Wednesday, July 31, 2019

Are All Adolescents at High Risk for Drug Addiction?

‘Psychological characteristics’ is the reason behind the involvement of the young adults to the use of drugs. This is what the authors who investigated the children in Woodlawn have found.   The study of Kellam, Branch, Agrawal and Ensminger regarding the investigation of how the use of drugs has been present in the childhood antecedents traced how the group of urban children from 6 to 7 years old developed.In this study, the authors found that after a decade, when the children aged 16 and 17, they have been using drugs. Also, children who began going to school have already varied ways into young adulthood. (Kellam, Branch, Agrawal, & Ensminger, 1975; Kellam, Brown, Rubin, & Ensminger, 1983)There was also this study of Jeanne and Jack Block about the children at the San Francisco Bay area, whom since nursery have experienced cases with which psychological characteristics has also been the cause.If in Woodlawn study, children involved are those aged 16 and 17, in this s tudy, they have found out that children, at the age of 14, has already committed to drugs and the crimes and cases with its involvement, which is quite alarming.  (J. H. Block & J. Block, 1980)The study required the authors to call the government’s attention in mitigating the cases committed by young adults. But aside from the government’s efforts in conducting programs and actions, the study also eyes for the parents to take actions regarding the issue. In terms of the responsibility, it has been the parents who are always on the position to take care of the psychological and emotional development of the children.These studies also included the whole range of conference later subsumed by the California Child Q-sort and the California Adult Q-sort that was designed to give permission to the clinicians in providing the in-depth, wide-ranging psychological descriptions. It was intend to gather information that is full of all psychological terms to talk about the concer ns of the clinical and to give information to the efforts of intervention. (Smith, G. M., & Fogg, C. P. (1978).Earlier investigators to this case have assumed nonstop relationships between the measures of psychological disturbances and the level of drug usage. It is because the approach assumes that the infrequent experimentation with the drugs has been problematic in terms of psychology, because of the tendency and the pressure to the adolescents for the regular use of drugs and for it becomes good to them (drugs are found to be good when the user is under the influence of it).Nonetheless, most of the adolescents in the United States have experiments in the use of marijuana most of the time, and the huge majority of these adolescents do not latterly become abusers of drugs because there is found â€Å"adjustment in the psychosocial† to those young adults who have experiments the use of drugs occasionally and of those young adults who totally avoided drugs. (Johnston et al., 1986; Johnston, Bachman, & O'Malley, 1981 a, 1981 b; Miller et al., 1983; NIDA, 1986)Certainly, occasional use of drugs is what has been suggested by most of the researchers for the adolescents to understand the manifestation of the developmentally appropriate experimentation.   One of them has observed those behaviors, personalities and the attitudes of the young adults before they choose a path to in their own choice.It is an expedition for or the organization of self-rule and independently personality and performance. This may be believed a normative attitude among the adolescents of the America from a developmental mission of outlook and in conditions of incidence.In their study, the subject was one hundred and one children. There are forty nine boys and the fifty two remaining are girls. All ages 18 years old. They came from the preliminary preview of one hundred and thirty respondents in a study of the development of ego and mentality. They were at first employed into the ex periment at their age of three. They were attending their nursery then, assessed by their parents.  The children have been measured on an extensive successions of psychological methods at ages three, four, five, eleven, fourteen and eighteen. Because there are just few of the subjects were lost over many of years, there can still be an amount of degree of difference of the slow destruction.In the interview, it has been those with the age of eighteen are being collected of the information about drugs. These interviews were conducted by the skilled and knowledgeable deficiency experts and the interviews varied over a selection of topics together with the works in school, relationship with the classmates and friends, the dynamics of the family and the personal interests.  The respondents were given questions about if they smoked pot or if they are using it in another form. The response goes with answers like if they never used marijuana, used it one time or two, more than two, one time in a month, one time in a week; twice or thrice in a week and the daily usage.The result of the study reveals that thirty seven percent of the respondents have reportedly trying cocaine and those who tried hallucinogens have been about twenty five percent. It was about ten percent of them found to be trying inhalants, barbiturates, amphetamines and even tranquilizers. There was also one of them has found to have used the heroin.  Those who tried marijuana also have the largest count, which is about sixty-eight percent. Before this, it was researched that four years earlier, it was fifty one percent only of the research have been using marijuana. Of the sixty eight percent of the category, thirty nine percent has found to be using marijuana once or more within a month, while twenty one percent of it has found to be using it in a week or about more than a week.These data point out that in a no selected delayed young adult example, irregular study with the marijuana is not destr uctive in terms of personal and societal.This insight is held up by studies of the penalties of drug usage, as well as with the research in the background and associative of drug usage and by with the truth that most of the young adults in America have tested marijuana but have not consequently turn to be abusers of drugs.The obvious contradiction between medical awareness and the found facts by the study, on the other hand, have been resulted when it has been documented that the individuals who in attendance themselves for drug treatment are not courier of the broad population of the young adults.For them, the study with the drugs is extremely unhelpful because drugs effortlessly become an element of a wider pathological disease. For the young adults more in general, some of the study in drugs is obviously does not have the appalling repercussion in the psychology.The Institute of Criminal Justice and Criminology made an evaluation of the Drug Abuse Resistance Education (DARE). It examines the DARE if it functions well or bad, and if its reaction to the incidents of drugs is being competent.They compared three hundred forty one fifth grader DARE students to those students who are not under the DARE. There were found major differences in the anticipated track for the usage of alcohol in the previous year, trust in the non anti-society standards, involvement with the group of friends who uses drugs, productive involvement in a group, approach to the police or military, conduct trick, liking and enthusiasm to the school, behaviors that are close to to material usage, and rudenessThere were no distinctions found on the vice materials such as tobacco, cigarettes, and or marijuana usage last year, incidence of any use of drugs in the previous month. All have been the same, just some changes in terms of number figure, but in the total picture of it, nothing has changed.CONCLUSION  There have been a lot of books, references, studies and publications that are being made by the experts for the benefit of research and information to identify the causes and effects of the drug addiction issues worldwide. Almost every man in the world knows that the use of drugs is illegal, as it has been imposed by the government that drug use is prohibited because of its negative effects and disadvantages.The reason why there is a high risk for the adolescents in drug addiction is mostly because of the psychological attributes. The quality of guidance and assistance of the parents to their children is proven to be the major cause on why young adults are getting involved into drug addiction.It has been the parents who are being responsible on why the kids grow out of the path and without proper orientation of what life must be when they get into the matured age.Young adults are very prone in the addiction to drugs for their vulnerability stage. They are in the most curious stage of their lives in which no one can not stop them of being probing of everything new t o them. The temptation to do everything they want because they are curious about it is very active at their age. So they are really at the high risk of drug addiction.

