Saturday, November 30, 2019

Linux Security Technologies free essay sample

In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting. To better understand what improvements Mandatory Access Control (MAC) can provide for security, one needs to know about the standard Linux security provision called Discretionary Access Control (DAC). DAC, though it is still a form of security, only provides minimal protection to a Linux file system. We will write a custom essay sample on Linux Security Technologies or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page With DAC, access to files merely requires needed permissions from the owner of the file to access (commonly referred to as file permissions), often requiring a password to open. A basic weakness of DAC is not being able to fundamentally differentiate between human users and computer programs. And with so many systems often having such large numbers of users, it only takes hackers accessing a single user’s account to have access to any and all of the files they have permissions for. If the compromised user account were to have super-user (root) access, the hacker could then gain access to an entire file system. This became the basis for coming up with a more secure way of protecting wrongful access into standard Linux based systems. SELinux utilizing MAC, on the other hand, was created to address this very weakness that DAC has as the standard Linux security. The way MAC helps improve overall security of SELinux is by providing what is called granular permissions for every subject (user, program, process) and object (file, device). In other words, through MAC, you only grant any subject the specific object or objects required to perform a specific function, and no more. Compared to DAC, security is more compartmentalized and has more layers of protection. Hence, SELinux provides a much more secure environment than the original Linux security features alone can. Another feature providing further security for a network is TCP Wrappers. TCP Wrappers work by controlling access through the utilization of IP addresses. In Linux, this is accomplished through 2 specific files that need to be created. The first file, hosts. deny, is a file listing names of hosts that are to be denied access to the network. The second file, hosts. allow is a file listing the names of hosts that are allowed access to the same network. The absence of theses 2 files, would allow the entire Internet access to network services, severely lowering the security of a host. This lowers a system being compromised through a sort of â€Å"gate guard with an access list† policy. If your name appears on the list, you gain access; if it’s not, you don’t. Creating an artificial root directory is yet another way to provide security for Linux systems, and is commonly referred to as a chroot jail. This prevents accessing or modifying, possibly maliciously, any file outside the directory hierarchy. The command required to create a chroot jail is /usr/sbin/chroot. Note, you must be working as root inside the Linux shell to do this. By creating a chroot jail, it prevents users from navigating up the hierarchy as high as possibly â€Å"/† (root). Even if the user did not have permissions required to edit higher directories, they may still be able to see files they don’t have any reason to have any access to. Chroot can be useful for providing basic preventative security by making it more difficult to exploit information on a server. But, by limiting user access in this way, if a user account were ever hacked, it still provides yet another layer of security by limiting the amount of access each user account has to begin with. It is important to understand that you must run a program in chroot jail as a user other than root (/). This is because root can break out of jail, making the chroot jail not provide the security it is intended to against unwanted access. Setting up iptables is another form of network security in Linux. They allow for setting up a firewall on the network. Iptables allow for network packet filtering rules. The use of iptables function allows rules to be set up that can reject inbound packets opening new connections and accept inbound packets that are responses to locally initiated connections. This basic feature therefore acts as a firewall to the system, preventing unwanted outside attempts to hack into a host network. In conclusion, with the technological direction of our future apparent, security technologies will be a continuing issue that will never stop making further advances. After all, the financial, physical, and ideological future of our country, and people as a whole, cannot afford to do otherwise. As our children, and children’s children, begin to take the reins of this electronically motivated world, computer security technologies will continue to be an important issue as long as we continue as a society. References: * http://www. omnisecu. om/gnu-linux/redhat-certified-engineer-rhce/what-is-security-enhanced-linux-selinux. htm * http://fedoraproject. org/wiki/SELinux_FAQ * http://www. nsa. gov/research/_files/selinux/papers/x/img3. shtml * http://docs. redhat. com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/SELinux_Guide/selg-preface-0011. html * http://docs. fedoraproject. org/en-US/Fedora/13/html/SELinux_FAQ/ * http://www. bu. edu/tech/security/firewalls/host/tcpwrappers_macos x/ * http://www. serverschool. com/dedicated-servers/what-is-a-chroot-jail/ * http://en. wikipedia. org/wiki/Chroot

