Saturday, August 31, 2019

A happy campus

A happy campus is an enjoyable and comfortable place to study. There are a lot of good and helpful facilities. It’s a green space for teachers and students to recreate. It also has some places for entertainment. A happy campus has a great number of good and helpful facilities. There are modern classrooms, excellent libraries and health centers. Modern classrooms have a lot of helpful equipment for teaching and studying such as computers and projectors.Besides these classrooms, excellent libraries also help students and teachers in searching and looking for information because they have a lot of kinds of books in many different subjects. Health centers take care of not only physical but also mental health such as giving advice for students who have a broad range of lifestyle issues, personal problems and need some special considerations. In addition, a happy campus is a green space with a lot of plants, trees, flowers and grasslands.It make the campus become a peaceful place fo r studying and teaching. Teachers and students can lay down, sit on grass, enjoy the fresh air and chat with each other after class. The green space also helps people reduce stress after working for a long day. It is a fantastic place to get balance in life back. The happy campus also has a lot of places for entertainment such as a sports area, a student bar and clubs. The sports area is the place that students can train sports to improve their health.Students also meet the others who have the same interested in sports. They also play their favorite sports, relax and participate in outside activities. The student bar is the place in which students can spend time meeting each other, talking about everything, and listening to music of some student bands. Besides that, students also join some clubs such as business club or soft skill club to improve personal skill and apply what they have learned into life.

