution filters, if desired. 5. Enable redistribution, if you defined redistribution filters. 6. Modify default global and port parameters as required. 7. Modify OSPF standard compliance, if desired To enable OSPF enter enable ospf and respond to the prompts: OSPF Config>enable ospf Estimated # external routes[0] 200 Estimated # OSPF routers [0] 60 OSPF Config>set area Area number [0.0.0.0] 0.0.0.0 Authentication Type (0:NONE, 1:SIMPLE, 2:CRYPTOGRAPHIC) [0] 1 Is this a stub area [No]: OSPF Config>set interface Interface IP address [0.0.0.0] 172.16.100.030 Attaches to area [0.0.0.0] 0.0.0.0 Retransmission Interval (in seconds) [5] Transmission Delay (in seconds) [1] Router Priority [1] Hello Interval (in seconds) [10] Dead Router Interval (in seconds) [40] Type Of Service 0 cost [1] 5 Authentication Key Retype Auth. Key Message Digest Key ID [0] MD5 Key Retype MD5 Key Override the default OSPF interface-type [No]: y OSPF interface-type override (1=broadcast, 3=NBMA, 5=point-to-multipoint) [0] 3 Poll Interval [120] Forward multicast datagrams [Yes]: Forward as data-link unicasts [No]: OSPF Config>set virtual-link Virtual endpoint (Router ID) [0.0.0.0] 10.10.10.1 Link's transit area [0.0.0.1] Retransmission Interval (in seconds) [10] Transmission Delay (in seconds) [5] Hello Interval (in seconds) [30] Dead Router Interval (in seconds) [180] Authentication Key Message Digest Key ID [0] Message Digest Key Retype Message Digest Key (c) Configure manual summarization for 10.201.1.0/24, on serial 2, using EIGRP - using an example of one default route hostname branch1 ! interface Serial2 ip address 10.201.1.0 255.255.255.0 ... router eigrp 10 redistribute static metric 56 100 255 1 255 network 10.201.0.0 ! ip classless ip route 0.0.0.0 0.0.0.0...This will allow you to have 32 subnets (25). After using the five bits for subnetting, you are left with 11 bits for host addresses. Therefore, this will allow each subnet to have 2048 host addresses (211), 2046 of which could be assigned to devices. (d) Configure DHCP using a pool called 'ISP' containing 10.10.0.0/16. Include the default gateway of 10.10.0.01 and a DNS server at 10.10.0.5. Exclude the range of IP address from 10.10.0.1 to 10.10.0.15 Edit the /etc/dhcpd.conf file to configure DHCP service. In our setup, the server has IP address 10.0.0.1 and provides IP addresses up to 253 clients. Configure /etc/dhcpd.conf according to your environment:

Thursday, August 22, 2019

Cybersecurity Vulnerabilities Facing IT Managers Essay Example for Free

Cybersecurity Vulnerabilities Facing IT Managers Essay Cyber-security demands are ever increasing in the field of Information Technology with the globalization of the internet. Disruptions due to cyber-attacks are affecting the economy, costing companies billions of dollars each year in lost revenue. To counter this problem corporations are spending more and more on infrastructure and investing to secure the cyber security vulnerabilities which range anywhere from software to hardware to networks and people that use them. Due to the complexity of information systems that interact with each other and their counter parts, the requirement to meet specific cyber security compliances have become a challenging issues for security professionals worldwide. To help with these issues, security professionals have created different standards and frameworks over the years for addressing this growing concern of vulnerabilities within enterprise systems and the critical information they hold (â€Å"Critical Security Controls,† n.d.). Before we get into the details let first examine what exactly is a security vulnerability. By definition a security vulnerability can be flaws in hardware, software, networks or the employees that use them which in turn can allow hackers to compromise the confidentiality, integrity and availability of the information system (â€Å"Common Cybersecurity,† 2011). To thoroughly discuss this topic in more detail I will first discuss Confidentiality as it is one of the three main goals of IT Security. Confidentiality is as simple as it sounds, limiting access to resources for only those that need it. Confidentiality vulnerabilities occur when hackers try to exploits some weakness or flaw  within information system and view information that they are not normally allowed to. In this case the confidentiality of the documents have been compromised. The second goal of IT security which can also be affected if security vulnerabilities are present is Integrity. Integrity by definition can mean many different things for different topics but for the IT world it solely relates to the trustworthiness of a document or resource. This means that the document or file has been unhindered or changed and is still in its original form. This is very important because if data has been hindered or changed it can cause substantial damage to corporations due to the possible wrong decisions being made like investments or unintended publications or even trouble with the law if tax audits are not adding up properly which would all result in a net loss. The last goal of IT security which can be compromised if security vulnerabilities exist is Availability of the information system. Availability refers to the idea that a resource is accessible by those that need it, whenever they need it. In my personal opinion I believe availability is probably the most important out of the three security goals. I say this simply because there are many mission critical applications out there that need to be online 24/7 and any downturn can result in catastrophic results. One prime example of this is the air traffic control towers at LAX; they were having problems with the system a few months back due to the U-2 spy plane flying over their airspace. This caused major panic which grounded taxied planes that were ready to take off and forced the manual tracking of planes already in air (Ahlers, 2014). Throughout this the paper I intend to report on the many different types of cyber-security vulnerabilities available and their effects. I will also describe in detail the vulnerability I feel is the most important facing IT managers today, its impact on organizations and the solution. As I stated before there are many different types of security vulnerabilities out there which can affect the integrity, availability and confidentiality of a resource. So the question still remains what exactly are t hese types of vulnerabilities? Especially since they range from software, hardware, networks and the people that use them. Firstly I will discuss the software vulnerabilities, more specifically in terms of web applications. This is because more than half of the current  computer security threats and vulnerabilities today affect web applications and that number is ever increasing. (Fonseca, Seixas, Vieira, Madeira, 2014). When considering the programming language used to develop web applications you have PHP which is considered a weak language, on the other hand you have Java, C# and Visual Basic which are considered strong languages. It is important to note that the language used to develop the web applications is very important because although the different programming languages are similar overall, each one has different rules of how data is stored, retrieved, the execution methods, tables and so on. For example when I say how data is stored and retrieve, I am basically regarding to data types and data structures and how the programming language that is being used maps their values into type fields like strings for names, Int for numbers, or even Boolean for true and false statements. Overall though even if you are using a strong typed language like Java, it does not always guarantee itself free from defects because the language itself may not be the root cause of the vulnerability but possibly the implementation methods used or even insufficient testing (Fonseca, Seixas, Vieira, Madeira, 2014). Vulnerabilities in web applications invite XSS exploits and SQL injection which are the most common types. Below you can see in the image the evolution of reports caused by SQL injection and XSS exploits over the years. This next section we will discuss some more types of security vulnerabilities, more specifically vulnerabilities with regards to hardware. Many people assume that hardware vulnerabilities have the lowest security concern compared to other types of vulnerabilities like software, networks and people that use them simply because they can be stored up in secure environments. The truth is even hardware vulnerabilities can be easily susceptible to attacks. Hardware in general have a longer lifespan than software because simply with software you can upgrade it and install new patches/builds even after deployment. With hardware you once you purchase it, you are most likely going to keep it for a while. When it does become obsolete and ready to be disposed a lot of organizations make the simple mistake of not securely disposing the old hardware properly which in turn opens up the door for intruders. Old hardware have software programs installed on them and other things like IC transistors whi ch can help  hackers learn a lot more about the organization and help lead to future attacks (Bloom, Leontie, Narahari, Simha, 2012). The most recent example of hardware vulnerability which caused one of the biggest Cybersecurity breaches in history was most recently with Target. 40 million credit and debit cards with customer information was stolen simply because a malware was introduced to the point of sale system through a hardware encryption vulnerability (Russon, 2014). Although hardware vulnerabilities are not normally the root cause for majority of the exploits and breaches out there, it is always still good to follow best practices. Network vulnerabilities will be the next topic of discussion and my personal favorite. Vulnerabilities through network systems are very common especially with the all the resources available to hackers today. There are many open source software programs on the market which can help intruders learn critical information about an organization. Just to name a few of the most popular and commonly used ones include Nmap security scanner and Wireshark. Nmap security scanner was originally developed to be used for security and system administration purposes only, like mapping the network for vulnerabilities. Today it most commonly used for black hat hacking (Weston, 2013). Hackers use it to scan open unused ports and other vulnerabilities which in turn helps them gain unauthorized access to the network. Wireshark on the other hand is also similar to Nmap as it was originally developed for network analysis and troubleshooting. It allows administrators to view and capture all packet resources that passes through a particular interface. Over the years hackers have started using Wireshark to exploit unsecured networks and gain unauthorized access (Shaffer, 2009). Although scanning unused open ports and capturing packets are a great way for intruders to gain access to a network, the most popular method by far to breach a network is USB thumb devices. Most enterprise networks are very secure in the sense that they use a DMZ (De-militarized zone) and outside penetration becomes very difficult. In a de-militarized zone outside network traffic must go pass through two different firewalls to get to the intranet of the organization. The first firewall includes all the commonly used servers like FTP, SMTP and all other resources that can be accessible by the public. The second firewall has the actual intranet of the organization which includes all private resources (Rouse, 2007). Below is the diagram of a DMZ. So the question still remains, since most enterprise organizations use DMZ which in turn helps prevent port scanning or packet analyzing, why is USB thumb devices the most popular network vulnerability? (Markel, 2013) The answer is very simple â€Å"Social engineering†. We as human beings, through social conditioning do not stop and ask questions when were not familiar with someone, which in turn has become one of the major causes for the cybersecurity breaches that occur today. Just to give one example from my own personal experiences at work, each floor has an authentication swipe policy to gain entry. Every time I enter the office area, there are a few people with me and only one person in the group usually swipes his/her badge to open the door. This is a huge security vulnerability because anyone can just follow the group and gain access to the entire intranet of the organization. In my case in particular I work for United Airlines headquarters in Chicago at the Willis tower which is more than 100 stories high and the fact that the entire building is not ours alone, this becomes a huge security concern. While I have briefly explained the vulnerabilities in software, hardware, networks and the people that use them, the question still remains, what is the most important security vulnerability facing IT managers today?. This answer to this questions differs person to person, and one must take into consideration the actual vulnerability, its threat source and the outcomes. A person with a small home business might only be concerned with denial of service attacks, since they may not have enough cash flow to properly secure their network. On the other hand an enterprise organization with large cash flow might have a different prospective and probably does not concern itself with denial of service attacks but instead is focuses on making sure all the systems are upda te using windows server update services. In my personal opinion though, you might have guessed it but it’s definitely us human beings because we have the tendency to fall victims and contribute to the successful security breaches that occur in today’s society. Mateti in his essay â€Å"TCP/IP Suite† stated that vulnerabilities occur because of human error. A study by Symantec and the Ponemon institute showed that 64 percent of data breaches in 2012 were resulted due to human mistakes (Olavsrud, 2013). Larry Ponemon the founder of security research at Ponemon Institute and chairman stated that â€Å"Eight  years of research on data breach costs has shown employees behavior to be one of the most pressing issues facing organizations today†, up by twenty two percent since the first survey† (Olvasrud, 2013). A prime example of this is when I stated earlier about how anyone can just enter my office area without swiping their card, just by simply following the group. This is a form of human erro r when employees are too intimidated to ask questions and request authorization from someone they believe does not work for the organization. The intruder can just walk in the front door pretending to be a salesperson, repairman or even a white collar businessman and may look like someone legitimate but in fact they are not. This intruder now has direct access to the intranet and can install malicious malware on to the computers to disrupt daily operations or even steal sensitive data like confidential project information, release dates, trade secrets and many more. A very good example of this is the Stuxnet worm which infect the Iranian nuclear facilities and caused a lot of damage internally which in turn delayed Iran’s nuclear development. All of the security measures that were put in place by Iran’s cyber defense team were circumvented simply by just one employee because the worm was introduced through an infected USB drive. This simply shows how the direct access from unauthorized users due to employee negligence can cause such tremendous damage and that all the perimeter defense become completely useles s. Another prime example of human errors was the RSA breach in 2011 where cybercriminals thought instead of just sending millions of phishing emails to different random mailboxes, let’s send personalized emails to specific employees. The employees at RSA thinking since it’s a personalized message its â€Å"safe† and clicked on the links unknowingly which in turn caused the malware to be downloaded on to the network. To counter this problem firstly IT managers need to properly train employees and give them specific guidelines to follow. Symantec has issued a press releases with the guidelines on how to properly secure sensitive data which includes information on how to train employees for these types of intrusions. Human error is not just limited to intimation or foolishness, it also expands too many different areas because after all it is us humans who manage the cyberspace, grant physical access to the terminals and systems that are connected to the internetwork. We setup the protocols used for communication, set the security policies and procedures,  code backend server software, create passwords used to access sensitive information, maintain updates on computers and so on (â€Å"Security 2011, † 2011 ). The human element matters very much possibly more than the software, hardware or the network systems especially when it comes to properly securing an internetwork from data breaches. The impact on the organization always depends on what type of business it is and what it is engaged in. For example if an organization is very popular and has bigger presence in the online commerce (Amazon and New Egg) compared to one that does not use the internet quiet often will be more concerned with web based attacks and vulnerabilities. The impact though regardless of the type of organization will always be tremendous. Once a breach occurs not only are you spending on recovering from its effects but you are also spending on beefing up your current security measures by installing new devices, hiring new employees so the same occurrence does not occur again (Hobson, 2008) Sometimes at the end of the day some of the cost are not even recoverable like sensitive data, trade secrets, personnel information or even customer information. Another major cost and headache that occurs once an organization becomes a victim of cybercrime is lawsuits. Many customers who feel that the organization could not protect their confidentiality will sue the corporation for millions of dollars which in turn can cause major loss. IT managers can do many things to help prevent breaches due to human errors. The first thing they can do is properly train the employees as stated above on a periodical basis and use current guidelines like Symantec to properly secure their intranet from any type of intrusion. IT managers can also establish a safe harbor in the sense that they can force employees to periodically change their passwords and establish rules so the password must be certain characters long and must include other types of characters besides just the typical alphanumerical ones. Employee negligence also due to bad habits like sending sensitive data over an unsecured email and IT managers must ensure that they continually educate their employees. There are many different types of security vulnerabilities out there in today’s world that are affecting organizations. In my personal opinion I believe human error is the one vulnerability that affects IT managers the most simply because we as humans make mistakes. It is in our nature and no matter how hard we try we will always be susceptible to deception either through social engineering tactics or clicking dangerous  links because it â€Å"looks safe† or even being negligent by not reporting something unusual. Employees need to realize that their actions can bring terrible consequences for both them and the organization as a whole. References Fonseca, J., Seixas, N., Viera, M., Madeira, H. (2014). Analysis of Field Data on Web Security Vulnerabilities. IEEE Transaction on Dependable Secure Computing, 11(2), 89-100 doi:10.1109/TDSC.2013.37 Russon, M. (2014, June 10). Forget Software Vulnerabilities, Hardware Security Must Improve Before Its Too Late. International Business Times RSS. Retrieved July 12, 2014, from http://www.ibtimes.co.uk/forget-software-vulnerabilities-hardware-security-must-improve-before-its-too-late-1451912 Bloom, G., Leontie, E., Narahari, B., Simha, R. (2012, January 1). Hardware and Security: Vulnerabilities and Solutions. . Retrieved July 12, 2014, from http://www.seas.gwu.edu/~simha/research/HWSecBookChapter12.pdf Common Cyber Security Vulnerabilities in Industrial Control Systems. (2011, January 1). . Retrieved July 12, 2014, from https://ics-cert.us-cert.gov/sites/default/files/documents/DHS_Common_Cybersecurity_Vulnerabilities_ICS_2010.pdf Critical Security Controls. (n.d.). SANS Institute -. Retrieved July 12, 2014, from http://www.sans.org/critical-security-controls Ahlers, M. (2014, May 6). FAA computer vexed by U-2 spy plane over LA. CNN. Retrieved July 13, 2014, from http://www.cnn.com/2014/05/05/us/california-ground-stop-spy-plane-computer/ Most Important Cybersecurity Vulnerability Facing It Managers. (n.d.). . Retrieved July 13, 2014, from http://www.ukessays.com/essays/computer-science/most-important-cybersecurity-vulnerability-facing-it-managers-computer-science-essay.php Security 2011: Attack Of The Human Errors Network Computing. (2011, December 22).Network Computing. Retrieved July 13, 2014, from http://www.networkcomputing.com/networking/security-2011-attack-of-the-human-errors/d/d-id/1233294? Hobson, D. (2008, August 8). The real cost of a security breach. SC Magazine. Retrieved July 13, 2014, from http://www.scmagazine.com/the-real-cost-of-a-security-breach/article/113717/ Direct, M. (2013, December 20). Human error is the root cause of most data