How does Steinbeck present the theme of loneliness in ‘Of Mice and Men’? Essay

‘Of Mice and Men’ by John Steinbeck, is set in mid-1930s America during the depression. This depression came as a shock to America after the 1920s ‘boom-time’. The inspiration that Steinbeck drew upon is the troublesome times people were living through at that time. However, the characters in the novel are lucky in that they are working on a prosperous farm, despite millions actually being out of work at the time. In this essay, I will attempt to bring out key points referring to loneliness and how it affects the characters in the story. The novel is set in a place called Soledad, which incidentally means loneliness. The two central characters in the novel are George Milton and Lennie Small. The first chapter helps us get to know the characters well. George and Lennie are two workers who move from ranch to ranch in search of work and good pay. We know early on that they are currently between jobs, and are hitching lifts to their next job. They had to move on from the last ranch because of Lennie having touched a girl’s dress, so they are on the run. George is quick-witted and intelligent. He is also very cautious â€Å"Lennie. You gonna be sick like you was last night.†. George is ‘small and quick, dark of face,’ also with ‘restless eyes’ this again stresses the point that he is cautious and weary of other people. Lennie however is very childlike – â€Å"Look, George. Look what I done.† – Like a small child, Lennie is trying to impress George. One point emphasised frequently through the book is, despite his terror of violence, he is a man of great physical strength and is often compared to an animal – â€Å"He stood crying, his fist lost in Lennie’s paw.† In many ways, George and Lennie are the two halves of a single person, one of them is strong while the other is weak. The two refer to both George – strong mind, physically weak – and Lennie – physically strong, but mentally weak. Lennie is George’s ‘shadow’, he does as he is told by George – whether in his best interests or not – â€Å"You tol’ me to, George,† he said miserably.’ George and Lennie care for each other as if they were family. George plays the parent figure in Lennie’s life, he has taken on the responsibility for Lennie partly out of pity, partly out of affection, and partly for companionship. They actually need and depend upon one another – â€Å"you got me and I got you† – as Lennie keeps saying. They share a dream to own a patch of land and it is this that keeps them going in the bad times. Other men may also have had this dream, but perhaps don’t have as m uch faith in it as George and Lennie do. Candy is near to the end of his useful life on the farm and knows he has little to look forward to. Candy’s only companion is his dog, we are told Candy has raised him since he was a pup. When the dog is killed by Carlson, Candy is silent almost as if his soul was in the dog, so when the dog is destroyed, Candy is too. He is offered a new pup by Slim, but this is no consolation as he has lost a lifelong friend. Candy is easily hurt by Carlson’s willingness to ‘murder’ his pet â€Å"Le’s get it over with,† Despite his emotional turmoil early in the book, Candy is saved from insanity by George and Lennie. He is let into their dream and he is just as enthusiastic about it as Lennie! â€Å"How much they want for a place like that?† The loss of his dog is not the first he has had to deal with. ‘He scratched the stump of his wrist nervously. â€Å"I got hurt four years ago,† This shows he has only one hand, and has had to come to terms with the loss of something perhaps more important than a pet. Crooks is a ‘special case’. He is a literate black cripple who tends horses on the ranch. This makes him one of the loners in the novel. Because he is black, he has a room of his own – but with manure right outside the window, he is not living in luxury. His significant possessions are his books. Whereas the ranch hands generally read magazines, he has the time – and the intelligence – to read proper books. Literature, after all, educates us, allows us to enter into other worlds, and fills our time profitably. He says, â€Å"A guy sets alone out here at night, maybe readin’ books or thinkin'† The books actually show that Crooks is not inferior. If anything, they show that he has a superior intelligence. However, Crooks indicates the books also reflect his loneliness – he would like someone to talk to. So they also show how he is different and apart from the other workers on the ranch. He has long been the victim of oppressive violence and prejudice, this in itself leaves him separate from the rest of the group. Despite the persecutions, the other characters seem to secretly admire him â€Å"Jesus, how that nigger can pitch shoes.† Then Slim replies â€Å"He’s plently good,† although they never complement him when he is around. Crooks does have rights, but many of them are abused and no-one does anything to enforce them. Crooks has trouble fitting in and making friends because of restrictions imposed on him by the boss – he is only allowed in the bunkhouse at Christmas. Crooks’ character is bored with life and only wishes to be equal with white people, like he seemed to be as a child, and he only now realises why his father despised his white friends as a child. Crooks is isolated from the other ranch hands because he is different. He copes with it by keeping a distance between himself and the other hands but he is drawn into the dream of working on George and Lennie’s farm. When Lennie is with him when the others are in town Crooks is talking about his views on companionship. Crooks tries to talk to Lennie about the loneliness he is feeling caused by being black, but Lennie is too busy thinking about George to listen to him. So Crooks ends up teasing him about George not coming back. Curley’s wife is seen as a possession – something belonging to Curley – rather than a person in her own right. She is just described as a tart, but little more is known about her. It could be because of this that she enjoys teasing Lennie and the others on the ranch; she knows Curley does not approve and it is a way of getting her own sense of being an individual back. She wants to be noticed as a person, her shattered dream of being a movie star is shared with Lennie as they grow a short friendship. She is described as a â€Å"temptress†, â€Å"piece of jail-bait† and a â€Å"tart†. She is portrayed as an evil character, although it is also emphasised that this is no fault of her own. She is blamed by Candy for the end of his own dreams, even though she was also a victim – after Lennie unintentionally killed her. Being lonely she turned to Lennie for companionship, but his love of petting soft things ends in her demise. Lennie and Curley’s Wife are, with the exception of Crooks, the most lonely and misunderstood characters in the book. In chapter five, they meet in the barn after Lennie has accidentally killed his puppy. Curley’s Wife approaches him, but he knows he should not be talking to her, after all George said she was a bad person, â€Å"Well, I ain’t supposed to talk to you or nothing.†. He reveals the dead puppy, and she begins her slow process of seduction, by consoling him – telling him it was not his fault. Then she tells him about her dreams, her life story and how she was cheated out of a movie star career by her â€Å"ol’ lady†. It changes from seduction to a friendship â€Å"because she had confided in him, she moved closer to Lennie and sat beside him† – so now there is a one way trust between the two, Curley’s Wife already having confided in Lennie, but he is still worried about what George might think – a nd the possibility of George not letting him tend the rabbits. But Lennie tells her he likes soft things, and she allows him to stroke her hair. She has fallen into a trap, and it seems she will suffer the same fate as the other creatures Lennie has petted. She does. Eventually killed by her own loneliness, she dies violently at the same strong hands as the mice, the dog and Curley’s hand. Candy then stumbles upon the body, he knows it was Lennie and realises the trio’s dream is finished. He gets George who knows he must reach Lennie before Curley and the other ranch-hands, so he can help Lennie escape the violence that would ensue if he didn’t catch him in time. An alternate way of life is sought by the characters, motivated by their loneliness, this is one of the reasons they drift from ranch-to-ranch, they are continually searching. They do this, often without knowing what they are really looking for. Characters are also lonely because of something within themselves, something that almost seems to make their loneliness inevitable. Different characters seek comfort in different things – for Candy it is his dog; for George and Lennie it is each other; for Crooks it is his pride and skill at things like pitching horseshoes. For them, it is an unending journey moving from place to place, the same jobs, the same routines, different people. Sadly, they never stay in one place long enough to make friends or settle down. Many dream of getting a ranch of their own, but it will never happen as long as they take their pay every month and go into town and waste all they have earned on one night of recreation.

Tuesday, July 30, 2019

A Comparative Analysis of H.G. Wells’ Island Essay

H. G. Wells’ The Island of Doctor Moreau and Elie Wiesel’s Night are strikingly similar accounts of modern savagery and inhumanness that affect seemingly civilized societies. What is revealing however is that Wells’ novel is an entirely fictional work which proposes to analyze the effects of the advancement of science and technology in the absence of solid ethical principles, while Wiesel’s work is an autobiographical account of the author’s experiences in several concentration camps, during the Holocaust. The similarity between the experiences of the two narrators points to the inherent savageness of man. A comparative analysis of the two works exposes human civilization as a myth rather than a reality. Wiesel’s grim, nightmarish experience in the concentration camp almost surpasses the horror of Well’s fantastical island. Man is debunked as a savage, beast-like creature whose acts prove to be even more frightening and unimaginable than those of animals. The horrors produced by Doctor Moreau and by Hitler are equally unbelievable. While animal behavior is characterized only by instinctual cruelty urged by the necessity of survival, human cruelty exemplified by the experiments of Moreau and by Hitler’s massacre of six million Jews, is at once more perilous and more disturbing. In man, the animal instincts are paired with reason and imagination, just as in the symbolic hybrids created by Moreau, and thus the potency of evil increases tremendously. The two works start off from similar premises. The cruel and unprincipled experiments concocted by Doctor Moreau take place on a secluded island with a symbolic name: Noble’s Isle. In order to improve human genetics, Moreau performs vivisections and other horrifying experiments on various animals, attempting to create a new, superior race of hybrids. His experiments are symbolic because they draw attention to man’s double nature, as an animal and as a creature endowed with reason. The island’s seclusion allows the scientist to establish an empire of horrors. In Wiesel’s Night, the nightmare is also compressed into the unitary and enclosed space of the concentration camp. The barbed wire that surrounds the camps from all sides and that bears the ironic warning sign of danger, marks the boundaries of a limited and entrapping world where only the horrors are infinite: â€Å"We were caught in a trap, right up to our necks. The doors were nailed up; the way back was finally cut off. The world was a cattle wagon hermetically sealed† (Wiesel 30). Moreover, time itself is condensed into a single and prolonged night, an unending nightmare that knows no respite. Moreover, the similarity between Moreau’s design of perfecting the human race and Hitler’s project for exterminating the Jews and purifying the Aryan race, reveals the fact that man is prone to atrocities and inhuman acts that are much more terrifying than those of beasts. The hybrid race created by Moreau is a symbol of manhood in general and its proximity to savageness despite technological advancements and scientific progress, while also being similar to the new breed beast –like men created by the Holocaust. The extreme terror and dehumanizing physical suffering of the prisoners of the concentration camp, change them into savage beings that are limited to a few basic instincts. The horrors that they have to endure are almost unbearable. The Jews are therefore rapidly transformed into beasts who try to cling to the miserable and terrible lives they have. Hungered, beaten, separated from families and friends, the men and women lose their individuality and their human feelings. Gradually, as the horrors progress, they become so inured in the beastly life they lead that they no longer communicate or try to express themselves. Any trace of human feeling or dignity disappears from the men that are brought even lower than the animal condition: â€Å"Within a few seconds, we had ceased to be men† (Wiesel 45). The sheer nightmare of permanent terror and sufferance, without the light of hope or comfort is increased by the Jews’ awareness that they were being persecuted by fellow beings. As the narrative progresses, the horrors also increase. The thousands of Jews that live and work in crammed-up places become walking skeletons. With scarcely enough food to sustain life and insufficient clothing to shield them from the weather and with no treatment for their illnesses the remaining Jews survive only by a miracle. They are surrounded by death: its threat blazes in the furnace of the crematories where the ‘selected’ ones are taken, it piles up in the corpses that are ubiquitous in the camps, it takes the loved ones away and threatens their own emaciated bodies at any moment. The cruelties that these people suffer are beyond description and their endurance impressive. The author himself was only fifteen years old at the time that he had to bear witness and to be a part of these horrors. His deep religious feeling and his faith are shaken forever by the black memory of the holocaust: â€Å"Never shall I forget those moments, which murdered my God and my soul and turned my dreams to dust. Never shall I forget these things, even if I am condemned to live as long as God Himself. Never† (Wiesel 43). While the Jews are reduced to less than beastly conditions, their force of endurance is overwhelming. According to Wiesel, the suffering people gathered there were greater than God himself because of their spiritual strength that makes them pray even in these dire conditions. The image of the Jews sufferance is easily comparable to that of the beast-like creations of Doctor Moreau: â€Å"And the dwindling shreds of the humanity still startled me every now and then,—a momentary recrudescence of speech perhaps, an unexpected dexterity of the fore-feet, a pitiful attempt to walk erect† (Wells 159). Significantly, the Jews as well as other people had regarded Hitler’s promise of exterminating an entire race of people as an impossible farce. The civilized man deems himself safe from extreme pain inflicted by another human being. The narrator himself believes at the beginning that nothing like what was rumored about the camps could be true in the middle of the twentieth century. The same disbelief surrounds Prendick’s account of the scientific experiments on the island. The ultimate feeling that seizes both Prendick and Wiesel in front of these atrocities is the fact that they do not have the desire to return to mankind, despite their sufferance: â€Å"It is strange, but I felt no desire to return to mankind. I was only glad to be quit of the foulness of the Beast People† (Wells 166). This emphasizes the fact that real cruelty is much more often witnessed in man than in animals. The two works describe the nightmarish experiences of the narrators. Entrapped alongside the direst human savagery, the Jews have no choice but to bow to it and expect their own end. Their endurance is obviously superhuman. As in The Island of Doctor Moreau, the liberation of the last Jews is brought by their revolt. This liberation however will never shake the curtain of the horrors that remain inscribed in history as a testimony to human savageness and its persistence in the modern world. ? Works Cited: Wells, H. G. The Island of Doctor Moreau. New York: Signet Classics, 1996. Wiesel, Elie. Night. New York: Holt McDougal, 1999.