Friday, August 30, 2019

Physical mental illness adolescents Essay

Adolescence is a period during which many learning tasks must be accomplished. Even adolescents whose development is normal may have problems. Some adolescents, however, have major problems in achieving a satisfactory adjustment to the demands of home, school, and community. They may engage in unacceptable behavior; or their physical, social, emotional, and mental development may be slower than that of other adolescents. This research paper presents some representative illnesses of adolescence; the illnesses covered include problems of physical and mental illnesses. The physical illnesses Theoretical Framework Adolescence is unknown in many nonindustrialized countries. Instead, adulthood begins with the onset of puberty and is commonly celebrated with traditional rites of passage. With the advent of universal free education and child labor laws in Western countries, children, who otherwise would have entered the adult work world by the time they reached puberty, entered a period of life during which they developed an adult body yet maintained a childlike dependence on parents. Formal study of this transitional period between childhood and adulthood, known as adolescence, began with the work of G. Stanley Hall at the beginning of this century (Proefrock, 1999). But adolescence became a major field of study only in the past few decades. In fact, the Annual Review of Psychology did not include a review of research on adolescence until 1988- its 39th volume (Petersen, 1998). Adolescence has been celebrated in myth and fiction as a time of joy, with few pressures and demands. Is adolescence a carefree and happy stage? While many adolescent probably remember good times, they also remember times of unhappiness and stress, too. Moreover, most adolescents recall fears and doubts and periods of insecurity, along with unpleasant feelings about the kind of person they were. If so, they’re recollections are not unusual. Contrary to the romanticized version of adolescence as a carefree time, many illnesses may arise in this period. A truly carefree adolescence is rare, if not impossible. In spite of the illnesses that adolescents face, and the troubled behaviors that they may manifest, most adolescents do not become identified as â€Å"problem children. † This research paper will examine some illnesses in adolescent stage considered to be manifestations of disordered functioning. Causal factors will be presented for each illness, and treatments will also be discussed. Empirical Evidence In considering the problem of illnesses in adolescents, an important variable must be remembered: Adolescence is a very short period. Ideally, they develop from â€Å"primitive organism† to mature, stable adults. During the course of development, some behaviors may frequently be bothersome to others, or may cause psychological pain for the adolescent. Fortunately, these behaviors often disappear with time; the child â€Å"grows out† of them. Many theorists view life as a series of developmental periods through which children progress. During this progression, many tasks must be completed if the child is to become a reasonably well-functioning human being. How well each of us resolves these development tasks depends on many factors, including our genetic endowment, physical environment, and psychological support we receive from those raising us. Rather than review the development stages presented by one theorist, we will look more generally at what faces the child. Defining Illnesses Many criteria have been suggested for distinguishing whether the behavior of a child is to be considered an illness. A child’s behavior may not meet all these criteria, or even most of them, and still be of concern to a parent. For example, a teenager who is fearful about school might not be diagnosed as suffering from disorder, but the child would benefit from parental understanding and assistance in resolving this fear. The application of a formal diagnosis to many adolescent illnesses may result in negative labeling effects for many diagnosed adolescent, who are likely to carry the stigma of diagnosis throughout their school career. The more severe labels, may correctly or incorrectly influence teachers` perceptions of the asserts and deficits of adolescents. If an adolescent is expected to be a problem student because of a diagnostic label the teacher may well behave in a way that elicits problem behavior from the adolescent. The label may lead to a self-fulfilling prophecy. Mental Illness The term mentally ill is frightening to many people. Movies, books, and magazines often depict mental illness in frightening ways. In some cases, adolescents suffering from a mental illness do act unpredictably or even dangerously. With proper diagnosis and treatment, most of the symptoms of mental illnesses can be controlled. It is tempting to distinguish healthy adolescents from adolescents with mental illness problems. However, there is often a fine line between mental health and mental illness. It is important to understand that mental illnesses vary in their severity. For example, many adolescents suffered from various levels of anxiety or depression. Others have suffered from serious mental disorders with biological origins. Education about the adolescents` mental illness is vital for those with mental health problems as well as for the adolescents` friends and family. Obsessive-Compulsive Disorders. Approximately 5 million adolescents suffer from obsessive-compulsive disorders. An obsessive-compulsive disorder is an illness in which people have obsessive thoughts or perform habitual behaviors that they cannot control. People with obsessions often have recurring ideas or thoughts that they cannot control. People with compulsions feel forced to engage in a receptive behavior, almost as if the behavior controls them. Continual handwashing, counting to a certain number while using the toilet, and checking and rechecking all the light switches in the house before leaving or going to bed are examples of compulsive behaviors. Some compulsive behaviors that are more harmful include pulling out one’s hair and other forms of self-mutilation. The causes of obsessive-compulsive disorder are difficult to isolate. Some theorists believe that sufferers engage in compulsive behaviors to distract themselves from more pressing problems. Until recently, behavioral therapy, which focuses on controlling and changing behaviors, has been the common treatment for sufferers of obsessive-compulsive disorders. However, research now indicates that some of these disorders may be caused by a lack of the neurotransmitters serotonin in the limbic system. In the early 1990, a drug called clomipramine (Anafiranil) was released for prescription use. Researchers believe that chlomipramine alters the way serotonin is used in the brain. When used in conjunction with behavioral therapy, this drug has been found to be helpful in alleviating symptoms of obsessive-compulsive disorder. Conclusion/Summary explaining the connection between my subject and current ideas and applications within the field of psychology and throughout the research the references should be noted and organized, third person writing perspective and avoid biased or pejorative language. 12 font, Courier style font and double spaced. Thank you. Physical and mental Illness in Adolescents. I want the paper to have both positive and opposing veiws from authors along with a knowledgable solution or idea.

Thursday, August 29, 2019

Makeup economic assignment Essay Example | Topics and Well Written Essays - 500 words

Makeup economic assignment - Essay Example The following is a household budget that illustrates how the student should allocate his income. The purpose of this projected monthly household budget is to ensure that the graduate avoids the risk of unexpected expenses such as enrolling for unpredicted courses. Since the graduate lives and works in Des Moines, IA, which is among the estates with high living standards, it is logic to budget for a housing and food cost of $14,000 and $4,000 respectively. In order to improve transport efficiency and convenience, the graduate should purchase a personal vehicle at the cost of $8,000 payable in monthly installments of $500. Therefore, the graduate must budget for the vehicle monthly insurance of $150. The vehicle will be necessary since it will enable the graduate to avoid transport inconveniences due to public transport means. In addition, the graduate should adopt a budget plan that will enable him repay the education loan. The above budget plan proposes a monthly amount of $800 to settle the total loan of $10,000 in a period of 12.5 months. The budget also proposes that the graduate should allocate a total of $2,000 for entertainment and recreation. According to the above monthly budget, the graduate should set a total of $500 and $50 for clothing and medical insurance cover respectively. Making payments for the medical insurance cover will enable the graduate to avoid paying huge amount of money when he or she is going through any medication. Moreover, it will be a nice decision for the graduate to look for means of investments. This will enable the graduate to increase his total monthly income, hence improving his or her living standards. Therefore, the above Monthly budget entails that the graduate should budget for monthly investments of $12,000 as a way of attracting extra income. The graduate shou ld also allocate some money for miscellaneous. This is for purchasing other essential things such as