Wednesday, August 21, 2019

The effect of concentration on rate of reaction was investigated Essay Example for Free

The effect of concentration on rate of reaction was investigated Essay Analysis: 1. How does reaction rate change according to concentration? Based on our processed data, the lower the concentration the faster the reaction. This also means that the higher the concentration, the slower the reaction. 2. Why is the cotton wool plug needed? The cotton wool plug is needed to absorb the amount of carbon dioxide released. It acts as a sponge in absorbing the gas expelled from the conical flask. The cotton wool is weighed beforehand and then after absorbing carbon dioxide, to find the mass of carbon dioxide released. The amount of carbon dioxide released can be used to calculate the rate of reaction. 3. Why is there no further loss in mass at the later time intervals? Eventually, there arent enough remaining moles of HCl to react with the calcium carbonate marble chips. Thus, there is no more reaction and there is no carbon dioxide to be expelled. 4. How could reaction rate be calculated from your graph? The first graph shows the loss of carbon dioxide over time. In this experiment, the rate of a reaction may be measured by following the rate at which carbon dioxide is formed. It is equivalent to the amount of carbon dioxide formed divided by time. The gradient of the graph can be used to calculate the rate of reaction, because the gradient is equal to a change in the y values over a change in the x values. In this graph, it would be equivalent to a change in the loss of carbon dioxide over a change in time. This shows the rate of reaction and how fast it is going. Based on the graph, the steeper the slope, then the faster the reaction and vice versa. Conclusion and Evaluation In this experiment, the effect of concentration on rate of reaction was investigated. We did this by reacting marble chips (calcium carbonate) with hydrochloric acid, and recording the expelled mass loss of carbon dioxide as the concentration of hydrochloric acid began to drop. The carbon dioxide loss in mass over time was used to calculate the rate of reaction. In chemistry, the rate of reaction is used to describe how quickly a reaction happens. It is defined as the measure of the amount of reactants being converted into products per unit amount of time. In our case, we measured the amount of hydrochloric acid and calcium carbonate being converted into carbon dioxide in 20 seconds intervals. There are several ways to vary and experiment with a rate of reaction. Students can observe a change in volume of gas produced, change the transmission of light in the experiment, change the concentration using titration or even change the concentration using conductivity. For this experiment, we observed rate of reaction by a change of mass. We calculated our rate of reaction by dividing the grams of carbon dioxide released by 20 seconds. Because 20 seconds was a constant divisor, the more mass of carbon dioxide released, the greater the rate of reaction. We also calculated the concentration of HCl left and observed the relationship. Based on our processed data, the lower the concentration, the greater the rate of reaction. For example, after 320 seconds, 2.00 g of carbon dioxide was expelled when the concentration of HCl was 0.182 mol dm-3. This gives a rate of reaction of 0.1 g of carbon dioxide produced per second. At 20 seconds, 0.70 g of carbon dioxide was released when the concentration of HCl was a whopping 1.364 mol dm-3. This gave a rate of reaction of 0.035 g CO2 per second, which is 0.065 g more than the aforementioned low concentration. The two graphs confirm this conclusion. As time goes on, the mass of carbon dioxide expelled increases, while the concentration of hydrochloric acid decreases. A lower concentration of hydrochloric acid causes more carbon dioxide to be expelled and thus lead to a greater reaction rate. I was quite shocked by our results. I thought that with a higher concentration and more molecules moving around, there would be a better chance of reactions taking place. However, this experiment shows that it was in fact the other way around. Perhaps, with a lower concentration of hydrochloric acid, there needed to be more carbon dioxide expelled to balance out the equation. With fewer moles of hydrochloric acid and lower concentrations, the equation was most likely out of proportion. In an attempt to make up for the lower number of moles, more carbon dioxide was released. Limitation Significance Improvement Tearing of cotton wool when it was being removed from the flask and then losing the torn cotton. When the cotton wool was being removed, some it may have been torn off. As a result, the mass could be a lot lighter than it should have been. When taking out the cotton, damage should be limited so that everything is accounted for and a more accurate carbon dioxide mass is achieved. Be very careful when removing the cotton to avoid any tearing. If a piece of cotton is accidently torn off, do not throw it away! Keep it and weigh it so that it is accounted for. Experiment was not performed until carbon dioxide stopped being expelled. The data was limited. Carbon dioxide was still being produced and there were still 0.091 moles of hydrochloric acid left when the experiment was stopped. Do not finish the experiment until there is no more carbon dioxide being expelled. This way, we get a better idea of the limits and possibilities of the reaction rate and how far it can go. Timer was not started the same time the marble was entered. Some marble could have been left inside the solution for a longer or shorter time than others. As a result, carbon dioxide values could be lower or higher than they should have been. The timer should be alert and there should be communication between the partners. The timer needs to begin once the marble chips are placed inside, and it needs to be removed right after twenty seconds. By maintain a steady time of twenty seconds, we can properly assess the reaction rates without adding another independent variable of time.

