Monday, December 23, 2019

American Sign Language Is Not A Universal Language

We exchange thousands of words everyday with people around us. Most of us gifted with the ability to listen to a friend, process it in our brain and respond through our mouth. However, there are some people who lack these kinds of ability, unfortunately. Unlike us, this group of people use sign language to communicate with others. For everyday life, deaf people use sign language to communicate with one another. It is a complete language that involves hand movement added with facial expression and body movements. According to National Associates of the Deaf (NAD), â€Å"American Sign Language (ASL) is a visual language. Through signing, the brain processes linguistic information through the eyes. The shape, placement, and movement of the hands, as well as facial expressions and body movements, all play important parts in conveying information.† American Sign Language is not a universal language. Just like spoken language, different types of sign languages are spoken in differen t countries. For example, United Kingdom use the British Sign Language (BSL), and Japan uses the Japanese Sign Language (NAD). Like many other linguistic groups, deaf people have their own culture and community. According to the World Federation of the Deaf, deaf people as a linguistic minority share common experiences in life, and this establishes itself in Deaf culture. They often have same or similar beliefs, attitudes, history, norms, values, literary traditions, and art. There are many local andShow MoreRelatedDeafness : The Deaf World947 Words   |  4 PagesDeaf people communicate through sign languages and the languages are absolutely beautiful. Sign Language isn’t an international language because every region have their own, but there are universal features in sign languages. The universal features in sign languages allow different sign language users to understand each other effortlessly. Sign language communication through body gestures so in a way, most hearing people themselves use some sort of sign language. For example, it’s smiling to showRead MoreNative American Sign Languag e Essay1449 Words   |  6 PagesNative American Sign Language Very basic, elementary and logical characteristics made the Native American Sign Language the worlds most easily learned language. It was Americas first and only universal language. The necessity for intercommunication between Indian tribes having different vocal speech developed gesture speech or sign language (Clark; pg. 11). Although there is no record or era dating the use of sign language, American Indian people have communicated with Indian Sign Language forRead MoreChloe Ziff . Professor Gary Rosenblatt. April 13, 2017.991 Words   |  4 PagesProfessor Gary Rosenblatt April 13, 2017 American Sign Language II Seeing Voices By Oliver Sacks Seeing Voices is a profound novel that was written by famous neurologist,  Oliver Sacks in 1989. Seeing Voices is a book that delves into the history of Sign Language and expresses a genuine meaning behind what language truly is.   Oliver Sacks is an engaging and fascinating writer. Being able to explore outside what he is used to, he can expand his knowledge about language. Being knowledgeable on psychiatryRead MoreEnglish Is An International Business Language1399 Words   |  6 Pagesaccelerating the development of a universal way of life is proved by the spread of English. Language - the great agent of homogenization, it is the wave on which culture is transmitted. If English becomes the main language of communication, the consequences are obvious: culture of English-speaking countries will be dominant in the world. English is the first universal global language. Although there may be as many people who speak different dialects of Chinese language, as well as English-speaking , neverthelessRead Morenonverbal communication Essay1009 Words   |  5 Pagesthat nonverbal communication is universal, but it’s not. There are multiple times when people use alternative methods of communication. Most of the time people are communicating when they don’t even know it. For instance, a job interview deals with a lot of communication and different types of different cultures. Each culture interprets body language, posture, and gesture differently. For example, when someone sticks their middle finger up at you, we as Americans know that is disrespectful. InRead MoreNonverbal Communication : Non Verbal Communication890 Words   |  4 Pagesverbal communications are observed can be traced to differences in facial signs that individuals from West and East look for when detecting emotions (Serlin, Berger Bar-Sinai, 2007). Therefore, people from distinctive cultures are expected to be taught to express their feeling via clear indications, although those from collective cultures are trained to subdue individual feeling, assigning them ultimately via indirect signs. Jui-Pi (2014), offers a relatively simple-minded view of nonverbal communicationRead MoreDeafness And Other Communication Disorders984 Words   |  4 Pageslegitimacy of signed languages, the greater part of different societies around the world classified Deaf people as disabled. This term disconnects all of the persons labeled from normal life, degrading them at the same time. Although a few people are better educated and choose to not use the word disabled, it still is a common title given to those who are Deaf. Another example of misinformation is the general idea that American Sign Language is English translated into signs word for word. VariousRead MoreNotes On American Sign Language1464 Words   |  6 Pages American Sign Language Overview American Sign Language is language that is predominantly spoken and used by all ages who may be deaf or communicating with someone who is deaf. It has lingua franca language, and many use it as a second language. We use a variation of sign language each day, for example our body language or hand gestures. When we are trying to explain something or imply how we feel we move and have expressions. Sign Language uses those emphasis of gestures to imply importance, emotionRead MoreThe Effects Of Deafness On Deaf Children1669 Words   |  7 Pagescollectivism, identity, transnationalism, community, and Deaf Space. American Sign Language is a visual-based language that is the primary language used by Deaf individuals. American Sign Language benefits our society due to the language’s visual nature, which produces a creative expression that is otherwise not experienced in oral languages. Research done by Bauman and Murray has shown that â€Å"Deaf individuals who use American Sign Language have more well-developed peripheral vision, a greater ability toRead More The Critical Period Hypothesis of Language Acquisition Essay1120 Words   |  5 PagesCritical Period Hypothesis of Language Acquisition Ahhhhh! I yell in frustration. Ive been studying Spanish for seven years, and I still cant speak it fluently. Well, honey, its not your fault. You didnt start young enough, my mom says, trying to comfort me. Although she doesnt know it, she is basing her statement on the Critical Period Hypothesis. The Critical Period Hypothesis proposes that the human brain is only malleable, in terms of language, for a limited time. This

Sunday, December 15, 2019

Fiction and Story Free Essays

Character Analysis The Story: the Monkey’s Paw * Character: Pamela * Point of View: Third Person Omniscient * Writing Genre: Descriptive * The Monkey’s Paw was a descriptive story because throughout the whole story they were describing the paw and throughout the Afterlife you will see Pamela describing her feelings on what happen to her brother Herbert. * Fiction Genre: Mystery * I picked mystery for the Monkey’s Paw because in the end of the story I wasn’t clear on what happen and in the afterlife things happened that no one knows but me. * Literary Device: Conflict I picked conflict as my literary device because there’s a lot of conflict in this story with Pamela, Herbert, Mrs. We will write a custom essay sample on Fiction and Story or any similar topic only for you Order Now White, Mr. White, and the star of the book â€Å"The Paw†. And also in the afterlife there’s a lot of conflict between Mr. White and Pamela * Literary Convention: Dialogue * I chose dialogue as my literary convention device because throughout the entire story there were * I picked comprehension for my blooms taxonomy device because you have to comprehend what happen in the regular Monkey’s Paw before you can understand what’s going on in the afterlife. Rhetorical: Onomatopoeia * I chose Onomatopoeia for the Rhetorical device because in The Money’s Paw afterlife the story has a lot of sound effects. * Sigmund Freud: ID * I chose ID as my Sigmund Freud device because in the afterlife the characters have childish types of behavior. * Writing Mode: Reflection * I picked reflection to be my writing genre device subgenre because throughout the sequel it will be flashbacks on why something happened. * Nonfiction Genre: * Philosophy The Story: Swimming To Antarctica Character: Ms. Cox * Point of View: Third Person Omniscient * Writing Mode: Narrative * Swimming to Antarctica was a Narrative story because Ms. Cox was telling the story and she was the person who was actually swimming to Antarctica. * Fiction Genre: Mystery * I picked mystery as my fiction genre because after the original story Swimming to Antarctica was over they didn’t explain to the reader what happen to Ms. Cox. But, you will find out what happened to her in the afterlife of Swimming to Antarctica. Literary Device: Conflict * I chose conflict as my literary device for â€Å"SA† because in the afterlife there is a lot of conflict between Ms. Cox and her health. * Literary Convention: Dialogue * Dialogue plays a very big role in the afterlife of Swimming to Antarctica. You will see that Ms. Cox and her doctor having multiple conversations. * Blooms Taxonomy: Comprehension * For the afterlife of Swimming to Antarctica you will have to remember what happen in the original story. * Rhetorical: Onomatopoeia Throughout the afterlife of â€Å"SA† there will be sound effects and actions going on. * Sigmund Freud: ID * I chose ID because once again there will be childish decisions that Ms. Cox make in the afterlife of Swimming to Antarctica that will classify her as ID. * Writing Mode: Reflection * In Swimming to Antarctica Afterlife you will realize that I will be having flashbacks on what happened in the original story. * Nonfiction Genre: * Philosophy: The Story: Occupation Conductorette * Character: Maya Angelou * Point of View: Third Person Omniscient Writing Genre: Persuasive * Occupation Conductorette was a persuasive story because Ms. Angelou was trying to persuade the people to give her a job at their company. * Fiction Genre: Mystery * I picked mystery for the afterlife of Occupation Conductorette because no one knows what happened in 2019 with Maya Angelou and the job she wanted so bad. * Literary Device: Conflict * Throu ghout the afterlife of Occupation Conductorette you will figure out that there is a lot of conflict between Maya Angelou and the young lady Paradise. Literary Convention: Dialogue * In the Afterlife of Occupation Conductorette there will be more than enough dialogue between Maya Angelou, Paradise, and the white man. * Blooms Taxonomy: Comprehension * In the afterlife of â€Å"OC† you will see a big change in rolls and you wouldn’t understand what’s going on if you didn’t comprehend the original â€Å"OC†. * Rhetorical: Onomatopoeia * Throughout the afterlife of â€Å"OC† there will be sound effects but not as much as the others stories because â€Å"OC† is a more serious taking story. Sigmund Freud: ID * I chose ID because in the Afterlife Maya Angelou had a few ID behaviors when it came down to her making a decision. * Writing Mode: Reflection * Throughout the afterlife of Occupation Conductorette you will see Maya Angelou have flash backs on her experience of begging for a job. * Nonfiction Genre: * Philosophy: The Story: The Leap * Character: The Mom * Point of View: Third Person Omniscient * Writing Mode: Expository * The Leap to me is classified as a expository story because How to cite Fiction and Story, Papers