Tuesday, November 26, 2019

AP English Language and Composition Exam Key Terms

AP English Language and Composition Exam Key Terms On this page, youll find brief definitions of grammatical, literary, and rhetorical terms that have appeared on the multiple-choice and essay portions of the AP* English Language and Composition exam. For examples and more detailed explanations of the terms, follow the links to expanded articles. *AP is a registered trademark of the College Board, which neither sponsors nor endorses this glossary. Ad Hominem:  An argument based on the failings of an adversary rather than on the merits of the case; a logical fallacy that involves a personal attack.Adjective:  The part of speech (or word class) that modifies a noun or a pronoun.Adverb:  The part of speech (or word class) that modifies a verb, adjective, or another adverb.Allegory:  Extending a metaphor so that objects, persons, and actions in a text are equated with meanings that lie outside the text.Alliteration:  The repetition of an initial consonant sound.Allusion:  A brief, usually indirect reference to a person, place, or event- real or fictional.Ambiguity:  The presence of two or more possible meanings in any passage.Analogy:  Reasoning or arguing from parallel cases.Anaphora:  The repetition of the same word or phrase at the beginning of successive clauses or verses.Antecedent:  The noun or noun phrase referred to by a pronoun.Antithesis:  The juxtaposition of contrasting ideas in balanced phrases.A phorism:  (1) A tersely phrased statement of a truth or opinion. (2) A brief statement of a principle. Apostrophe:  A rhetorical term for breaking off discourse to address some absent person or thing.Appeal to Authority:  A fallacy in which a speaker or writer seeks to persuade not by giving evidence but by appealing to the respect people have for a famous person or institution.Appeal to Ignorance:  A fallacy that uses an opponents inability to disprove a conclusion as proof of the conclusions correctness.Argument:  A course of reasoning aimed at demonstrating truth or falsehood.Assonance:  The identity or similarity in sound between internal vowels in neighboring words.Asyndeton:  The omission of conjunctions between words, phrases, or clauses (opposite of polysyndeton).Character:  An individual (usually a person) in a narrative (usually a work of fiction or creative nonfiction).Chiasmus:  A verbal pattern in which the second half of an expression is balanced against the first but with the parts reversed.Circular Argument:  An argument that commits the logical falla cy of assuming what it is attempting to prove. Claim:  An arguable statement, which may be a claim of fact, value, or policy.Clause:  A group of words that contains a subject and a predicate.Climax:  Mounting by degrees through words or sentences of increasing weight and in parallel construction with an emphasis on the high point or culmination of a series of events.Colloquial:  Characteristic of writing that seeks the effect of informal spoken language as distinct from formal or literary English.Comparison:  A rhetorical strategy in which a writer examines similarities and/or differences between two people, places, ideas, or objects.Complement:  A word or word group that completes the predicate in a sentence.Concession:  An argumentative strategy by which a speaker or writer acknowledges the validity of an opponents point.Confirmation:  The main part of a text in which logical arguments in support of a position are elaborated.Conjunction:  The part of speech (or word class) that serves to connect words, phrases , clauses, or sentences.Connotation:  The emotional implications and associations that a word may carry. Coordination:  The grammatical connection of two or more ideas to give them equal emphasis and importance. Contrast with subordination.Deduction:  A method of reasoning in which a conclusion follows necessarily from the stated premises.Denotation:  The direct or dictionary meaning of a word, in contrast to its figurative or associated meanings.Dialect:  A regional or social variety of a language distinguished by pronunciation, grammar, and/or vocabulary.Diction:  (1) The choice and use of words in speech or writing. (2) A way of speaking  usually assessed in terms of prevailing standards of pronunciation and elocution.Didactic:  Intended or inclined to teach or instruct, often excessively.Encomium:  A tribute or eulogy in prose or verse glorifying people, objects, ideas, or events.Epiphora:  The repetition of a word or phrase at the end of several clauses. (Also known as epistrophe.)Epitaph:  (1) A short inscription in prose or verse on a tombstone or monument. (2 ) A statement or speech commemorating someone who has died: a funeral oration. Ethos:  A persuasive appeal based on the projected character of the speaker or narrator.Eulogy:  A formal expression of praise for someone who has recently died.Euphemism:  The substitution of an inoffensive term for one considered offensively explicit.Exposition:  A statement or type of composition intended to give information about (or an explanation of) an issue, subject, method, or idea.Extended Metaphor:  A comparison between two unlike things that continues throughout a series of sentences in a paragraph or lines in a poem.Fallacy:  An error in reasoning that renders an argument invalid.False Dilemma:  A fallacy of oversimplification that offers a limited number of options (usually two) when, in fact, more options are available.Figurative Language:  Language in which figures of speech (such as metaphors, similes, and hyperbole) freely occur.Figures of Speech:  The various uses of language that depart from customary construction, order, or significance.Flashbac k:  A shift in a narrative to an earlier event that interrupts the normal chronological development of a story. Genre:  A category of artistic composition, as in film or literature, marked by a distinctive