Monday, July 29, 2019

Devotion to God Essay Example | Topics and Well Written Essays - 1000 words

Devotion to God - Essay Example The song depicts that the God is not egocentric and with his presence, there is no ego in men. It admits that there is only one God, who is obtained by the grace of the guru. In the song, the Guru quotes, ‘what we deem a thing to be, in reality it is not like that’ (Fisher & Bailey 2012, p.81). This quote expresses that the God is ‘all-knowing’. He is omniscient and that men can think what they may and perceive things the way the can, but God has the only power that can perceive things correctly. Humans are prone to errors but God cannot make a mistake and his perception is always real. Ravi Das quotes that, ‘the lord is nearer to us than our hands and feet’ (Fisher & Bailey 2012, p.81). This confirms that the God he implies is omnipresent and his presence and manifestation is always with men whenever they are. He uses praise and submissiveness to show his devotion to God. He says the one Lord has assumed many forms but enjoys within all hearts. This figurative expression and style devotes to the Lord that he is omnipotent and omnipresent that he can assume be anything and still experience the hearts of every man. The relationship between the devotee and the God in the context of the saint song is close. He had even quoted that the presence of the lord was in a close proximity to a man than hands and feet. The devotee, Ravi Das is less resourceful as his caste class demands and being in the position to interact with the ‘Lord of wealth’ insinuates the close and non-discriminative relationship he had with the Lord.

Sunday, July 28, 2019

Management (potential automated systems) Essay Example | Topics and Well Written Essays - 2500 words

Management (potential automated systems) - Essay Example Automation has implications for both the engine and deck departments. One of the primary responsibilities of the deck department is safe navigation. They are responsible for communicating with other ships, communicating with the vessel tracking system, planning safe courses, executing courses, and avoiding collision with other ships. When executing manoeuvres, the deck department communicates the required changes in engine speed to the engine room, where the appropriate adjustments are made. Automation plays a major role in the deck department, and prototype systems suggest that automation may play an even more important role in the future. Automation in the deck department began with the development of the radar, and has progressed to radar enhanced with automated radar plotting aids. More recently, the electronic chart display information system is beginning to replace paper charts. Perhaps the most advanced automation systems are artificial intelligence systems that combine naviga tion and ship performance information to provide routing and manoeuvring suggestions to the crew. Other developments include more advanced autopilots that enhance fuel efficiency, and complex combinations of engine, rudder, and thruster's controllers that enable the watch officer to dock the ship without need for multiple tugboats. Several countries are working to develop fully integrated bridges that combine elements of all these automated systems to produce an integrated suite of navigation and ship control aids. These changes may make it possible for a single person to act as the helmsman, lookout, and watch officer. (Dicken, 2003) Similar changes have occurred in the engine department. Older ships operate with a 24-hour watch consisting of a wiper, a water-tender, a fireman, and an engineer. However, technology has automated many aspects of the engineering department and has made unattended engine rooms possible. Automation supports planned maintenance with computerized schedules of maintenance tasks. Automation also supports predictive maintenance by tracking changes in vibration signatures of engine components and providing sophisticated ultrasound data that verify the structural integrity of system components. On these ships, the engine room is monitored remotely and engineers perform maintenance during normal work hours. (Dicken, 2003) Automation Pros & Cons Automation on modern ships has begun to blur the distinction between the deck and engineering departments. In older ships, a bell system relayed bridge commands to the engine room, where the engines were manually adjusted to meet bridge orders. Now, direct control from the bridge allows the deck department to implement engine speed changes directly. In addition, displays on the bridge convey data that were once only available to the engineering department. Providing deck personnel with data from the engine room imposes new demands on them. These changes may introduce new knowledge requirements regarding interpretation of engine room data similar to those found in the process control domain. Introducing remote monitoring systems distances mariners from a wide variety of potentially useful information (smells, noises, vibrations) only available in the engine room

Saturday, July 27, 2019

Free topic (contact me by email) Research Paper

Free topic (contact me by email) - Research Paper Example Non-verbal forms of behavior are expressive while verbal behavior is indicative. In a normal communication between two people, only one-third of the meaning is transmitted on a verbal level while two-thirds on a non-verbal level (Sielski, 1979). Nonverbal communication provides an insight into why people behave as they do. Such insight and information is invaluable for professions such as counseling because body language can actually contradict verbal communication (Sielski, 1979) and non-verbal cues are processed differently in different cultures (Yammiyavar, Clemmensen & Kumar, 2008). Terms ‘body language’ and NVC are interchangeably used throughout the paper. This subject has been of interest to evaluate how an understanding of body language can actually influence counseling. I have gone through some literature on body language and counseling and since I intend to enter the counseling profession, I felt motivated to go deeper. This research paper is purely based on textual analysis. Based on the literature review, the framework for the research would be formed. The methodology would be briefly discussed and then the findings would be analyzed based on theoretical framework. Body language as a means of communication has been of immense interest to many researchers and psychologists. It is considered to be an outward reflection of a person’s emotional state, according to Yammiyavar, Clemmensen and Kumar (2008). It is a study of the mixture of all body movements that could be involuntary or deliberate; it could also apply only in one culture or across all cultures. Non-verbal communication refers to all stimuli generated for the purpose of communication. Various body movements such as facial expression, gestures, eye contact, tactile communication and paralanguage have been identified as principle non-verbal cues. Areas of study in non-verbal cues

Friday, July 26, 2019

Managerial accounting Essay Example | Topics and Well Written Essays - 2250 words

Managerial accounting - Essay Example The essay will also look at the role played by management accountants today and assess whether this is relevant to modern day business requirements. Management accounting is concerned with identification, measurement, analysis and communication of information necessary to help an organization achieve its objectives. Management accountants are usually senior managers in a company and have the responsibility of supervising junior accounting staff who deal with basic accounting for the firm. Unlike financial accountants, managerial accountants prepare and analyze data for purposes of deacon making within the organization (De Loo, Verstegen, and Swagerman, 2011). Financial accountants on the other hand prepare data and financial statement for third parties such as shareholders. Changes in the traditional role of management accountants has been necessitated by developments within the business environment such as changes in consumer preferences, technological changes, socio-economic changes and volatile political environment. In this scenario, businesses and organizations have had to reorganize themselves in order to responds to changes in the external environment (Scapens and Jazayeri, 2003). This reorganization involves examining the significance of various departments and employees in relation to modern day business requirements. Management accounts have faced strong challenges over the years over whether they deserve to be part of contemporary business structures. Such pressures were significant in driving changes within the managerial accountants’ role that have made the position relevant today. This paper will start by examining the traditional roles that management accountants play in organizations. The essay will further look at the changes that have taken place in modern day organization and the difficulties that traditional accountants encounter in executing their traditional roles. The

Thursday, July 25, 2019

Roles of the Nurse Leader Term Paper Example | Topics and Well Written Essays - 1500 words

Roles of the Nurse Leader - Term Paper Example Answer: No: 2 A nurse leader injects the sense of responsibility in the minds of other nurses. She also makes them aware of the roles and responsibilities of a nurse as a healthcare provider. A nurse leader performs her job related activities with full commitment and dedication. A nurse leader gives priority to her responsibilities over her personal matters. A nurse leader provides proper treatment to the patients based on her job related experiences and knowledge. â€Å"They may be responsible for overseeing a ward, scheduling, supervision, employee reviews and other business aspects of the medical field† (Ellis-Christensen, n.d.). Moreover, a nurse leader is a self-driven person who not only performs her professional activities up to the level of perfection but also mobilizes and motivates young nurses to be committed with their job responsibilities. Answer: No: 3 In maintaining continuous competency within the nursing profession, a nurse leader works with full commitment to wards the goals. If a nurse leader shows some kind of negligence towards the job responsibilities, it affects the whole career of that nurse. Therefore, it is very important for a nurse leader to show dedication and commitment towards her job in order to achieve excellence and experience. It is the role of a nurse leader to motivate other nurses to carry out their job responsibilities with complete faith and devotion because nursing profession is a social service related to health, which can not bear any kind of negligence towards any of the responsibilities. Answer: No: 4 A nurse leader’s leadership role within the nursing profession is multidimensional. A nurse leader protects the rights of other members related to the profession and injects a sense of self-respect in the members. A nurse leader guides other nurses towards the path of ethics and principles. A nurse leader never lets other members feel down due to any problem related to the profession, rather mobilizes all m embers to raise their voice against the policies, which affect their rights. Answer: No: 5 A nurse leader plays a considerable role as a professional role model for young nurses. Punctuality, good manners, and job commitment are some of the factors, which make a nurse a real role model for the young nurses. If a nurse leader does not come to the hospital on time or if she communicates rudely with patients and other nurses, she cannot become a good role model for other nurses because of the bad image, which she reflects to the young nurses. Therefore, it is extremely important for a nurse leader to have good manners in order to become a professional role model. Answer: No: 6 I will make every effort to become a professional role model for other nurses. I will promote and support nursing as one of the best professions of the world. As a professional nurse, I will give priority to my job responsibilities over my personal matters. I will not show any kind of negligence towards my job re sponsibilities and will show complete commitment and dedication towards my profession. Moreover, I will try to exhibit a dynamic personality in order to become a perfect role model for my subordinates. Part: 2 Answer: No: 1 A nurse leader plays the role of a researcher by identifying various researchable issues and taking steps to resolve those issues. A nurse leader takes part in different scientific investigations. A nurse leader is always aware of all research issues and plays a