SanGrafix Video Game Company Business Process

SanGrafix Video Game Company Business Process The BMI was part of analyzing and selecting vital areas of SanGrafix Video Game Company. It was prepared on March 22, 2017. Regardless of how well the company plans for downtime errors, there is a chance that this will happen and the main point of consideration is how fast the company is able to recover from such errors. Purpose The purpose of this document is to identify and prioritize various system components in line with business processes that the system supports. It has the following parts: Determining business processes and the areas that require critical recovery Identifying resource requirements as per their urgency within the company Identifying recovery priorities for system resources based on the urgency of required production (Gadir et al., 2015). 2. System Description SanGrafix is a video game company of the 21st century that endeavors to create a scintillating experience with each video game they create. They are known to take the gaming experience to the next level as they aim to create a gaming experience that completely assimilates the real life experience. The company has a majority of its first-hand market in America. It offers a great variety of games from car racing to combat games all of which are the state of the art quality. The company works under the principles of getting better and making the customer experience better and improved with each new product that is launched to the market. The company is highly reliant on top notch technology which drives the innovation behind each of their amazing products and hence its competitiveness is highly dependent on its ability to ensure they minimize errors or enhance their capability to recover from such errors within the shortest time (Master, 2014). The company is setting its footprints in an industry where the competition from other companies is fierce, and the chance of being kicked out and rendered irrelevant are beyond high. The company has a huge basement of employees all performing different specialized tasks aimed at ensuring continuous provision of services to its clients. There are the technical engineers who are in charge of developing and maintain the companys system performing at optimal levels which include the network infrastructure, the hardwar e and software components. They are also in charge of creating the gaming programs that the company uses. The company as well has developers who come up with the games as well as constantly improving on them now and then according to developments in the market. The business has a vibrant marketing department which is always at the forefront of letting the consumers aware of any new products. The marketing team is as well in charge of creating and coming up with news ways through which the company can increase its reach to the market. The marketing team has been using the online platform as the main channel of marketing. 3. BIA Data Collection The company as earlier mentioned uses the online platform as the main tool of marketing. The majority of the sales are recorded through the online shop while other sales are through and online catalogs. Calls can also be made to the head of the department where assistance is offered regarding sales or any other queries that the clients might have. 3.1 Determine Process and System Criticality E-commerce processes are the heart and soul of SanGrafix Company since a huge percentage of the sales are recorded through the e-commerce platform. The majority of the clients do not even have the idea of where the company is located physically their interaction with the company is mostly limited to the e-commerce platform. As a result, the e-commerce processes are quintessential to the firm. The e-commerce processes of online payments include the transfer of funds from the buyers account to the banks accounts. The majority of companies in the gaming industry is set on creating profits and so does SanGrafix and among the key supporters in the gaming profit generators is the E-mail based communications and the network that allows for multi-player support over a network for the company. Far away clients reach the company through emails where they place their orders waiting for delivery or response through the emails. The same emails are highly used within the company structure to pass information from one source to another every time it is deemed necessary to pass information around. The same email communication platform is highly utilized to get information about customers reaction towards certain products as the company has made it their traditions to seek the feelings of the customers towards services delivery and product performance. The customers are encouraged to use the email services more than the telephone mode to let the company know their reactions. The company is practically in existence due to its online presence more than the physical presence. As a result, the Marketing and public relations sector are as well critically dependent on the online platform. The company conducts most of its marketing through its website as well as another host of social media pages it operates. The company has a lot of followers across the various social platforms who keep on increasing every so time. The followers are always keen and eager to learn of new products or any new information regarding their favorite product while at the same time there is a team of dedicated personnel who is always ready to feed the market with any form of information deemed necessary. Through this continuous exchange, the company can expand its market while at the same time maintain a high level of public relations with the clients. Other departments that require the online presence within the company but at a lowered rate include the Research and development activities where research on how to improve on the current products is carried out. A team of developers who work on flexible working durations requires the online platform to expand the creativity into making the video games of the future. Customer service handling can be carried out through the online platform as well as through the telephone channels. Mission/Business Process Description e-commerce processes processes through which the company accepts payments for products Marketing and public relations Mechanism through which the company markets its products to the market Research and development activities Process of coming up with new products and improving existing ones Customer service handling Might require both online and telephone lines 3.1.1 Identify Outage Impacts and Estimated Downtime Some of the potential outages that face the company include power outages which are normally rare and far in between. Nonetheless, the company is well equipped with a secondary source of energy that automatically reconnects as soon as a power outage is experienced which narrows the downtime experienced as the switch the second source of energy is almost immediate. A server crash also negatively affects the operations of the company since most of their online activities would be brought to a halt. Nonetheless, the downtime experienced in this is short since it would only take a few moments to get hosting from other servers while a repair is being done to the companys server. A website hack would also be catastrophic to the company since lots of business is done through the website. The downtime in this would be long since tracking hacking activities could be tedious and long to trace (Cordero et al., 2011). Outage Impacts Severe = a lot of money and time Moderate = low fees and limited time Minimal = limited cost and time If of a power outage the company suffers minimal impact since business is barely affected by the power outage given the time lapse between switching the secondary power source is almost immediately. As a result power outage is a minimal impact outage to the company. Server crash carries the medium impact since getting another web to host the company is both costly and could take some moments hence negatively affecting the business. A hacking problem could have severe impact on the business since the amount of time and data lost in the process is a lot and could compromise the integrity and public confidence of the company besides violating the federation laws of protecting the client information and this could be followed by unending lawsuits that could push SanGrafix out of the gaming industry business (Wiggins, 2008). Estimated Downtime Maximum Tolerable Downtime (MTD) by the company is the least time possible to get the business functioning again at the least cost Recovery Time Objective (RTO) allocated to a power outage as well as server crash is minimal while the RTO for hacking could be extended. Recovery Point Objective (RPO) for the company is daily hence it will lose a days data which is not so devastating for business. Mission/Business Process MTD RTO RPO Power outage Less than 1 hour Less than 1 hour Less than 1 hour Server crash 6 hours 4 hours 12 hours Hacking 72 hours 48 hours 12 hours 3.2 Identify Recovery Priorities for System Resources The recovery time required for several outages is variant from each other. Priority System Resource/Component Recovery Time Objective Power outage Electricity Almost immediately to rebuild Server crash Optiplex GX280 Less than 12 hours to get another host Hacking Optiplex GX280 Less than 72 hours to reconstruct References Master, L. L. (2014). Assessing threats and setting priorities for conservation. Conservation of networks, 5(4), 559-563 Cordero, A., Gonzalez, N., Chen, Z., Campos, R., Polanco, A., Melfi, D., Ouchaou, M. (2011). U.S. Patent Application No. 09/789,834. Gadir, O. M., Subbanna, K., Vayyala, A. R., Shanmugam, H., Bodas, A. P., Tripathy, T. K., Rao, K. H. (2015). U.S. Patent No. 6,944,785. Washington, DC: U.S. Patent and Trademark Office. Wiggins, C. (2008). U.S. Patent No. 5,717,604. Washington, DC: U.S. Patent and Trademark Office.

