Tuesday, December 31, 2019

Newspaper Headlines Lesson for Students of English

Take a look at any newspaper or magazine headline and you are likely to find incomplete sentences full of action-packed verbs. Headlines live in a linguistic bubble all by themselves because they ignore grammar conventions such as the use of helping verbs and so on. Of course, this means that newspaper headlines can be confusing to English language students. This is because newspaper headlines are often incomplete. For example: Difficult Times AheadUnder Pressure from BossMustang Referral Customer Complaint This lesson focuses on helping make sense of the strange forms used in newspaper headlines. You may want to review some of the most common grammar exceptions found in newspaper headlines before you take this lesson into class. Lesson Breakdown and Outline Aim: Understanding newspaper headlinesActivity: Translating newspaper headlines into more understandable EnglishLevel: Intermediate to higher levels Outline: Find some headlines in old newspapers or on the internet and cut them out. There should be at least two headlines per student.Pass out one of the headlines to each student. Give them a few minutes to think about the meaning of each headline.Ask students to read their headlines aloud and give an explanation of what they think the article in question concerns.As a class, brainstorm on possible structural meanings behind the strange grammar found in headlines (refer to grammar exceptions found in newspaper headlines).Ask students to fit the following headlines into the correct categories on the worksheet. You may want to have students pair up to do this.Correct the exercise as a class.Pass out the headlines you have left to the students. Ask each student to translate each headline into proper English and give an explanation of what they think the article in question concerns.As a homework option, you may want to ask students to find some headlines on their own and repeat this exercise. A further challenge might be to ask students to find headlines, read the articles, and then ask other students to interpret their headlines in small groups. Newspaper Headlines Exercises for Students of English 1. Match these newspaper headlines with the following categories (some headlines fit two categories): Newspaper Headlines Difficult Times AheadForgotten Brother AppearsJames Wood to Visit PortlandLandscaping Company Disturbance RegulationsMan Killed in AccidentMayor to Open Shopping MallMustang Referral Customer ComplaintOverwhelming Response of VotersPasserby Sees Woman JumpPresident Declares CelebrationProfessors Protest Pay CutsTommy the Dog Named HeroUnder Pressure from BossUnexpected VisitWidow Pension Pay Committee Categories Noun PhrasesNoun StringsSimple Tenses instead of Continuous or PerfectAuxiliary Verbs Dropped in Passive FormArticles DroppedInfinitive to Indicate Future 2. Try to translate the meaning of each of the headlines.

Monday, December 23, 2019

The Diary Of Anne Frank - 2178 Words

I. History 1. When studying past events, historians use primary and secondary resources to gather information. A primary resource is a historical piece of evidence, such as an artifact or document, which was made at the time of the event, firsthand. A secondary resource is a document that was created by someone whom was not present at the time of the event, basing their information off of various primary resources. The difference between the two is that with a primary resource the account is more direct being from someone who most likely has great knowledge of the matter or is involved, where as a secondary resource is not as reliable coming from someone who may or may not know much about the event. Although, a secondary resource could†¦show more content†¦The writings are usually based off of primary resources. 3. â€Å"Event history† or â€Å"history from above† is history written by the members of the higher class or those thought of as more important at the time. â€Å"History from below,† developed after â€Å"history from above†, gave a voice to those who were thought of as unimportant, such as women and the poor. In both, people are given insight on a particular event in history, however from two different perspectives. In â€Å"history from above†, one reads the event from the higher class therefore, in most cases, the best case scenario from the event. However in â€Å"history from below†, one reads from the perspective of the less fortunate whom, in most cases, got the worst from the event being in the lower class or lower in society in general. It changes one’s perspective on history because they see the event from two different sides: the elite and the unimportant. 4. Bias is favor or dislike towards a particular thing, person, or group. Bias relates to history because some sources could be written bias to a particular thing, person, or group in an event in history. Reading the source could change people’s views on the event. It could persuade them to think in the way the source was written and to follow along with the author of the source’s beliefs. It could make people unfairly judge the event in history based off how the source portrays its’ favored thing, person, or group. It is

Saturday, December 14, 2019

Economic Growth and Financial Development Free Essays

There are three views about the relation between economic growth and financial development. First, financial development has impact on economic growth (i. e. We will write a custom essay sample on Economic Growth and Financial Development or any similar topic only for you Order Now Bagehot, 1873; Schumpeter, 1912; McKinnon, 1973; Shaw, 1973; Patrick, 1966; Goldsmith, 1969; Fry, 1973). Second, economic growth leads to financial development and that where there is economic growth financial development follows (i. e. Robinson, 1952). The third view, however, contends that both financial development and economic growth Granger cause one another. In the essay, our group focus on the first view which financial development will has passive influence on economic growth. During the year from 1955 to 1993, many scholars has study the relationship between financial development and economic growth. Along with the time goes, the theory that financial development will real promote economic growth has been more and more prefect. In the years between 1950s and 1960s, economists such as Gurley and Shaw began to stress the credit markets and the importance of financial intermediaries, which they believed play an important role in economy. 5] They argued that tradition monetary transmission mechanism ignores the factor of financial structure and financial flow and only pays attention to the total amount of money and the connection of the output. In 1955, Gurley and Shaw bring up the development of financial institution is both a determined and determining variable in the growth process. (Gurley and Shaw, 1995, p. 532). Gurley and Shaw stre ssed that financial intermediaries exert influence on credit supply rather than money supply. In this way, financial intermediaries improve the efficiency of savings turning into investments and then affect the whole economic activities. They are the earliest scholars to study in-depth the relationship between financial and economic development in developing countries. Gurley and Shaw pointed out that the main access road of monetary policy transmission probably have diverted from money quantity, which is traditionally thought as the medium of exchange. Whereas, the â€Å"financial capability† of economy would has a closer relationship with the gross expenditure. They put forward financial development enhances the intermediation of loanable funds and therefore growth will be stimulated and they have a debt-intermediation view. The Debt-intermediation view establishes relations between finance and growth. First, economic growth would be associated with financial development, as external indirect finance provides surplus units with the capacity to spend beyond their earnings. Second, growth would stimulate and be stimulated by the â€Å"institutionalisation of saving and investment†; income grows, richer wealth-holders will increase their desire to diversify their asset portfolio. If financial innovation is such to accommodate this â€Å"diversification demand†, financial institutions can enhance their lending capacity and thus boost growth; the process becomes a cycle. Gurley and Shaw has earlier pointed that the growing importance of NBFI (non-bank financial intermediaries) when they discussed their activities about potentially serious problems for monetary management and monetary policy. 1] Subsequent analysis of the problems had to two results. [2] First, if the monetary authorities exerted control over the financial system through the operating of the financial markets, monetary management would not be undermined. [3] Second, which placed specific restrictions on banks, at that time the dominant financial entities, the growing role of N BFI was stimulated in part by the opportunities for intermediation created by monetary policy measures. These contributions stressed the relevance for financial â€Å"deepening† (mean financial development) of rising wealth and income, then attempts to control the activities of financial intermediaries. Wealth and income incent the demand for financial services. Restrictions and Controls on financial intermediaries create the stimulation for further financial intermediation by generatingâ€Å"quasi-rents† that risk among participants in financial and capital markets and reflect differences in information. 4] However, Gurley and Shaw do not address the issue of causality between financial development and economic growth. In 1966, Patrick make the causality issue is addressed, he posed theâ€Å"stage of development† hypothesis, where the direction of causality between financial development and economic growth changes over the course of development. [6] Two hypotheses are developed, one is Demand-following hypothesis: a causal relationship from real to finance and the other is Supply-leading hypothesis: a causal relationship from finance to growth. The supply-leading hypothesis supposes a causal relationship from financial development to economic growth, which means mature creation of financial institutions and markets increases the supply of financial services, and thus leads to real economic growth. Patrick suggests that initial development is spurred by supply-leading process, which gives way to demand-following process. He posed financial institutions and services emerge as demand for those services unfolds. The idea is that finance is passive in the growth process, but lack of financial institutions may prevent growth to occur. Financial institutions and their services precede the emergence of demand; government support is needed to finance and nascent modern sector, such as subsidized loans, information to small business and long loan durations. He points out the importance of finance in economic growth. The difficulty of establishing the link between financial development and economic growth was first identified by Patrick (1966), he argued that a higher rate of financial growth is positively correlated with successful real growth. [7] In his theory, commercial banks may issue banknotes and accept â€Å"easy† collaterals. Easy loan† can induce economic growth, for it can finance innovation-type investment, however, in fact it can also induce irresponsible borrowing. Since the important work of Patrick, that first postulated a bi-directional relationship between financial development and economic growth. A large empirical literature has emerged testing this hypothesis as the Patrick’s ( 1966) problem remains unresolved: What is the cause and what is the effect? Is finance a leading sector in economic development, or does it simply follow growth in real output which is generated elsewhere. References: [1] de Oliviera Campos, R. 1964) â€Å"Economic Development and Inflation with Special Reference to Latin America† in Development Plans and Programmes Paris: Organisation for Cooperation and Development [2] Duesenberry, J. S. and M. F. McPherson (1991) â€Å"Monetary Management in Sub-Saharan Africa† HIID Development Discussion Papers no. 369, January [3] Friedman, M. (1973) Money and Economic Development The Horowitz Lectures of 1972 New York: Praeger Publishers [4] Malcolm F. McPherson and Tzvetana Rakovski (1999) â€Å"Financial Deepening and Investment in Africa: Evidence from Botswana and Mauritius†, Copyright 1999 Malcolm F. McPherson, Tzvetana Rakovski, and President and Fellows of Harvard College [5] Liu Pan Xie Tao (2006) The Monetary Policy Transmission in China-â€Å"Credit Channel† And Its Limitations, Working Papers of the Business Institute Berlin at the Berlin School of Economics (FHW-Berlin) [6] Anthony P. Wood and Roland C. Craigwell Financial Development and Economic Growth: Testing Patrick’s Hypothesis for Three Caribbean Economies [7] Philip Arestis (2005) FINANCIAL LIBERALISATION AND THE RELATIONSHIP BETWEEN FINANCE AND GROWTH, University of Cambridge How to cite Economic Growth and Financial Development, Essay examples

Friday, December 6, 2019

Personal Identity - Memory Theory vs Body Theory vs Soul Theory free essay sample

In this paper, I will argue that the Memory Theory of Personal Identity is the closest to the truth. I will do so by showing that the opposing theories – Body and Soul Theories – have evident flaws and that the arguments against the Memory Theory can be responded to adequately. In order to succeed in this task, I will explain the basis of the three aforementioned theories are, examine the Memory Theory’s main arguments, acknowledge and respond to the arguments against it and demonstrate that the Memory Theory is the theory closest to the truth. I have included visual diagrams of the important concepts presented in order to reiterate them. . The Body Theory and The Soul Theory . The Body Theory states that every person is identical with a living human body, that can be seen, touched, interacted with physically, etc, through the various senses. Our judgements of personal identity are usually justified on the basis of physical appearance (how they look) or behavioural similarity (how they act). We will write a custom essay sample on Personal Identity Memory Theory vs Body Theory vs Soul Theory or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page I need to point out that the Body Theory is very widely accepted theory that most people have unknowingly committed themselves to believing. However, the logic behind this theory is unstable when attempting to identify when a living, human body begins and/or ceases to exist. The Soul Theory on the other hand, is considered to be very similar to the aforementioned Body Theory, except it states that every person is identical with an immaterial soul instead of a living, human body. The Soul Theory also claims that behavioural similarity is due to that immaterial soul. The issue concerning this theory is the inability to explain, or justify, the judgements of personal identity via an ‘immaterial oul’. A judgement of personal identity is being able to identify a person to actually be that person at a different point in time – for example, not seeing someone for a few days, but judging it is that same person as the one you saw a few days ago. These theories are touched on by Descartes within his meditations (Descartes, 1641) and by the participants in the conversations detailed by Perry (Perry, 1977), which is discussed within this paper. . Memory Theory . The Memory Theory disregards Descartes’ concepts of the mind and body being separate (Descartes, 1641) as they have no significant relevance in disproving the notion of streams of consciousness creating personal identity. As originated by John Locke in the 17th century (Perry, 1977, p. 334), the Memory Theory states that a person is not a body, soul, any kind of substance, nor something that exists at one place at one time. A person is a temporally extended series of mental states, or a stream of consciousness: with each part of that stream being a ‘person-stage’.