Status and the norms and values of Hipsters Research Paper

Status and the norms and values of Hipsters - Research Paper Example Research questions i) Is subculture still relevant in the society of today? ii) How does subculture existence in the society help in society building? iii) Is the subculture today the same as it was in the yester years? iv) Do people still identify with the subcultures? v) Why would the society still need subcultures? Research hypothesis HO: Subculture is still very relevant to the society of today and its role cannot be overlooked. HA: Subculture is not relevant to the society today and its role can be overlooked Literature review In each and every society there exists a subculture to which different people belong to. A subculture can be categorized as a group of individuals that share similar unique behavior and beliefs which make them unique. This groups allow for people to congregate and share very many things under the guidance of set principles and norms. Their beliefs and behaviours are guided by a certain code to which they tow and adhere to. Share of so much in common within a subculture only serves to foster peace and unity as well as love and understanding within the subculture members. Subcultures also give people a sense of identity and belonging as individuals from a certain subculture can identify themselves with subculture to which they belong. ... Although crucial to the existence of the people, it cannot be ignored that the existence of subcultures also comes along with its challenges which range from tribalism, ethnocentrism, stereotyping, narrow mindedness, hatred and a wide range of many other negative prejudice. Therefore in identifying with this groups and choosing what subculture to belong to or identify with, careful consideration needs to be taken so that the need to identify with a group does not bring about unfair judgement and discrimination amongst people that have existed so peacefully before. An individual can belong to several subcultures and it can allow them to identify with these cultures but it should also serve as an opportunity to foster messages of peace and unity amongst a given set of friends, community, society, nation, continent and even the entire world at large. I am a member of XXXX course at YYYY School. We are a total of 200 students currently attending this program which constitutes a subcultur e. This is because we share the same goal and adhere to several common rules which are supposed to guide our behaviours in pursuit of the same goal, which is to be excellent professionals in the field we have chosen to undertake. The set standards aply to all over us like for instance the course is supposed to take a 4 year period during which we are expected to have class sessions that is supposed to strictly be attended to. During the period we are also anticipated to be taking regularly at certain fixed intervals as well as assignment and term papers with an aim of assessing our understanding and progress during the entire period of the program undertaken. The program also has helped us the students of

Wednesday, July 24, 2019

Globalisation and Economic Sociology Term Paper

Globalisation and Economic Sociology - Term Paper Example   Different nations of people live in one city, like Lenovo representing unity in diversity with so many cultures and traditional values. Different languages are spoken.   Municipalities also register an inevitable growth and they have to provide transportable roads lighting the roads, similarly and should be committed to providing amenities of international standard to being globalization.   The technology is no more permitted, limited to a particular part of the world.   It is exchanged in order to serve the public with the latest technology. The globe is no bigger. Globalization and economic sociology represent a single economy. Single technology, efficiency, and quality of the products should be of high standard. Because of globalization and sociology, there is conspicuous change with the social life industries. One shall meat and come across different rest of different nationals represent at one place.   Different sets of different nationals represent diversified cultures, different languages are spoken at one and the same place, and at one and the same time.   They come to know each other from a closer proximity. The intimacies develop; relationships pave way for greater understanding.   The social pavilion of life is set to rolling.   Broader outlook develops into the more knowledgeable and understanding environment.   There will be a great impact on the urban sociology patterns of life. The world becomes a small place respectively inevitable economic growth, a pleasant knowledge-based environment.   The world is no bigger, thou ghts of seeing the world; the globe on a huge unknown has become so small so much can be felt immensely. The development may fold big colonies.   A lot of departmental stores will enter into the market to cater to the needs of the conglomeration.   The branded cloth stores, all varieties clothes grocers, food needs and other essentialities shall be ushering with magnificence providing job opportunities for skilled and unskilled.   The development shall develop many folds.  

Tuesday, July 23, 2019

The benefits and harmful of plastic Essay Example | Topics and Well Written Essays - 1000 words

The benefits and harmful of plastic - Essay Example One of the most effective features of plastic bag is its light weight. It hardly feels on the hands when carried. They in return enable carrying large amount of weight within them. They can also be adjusted and folded into different layers making them adjustable and fixable in the small and compact spaces. The light weight makes the best choice for the domestic appliances and equipments. The lawn chairs is one of the examples in this regard which often find large amount of usage. The usage of plastic is not just limited to the shopping purposes. Plastic is largely used in the different polythene and other related items. For example the recent times have seen the usage of plastic in the manufacturing industry. The aero planes in the recent times have also seen the large amount of usage of plastic. This has been done in contrast of the heavy metal usage. The reason for using plastic is its light weight and enabling the support for high travelling at a lighter weight. Airbus one of the world’s leading planes network has considerable amount of plastic used in it for the purpose of making it more supportive towards flying the heavy and large sized aero planes flying around the world (Rosato, 2004, p. 578). It is being reported that the weight of plastic on average is multiple times smaller and lighter than the ordinary devices and materials that are otherwise used in the different products and manufacturing items. One of the renewable energy sources that are finding large application and attraction in the modern times is directly and largely dependent upon the usage of plastic. It is the solar energy systems and solar panels. The bulk of it is the plastic material used which is not only cheap in price, but light in weight and rightly suited to the usage for solar panels and other material used in the solar energy. Plastic’s another feature is its resistance to the heat and electricity. It is

Monday, July 22, 2019

My View on Evolution Essay Example for Free

My View on Evolution Essay The creation versus evolution debate is a recurring cultural, political, and theological dispute. As a result, Americans have spent a great deal of time in debate about the origins of the Earth, humanity, life, and the universe. Personally, I believe the world is billions of years old, and that all life on earth evolved. I will attempt to provide concrete facts, logical arguments, and solid evidence supporting my view on evolution. With that said, I will also share my personal intuitions and feelings that have led me to believe in evolution. Lastly, I will make a closing argument as to why you should support evolution as well based on the information presented in my paper. Logically, evolution makes sense to me for many reasons. On the other hand, creationists generally use the Bible as their main doctrine in backing up their argument for creation. However, I believe the Bible, alone, is not enough. With any legitimate argument, multiple sources of evidence are always needed. While I could list a dozen things that serve as real-life evidence that evolution is true, I will narrow them down to just two. The first piece of evidence that supports the idea of evolution is genetics. The DNA in our cells reflects each individual’s unique identity and how closely related we are to one another. The same can be said for relationships among organisms. DNA is the molecule that makes up an organism’s genome in the nucleus of every cell. It consists of genes, which are the molecular codes for proteins and the building blocks of our tissues and their functions. Furthermore, DNA shapes how an organism grows up and the physiology of its blood, bone, and brains (Lunine, 163). Thus, DNA is especially important to the study of evolution. Again, DNA tells us how closely or distantly related we are. With that in mind, think about this. The genetic difference between individual humans is minuscule, at about 0.1%, on average. Compared to human studies, a chimpanzee’s genome indicates a difference of only about 1.2%. The bonobo, which is the close cousin of chimpanzees, and gorillas, another of the African apes, is about 1.6%. Subsequently, it can be concluded that humans are not only related to the great apes, but that we are apes. No matter what the numbers are, the big point still holds. Humans, chimpanzees, and bonobos are more closely related to one another than any other primates. Throughout history, evolutionists have argued that the DNA of humans and apes show that our species and chimpanzees diverged from a common ancestor. Interestingly enough, apes were found to be existent about 17 million years before humans were even around (Moreland, 231). Therefore, the last common ancestors to fit this profile were monkeys and apes. Some evolutionists would see this information as clear evidence of a human evolutionary tree which is strongly rooted within the great apes. The second piece of evidence comes from fossils. If you look at the fossil record, you find a succession of organisms that suggest a history of incremental development from one species to another. You see very simple organisms at first and then new, more complex organisms appearing over time. Moreover, the characteristics of newer organisms frequently appear to be modified forms of characteristics of older organisms (Rieppel, 172). The succession of life forms, from simpler to more complex ones, also shows a relationship between new life forms and those that preceded them. Many evolutionists have made strong speculations of these findings, concluding that this is definitely evidence of evolution. In addition, fossil evidence is even more unique to the argument for evolution because it doesn’t stand alone. In fact, evolution becomes even more compelling when combined with other forms of evidence. For instance, the fossil record is consistent in terms of biogeography. This is paramount, because you would expect that the fossil record would be in harmony with current biogeography and ancient geography, if evolution is true. This also holds truth when examining the anatomy and biochemistry of living species. It appeared that the general order of development for the major types of vertebrate animals was: fish, amphibians, reptiles, and then mammals. If current species developed as a result of common descent, then the fossil record would show the same order of development. Sure enough, the fossil record does show the same order of development. Consequently, fossils and its converging evidence make fossils even more plausible in arguing evolution from common descent (Rieppel, 209). Lastly, I will share my personal feelings towards evolution. Personally, I feel many Christians disagree with the evolution theory, largely because they believe it contradicts the Bible. Yet, many Christians disagree with each other about the basic principles of Christianity. In my opinion, if a Christian doesn’t believe something to be true, they immediately find a way to say how that argument â€Å"contradicts the Bible†. However, the Bible is not always specific, nor is it clear in revealing the truth. In many cases, it almost appears to be written for our own interpretation, which brings me to my point. How can evolution be wrong if everything is based on interpretation? Essentially, I believe in evolution because my interpretation of life and literature, as well as my personal intuition, has led me to believe this. At the same time, my interpretation of the Bible and the book of Genesis is that it’s nothing more than poetry. Christians might see genetics, DNA, and fossils as evidence for creation. My interpretation has caused me to see these things as evidence for evolution. My point is this: everyone’s view is different, because everyone’s interpretation is different. When it comes to this debate, neither creationism nor evolution is a winner. There are many arguments to be made such as: Biblical truth, fossils, molecular biology, DNA, etc. All in all, there is no scientific evidence to prove either one. Evolutionism is based solely on scientific reasoning. Based on science, evolution has yet to be proven right or wrong. Creationism is based on religion and faith. Based on the Bible, creationism cannot be proven true or false either. The best way solve this, in my opinion, is to go with what you feel. With that being said, many people, including myself, feel that evolution is true. Works Cited Books * Lunine, Jonathan Irving, and Cynthia J. Lunine. Earth, Evolution of a Habitable World. 1st ed. Cambridge: Cambridge Univ. Pr, 1999. Print. * Rieppel, Olivier. Evolutionary Theory and the Creation Controversy. Chicago: Springer, 2010. eBook * Moreland, J.P., and John Mark Reynolds. Three Views on Creation and Evolution. Grand Rapids, Mich.: Zondervan, 1999. Print. Articles * Ellen, Roy. Dangerous Fictions and Degrees of Plausibility: Creationism, Evolution, and Anthropology. Anthropology Today. 18. (2002): 3-8. Web Resources * Creation versus Evolution. Clarifying Christianity. N.P., 2001. Web. http://www.clarifyingchristianity.com/creation.shtml.