Tuesday, August 20, 2019

The Role of Railroad Companies, Farmers, and Cowboys in the Development

The 1880s proved to be a time of change for America. High unemployment rates and low wages in many cities forced many to look to new opportunities in cities and elsewhere. This included the newly expanded west. In the 1880s Kansas had three dominating groups- railroad companies, farmers, and cowboys. All three dealt with individual triumphs and struggles when developing the West and specifically Kansas in the later part of the 19th century. Railroads spent most of the 1880s concerned with previous legislation, farmers worried about land allotment and surviving on the Plains. Cowboys also worried about land allotment and surviving. The worries of the last two created some tension between them but in the end survival of one depended on the survival of the other. Insuring their place in history, the three groups together made the expansion of the West possible and forever changed the face of Kansas. The 1880s was a time of substantial change for Kansas and railroads, which were very important to the development of Kansas. As many historians say â€Å"rails didn’t build Kansas City, but they carried almost everything that did† (Worley 1). While most of the legislation that affected the railroads had taken place at some point prior to this time period, it was now coming full swing and affecting the settlers now. In May of 1854, the Kansas- Nebraska Act was passed. Although mostly known for repealing the Missouri Compromise it also gave â€Å"the railroads the right to build a railroad system from Chicago to the Pacific Coast† (Kansas- Nebraska Act 1). With this new access to land, railroad companies began building cross-country railroads. New settlers and merchants knew that railroads were the up and coming mode of transportation and a vit... ... University of Chicago Press, 1988. Miner, Craig. West of Wichita. University Press of Kansas, 1986. Nelson, Oliver. The Cowman’s Southwest. Glendale, CA: The Arthur H Clark Company, 1957. 19th Century Legal Treatise. A Letter from Honorable William Whiting to Honorable Henry Wilson, of the U.S. of senate ) microform: showing that the government is bound to fulfil in good faith its contract with the Central BranchUnion Pacific R.R. Company. Washington: U.S. Government Printing Office, 1870. Ostler, Jeffrey. â€Å"The Rhetoric of Conspiracy and The Formation of Kansas Populism.† Agricultural History1995 69 (1): 1-27. â€Å"Populist Platform of 1892†. Online. Internet 30, June 1998. White, Richard. â€Å"It’s Your Misfortune and None of My Own†. Norman: University of Oklahoma Press, 1993. Worley, William Dr. Online. KC Railroads Timeline. Internet.

Monday, August 19, 2019

Understanding Hypnosis Essay -- Hypnotherapy

I feel it useful to provide a definition of hypnotherapy as well as hypnosis before moving on and answering this question of this essay. Linnenkamp Doyle writes, ‘hypnotherapy is the use of hypnosis to treat disease’ something that she documents in her case study. This medical idea of hypnosis needs further exploration in terms of how it has evolved and sparked debate amongst medical and dental practitioners. Four very significant hypnotherapists are arguably Mesmer, Braid, Esdaile and Elliotson, all putting emphasis on the medical aspect of hypnotherapy. Mesmer, for example, devoted his 1779 27 Propositions concerning animal magnetism. Closer to modern day, in his book Hypnotherapy, Dave Elman not only concentrates on relaxation (a topic which is relevant in this essay), but also puts forward the fundamental medical idea of hypnosis, specifically concentrating on factors such as the use of anesthesia in subjects of hypnosis before they have dental or medical procedures. This medical and dental use of hypnosis, which provides the transition from hypnosis to hypnotherapy, also introduced the related problem of people falsely claiming to have special skills in this area. For Instance, D Zimmerman, chairman of the council for medical and dental hypnosis, wrote to the British Medical Journal in 1968, expressing concerns that ‘hypnotherapeutic charlatans’ had been invading and jeopardizing medical and dental procedures. Zimmerman writes that ‘it has been brought to the notice of this Society that courses in hypnotherapy are being offered to medical and dental practitioners by persons who hold no recognized professional qualifications’. Zimmerman adds to this a request for the validation of the official society for medical and d... ...s identified, analyzed, and made me understand the various definitions of hypnosis. It has also demonstrated the psychological and physiological effects to the role of relaxation. Works Cited Hypnotherapy: A Handbook Michael Heap and Windy Dryden (Milton Keynes: Open University Press) Hypnotherapy Dave Elman (New York: Westwood Publishing, 1983) Hidden Depths: The Story of Hypnosis Robin Waterfield (New York: Brunner-Routledge, 2003) The British Medical Journal, ‘Hypnotherapy’ D Zimmerman (Vol. 3, No. 5616 (Aug. 24, 1968), p. 501) Hypnotherapy A Practical Handbook Helmut Karle and Jennifer Boys, (New York: Free Association Books, 1987) http://web.archive.org/web/20040710162753/http://www.unbf.ca/psychology/likely/readings/mesmer.htm Franz Mesner (27 Propositions, 1779) http://www.brainandhealth.com/Brain-Waves.html