Wednesday, August 28, 2019

Traditional male heterosexuality Essay Example | Topics and Well Written Essays - 3000 words

Traditional male heterosexuality - Essay Example At the same time they were expected to be emotionally insensitive especially to intimate issues. Women were regarded as sex objects to bear children and serve the men while remaining to take care of the home. Role distribution between males and females was clear cut. As it is evident, changes have been first and swift. From the hardened and burly figure, the modern heterosexual has taken the level of manhood to the next level. Areas of operation originally seen as women zones have become a dominant resting place for the modern heterosexual man. To begin with, the present day man has shifted from the hardened burly to a soft sponge that is available for only pleasurable ventures. Men form the advertising sought after images, they do household chores, they intimately relate with both females and males, and they abuse drugs among other things that were detested by the traditional man. This leads to the position that man has changed from his rough nature to the soft one that is on show at present. Heterosexuality reflects sexual behavior, identity, and practices that indicate a desire or preference for the opposite gender. In terms of sexual orientation, heterosexuality is used in reference to a lasting mode of or character to practice affection, physical, sexual, or romantic attractions chiefly to people of the opposite sex. It can also refer to an individual sagacity of social and personal identity on the basis of those attractions, behaviors, and association in a group of people who subscribe them. The term typically applies to human beings. But it is also observed in respect to all mammals. There have arisen changes that have altered male behavior as reflected by the works of Palahniuk and Hollinghurst. The bodily deed of heterosexual fertilization is the only way of sexual reproductive potential in humans devoid of the use of recent guided reproductive technologies. The relations with romantic love plus

Tuesday, August 27, 2019

Solve College Students Smoking Problem Essay Example | Topics and Well Written Essays - 1750 words

Solve College Students Smoking Problem - Essay Example This could include the different dimensions of the society with which the students get in touch. These might comprise of the media avenues and platforms which they are always discussing and find a leaf out of this book in more ways than one. This could be represented in the form of several ideologies which emanate from the teenager and student life which has an impact on the students in a number of different mannerisms. Some believe that smoking is just a bad habit that shall go away with time and must not be given significance by the parents and teachers. What they seem to forget is that smoking is not a habit; it is an addiction and that too a very horrible one. It brings tyranny for the sake of the people and makes them realize where they are headed. Their young ones would have to face the music within their later years, and thus it is always advisable for everyone to stay away from smoking, mostly within the school domains (Waldron 2005). The school’s own reputation is at stake when the students are seen smoking both inside and outside the campuses. This rapport discussion deems significance because schools are known to be the places where corrective measures are employed and where students are taught about the positive aspects of the world. Now it would be a bad omen if these students themselves are given the liberty to smoke at their own free will. Something somewhere is inherently wrong and a reactive strategy might just bring about a sense of sanity that the school authorities and the parents would look up to as far as their children are concerned. There is a need to put fines and suspensions within schools and colleges when students smoke. It will be tantamount to a form of punishment which will make... This essay stresses that exists as a refutation to this topic surrounds how alternatives can be understood and analyzed. If the students are given a better alternative, there is a possibility that they might switch over but then again the probability under such a scenario is too low. It is important that any alternative is not offered to them in the form of electronic cigarettes and the like. This paper makes a conclusion that smoking is one passion that the students can let go if they make a firm commitment towards not only their elders but also their own selves. As a call to action, it would be important to suggest here that parents and elders share the blame if their children go haywire. They should always be answerable for all the tasks and actions when the students are young and unable to make-do with the nuances that surround their lives. The role of the media and the advertisers is to make sure that they keep the smoking domains as subdued as possible. The role of the educators and school authorities should be to pull up their socks to achieve sound results for the sake of the society at large and to make up for the gross transgressions on the part of the students in the past. The future must not see what the past and the present have already brought about to the fore. There needs to be a sense of optimism which has to be manifested and projected across the board f or a number of reasons, all said and done.