Saturday, December 7, 2019

Preventing System For Criminal Activities †Myassignmenthelp.Com

Questions: What Are The Devices And Activities Which Should Be Protected Against The Occurrence Of Cyber-Criminal Offence? What Is The Reason Behind The Success Of The Intrusion? What The Issues Rose By The Cyber Threats? Why The Security Threats Are Not Detected Proactively? What Are The Punishment Standards For The Digital Offence? What Are The Risks Associated With The Security Of The Digital Information? Answers: Introduction The cyber-security is the set of standards and principles used for securing digital environment. It helps in safeguarding the digital infrastructure from cyber-attack. The cyber-criminal activities are mainly associated with the fetching of the confidential information of the user, manipulation and modification in the information available on the internet, controlling of business activities, and many other (Tong, 2013). The step should be taken to provide prevention control mechanism for overcoming and resolving the issues associated with the digital activities performed on the internet. The cyber security strategies should be built for getting best quality result of resolving security issues. The technological devices should be placed with the international standards for preventing the system for cyber-criminal activities. Project Objective The objective of the project is to research on the need of cyber security parameters. The increasing rate of cyber-crime affects the working of the organization. The research should be organized which helps in developing the key parameters of security for preventing loss of data due to the occurrence of cyber-crime activity. The research helps in determining the prevention methods which plays an important role in providing solution to the security problems. Project Scope The research scope is to analyse the cyber-security system and the prevention methods which should be taken to make secure the system with the deployment of vulnerabilities and other associated attacks. The focus should be given on analysing the cyber-crimes occurrence and the impact, countermeasures used for securing the system, and cyber threats associated with the security infrastructure. Literature Review The analysis of various research papers and articles has been done to carry over the research study on determining the facts and figures associated with the cyber-security (Faris, 2010). The online and offline resources are used for collecting data on cyber crimes and proactive action plan which should be taken by the experts. The cyber-crime can be conducted at international level by the cyber-criminals. The innovation in the field of digital life increases the activity of cyber-crime. Hacking and phishing are the major attacks which are associated with digital world. The cyber-criminal activities are mainly associated with the fetching of the confidential information of the user, manipulation and modification in the information available on the internet, controlling of business activities, and many other (Edgar, 2010). The contamination of the system can be resolved with the use of cyber security system. The capacity of the system can be enhanced with the use digital security metho d. The one time password generation is the effective technique used for securing the system. The cyber security guidelines and principles should be used for expanding the security policies of the organization. The innovation in the cyber-security helps in resolving the issues of cyber-crime. The risks management plan helps in identifying the threats and risks associated with the digital network. The cyber-security is the set of standards and principles used for securing digital environment. It helps in safeguarding the digital infrastructure from cyber-attack. The subsequent risks mitigation plans should be developed according to the identified risks. The expertise in cyber security helps in managing the security issues of the digital tools and technologies. The cyber security strategies should be built for getting best quality result of resolving security issues. The cyber security challenges which come forth are categorised as hacking, phishing attack, virus and malware attack, an d other. The intrusion detection and prevention method should be used for developing the security framework for the organization. The loss of the data can be minimized with the use of intrusion detection and prevention method and other security measures within the curriculum of the organization Research question: The research questions helps in taking the research in right direction. The research questions which are undertaken to perform the research activities are depicted below: Research Hypothesis The progress and completion of the research helps in developing security credentials to overcome the problem of threats and vulnerabilities which are associated with the system. The use of innovative thinking helps in bringing significant changes in the security infrastructure of the organization (Caesar, 2012). The hypothesis which is undertaken is that the preventive measure taken by the expert to overcome the situation of cyber threats. The innovation in the cyber-security helps in resolving the issues of cyber-crime. The risks management plan helps in identifying the threats and risks associated with the digital network. The test matrix should be prepared for analysing the precaution method taken for securing the system (Brown, 2010). The following is the analysis matrix related with the inclusion of threats and security measures taken: Analysis of the Cyber-Threats Preventive measures for cyber security How to spoof user identity The strong authentication protocols should be used The credentials of the User should not be leaked Authentication cookies should be protected How to protect data tampering The hashing and signing function should be used for protecting data (Shodhganga, 2010) The strong authorization protocol should be developed The protocols should be used for removing tampering from the communication links The security methods should be used for managing integrity in the communication links How to prevent repudiation of the data The audit trails should be created for security Digital signature should be used for preventing data repudiation How to prevent disclosure of information The strong authorization protocol should be developed The hashing and signing function should be used for protecting data (Bailey, 2013) Digital signature should be used for preventing disclosure of information (Gasser, 2015) The strong authentication protocols should be used How to prevent system from denial of service attack Throttling techniques are used for managing utilization of resources and associated bandwidth of the network used (Brien, 2015) Filtering the input for validation Gathering of information The routers should be used for the configuration of the request Configuration of the operating system should be done periodically How to prevent sniffing attack on the network The physical security parameters should be used The encryption and cryptographic procedures should be used for managing authentication credential How to prevent hijacking of the complete session The session should be made in the encrypted format Communication channels should be used in the encrypted format How to secure system from viruses and malware attack The ports of the firewall should be blocked Anti-malware and anti-virus should be installed in the system Research Design ad methodology Qualitative Research The qualitative research was undertaken by using the methods like observation, arrangement of in-depth interviews, document review system, formulation of theory, analysis of the text based documents, and others which are summarised below: Observation: The observation of activities in the working of the organization helps in analysing the flow of work and the possibility of data leakages from where the cyber-attacker get a chance to attack on the system. There is no direct face to face interview is required with the experts. Arrangement of In-depth interview: The descriptive data can be collected associated with the flaws and gaps of the security methods. Document Review: The literature review helps in analysing the different views of the author on the research undertaken by them. Theory formulation: The analysis of the literature view should be created in the standard format and structure which gives the clear idea about the result and evaluation. Analysis of the text based document: The document should be prepared of the information gathered from the different offline and online sources. Organization of conferences and seminars: The question and answer set up is developed by sending invitation to ethical hackers, policy makers, digital forensic investigators, testers, and others to generate the flow of ideas which are relevant to the research study. Online communication: The online portal opens the door for establishing online research forum to circulate new ideas, discussions, opinions, and thoughts on the research topic of cyber security prevention methods (Hoeks, 2009). The analysis of the discussions helps in generating new tools and technologies or security methods for securing the current infrastructure with the occurrence of cyber threats and vulnerabilities. Surveys: The online and offline surveys are organized with the professionals for analysing the situation of cyber threats in the organization and what are the proactive action taken by the professionals (Effiong, 2010) Questionnaire: The online and offline Questionnaire are organized with the professionals for analysing the situation of cyber threats in the organization and what are the proactive action taken by the professionals. Interview: The face to face interviews are organized with the professionals for analysing the situation of cyber threats in the organization and what are the proactive actions taken by the professionals (Levy, 2014). Quantitative Research The quantitative research was undertaken by using the methods like honey pots, numerical analysis statistical testing, and others. Arrangement of Honeypots: The honeypot helps in creating the simulation of the cyber-attack which helps in analysing the gaps and flaws of the current security architecture (Meushaw, 2012)). Sampling: The adequate amount of population should be chosen for testing the effects of cyber vulnerabilities on the security architecture. Statistical testing: It is the quantitative approach of research methodology which is based on hypothetical testing of the relevant data. The research study on cyber security has the following limitation: The research scope: The development of the research scope is limited to the participant users on carrying over the research on cyber security. Communication with the IT experts: The analysis of the thoughts and opinion of the expert is not correctly done due to the use of professional language. The technical information is not provided for the research on cyber security (Salem, 2011) The company does not allow observing their working tactics. Time Schedule of the research plan The following table shows the timetable of the research proposal: Research Activity Start date Completion date Description Topic selection 20-Sep-17 24-Sep-17 The topic of the research is Cyber security Selection of the team members 22-Sep-17 24-Sep-17 The team members should be selected on the basis of their skills and interest in the research undertaken Collection of Relevant literature 25-Sep-17 30-Sep-17 The online and offline sources should be used for collecting relevant information Reviewing of the literature collected 01-Oct-17 05-Oct-17 The literature review is the process which should be used for analysing the undertaken literature to give the clear idea about the research topic Development of the primary and secondary research question 06-Oct-17 10-Oct-17 The research questions helps in taking the research in right direction. Development of the draft of the research proposal 11-Oct-17 20-Oct-17 The draft should be prepared before carrying out further research for approval Use of Research methodology 21-Oct-17 15-Nov-17 The data is collected by using different research methodologies Revision of the proposal 16-Nov-17 23-Nov-17 Revised the research draft proposal before sending it for approval and do the required changes Approval of the research proposal 24-Nov-17 25-Nov-17 Proposal approved Analysis of the data collected 26-Nov-17 31-Dec-17 The data collected from different online and offline sources Evaluation of the analysis 01-Jan-18 10-Jan-18 Evaluation of the analysis report Completion of the research report 11-Jan-18 20-Jan-18 The research work is completed Conclusion The research study helps in analysing the steps which should be taken to provide prevention control mechanism for overcoming and resolving the issues associated with the digital activities performed on the internet. The future research study should be carrying on development of framework for the implementation of the cyber laws in the working curriculum of the organization. The cyber security guidelines and principles should be used for expanding the security policies of the organization. The research helps in determining the prevention methods which plays an important role in providing solution to the security problems. References Bailey, M. (2013). Cyber security research ethics dialogue and strategy workshop. 1st ed. [ebook]. https://www.caida.org/publications/papers/2014/creds2013_report/creds2013_report.pdf [Accessed 14 Sep. 2017]. Brien, O. (2015). Privacy and cybersecuriy. 1st ed. [ebook]. https://dash.harvard.edu/bitstream/handle/1/28552575/02Cybersecurity.pdf?sequence=1 [Accessed 14 Sep. 2017]. Brown, R. (2010). The state of cyber-security. 1st ed. [ebook]. https://www.bbb.org/globalassets/shared/media/state-of-cybersecurity/cybersecurity-research-report.pdf [Accessed 14 Sep. 2017]. Caesar, M. (2012). Hypothesis Testing for network security. 1st ed. [ebook]. https://publish.illinois.edu/science-of-security-lablet/files/2014/05/022015-Bi-weekly-Presentation-Godfrey.pdf [Accessed 14 Sep. 2017]. Edgar, T. (2010). Research method for cyber security. 1st ed. [ebook]. https://books.google.co.in/books?id=aRl2DQAAQBAJpg=PA248lpg=PA248dq=Research+paper+pdf+on+research+hypothesis+on+cyber+security+systemsource=blots=SkSRWCQCH_sig=GO13BMyV1GmAdOHFrNRokFiSTDwhl=ensa=Xved=0ahUKEwjWqoPb_6PWAhXEM48KHYODDJY4ChDoAQhWMAY#v=onepageq=Research%20paper%20pdf%20on%20research%20hypothesis%20on%20cyber%20security%20systemf=false [Accessed 14 Sep. 2017]. Effiong, E. (2010). Cyber-crime control, prevention, and investigation. 1st ed. [ebook]. https://www.academia.edu/4259163/Cyber_Crime_Research_Proposal [Accessed 14 Sep. 2017]. Faris, R. (2010). Progress and research in cyber-security. 1st ed. [ebook]. https://royalsociety.org/~/media/policy/projects/cybersecurity-research/cybersecurity-research-report.pdf [Accessed 14 Sep. 2017]. Gasser, U. (2015). HPE Security Research. 1st ed. [ebook]. https://h20195.www2.hpe.com/V4/getpdf.aspx/4aa5-0858enn [Accessed 14 Sep. 2017]. Hoek, R. (2009). A roadmap for cyber-security research. 1st ed. [ebook]. https://www.dhs.gov/sites/default/files/publications/CSD-DHS-Cybersecurity-Roadmap.pdf [Accessed 14 Sep. 2017]. Levy, Y. (2014). An empirical study on the role of cyber-security skills on perceived need for action to migrate cyber misuse. 1st ed. [ebook]. https://cec.nova.edu/research/winter_2014_poster_session/documents/Anita%20Girton.pdf [Accessed 14 Sep. 2017]. Meushaw, R. (2012). Developing a blueprint for the science of cybersecurity. 1st ed. [ebook]. https://www.nsa.gov/resources/everyone/digital-media-center/publications/the-next-wave/assets/files/TNW-19-2.pdf [Accessed 14 Sep. 2017]. Salem, M. (2011). On the design and execution of cyber security user studies: Methodology, challenges, and lesson learned. 1st ed. [ebook]. https://ids.cs.columbia.edu/sites/default/files/CSET_2011_0.pdf [Accessed 14 Sep. 2017]. Shodhganga, S. (2010). Research Design and methodology. 1st ed. [ebook]. https://shodhganga.inflibnet.ac.in/bitstream/10603/40658/8/08_chapter%203.pdf [Accessed 14 Sep. 2017]. Tonge, A. (2013). Cyber security: challenges for cyber security: A literature review. 1st ed. [ebook]. https://www.iosrjournals.org/iosr-jce/papers/Vol12-issue2/K01226775.pdf?id=15 [Accessed 14 Sep. 2017].