Friday, November 29, 2019

The Storm Essay Research Paper The StormIn free essay sample

The Storm Essay, Research Paper The Storm In Kate Chopin # 8217 ; s short narrative # 8220 ; The Storm, # 8221 ; the narrative surrounds the brief matter of two persons, Calixta and Alcee. Many people don # 8217 ; t see the narrative as a disapprobation of unfaithfulness, but instead as an act of human gender. This essay argues that # 8220 ; The Storm # 8221 ; may be interpreted as a specific act of gender and passion joined with a disapprobation of its repression by society. If one is to try to construe # 8220 ; The Storm, # 8221 ; it becomes necessary to analyze the conditions of the milieus. The rubric of # 8220 ; The Storm, # 8221 ; with its sexual energy and passion, is of class critical to any reading of the narrative. The rubric refers to nature, so the storm can hence he seen as symbolic of gender and passion. And the image of the storm will be returned to once more and once more throughout the narrative. At the beginning of the narrative Bobinot and his immature boy, Bibi decide to wait out a quickly nearing storm at the shop. Bobinot # 8217 ; s married woman, Calixta, is place entirely, be givening to the family jobs. Calixta # 8217 ; s is non cognizant of the storm nearing, although she is married and has a kid, she is unaware of the gender and passion within her. As Calixta is garnering up the wash, Alcee Laballiere enters the pace, seeking shelter from the coming storm. My first feeling of Alcee is that he is reasonably good off in the universe. Although I see Bobinot as a simple adult male. There is a common attractive force between Calixta and Alcee, and this attractive force is non new. Calixta has non seen Alcee really frequently since her matrimony, and neer entirely. The attractive force between Calixta and Alcee is merely briefly explored. With Alcee # 8217 ; s arrival comes the beginning of the rain, and he asks to wait out the storm on the front gallery. Calixta is startled from her sudden consciousness that she is still sexually attracted to Alcee, even though both are married. The storm increases rapidly and drives Alcee interior. Calixta # 8217 ; s visual aspect is described as # 8220 ; she is a small Fuller of figure than five old ages before she married ; but she had non lost nil of her vivacity. # 8221 ; The storm outside continues to increase, reflecting the sexual tenseness indoors. Calixta is going every bit unsettled as the elements outside, the passion of the storm repeating her inner emotions. Calixta and Alcee move to a window to watch the storm, and when lightning work stoppages nearby, Calixta staggers rearward into Alcee # 8217 ; s weaponries, and for a minute he d raws her # 8220 ; close and Spasmodically to him. # 8221 ; I don # 8217 ; t believe Alcee sensed the passion that Calixta feels in the beginning of the narrative. # 8220 ; the contact of her warm, palpitating organic structure when he had thoughtlessly drawn her into his weaponries, had aroused all the quaint infatuation, and desire for her flesh. # 8221 ; Calixta and Alcee embracing, giving into the storm of passion that is now present in both of them. Calixta and Alcee cast aside the restraints of society and the boundaries of their several matrimonies. Neither has found passion of this deepness in their several matrimonies. Then the storm base on ballss and Alcee foliages. In the terminal of the narrative Calixta # 8217 ; s passion is seen to be natural, experienced without guilt or shame. Bobinot and Bibi returned place after the storm, and brought his married woman ( Calixta ) some runt. Calixta greeted them with nil but felicity and satisfaction of their safe return. For Calixta the narrative ends with her reclamation of her matrimonial responsibilities, and is now cognizant of her natural, passionate, sexual nature. Alcee like Calixta, is freshly cognizant of the deepnesss of the passion within himself, and is non satisfied within the boundaries of his matrimony. And so the storm passed and everyone was happy. The narrative presented gender through the imagination of the storm. Calixta was unaware of the gender within herself, and it is merely by seting aside her matrimony, was she able to cognize her true gender. One can non presume that a brief and limited waking up that passes like a storm will be plenty to do one happy, sexually, the storm will finally return someday. The Storm English 102 The Storm is interpreted as a specific act of gender and passion. The Storm is non merely an act of nature, but of passion inside both Calixta and Alcee. The storm comes along with the reaching of Alcee, and leaves as he leaves Calixta. I. The manner of nature and human emotions. A. Calixta # 8217 ; s emotions are mixed up when Alcee arrives in the narrative. B. Calixta remembers forgotten feelings toward Alcee. II. The storm gets more vigorous. A. The storm becomes more violent as Calixta feels the attractive force for Alcee. B. Alcee draws Calixta stopping point to him. III.Alcee unleashes his feelings for Calixta. A. The storm reveals itself as Calixta and Alcee are sexually drawn together. B. Alcee and Calixta see a different side of themselves. English 102

Monday, November 25, 2019

Obtaining Objective Truth in Regards to Martin Luther Kings Role in the Fight for Equality in the United States