Sunday, August 18, 2019

The Naturalist Ideas Essay -- Literary Analysis, Societal Structures

Important aspects of naturalism are the ideas that people are essentially animals responding to their basic urges without rational thought, and the insignificance of man to others and nature. In The Jungle, Sinclair portrays Jurgis as a man slowly changing into animal as well as a man whose actions are irrelevant to the rest of the corrupt capitalist world of Chicago in order to show the reader the naturalist ideas of the struggles between man and society. Jurgis's struggle between human thought and animalistic tendencies are evident in several major events in the book. In the beginning of Jurgis's life in Chicago, he can disregard most of the obstacles thrown at him by the corruption of man and keep his rational thinking dominant of his animal-like instincts. However, when Jurgis finds out that Connor has violated, harassed, threatened, and raped his wife Ona, he reached his breaking point. Jurgis was so overwhelmed with rage, he reverted back to his primal instincts and "sunk his teeth into the man's cheek" (153). We again see Jurgis "animal instincts" when he escapes from the city and lives in the countryside from a while. He has given up on being rational and has resorted to use his survival instincts like stealing and scavenging to survive. Sinclair shows us how these instincts will not help us survive in the end. Whenever Jurgis behaves like an animal, he is punished in some kind of way like an animal. When he attacks Co nnor, he is sent to prison and when he is in the rural area, he does not get any money to help him survive. Moreover, Jurgis does everything he can to help his family and himself survive, but regardless of his actions, the corrupt society plows through him without remorse or regret. Jurgis's op... ...te the flawed example of muckraking by The Jungle, the main reason for the use of muckraking was and still is an effective way of revealing the corruption of politics and businesses. Although The Jungle may not have served Sinclair purposes for social reform, it brought reform to the way food is handled. Without the enlightening view of the meat-packing business, even if false, the Meat Inspection Act and the Pure Food and Drug Act may never have been created. We still see examples of muckraking today from Morgan Spurlock's Super Size Me to magazines like People, Time, Cosmopolitan, and National Geographic. Muckraking is one of the few ways that the average person can find out about information quickly and easily. In certain cases, it even connects the nations together in order to fight a common enemy, whether it is political, social, natural, or supernatural.

Saturday, August 17, 2019

Save the Ailing Earth from Vehicular Pollution

Delhi Metro (Hindi: Dilli Me? ro) is a rapid transit system serving Delhi, Gurgaon and Noida in the National Capital Region of India. The network consists of five lines with a total length of 125. 67Â  kilometres (78. 09Â  mi). The metro has 107 stations of which 17 are underground. It has a combination of elevated, at-grade and underground lines and uses both broad gauge and standard gauge rolling stock. Delhi Metro is being built and operated by the Delhi Metro Rail Corporation Limited (DMRC).As of April 2010, DMRC operates more than 100 trains daily between 6:00 — 23:00 with a frequency of 3 to 4. 5 minutes. [5] The trains have four to six coaches[6] and the power output is supplied by 25-kilo volt, 50 Hz AC through overhead catenary. The metro has an average daily ridership of over a million commuters,[3] and has carried over a billion commuters in seven years since its inception. The concept of a mass rapid transit for Delhi first emerged from a traffic and travel cha racteristics study carried out in the city in 1969. 8] Over the next several years, many official committees by a variety of government departments were commissioned to examine issues related to technology, route alignment and governmental jurisdiction.In 1984, the Delhi Development Authority and the Urban Arts Commission came up with a proposal for developing a multi-modal transport system, which would consist of constructing three underground mass rapid transit corridors as well augmenting the city's existing suburban railway and road transport networks. 10] While extensive technical studies and search for financing the project were in progress, the city expanded significantly resulting in a two-fold rise in population and a fivefold rise in the number of vehicles between 1981 and 1998. [10] Consequently, traffic congestion and pollution soared, as an increasing number of commuters took to private vehicles with the existing bus system unable to bear the load. 8] An attempt at priv atising the bus transport system in 1992 merely compounded the problem, with inexperienced operators plying poorly maintained, noisy and polluting buses on lengthy routes, resulting in long waiting times, unreliable service, extreme overcrowding, unqualified drivers, speeding and reckless driving. [11] To rectify the situation, the Government of India and the Government of Delhi jointly set up a company called the Delhi Metro Rail Corporation (DMRC) on March 5, 1995 with E. Sreedharan as the managing director. [12

Friday, August 16, 2019

Terrorism: An Emergency?

The September 11th terrorist attack on the World Trade Center will forever be in the minds of every American. It is a reality which tells us that it can happen again, anytime and anywhere. The impact of such act also tells us that it is something the government and the nation must pay attention to and be prepared for.For many years now, terrorism is still an existent problem which gobbled up a substantial amount from the government resources. Not only that, but it also caused countless fatalities and destroyed properties. It has also put the government in an unsure position as to how it can be eliminated. The worsening situation regarding terrorism has the government taking up drastic steps for the nation’s security and considering it an emergency by which every nation must be prepared to face.The Office of the Press Secretary of the United States (2007) announced about additional grant guidance and application kits for three grant programs (Port Security Grant Program (PSGP), Transit Security Grant Program (TSGP), and Emergency Management Performance Grant (EMPG)), which totaled to $827 million this year. According to Michael Chertoff, Homeland Security Secretary, the additional influx of federal dollars will be for the enhancement of security measures. Additionally, the money will enable the emergency managers to have more tools to â€Å"build on national preparedness goals.†Allotment of these funds shows us how serious the prevention of terrorism is. The United States government will prioritize funding for training and public awareness campaigns, reducing the risks of improvised explosive devices and radiological, biological and chemical weapons, and securing transit systems. Moreover, grant funding will further improve the government’s emergency management capabilities.According to the American National Red Cross (2001), there are many things which could happen after a terrorist attack which calls for emergency action. First is that the re can be casualties and damages to properties such as buildings. Second is the involvement of the local, state and federal units due to the criminal nature of the event. Third is the possibility that the health and mental health resources can be strained or overwhelmed. Next, the prolonged existence of public fear, international implications and consequences and extensive media coverage. Fifth is the possibility of evacuation. And lastly, the clean-up which may take up very long.With regards to weapons of mass destruction (WMD), Taylor (2000) analyzed the use of WMD as protective measure against terrorism. The author cited the Nunn-Lugar-Domenici Act, which the U.S. Congress passed in 1996, and which requires the local and state governments to have access to equipment and training needed to fight against acts of terrorism. It involves access to the use of WMD such as chemical, radiological and biological. A large amount of money is funded for the program in order to train law enfor cement and emergency response agencies in dealing with terrorist attacks.Taylor (2000) added that the production of WMD might increase the number of casualties from terrorist attacks as the US population was vulnerable to such attacks. The Legionnaire’s disease alone, which struck American Legion conventioneers, tells us of the worst possible outcome of bioweapons. As this shows that the public can be attacked with these weapons, the enemies could use these for their terrorist attacks.Weapons of mass destruction include chemical, radiological and biological weapons. Their effects could be enormous. Lives will be lost with the deployment of such dangerous weapons. And as terrorists have access to these weapons and more, they can use it to further their attacks, resulting to more and more casualties. This is clearly an emergency both ways because the 40 percent of terrorist attacks around the world is targeted at the United States despite the fact that the country has no quarre ls with other countries.   The population is even more vulnerable to an attack using WMD.According to John Bolton (2002), Under Secretary of State for Arms Control and International Security, there are risks in using WMD. The worst thing that could happen is when the weapons fall into the hands of terrorists. To prevent this from happening, a strategy called the New Strategic Framework was formed. Under the framework, defensive systems which aim to protect against missile attacks will be created, nonproliferation and counterproliferation measures will be enhanced, nuclear weapons will be reduced and cooperation with Russia to eliminate terrorism will be prioritized.John Wolf, Assistant Secretary of State for Nonproliferation (2002), added that these weapons of mass destruction are a threat to the United States forces around the world. The primary concern, according to Wolf, is protection and security from WMD. This entails some steps. First, there should be reduction and cessation of WMD production. The United States’ objective is to control and dispose excess materials of WMD. The second step is stopping Iran’s acquisition of these materials.It is believed that Iran wants to improve and develop its WMD and missile programs. Third step is stopping the proliferation of nuclear and missile in and from South Asia. Wolf stated that approximately one million troops face off on the India-Pakistan border. Concerns were raised over the possibility that the WMD and missiles there might fall in the wrong hands.Several actions are needed to be taken to prevent further proliferation of WMD and missiles. One is to make sure that the suppliers of WMD materials and missiles end their cooperation. Another is to ensure that security is at its maximum against WMD and missile proliferation. The effectiveness of the export control of the states should also be enhanced. They should also secure their WMD and missiles and help other states that do not have enough res ources.Terrorism is a rare phenomenon that must be put in perspective. Everyone knows that one attack using WMD can cause massive casualties. According to Pete du Pont (cited in Taylor, 2000), 15 terrorist incidents happen each year in the United States. Statistics also showed that approximately 42 Americans die while 115 are injured from international acts of terrorism since 1982. What the United States should do, Taylor noted, is to implement military restraint overseas but respond to terrorist incidents against U.S. targets.Should there be a terrorist attack using WMD, there are three things that the government must address. First, responses of the government must minimize the injury and death and implement actions which prevent the public from harm. This means that the attack site should be isolated, the agent class is identified, exposure levels is evaluated and those who are exposed evacuated to facilities where they can be treated. The government must make sure that the indiv iduals in the attack site cooperate with it (Taylor, 2000).Second, evidence should be gathered which will be used for later prosecutions. This should be the primary concern of law enforcement officials. They should identify the attackers. Third is mitigation. How to prevent such incident from happening should be determined (Taylor, 2000).The magnitude of these terrorist attacks and the use of WMD call for every emergency measures from both the state and local levels. One problem which hinders to the success of emergency management, according to Taylor (2000), is the difficulty of getting public support. Effective emergency management program will be the solution to the program, and this requires public support. The public should be educated about what they can do in case terrorist attacks happen. Additionally, they should be taught about the WMD and what they should do in each case.Considering the effects of terrorism, and the things it can do to a country, it should be seen as an e mergency alongside other types of disasters. This paper does not posit that terrorism should be prioritized over other disasters, but the government must also allot resources and actions to prevent or be ready in case it happens.ReferencesAmerican National Red Cross. (2001). Terrorism: Preparing for the unexpected. Retrieved on December 16, 2007 from http://www.redcross.org/services/disaster/0,1082,0_589_,00.htmlBolton, John. (2002). The new strategic framework: A response to 21st century threats. U.S. Foreign Policy Agenda, 7, 2.Office of the Press Secretary. (2007). DHS announces additional $260 million in supplemental grants funding. Retrieved on December 16, 2007 from the Homeland Security web site, http://www.dhs.gov/xnews/releases/pr_1187294574562.shtmTaylor, Eric R. (2000). Are we prepared for terrorism using weapons of mass destruction? Government’s half measures. Policy Analysis, 387, 1-17.Wolf, John. (2002). U.S. approaches to nonproliferation. U.S. Foreign Policy A genda, 7, 2.