Sunday, July 21, 2019

Analysis On The Movie Inception Film Studies Essay

Analysis On The Movie Inception Film Studies Essay The film Inception (2010) captured the imagination of many spectators as one of the best science fiction and fantasy movies to be produced that year. It was produced and directed by Christopher Nolan who also wrote the script of the movie. The development of this script and the story line were Nolans original ideas back in 2001, nine year before the movie was released when he wrote an eighty-page script on dream stealing. This work was inspired by the concept of dream incubation and lucid dreaming which bore this mystery envisioning a world where technology has been developed to allow entrance into the human mind by means of dream invasion. Inception is based on the basic inspiration that a single idea in an individuals mind can be either the most valuable asset or the most dangerous weapon (George, 2009). The film stars Leonardo DiCaprio as Dom Cobb, who in the movie steals information from the minds of his victims during dreams. The last job which Cobs is given, and which is the ce nter of the movie involves performance of an inception so that Cobbs could regain his previous life and be able to visit his children. The movie in general received outstanding applause as an innovative and smart story and many critics gave it positive reviews. Rotten tomatoes for instance gave this movie an average score of 8/10 based on over two hundred and fifty reviews and reported that up to 87% of critics gave this movie a positive preview. Specifically praised in this movie is the producer/ director/writer, Mr. Nolan who received many positive notices and compliments even from the best critics. For instance, a notable critic, Peter Travers from the Rolling Stone magazine complimented this movie and Mr. Nolan stating that it was like an ingenious chess game. Justing Chang who said that the writer applied the best skill to vividly depict the procedural detail of sub-consciousness, quite a surrealists thriller which gave all the viewers a big challenge to explore the intricate and deep working of the mind, has praised the writers skill. The genre of this movie is widely interpreted. Some view it as mystery and suspense, while other individuals categorize it as Drama, action, or adventure. Just like any other movie, the issue of genre has been subject to diverse interpretation and thus becoming an element of widespread controversy. The movie Inception correctly falls in the history of science fiction. The first element supporting this fact is that it whole idea of the movie deals with imagined technological or scientific innovations. This also do not happen in the worlds contemporary setting, but a futuristic setting where given the current technological development, such innovations might be possible but the world is not there indeed (George, 2009). The idea of stealing ideas has not yet been realized, but there are current studies in neuroscience that are not trying to find out this, but working to understand the complexities and working of the human brain and may be in future, science research would bear such frui ts. Leonardo DiCaprio as Cobb is the extractor in this case. He is well known and corporate uses him to infiltrate other peoples minds and extract the information they need. More evidence of science fiction is illustrated at the hotel room in dream world where loss of gravity is experienced. The elevator cannot even move and Arthur needs to use an explosion to push it. This is not scientifically possible but it happens in this movies. Among other incidences, the film fits clearly in the historical context of science fiction. Atmans A Semantic/Syntactic Approach to Film Genre, (1984) explores in depth some of the ways used to differential movies into certain genres. He clearly and explicitly explains both the semantic and syntactic approaches to film genres giving us the proper understanding on how to analyze movies and give them appropriate genres. Looking at the work of Altman (1984), this renowned writer observed the same controversy criticism and recognized this approach to genre criticism at semantic approach. In semantic approach, the genre of a certain film is allocated based on some superficial aspects which are thought to fit to that genre. According to this approach, a film is examined based on the plot, characters, and types of some aesthetics among other superficial elements of the movie. Notably about this approach, it falls short of analysis and criticism. This approach fails to look into the details of the movie and less emphasis is laid on the timelines, production and assessment of scenes. The syntactic approach is quite different from semantic approach according to Altman, (1984). This approach takes into account finer details of the movie like the relationships between some semantic elements of that particular genre or between aspects of the society at large and those elements. It appreciates how isolated elements combine in any given movie to come up with the true meaning of such movie (George, 2009). This approach seeks not only to understand why some aspects of any given film are so, but also examines the effects of such aspects on the audience, the information which it deems valuable. This type of film examination brings a deeper look into incidences which might look insignificant in one film but holds a lot of water if compared or connected with similar incidences of other films. Altman goes further to bring up two more different approaches to genre criticism; ideological and ritual. The ritual approach in this sense occurs when moviemakers bent from societal pressures to produce films depicting the contemporary society such as Hollywood. He notes that this type of approach expresses audience desires in broader sense and it has its focus on the consumption side. With the ideological approach, the genre any movie falls into is based on simple, but generalized approaches to identifiable structures (Grant, 2003). Looking at Inception on the light of the Altmans approaches to genre criticism, it can be universally agreed that the same phenomenon is evident. This film clearly supports the arguments made by Altman. The film has been interpreted differently by different authors/different authorities and that is why we have the varying classification in terms of genre. Altman argues that genre is given based on uses and users instead of a fixed point of reference (Grant, 2003). The movie genre is diverse and serves diverse group of individuals. When summing up his arguments, Altman notes that it is not possible to adopt certain terminology that is neutral under any challenge. The terms that are in use are usually based on and derived from different ways for different viewers. It is possible that a certain approach to genre allocation is invalidated by fans regardless of the fact that the studio and nay be the producers validate it. Movies genre is therefore a site of either corporation or struggle among different groups of users or multiple users and such an understanding would help appreciate genre and break away from the tyranny of genre criticism. Altmans arguments are well supported by the film Inception. Different authorities and audiences describe this movie differently. As noted earlier, this movies genre has been describe as fantasy (like in Rotten Tomatoes website), adventure and action, drama, science fiction, suspense and mystery. A casual audience would dismiss this movie as action or drama given the type of violence and gunfights it portrays. If an individual did not pay attention to the overall storyline and did not glimpse the interchanges between real world in the movie, the dreams and dreams within the dreams, it would be obvious that the individual would easily appreciate the action scenes and therefore label the movie action. If some viewers of this movie paid attention to this movies visual effects and the music used in the movie, then it would be easy for such an individual to label it suspense and mystery (Altman, 1984). The visual effects are well set and integrated with the music well to bring out a thrill ing effect of a suspense movie. A careful observer or a person really interested in the movie would note the scientific details about the human mind, dreams and the fiction part on how the ideas are being stolen through the dream. Those who do not understand or appreciate science would label this movie fantasy coming into agreement with Altmans argument that genre just depends on uses, users or groups of users (Altman, 1984). Altman has shade much light on the understanding genre of movies, not only Science Fiction, but all movies at large. Someone may be confused if a movie they clearly know as action movie is referred to as science fiction but if it is an exaggeration of scientific facts, not yet supported by evidence and most likely happens in a futuristic world, such a movie may fall in the science fiction genre. Such discrepancies are well tacked by the author who shades much light on the diversity of the audience, uses of the film and the discursivity associated with any account of genre.