style, form, or content.Hasty Generalization:  A fallacy in which a conclusion is not logically justified by sufficient or unbiased evidence.Hyperbole:  A figure of speech in which exaggeration is used for emphasis or effect; an extravagant statement.Imagery:  Vivid descriptive language that appeals to one or more of the senses.Induction:  A method of reasoning by which a rhetor collects a number of instances and forms a generalization that is meant to apply to all instances.Invective:  Denunciatory or abusive language;  discourse  that casts blame on somebody or something.Irony:  The use of words to convey the opposite of their literal meaning. A statement or situation where the meaning is directly contradicted by the appearance or presentation of the idea.Isocolon:  A succession of phrases of approximately equal length and corresponding structure.Jargon:  The speciali zed language of a professional, occupational, or other group, often meaningless to outsiders. Litotes:  A figure of speech consisting of an understatement in which an affirmative is expressed by negating its opposite.Loose Sentence:  A sentence structure in which a main clause is followed by subordinate phrases and clauses. Contrast with  periodic  sentence.Metaphor:  A figure of speech in which an implied comparison is made between  two  unlike things that actually have something important in common.Metonymy:  A figure of speech in which one word or phrase is substituted for another with which it is closely associated (such as crown for royalty).Mode of Discourse:  The way in which information is presented in a text. The four traditional modes are narration, description, exposition, and argument.Mood:  (1) The quality of a verb that conveys the writers attitude toward a subject. (2) The emotion evoked by a text.Narrative:  A rhetorical strategy that recounts a sequence of events, usually in chronological order.Noun:  The part of speech (or word class) that is used to name a person, place, thing, quality, or action. Onomatopoeia:  The formation or use of words that imitate the sounds associated with the objects or actions they refer to.Oxymoron:  A figure of speech in which incongruous or contradictory terms appear side by side.Paradox:  A statement that appears to contradict itself.Parallelism:  The similarity of structure in a pair or series of related words, phrases, or clauses.Parody:  A literary or artistic work that imitates the characteristic style of an author or a work for comic effect or ridicule.Pathos:  The means of persuasion that appeals to the audiences emotions.Periodic Sentence:  A long and frequently involved sentence, marked by suspended syntax, in which the sense is not completed until the final wordusually with an emphatic climax.Personification:  A figure of speech in which an inanimate object or abstraction is endowed with human qualities or abilities.Point of View:  The perspective from which a speaker or writer tells a story or presents information.Pred icate:  One of the two main parts of a sentence or clause, modifying the subject and including the verb, objects, or phrases governed by the verb. Pronoun:  A word (a part of speech or word class) that takes the place of a noun.Prose:  Ordinary writing (both fiction and nonfiction) as distinguished from  verse.Refutation:  The part of an argument wherein a speaker or writer anticipates and counters opposing points of view.Repetition:  An instance of using a word, phrase, or clause more than once in a short passagedwelling on a point.Rhetoric:  The study and practice of effective communication.Rhetorical Question:  A question asked merely for effect with no answer expected.Running Style:  Sentence style that appears to follow the mind as it worries a problem through, mimicking the rambling, associative syntax of conversation- the opposite of periodic sentence style.Sarcasm:  A mocking, often ironic or satirical remark.Satire:  A text or performance that uses irony, derision, or wit to expose or attack human vice, foolishness, or stupidity.Simile:  A figure of speech in which two fundamentally unlike things are explicitly compared, usually in a phrase introduced by like or as Style:  Narrowly interpreted as those figures that ornament speech or writing; broadly, as representing a manifestation of the person speaking or writing.Subject:  The part of a sentence or clause that indicates what it is about.Syllogism:  A form of deductive reasoning consisting of a major premise, a minor premise, and a conclusion.Subordination:  Words, phrases, and clauses that make one element of a sentence dependent on (or  subordinate  to) another. Contrast with coordination.Symbol:  A person, place, action, or thing that (by association, resemblance, or convention) represents something other than itself.Synecdoche:  A figure of speech in which a part is used to represent the whole or the whole for a part.Syntax:  (1) The study of the rules that govern the way words combine to form phrases, clauses, and sentences. (2) The arrangement of words in a sentence.Thesis:  The main idea of an essay or report, often written as a single declarative sentence.Tone:   A writers attitude toward the subject and audience. Tone is primarily conveyed through diction,  point  of view, syntax, and level of formality. Transition:  The connection between two parts of a piece of writing, contributing to coherence.Understatement:  A figure of speech in which a writer deliberately makes a situation seem less important or serious than it is.Verb:  The part of speech (or word class) that describes an action or occurrence or indicates a state of being.Voice:  (1) The quality of a verb that indicates whether its subject acts (active voice) or is acted upon (passive voice). (2) The distinctive style or manner of expression of an author or narrator.Zeugma:  The use of a word to modify or govern two or more words, although its use may be grammatically or logically correct with only one.