Obtaining Objective Truth in Regards to Martin Luther Kings Role in the Fight for Equality in the United States Introduction Martin Luther King is one of the most celebrated human rights fighters who fought for the second liberation in the United States. Historians and journalists have written a lot about his life and the contributions he made towards the fight against racial discrimination in this country.Advertising We will write a custom research paper sample on Obtaining Objective Truth in Regards to Martin Luther Kings Role in the Fight for Equality in the United States specifically for you for only $16.05 $11/page Learn More Martin Luther King came out strongly to fight for the rights of the blacks and other minority races in this country when it was clear that the time for equality had come (Hermann 94). Hermann says that the credit given to Martin Luther was well deserved because of the devotion he had given to that fight. Although many human right activists had come before him and the others came after, he is generally considered as an icon in the fight again st racial discrimination and injustices that were very common during his era. Sitkoff (55) attributes his popularity to his eloquence and his level of knowledge. He made very moving speeches that touched the hearts of people. The fact that he took the non-violence approach in his confrontation also played part in his growing popularity. King became even more popular after his assassination as many linked his death to his fight against racial discrimination. However, there has been a question of whether he deserved the attention that was given to him or not. This research is focused on determining if objective truth is possible to obtain in regard to Martin Luther Kings role in the fight for equality in the United States. Historians and Scholar’s View of Martin Luther King’s Role in the Fight for Equality in the United States Historians and scholars have made a lot of contributions to discovering the life of Martin Luther King and his role in the fight for equality in t he United States. According to Helg (67), King was one of the people who made massive contribution to the fight against racial discrimination. He made moving speeches and engaged in high level talks with various members of the society in an attempt to end the discrimination. During his fight to end the discrimination, he was generally seen as a man who was sincere to his people and was always focused on achieving the main agenda of equality for all the members of the society. Baldwin (112) says that although many other human rights crusaders came before and after him, most of them were hypocrites who were only interested in achieving benefits for themselves. The scholar further says that other activists who were before him were majorly interested in gaining fame and financial affluence. Most of them were even used by the government and other powerful organizations to jeopardize the fight for freedom. However, King gave his life in order to achieve the most important objective of equ ality for everyone.Advertising Looking for research paper on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Martin Luther King made a lot of contribution in the fight for the second liberation in the country (Hermann 94). This scholar says that before King could rise to fame as a human rights crusader, he had made several sacrifices as an individual interested in achieving equality in the society. Although he had received a good education and secured a well-paying job, King liked associating himself with the poor members of the society who were the most affected by the social discrimination in the society. This could be partially what made him look like a hero. Most of the other people of his class preferred leading a quite life of affluence. However, King did not consider such life necessary when other members of the society were suffering because of discrimination. Sitkoff (31) notes that Martin Luther King was a hero wh o did not fear of confronting the mighty members of the society who strongly believed in racial superiority. He says that King was always ready to face them and tell them that it would be a better place if everyone were given equal rights and opportunities. There were cases where King faced a number of threats before he was finally assassinated, but he did not relent in the fight for equality. The fact that he was finally assassinated is a clear demonstration that the threats he had been receiving were real (Hermann 98). People who were not pleased by his conviction that there is need for equality were ready to do everything to stop him. He knew that these threats were real. He was aware that some clandestine groups were planning his murder because of the movement he had started and was leading in this country (Helg 89). However, this did not stop him. This made him even more convinced that there was need to fight for freedom of the blacks and other races that were discriminated aga inst in that society. He always insisted that it would be better to sacrifice his life for the sake of liberation of million of others who were suffering from the heat of discrimination (King 67). This explains why Martin Luther went on with his fight for equal rights of Black Americans. Of all the prominent people in the United States who championed for equality, King stands above the rest because of his sincerity, and the conviction he gave towards the fight for equality for all the Americans (Hermann 56). Can objective truth be obtained in regard to Martin Luther Kings role in the fight for equality in the United States? This is one of the most important questions that many scholars have been asking about the role played by King in the fight for equality in the United States. The above short analysis has given a general picture of what historians and journalists have been reporting about Martin Luther King Junior. King has gained a lot of fame after his death. When he was assassi nated, many people attributed his death to his fight against racial discrimination (Hermann 56).Advertising We will write a custom research paper sample on Obtaining Objective Truth in Regards to Martin Luther Kings Role in the Fight for Equality in the United States specifically for you for only $16.05 $11/page Learn More He was therefore seen as a martyr who died in order to liberate other members of the society from suffering. Death made him be associated with success that was later achieved in the fight against discrimination. Begag (90) says that this could have been the reason why many historians and scholars have been full of praises when writing about his life. According to this scholar, there is a possibility that in most of these historical accounts, much has been ignored in regard to Kings life, especially issues that could be considered defamatory. It may be very challenging to obtain the objective truth about the contribution of King in the fig ht for equality in the United States because most of his contributions were made after his death. Most of the historians and journalists have been highly dependant on his moving speeches when recounting his contribution in the fight against discrimination. In the short analysis done above, there may be given an impression that there were no other human rights crusaders who championed for equality in this country but Martin Luther King. Nothing can be further from the truth. There were other activists who made serious contributions to that fight, but their ideas have been ignored by the historians. The deeds made by King could have overshadowed them, but they made remarkable contributions that should not be ignored. Some scholars believe that it is possible to obtain some objective truth in regard to Martin Luther King’s role in the fight for equality in the United States. Several historians and journalists have taken time to dig into the life history of King. Most of their re ports have been very objective in reporting about the activities that King engaged in before his assassination (Hermann 56). Although most of the available reports differ in the approach taken in analyzing the life history of King, they concur in the specific roles that King played in fighting for equality. King’s life history has been retold, and as Cohen (26) notes, at some points, there have been some distortions based on the interests of people interpreting his contributions. The fact that King died because of his human rights activism earned him a lot of respect and admiration among the historians and journalists who have reported about his contribution towards equality. Many people have considered looking at his activities from just one angle the positive impacts he had on this fight. Following his assassination, the American society experienced massive reduction on racial discrimination. Begag (87) also holds that objective truth can be obtained in regard to Martin Lu ther King’s role in the fight for equality. This scholar says that King made massive contributions to fighting for racial equality in the country, and this has widely been reported by historians and journalists.Advertising Looking for research paper on history? Let's see if we can help you! Get your first paper with 15% OFF Learn More Most of the materials available from many historians and journalists have extensively discussed his positive impact on fighting racial injustices. King has been seen as a saint not only in the United States, but also in other parts of the world. The late Nelson Mandela and King have been seen as the icons in championing for equality. For this reason, most of the readers are always interested in knowing how King participated in the war, what speeches he delivered, which challenges he faced, and how he managed to overcome them. The fact that he was assassinated on a day when he had planned to join a group of poor Americans to champion for their rights will always convince people that he was a true hero in this fight. As Fairclough (49) notes, this made most people associate him with the success in fighting racial discrimination. Given that readers are always looking for his positive contributions, historians and journalists have been reporting on positive events associated with him. T he most appropriate time of recording a real contribution made by King towards the fight for equality would have been immediately after his demise. This would have been done successfully if the scholars involved in recording these accounts took an impartial position in their work. However, the society was full of support for him, and any slight attempt to publish any negativity about him would have been seen as a betrayal in the fight for equality in the USA. The society was full of praises for King and sympathy for his family, and for that reason, many of the scholars avoided negative comments about him. Most of the historians were carried away by the admiration the society had for the King following his assassination (Jadueson 89). However, researchers who may be interested in understanding his actual contributions to the fight for equality can easily get to know the objective truth. King was born in 1929 and died in 1968. The main part for the fight for equality in this country w as played from the late 1950s to 1968 when he was assassinated. Some people who lived in that era are still alive, and they can help in finding the truth about his contributions. People who are interested in discovering the truth of him can easily do so by conducting objective research on his life and work. The specific activities that King engaged in can be documented during the research on his life. Using available documents about his life may be the first step in finding the objective truth about him. For instance, it would be interesting to understand the reason why the Federal Bureau of Investigation closely monitored his movement though he was not a criminal. The reports made in regard to his activities before his assassination would offer invaluable source of information about the real contributions he made in the fight for equality. The newspaper reports and other periodicals of that period may offer insight into his true contributions. This is so because at this time, judgm ents of the journalists were not clouded by the sadness caused by his sudden brutal murder. These documents would report on the activities he engaged in as soon as they took place. The next step would be to engage those who actively got involved in his activities in one way or another. Some scholars, especially those who were close to him, can also help in telling the truth about his activities in fighting racial discrimination. For this reason, scholars who are determined to know the objective truth can easily obtain it through research. Some scholars have argued that it may not be easy to achieve the objective truth in regard to the contribution of Martin Luther King in the fight for equality in the United States. The contributions made by King in fighting racial discrimination are great (Hermann 94). However, the magnitude of his movements has been magnified that it becomes very difficult to extract the truth. This scholar says that in his fight for human rights and racial equali ty, King engaged in various activities, some of which may not pass as a war against racial discrimination. In the 1960s, America was involved in Cold War with the USSR, especially it concerned ideology. Most Americans believed in capitalism, while the USSR was strongly pushing for communism. Although there was a general belief that government of the United States was not keen fighting racial discrimination, it was not justifiable for King to associate with the communists who were generally seen as enemies of the country. Shah (78) says that King accepted finance from the communists in his movement, people who were considered enemies of this country. However, such engagements are not always given priority by historians who have been writing about his life and the civil rights activities. This is lack of objectivity in their reporting. King was a normal human being, bound to make some normal human mistakes. When reporting about his contribution, it would be appropriate to mention both the positive and the negative impacts he made in this fight. This way, it becomes easy to obtain the objective truth about what he did to help this society abolish racial discrimination. Manheimer (45) notes that it may be very complex to get the objective truth about the contributions King made towards the fight for equality. According to this scholar, most of the success story about the fight for equality in this society during his era has always been associated with him. This is so even in cases where other human rights crusaders played leading roles in the fight. Conclusion It is clear from the above analysis that Martin Luther King made a lot of contribution to fighting against racial discrimination. Many scholars have claimed that it is difficult to obtain the objective truth about the work made by King in the fight for equality in the country. While this claim may have some facts, the truth is that a detailed research into the life of King would easily reveal the objective t ruth about his contributions to this fight. With a detailed research done on his activities, it is possible to obtain this truth. Baldwin, Lewis. To Make the Wounded Whole: The Cultural Legacy of Martin Luther King, Jr. Minneapolis: Fortress Press, 1992. Print. Begag, Azouz. Ethnicity Equality: France in the Balance. Lincoln: University of Nebraska Press, 2007. Print. Cohen, Warren. Profiles in Humanity: The Battle for Peace, Freedom, Equality, and Human Rights. Lanham: Rowman Littlefield, 2009. Print. Fairclough, Adam. Martin Luther King, Jr. Athens: University of Georgia Press, 1995. Print. Helg, Aline. Our Rightful Share: The Afro-Cuban Struggle for Equality, 1886-1912. Chapel Hill: University of North Carolina Press, 1995. Print. Hermann Top of FormMubetM, Harvard. The Long Struggle for Racial Equality in America. Lexington: University Press of Kentucky, 2010. Print. Hermann, Spring. The Struggle for Equality: Women and Minorities in America. Berkeley Heights: Enslow Publishe rs, 2006. Print. Jadueson, Troy. Becoming King: Martin Luther King, Jr. and the Making of a National Leader. Lexington: University Press of Kentucky, 2008. Print. Top of Form King, Martin. The Papers of Martin Luther King, Jr. Berkeley: University of California Press, 1992. Print. Manheimer, Ann. Martin Luther King Jr: Dreaming of Equality. Minneapolis: Carolrhoda Books, 2005. Print. Shah, Ruchir. Martin Luther King, Jr. Barrington: EZ Comics, 2007. Print. Sitkoff, Harvard. Toward Freedom Land: The Long Struggle for Racial Equality in America. Lexington: University Press of Kentucky, 2010. Print.

Thursday, November 21, 2019

White paper Essay Example | Topics and Well Written Essays - 1250 words

White paper - Essay Example The worth and value of stakeholders was not too high, before 21st century. However, it should be noted that stakeholders was a known terminology in legal concept, since long. The origin of the concept of stakeholders, in business or management field, had initially come into existence in 1963. At that time, the terminology of stakeholders appeared in the international memorandum of Stanford Research Institute. Stakeholders, then, were defined as â€Å"those guys without whose support the organization would cease to exist† (Friedman & Miles, 2006). In the 19th century, the concept of stakeholders referred to the respective owners of business organizations, who had invested money in it as well as possessed full power to enjoy all upcoming benefits of the organization. The author named Freeman had first emphasized on the importance of the term, â€Å"stakeholders†, in 1984, in his book, Strategic Management Stakeholders Approach. Long before 21st century, the business corpo rations were assumed to be artificial legal entities and the value of the so-called stakeholders, like, customers, suppliers, shareholders, government and employees, were assumed to be neutral. Thus, in that particular period, stakeholders of an organization were referred to as only those individuals in the market who could provide economic support to the corporation’s activities. Prior to 21st century, it was found that business corporations used to give importance and value to only those individuals who could support the concerned firm with some financial support. At that point of time, the owners of organizations were considered to be extensively powerful. According to the views of Lord Edward Coke, â€Å"corporations cannot commit treason, nor be outlawed nor excommunicated, for they have no souls† (Friedman & Miles, 2006). The interactions of stakeholders with the soulless organizations were extensively poor in the period before 21st century. The firms almost did not react or

Wednesday, November 20, 2019

Does the media distort childrens perceptions of reality or validate Research Paper

Does the media distort childrens perceptions of reality or validate them - Research Paper Example Some adverts have been successful in meeting this objective while others do not please the audience well enough to influence their decisions. However, a group of audience that may not be targeted by these adverts, but is actively involved in viewing them is underage children. Most online and TV digital advertisements are aired at convenient times when the children are watching, leading to serious implications in influencing innocent minds of the children. Therefore, the growing digital media advertising in TV and online commercials is responsible for distorting childrens minds due to the glamour and perceived reality of the virtual content portrayed in these commercials. Â   Paige (1) explains that currently, the violent and aggressive scenes, in addition to scenes portraying disrespect towards others have been the order of the day particularly in TV adverts. Introducing children to violent materials influences their perception regarding application of aggressiveness and violence; the kid perceives this as the best way to achieve a certain end as observed in these adverts. This is because; children cannot decode the messages to conceive the actual meaning being contemplated, but will take the portrayal of aggressiveness as the norm to achieve a certain need. For example, the Ford VW advert resulted in increased criticism from parents as the advert was aired too early and portrayed the chief engineer of Volkswagen embroiled in a combat with a few replicas of himself. The portrayed car parts being used as weapons passed a violent message to children; the advert was not supposed to be aired at normal times when children were watching TVs. As Haugan (23) ex plains, exposure of violent content to children leads to violent behaviors making such adverts to have bad influence on children. Super bowl snapshots when used in advertisements have been criticized for portraying the message of aggressiveness and violence to

Monday, November 18, 2019

English criminal law fails to deal with the drug supplier whose client Essay - 1

English criminal law fails to deal with the drug supplier whose client dies after voluntarily self injecting or ingesting in a consistent and principled manner - Essay Example It has been confirmed that some causes of death are worrying and threatening. These are deaths associated with murder, excessive use of illegal drugs, and deaths that cannot be medically proven on their causes. Such deaths not only cause societal attention, but also triggers alarm to the legal sector because they are weird and unexpected. In most countries, dealing and supplying of addictive substances that are controlled is considered illegal. According to the Misuse of Drugs Act 1971,1 the England court dismissed the act of dealing and supplying of controlled substances due to the increased death rates that was observed in the country. It is evident that in situations where an individual dies due to use of illegal drugs and controlled addictive substances, the question of the individual responsible for supplying the drugs comes forth.2 However, it is considered unlawful to sentence the individual supplying the drugs, and according to the constitutions of several countries, such suppliers are not directly connected to the death. According to the Act,3 individuals who supply or deal with illegal drugs that consequently cause death to the users may be held criminally liable for the situation. There are different assumptions that are undertaken by the legal institutions before relying on the evidences offered regarding deaths resulting from misuse of drugs. According to the drug supplier’s act, one may be considered liable for a death in case it is confirmed to be a factual causation. On the other hand, in situations where the drug supplier’s act involves an operating and considerable cause of death of the users, then a legal causation arises. This material aims at investigating situations when the suppliers of controlled drugs may be held reliable for deaths of users who misuse the drugs. This follows the realization that the English criminal law fails to deal with the drug supplier whose client dies after voluntarily self-injecting or ingesting