Fibre optics

Fibre optics ACKNOWLEDGEMENT: History of all great works in to witness that no great work was ever done without either active or passive support of a person surrounding and ones close quarters. Thus is it not hard to conclude how active assistance from senior could positively impact the execution of a project .I am highly thankful to our learned faculty for her active guidance throughout the completion of project. Last but not least, I would also want to extend my appreciation to those who could not be mentioned here but have well played their role to inspire me behind the certain. History:- Daniel Colladon first described this light fountain or light pipe in an 1842 article entitled On the reflections of a ray of light inside a parabolic liquid stream. This particular illustration comes from a later article by Colladon, in 1884. The principle that makes fiber optics possible, was first demonstrated by Daniel Colladon and Jacques Babinet in Paris in the early 1840s. John Tyndall wrote about the property of total internal reflection in an introductory book about the nature of light in 1870: When the light passes from air into water, the refracted ray is bent towards the perpendicular When the ray passes from water to air it is bent from the perpendicular If the angle which the ray in water encloses with the perpendicular to the surface be greater than 48 degrees, the ray will not quit the water at all: it will be totally reflected at the surface. The angle which marks the limit where total reflection begins is called the limiting angle of the medium. For water this angle is 48Â °27, for flint glass it is 38Â °41, while for diamond it is 23Â °42. The groundbreaking event happened in around 1965, Charles K. Kao and George A. Hockham of the British company Standard Telephones and Cables (STC) were the first to promote the idea that the attenuation in optical fibers could be reduced below 20 decibels per kilometer (dB/km), allowing fibers to be a practical medium for communication. They proposed that the attenuation in fibers available at the time was caused by impurities, which could be removed, rather than fundamental physical effects such as scattering. They correctly and systematically theorized the light-loss properties for optical fiber, and pointed out the right material to manufacture such fibers silica glass with high purity. This discovery led to Kao being awarded the Nobel Prize in Physics in 2009. NASA used fiber optics in the television cameras that were sent to the moon. At the time its use in the cameras was classified confidential and only those with the right security clearance or those accompanied by someone with the right security clearence were permitted to handle the cameras. In 1991, the emerging field of photonic crystals led to the development of photonic-crystal fiber which guides light by means of diffraction from a periodic structure, rather than total internal reflection. The first photonic crystal fibers became commercially available in 2000. Photonic crystal fibers can be designed to carry higher power than conventional fiber, and their wavelength dependent properties can be manipulated to improve their performance in certain applications. PROCESS OF MANUFACTURING OF FIBRE OPTICS:- Illustration of the modified chemical vapor deposition (inside) process Standard optical fibers are made by first constructing a large-diameter preform, with a carefully controlled refractive index profile, and then pulling the preform to form the long, thin optical fiber. The preform is commonly made by three chemical vapor deposition methods: inside vapor deposition, outside vapor deposition, and vapor axial deposition. With inside vapor deposition, the preform starts as a hollow glass tube approximately 40centimeters (16in) long, which is placed horizontally and rotated slowly on a lathe. Gases such as silicon tetrachloride (SiCl4) or germanium tetrachloride (GeCl4) are injected with oxygen in the end of the tube. The gases are then heated by means of an external hydrogen burner, bringing the temperature of the gas up to 1900K (1600Â °C, 3000Â °F), where the tetrachlorides react with oxygen to produce silica or germania (germanium dioxide) particles. When the reaction conditions are chosen to allow this reaction to occur in the gas phase throughout the tube volume, in contrast to earlier techniques where the reaction occurred only on the glass surface, this technique is called modified chemical vapor deposition. The oxide particles then agglomerate to form large particle chains, which subsequently deposit on the walls of the tube as soot. The deposition is due to the large difference in temperature between the gas core and the wall causing the gas to push the particles outwards (this is known as thermophoresis). The torch is then traversed up and down the length of the tube to deposit the material evenly. After the torch has reached the end of the tube, it is then brought back to the beginning of the tube and the deposited particles are then melted to form a solid layer. This process is repeated until a sufficient amount of material has been deposited. For each layer the composition can be modified by varying the gas composition, resulting in precise control of the finished fibers optical properties. In outside vapor deposition or vapor axial deposition, the glass is formed by flame hydrolysis, a reaction in which silicon tetrachloride and germanium tetrachloride are oxidized by reaction with water (H2O) in an oxyhydrogen flame. In outside vapor deposition the glass is deposited onto a solid rod, which is removed before further processing. In vapor axial deposition, a short seed rod is used, and a porous preform, whose length is not limited by the size of the source rod, is built up on its end. The porous preform is consolidated into a transparent, solid preform by heating to about 1800K (1500Â °C, 2800Â °F). The preform, however constructed, is then placed in a device known as a drawing tower, where the preform tip is heated and the optic fiber is pulled out as a string. By measuring the resultant fiber width, the tension on the fiber can be controlled to maintain the fiber thickness. Principle of operation:- An optical fiber is a cylindrical dielectric waveguide (nonconducting waveguide) that transmits light along its axis, by the process of total internal reflection. The fiber consists of a core surrounded by a cladding layer, both of which are made of dielectric materials. To confine the optical signal in the core, the refractive index of the core must be greater than that of the cladding. The boundary between the core and cladding may either be abrupt, in step-index fiber, or gradual, in graded-index fiber. Index of refraction: The index of refraction is a way of measuring the speed of light in a material. Light travels fastest in a vacuum, such as outer space. The actual speed of light in a vacuum is about 300,000 kilometres (186 thousand miles) per second. Index of refraction is calculated by dividing the speed of light in a vacuum by the speed of light in some other medium. The index of refraction of a vacuum is therefore 1, by definition. The typical value for the cladding of an optical fiber is 1.46. The core value is typically 1.48. The larger the index of refraction, the slower light travels in that medium. From this information, a good rule of thumb is that signal using optical fiber for communication will travel at around 200 million meters per second. Or to put it another way, to travel 1000 kilometers in fiber, the signal will take 5 milliseconds to propagate. Thus a phone call carried by fiber between Sydney and New York, a 12000 kilometer distance, means that there is an absolute minimum delay of 60 milliseconds (or around 1/16th of a second) between when one caller speaks to when the other hears. (Of course the fiber in this case will probably travel a longer route, and there will be additional delays due to communication equipment switching and the process of encoding and decoding the voice onto the fiber). Total internal reflection: When light traveling in a dense medium hits a boundary at a steep angle (larger than the critical angle for the boundary), the light will be completely reflected. This effect is used in optical fibers to confine light in the core. Light travels along the fiber bouncing back and forth off of the boundary. Because the light must strike the boundary with an angle greater than the critical angle, only light that enters the fiber within a certain range of angles can travel down the fiber without leaking out. This range of angles is called the acceptance cone of the fiber. The size of this acceptance cone is a function of the refractive index difference between the fibers core and cladding. In simpler terms, there is a maximum angle from the fiber axis at which light may enter the fiber so that it will propagate, or travel, in the core of the fiber. The sine of this maximum angle is the numerical aperture (NA) of the fiber. Fiber with a larger NA requires less precision to splice and work with than fiber with a smaller NA. Single-mode fiber has a small NA. TYPES OF FIBRE OPTICS:- Multi-mode fiber:- Fibers which support many propagation paths or transverse modes are called multi-mode fibers (MMF). Multi-mode fibers generally have a larger core diameter, and are used for short-distance communication links and for applications where high power must be transmitted. Fiber with large core diameter may be analyzed by geometrical optics. Such fiber is called multi-mode fiber. from the electromagnetic analysis . In a step-index multi-mode fiber, rays of light are guided along the fiber core by total internal reflection. Rays that meet the core-cladding boundary at a high angle , greater than the critical angle for this boundary, are completely reflected. The critical angle (minimum angle for total internal reflection) is determined by the difference in index of refraction between the core and cladding materials. Rays that meet the boundary at a low angle are refracted from the core into the cladding, and do not convey light and hence information along the fiber. The critical angle determines the acceptance angle of the fiber, often reported as a numerical aperture. A high numerical aperture allows light to propagate down the fiber in rays both close to the axis and at various angles, allowing efficient coupling of light into the fiber. However, this high numerical aperture increases the amount of dispersion as rays at different angles have different path lengths and therefore take different times to traverse the fiber. Single-mode fiber:- Those which can only support a single mode are called single-mode fibers (SMF). Single-mode fibers are used for most communication links longer than 550meters (1,800ft). The structure of a typical single-mode fiber. Core: 8Â µm diameter Cladding: 125Â µm dia. Buffer: 250Â µm dia. Jacket: 400Â µm dia. Fiber with a core diameter less than about ten times the wavelength of the propagating light cannot be modeled using geometric optics. Instead, it must be analyzed as an electromagnetic structure, by solution of Maxwells equations as reduced to the electromagnetic wave equation. The electromagnetic analysis may also be required to understand behaviors such as speckle that occur when coherent light propagates in multi-mode fiber. As an optical waveguide, the fiber supports one or more confined transverse modes by which light can propagate along the fiber. Fiber supporting only one mode is called single-mode or mono-mode fiber. The most common type of single-mode fiber has a core diameter of 8-10 micrometers and is designed for use in the near infrared. The mode structure depends on the wavelength of the light used, so that this fiber actually supports a small number of additional modes at visible wavelengths. Multi-mode fiber, by comparison, is manufactured with core diameters as small as 50 micrometers and as large as hundreds of micrometers. The normalized frequency V for this fiber should be less than the first zero of the Bessel function J0 (approximately 2.405). Special-purpose fiber: Some special-purpose optical fiber is constructed with a non-cylindrical core and/or cladding layer, usually with an elliptical or rectangular cross-section. These include polarization-maintaining fiber and fiber designed to suppress whispering gallery mode propagation. Photonic-crystal fiber is made with a regular pattern of index variation (often in the form of cylindrical holes that run along the length of the fiber). Such fiber uses diffraction effects instead of or in addition to total internal reflection, to confine light to the fibers core. The properties of the fiber can be tailored to a wide variety of applications. APPLICATIONS OF FIBRE OPTICS:- Optical fiber communication: Optical fiber can be used as a medium for telecommunication and networking because it is flexible and can be bundled as cables. It is especially advantageous for long-distance communications, because light propagates through the fiber with little attenuation compared to electrical cables. This allows long distances to be spanned with few repeaters. Additionally, the per-channel light signals propagating in the fiber have been modulated at rates as high as 111 gigabits per second by NTT, although 10 or 40Gb/s is typical in deployed systems. Each fiber can carry many independent channels, each using a different wavelength of light (wavelength-division multiplexing (WDM)). The net data rate (data rate without overhead bytes) per fiber is the per-channel data rate reduced by the FEC overhead, multiplied by the number of channels. For short distance applications, such as creating a network within an office building, fiber-optic cabling can be used to save space in cable ducts. This is because a single fiber can often carry much more data than many electrical cables, such as 4 pair Cat-5 Ethernet cabling. Fiber is also immune to electrical interference; there is no cross-talk between signals in different cables and no pickup of environmental noise. Non-armored fiber cables do not conduct electricity, which makes fiber a good solution for protecting communications equipment located in high voltage environments such as power generation facilities, or metal communication structures prone to lightning strikes. They can also be used in environments where explosive fumes are present, without danger of ignition. Wiretapping is more difficult compared to electrical connections, and there are concentric dual core fibers that are said to be tap-proof. Fiber optic sensors :- Fibers have many uses in remote sensing. In some applications, the sensor is itself an optical fiber. In other cases, fiber is used to connect a non-fiberoptic sensor to a measurement system. Depending on the application, fiber may be used because of its small size, or the fact that no electrical power is needed at the remote location, or because many sensors can be multiplexed along the length of a fiber by using different wavelengths of light for each sensor, or by sensing the time delay as light passes along the fiber through each sensor. Time delay can be determined using a device such as an optical time-domain reflectometer. Optical fibers can be used as sensors to measure strain, temperature, pressure and other quantities by modifying a fiber so that the quantity to be measured modulates the intensity, phase, polarization, wavelength or transit time of light in the fiber. Sensors that vary the intensity of light are the simplest, since only a simple source and detector are required. A particularly useful feature of such fiber optic sensors is that they can, if required, provide distributed sensing over distances of up to one meter. Extrinsic fiber optic sensors use an optical fiber cable, normally a multi-mode one, to transmit modulated light from either a non-fiber optical sensor, or an electronic sensor connected to an optical transmitter. A major benefit of extrinsic sensors is their ability to reach places which are otherwise inaccessible. An example is the measurement of temperature inside aircraft jet engines by using a fiber to transmit radiation into a radiation pyrometer located outside the engine. Extrinsic sensors can also be used in the same way to measure the internal temperature of electrical transformers, where the extreme electromagnetic fields present make other measurement techniques impossible. Extrinsic sensors are used to measure vibration, rotation, displacement, velocity, acceleration, torque, and twisting. Other uses of optical fibers:- Light reflected from optical fiber illuminates exhibited model Fibers are widely used in illumination applications. They are used as light guides in medical and other applications where bright light needs to be shone on a target without a clear line-of-sight path. In some buildings, optical fibers are used to route sunlight from the roof to other parts of the building . Optical fiber illumination is also used for decorative applications, including signs, art, and artificial Christmas trees. Swarovski boutiques use optical fibers to illuminate their crystal showcases from many different angles while only employing one light source. Optical fiber is an intrinsic part of the light-transmitting concrete building product, LiTraCon. Optical fiber is also used in imaging optics. A coherent bundle of fibers is used, sometimes along with lenses, for a long, thin imaging device called an endoscope, which is used to view objects through a small hole. Medical endoscopes are used for minimally invasive exploratory or surgical procedures (endoscopy). Industrial endoscopes used for inspecting anything hard to reach, such as jet engine interiors. In spectroscopy, optical fiber bundles are used to transmit light from a spectrometer to a substance which cannot be placed inside the spectrometer itself, in order to analyze its composition. A spectrometer analyzes substances by bouncing light off of and through them. By using fibers, a spectrometer can be used to study objects that are too large to fit inside, or gasses, or reactions which occur in pressure vessels. An optical fiber doped with certain rare earth elements such as erbium can be used as the gain medium of a laser or optical amplifier. Rare-earth doped optical fibers can be used to provide signal amplification by splicing a short section of doped fiber into a regular (undoped) optical fiber line. The doped fiber is optically pumped with a second laser wavelength that is coupled into the line in addition to the signal wave. Both wavelengths of light are transmitted through the doped fiber, which transfers energy from the second pump wavelength to the signal wave. The process that causes the amplification is stimulated emission. Optical fibers doped with a wavelength shifter are used to collect scintillation light in physics experiments Optical fiber can be used to supply a low level of power (around one watt) to electronics situated in a difficult electrical environment. Examples of this are electronics in high-powered antenna elements and measurement devices used in high voltage transmission equipment. USES:- Optical fibers are widely used in fiber-optic communications, which permits transmission over longer distances and at higher bandwidths (data rates) than other forms of communications. Fibers are used instead of metal wires because signals travel along them with less loss, and they are also immune to electromagnetic interference. Fibers are also used for illumination, and are wrapped in bundles so they can be used to carry images, thus allowing viewing in tight spaces. Specially designed fibers are used for a variety of other applications, including sensors and fiber lasers. Light is kept in the core of the optical fiber by total internal reflection. This causes the fiber to act as a waveguide. ADVANTAGES OF FIBRE OPTICS: We knowthe electrical signals travel pretty well in metal cables but nothing compares to light inoptical fibre. If we have to list the most outstanding advantages of using light as a carrier and optical fibres as transmission channels these may be some of them: Great bandwidth available to transmit information. You can easily use many GHz of bandwidth limitations being mostly related to electronics in the transmitters and the receivers. Low attenuation of the light travelling through optical fibres. Light can travel many kilometres in an optical fibre with little attenuation and without using amplifiers/repeaters or having them spaced a lot more than amplifiers in coaxial cables for example. Immunity to interferences. Optical fibres are made of glass not of any metal which makes them immune to any kind of electromagnetic interference. Galvanic isolation. Since they are not metallic they dont establish electrical contactbetween emitter and receiver nor create any capacitance along the length of the cable. REFERENCES:- http://en.wikipedia.org/wiki/Optical_fiber http://www.educypedia.be/electronics/cablingfibers.htm http://www.protelturkey.com/teknik/fo/IntroToFOMeas.pdf