Friday, November 22, 2019

Everything You Need to Know About Shakespeares Plays

Everything You Need to Know About Shakespeare's Plays William Shakespeare is best known for his plays, although he was also an accomplished poet and actor. But when we think about Shakespeare, plays like Romeo and Juliet, Hamlet, and Much Ado About Nothing immediately spring to mind. How Many Plays? A remarkable fact about Shakespeares plays is that scholars can’t agree on how many he actually wrote. Thirty-eight plays is the most popular hypothesis, but after many years of wrangling, a little-known play called Double Falsehood has now been added to the canon. The main problem is that it is believed that William Shakespeare wrote many of his plays collaboratively. Therefore, it is difficult to identify the content penned by the Bard with any accuracy. What Were Shakespeares Plays About? Shakespeare was writing between 1590 and 1613. Many of his early plays were performed at the building that would eventually become the infamous Globe Theatre in 1598. It was here that Shakespeare made his name as a budding young writer and penned such classics as  Romeo and Juliet, A Midsummer Night’s Dream, and The Taming of the Shrew. Many of Shakespeare’s most famous tragedies were written in the early 1600s and would have been performed at the Globe Theatre. Genres Shakespeare wrote in three genres: tragedy, comedy, and history. Although this seems very straightforward, it is notoriously difficult to categorize the plays. This is because the histories blur comedy and tragedy, the comedies contain elements of tragedy, and so on. Tragedy Some of Shakespeare’s most famous plays are tragedies. The genre was extremely popular with Elizabethan theatergoers. It was conventional for these plays to follow the rise and fall of a powerful nobleman. All of Shakespeare’s tragic protagonists have a fatal flaw that propels them towards their bloody end. Popular tragedies include Hamlet, Romeo and Juliet,  King Lear, and Macbeth. Comedy Shakespeare’s comedy was driven by language and complex plots involving mistaken identity. A good rule of thumb is if a character disguises themselves as a member of the opposite sex, you can categorize the play as a comedy. Popular comedies include Much Ado About Nothing, and The Merchant of Venice. History Shakespeare used his history plays to make social and political commentary. Therefore, they are not historically accurate in the same way we would expect a modern historical drama to be. Shakespeare drew from a range of historical sources and set most of his history plays during the Hundred Years War with France. Popular histories include  Henry V and Richard III. Shakespeare’s Language Shakespeare used a mixture of verse and prose in his plays to denote the social standing of his characters. As a rule of thumb, common characters spoke in prose, while noble characters further up the social food chain would revert to iambic pentameter. This particular form of poetic meter was extremely popular in Shakespeare’s time. Although iambic pentameter sounds complex, it is a simple rhythmic pattern. It has ten syllables in each line that alternate between unstressed and stressed beats. However, Shakespeare liked to experiment with iambic pentameter and played around with the rhythm to make his character’s speeches more effective. Why is Shakespeare’s language so descriptive? We should remember that the plays were performed in daylight, in the open air, and with no set. In the absence of atmospheric theater lighting and realistic sets, Shakespeare had to conjure up mythical islands, the streets of Verona, and cold Scottish castles through language alone.

Wednesday, November 20, 2019

Saatchi Gallery Post Pop Article Example | Topics and Well Written Essays - 500 words

Saatchi Gallery Post Pop - Article Example Pop art is a contemporary art movement that began in Britain and the United States in the 1950s. The movement sought to liven arts by infusing various literary techniques such as imagery in such popular culture as mass media, advertising, and news among many others. Pop art artists often remove materials from their known context, isolating them or combining them with other unrelated materials in an attempt to create an original work (Livingstone, 1990). By doing this, pop art movement encouraged the portrayal of the attitudes of the artists instead of the actual art. Post Pop: East meets the West was not any different. The exhibition comprised of various renowned artists and some of the vintage collections from the early and mid-1950s. Post Pop: East meets the West sought to celebrate the creation of unique arts and the spread of pop art to the four regions. The works on display covered themes including celebrity and mass media, sex and the body, advertising and consumerism and art history. The art movement provided the artists with the freedom to use popular visual imagery and connect with the public by addressing various common materials especially those fronted by the media. The exhibition was a place of glamour and grandeur as the various artists compared their works. Paul McCarthy’s Spaghetti Man was one of the most exciting works at the exhibition. The work was a conglomeration of the various themes as the artists used familiar materials to develop a unique artifact that extends various cultures. The spaghetti man is a statue of a man with a rabbit head.  

Tuesday, November 19, 2019

Mobile communication channel and benefits to consumers in the 21st Dissertation

Mobile communication channel and benefits to consumers in the 21st century - Dissertation Example es and trade press conducted and published (Manninen 2004; Taulavuori 2005; Salmela 2004; Karjaluoto & Leppaniemi 2005; Barnes 2002; Leppaniemi & Karjaluoto 2005; and Salo and Tahtinen 2005). Mobile communication channels is being viewed as the next frontier in achieving customer relation as mobile phone companies seek to market themselves through the mobile devises (Barnes and Scornavacca 2004; Facchetti et al. 2005; Denk & Hackl 2004; Kalakota and Robinson 2002; Varshney 2003; and Wang and Wang 2005). For the mobile phone manufacturers, it is not just a matter of providing a hand held device but ensuring that they provide a device that is able to provide various related benefits such as instant connectivity, increased convenience, and personalization of services. Phone manufacturers have to ensure that their devices are able to meet user's needs, such as provision of a platform that is able to support, m-commerce applications and other applications that is able to provide them with unforgettable experience. Despite the fact that increased studies have shown the benefits of mobile commercial communication, most businesses have not been able to recognise the importance of ensuring that their mobile devises are integrated with mobile communication devices that can help increase their client base and hence increased profitability. This research is intended to provide a platform for mobile phone manufacturer and users especially those that hope to increase their relationship on the business to consumer relation to be able to recognise the mobile devises produced are able to provide increased benefits to consumers and as a result, increase sales of their products and services and hence profitability. 1.1Research Objectives The main objective of the research is to help...Mobile device market is growing at a phenomenon pace. By the year 2008, Apple sold 4 million iPhones a figure, that was translated to almost 20,000 iPhones sold every day. At the same time, it was r eported that by the year ending 2007, the total percentage of web browsing on iPhone was at 0.12% of all browsing in the market. Apple’s iPhone has changed the game for many users browsing the web on a mobile device. Web developers can now create functionally rich and visually appealing applications that run within the iPhone’s version of the Safari Mobile web browser. As shown in the chart below, in the year 2012, according to International Data Corporation (IDC), in their worldwide mobile phone tracker survey, Apple has become the third largest mobile phone manufacturer in the world. This was attributed to the company’s strong launch of the iPhone 4S was listed as the primary reason that the company leapfrogged over competitors LG and ZTE in the fourth quarter of 2011. Nokia still retained its spot as the leader in mobile phone shipments due to its worldwide distribution and manufacturing presence, with Samsung emerging as the number two manufacturer, with its Android smartphone line and new Windows Phone smartphones helping the company sell more than 300 million phones in 2011. Other mobile phones that dominated included Korean LG and Chinese vendor ZTE. More significantly increase in sales was witnessed with most of the consumers, moving from low-cost feature phones to increasingly powerful smartphones that include Android and Windows Ph one-powered smartphones.