Saturday, November 16, 2019

Thin Layer Chromatography for Composition of Analgesics

Thin Layer Chromatography for Composition of Analgesics THIN LAYER CHROMATOGRAPHY HALILI, Johanna Bernadette C. ABSTRACT In this experiment, a thin-layer chromatography (TLC) was used to determine the composition of different analgesic drugs which were Aspirin, Ibuprofen, Caffeine, Paracetamol, tea sample and an unknown substance. Chromatography takes advantage of the fact that different substances are partitioned between two phases. TLC is used to identify individual components in a mixture. These chromatography techniques focused on the fact that components of a mixture tend to move at different speeds along the flat surface from the paper used to separate from each other. The results obtained by comparing the spots and after performing the experiment, the unknown was identified to be Aspirin. INTRODUCTION Thin-layer chromatography (TLC) is one of the most important techniques in organic chemistry and is used for the rapid separation and qualitative analysis of different substances (Pavia, et. al., 2010). This separation technique is accomplished by the combination of the mixture between two phases: the stationary and the mobile phase. The stationary phase or the absorbent, which is usually silica or alumina, is coated on a supporting material which is either a glass or plastic. The sample is applied to the layer of the adsorbent coated sheet or TLC plate. The mobile phase, or the solvent called the eluant, travels up the absorbent by capillary action (Ault, 1998; Miller, 2005). As the solvent passes through the sample or spot, it shows the effects of separation of the material in the spot. This separation technique is also used to identify if substances are pure and to compare it with other samples. Unknown substances can be also determined by comparing an unknown compound’s be havior with the other known substances. In this experiment, thin-layer chromatography is used to determine the qualitative compositions of over-the-counter analgesic drugs. The objectives for the experiment are to observe the different analgesic drugs, to perform thin-layer chromatography and calculate Rf values and to use thin-layer chromatography to identify the analgesic compound present in an unknown sample. METHODOLOGY The group prepared a chamber for the experiment of thin layer chromatography for analgesic drugs. The chamber consists of a filter paper wrapped around the 50 ml beaker with a small opening left for viewing. A 3 ml solvent mixture (25 parts ethyl acetate, 1 part ethanol, and 1 part acetic acid) was added to the chamber and was later covered using a watch glass to provide an atmosphere saturated with solvent inside the container. The filter paper was moistened for the solvent to rise equally. While the chamber was set aside, a silica gel coated TLC plate was obtained and using a pencil, a very light line was drawn across the sheet, about 10 mm from one end Seven small light marks were made along the line and labelled A to G. Each letter correspond to seven analgesic drugs which are aspirin, ibuprofen, caffeine, paracetamol, sample tea extract collected from one previous experiment, an unknown substance and co-spot respectively. Using a capillary tube, small spots of each sample was placed exactly in the intersection of the horizontal line and the tick marks for each letter to make sure it will not mix with the other samples. The capillary tube was cleaned by using Dichloromethane and it was done three times. For the sample E or the tea extract from the experiment â€Å"Isolation of caffeine from tea leaves†, the filter paper that contained the caffeine extracts was rinsed with dichloromethane to be able to place a spot to the TLC. The spots on the TLC plate were al lowed to dry for 1-2 minutes. As soon as the spots were dry, the TLC plate was dropped vertically to an upright position making sure that the chamber is on a stationary place and was covered again using a watch glass. The liquid slowly moved up the TLC sheet. When 80-90% of the solvent had already gone up of the TLC plate, the TLC plate was immediately removed taking note of where the solvent was last seen. Immediately, the TLC plate was marked where the solvent was last seen. The plate was air-dried and it was observed under UV light to point out where the spots are. While observing under the UV lamp, a light pencil mark was marked around each spot in the TLC plate. RESULTS AND DISCUSSION Results Figure 1. Silica Gel coated TLC plate results. Figure 2. Silica Gel coated TLC plate results under UV light. Table 1. Measurement of the distances of the spots in the TLC plate and computed Rf values. Distance travelled by the solvent: 30.0 mm Discussion The objective of this experiment was to perform thin layer chromatography to test a certain substance of its purity or impurity and also to know the analgesic present in an unknown substance. The results shows that 5 out of 7 analgesics had 2 or more spots which indicates that are impurities or there are different compounds in those analgesic drugs. The different analgesic drugs that were observed to have 2 or more spots were Aspirin, Ibuprofen, Paracetamol, the unknown substance and the co-spot. Rf values were also computed by the distance (in mm) travelled by the solvent was measured exactly from the horizontal line drawn up to where it was last seen when it moved up. The spots were also measured and for those samples that had 2 or more spots, each spots were measured individually. The equation used for solving the Rf value is: For accuracy, the distance travelled by the spot was measured from the horizontal line up to the center of the spot. Rf values were used to compare the substances and identify the analgesic compound present in an unknown sample. Similarities was observed between Aspirin and the unknown analgesic drug F since their spots are very similar and their Rf values are very close to each other with only a 0.004 mm difference. Also, the results show that the caffeine extracted from the experiment â€Å"Isolation of caffeine from tea leaves† is indeed caffeine since spot C or pure caffeine is very similar because the spot produced by the tea extract and this is evident since it is indicated in their Rf values that they are very similar to each other. In comparing compounds used in the experiment run, the group observed that compounds with the larger Rf are less polar because it interacts less strongly with the polar adsorbent on the TLC plate (Ault, 1998). The experiment went as expected with no unusual events that would have introduced error. The group was able to perform the thin-layer chromatography and to compute for the different Rf values. CONCLUSION Thin-layer chromatography (TLC) was the technique used to determine the composition of various over-the-counter analgesics and the purity of the different substances which were Aspirin, Ibuprofen, Caffeine, Paracetamol, tea sample from one of our previous experiment and an unknown sample. With thin-layer chromatography, it was identified that compounds with the larger Rf are less polar because it interacts less strongly with the polar adsorbent on the TLC plate, and compounds with a smaller Rf values are more polar. It was also observed that the tea sample gathered from one of our previous experiment was indeed pure caffeine because of the similarities of the spots and Rf values of the spot C and pure caffeine. The different analgesic drugs that were observed to have 2 or more spots were Aspirin, Ibuprofen, Paracetamol, the unknown substance and the co-spot. Two or more spots were observed because of impurities or it contains different substances. Lastly, the unknown sample in the TL C plate was observed to be Aspirin because of the similarities of the measurement of the spot and Rf values which only had a difference of 0.004 mm. RECOMMENDATIONS To obtain a better result of the experiment, the different techniques can be done. One technique that can be done is a volatile solvent like 25 parts ethyl acetate, 1 part ethanol, and 1 part acetic acid. The TLC plate is very sensitive to different materials or compounds and it is important not to touch the TLC plate to avoid contamination of oil from the hands. In collecting different sample, one should remember to wash capillary tube with dichloromethane not less than three times to avoid contamination. To place appropriate size of each spot so it won’t mix with the other spots. For light/dull colored samples, it is recommended to place spots up to three times for it to be visible. In preparing the chamber, one should moisten properly the filter paper to have equal rising of the solvent and cover all the times the chamber since the solvent is volatile. Lastly, drop properly making sure it falls in an upright postion or the TLC plate should lean to the filter paper and remem ber not move the chamber in any way to avoid unequal rising of the solvent to the TLC plate. REFERENCES Ault, A. Techniques and Experiments for Organic Chemistry, 6th ed.; University Science Books, California, 1998. Miller, J. Chromatography: Concepts and Contrasts, 2nd ed.; John Wiley Sons, Inc. Publication, 2005. Pavia, D., Lampman, G., Kriz, G., Engel, R. A Small Scale Approach to Organic Laboratory Techniques, 3rd ed.; Cengage Learning, United States of America, 2010.

Wednesday, November 13, 2019

Pinpointing Tourettes Syndrome Essay -- Biology Essays Research Paper

Pinpointing Tourette's Syndrome Though Tourette's syndrome was first studied in the 1800's, it is an illness that has yet to be fully explained by any discipline. Presenting with muscular tics, some of which result in verbal utterances, Tourette's is a condition that is easily characterized. Yet its causes are not so easy to pin down. Though psychiatry and biology have been able to recognize roots other than the demonic possession once thought to cause Tourette's, there are few definitive, precise explanations of its etiology. As far as neurological diseases go, Tourette's is relatively common: between 2.9 and 4.5 children out of every 100,000 children have it, and that figure may be higher due to mild cases which go undiagnosed (1). The condition is much more prevalent in males than females, and Tourette's is most common present in young people - the condition often disappears in post-pubertal years. The onset of vocal tics most always succeeds motor tics, though most individuals with Tourette's eventually present both. Tics can sustained (and are then called tonic or dystonic), which can result in abnormal posture or gait for Tourette's patients. Behaviors associated with Tourette's include copropraxia, echopraxia (both motor behaviors), coprolalia, palilalia, and echolalia (all verbal) (2). The neurological causes of Tourette's are not fully understood. About half of patients have "non-localizing, so-called 'soft,' neurological findings suggesting disturbances in the body scheme and integration of motor control". When EEG's are performed on people with Tourette's, the results are often vagule abnormal, yet provide little concrete information to practitioners; the same is true of CAT scans. Additionally, these abnor... ...ic/tour.html 2. Macalaster College Behavioral Neuroscience Tourette's Syndrome Page http://www.macalester.edu/~psych/whathap/UBNRP/tourettes/ 3. Internet Mental Health http://www.mentalhealth.com/bookp40-gtor.html 4. National Institute of Neurological Disorders and Stroke - "What Cuases TS?" http://www.ninds.nih.gov/healinfo/disorder/tourette/tourette.htm 5. Department of Neurobiology, Baylor College of Medicine - Movement Disorders Research: Tetrabenazine Study http://www.bcm.edu/neurol/research/moved/moved3.html 6. HUM-MOLGEN [Human Molecular Genetics] European Server http://www.informatik.uni-rostock.de/HUM-MOLGEN/documents/abstracts.0049.html 7. "Tourette's Syndrome: A Model Neuropsychiatric Disorder" - Grand Rounds at the Clinical Center of the National Institutes of Health, http://neuro-www2.mgh.harvard.edu/TSA/medsci/model.html Pinpointing Tourette's Syndrome Essay -- Biology Essays Research Paper Pinpointing Tourette's Syndrome Though Tourette's syndrome was first studied in the 1800's, it is an illness that has yet to be fully explained by any discipline. Presenting with muscular tics, some of which result in verbal utterances, Tourette's is a condition that is easily characterized. Yet its causes are not so easy to pin down. Though psychiatry and biology have been able to recognize roots other than the demonic possession once thought to cause Tourette's, there are few definitive, precise explanations of its etiology. As far as neurological diseases go, Tourette's is relatively common: between 2.9 and 4.5 children out of every 100,000 children have it, and that figure may be higher due to mild cases which go undiagnosed (1). The condition is much more prevalent in males than females, and Tourette's is most common present in young people - the condition often disappears in post-pubertal years. The onset of vocal tics most always succeeds motor tics, though most individuals with Tourette's eventually present both. Tics can sustained (and are then called tonic or dystonic), which can result in abnormal posture or gait for Tourette's patients. Behaviors associated with Tourette's include copropraxia, echopraxia (both motor behaviors), coprolalia, palilalia, and echolalia (all verbal) (2). The neurological causes of Tourette's are not fully understood. About half of patients have "non-localizing, so-called 'soft,' neurological findings suggesting disturbances in the body scheme and integration of motor control". When EEG's are performed on people with Tourette's, the results are often vagule abnormal, yet provide little concrete information to practitioners; the same is true of CAT scans. Additionally, these abnor... ...ic/tour.html 2. Macalaster College Behavioral Neuroscience Tourette's Syndrome Page http://www.macalester.edu/~psych/whathap/UBNRP/tourettes/ 3. Internet Mental Health http://www.mentalhealth.com/bookp40-gtor.html 4. National Institute of Neurological Disorders and Stroke - "What Cuases TS?" http://www.ninds.nih.gov/healinfo/disorder/tourette/tourette.htm 5. Department of Neurobiology, Baylor College of Medicine - Movement Disorders Research: Tetrabenazine Study http://www.bcm.edu/neurol/research/moved/moved3.html 6. HUM-MOLGEN [Human Molecular Genetics] European Server http://www.informatik.uni-rostock.de/HUM-MOLGEN/documents/abstracts.0049.html 7. "Tourette's Syndrome: A Model Neuropsychiatric Disorder" - Grand Rounds at the Clinical Center of the National Institutes of Health, http://neuro-www2.mgh.harvard.edu/TSA/medsci/model.html