Saturday, July 20, 2019

Culture and Communication Essay -- Literature Analysis, Edward Hall

Culture and Communication Introduction In The Silent Language, Edward Hall’s (1959) seminal examination of non-verbal communication, it is ambiguous asserted that â€Å"culture is communication and communication is culture,† (217). Though this statement is obviously lacks for broad explanatory power, Hall nevertheless aptly articulates the crucial roles that culture plays in communication research. From its role in theories of communication to its treatment as a both the independent and the dependent variable in experimental studies, culture shapes the nature of what communication researchers, and speaks to the very heart of what communication is. This literature review will first briefly mention the historical origins of culture in communication research, and identify what has become the primary area of quantitative communication research into culture: intercultural communication. Next, we will examine the definition of culture that intercultural communication researchers have adopted. Last, we will explo re how this definition is applied through an exploration of the variables, levels of analysis, and other salient dimensions of communication. History & Motivation Even before Hall’s pithy equation of communication with culture, the earliest Communication scholars had identified the importance of culture in matters of communication. As Delia (1985) noted, Chicago sociologists were actively concerned with understanding how the flood of immigrants entering American cities at the turn of the century would integrate within this new society. In these earliest studies, communication was seen as a way to shape a culture that would allow immigrants to feel more American, with a unified culture acting as a mechanism for mitigati... ... individualism-collectivism refers to the degree to which a culture emphasizes the goals of an individual compared to the goals of the collective. (e.g. citations from Gudykunst p 40). Low-high uncertainty avoidance indicates shows the degree to which a culture tends towards consensus, and how much it is tolerant of deviant behavior. Power distance varies according to "the extent to which the less powerful members of institutions and organizations accept that power is distributed unequally," (Hofstede & Bond, 1984, p419). Last, masculinity-femininity refer to the amount that cultural systems "emphasize differentiated sex roles, performance, ambition, and independence," (Gudykunst & Ting-Tully, 1988, p. 48). Unlike work on acculturation, this work is generally cross-sectional, using surveys to determine the dimensions of acculturation at particular points in time.

Friday, July 19, 2019

Chaucers Canterbury Tales - Biblical Allusions in The Shipmans Tale E

The Canterbury Tales, - Biblical Allusions in The Shipman’s Tale There is no doubting Chaucer’s mastery at paroemia; that his adaptations of his many and varied sources transcended their roots is attested by the fact that, unlike many of his contemporaries or authorities, his works have not â€Å"passen as dooth a shadwe upon the wal†[1]. Yet while his skill as a medieval author is undisputed, the extent of his subtlety is not always fully appreciated. In The Canterbury Tales, for instance, while some tales were rapid in drawing academic interest and scholarly interpretations, others were quickly dismissed as ribald tales, as simple fabliaux hardly worthy of more than a cursory examination. The Shipman’s Tale was one of these. That â€Å"[It] may be Chaucer’s earliest fabliau† and â€Å"relatively simple in design and execution†[2] seemed, for a period of time, to be the general consensus on this piece; the primary concern of scholars was in unearthing its sources (which proved to be uncharacteristically problematic), not in analysing its structural complexities or for insights into medieval society and life. Yet recent research[3] has renewed interest in this first tale from The Canterbury Tales’ Fragment VII, and it can now be seen as a fabliaux, yes, but as one that is as rich a tapestry – woven of biblical allusions, literary techniques, intertextuality, and social commentary – as any of the other tales. By pulling out and examining the care and skill with which Chaucer inserted just one of these multiple threads – in this case, the biblical allusions within The Shipman’s Tale – it can be shown that this is as significant a tale as any other. There are a limited number of methods by which Chaucer can integrate a biblical all... ...timis finibus pretium eius.† ; â€Å"Who shall find a valiant woman? far and from the uttermost coasts is the price of her.† (Douay Translation). [13]Theresa Coletti, in â€Å"The Meeting at the Gate: Comic Hagiography and Symbol in The Shipman’s Tale†, associates the meeting of the merchant and his wife at the household gate (after his successful business venture) with the meeting of Joachim and Anne at the Golden Gate of Jerusalem. Assuming that the apocryphal tale was well known, Chaucer’s audience would have recognized the iconographic significance of a meeting by a gate. Gail McMurray Gibson, in â€Å"Resurrection as Dramatic Icon in the Shipman’s Tale† in Signs and Symbols in Chaucer’s Poetry, suggests that the tale alludes to the Resurrection, especially via Christ’s meeting with Mary Magdalene. Unfortunately, I was unable to secure a copy of that work for this essay.

Thursday, July 18, 2019

Who is watching us on the web? :: China Censorship Internet Papers

Who is watching us on the web? I. Background P.R.China is a communist country with rather strict control over its citizens' political activities. The decentralized Internet - which is growing extremely quickly in mainland China - puts a new challenge to our Chinese government, who was used to have fully control over newspapers, television, and any other media. In 2001, approximately 52.38 million Chinese visited world famous searching websites google and AltaVista according to CNN. In Jun 2002, China blocked Google and AltaVista along with other famous Chinese websites hosted in the United States like Wenxuecity, Chinesenewsnet, and Dajiyuan. Chinese officials announced that Google logs all search terms together with the IP number, a time stamp, an unique cookie ID, and browser information. Current U.S. laws require Google to provide the information to the feds. If the information is available to the National Security Agency from Google, especially when the Internet user is a non-U.S. citizen in a country that is of national security interest to the U.S, China has to block the use of U.S. engines to protect their own national security. Was that true? The privacy policies of search engines generally do not cover items such as IP number and storage of search terms. In the case of portals that use Google results, it is important to know the portal do NOT forward the IP number to Google along with the search terms. Interestingly, China unblocked the U.S. searching websites a few months after. Like many people, I may never know the true story behind China's blocking and unblocking U.S. searching websites. However, we can learn the truth from Xiao Qiang, the executive director of New York-based Human Rights in China. He said, "Our Chinese government was deluged with outcries from the nation's 46 million Internet users when access to Google was cut off. Internet users in China are an apolictcal crowd. They tend to be people who are doing well, and they do not usually voice strong views. But this stepped into their digital freedom." Well, what is the workaround then? The quick workaround is that Chinese authorities tweaked the national firewall, making the new Google China different from the site that was turned off. Today, Chinese who use Google to search on terms like "falun gong" or "human rights in China" receive a standard-looking results page.