Saturday, November 30, 2019

Introduction of Marijuana Essay Example

Introduction of Marijuana Essay The use of marijuana has been an active past time for thousands of years, however, it did not reach the United States until around 1912. A wave of Mexican immigrants was entering the country in the effort to find work; with them came marijuana. The use of marijuana was a normal custom among the Mexican people, but the White Americans in towns bordering Mexico saw the use of this particular plant in a different light. Fueled with racism and frustration associated with the lack of work for the American people, whites proclaimed that the smoking of marijuana gave the Mexicans super-human strength and transformed those who smoked it into violent murderers. With the increase in rumors of bloodshed and mayhem brought about by Mexicans on marijuana-rampages, the city council of El, Paso, Texas passed a law, the El Paso Ordinance of 1914, banning the possession of marijuana (Grass: The History of Marijuana). As a result, the regulation not only provided a way to control marijuana, but Mexicans as well. THE FEDERAL BUREAU OF NARCOTICS AND UNIFROM STATE NARCOTIC LAW Meanwhile, those Americans who did not reside in states bordering Mexico were quite unfamiliar with the use of marijuana, and were much more concerned with the then current war on opium, morphine, cocaine, and heroin addiction plaguing society. In the early 1930’s the United States government decided that these public health issues of addiction could be handled by the United States Department of Treasury, who in turn established the Federal Bureau of Narcotics (R. We will write a custom essay sample on Introduction of Marijuana specifically for you for only $16.38 $13.9/page Order now We will write a custom essay sample on Introduction of Marijuana specifically for you FOR ONLY $16.38 $13.9/page Hire Writer We will write a custom essay sample on Introduction of Marijuana specifically for you FOR ONLY $16.38 $13.9/page Hire Writer J. Bonnie, 1970). Harry J. Anslinger was assigned as the Commissioner of the Federal Bureau of Narcotics. Anslinger was an alcohol prohibitionist who believed that â€Å"progress can only be achieved by controlling the deprived impulses of the masses†; he believed that if laws implemented in society were strict enough and if enough people were punished for partaking in prohibited acts, the public would steer away from wrongdoing. Anslinger believed this same philosophy would work in America’s war against dope. However, Anslinger found it hard to regulate drug use in all 48 states; he was only one man and during the Depression, it was difficult to find financial backing for such a feat. Anslinger sought the solution to his problem among the forty-eight states of America; he aimed to influence each state to individually control drug use and trafficking among its citizens. Anslinger planned to do this by getting each state to sign a joint agreement that would commit a portion of each state’s resources to the drug control, the Uniform State Narcotic Law. However, only nine states agreed (New York, New Jersey, Virginia, South Carolina, Louisiana, Florida, and Indiana), the other states believed that the agreement allowed the federal government to interfere with state affairs (Grass, 1999). Meanwhile, New Orleans was a major port city that trafficked marijuana into the United States by way of West Indian sailors. It was known as muggles, tea, or reefer on the streets of New Orleans, and grew extremely popular among the jazz crowd in the city due to the proclamation that music sounded notably better after a â€Å"reefer stick†. Musicians began to bring marijuana from New Orleans to cities farther north up the Mississippi River, increasing the drug’s popularity in larger cities of America. With this growing popularity and awareness, Anslinger saw targeting marijuana as the means to his end; he concluded that if he could convince white America that marijuana was an absolute menace, the frightened voters would push their state legislature to agree to his Uniform State Narcotic Law (R. J. Bonnie, 1970). The media was Anslinger’s primary weapon in leading all Americans to believe that marijuana was the most dangerous social issue that had ever faced the country; the use of marijuana was tied to the likes of murder, insanity and death; mothers were told to protect their children from becoming slaves to the drug and movies were made linking the smoking of marijuana with immediate insanity, murderous rage or committing suicide (Grass, 1999). The negative propaganda eventually obtained a firm grasp on the minds of the American people, one by one, each state signed the Uniform State Narcotic Law; Anslinger’s method of exaggeration and manipulation went according plan. THE MARIJUANA STAMP ACT A frightened America demanded that society be protected by the threat of marijuana, and sought relief within the power of the federal government. On June 14, 1937, the Marijuana Tax Act was signed into law by President Roosevelt without any â€Å"public debate, scientific inquiry, or political objection† (Grass, 1999). The act prohibited the possession of any marijuana unless one also possessed a marijuana tax stamp which was provided by the Department of Treasury, however, in order to obtain a stamp act, one had to present to authorities his or her amount of marijuana, which was illegal in and of itself. Through this extremely misleading form of legislation, the Department of Treasury effectively made marijuana possession illegal, and subsequently lead to hundreds of arrests. LA GUARDIA VERSUS ANSLINGER The enactment of the Marijuana Stamp Act brought with it skepticism from many white Americans, especially in the northeast region of the country. Those who opposed the Stamp Act believed that its implementation brought with it the return of prohibition, an aspect of legislation they did not want to see in existence again (R. Dietch, 2003). Fiorello La Guardia was the mayor of New York during Anslinger’s relentless crusade against marijuana’s use and possession, and he too was against prohibition and the criminalization of marijuana. La Guardia was skeptical of the claims that were made by the federal government in relation to the effects the use has on the mind, and consequently lead a committee of 31 impartial scientists in the investigation of the physical and mental effects marijuana use has on a human being. The La Guardia Committee Report was conducted for five years (1939 – 1944) in which it concluded that the effects of marijuana use did not agree with the perception of the Commissioner of the Federal Bureau of Narcotics; a perception forced upon and used to frighten the people of America. The report stated that the use of marijuana did not â€Å"lead to violent or antisocial behavior, did not cause uncontrollable sexual urges, and did not alter a person’s basic personality structure† (Grass, 1999). Also, unlike the claims made by the federal government, the information provided by the La Guardia Committee Report, entitled The Marihuana Problem in the City of New York, was supported by scientific evidence and testimony from marijuana users (R. Deitch, 2003). In response to the threat of his credibility, Anslinger had the report discredited and destroyed all copies that he was able to obtain; he labeled the authors as â€Å"dangerous men† and referred to the evidence in the report as â€Å"giddy sociology and medical mumbo-jumbo† (M. Booth, 2005). The determined Anslinger did not allow the plights of science to diverge from him from his course; he targeted the degenerate moral influence of actors and musician in the entertainment industry, â€Å"the missionaries carrying its evil gospel to the world† (M. Booth, 2005). Anslinger obtained control not only over movie contracts, but pilot and book contracts as well; he gained control over the film industry and spent $220 million in the production of films that supported his views in relation to the dangerous effects marijuana could have on one’s life. Musicians were also targeted, especially black jazz musicians; he believed black jazz musicians were the source of this reefer evil, and white marijuana smokers were merely corrupted by black influence through their mainstream music (M. Booth, 2005). RED CHINA AND THE NARCOTIC CONTROL ACT OF 1956 With the approach of the 1950s, the number of heroin addicts was increasing, especially among young teens. Crimes of theft were high among these strung out teenagers who turned to illegal acts in an effort to support their drug habit. Anslinger and the federal government saw an opportunity in this new heroin craze, and deemed marijuana use the reason for the increase in heroin addicts; â€Å"if you smoke it, you will become a heroin addict† (R. J. Bonnie, 1970). With the new fabricated association between marijuana and heroin, tougher laws and greater penalties were demanded by the public for all drug offenses. Anslinger was quick to play on the growing fear of communism among the American people; he began to proclaim that behind every narcotics drug peddler was a communist â€Å"ready to overthrow the government† (Grass, 1999). Anslinger cleverly linked China as the direct source of the opiates that so many American people were becoming addicted to; it was believed by the public that â€Å"Red China† was trying to infiltrate America via the heroin needle (L. Sloman, 1998). In an effort not to appear nationally weak in the midst of a cold war and during the threat of the Red Menace, and without any physical proof that the Chinese were behind the rise of opiates in the United States, Truman signed the Boggs Act of 1951 which implemented mandatory minimum sentences for all drug offenses. THE DECRIMINALIZATION OF MARIJUANA The passing of the Boggs act was followed by the passage of the Narcotic Control Act of 1956, which placed marijuana in the same category as heroin; the mandatory minimum sentence for possession of marijuana could result in 2 – 10 years in prison (R. J. Bonnie, 1970). Some states placed even harsher punishments for the possession of narcotics; in Missouri a 2nd conviction could place the defendant in prison for life. Anslinger’s ruthless campaign against the criminalization of marijuana finally came to an end in 1961 under the administration of former President John F. Kennedy in which he warned his successor that â€Å"the impending drug revolution is an assault on the foundation of western civilization†. Between the years of 1941 and 1963, the federal government spent $1. 5 billion on the â€Å"war against marijuana†. The use of marijuana was a new craze among college campuses in the mid 1960s, many of those who smoked marijuana no longer held the view depicting it as a dangerous substance, but as a way of declaring their independence. The new commissioner of the Federal Bureau of Narcotics, Henry Giordano, began to publicize that the use of marijuana will make one an â€Å"unmotivated, dysfunctional loser† (Grass, 1999). Nixon continued to focus on drug crimes by pouring significant amounts of money into the training, equipping, and educating local policemen in recognizing evidence related to marijuana use. Minorities were not the only individuals being convicted for the possession of marijuana; those who were being arrested for marijuana charges consisted mainly of middle-class, white, American teenagers. As a matter of fact, the number of convicted young people was so high that the public began wonder if the legislation against marijuana was too strict; the laws were then seen as the problem in society, not marijuana. The passage of the Controlled Substance Act of 1970 officially reduced the penalty for possession of marijuana (L. Sloman, 1998). Between 1964 and 1969 the amount of money used in the control of marijuana use and possession was estimated to be $9 billion. As Nixon continued spend millions of dollars in the establishment of the Drug Enforcement Agency, many American citizens began to seek the decriminalization of private use and possession of marijuana. This sudden public desire for the decriminalization of marijuana could be tied to its use no longer being a youth phenomenon; middle class adults had begun smoking marijuana during social activities and the push for the legalization of marijuana began. The Ann Arbor City Ordinance of 1972 placed marijuana possession to a minor offense, comparable to a traffic ticket. The control of marijuana use is still significant today, though the laws and regulations for the possession and use of marijuana have become notably less strict in comparison to the laws that were implemented during the 1920s. Between the Jimmy Carter Administration and throughout the Regan Administration, the United States of America spent approximately $290 billion in its efforts to control the drugs on the streets of the country (Grass, 1999). THE WAR ON DRUGS America’s need to abolish the use of marijuana stemmed from the racial prejudice against Mexican immigrants and African Americans, and was fueled by false proclamations and loosely associated consequences. The War on Drugs resulted in a grand total of over $300 billion spent; this battle is surely to go down in history as one of the most lengthy and costly wars this nation has ever experienced with no end in sight.