Monday, November 11, 2019

Testbacksecurity

Chapter 2 – Why Security is NeededTRUE/FALSE 1. Information security’s primary mission is to ensure that systems and their contents retain their confidentiality at all costs. ANS:FPTS:1 2. Information security safeguards the technology assets in use at the organization. ANS:TPTS:1 3. A firewall is a mechanism that keeps certain kinds of network traffic out of a private network. ANS:TPTS:1 4. An act of theft performed by a hacker falls into the category of â€Å"theft,† but is also often accompanied by defacement actions to delay discovery and thus may also be placed within the category of â€Å"forces of nature. ANS:FPTS:1 5. Two watchdog organizations that investigate allegations of software abuse: SIIA and NSA. ANS:FPTS:1 6. A number of technical mechanisms—digital watermarks and embedded code, copyright codes, and even the intentional placement of bad sectors on software media—have been used to enforce copyright laws. ANS:TPTS:1 7. A worm requires that another program is running before it can begin functioning. ANS:FPTS:1 8. A worm can deposit copies of itself onto all Web servers that the infected system can reach, so that users who subsequently visit those sites become infected. ANS:TPTS:1 9. Attacks conducted by scripts are usually unpredictable. ANS:FPTS:1 10. Expert hackers are extremely talented individuals who usually devote lots of time and energy to attempting to break into other people’s information systems. ANS:TPTS:1 11. With the removal of copyright protection, software can be easily distributed and installed. ANS:TPTS:1 12. Forces of nature, force majeure, or acts of God can present some of the most dangerous threats, because they are usually occur with very little warning and are beyond the control of people. ANS:TPTS:1 13.Much human error or failure can be prevented with training and ongoing awareness activities. ANS:TPTS:1 14. Compared to Web site defacement, vandalism within a network is less malicious in intent and more public. ANS:FPTS:1 15. With electronic information is stolen, the crime is readily apparent. ANS:FPTS:1 16. Organizations can use dictionaries to disallow passwords during the reset process and thus guard against easy-to-guess passwords. ANS:TPTS:1 17. DoS attacks cannot be launched against routers. ANS:FPTS:1 18. A mail bomb is a form of DoS. ANS:TPTS:1 19.A sniffer program shows all the data going by on a network segment including passwords, the data inside files—such as word-processing documents—and screens full of sensitive data from applications. ANS:TPTS:1 20. A timing attack involves the interception of cryptographic elements to determine keys and encryption algorithms. ANS:TPTS:1 MODIFIED TRUE/FALSE 1. Intellectual property is defined as â€Å"the ownership of ideas and control over the tangible or virtual representation of those ideas. † _________________________ ANS:TPTS:1 2. The macro virus infects the key operating system files located in a computer’s boot sector. ________________________ ANS:F, boot PTS:1 3. Once a(n) back door has infected a computer, it can redistribute itself to all e-mail addresses found on the infected system. _________________________ ANS:F virus worm PTS:1 4. A(n) polymorphic threat is one that over time changes the way it appears to antivirus software programs, making it undetectable by techniques that look for preconfigured signatures. _________________________ ANS:TPTS:1 5. When voltage levels surge (experience a momentary increase), the extra voltage can severely damage or destroy equipment. ________________________ ANS:F, spike PTS:1 6. The shoulder looking technique is used in public or semipublic settings when individuals gather information they are not authorized to have by looking over another individual’s shoulder or viewing the information from a distance. _________________________ ANS:F, surfing PTS:1 7. Hackers are â€Å"people who use and create computer software to gain access to information illegally. † _________________________ ANS:TPTS:1 8. Packet kiddies use automated exploits to engage in distributed denial-of-service attacks. _________________________ ANS:F, monkeys PTS:1 9. The term phreaker is now commonly associated with an individual who cracks or removes software protection that is designed to prevent unauthorized duplication. _________________________ ANS:F, cracker PTS:1 10. Cyberterrorists hack systems to conduct terrorist activities via network or Internet pathways. _________________________ ANS:TPTS:1 11. The malicious code attack includes the execution of viruses, worms, Trojan horses, and active Web scripts with the intent to destroy or steal information. _________________________ ANS:TPTS:1 12.The application of computing and network resources to try every possible combination of options of a password is called a brute crack attack. _________________________ ANS:F, force PTS:1 13. One form of e-mail attack that is also a DoS is called a mail spoof, in which an attacker routes large quantities of e-mail to the target. _________________________ ANS:F, bomb PTS:1 14. Sniffers often work on TCP/IP networks, where they’re sometimes called packet sniffers. _________________________ ANS:TPTS:1 15. A(n) cookie can allow an attacker to collect information on how to access password-protected sites. ________________________ ANS:TPTS:1 MULTIPLE CHOICE 1. Which of the following functions does information security perform for an organization?a. Protecting the organization’s ability to function.b. Enabling the safe operation of applications implemented on the organization’s IT systems.c. Protecting the data the organization collects and uses.d. All of the above.ANS:DPTS:1 2. ____ is an integrated system of software, encryption methodologies, and legal agreements that can be used to support the entire information infrastructure of an organization.a. SSLb. PKIc. PKCd. SISANS:BPTS:1 3. ____ are software programs that hide their true nature, and reveal their designed behavior only when activated.a. Virusesb. Wormsc. Spamd. Trojan horsesANS:DPTS:1 4. Which of the following is an example of a Trojan horse program?a. Netskyb. MyDoomc. Klezd. Happy99. exeANS:DPTS:1 5. As frustrating as viruses and worms are, perhaps more time and money is spent on resolving virus ____.a. false alarmsb. power faultsc. hoaxesd. urban legendsANS:CPTS:1 6. Web hosting services are usually arranged with an agreement providing minimum service levels known as a(n) ____.a. SSLb. SLAc. MSLd. MINANS:BPTS:1 7. Complete loss of power for a moment is known as a ____.a. sagb. faultc. brownoutd. blackoutANS:BPTS:1 8. Acts of ____ can lead to unauthorized real or virtual actions that enable information gatherers to enter premises or systems they have not been authorized to enter.a. bypassb. naturec. trespassd. securityANS:CPTS:1 9. There are generally two skill levels among hackers: expert and ____.a. noviceb. journeymanc. packet monkeyd. professionalANS:APTS:1 10.One form of online vandalism is ____ operations, which interfere with or disrupt systems to protest the operations, policies, or actions of an organization or government agency.a. hacktivistb. phvistc. hackcyberd. cyberhackANS:APTS:1 11. According to Mark Pollitt, ____ is the premeditated, politically motivated attacks against information, computer systems, computer programs, and data which result in violence against noncombatant targets by subnational groups or clandestine agents.a. infoterrorismb. cyberterrorismc. hackingd. crackingANS:BPTS:1 12. ___ is any technology that aids in gathering information about a person or organization without their knowledge.a. A botb. Spywarec. Trojand. WormANS:BPTS:1 13. The ____ data file contains the hashed representation of the user’s password.a. SLAb. SNMPc. FBId. SAMANS:DPTS:1 14. In a ____ attack, the attacker sends a large number of connection or information requests to a target.a. denial-of-serviceb. distributed denial-of-servicec. virusd. spamANS:APTS:1 15. A ____ is an attack in which a coordinated stream of requests is launched against a target from many locations at the same time.a. denial-of-serviceb. distributed denial-of-servicec. virusd. spamANS:BPTS:1 16. ____ are machines that are directed remotely (usually by a transmitted command) by the attacker to participate in an attack.a. Dronesb. Helpersc. Zombiesd. ServantsANS:CPTS:1 17. In the well-known ____ attack, an attacker monitors (or sniffs) packets from the network, modifies them, and inserts them back into the network.a. zombie-in-the-middleb. sniff-in-the-middlec. server-in-the-middled. man-in-the-middleANS:DPTS:1 18.The ____ hijacking attack uses IP spoofing to enable an attacker to impersonate another entity on the network.a. WWWb. TCPc. FTPd. HTTPANS:BPTS:1 19. â€Å"4-1-9† fraud is an example of a ____ attack.a. social engineeringb. virusc. wormd. spamANS:APTS:1 20. Microsoft acknowledged that if you type a res:// URL (a Microsoft-devised type of URL) which is longer than ____ characters in Internet Explorer 4. 0, the browser will crash.a. 64b. 128c. 256d. 512ANS:CPTS:1 COMPLETION 1. A(n) ____________________ is an object, person, or other entity that represents an ongoing danger to an asset. ANS:threat PTS:1 2. Duplication of software-based intellectual property is more commonly known as software ____________________. ANS:piracy PTS:1 3. A computer virus consists of segments of code that perform ____________________ actions. ANS:malicious PTS:1 4. A(n) ____________________ is a malicious program that replicates itself constantly, without requiring another program environment. ANS:worm PTS:1 5. A virus or worm can have a payload that installs a(n) ____________________ door or trap door component in a system, which allows the attacker to access the system at will with special privileges.ANS:back PTS:1 6. A momentary low voltage is called a(n) ____________________. ANS:sag PTS:1 7. Some information gathering techniques are quite legal, for example, using a Web browser to perform market research. These legal techniques are called, collectively, competitive ____________________. ANS:intelligence PTS:1 8. When information gatherers employ techniques that cross the threshold of what is legal or ethical, they are conducting industrial ____________________. ANS:espionage PTS:1 9. The expert hacker sometimes is called ____________________ hacker. ANS:elite PTS:1 10.Script ____________________ are hackers of limited skill who use expertly written software to attack a system. ANS:kiddies PTS:1 11. A(n) ____________________ hacks the public telephone network to make free calls or disrupt services. ANS:phreaker PTS:1 12. ESD means electrostatic ____________________. ANS:discharge PTS:1 13. A(n) ____________________ is an act that takes advantage of a vulnerability to compromise a controlled system. ANS:attack PTS:1 14. A(n) ____________________ is an identified weakness in a controlled system, where controls are not present or are no longer effective. ANS:vulnerability PTS:1 15. Attempting to reverse-calculate a password is called ____________________. ANS:cracking PTS:1 16. ____________________ is a technique used to gain unauthorized access to computers, wherein the intruder sends messages with a source IP address that has been forged to indicate that the messages are coming from a trusted host. ANS:Spoofing PTS:1 17. ____________________ is unsolicited commercial e-mail. ANS:Spam PTS:1 18. In the context of information security, ____________________ is the process of using social skills to convince people to reveal access credentials or other valuable information to the attacker.ANS:social engineering PTS:1 19. The timing attack explores the contents of a Web browser’s ____________________. ANS:cache PTS:1 20. A(n) ____________________ is an application error that occurs when more data is sent to a program buffer than it is designed to handle. ANS: buffer overrun buffer overflow PTS:1 ESSAY 1. List at least six general categories of threat. ANS: Compromises to intellectual property : piracy, copyright infringement Software attacks : viruses, worms macros, denial of service Deviations in quality of service : ISP, power, or wan service issues from service providers Espionage or trespass : unauthorized access and /or data collection Sabotage or vandalism : destruction of system or information Forces of nature Human error or failure Information extortion Missing, inadequate, or incomplete Missing, inadequate, or incomplete controls Theft Technical hardware failures or errors Technical software failures or errors Technological obsolescence PTS:1 2. Describe viruses and worms. ANS: A computer virus consists of segments of code that perform malicious actions. The code attaches itself to the existing program and takes control of that program’s access to the targeted computer. The virus-controlled target program then carries out the virus’s plan, by replicating itself into additional targeted systems. A worm is a malicious program that replicates itself constantly, without requiring another program to provide a safe environment for replication. Worms can continue replicating themselves until they completely fill available resources, such as memory, hard drive space, and network bandwidth. PTS:1 3. Describe the capabilities of a sniffer. ANS:A sniffer is a program or device that can monitor data traveling over a network. Sniffers can be used both for legitimate network management functions and for stealing information from a network. Unauthorized sniffers can be extremely dangerous to a network’s security, because they are virtually impossible to detect and can be inserted almost anywhere. Sniffers often work on TCP/IP networks, where they’re sometimes called packet sniffers. A sniffer program shows all the data going by, including passwords, the data inside files and screens full of sensitive data from applications. PTS:1