Saturday, November 16, 2019

Christian-Only Hiring Policy Essay Example for Free

Christian-Only Hiring Policy Essay Case Study: Matthew is planning to open a manufacturing facility. He is considering a â€Å"Christian-only† hiring policy whereby he would determine to hire only professing, evangelical Christians to work in the facility. He asks you for your advice on the following questions: 1. Would such a policy be legal? If so, under what terms and what might the restrictions be? 2. From a Great Commission perspective, would this policy be advisable? 3. How would your answers change, if at all, if they planned to open a Christian school rather than a manufacturing facility? Matthew is planning to open a manufacturing facility and is considering a â€Å"Christian-only† hiring policy. The only way that this policy would be legal is if the manufacturing facility was considered to be a non-profit organization. A non-profit organization is an organization that uses surplus revenues to achieve its goals rather than distributing them as profit or dividends. The extent to which a non-profit organization can generate surplus revenues may be constrained or use of surplus revenues may be restricted. If this manufacturing facility was deemed to be a non-profit organization, then the organization would be exempt from the Civil Rights Act and would be able to implement their â€Å"Christian-only† hiring policy without facing charges down the road of discrimination. Due to the fact that a manufacturing facility would be unable to be classified as a non-profit organization because their purpose is usually to distribute its products for profit, then my advice would be that this policy would not be advisable for Matthew to use a â€Å"Christian-only† hiring policy. Using this policy would cause people to be discriminated against due to religious preference, and this is clearly illegal in the United States. If Matthew was planning to open a Christian school rather than a manufacturing facility, my answer would still be that it is illegal to discriminate in a for-profit organization. There are times when a faith-based humanitarian organization has prevailed over the lawsuits brought against them for discrimination due to religious preference, however, I do not advise toying with the gray area of the laws. I would advise Matthew that if he intends to open his manufacturing facility, it is not legal and not advisable to implement his â€Å"Christian-only† hiring policy.

Thursday, November 14, 2019

AEI technology :: Essays Papers

AEI technology Who is Amtech? Amtech is a pioneer in electronics transportation systems. The company began in 1983 when the US Department of Agriculture released the patent for an 11-year old radio beam system. The first use of this technology was in the field of livestock monitoring. This later evolved into traffic and inventory management. Today, Amtech focuses its research and technology development on two market segments: Automatic Equipment Identification (AEI) and Intelligent Vehicle Highway Systems (IVHS). AEI uses radio beams to track inventory by scanning an electronic tag that is attached to the car or cargo unit. IVHS was a by-product of AEI, in that it uses tags to automatically deduct toll payment as vehicles pass through a tollbooth. Amtech has established itself as the AEI industry leader by becoming the American Association of Railroad’s mandated standard. On the other hand, the IVHS market is filled with competitors competing for electronic toll contracts throughout the United States. AEI and IVHS are in place in both domestic and foreign markets. In the domestic market, Amtech is partnering with Motorola. It’s pursuing the foreign markets through alliances with Alcatel Amtech in Europe, Mitsubishi in Asia, and Sino-Amtech in China. What’s the Problem? Amtech has almost completed delivery of AEI system tags to the railroad companies, and the market isn’t showing much growth potential. Also, they have been unsuccessful in securing future contracts. Their stock price has witnessed a decrease from $33 to 10 in a span of three months due to the anticipation of decreased cash flow. Pressure has been mounting from the shareholders for management to take action to boost the stock price back to levels of expected growth. Amtech has the unique predicament of being caught in markets that are neither growing nor mature enough to provide a steady or growing revenue stream. Aspects of the problem: Â § Have yet to determine proper allocation of resources for best possible return. Â § Strong competitive forces in the IVHS market. Â § Maturing market for AEI. Â § Reliance on one product for critical revenue stream. Â § Product portfolio not diversified. SWOT Analysis Company Strengths: Â § Opportunity to broaden market in AEI because of their market dominance. Â § Strong brand equity as the leader in transportation electronics. Â § Ability to tap into the IVHS market potential. Â § Foreign market presence through alliances in AEI and IVHS product lines. Â § Established distribution channels in foreign markets. Â § High debt capacity to finance future growth. Â § $50 million in cash and marketable securities.