Monday, November 25, 2019

EFL Instructors

Writing Skills Teaching Guide for ESL/EFL Instructors Writing competence in a foreign language tends to be one of the most difficult skills to acquire. This is true for English as well. The key to successful writing classes is that they are pragmatic in nature targeting the skills required or desired by students. Students need to be personally involved in order to make the learning experience of lasting value. Encouraging student participation in the exercise, while at the same time refining and expanding writing skills, requires a certain pragmatic approach. The teacher should be clear on what skills he/she is trying to develop. Next, the teacher needs to decide on which means (or type of exercise) can facilitate learning of the target area. Once the target skill areas and means of implementation are defined, the teacher can then proceed to focus on what topic can be employed to ensure student participation. By pragmatically combing these objectives, the teacher can expect both enthusiasm and effective learning. Overall Game Plan Choose writing objectiveFind a writing exercise that helps to focus on the specific objectiveIf possible, tie the subject matter to student needsProvide feedback through correction activities that call on students to correct their own mistakesHave students revise work Choose Your Target Well Choosing the target area depends on many factors; What level are the students?, What is the average age of the students, Why are the students learning English, Are there any specific future intentions for the writing (i.e school tests, job application letters, etc.). Other important questions to ask oneself are: What should the students be able to produce at the end of this exercise? (a well-written letter, basic communication of ideas, etc.) What is the focus of the exercise? (structure, tense usage, creative writing). Once these factors are clear in the mind of the teacher, the teacher can begin to focus on how to involve the students in the activity thus promoting a positive, long-term learning experience. Things to Remember What will students be able to do after the exercise?Keep the focus on one area of English writing skills Having decided on the target area, the teacher can focus on the means to achieve this type of learning. As in correction, the teacher must choose the most appropriate manner for the specified writing area. If formal business letter English is required, it is of little use to employ a free expression type of exercise. Likewise, when working on descriptive language writing skills, a formal letter is equally out of place. Keeping Students Involved With both the target area and means of production, clear in the teachers mind, the teacher can begin to consider how to involve the students by considering what type of activities are interesting to the students; Are they preparing for something specific such as a holiday or test?, Will they need any of the skills pragmatically? What has been effective in the past? A good way to approach this is by class feedback or brainstorming sessions. By choosing a topic that involves the students the teacher is providing a context within which effective learning on the target area can be undertaken. Correction The question of which type of correction will facilitate a useful writing exercise is of utmost importance. Here the teacher needs to once again think about the overall target area of the exercise. If there is an immediate task at hand, such as taking a test, perhaps a teacher-guided correction is the most effective solution. If the task is more general (for example, developing informal letter writing skills), maybe the best approach would be to have the students work in groups thereby learning from each other. Most importantly, by choosing the correct means of correction the teacher can encourage rather discourage students.

Friday, November 22, 2019

Capital Account Convertibility

Capital Account Convertibility. Should India adopt full convertibility? Capital Account Convertibility-or a floating exchange rate-is a feature of a nations financial regime that centers around the ability to conduct transactions of local financial assets into foreign financial assets freely and at market determined exchange rates. It is sometimes referred to as Capital Asset Liberation or CAC. CAC is mostly a guideline to changes of ownership in foreign or domestic financial assets and liabilities. Tangentially, it covers and extends the framework of the creation and liquidation of laims on, or by the rest of the world, on local asset and currency markets. Current account convertibility allows free inflows and outflows for all purposes other than for capital purposes such as investments and loans. In other words, it allows residents to make and receive trade-related payments receive dollars (or any other foreign currency) for export of goods and services and pay dollars for import of goods and services, make sundry remittances, access foreign currency for travel, studies abroad, medical treatment and gifts, etc. Capital account convertibility is considered to be one of the major features of a developed economy. It helps attract foreign investment. It offers foreign investors a lot of comfort as they can re-convert local currency into foreign currency anytime they want to and take their money away. At the same time, capital account convertibility makes it easier for domestic companies to tap foreign markets. At the moment, India has current account convertibility. This means one can import and export goods or receive or make payments for services rendered. However, investments and borrowings are restricted. But economists say that Jumping into capital account convertibility game without considering the downside of the step could harm the economy. The East Asian economic crisis is cited as an example by those opposed to capital account convertibility. Even the World Bank has said that embracing capital account convertibility without adequate preparation could be catastrophic. But India is now on firm ground given its strong financial sector reform and fiscal consolidation, and can now slowly but steadily move towards fuller capital account convertibility. CAC has 5 basic statements designed as points of All types of liquid capital assets must be able to be exchanged freely, between any two nations, with standardized exchange rates. The amounts must be a significant mount (in excess of $500,000). Capital inflows should be invested in semi-liquid assets, to prevent churning and excessive outflow. Institutional investors should not use CAC to manipulate fiscal policy or exchange rates. Excessive inflows and outflows should be buffered by national banks to provide collateral. Prior to its implementation, foreign investment was hindered by uneven exchange rates due to transactions, and national banks were disassociated from fiscal exchange policy and incurred high costs in supplying hard-currency loans for those few local companies that wished to do business abroad. Due to the low exchange rates and lower costs associated with Third World nations, this was expected to spur domestic capital, which would lead to welfare gains, and in turn lead to higher GDP growth. The tradeoff for such growth was seen as a lack of sustainable internal GNP growth and a decrease in domestic capital investments. When CAC is used with the proper restraints, this is exactly what happens. The entire outsourcing movement with Jobs and factories going oversees is a direct result of the foreign investment aspect of CAC. The Tarapore Committees recommendation of tying liquid assets to static assets (i. e. investing in long term government bonds, etc) was seen by many economists as directly responsible for stabilizing the idea of capital account liberalization. The Reserve Bank of India has appointed a committee to set out the framework for fuller Capital Account Convertibility. The Committee, chaired by former RBI governor S S Tarapore, was set up by the Reserve Bank of India in consultation with the Government of India to revisit the subject of fuller capital account convertibility in the context of the progress in economic reforms, the stability of the external and financial sectors, accelerated growth and global integration. Economists Surjit S Bhalla, M G Bhide, R H Patil, A V RaJwade and Alit Ranade were the members of the Committee. The Reserve Bank of India has also constituted an internal task force to re-examine the extant regulations and make recommendations to remove the operational impediments in the path of liberalisation already in place. The task force will make its recommendations on an ongoing basis and the processes are expected to be completed by December 4, 2006. The Task Force has been set up following a recommendation of the Committee. The Task Force will be convened by Salim Gangadharan, chief general manager, in- harge, foreign exchange department, Reserve Bank of India, and will have the following terms of reference: Undertake a review of the extant regulations that straddle current and capital accounts, especially items in one account that have implication for the other account, and iron out inconsistencies in such regulations. Examine existing repatriation/ surrender requirements in the context of current account convertibility and management of capital account. Identify areas where streamlining and simplification of procedure is possible and remove the operational impediments, especially in espect of the ease with which transactions at the level of authorized entities are regulations are consistent with regulatory intent. Review the delegation of powers on foreign exchange regulations between Central Office and Regional offices of the RBI and examine, selectively, the efficacy in the functioning of the delegation of powers by RBI to Authorised Dealers (banks). Consider any other matter of relevance to the above. The Task Force is empowered to devise its work procedure, constitute working groups in various areas, co-opt permanent/special invitees and meet various trade ssociations, representative bodies or individuals to facilitate its work.