Saturday, November 9, 2019

Funny Female Monologue From How to Kiss a Girl

Funny Female Monologue From 'How to Kiss a Girl' The following monologue is from a one-act comedy How to Kiss a Girl by Wade Bradford. This one-act play is  a silly, sketch-styled play about a young man named Ken who desperately wants to know how to behave on a date, and even more desperately wants to figure out how and when he should make his move and kiss a girl for the very first time. Monologue Background In order to learn, he enlists the help of his highly advanced smartphone, Minerva. The Minerva device downloads tons of audio instructional information, crafted from centuries of information. not all of the advice, however, is useful to todays typical teen. Unfortunately, Ken is too clueless to realize, and he ends up downloading relationship advice from the 1950s, pre-Civil War America, and even Pilgrims and Pirates. Belle is one of the Audio Advice characters, and while Kens date is wolfing down her spaghetti and slurping ice tea like its going out of style, the refined Southern Belle teaches Ken how to read subtle signs from a proper lady. Much of this monologue involves the old fashioned art of fan language, so the actress performing the art should have an elegant fan to flutter during her scene. The Monologue BELLE: When you arrive at her doorstep, be prepared for a grand entrance. Stand courteously at the doorway, breathlessly awaiting her presence. Drink her in. You are mesmerized. Walk in a half circle around her, never breaking your gaze. And still breathless. Place your left hand behind your back, lift your hat with your right hand, and bow. (Pause.) And now you may breathe. Make certain that you have already prepared a charming compliment, do so in advance to avoid being tongue-tied. Tell her she looks as plump and pretty as a sweet Georgia peach. As radiant and glorious as the days before the civil war. That she makes your heart fire faster than a Gatling Gun. Begin your romantic adventure by extending your elbow so that the lady might take your arm. As you escort her to the carriage, be mindful of any mud puddles that may happen to be in your path. Instead of walking around the watery obstacle, remove your jacket, drape it to the ground, and insist that this lovely plump peach wal k upon the jacket as not to soil her pretty shoes. That is chivalry. As you ride together in the carriage, you might be wondering as to what is going through the mind of this delicate young flower. You may be tempted to talk of idle things, such as the weather, but I find it best if a gentleman sticks to the subject at hand, which is mainly the beauty of the young lady in his midst. This time, select a specific physical feature to complement. Preferably, something above her neckline. I suggest you compliment her eyes, lips, chin, and even perhaps her earlobes if you are feeling particularly bold this evening. Avoid making comments about a womans nose. Even kind words will make her self conscious. But you will notice, as the carriage ride continues, the lady speaks very little, yet she says much. (Produces a fan.) To discover the secrets of her feminine mind, simply observe the subtle signals she gives you with the movements of her fan. If the lady holds the fan with her left hand and places it in front of her face, then she is desir ous of your acquaintance. However, if she twirls her fan in her right hand, like so, then she wants to speak with you in private. Dropping the fan curtly means she simply wants to be friends, but if she presents her fan to you, shut closed thusly, she is asking: Do you love me? Now, this one is most important, so I hope you are paying attention. If the lovely lady presses a half-opened fan to her lips, that means, young man, that she wants to kiss you. Now, watch her closely: What message is she trying to convey to you? Note: This monologue could obviously be performed by one person. However, it could be further developed with a total of three performers. One actress delivering the monologue, while two other performers act out the scene being described.

Wednesday, November 6, 2019

Parts of a Book 101 the Master Guide to Front and Back Matter

Parts of a Book 101 the Master Guide to Front and Back Matter Parts of a Book Explained: Front Matter, Body, and Back Matter Beyond just polishing the story or contents of your nonfiction book itself, getting ready for publication involves preparing several different parts of a book - including the front matter and back matter. If you haven’t come across the terms before, don’t be intimidated! They simply refer to the first and last sections of your book: the bits that make it an â€Å"official† book, and not just chapters printed on bound paper.In this post, we’ll pull out our microscopes and zero in on this anatomy of a book - covering what vital components should be included in the front, body, and back matter, and how you can create them all using our free formatting tool.What makes up the different parts of a book?For a visual aid, we suggest you pull a random book down from the shelf and open it up. You can follow along and see how front and back matter are always arranged the same way. The order of these pages does matter (pun intended), so these parts require a little extra attention. Is there anything else you would like to know about the parts of the book or the logistics of self-publishing? Leave a comment in the box below and we'll do our best to answer your questions.

Monday, November 4, 2019

Ip1 managing high performance Research Paper Example | Topics and Well Written Essays - 250 words

Ip1 managing high performance - Research Paper Example Therefore, supervisors have to interact with sub-ordinates to find out the best style of management to utilize for effectiveness. Some will need an authoritarian manager while others will perform adequately in a participative manner that guarantees the best result. Theory X can use in managing unskilled labor-force and large scale production. Theory Y is best suited for professional services as well as knowledge-based work, such as call center procedures (Winslow, 2009). Theory Y and democratic decision-making are at some degree comparable. The employees working under theory Y naturally merged their objectives to the organization’s objectives. Theory Y allows employees to participate in decision-making but leave management to implement decisions made. However, democratic decision-making is when an individual makes decisions without external influence. Employees’ performance and morale can improve if a manager understands the two theories. The manager can hence practice the excellent leadership style. As a result, he can advance the productivity of the organization (Drucker,

Saturday, November 2, 2019

Microbial disease and immunology Assignment. Writing a scientific Essay

Microbial disease and immunology Assignment. Writing a scientific abstract - Essay Example 7 females), aged between 18-69 years, were divided into three groups based on severity of pulmonary TB infection as mild (infection in single lobe, no visible cavities), moderate (two or more lobes with/without cavities), and advanced (bilateral disease, multiple cavities). 12 healthy volunteers comprised the control group. Cytokine measurements were performed using ELISA. Kruskal-Wallis, Mann-Whitney tests, and Spearmans rank test were employed for statistical analysis. Levels of the four cytokines (Th1 type cytokines – IFN-y and Il-2, and Th2 type cytokines – IL-4 and IL-10) were significant in all the three groups; however, the pattern of circulating cytokines varied. Higher levels of Th1 cell type cytokines were seen in the mild group, while high levels of both Th1 and Th2 type cytokines were seen in the moderate group. Advanced patients had higher levels of Th2 type cytokines and lower levels of Th1 type cytokines. Thus, while cell-mediated immune responses are sig nificant in mild tuberculosis, advanced tuberculosis is characterised by impaired cell-mediated immune responses and enhanced humoral responses. It can be concluded that expansion of IL-4 and IL-10 producing T cells is positively correlated with the severity of pulmonary

Thursday, October 31, 2019

Aristotle, Nicomachean Ethics, Mullen, Hard Thinking About Values Essay

Aristotle, Nicomachean Ethics, Mullen, Hard Thinking About Values - Essay Example However, to this end Aristotle argues that the action of living, which consists of elements like nourishing and providing nutrition to the body, goes the same as that of other living matters like plants. Again, the skill of perceiving different senses, which the human beings think that they are capable enough, does not also constitute the acts of ‘proper function’. It is because as Aristotle argues that even nomadic creatures like animals also possess such skill sets. Aristotle states that apart from the previous two conditions of simple living and the ability to perceive the external world through the sense organs human beings possess the power of rational thinking. This rational thinking links up the individual with a host of different activities. Human beings to sustain themselves must use their rational thinking for performing effectively. Effective performance of an activity by a human being signifies that the person desires to set defined standards in the work done . The individual must optimally use one’s own strength in performing the actions with considerable efficiency to maintain the standards previously set. Optimal utilization of one’s own strength and knowledge to perform the tasks assigned hold that the performance is accomplished in conformation to one’s soul.