Monday, August 26, 2019

Exploratory Essay Example | Topics and Well Written Essays - 1250 words

Exploratory - Essay Example Of course, it would be a misplaced conception to assume that these games are the same. What are the differences between the major gaming platforms, for instance the Wii and Playstation3? With the overwhelming market expansion, the most important question that lingers in many minds of course would be what exactly is driving the gaming console industry to its new levels of success witnessed in the recent past? I sought to find out by engaging merchandisers on one on one interviews, conducting a library research and consulting articles posted over the internet. The first thing I did to find information on this particular subject was to set up an interview with Mr. Jimmy Jonson, a Caltech undergraduate working on Kinect home applications based in Washington. â€Å"How do I get to know the best gaming platform that best suites me?† I asked. â€Å"There are numerous different types of computer gaming systems available for sale in the market currently and so choosing the right one that suit ones needs can indeed be a difficult process. As such, a potential buyer with interest should first outline the goals to be met before actually making the final decision to purchase.    Some of these goals include setting a price ceiling, the possibility of having the device playable to two or more people, ability to be able to play online, and the rating in the consumer market so as to be moving with the current technology, as opposed to using obsolete systems† (Jimmy Jonson, part 1). With major preferable gaming consoles to select and abundance of video games powered by different industries, it would be an experience of a kind should one decide to enter the world of video or computer gaming. The price tags, game genres, as well as the game consoles, there are simply so many options that one has to consider before officially launching a bid to secure one. And so to avoid the baggage of focusing on quite a huge number of the gaming

Sunday, August 25, 2019

Monitoring the glucose level as well as alteration in expression of Research Proposal

Monitoring the glucose level as well as alteration in expression of m-RNA and protien levels of glucose transporters(GLUT4) in d - Research Proposal Example The reduction of insulin activity removes the glucose transporter in the urine samples out of the body. This concludes that glucose level monitoring and the Vitamin D level monitoring is very important for the type 2 Diabetes patients.1 When the Vitamin D binds to the vitamin D receptor (VDR), a heterodimer is formed. This hetereodimer then binds to the DNA and initiates many cofactors leading to the increase in the transcription of the genes that are responsible for the production of the proteins that control the calcium homeostasis. Vitamin D regulates the insulin receptor gene expression at the genetic level. The mRNA that codes for insulin receptor gene is produced at large numbers by increasing the expression level. The increase in the insulin receptor will increase the binding of the insulin and makes the GLUT4 transporter gene translocation from the intracellular level to the plasma membrane. 2 This increase in flux increases the glucose metabolism and thus controls the type 2 Diabetes mellitus in humans.GLUT 4 contain the phosphate at the basal state. The phosphorylation of GLUT4 is mediated by the cyclic cAMP- dependent protein kinase inhibiting the glucose transport.2 Scientific Background: A study was carried out in the year 1993, to identify the genes that are responsible for the regulatory domain of the GLUT4 in the adipose tissue. The transcriptional regulation of the gene was studied in the murine C2C12 skeletal muscle cell line. Transient transfection of the 5’ and 3’ deletions of the GLUT4 5’ flanking DNA has identified a region of 281 base pairs present at the myotube-specific expression. 3 The total RNA was isolated and used for Northern Blot analysis and hybridization was carried out. This gene was then inserted into the luciferase EcoRI- DraI fragment plasmid and further analysis was carried out. 3 The GLUT4 mRNA was found to be dependent on the thyroid hormone. This region was also found between the -517 and -237 regio n. This 281 base pair region is found to play a major role in understanding the mechanism that controls the GLUT4 gene expression in the skeletal muscle. All these experiments were carried out in the rat model.3 The vitamin D deficiency is found to be associated with the impaired insulin secretion. When Vitamin D is supplied at sufficient level then it binds to the vitamin D receptors (VDRs) present in the pancreatic beta cells. VRD gene is present in the Chromosome 12-cen-q12. When allelic variations are done in the VDR receptor gene then glucose absorbance rate also varies. The genomic DNA was extracted from the four healthy individuals and the four SNPS at the intron 8 and Exon 9 was examined with the controls. 4 The peripheral blood samples were analyzed for the given SNPS at the VDR gene using the polymerase chain reaction and then by the restriction fragment length polymorphism (RFLP). The restriction sites looked for were TaqI, ApaI, BsmI and Tru91SNP. 4 It was found that the genotypes were similar in both the patients and control. This concluded that VDR is not the major gene for the Type 2 Diabetes mellitus. Hence further research is necessary for finding the responsible gene for Type 3 Diabetes mellitus.4 The vitamin D is not only the factor that is responsible for the insulin resistance. There are other factors too. The 25- hydroxyl vitamin D (25(OH)-D) is found to be inversely proportional to the insulin resistance and the (25( OH)-D) concentration is determined in the serum for the analysis. The association between the