Wednesday, November 20, 2019

Service marketing 7 P for JetBlue Essay Example | Topics and Well Written Essays - 1000 words

Service marketing 7 P for JetBlue - Essay Example However, the problems associated with service delivery and brand sentiment requires that JetBlue offer more discounted package and travel options as a means of reinforcing their price differentiation and satisfying their value proposition. Product is reflected by its provision of travel vacation packages on reputable sites such as Priceline and Travelocity, as well as JetBlue Getaways, a self-managed website offering custom-designed packages (JetBlue, 2010). As with the pricing consideration, JetBlue should expand these product offerings to illustrate the depth of its value proposition and value consciousness. Place is satisfied by having many fleets and routes established throughout the nation, thus adding convenience to the consumer experience. However, the majority of revenues come from New York and Florida, as Jet Blue has the most presence in these locations. The business should expand its market presence and capacity to improve place availability that can be used in promotions. Promotion is lacking at JetBlue. The company relies heavily on social media to create relationships with customers and promote its value (JetBlue, 2011). Social media is not effective in all markets, thus the business should invest additional capital in promotion to fully advertise its value proposition and gain more market attention. The expanded dimension of physical layout is somewhat restricted by its low cost model, as improving physical layout requires less overhead or more budgeting in this area. However, by offering customers more airport-based facilities and improvements on-board will improve its competitive position. In terms of people, the business requires more cultural development to ensure a culture of service excellence, something significantly damaged in reference to the Jet Blue brand. Finally, the business needs to change its

Tuesday, November 19, 2019

Prep 15 Essay Example | Topics and Well Written Essays - 500 words

Prep 15 - Essay Example In this case, variations in these isolated populations will be more as a result of genetic drift compared to natural selection. The molecular clock is a methodology in molecular evolution that uses rates of molecular change and fossil constraints to determine the time in geologic history when two species diverged. The technique is used to approximation the duration of occurrence of events called radiation or speciation. The molecular statistics used for such computations are usually for DNA sequences or amino acid sequences. It is possible to tell that the molecular clock is working because its principle of working is based on Charles Darwin theory of ev0lution. In addition, the concept of DNA sequence has been integrated in modern fossil dating techniques. In this case, the result obtained from molecular clock techniques are usually compared with those of other methodology. The molecular clock techniques yield desirable results when the species generations are not changing from time to time. The population size has to be sizeable to reduce the effect of genetic drift and the nature of protein studied requir es being stable. The neutral evolution theory, according to Sittyr (2009), is used for null hypothesis since it holds that the molecular evolutionary changes and other variation within species is not as a result of natural selection but by random drift of neutral mutant alleles. The concept is used to detect natural selection since it works to explain that genes do not experience natural selection but are affected by genetic drift. In this case, if the hypothesis of neutral evolution is not proven, then the national selection has taken place. When a synonymous, also referred to as silent mutation, occurs the change is frequently assumed to be neutral. This means that the ration of the organisms that are not affected by the mutation shows fitness of the individual with the new gene to reproduce and survive. Inbreeding is the production

Saturday, November 16, 2019

The Reward-Award System and the Suffocating Aspect of Expectations Essay Example for Free

The Reward-Award System and the Suffocating Aspect of Expectations Essay Education is considered as a very important aspect of our lives. It is through education that a person is able to learn various things which are needed later on in his or her life. While some may argue that that there are some things that education does not need to teach like Chemistry or Physics when a person wants to be a writer or fashion designer in the future, no one can argue that it is the discipline which those subjects or the whole aspect of the academic itself which is proven to be very useful later on. No one can deny the fact that the knowledge accumulated within the four walls of classroom is imperative, just as the experience of the whole thing within the years of being educated is important. The relationships that will be formed within the walls of the school can sometimes even surpass the connection that families have within their homes. In fact, sometimes, the people within the school are those who are considered as the very family of a person. However, what is really most focused on while in school is the aspect of academics, and while academics are really important, a person can believe that the stifling obligations and duties that come with it can be very difficult, most especially if a family or a community strongly believes that a person is worthy or should succeed. The expectations which come with the whole thing can be horrifying and appalling. In many countries, there are news reports of very young people committing suicide or killing each other because of the burden which is brought by these expectations. Why is it that many adults are pushing their children to the best schools, to have the best grades, to be the best in everything? Perhaps, a person should look into the basis of what is exactly the concept of being the best. The best is known as the number one — a person who receives the awards and medals and becomes famous for either being beautiful or being smart. Any person in between can be considered as an average person. Thus, this paper will point out the belief that the award-reward system is actually not a good thing and it should be improved or changed. Many companies in the future always ask or want a sense of accomplishment and an achievement. Going through school without getting into trouble and finishing it is a great accomplishment in itself, and yet people still yearn for more. People yearn for a physical evidence of an accomplishment and an achievement. In a family, when a member comes home with a medal or an award, the whole family celebrates and applauds for that person. That is after all, a sense of achievement — an evidence of hard work. However, in the corner or in the room upstairs, the sibling is hiding and feels so worthless since he or she cannot give his or her parents that same sense of satisfaction. So where does the problem lie exactly? Are parents too demanding and pushy that children are left to be so burdened with books and fulfilling the dreams of their parents? That is indeed sometimes the case, is it not — the children are left to fulfill a dream of a parent who is unable to fulfill his or her own dream? Who is at fault though? Who are the ones who are to blame for this kind of rewarding system? This system believes that the only means of achieving success and satisfaction is by means of an award. Genuine compliments and words of praises are then considered as inferior when compared to those awards. The awards system can be even traced back into far as the ancient Greece and ancient Egypt. Those who are concluded as the best and strongest during battles or matches are rewarded with medals, shields, or the head of the leader of their enemy. It is not surprising then why this kind of thinking is still present today. What is it about this kind of system that still make academic and non-academic institutions follow it? It important to look at the pros and cons and determine once and for all, why the reward system is more than discouraging — it is outright a mistake to even exist in the first place. The Advantageous Aspect of the Award System It is through the awards and such things that a person wants to work hard and strive to be the best. Because of this particular system, people are being non-mediocre and making efforts to put their best foot forward. It is a matter of having a sense of fulfillment and satisfaction. The shining moment when a person goes up the stage or when everyone starts to acknowledge the person and the efforts which he or she has done is beyond exhilarating — it is a moment of pure bliss which will be imprinted in his or her memory for years. The Suffocating Aspect of Expectations As what the numerous paragraphs of this paper suggest, there are so many things which the award-reward system is telling society. One is that parents push their children to such great extent that it is sometimes suffocating. The burden of having to prove oneself to other people by means of an award is far ridiculous — it is beyond discouraging. Conclusion In conclusion, the reward-award system which has been the practice for many years should be changed for another system that exercises fairness and considers all the implications that the system is bringing. After all, the proof of a job well done does not rely merely on medals and on awards — hard work and determination is also a proof, and medals and awards would not be able to mirror or reflect those.

Thursday, November 14, 2019

Kotter Model Essays -- Narrative, Change, Organization

Narrative Essay The second semester of the Sergeants Major course covers a lot of material on Organizations, Leaders, Power, Influence, Stress, Ethics, Vision, Culture and Climate. The knowledge gained from block (s) L103, L105, L107 and L109 are important to future Operations Sergeants Major because; we will be able to assist the commander through the process of changing the climate and culture and enabling the unit to become stronger as a team. Kotter Model The Kotter Model comes from the L103 block it is an eight stage model that helps avoid mutual issues that plague the smallest change attempts in an organization. Organizations leaders will lead their organizations through this process in order to have a positive and long lasting effect. A leader cannot prematurely hurdle, bounce or make a serious mistake inside a step by doing any of those would have a destructive effect on a successful accomplishment of change. The stages of the Kotter Model are: (1) establishing a sense of urgency (2) creating the guiding coalition (3) developing a vision and strategy (4) communicating the change vision (5) empowering a broad base of people to take action (6) generating short-term wins (7) consolidating gains and producing even more change (8) institutionalizing new approaches in the culture. This Model guides leaders through the process of attempting to change the climate and culture of an organization; I will explain each stage briefly. In stage one it is vibrant the leader institutes a sense of determination by showing the rewards and significant of change. The second stage leaders must organize and support the adjustment development. By building a resilient support team based on belief and common understanding will encour... ...uraging actions necessary to carry out the vision; and continue to take the organization to a higher level. As we think about visions remember the Army’s vision and how it has changed a few times over the years and to support the change they came up with Slogans. A vision builder must ensure if you use a slogan it must have meaning, do not use an empty one just to have one. Remember a vision is a key used by Leaders to move their organizations successfully into the future. Conclusion In conclusion I have given details of what I erudite and was taught in the second semester of the academy. The knowledge gained from block (s) L103, L105, L107 and L109 are important to future Operations Sergeants Major because; we will be able to assist the commander through the process of changing the climate and culture and enabling the unit to become stronger as a team. Kotter Model Essays -- Narrative, Change, Organization Narrative Essay The second semester of the Sergeants Major course covers a lot of material on Organizations, Leaders, Power, Influence, Stress, Ethics, Vision, Culture and Climate. The knowledge gained from block (s) L103, L105, L107 and L109 are important to future Operations Sergeants Major because; we will be able to assist the commander through the process of changing the climate and culture and enabling the unit to become stronger as a team. Kotter Model The Kotter Model comes from the L103 block it is an eight stage model that helps avoid mutual issues that plague the smallest change attempts in an organization. Organizations leaders will lead their organizations through this process in order to have a positive and long lasting effect. A leader cannot prematurely hurdle, bounce or make a serious mistake inside a step by doing any of those would have a destructive effect on a successful accomplishment of change. The stages of the Kotter Model are: (1) establishing a sense of urgency (2) creating the guiding coalition (3) developing a vision and strategy (4) communicating the change vision (5) empowering a broad base of people to take action (6) generating short-term wins (7) consolidating gains and producing even more change (8) institutionalizing new approaches in the culture. This Model guides leaders through the process of attempting to change the climate and culture of an organization; I will explain each stage briefly. In stage one it is vibrant the leader institutes a sense of determination by showing the rewards and significant of change. The second stage leaders must organize and support the adjustment development. By building a resilient support team based on belief and common understanding will encour... ...uraging actions necessary to carry out the vision; and continue to take the organization to a higher level. As we think about visions remember the Army’s vision and how it has changed a few times over the years and to support the change they came up with Slogans. A vision builder must ensure if you use a slogan it must have meaning, do not use an empty one just to have one. Remember a vision is a key used by Leaders to move their organizations successfully into the future. Conclusion In conclusion I have given details of what I erudite and was taught in the second semester of the academy. The knowledge gained from block (s) L103, L105, L107 and L109 are important to future Operations Sergeants Major because; we will be able to assist the commander through the process of changing the climate and culture and enabling the unit to become stronger as a team.