Monday, November 11, 2019

Psychological Abuse Essay

Psychological abuse refers to â€Å"abuse that damages the psyche, or the mind. Psychological abuse happens when one person attempts to gain power and control over another.† It involves the deliberate infliction of pain or anguish to another person through verbal or nonverbal conduct designed to humiliate or threaten another person (National Committee for the Prevention of Elder Abuse). Psychological abuse if quite prevalent in the United States. Most of its victims are women. Indeed, it is estimated that about 1.5 million women get psychologically abused each year. Psychological abuse often leads to physical abuse, as well as domination of the relationship and isolation from friends and family (PsychAbuse.info, 2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Psychological abuse is dangerous because it poses many risks on the victim, such as acute stress, post traumatic stress disorder, and depression (PsychAbuse.info, 2006). The many documented effects of psychological maltreatment include: Other possible consequences of psychological abuse are emotional instability, low social competency, anxiety, and low academic achievement (Canadian Health Network, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Given the effects and signs of psychological abuse, the common victims are those who have no emotional or social support from family and friends. On the other hand, people who often have contact with vulnerable people are sometimes the ones who perpetrate psychological abuse. This group may include caregivers and even family members of the victim (National Committee for the Prevention of Elder Abuse).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   One important issue on psychological abuse involves neglect, particularly on children. Neglect involves the omission of protection and care needed by a child, which could lead to adverse consequences such as juvenile delinquency, aggressive behavior, and child deaths (Canadian Health Network, 2004). In this connection, the fact that many children become victims of psychological abuse is a very alarming issue, particularly because of the tender age of the victims. Moreover, it is observed that may victims of child psychological abuse are emotionally disturbed, mentally retarded, or physically handicapped, although the onset of these conditions may differ as to time (Wall, 1975).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Another important issue with psychological abuse is the fact that it is believed to be the â€Å"most under-reported form of abuse.† Thus, the prevalence rates reported periodically may not be accurate since they only include those incidences that have been reported (Canadian Health Network, 2004).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Another critical issue on psychological abuse is its pervasiveness in dating relationships. It is estimated that abuse during the courtship ranges from 20 to 50 percent of men and women. There is also another concern about the increased risk of abuse in a dating relationship due to the tendency of couples to prolong the dating relationship before marriage (Burke, Stets &   Pirog-Good, 1988).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   All of these issues are worth exploring. Women and children appear to be at special risk given their vulnerability. Another vulnerable group is the aged, who have no support systems to rely on. References Burke, P. J.,   Stets, J. E. &   Pirog-Good, M. A. (1988). Gender Identity, Self-Esteem,   Ã‚   and Physical and Sexual Abuse in Dating Relationships. Social Psychology   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Quarterly 51(3), 272-285.  Canadian Health Network. (2004). What is psychological maltreatment? Retrieved   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   February 24, 2008, from http://www.canadian-health- network.ca/servlet/ContentServer?cid=1069439898222&pagename=CHN- RCS%2FCHNResource%2FFAQCHNResourceTemplate&c=CHNResource&lan  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   g=En  National Committee for the Prevention of Elder Abuse. Psychological Abuse. Retrieved   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   February 24, 2008, from   Ã‚   http://www.preventelderabuse.org/elderabuse/psychological.html  PsychAbuse.info. (2006). Frequently Asked Questions. Retrieved February 24, 2008,    from http://www.psychabuse.info/Psychological_Abuse_FAQ.htm Wall, C. M. (1975). Child Abuse: A Societal Problem with Educational Implications.   Ã‚  Ã‚  Ã‚  Ã‚   Peabody Journal of Education 52(3), 222-225.