Saturday, August 24, 2019

Cause and effect essay on the Dred Scott decision - 1

Cause and effect on the Dred Scott decision - Essay Example This made Scott to consider the decision of appealing against the ruling, in which case, Justice McLean ruled that the fact that denying Scott justice because he was not a US citizen was less of a matter of law but more of taste (Schwarz 102). This decision brought about major changes in the political, social and economic arenas in the United States. Dred Scott’s decision had economic causes and effects in the United States. According to Calomiris and Schweikart (21), the decision that denying the slaves justice was more of taste than legal caused a lot of uncertainty (1987) as to whether the whole of the West would be engulfed by slaves like Kansas, and this gripped the markets. The railroads on East West Bonds immediately collapsed and in turn, many large banks nearly collapsed. Another cause of this economic effect was that the branch banking system in the South, which was superior, came to be comparable to the North’s unit banking (Calomiris and Schweikart 43). Panic transmission was however minor, because of diversification of branch banking systems in the south. However, the movement of information among branch banks was reliable while that of the competitors in the North’s unit banks seldom shared important information. In the broader perspective, the southerners were convinced by the panic that white s are kings, and hence, they had no reason to economically fear the North, unless there was a move to end the slavery. The political effect of Dred Scotts’ decision was caused by the Missouri Compromise repeal which was successfully sought by politicians of the Democratic Party. that lead to the passing of the Act of Kansas-Nebraska (Calomiris and Schweikart 47). The act allowed every 40th parallel new state in the south to solely determine whether to be a free or slave state. The Supreme Court, with Dred Scott, under Taney looked for ways

Global conflict Term Paper Example | Topics and Well Written Essays - 1250 words

Global conflict - Term Paper Example he focus of conflict in Indian society (as well as being a point of contention between India and Pakistan and the impetus point of separatist movements), but rather will look at recent events and conflicts in the area using these theoretical concepts to shed light on the nature of conflict resolution in this area. To negotiate a resolution to this conflict as a UN representative, I am planning to focus, using utilitarianism and moral naturalism, on the overweening issue of genocide prevention. Traditionally, the US and UN have been rather less involved than Britain in brokering a solution in this area, and the UN has mostly stated its position in terms of doling out praise and making assurances. I also feel that India and Pakistan can agree and come to terms that Kashmir is a sensitive issue. It appears that the Indian and Pakistani conflict over Kashmir, and Pakistan’s support of rebel fighters there, is at the very heart of the matter, rather than a factor to be sidelined as a non-issue in the peace-brokering process. One may feel as a UN representative that putting Kashmir up for discussion is asking too much; in any case, this assumption is not as clear as it could be. In terms of applying key concepts to this situation, one can see the Indian state as being the dominant group and the Kashmiri people as being the subordinate group. By suppression of separatist movements in the area, the Indian state is engaging in dominant acts of power designed to reinforce the status of the Kashmiri people as subordinate, and by fighting against this subordination. Many of the issues of minority-group consciousness and racism that can be associated with the situation are actually the result of not racism per se, but religious prejudice, since Kashmiri has such a dominant Muslim population. This causes problems in acculturation which can be seen from a perspective of moral naturalism, in that those that are perceived as the Kashmiri people do not want to assimilate