Monday, November 11, 2019

Implant tractable ID chips in newborn babies Essay

Our company’s idea to implant tractable ID chips in newborn babies offers a revolutionary approach to effectively combat the high incidences of abductions of newborns and children, a menace against which eve police forces are finding themselves helpless. Once the chip is placed within children, their every movement can be traced to exactitude using the GPRS technology, making their abduction and subsequent hiding a practically impossible task. Apart from this, these IDs would act as a database for these children, containing their relevant medical, physiological and personal details, with provisions of constant upgrades. Thus doctors needs to only access children’s ID to know their history of previous medical complications and treatments, police officers can easily trace parents of a lost child and parents can keep constant vigil on the movement of their children even from their workplace. However, there are many exacting complications in successful rollout of this idea. It can be safely assumed that this concept would come under severe moral, ethical, and religious censure through the entire world. Many, if not all, would form organizations and international groups to canvass on social and legal platforms against our proposal to ‘tag’ human infants, and doubts would be raised on even our integrity, commitment and sanity. Moreover, the thrust of objection and criticism is likely to come from our own scientific intelligentsia, religious and spiritual gurus, intellectuals and similar eminent personalities. These estimated objections and criticism are hardly a surprising possibility, given world’s historical anathema against every new scientific invention or discovery, any path-breaking medicinal technology, or even against any idea that appeared contrary to its set of framed ideas and concepts. History is replete with evidences that from the time of Archimedes to modern day age of cloning, people have always approached every major scientific and technological breakthrough with skepticism, incredulity and more than often, downright hostility. We can see how strong the sentiments ran when Copernicus presented the theory that its Sun that is at center of solar system, and not moon and that world is sphere shaped, against what world had been led to believe (Hall, 1954). Later Galileo was humiliated by Roman Church on the same issue. We further see the way almost entire educated western society rose against Charles Darwin for his theory of evolution through natural selection and the stringent social and religious criticism he was subjected to (Hall, 1954). Even Einstein, one of the greatest human brains of all times, was not spared from hostile criticism and rejection when he denied the existence of gravity in his general theory of relativity (Hawkins, 1988). Technological innovations and many scientific inventions were treated with similar aggressive denial and denunciation. Whether it was construction of railway locomotives, invention of telegraphs and telephones, constructions of dams, introduction of vaccination techniques, advent of contraceptive pills, gene therapy or subject of cloning and stem cell research, a significant section of society always protested and rejected the concept on plethora of supposedly ethical and moral grounds (Thomas, 2005). It is futile to say that each of these innovations contributed to further advancement and growth of human society. The reason of this persistent fear of new technological innovations is that they defy and sometimes even break the existing concepts, perceptions and notions. Often these concepts and perceptions are embedded part of a social culture, and therefore their rejection is construed as a planned attack by scientists and technicians on the very foundation of the culture (Lyne, 2005). We cannot flippantly dismiss their fears, and overlook their arguments just because they happen to contradict our idea. Instead, we need to reach out to people, address their every valid question and dispel their remotest of the doubts related to implant of IDs in newborn babies. My own understanding of the issue says that we should move ahead with project because when people are presented with rational arguments and valid answers to their queries, their gravest arguments turns in staunchest of the support. Indeed, one of their first objections we are likely to face is ethical as well as medical propriety of inserting an unnecessary foreign object in the fragile body of a newborn. But as we maintain, this implant is done for children’s own security and safety. Further, the chip is especially designed in such a way that its implant would cause minimum distress for child and the implant can be done by any surgeon through a very superficial incision. The presence or location of the chip may very well remain unknown to child unless specifically told. Of course, implanting a foreign object in human body in itself is no more an ethical issue, especially after advent of pacemakers and artificial limbs. Rather a valid query may concern the possible radiation effect of the chip on child’s developing body, and whether that this radiation would impede or in any way alter hormonal or chemical composition of the growing child. But as our repeated lab tests and years of experiments have shown, the chip does not interfere with human bio- chemical growth in any way. It stays in the body like a neutral object, deactivated unless recalled for. Even upon activation, the signals emitted by chip are no more harmful than the fields of electromagnetic radiation surrounding us every second of our life. The final debate around our proposed chip would center on moral and ethical issue of tagging children. Is it right to tag children like animals are tagged in zoo and safari and then observed? Further, when these children grow up, they might become uncomfortable with the idea of being watched or remotely tracked for their every movement, and may very likely treat this an infringement of their privacy. But in my opinion, these objections are specious, and deviating from our main issue- that of stopping crime and providing a safe and secure world for children. Parents, and later on Children, may be given the option to remove or manually deactivate the chip, when they start to feel that it is more a burden than as a benefit. However, for that time that it is there, it is the best way to ensure infants are secure, safe and sound under their parent’s, physicians and teacher’s constant observation. It is the best way to completely eliminate the threat of organized abduction industry, and certainly it is the surest way to ensure that no child goes every lost or missing. I would reiterate therefore we should confidently move ahead with this revolutionary idea and usher in the new era of human-technology integration.

Saturday, November 9, 2019

Child Labour in Pakistan Essay

Children are the flowers of heaven. They are the most beautiful and purest creation of God. They are innocent both inwardly and outwardly. No doubt, they are the beauty of this world. Early in the morning when the children put on different kinds of clothes and begin to go to schools for the sake of knowledge, we feel a specific kind of joy through their innocence. But there are also other children, those who cannot go to schools due to financial problems, they only watch others go to schools and can merely wish to seek knowledge. It is due to many hindrances and difficulties; desperate conditions that they face in life. Having been forced to kill their aspirations, dreams and other wishes, they are pressed to earn a living for themselves and for their families. It is also a fact that there are many children who play a key role in sustaining the economically life of their family without which, their families would not be able to make ends meet. These are also part of our society who have forgotten the pleasures of their childhood. When a child in addition to getting education, earns his livelihood, this act of earning a livelihood is called as child Labour. The concept of child Labour got much attention during the 1990s when European countries announced a ban on the goods of the less-developed countries because of child Labour. The International Labour Organization (ILO) defines child Labour as: 1- when a child is working during early age 2- he overworks or gives over time to Labour 3- he works due to the psychologically, socially, and materialistic pressure 4- he becomes ready to Labour on a very low pay Another definition states: â€Å"Child Labour† is generally speaking work for children that harms them or exploits them in some way (physically, mentally, morally or blocking access to education), United Nations International Children’s Emergency Fund(UNICEF) defines â€Å"child† as anyone below the age of 18, and â€Å"child Labour† as some type of work performed by children below age 18. (UNICEF)Child Labour is an important and a serious global issue through which all and sundry countries of the world are directly or indirectly affected, but, it is very common in Latin America, Africa and Asia.