Tuesday, October 29, 2019

Life Cycle Assessment Essay Example for Free

Life Cycle Assessment Essay This Life Cycle Assessment (LCA) aims to evaluate the environmental impact of the production of candlesticks. All the different materials and processes required to manufacture candles need to be taken into consideration to determine the impacts on the environment. The most common material used to manufacture candles is paraffin wax. Each candle comes in some type of individual packaging most of the time. Candle wicks are made using various natural fibers, such as reeds, rushes, or cotton. An important refinement in wick technology introduced the plaited wick, which burned more than unplaited wicks. Currently, twisted or plaited cotton makes up most of the wicks. The candlestick is made of steel, or could also be made of metal. The functional unit will be a 125ml candle able to generate up to 25 hours of light. Each steel-made candlestick can only hold one candle, and can be used several times. Inputs: †¢Paraffin wax †¢Cotton †¢Metal †¢Materials for packaging Outputs: †¢Gas emissions: when candles burn, paraffin wax emits greenhouse gasses such as carbon dioxide. †¢Depletion of natural resources: paraffin wax is derived from crude oil. Paraffin candles are petroleum products, a non renewable resource. It could increase pollution due to oil spills and the processes needed to extract petroleum. At the same time, the extraction of metal needed for the candlestick causes large volumes of solid waste, requires large amounts of energy, and produces air, soil, and water pollution. †¢Chemicals toxicity: some candles might have lead or zinc in their wick, which release harmful gasses when they burn. Also, scented candles can release toxins from the chemicals used to give them scent. Question 2 of 3 (10 points) Corporate Environmental Management Tools †¢Ecolabelling: Swan eco-label was developed for candles by the Nordic ecolabelling. The main purpose is to reduce the emission and effect of substances harmful to users’ health and the reduction of gases that have and impact on climate change. According to this scheme, 19 out of 28 are environmental requirements, such as description of the candle, description of chemical additives, among others. †¢Design for the Environment: Enabling consumers to quickly identify products that are safer and that can help protect the environment will make them choose a certain product more frequently. If manufacturers start focusing on producing candles that are made from the safest possible ingredients, consumers, producers, and the environment will benefit. †¢Sustainability reports: Keeping track of environmental performance and the capacity of a company to use and maintain resources in a way that prevents depletion, will improve economic, and social performance. If candles can be produced in a more sustainable way, that is, using substitutes sources that are renewable and less harmful, the final product will be more successful in all the areas. Therefore, reporting this information will allow constant improvement of all the processes. †¢Integrated supply chain management: It is important to know which stages in a supply chain are the ones that are being less efficient, and negatively affecting the production of a good, in this case, candlesticks. Determining these processes can enable their improvement to have a more environmentally friendly supply chain. †¢Carbon footprint: As we need metals for producing a candlestick, we depend on large amounts of energy and, if the energy is generated using fossil fuels, it has a large carbon footprint. Measuring carbon footprint allows the whole manufacturing process to be analyzed, realizing which stages have a stronger impact and how can they be improved. †¢Cleaner production: improvement of the machinery used in each stage of production can decrease the environmental impact of producing candles, as it will decrease waste created after different processes. It can also make the processes more efficient, benefiting the company. Development of technology has made these improvements possible. †¢Stakeholder analysis: every single company must consider all the interested parts in a product as they are the ones that decide how successful and efficient a good will is. If the manufacturing of candlesticks is for example affecting the surroundings of a plant, people, that are consumers too , can generate social impacts that will worsen the company’s performance and image. Question 3 of 3 (4 points) Challenges and limitations Candles can be made of different types of wax that have different impacts on the environment. Some of the raw materials that could be used to produce a candle can be less harmful than others. The candleholder life span could vary depending on the quality of the metal that is being used. Therefore, changing the life span of the candlestick. Transition from a â€Å"Cradle to Grave† to a â€Å"Cradle to Cradle† Steel has high scrap metal recycling value. Old metal material can be reused to make new products. Recycling old metal products uses 95% less energy than manufacturing it using new materials. Metal recycling processes require using a lot of energy. If we recycle metal products we only have to use a low percentage of this total energy, decreasing the use of our natural resources and reducing greenhouse gas emissions. To minimize wasteful wrapping of candles, the material used for packaging can reduce the environmental impact by choosing more recyclable materials. Aluminum, for instance, could be used as a base for the candles, or even to manufacture a candleholder, considering it can be easily recycled. Glass, can be recycled too, reused, and even upcycled into new materials or products. Avoiding candles with extra plastic packaging can also decrease the negative impacts on the environment. In addition to packaging decisions, considering the materials used for manufacturing of candles can benefit the producers, consumers and the environment. For example, soy and beeswax candle emit fewer harmful chemicals when burned. Another way to reduce pollution is to buy from local candlemakers. This reduces wasteful packaging, and there is no need to transport raw materials to a farther manufacturing plant, and to consumers at longer geographical distances. Thus, reducing fuel usage and supporting local bus inesses as well.