Saturday, November 9, 2019

Economic Developments Essay

The current system of the world economy has emerged as a result of the historical trends and economic developments that occurred in the past particularly during the periods of World War I, World War II and the Cold War. To a significant extent, the current world order and the capitalist and industrial prosperity that is being experienced today are products of historical economic developments. This paper examines the economic developments from 1913 to the present including the history of self-determination in the world economy in relation to the current world economy. Consequently, the role of the United States from being an isolationist to an economic hegemon is analyzed. Economic Developments from 1913-Present The period from Post World War I up to the present can be considered to be a see-saw of economic prosperity and economic crises for most countries. For countries like the United States the war had brought about economic development but it also caused the economic downturn for countries like France and Germany. Capitalism began to ensue and trading had been more active. Hence, the period from 1920-1929 signaled the massive economic progress in the world economy- industries were established and the percentage of industries to agriculture rose. After this massive growth however, the unemployment rate and poverty that ensued from the period of 1929-1941 had led to the Great Depression- interest rates were high, hyperinflation ensued and the rise in debt had led to stock market collapse. The world economy had experienced a systemic recession leading the collapse of markets worldwide. In this era, the GDP and GNP of nations dropped and poverty ensued as world trade had been inactive. After the Great Depression, the World War II had created another economic era- post World War II had been considered to be a golden era for capitalism worldwide. This is because of the rapid rise in industries, the technological advancement, the prospering and stabilization of world trade, domestic and international institutions had been established in order to facilitate the world economy. Consequently, the World Trade Organization, the World Bank and the IMF were established in order to aid countries needing economic lift in order to aid in their industrialization. Backed by capitalism and foreign direct investments, this era can be considered the time when the world economy had boomed. However, after this period the time between 1970s-1980s, inflation and interest rates grew up and the fixed interest rates were deregulated in order to let the world economy repair itself. This era had however, contributed in terms of the massive plan to reorganize domestic economies through fiscal policies. The post Cold War on the other hand, marked the era when the US became the sole hegemon after the downfall of Russia. Before the Cold War, democratic countries can only trade with democratic countries and communist countries are only limited to trade with communist countries- the downfall of Russia opened the doors for all countries to be participants in the world economy. Hence, during the period of 1990 and up to the present times, despite some economic fluctuations, the world economy can be considered as stable and progressive. While there are ups and downs, the stability of the world economy in the present times cannot easily succumb to another depression. Self-Determination and in the World Economy Self-determination started after the World War I as a result of the Treaty of Versailles- it declared that the sovereignty of the states should take charge of the whole population. World War I led to the breakup of the Hapsburg and Ottoman empires and the birth of a new generation of nation-states. At Versailles, U. S. President Woodrow Wilson’s famous Fourteen Points–the fifth of which declared that sovereignty should take full account of the interests of the populations concerned–formed the basis for the treaty ending the war. After World Wars One and Two, self-determination inspired the demolition of empires and the formation of new sovereign states; the concept being thus extended in the 1940s and 1950s to apply in the context of the decolonisation process. In the 1960s and 1970s, the principle of self-determination clashes with the principle of territorial integrity and global leaders are increasingly seeing this angle to the problem. In fact, even the UN resolution 1514 adopted in 1960 which elevated the status of self-determination, had also emphasized territorial integrity: any attempt aimed at the partial or total disruption of national unity and territorial integrity of a country is incompatible with the Purposes and Principles of the Charter of the United Nations. The international system was caught up in the contradiction and had exhibited some degree of ambivalence at least after the post-war decolonisation. It can be observed that the further extension of the principle today, as it inspires the surge of ethnic politics and threatens the break-up of the established post-colonial order. The United States as the World’s Political and Economic Hegemon The United States before World War I cannot be considered to be an economic or a political superpower, it derived its wealth from World War I from selling ammunitions and exploiting the economic opportunities caused by the war. However, in World War II, the US emerged as one of the more powerful countries not only in terms of technology but also politically and economically after surviving the Great Depression. The Post World War II established the United States from a country in the middle to that of a global hegemon. For one, post World War I saw the US to be involved in trade, the importation and exportation of goods as well as in searching for new territories to expand its power and industries. Post World War II saw the United States cementing its economic and political hegemony- it had established itself as one of the most prosperous and progressive countries not only through its GDP and GNP but also in terms of its ability to impose upon other countries. The United States during this time served as one of the economic powers together with countries in Europe, Japan and the USSR. Upon entering the Cold War, the world became a division of the US and the USSR or democracy versus communism. During this era, the United States served as an international role model for democracies as well as the patron of democratic countries. The fall of the USSR catapulted the US to its role today as a global hegemon- except for North Korea, there had been no real threat to the supremacy of democracy and hence, the United States. During this time until the present times, the United States had been a major player in sanctioning countries that do not abide by international laws and regulations as well as being a forerunner in providing foreign aids as well as regulating trade activities. To be a partner with the US would be tantamount to economic growth. The power held by the US both politically and economically can be considered to spawn countries even in Asia and Third World countries. Needless to say, the United States can be considered to be the most important international player today.

Thursday, November 7, 2019

Event Management Proposal †Business Management Paper

Event Management Proposal – Business Management Paper Free Online Research Papers Event Management Proposal Business Management Paper The SUNYAC men’s basketball tournament and championship game will be held at New Paltz in Elting Gym. Amseshem Foluke- Henderson will be the Head of Affairs and will have groups of professionals that will make this event run smoothly. The three major departments are Finance, Advertising and Marketing, and Security. Each department have different tasks. The finance department is in charge of payroll, ticket sales, and creating a budget. Advertising and marketing department basically will attract public attention towards this tournament. Lastly, the Security Department will protect the inner and outer area of Elting Gym. The temperature will be in the upper 60’s for most of the weekend event. However, there will be a 10 percent precipitation. That means on Sunday afternoon we will have showers off and on. The bad weather that we will receive the afternoon is a disadvantage that we will face. However, we have scheduled the game around the time when the rain would possibly come. The tournament will begin on April 16 and the last game will be played on April 18, 2004. There will be four games played on Friday April 16, 2004. Two games will be played on Saturday and the championship game will be played on Sunday. There are 8 teams that will play in this tournament. All of these teams and all their managers will stay in the Super 8 Motel. The Super 8 Motel is located 2 miles from Elting Gym. It is close and convenient. We will create revenue by opening a concession stand and sell apparel. We will sell soda, hotdogs, popcorn and all types of candy. We will assign prices to all of our products. Tickets will be sold at 5 dollars a ticket. All of the different schools sweatshirts will be sold there also. The profit that is created will go to the New Paltz Athletic Departments. We believe in Excellence and will strive for nothing less, this is why our event will be a success. Research Papers on Event Management Proposal - Business Management PaperThe Hockey GameMarketing of Lifeboy Soap A Unilever ProductNever Been Kicked Out of a Place This NiceThe Project Managment Office SystemDefinition of Export QuotasWhere Wild and West MeetAnalysis of Ebay Expanding into AsiaLifes What IfsMoral and Ethical Issues in Hiring New EmployeesAppeasement Policy Towards the Outbreak of World War 2