Thursday, August 15, 2019

Narcotics †Research Paper Essay

Narcotics Thesis Statement: Narcotics have valuable medical uses, however, illegal and excessive use of narcotics can endanger people’s lives because of its damaging effects on the mind and body. I.Narcotics Education A.Narcotics B.Kinds of Narcotics C.Characteristics and Medical Uses II.Narcotics Abuse A.Causes of Abuse B.Tolerance and Withdrawal III.Effects of Narcotics Abuse A.Effects on the Person B.Effects on the Family C.Effects on the Community IV.Treatment of Drug Abuses INTRODUCTION Narcotics play a big role in the field of medicine. It has a capability to reduce pain that you are feeling and even helps you to avoid anxiousness. But these drugs should be use properly or else it can cause a big damage in your health. It is very important for us to know something about these things. The study and findings that I have done regarding narcotics is really an important thing because you will be able to know how bad it can affects you when too much used and you will know how to avoid and fight against it. BODY NARCOTICS EDUCATION There are many kinds of drugs, and narcotics are one of them. Narcotics don’t always have bad results in one’s health. In fact, it’s one of the drugs that help ill people to reduce tension, anxiety and aggression. They are also effective pain relievers, used in cough medicine preparation and can induce sleep. These effects are really helpful when it comes on therapeutic setting but when improperly used, narcotics have adverse effects that may lead to abuse, and it will have a big effect on health of an individual who is involve. It can endanger people’s lives because of its damaging effects on the mind and body. The effects of narcotics abuse is felt not only by the individual but by the family, community, and society as well. NARCOTICS The term â€Å"Narcotic† was derived from a Greek word which means â€Å"to make numb.† Narcotics are drugs that relieve pain and induce sleep by depressing the central nervous system. Narcotics, primarily analgesics, produce several affects that relieve pain and induces narcosis that causes sleep. Narcotics, if administered prior to an operation, can enhance sedation and reduce apprehension and anxiety. These drugs have a very high potential for abuse. KINDS OF NARCOTICS, CHARACTERISICS, AND THEIR MEDICINAL USES 1.OPIUM – It is extracted from the seedpod of the poppy. It produces a gummy resin that creates narcotic effect. It can relieve severe pain, induces sleep, relieve anxiety and depression. 2.MORPHINE – It is extracted from opium in 1805 and later synthesized in its pure form. It is sold as a white powder in the drug market which is also called Dreamer or Miss Emma. 3.CODEINE – This is produced from gum of opium and has much milder effects. The common street name for codeine is School Boy. 4.HEROIN – It is synthesized from morphine but more powerful. It is used to help people to overcome their addiction to morphine. It is commonly called Horse, Junk Smack, and Scag. CAUSES OF ABUSE According to the National Statistics Office (2005), about 56.35% of the cases of drug abuse had friends or peers as the primary source of drugs. The causes of drug abuse are: 1.Pressure from peers; 2.Form of escape from problems and woes; 3.Relief from chronic pain caused by cancer and other diseases; 4.Psychological disorders, such as depression or emotional distress; 5.Use as a way out from stress of family life, work, and other concerns; and 6.Thrill and enjoyment in seemingly routine life. NARCOTICS ABUSE Narcotics abuse is the nonmedical use of narcotics. Narcotics abuse is widespread among the young people and the adults, as well as the poor and wealthy. It is, indeed, harmful and even life-threatening. It can ruin one’s life and one’s family. It can break down a person’s character, thus leading to the commission of criminal acts and even suicide. TOLERANCE AND WITHDRAWAL Tolerance is the condition where the standard doses of narcotics produce less effect or a person develops a state of resistance to the effects if the drug. Because of tolerance, the effect of narcotics diminishes with their chronic use. Thus, to maintain the same level of narcotic effect, a person must take more of it. Withdrawal is the reaction of the body when the regular use of narcotics is stopped. The narcotics dependent person experiences a withdrawal syndrome. In general, the symptoms of withdrawal include cramp, defecation, vomiting, and an increase in systolic blood pressure. A person who is excessively dependent may experience convulsions, respiratory failure, and death. EFFECTS OF NARCOTICS ABUSE The effects of narcotics abuse are similar but they differ in the degree of intensity, rate of onset, and the development of dependence. A.EFFECTS ON THE PERSON 1.Drowsiness 2.Loss of appetite 3.Inability to sleep well 4.May develop diseases such as hepatitis, tetanus, AIDS. 5.Skin abscesses 6.Inflammation of the veins 7.Congestion of the lungs 8.Loss of enthusiasm for work or study 9.Loss of personal care and hygiene 10. Psychological and physical dependence upon the drug B.EFFECTS ON THE FAMILY 1.Neglected responsibilities 2.Difficulty in keeping a job 3.Financial difficulty 4.Shame and embarrassment to the other family members 5.Disorganized and unhappy family C.EFFECTS ON THE COMMUNITY 1.Increased incidence of crime 2.Occurrence of different kinds of accidents, especially if the narcotic dependent is driving a vehicle. 3.Rampant stealing 4.Economic destabilization due to less manpower TREATMENT OF DRUG ABUSES Detoxification is the most common form of drug treatment. This is a process of eliminating a person’s dependent on drugs. Part of the detoxification process is to decrease the daily dose of drugs that the dependent person takes and thus gradually reduce withdrawal symptoms. Another method of dealing with drug dependent people is to form a support group of fellow drug dependents. They share their experiences and learn from one another. Together, they recover from their dependence and get better. 1 Agripino G. Darilag, Enjoy Life with P.E, and Health (Manila: SD Publications, Inc., 2009), pp.192 – 201.s BIBLIOGRAPHY Darilag, Agripino G. Enjoy Life with P.E. and Health. Manila: SD Publications, Inc., 2009.