Thursday, November 7, 2019

Accounting report Essays

Accounting report Essays Accounting report Essay Accounting report Essay Thus, indicating an inefficient cost management and a weak pricing strategy adopted by Codex. Liquidity appears to be a challenging issue for Codex and Compass. Both companies, clearly, are undergoing a competition of growth through acquisition of subsidiaries which had a negative impact on the liquidity in both companies. Nevertheless, Codexs long trade receivables settlement period has even worsen the companys liquidity. Seeking a better image visit- ¤-visit its rival Compass, Codex has increased its dividends pay out on the account of its liquidity, thus, relying on borrowing rather than operating activities. This is explained by the high financial gearing ratio that has not en translated to an increase in the companys profitability, a short sighted strategy that should be reconsidered by the board. Recommendations: 1 . Focus on maximizing profit from operations, 2. Reevaluate the entire trade receivables strategy that appears to be performing inefficiently, 3. Maintain a correlation between the amount dividends pay out and the operating profit margin. This report compares Codexs performance to that of its peer Compass based on the financial ratios, profitability, efficiency, liquidity, financial gearing and investment. In addition to that, it emphasizes on the areas that appear to be in need of improvement. Appendix 1 gives an overview for all the ratios where Appendix 2 details all the ratio calculations in addition to the assumptions considered to calculate them with highlights on the most relevant ratios to the purpose of this analysis. The report assumes the validity and accuracy of all the financial figures offered in the annual reports offered by Codex and Compass. 3. ANALYSIS The financial ratios provide the evaluation and the quantification metrics to measure the performance of businesses. Codex and Compass are roughly the same size and eave roughly the same geographical split. In this competitive environment, Codex must consider its performance in relation to that of the other firms operating in the same industry where success depends on the ability to achieve a comparable level of performance. 3. 1 PROFITABILITY Codex announced sales revenues of  ¬mamma in the 12 months ended August 31 , profitability analysis revealed that this revenue has not been translated into real profit. The Return on Capital Employed ratio, that expresses the relationship between the operating profit and the long terms funds (equity and borrowings) invested in the equines, has declined for Codex from 13. 89% in 2009 to 12. 4% in 2010, whilst for Compass, the same ratio has increased from 19. 15% 2009 / 19. 6% 2010. Codex has reported a flat profit margin in 2009 and 2010 (5. 1%), a figure that is almost one-quarter lower than of Compass whose margin has grown from 6. 5% 2009 to 6. 8% 2010. The operating profit margin measures how much of a companys revenue is left over, before taxes and other indirect costs, for paying the variable costs of production. The low operating margin indicates an inefficient cost management and a weak pricing strategy adopted by Codex. Its operating expenses increased to  ¬14,mom in 2010, as compared to  ¬13,mom in 20093. Codex should definitely consider the improvement of its profitability figures in order not to lose investors to its rival Compass that enjoys a much more profitable image. 3. Efficiency The efficiency ratios measure the efficiency by which particular resources are used within the business. Codexs average settlement period for trade receivables has increased from 67. 82 days in 2009 to 74. 56 days in 2010 where the same figure for its rival Compass has slightly increased from 45. 16 days in 2009 to 46. 7 days 2010. Thus, Codexs average settlement period for trade receivables is almost 63% higher than that of its peer Comp ass. It is obvious from those figures that Codexs is being inefficient in its trade receivables management. A long trade receivable average settlement period would have a negative impact on the companys cash flow and decreases its profitability on the long run. The Sales Revenue to Capital Employed ratio that relates the sales revenue generated during a period to the capital employed in the business puts Compass (2. 96 times in 2009 / 2. 88 times in 2010) well ahead of Codex (2. 3 times in 2009 / 2. 52 times in 2010). Aligned with the Return on Capital Employed ratio mentioned in the section above, Codex appears to be less efficient. 3. LIQUIDITY The Acid Test ratio measures the ability of a company to use its available cash to retire its current liabilities. The higher the ratio the more the business is considered to be. Both Codex and Compass have maintained an acid test ratio below one in the past two years, thus, creating a worrying situation for their short term claimants. This liquidity problem could be explained by the fact that both companies have been The Cash Generated from Opera tions ratio, provides an indication of the ability of the business to meet its maturing obligations. The analysis of this ratio puts Compass in a better position ahead of Codex confirming an alarming decline in the Codexs ability to meet its obligations from its operating cash flow. 3. 4 FINANCIAL GEARING Codex appears to have a higher financial gearing ratio compared to that of Compass. 2010, Codex: 54% / Compass: 38. 72%. In effect, this shows that Codex is more dependent in its growth on borrowing than on its shareholders investments, unlike Compass that appears to favor a low leverage for growth. Some investors might, however, believe that Codex with its slightly higher leverage will benefit more from the global economic growth. Looking at the interest cover ratio, that determines how easily a company can pay interest on outstanding debt. It is quite obvious that Compass generates more operational profit to interest obligations than Codex. Codexs low interest cover ratio (5. 07 times in 2009 and 5. 47 times in 2010) compared to that of Compass (7. 84 times in 2009 and 13. 11 times in 2010). This gives Compass a more robust image, ND less burdened by debt expenses than does Codex. . 5 INVESTMENT Looking at the dividend yield ratio that compares the cash return from a stock to its current stock market value. Codexs dividend yield has significantly declined from 3. 26% in 2009 to 2. 57% in 2010 where that of Compass has slightly declined from 3. 45% in 2009 to 3. 3% in 2010 maintaining a higher value than that of Codex. Nevertheless, in order to satisfy its shareholders, Codex h as maintained a slightly higher dividend payout in the past 2 fiscal years, around 50%, than that of Compass, around 38% for the same period. CONCLUSION In the light of the analysis above, it is clear that Compass has a higher profitable image than Codex. It is also clear that Codex is less capable of generating cash from its operating activities would have negative consequences on the companys ability to pay back its shareholders on the long run. Clearly, both companies are undergoing a competition of organic growth through acquisition of subsidiaries which has created a liquidity problem in both companies, where Compass appears to be more capable of generated cash from its operations than does Codex. Codexs long settlement period for trade receivables even worsens its liquidity. Pay out on the account of liquidity by relying on borrowing rather than paying from its cash generated from operating activities. 5. RECOMMENDATIONS The analysis and the conclusions stated above require the board of Codex to consider the following recommendations: Operating Profit Margin efficiency of its cost management and the strength of its pricing strategy. Receivables Codexs notable long settlement period of the trade receivables requires its board to reconsider the companys overall receivables management strategy.

Monday, November 4, 2019

How Has the Management of People Evolved In Recent Years Essay

How Has the Management of People Evolved In Recent Years - Essay Example In response, welfare officers performed the paternal role of caring for injured employees and advocating for better treatment among women and children. Further research into the management of labour discovered abuse of managerial power and resources at the height of bureaucracy, which showed no concern for the welfare of workers (Haston n.d. p.3). For this reasons, a humanistic perspective demonstrated the need to understand human behaviour and recognise control among workers as opposed to managers. This approach demonstrated increased productivity in institutions that treated their employees better. Trade unions were formed to serve as a bridge between workers and the management where representatives negotiated terms of services in the organisation. Unionism revolutionised interactions between industrial organisations and their employees by providing a united front against poor working conditions by negotiating for improvements (Edwards 2009, p.227). Similarly, trade unions advocate d for policy adherence and a standard compensation model for workers. In 1970s, the existence of a consistent set of regulations governing organisations’ relations to their employees provide an essential framework termed as personnel management (Aswathappa 2005, p.18). This aspect of management is charged with the responsibility of selecting and recruiting workers, training, offering compensation and rewards, employee welfare, and facilitating employee transition. However, personnel management was not without criticism where critics refer to the ambiguous nature that based on emphasis on workers’ welfare with little gain to the organisation (Watson n.d, p.1). Critics argue that personnel management should be reverted line managers who are familiar with... This report stresses that following globalisation, there has been marked increase in competitiveness across business organisations, which demands a strategic approach to the management of human resources. Strategic planning is illustrative of a methodical and structural process through which an organisation identifies direction, and develops an approach to allocate resources. This process is geared towards identifying and prioritising short-term as well as long-term goals in order to maximise efficiency and profitability. Presently, management of human resources adopts a strategic perspective in order to be aligned with the goals of the organization and to be integrated into the organization’s needs. This paper makes a conclusion that while personnel management and human resource management appear similar, there exists differences that are of significance to the success of an organisation. Personnel management is based on short-termed goals and addresses immediate concerns while on the other hand, HRM involves strategic planning of the institution’s workforce in a long-term perspective. Also, the personnel management approach illustrates the psychological contract as compliance and adherence of workers to the demands made by the employer. On the other hand, HRM subscribes to the idea that employees indicate commitment and willingness to participate in fulfilling the mandate of the organisation without authoritarian specifications.

Saturday, November 2, 2019

Compare and contrast analysis essay Example | Topics and Well Written Essays - 1000 words

Compare and contrast analysis - Essay Example Other research studies on the subject revealed diverse perspectives noting the popularity that hip hop has gained from the time it originated and spanning a global audience. In this regard, using the two discourse: Chang’s It’s a Hip Hop World and Kiwana’s Erasing Blackness, the current essay hereby aims to present a comparative analysis of these literary works through a closer examination of the following elements, to wit: point of view, character, theme and experiences. There are similarities in terms of presenting both literary works from the third person point of view. Both Chang and Kiwana used the formal essay structure by using narrative and descriptive format and style with examples noted from actual life experiences. The disparities lie in presentation of the literary work, as Chang’s presentation could be deemed more effective in enticing pathos or emotional appeal through the use of carefully selected photographs the break the monotony of a long line of discourse (â€Å"Asian art: Graffiti is one of the original elements of American-style hip-hop that Chinas urban youth have made their own† (Chang 60); â€Å"Cant stop: A South Korean b-boy tears up Seoul with his acrobatic moves† (Chang 61); â€Å"Revisiting roots: Senegalese hip-hop artists tackle themes of poverty and oppression† (Chang 62)). Kiwana relied solely on narrative and descriptive prose with only very minimal sub-headings that assist the readers in defining a well-crafted enumeration on the arguments supposedly supporting white kids as hip-hop’s primary audience. Thereby, it could be deduced that Kiwana used logos as the rhetorical appeal through persuading the readers using logical reasoning. The theme is obviously unified as both focused on the subject of hip-hop. The contrast lies in thrust or focus of discussion. As brief noted, Kiwana’s discussion on the chapter aimed at

Thursday, October 31, 2019

Regression Analysis Essay Example | Topics and Well Written Essays - 1000 words

Regression Analysis - Essay Example Lastly, regression analysis will be performed on statistically significant pairs of variables and regression line equation(s) of best fit will be written. Using Excel’s Data Analysis-Sampling, random number for data for country was generated (Figure 1) and corresponding records were taken from population. Table 1 in appendix shows the sample for correlation and regression analysis. Figure 3 shows the scatterplot of the GNP per head and the number of commercial vehicles. The relationship between the GNP per head and the number of commercial vehicles appears to be moderate (correlation, r = 0.556). Table 2 shows the correlation matrix for variables GNP per head, Cars per head and number of Commercial vehicles. The correlation for ‘the GNP per head and the cars per head’ and ‘the GNP per head and the number of commercial vehicles’ is significant at level of significance, ÃŽ ± = .01. Since, the correlation for GNP per head with the cars per head and the number of commercial vehicles is significant; therefore, there is strong possibility that GNP per head can be used to predict the cars per head and the number of commercial vehicles in any country. Table 3 shows the regression analysis output for the GNP per head and the cars per head using Excel. The higher value of F statistic suggests that regression is significant. GNP per head explains about 80% of variation in the cars per head. GNP per head (US $) significantly predict the cars per head,  ÃŽ ² = 0.00005,  t(28) = 10.54,  p   The slope of the regression equation suggest that each US $ increase in GNP per head adds an average of 0.00005 cars per head. The intercept is not meaningful as zero GNP per head implies negative value for the cars per head that is not possible. The regression equation can be used for predicting the cars per head of any developing