Sunday, October 27, 2019

Workplace Bullying and Victimisation on Productivity Impact

Workplace Bullying and Victimisation on Productivity Impact TASK 1: BE ABLE TO UNDERSTAND HOW TO FORMULATE A RESEARCH SPECIFICATION Evaluating how workplace bullying and victimisation can affect productivity. Introduction Any effective and successful business understands the importance of productivity in the workplace. Being productive can help the firm increase and utilize the capacity of the human resources it has. Most productive companies have happy and healthy employees, which are the basis of a successful organization. Customer Benefit Productivity in the workplace will often translate into good customer service and interaction. This total client experience is the key to satisfying customers and clients, and almost all highly productive companies use this to gain customer loyalty. When a customer is loyal to your business, they will share their experience with others, which is a marketing advantage coming out of high levels of productivity. The Company The employees themselves are an investment, and like any investment, they should yield a healthy or worthwhile return to the company. Therefore, when employees are highly productive the company achieves its goals of investing in them in the first place. Productivity also helps to motivate the workplace culture and boost morale, producing an even better company environment. The Work Force More often than not, when a firm is highly productive, it eventually becomes successful, and because of this, incentives are bound to be made available to the employees. These include pay raises, bonuses, medical insurance and so on. This will also motivate employees and gives them more job opportunities as the company grows. Productivity in the workplace is an important aspect of every company and when top management understands this concept, success is just around the corner. However, if your company doesnt give you the incentive to increase productivity, you may want to start looking for another job because the lifeblood of your company is running out. I have chosen this research proposal because I have heard of cases of bullying at work and it also happened to me in one of my previous roles. I believe its a topic that can be viewed from different perspectives and I have tried to tackle it as best as I could. In order for me to understand this research I will be using different methods of evidence of primary research conducted by using the questionnaire methodology and including secondary data that will be derived from literature and other sources related to bullying and victimisation. This research will be conducted in the Private sector specifically in the IT field. Literature review Various literatures support the belief that bullying falls into one of four forms of behaviour: verbal, non-verbal, physical and subtle. Townend (2008) examined each of these to identify how they are reflected in practice. In relation to verbal behaviours, the author reported that bullying would often occur through the aggressor/bully making unpleasant, sarcastic comments, with the intention of humiliating the individual.The strongest verbal bullying behaviour refers to the deliberate andrepetitive exclusion of an individual from conversation; for example, asking all members in a team meeting for a contribution, except for the targeted individual. Non-verbal bullying behaviours were reported to be initiated through factors such as the avoidance of eye contact. Technological advancements have significantly impacted upon non-verbal bullying, with the potential to use emails, text messages and social networking websites as a means of distributing abusive messages, and further excluding individuals. Physical bullying is fairly obvious, with the behaviour often involving physical violence, such as striking the victim, or d amaging their property. Regarding subtle bullying behaviours, Samnani (2013) defined these behaviours as negative acts which are not immediately obvious, but undermine the individual. This is often the most popular choice of bullying behaviour, with actions being open to interpretation, making it difficult to detect from a neutral perspective. Subtle bullying behaviours include actions such as withholding important information, persistent criticism, excessive supervision, being assigned menial tasks, excessive workloads, gossiping and insults (Samnani, 2013); actions which through not being immediately obvious, may not always be perceived by victims as bullying. In defining workplace bullying, Einarsen et al (2011: 22) put forward the definition that bullying at work revolves around harassing, offending, socially excluding someone or negatively affecting someones work. In order for the label of bullying to be applied to a particular activity, interaction or process it has to occur repeatedly and regularly over a period of time. Bullying is an escalated process in the course of which the person confronted ends up in an inferior position and becomes the target of systematic negative social acts. Elaborating upon this, it is important to differentiate workplace bullying from workplace violence. The former is primarily psychological and persistent, whilst the latter is primarily physical and irregular (Cooper-Thomas et al, 2013). Your literature review has to incorporate both literature of the importance of productivity in a work setting and the effects of bullying and victimisation. Purpose of the research This aim of this research is to examine workplace bullying from a theoretical perspective; providing an insight into the prevalence of workplace bullying and how it might affect staff and productivity and the implications and suggest effective ways organisations could use to tackle this phenomenon. The objectives that will be used to achieve that are as follow; To assesses gender differences and ethnicity in a given work place To identify perceptions of work bullying and victimisation To analyse implications of work bullying and victimisation To determine the response of organisations in cases of bullying. Rationale of the research: In determining the extent to which workplace bullying can detrimentally impact an organisation, appropriate response is required. It is reported in the United Kingdom, that approximately only 80% of organisations have anti-bullying policies in place (Harrington et al, 2013); thus, suggesting there is still a sizeable population allowing the issue to go uncompromised. This is not the case for all organisations, with data suggesting workplace bullying costs upwards of  £2 million a year, and 18 million in lost working days, organisations understand the need for action (CIPD, 2006). Bullying is typically a problem faced by Human Resource departments (HRM), and thus it is their role to be at the forefront, introducing eradicative methods. Khan and Khan (2012) proposed four key strategies that HR departments can implement in attempting to manage workplace bullying; education and training, corporate responsibility, possession of the right machinery and support. The collaboration of these four items, form an organisations anti-bullying policy. Scope and limitations I believe my research project is suitable for all employees and employers out there who deal with such situations where work bullying and victimization may occur. By reviewing some of the literature available online and the questionnaire I have put together to see some real views from individuals who have experienced bullying a work, I hope to raise more awareness of this phenomenon prevalence. I expect this research to take up to 1 month in order to get the best of the resources that need to be analyzed and acknowledged for optimal results. As a disadvantage, I would mention that if I would have more time to look into more cases of bullying I may get more results that would add help in enhancing my research. Ethical implications The implications and ethical issues involved in my research affects safety, engagement, productivity, trust, and the workplace culture. It poses the question to leaders, just how important is a healthy work culture to business and long-term success. Research methodology The method of primary research utilised a questionnaire methodology. However, emphasis was placed on asking open-ended questions, so to attain qualitative data. This focus was assigned, as I sought to obtain in-depth responses, outlining individual exposure to bullying. The sources used for this research project include: questionnaires, books and internet pages. ADD QUANTITATIVE AND QUALITATIVE INFO. (DATA USED) ADD WEBSITE USED Evidence research proposal Word count: 800/1000 words TASK 1 part 2: Provide an appropriate plan and procedures for the agreed research specification (AC1.5); Provide an appropriate plan and procedures for the agreed research specification Here, you need to set an action plan using the key objectives(see above) and your research methodology (e.g design questionnaire, do a survey, gather secondary information, arrange interview etc) of your research question of hypothesis. Research objective By when Resources to be used (2.1) Milestones (when do you know this objective is achieved) Review dates (which is after the by when to ensure that you have actually achieve the objective ) How will you monitor this objective is being achieved? method of monitoring To assesses gender differences and ethnicity in a given work place 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target To identify perceptions of work bullying and victimisation 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target To analyse implications of work bullying and victimisation 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target To determine the response of organisations in cases of bullying. 25/12/2016 Books, internet information 25/01/2017 03/02/2017 To ensure that I have met my target TASK 2: BE ABLE TO IMPLEMENT THE RESEARCH PROJECT WITHIN AGREED PROCEDURES AND TO SPECIFICATION 2.2 Undertake the proposed research investigation in accordance with the agreed specification and procedures. Primary data collection The primary research revolved around the adoption of a questionnaire methodology. The purpose behind this research was to provide and source first-hand accounts from individuals that have been exposed to incidents of workplace bullying. Questions were formed with consideration being allocated to the items highlighted in the literature review. These included questions referencing how the respondent was bullied, by whom, whether it impacted upon their intention to leave the organisation, the short-term and long-term implications, and how the individual structured their response. Qualitative data was selected and in turn open ended questions posed, providing contexts, like one-to-one interviewing, that allow a participant to express their beliefs, assumptions, desires and understandings (Horn, 2012, p103). The questionnaire was created using the Likert scale. This method was used instead of alternative methods, such as face-to-face interviews, as according to Dayan et al (2009) when responding to sensitive questions, methodologies that reduce the level of question administration by human interviewers, such as online questionnaires, increase responses to sensitive personal questions and yield more honest, candid answers. This belief is formalised as researchers suggest that without the presence of an interviewer, online questionnaires are able to attain higher levels of personal disclosure and reductions in responses being affected by social desirability. Online questionnaires also allow respondents to remain anonymous. This is critical in two ways; firstly people are more willing to theoretically open up and disclose information if they feel free from further repercussions, and secondly, anonymity has been proven to reduce social anxiety and social durability when divulging information . For this methodology, the author elected to adopt a self-selective sample. This was selected as the author wanted to obtain responses from individuals that met the specific criteria of having experienced exposure to bullying first-hand, but in doing so placed no pressure on individuals to participate and divulge information. Although this is not high, emphasis was placed on quality rather than quantity. Please be more specific as to what you intend to prove Advantages and disadvantages of the methodology used Although this research question addresses an important topic of discussion in literature, there are a number of limitations and benefits that can be associated towards the chosen methodology. As mentioned the method used is questionnaires, with open ended questions. In evaluating these, the methodologies will be discussed separately. Regarding the questionnaire, it can be recognised that this methodology is faced with the limitation of only having obtained a very small sample size in the form of n=4. The problem this inflicts in respect to the relevance of the data is that through the attainment of such a small sample, it raises questions regarding the generalisability of the results. Although the author hoped that this would not be the case, through the research conducted having very specific and sensitive criteria, in the form of having been bullied and willing to disclose their account, the author acknowledged that the potentiality of an undergraduate finding and sourcing willing respondents would be slim. As such, in an attempt to counter this and make the most of the sample size obtained, the author sought to compensate the limitation through ensuring the responses were in-depth. The intention was to ask a magnitude of questions, which would result in the attainment of individual detailed accounts, addressin g the various elements highlighted and discussed in the literature review. However, the rich data yielded by this small sample group offered important insights into the effects of bullying in the immediate and longer term, that now warrant further investigation through wider sampling. The benefits attached to this methodology, refer to the provision of sensitive and personal data. Dayan et al (2009) stated that online questionnaires have the strength of obtaining honest answers, as through the removal of question administration by human interviewers, participants are made to feel more comfortable in the relative anonymous environment of the internet. This in turn yields greater detailed and candid answers as participants feel comfortable and free from judgement; although the danger associated with online participation runs the risk of whether the information disclosed is indeed factual, or ultimately a positive contribution towards the discussion. Secondary data used- sources from online website Advantage and disadvantages of the methodology used 2.3 Record and collate relevant data where appropriate. DEFINE ANOVA AND EXPLAIN THE IMPORTANCE OF USING IT. ANOVA One-way completely randomized       Workplace bullying Male Male Female Female 1 2 2 1 1 2 2 2 2 3 3 4 4 4 4 4 1 1 1 1 5 4 4 4 4 6 4 4 4 4 7 1 1 1 1 8 2 2 2 2 9 1 1 1 1 10 2 2 2 2 n 10 10 10 10 X 2.300 2.300 2.200 2.300 s 1.252 1.252 1.317 1.337 Xave 2.275 source df SS MS F P-value treatments 3 0.075 0.025 0.0150 0.9974 error 36 59.900 1.664 total 39 59.975 INTERPRET THE DATA AND WHAT YOU THINK OF THE DATA ANALYSIS MEHTOD USED-ANOVA! 2.Advantages and disadvantages you found for the data analysis methods? Points to be considered forData analysis and interpretation (you can use at least 2 for advantage and 2 for disadvantage); qualitative and quantitative data analysis interpreting transcripts; coding techniques; specialist software; statistical tables; comparison of variable; trends; forecasting. Evidence: record and completed evidence of data collected Although this research question addresses an important topic of discussion in literature, there are a number of limitations and benefits that can be associated towards the chosen methodology. As mentioned the method used is questionnaire, including open ended questions. In evaluating these, the methodologies will be discussed separately. In reference to the questionnaire, it can be recognised that this methodology is faced with the limitation of only having obtained a very small sample size in the form of n=4. The problem this inflicts in respect to the relevance of the data is that through the attainment of such a small sample, it raises questions regarding the generalizability of the results. Although I hoped that this would not be the case, through the research conducted having very specific and sensitive criteria, in the form of having been bullied and willing to disclose their account, I acknowledged that the potentiality of an undergraduate finding and sourcing willing respondents would be slim. The intention was to ask a magnitude of questions, which would result in the attainment of individual detailed accounts, addressing the various elements highlighted and discussed in the literature review. However, the rich data yielded by this small sample group offered important insights into the effects of bullying in the immediate and longer term, that now warrant further investigation through wider sampling. The benefits attached to this methodology, refer to the provision of sensitive and personal data. Dayan et al (2009) stated that online questionnaires have the strength of obtaining honest answers, as through the removal of question administration by human interviewers, participants are made to feel more comfortable in the relative anonymous environment of the internet. This in turn yields greater detailed and candid answers as participants feel comfortable and free from judgement; although the danger associated with online participation runs the risk of whether the information disclosed is indeed factual, or ultimately a positive contribution towards the discussion. D3 Justify the choice of data collection methods used for 2.3. Why did you use the collection methods that you chose? Evidence: report. TASK 3: Be able to evaluate the research outcomes 3.1 Use appropriate research evaluation techniques. How was the project planning? Explain how you met your aims and objectives from the proposal by stating each objective and explain on how you met this (please link to useful research). What were your research methods effective? How valid and reliable were you findings? e.g. successes and failure What are the benefits of your research results? linked to the usefulness of the research. What were the difficulties you encountered? e.g. people not willing to talk, time consuming, working on excel , not enough literature review, not experienced with regards to research. Discuss about methods of data analysis used and why? Please add conclusion. Evidence: a report on how you used the research evaluation techniques. Please demonstrate the use of the techniques with the aid of statistical or any other relevant tools. Please make sure that you are linking the above to your research. The purpose of this research has been to examine the prevalence of workplace bullying, whilst addressing the experiences of how people responded to their personal experiences of workplace bullying. 1. Prevalence Considering the data obtained in evidence the questionnaire, it can be identified that of the population surveyed were classified as exhibiting bullying behaviour; owing to their responses, whilst some were classified as exhibiting victim behaviour. Referring back to literature findings regarding prevalence rates, similarities can be recognised with the study conducted by Einarsen et al (2011), where empirical evidence suggested that around 5-10% of the European population had at some point been a victim of workplace bullying. Although, the actual rates differ to an extent, they do not drastically juxtapose; supporting the overwhelming theme that workplace bullying remains a continuous and prominent issue in organisational culture. This is further supported through the basic comprehension of the questionnaire, with the four participants each accounting for how the bullying they had experienced had taken place, and the factors that facilitated its continuation. In seeking to generalis e these findings however, difficulties would be faced as no unilaterally agreed prevalence rates could be established. The only conclusion that could be formalised was that the issue remained a threat to both individuals and organisations. 2. Prosocial Recognition regarding the prominence of these behaviours brought into focus the hypotheses, particularly hypothesis one; that a negative relationship existed between the variables of prosocial behaviour and bullying behaviour. In relation to the response obtained from the questionnaire and the subsequent ANOVA analysis, it could be identified that this hypothesis was proven, with the relational significance being obtained. Comprehension of this analysis, in reference to the research question, would seem to suggest that the adoption and implementation of prosocial behaviour directly correlates with a reduction in bullying behaviour. Based upon this finding, it can be suggested that the creation of a culture that promotes prosocial behaviour would be an intellectual move, and one that would be likely to obtain success in diminishing the incidence and effects of workplace bullying. Relating these findings to the literature review, it can be met with support, with Griese (2013) speaking of it as possessing the potential to be utilised as a resilience tactic. By this, the author suggested that prosocial behaviour would reduce incidence of bullying, as the aim is to assist others and to attain social needs; something that would be severely hampered by acts of bullying. In respect to what has been identified thus far, the statistical evidence would seem to support the suggestion, as it shows firstly that bullying remains a predominant issue, and secondly the importance prosocial behaviours can play in eliminating workplace bullying. In applying these findings to the questionnaire, it can be acknowledged that the evidence gathered from the qualitative data supports the creation of a prosocial culture. The interviews conducted with participants via questionnaires, for example, highlighted that in many cases, failure to create prosocial behaviours and positive leadership from management was instrumental in allowing bullying to occur, and in some cases actually led to it being instigated by those in management. This in turn had an effect upon other people within the organisation, with bullying escalating from one-on-one to the creation of a climate of bullying where people felt compromised in their position. The perceived vulnerability that this inflicted upon workers, and in particular victims, reduced their ability to report their experience, as the appearance of bullying as an organisational wide issue resulted in the feeling that their claims would not be listened to; suggesting either nothing would change, or t he risk that the issue would potentially even intensify. This has important implications for both the organisation and management, with the recognisableneed for training to be put into place, setting behavioural boundaries and guidelines that promote the implementation of prosocial behaviour as a form of organisational strategy. The adoption of such training would have to extend itself towards raising awareness amongst workers, regarding the mechanisms available to them to report any grievances. This would be an integral component of the training programme, as in both the literature review and qualitative questionnaire, the findings outline a common perception held by victims, that there is either a sense of non-existent, or limited knowledge of the mechanisms available. Referring to the implications identified, in particular the need for training programmes to promote prosocial behaviour and counter the wider spectrum of workplace bullying, Branch et al (2012) expanded upon existing literature to provide support. The authors (2012) claimed organizational training designed to educate employees about bullying behaviours, the nature of its influence and equipping them with skills to address incidence of bullying, had been found to incur long-term, positive benefits, with improvements in attitudes, knowledge and behaviour. In particular, emphasis would be placed on equality training amongst management. This is important as reflection of the qualitative data highlighted that participant one had been victimised whilst on pregnancy leave, with a job offer being sent by management as a subtle technique of pushing her towards the exit. Equality of opportunity would not do this, but it does depict the necessity for organisations as a whole to create a culture, whereby managers are not capable of displaying such negative acts. What the collaboration of the data shows is that whilst it does occur, it is important the organisation itself implements training for managers, to create a line to be answered by management/organisation. The creation and implementation of the prosocial culture will helporganisations raise awareness and possess knowledge regarding how workplace bullying takes place, so that it can be identified efficiently and appropriately handled if an incident were to occur. Further support for the creation of a prosocial culture originates from the qualitative data. Participants claimed during their negative experiences, other employees had approached them and shared that they had noticed what was going on, but did nothing about it out of fear of being personally targeted. This outlines the importance for the creation of a prosocial culture, as the concept of looking out for the well-being of others and promoting positive behaviour would enable employees to acknowledge the sense of duty to report any acts which pose a threat to the elected culture. 3. Reporting and Long-term effects Examination of the qualitative data identified that none of the four participants reported their experience, citing that neither felt comfortable doing so. The participants highlighted the cause for this as being a lack