Importance of Data Security and Data Safety Essay

To prevent companies from using or passing on confidential information to other companies without the permission of the person who the data is about, companies will need to protect the data. With the popularity of the Internet there are opportunities for thieves to steal their personal data. So the government set a law (data protection act) which is used to protect people’s rights concerning how data is used and you also have the right to see such information and have any errors corrected. Also organisation will want to keep data confidential because it will not want its competitors to know how the business is going. List the 8 principles of the Data Protection Act The Data Protection Act says the personal data should: 1. Be adequate, relevant and not excessive. For example college should keep students details and details must be just what is needed and nothing more. 2. Be processed in accordance with the data subject right. For example the person that the data refers to have the right to read the information about him/her and the organisation should provide hem/her with information they need. 3. Be accurate and be kept up to date. There is a duty to keep it up to date, for example to change an address when people move. 4. Not be kept longer than necessary. For example it is alright to keep information for certain length of time but it would be wrong to keep information about past customers longer than a few years at most 5. Be obtained and processed for limited purposes. For example the organization must use the data only in the way it is described and it must not use it for any other purpose. 6. Be secure. This includes keeping the information backed up and away from any unauthorised access. It would be wrong to leave personal data open to be viewed by just anyone. 7. Not be transferred to countries outside Europe without adequate protection. Unless the country that the data is being sent to has a suitable data protection law 8. Be processed fairly and lawfully. For example if you put your money at bank no one can transfer your money without your permission. (a) What is the difference between the Internet, Intranet and Extranet? (P8) Internet: Are public networks that allow the user to use any of its facilities. Intranet and Extranet: is like a private internet. It is like a website that is only accessible to the members of a business or company. The different between Intranets and Extranet is: Intranet: Allow the members of organisation to access the access the system with an organisation. Extranet: Allow the members of organisation to access the system from different location but only by the users who have been given access rights. (b) * What is a browser? Is programme that can read web pages, by downloading HTML code and that allows the browser to interpret the code to the web page. A browser displays web pages, keeps track of where you’ve been, and remembers the places you want to return to, the most used browsers are Internet Explorer and Netscape Navigator. * Describe the role of a browser when using the Internet, Intranet and Extranet Browser allows the people to access information, view images, hear music and watch video, in the term of intranet and extranet the browser allows user to share documents, access databases and allow group work. * Describe the role of email when using internet communications. You can send email to an individual or to a group of people at the same time, you can create mailing list so that you can write a message and send it automatically to number of people. Also you can send files such as pictures, word document and sound as attachments to your message. (a) List major threats to an organisation that could happen while using the Internet. (P9) 1. Hacking (use to steal the personal details and private files of company) 2. The spreading of viruses (use to destroy or damage the important files of company) 3. Internet fraud (taking credit card details from customers) 4. Spay ware (is biggest threat in the computer system which allows someone to log into your computer and use it for their own purpose) 5. Spam ( sending unwanted messages especially commercial advertising) Purpose of assignment In this assignment, I have to do research and get information on the importance of data security and data safety. M research must be from ICT sources and non ICT sources and by using the evidence that I collect I should explain the importance of keeping customer information confidential, the main provision of data protection act, the role of browsers and email in internet communications, the difference between internet, intranet and extranet, the major threats to organization from internet and finally a poster that explains the importance of data safety and data security. The assignment will also gather key skills portfolio evidence. M5 Physical Security: Use of security guards, locks, reinforced doors, windows and walls depending on what is being protected. Use of ICT to enforce security entry on doors, and protected areas of buildings i.e.: swipe cards, fingerprint ID, voice recognition. Firewall: This is a security device, which acts as a single entry/exit point for information and access to a computer system. All traffic must pass through the firewall and therefore a system is secure from external threats. A firewall usually sits between the internal network of an organisation and access by the internet. Virus Protection: It is usual for systems to have some form of anti-virus software installed and running in the background. All files and devices introduced to the system would be scanned, any attempts to alter system files would be blocked, and notification made to the user/system administrator. Preventing the use of floppy disks is a good method of eliminating one source of potential virus problems. Identification of Users: A system of user ID’s and passwords is a simple method of preventing unauthorised personnel accessing the system. These should be managed by the system administrator. With this, only some users will have access to certain programmes and data therefore increasing the level of security on sensitive data. In addition, some users may only be able to read the data and not write the data. Other users may not have the ability to delete or even to access certain files. Encryption software: the data may be encrypted (coded) into a form, which can only then be decoded by the intended user. If the data falls into the wrong hands, it will be meaningless. Backups: To guard against the loss of data, backups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment. Passwords software: Password protection usually involves a person typing in: * A User Name – to identify the person. * A Password – to identify the person. He should be the only one to know what it is. Computer viruses: which are programs that destroy the way computer operates without the knowledge of the user, there are huge numbers of viruses some are extremely malicious with the ability to delete or damage files and programs. Some of the threats that they cause to computer systems include: * Deleting data on the hard disk of the organisation computer system. * Enabling hackers to hijack the organisation system and use it for their own purposes. How do viruses spread: * CDs and floppy disks containing infected documents. * Emails containing infected attachments. Hackers: who gain unauthorised access to computer systems for the purpose of stealing and corrupting data, also gaining access to financial information about the organisation business or their customers for the purposes of fraud. Security measures may include†¦ * Each user should be given a user name and a password. * Computer usage may be logged. * Computers should be disconnected from a network when not in use. * Use a firewall – a computer running software, which detects hackers dialling in to a network. Spam: authorised users downloading a web page or receiving an email with hidden active content that attacks the organisation system or send sensitive information to unauthorised people. Organisation can stop spreading of spam by using spam filtering software Spy ware: is software that is placed on organisation computer when the employee visits certain websites, it is used to secretly gather information about the organisation usage and sends it back to advertiser or other interested company to tracking the organisation system use .it can also slow down or crashes the organisation computer Pop up: Many company advertisers on the Internet by using windows that pop up in the middle of computer screen to display a message. They might also open when you click a link or button on a Web site, and they might open either over or under the window, you wish to view. Some pop-up windows can contain inappropriate content or can be a way for employee of organisation to accidentally download dangerous software (called spyware or adware) onto organisation computer. Infringement of copyright: Internet users are not allowed to copy or print some internet materials such as; video, music, files and photos without the permission of copyright holder and sometimes they may have to pay a licence to do so. Theft and fraud: credits card fraud for example people can steal the details on credits card and using them illegally to buy goods Sole trader: A sole trader is the actual owner of a business, a sole trader also has unlimited liability. All the debts of the business are the debts of the owner. They can not issues shares .The whole meaning behind † Sole† means that she/he does not have partners. (e.g. electrical repair, picture framing, photography, diving instruction, retail shops, and hotels) Partnership A Partnership can be liable for all debts, it is easy to setup, but is also inexpensive to form. Forming partnership requires an agreement that is some times called partnership agreement ‘between two to twenty individuals’ which entitles them to jointly own and carry on a trader business together. A partnership is a contract between two or more persons who agree to pool talent and money and share profit or loss. Private limited company A Private limited company has limited liability (the shareholders cannot loose more than their original shareholdings), and a minimum of two shareholders and a maximum of fifty shareholders. It cannot offer its shares to the public. A private limited company is treated as a legal entity. Public limited company A company which may have an unlimited number of shareholders and offer its shares to the wider public. (e.g. Cadbury and Tesco) Multi-National company A company that does business in more than one country, usually by setting up branch offices. Tesco Characteristics * Type of company: Tesco is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: including food and non-food business, personal finance, internet shopping, electrical items, home entertainment, toys, sports equipment, and many more. * Profit / loss: Tesco’s Profit and Loss 2005 2004 Sales at net selling prices 37,070 33,557 Turnover including share of joint ventures 34,353 31,050 Less: share of joint ventures’ turnover (379) (236) Operating profit/(loss) 1,949 1,735 Share of operating profit/(loss) of joint ventures and associates 130 97 Net profit/(loss) on disposal of fixed assets 53 (9) Profit on ordinary activities before taxation 1,962 1,600 Underlying profit before net profit/(loss) on disposal of fixed assets, integration costs and goodwill amortisation 2,029 1,708 * Size of company: Tesco operates 923 stores and employs 240,000 people , there are 639 branches in Great Britain and 182 in the rest of Europe * Location: they operate in UK, Hungary, Poland, Czech Republic, Slovak Republic, Thailand, South Korea, Taiwan and the Republic of Ireland * Purpose of company: to create value for customers to earn their lifetime loyalty. * Aims: Built good non-food sales expanded into retailing services and exploited e-commerce successfully. * Objective: 1. To deliver a consistently strong customer offer. 2. Making their shopping trip as easy as possible. 3. Constantly seeking to reduce their prices to help customer spend less. * Logo: Cadbury Characteristics * Type of company: is an international retailer and is a publicly owned company (Public Limited Company Plc). * Products: chocolate and drinks brands. * Profit / loss: Cadbury Profit and Loss à ¯Ã‚ ¿Ã‚ ½ (Millions) 2006 à ¯Ã‚ ¿Ã‚ ½ (Millions) 2005 Turnover 6,508.00 6,085.00 Operating Profit / (Loss) 1,003.00 825.00 Net Interest (188.00) (205.00) Pretax Profit 843.00 642.00 Post Tax Profits 703.00 497.00 Total Dividend Paid n/a n/a Retained Profit / (Loss) for the financial year n/a n/a * Size of company: they operate in more than 35 countries and they employs over 55,000 people * Location: Americas, Europe, Middle East and Africa and Asia Pacific. * Purpose of company: the organization work together to create brands people love. * Aims : 1. Deliver shareowner performance. 2. Ensure their capabilities are best in class. 3. Reinforce reputation with employees and society * objective: 1. Responding to consumer needs quickly. 2. Grow shareowner value. 3. Attract and develop the best kind of people.