Scarlet Letter by Nathaniel Hawthorne

Writers of literature, especially those in the genre of stories, used different types of themes and symbolisms to represent an idea and concept that is not directly mentioned by the writer. Most themes especially about life, human nature and society are implied rather than explicitly stated. It’s the writer’s choice if he or she would want to use figures, objects or characters to illustrate an abstract idea to create various realizations on the part of the readers. The aesthetics of literature depends on how the writer seamlessly and creatively associates symbolisms to the themes of the story. In the story Scarlet Letter by Nathaniel Hawthorne, he used the title as a symbol itself, the characters, and the Biblical allusions as a point of comparison to the consequences of sins happened in the story. The Scarlet letter is used as a significant symbolism of shame that often identify the main protagonist, Hester. The â€Å"letter† word in the story functions as the reminder of her sin. Hester’s adultery receives harsh judgment and retaliation from the self righteous Puritan community. Her sin excludes her in the society or in a pattern known as unity versus exclusion in literature. Hester single mistake in the past made her an outcast who automatically separated her from ordinary social interaction. In the beginning of the story in the episode of the marketplace, the â€Å"scarlet letter† â€Å"was so fantastically embroidered and illuminated upon her bosom. It had the effect of the spell, taking her out in the ordinary relations with humanity, and enclosing her in a sphere by herself† (Robinson 104). Here, Hawthorne already revealed how the scarlet letter symbolizes Hester’s authenticity as a character and fate. The letter becomes â€Å"the object of severe and universal observation† in the Puritan community (Robinson 114). Moreover, Hester’s presence in the â€Å"crowd had been of such deep social interest† not because of her as a character but because of what the scarlet letter says about her past (Robinson 138). The Scarlet Letter symbolizes the community’s system of judgment and punishment that greatly used symbols and externals to question one’s morality. The scarlet letter in the story is a figurative thing intended to represent sin and a mark of shame. This figurative object went to her after the adultery she committed with Dimmesdale. The setting of the story belonged to a Puritan community who strictly follows the standard of morality. Hester’s adultery from this kind of society received harsh judgment and retaliation from the Puritan community. Despite the painful judgment, Hester chose to stay in the community because running away would be an acknowledgment of society's power over her. Scarlet Letter embodies Hester’s identity that was determined to create her own individuality rather than allowing others to determine it for her. She chose not to conform to the society’s rules and standard. She knows deep inside that she is more than her sins. Her sins were all part of her but the journey of life still continues. Scarlet Letter illustrates Hester’s acceptance of her sins. She admitted though that the letter is a mark of shame but removing the letter or running away would be an acknowledgment of society's power over her. Hester was a symbol for hope, restoration and transformation. The judgmental community unconsciously transformed and challenged her character to be compassionate and capable woman. Her pains made humble. Her innate good nature was fully expressed from her challenging yet sorrowful faith. The scarlet letter as a symbolism is all in connection to the twists and turns of the story as well as to the character. Pearl, Hester’s daughter also noticed that, her mother wear a scarlet letter among all the grown up women in the community. â€Å"Mother†, said the little Pearl, â€Å"the sunshine does not love you. It runs away and hides itself, because it is afraid of something on your bosom†¦ It will not flee from me, for I wear nothing on my bosom yet! â€Å"Nor ever will my child, I hope†, said Hester. â€Å"And why not mother? † asked Pearl, stopping short†¦ â€Å"Will it not come of its accord, when I am a grown woman? † (Robinson). In this conversation, it highlights the reality that the scarlet letter is intended to represent sin and Pearl as a child doesn’t fully comprehend her mother’s peculiar situation. Pearl’s innocent and pointed questions create suspense since it makes the characters feel uncomfortable. Moreover her character illustrates perception and honesty that separates her from the corrupt minds of the adulthood. Pearl’s innocent questions motivated those people around her to think and to reflect on the truths that are often overlooked. Pearl herself is the embodiment of the scarlet letter and Hester accordingly clothes her in a â€Å"beautiful dress of scarlet, embroidered with gold thread, just like the scarlet letter upon Hester's bosom† (Robinson). Pearl illegitimacy in the story and as a product of sin mysteriously takes the consequences of her parents’ guilt. The story of the â€Å"The Scarlet Letter† can be compared to some of the stories mentioned in the Old Testament. The plot depicting the extreme portrayal of Puritanism can be compared to the way old people from the Bible regard shame, rules and order. Just like Adam and Eve, Hester and Dimmesdale’s sins particularly adultery separated them from the divine and community (the way Puritan community perceives it). Sins excluded and alienated them in the society. Dimmesdale and Hester’s state of sinfulness led them to personal growth, sympathy and speculation about human nature and larger moral questions. At the end, the inner wisdom that Hester accumulated from the judgmental community greatly benefited her character and sense of individuality. The scarlet letter for Hester according to Nathaniel Hawthorne in one of his interviews after the creation of this wonderful story â€Å"was her passport into regions where other women dared not to tread. Shame, Despair, Solitude! These had been her teachers—stern and wild ones—and they had made her strong, but taught her much amiss†. Though the setting happened during Puritan community but the themes are timeless- judgmental society, personal responsibility and unconformity.