Tuesday, November 5, 2019

Banduras social learning theory Essay Example for Free

Banduras social learning theory Essay Learning theory (33) , Social learning theory (19) , Control theory (12) company About StudyMoose Contact Careers Help Center Donate a Paper Legal Terms & Conditions Privacy Policy Complaints Our study is based on the theory of operant conditioning and Bandura’s social learning theory. Operant conditioning states that learning happens through association, and we believe that car advertises are trying to make their target population associate buying their car with a desired characteristic/traits/lifestyles e.g. having a lot of female attention. Skinner described the ABC model of operant conditioning, which includes an antecedent, behaviour and a consequence. Bandura for his theory stated that learning can only occur if the four criteria (attention, retention, reproduction and motivation) were met. From looking at YouTube adverts we found that smaller cars had a tendency to have more feminine themes whereas larger cars tended to have more masculine themes.  Aim  To whether there is a difference between gender and the size of cars they drive.  Alternative Hypothesis:  Males will have a higher tendency to drive large cars while females will have a higher tendency to drive smaller cars  Null Hypothesis:  There will be no difference in gender and the size of the car they drive, and any difference will be due to chance. METHOD:  Design:  This is an independent group design and a quasi experiment as each participant can only be in either the male or the female category. We will gather our data by tallying, as our study will only include nominal data. This is useful as tallying is easy to analyse and draw up conclusions from. We are only looking at the gender of the driver and the type/size of their cars, so our data is quantitative. This is a non-participant naturalistic overt observation. Seeing as our results are nominal, this is an independent group design and the hypothesis predicts a difference. We will try our best to operationalise our variables by tallying the cars for the same period of time and by collecting data in different locations throughout Maidstone. Our IV will be the gender and how dependent variable (DV) will be the size of the cars. To make it easier to see the driver or the car, we will be collecting our data by a set of traffic lights, and tallying in the correct sections.  Participants  All of our participants will be over 17, as this is the legal minimum driving age. We will be using opportunity sampling as only those driving at the time of the study will take part in the study. Apparatus  Pen, paper and clipboard   Procedure  1. A table was draw up to collect results in (a copy can be found in appendix)  2. Researchers decided time and place of when they will be getting results  3. Researches went to location, stood by the nearest traffic light and collect results  4. Next lesson, the results were pooled  5. Adjustments were made  6. Carried out inertial test using chi-squared test  Control:  Pilot study was not to include family and sports cars as they are marketed differently and tend to be gender neutral. We increased our ecological validity by carrying out the experiment in different places in Maidstone. We followed most of the ethical guidelines by: ensuring that no participants were harmed physically or psychology and that the results were anonymous. Participants were not given fully-informed consent and were not debriefed as this would be too time consuming, but if a participant was to ask about our study they would have been told the true aim of the study and having their results omitted if they want to.We will accept our null hypothesis and reject our alternative hypothesis because our observed value (1.34) of chi-squared is lower than the critical value(3.841) and this means our results aren’t significant. Therefore the probability of our results being due to chance equal p

Saturday, November 2, 2019

Control and simulation Coursework Example | Topics and Well Written Essays - 1000 words

Control and simulation - Coursework Example is equilibrium position is hard to achieve as their always remains a difference among the two values owing to the mechanical and personnel errors in conducting the experiment and taking readings. Considering the efficiency and flow rate curve; here the efficiency of the pump (E) first increases and then after a point, it starts decreasing. The similar pattern and shape as seen in characteristic curve in graph. This happens because calculation of efficiency includes division of hydraulic power by the mechanical power. First, when the mechanical power of the pump remains below the hydraulic power the efficiency increases. But as time passes, the mechanical power increases and exceeds the hydraulic power value and thus the efficiency starts decreasing. Thus, the curve first shows a rise and then a decline. These graphs also give an idea about the pump capacity at which the pump would be most efficient. The value of flow rate at which the efficiency is highest or the value one step less than the point at which the efficiency starts falling is the peak value and corresponding most productive flow rate of the pump. Clearly with increasing flow rate, elevation head remains constant, velocity head increases and the static head decreases also the energy lost to friction increases which in all decreases the total head of the pump. The BEP values are known by interpolating the E-Q curve at varied pump speeds, which is further used to make performance curve of the pump at that speed. These performance curves can be plotted by varying the flow rates and also by varying the diameter of the inlet pipe and then compare the curves obtained with the standard ones. The performance curves play a crucial role for the pump manufacturers who can actually analyse the working of their pumps from these curves and any deviations found are appropriately followed by complementing improvements in the pump