Tuesday, October 29, 2019

Culture Case Study Essay Example | Topics and Well Written Essays - 1250 words

Culture Case Study - Essay Example The criteria surveyed on are: diversity recruiting policies, leadership development initiatives, training programs, opportunity for mentorship and activeness of employee affinity groups. All these points to a successful cross cultural management that we can learn from and worth to case studied into. Touching on race and ethnic diversity in the case study, there also are some theories that focus on positive predictions or possible positive outcomes of racial/ethnic diversity. This comes from a "value in diversity" perspective ([Cox, 1993] and [Cox et al., 1991]) which argues that diversity creates value and benefit for team outcomes. Group performance is thought to be enhanced by having broader resources and multiple perspectives (Hoffman, 1959). Particular to race, some studies (McLeod et al., 1996 P.L. McLeod, S. Lobel and T.H. Cox, Ethnic diversity and creativity in small groups, Small Group Research 27 (1996), pp. 248-264. Full Text via CrossRef[McLeod et al., 1996] and [Watson et al., 1993]) have found that ethnically diverse work teams make better decisions than homogeneous teams. The general assumption that underlies these theories is that an increase in racial or ethnic diversity means that a work group will experience possible positive outcomes such as: increased information, enhanced problem s... oblem solving ability, constructive conflict and debate, increased creativity, higher quality decisions, and increased understanding of different ethnicities/cultures. This is true for our case study as Mark Welch, Director of Global Diversity & Inclusion at Northern Trust says in the article (l.5). Because of the diverse background of each individual and culture, when faced with the same problem in the work group, different solutions emerged from the respective culture. Since each culture is unique and so there will be differences, which results in a bigger pool of ideas generated to achieving a problem. This increases the number of comparisons of ideas between one to another. As a result, combinations and hybrids of solutions will surface giving rise to more information. What will be beneficial is that the ability to solve problems will be enhanced since there is an acquirement of new perspectives to solve the same problem, meaning if certain conditions impedes the implementation o f one solution, another solution acquired to the same problem may be more viable. This syndrome is a proof of increased creativity of the individual or of the group. Being in a diverse group, common sense will tell that being sensitive to another's race or ethnicity or hostility will arise. In view of this, to cater to the care of a co-colleague emotions and perspectives very much individualized in a person, and at the same time to disagree maturely based on facts, the way is to bring across constructively conflicts and debates. To achieve so, one will need to seek out the understanding of another's race and ethnicity if an authentic relationship is to be established in the work place. With the increased solutions, there will come about the choice of the best solutions and the motivation

Sunday, October 27, 2019

Leading Causes of Morbidity and Mortality in the US

Leading Causes of Morbidity and Mortality in the US The Leading Causes of Morbidity and Mortality in the United States Crystal Mullen ASSIGNMENT: Research the leading causes of morbidity and mortality in the United States. What are the leading causes? Why is it important to be aware of them? Write a 4-5 page APA formatted paper discussing your findings. You will need to include a minimum of 3 references to support your findings and opinions. Before beginning this assignment I was thought morbidity and mortality referred to things that are scary, gross and filled with gruesome deaths. I thought that morbidity referred to what I saw on Halloween or some horror movie. As it turns out morbidity refers to: â€Å"the incidence or prevalence of a disease or of all diseases in a population (Medical Dictionary, 2014)† Based on this definition I can see that morbidity is data collected regarding the various diseases that can afflict a population (Diffen, 2014). Furthermore, I saw mortality simply as a fancy way of saying that everyone is going to die. Because my view of mortality was overly simplified, I didn’t appreciate the weightiness of this information: â€Å"Death, especially of large numbers; heavy loss of life (The Free Dictionary, 2014).† Based on this definition, mortality is more than just dying, it’s documenting populations that have died. This data can be separated into different categories: perinatal mortality rate, crude death rate, maternal mortality rate, infant mortality rate, child mortality rate, age-specific mortality rate, and standardized mortality rate. Once the data is collected it goes to the National Vital Statistics System so that the information can provide cause of death information based on geography and demographics (Diffen, 2014). Therefore, having an understanding of the difference between morbidity and mortality, I can further research the leading causes of morbidity and mortality in the United States. Based on what I’ve found, the top five causes of death, or mortality, in the United States are heart disease, cancer, chronic lower respiratory diseases, strokes, and accidents. Heart disease is the number one cause of death in the United States. The Centers for Disease Control and Prevention (CDC) has documented that approximately 600,000 individuals will die of heart related illnesses in the United States every year. In fact one of every four individuals will die of heart disease. Furthermore, coronary heart disease, the most common form of heart disease will kill over 385,000 people in the United States this year alone. Finally, though not exhaustively, every year, 715,000 Americans suffer from a heart attack. These are simply the statistics for heart disease (CDC, 2014). There are quite a few risk factors that enable individuals to be susceptible to heart disease. First of all, individuals who smoke, have high blood pressure or high LDL cholesterol. Furthermore, individuals will increase their risk for heart disease if they struggle with a healthy weight, eat unhealthy live a sedentary lifestyle or drink alcohol excessively (CDC, 2014). Sadly because this is the lifestyle of many Americans, they are continuously vulnerable to hearth disease. However, while these risk factors are excessive, there are ways for Americans to reduce their susceptibility to heart disease simply by making healthy food choices that are low in salt and fat and high in fiber and protein. Furthermore, it has been proven that limiting alcohol intake and daily aerobic exercise will lower a person’s blood pressure and LDL cholesterol. These changes will lower a person’s vulnerability to hearth disease (CDC, 2014). The second leading cause of death, mortality, in the United States is cancer. The ten most prevalent in the United States include cancers of the prostate, breast, lung and bronchial, colon and rectum, corpus and uterus, urinary bladder, skin, non-Hodgkin lymphoma, kidney and renal pelvis, and cancer of the thyroid (CDC, 2014). At this time there are no explanations why one person will develop cancer while another person won’t. However, there is research that links certain risk factors to a person’s susceptibility to suffer from cancer. Certain risk factors, such as growing older, family history, sunlight, and even certain hormones and radiation may be beyond an individual’s ability to control. However other risk factors, such as excessive alcohol consumption, poor diet, a sedentary lifestyle, or obesity are risk factors every individual can avoid. Furthermore, annual check-ups with a healthcare clinician can also warn an individual of additional risk factors to avoid (National Cancer Institute, 2014). Chronic lower respiratory disease is the third leading cause of mortality in the US. Chronic lower respiratory disease refers to persistent, continuing diseases of the lower respiratory tract. Examples of Chronic lower respiratory disease includes COPD, Emphysema, Chronic bronchitis, and Cystic fibrosis. The symptoms of this disease include are shortness of breath, coughing up blood, chest pain, wheezing, loss of appetite, loss of weight, and bluish discoloration of fingers and lips (Right Diagnosis, 2014). There are quite a few risk factors that increase a person’s chances of chronic lower respiratory disease. Certain risk factors, such as chemical fumes, air pollution, and long term to exposure second hand smoke is beyond a person’s control to prevent. However, risk factors such as smoking can be eliminated so minimize a person’s vulnerability to chronic lower respiratory disease. Strokes are the fourth leading cause of death, mortality, in the United States. Strokes are the equivalent to a heart attack in the brain. This is because the blood vessels in the brain rupture when the blood supply to the brain is blocked. When this happens, brain tissues die and generates a weakness or numbness on half of the body. A stroke is a medical emergency, but with quick treatment to the stroke victim, it is possible for the victim to avoid physical disability and death (CDC, 2014). As with the other causes of morbidity, there are quite a few risk factors of having a stroke that are both within, and beyond an individual’s control. For example, risk factors like family history are beyond an individual’s control. However, behavioral choices such as poor eating habits, sedentary lifestyle, obesity, smoking and excessive alcohol consumption are risk factors that can be avoided to reduce a person’s chance for suffering a stroke (CDC, 2014). I believe that because there so many ways to prevent a stroke, this must be the reason why it is the fourth and not the first leading cause of morbidity. Finally, the fifth leading cause of death, mortality in the United States is accidents. There are many forms of fatal accidents including (but not limited to) death by motor vehicle, vehicles, poison, slip-and-fall, choking and even fire. Motor vehicle accidents happen all too quickly and far too easily simply when the drivers get distracted. Car (vehicle) accidents often happen when the driver is doing everything else while driving such as texting, talking on the phone, applying makeup, or even shaving. Poisoning occurs either with tainted food or water, as well as ingesting legal and illegal drugs as well as various pesticides. The most common forms of poison are hydrocodone, heroin, cocaine and even alcohol. Although people do die from falls, this isn’t usually a problem for individuals under 65 years old. Death by fire occur either from carelessness such as a paper close to a fire or perhaps falling asleep while smoking. Finally, just as senior citizens are at the highest risk for falling, toddlers are at the highest risk of choking. So it’s a good idea to remove food or small toys out of a child’s unguarded reach so that they won’t suffer from choking (Listosaur.com, 2011). Based on what I’ve read, all accidents are preventable yet all accidents can be deadly. Conclusion Based on what I’ve read, and based on my own lifestyle, it is very important not only to be aware of risk factors of diseases because I am then armed to prevent them in my life. First of all, if I know risk factors for heart disease include poor eating habits, then I can create a meal plan that is low in salt and fat and high and fiber and protein. Furthermore, if I know that one way to avoid lung cancer is to avoid situations where I’m ingesting second hand smoke, then I know to avoid areas of work where people are taking their smoke break. Finally, though not exhaustively, if I know that a risk factor for a child to choke are innocuous food like grapes, stew meat, or nuts, then I know I need to cut up my little one’s food into tiny bite sizes so that he or she can enjoy the food without obstructing his or her windpipe. Therefore, if I take care of my health, I have a greater chance of living a long and healthy life. References CDC. (2014). Cancer Prevention and Control. Retrieved March 2, 2014, from Centers for Disease Control and Prevention (CDC): http://www.cdc.gov/cancer/dcpc/data/types.htm CDC. (2014). Health Disease. Retrieved March 2, 2014, from Center for Disease and Control Prevention (CDC): http://www.cdc.gov/heartdisease/ CDC. (2014). Stroke. Retrieved March 2, 2014, from Center for Disease Control and Prevention (CDC): http://www.cdc.gov/stroke/ Diffen. (2014). Morbidity vs Mortality. Retrieved March 2, 2014, from Diffen: http://www.diffen.com/difference/Morbidity_vs_Mortality Listosaur.com. (2011, July 22). Top 5 Causes of Accidental Death in the United States. Retrieved March 2, 2014, from Listosaur.com: http://www.listosaur.com/miscellaneous/top-5-causes-of-accidental-death-in-the-united-states.html Medical Dictionary. (2014). Morbidity Definition. Retrieved March 2, 2014, from The Free Dictioary: http://medical-dictionary.thefreedictionary.com/morbidity National Cancer Institute. (2014). Cancer Causes and Risk Factors. Retrieved March 2, 2014, from National Cancer Institute: http://www.cancer.gov/cancertopics/causes Right Diagnosis. (2014). Chronic lower respiratory diseases. Retrieved March 2, 2014, from Right Diagnosis.com: http://www.rightdiagnosis.com/c/chronic_lower_respiratory_diseases/intro.htm The Free Dictionary. (2014). Mortality Definition. Retrieved March 2, 2014, from The Free Definition: http://www.thefreedictionary.com/mortality