Friday, August 23, 2019

English 11 Article Example | Topics and Well Written Essays - 1250 words

English 11 - Article Example Together with the portability of these devices, the computational capability of smartphones have made the devices increasingly become popular with 42% of all mobile subscribers in the US using smartphones, where 37% and 60% of adults and teens respectively acknowledge their addiction to the devices (Sarwar and Soomro 218). In fact, Boulos, Wheeler, and Jones observe that the devices have offered immense competition to personal computers in their market and have impacted â€Å"not only on the manner in which we communicate, but also on our sense of culture, community, identity and relationships† (2). Thus, this paper articulates the positive and negative effects of smartphone technology with regard to how it has transformed people’s way of communication, conducting and transacting in business and entertainment. Smartphone technology has changed the way people communicate, making it even more convenient. Other than its portability, a smartphone offers Internet connectivit y capabilities which open up the device to various ways through which communication, whether formal or informal could be undertaken. One of the weaknesses that e-mail communication had before the advent of smartphones according to Derks and Bakker was accessibility. E-mails would only be accessed in the presence of a computer. But smartphones offer wireless Internet connectivity such that users receive and respond to e-mail communications whenever, wherever. This makes people available whenever needed, hence more appreciation of e-mails as communication tools. Other than instant communication, smartphones provide various options through which people communicate. The devices have transformed people from using the traditional modes of communication, particularly e-mails and phone calls, to other modes such as WhatsApp, an application that allows for instant messaging. Such applications have transformed group communications such that people no longer have to meet physically to communic ate. Rather, through group communication platforms, such as applications like WhatsApp and social media platforms, groups interact conveniently. If need be, these people could see each other as they communicate through the web cameras on the devices which bridges the distance (Boulos, Wheeler, and Jones 4). This has greatly reduced on the time that was initially spent to make decisions, thus people not only enjoy the convenience of the technology but also the promptness with which it allows for decisions to be made. The portability and greater functionality of smartphone technology have transformed the way entrepreneurs conduct businesses and execute their transactions, hence giving business greater capabilities, which in turn generate more business opportunities. In a study conducted in Malaysia, Osam et al. (274) acknowledge the advancement in computing power and connectivity of smartphones compared to contemporary mobile phones. Businesspeople appreciate this capacity and use sma rtphones to conveniently and promptly access the required information, be it on stocks, market prices of commodities or foreign exchange rates among others. This enables them to make prompt and informed business decisions whenever needed, regardless of their location. Moreover, marketing being an important component of business has greatly transformed with the introduction of smartphones to the market. Marketers use the various communication

Thursday, August 22, 2019

Career Paper Essay Example for Free

Career Paper Essay Professor Jane Andrews Success in College Career Paper A police officer is something I have always had an interest in becoming. Law enforcement is an exciting career that can open many doors to different jobs, from patrolling the streets to protecting important political figures. Police officers are an essential part of the communities in our nation, offering citizens protection from criminals, preventing crimes, and serving the members of their community. A police officers duties, among other things, include patrolling a specific district or beat, writing citations when necessary, offering escorts for convoys, responding to citizens emergency calls, severing warrants and subpoenas, and writing incident reports after a crime has been committed. 1 An essential characteristic of a police officer is physical stamina, physical and mental endurance, and the ability to keep a calm head. These are just a few of the many duties and essential characteristics of a police officer. A police officers work environment can vary greatly, either being out on patrol or in an office, either writing reports or viewing bulletins. Out on patrol, an officers work environment is his or her patrol car. A patrol car has all the devices necessary for an officer to execute his or her duties. It will contain a radio, a mobile laptop, which is used to run license plates, do background checks, and receive directions to the locations of 911 calls, and weapons, such as a shotgun, to be used in hostile situations. A police officers work environment will vary depending on his or her pecific duties. Becoming a police officer is a physically demanding process. Many people choose to first obtain a college degree in criminal justice or sociology, because it can help you become a higher rank and opens the options to work for higher authority agencies. The basic requirement for becoming a cop are to be free of any felony convictions, be a citizen of the United States, be at least 18 years of age, undergo background checks, and be free from any physical, emotional, or mental condition which might adversely affect the exercise of power by the peace officer. These requirements may vary slightly from state to state, but one that is consistent is that everyone must attend police academy. Police academy is an essential step in becoming a police officer. By graduating from police academy, a person becomes post certified, which is a requirement to become a police officer anywhere. 3 At the academy, a person will take courses on firearms training, patrol techniques, crimes scene procedures, and brain training courses, which train an officer on how to react mentally in certain situations. Physical fitness tests are an essential part of the academy, with strict requirements for both male and female requirements. Being a police officer requires both mental and physical toughness. A career in law enforcement can bring a variety of pay amounts. A standard patrol officer makes on average $34,000 a year. 4 Working for different agencies can bring different pay ranges, anywhere from $25,000 a year to $100,000. A police chief will earn towards the upper end of this range. All police officers will be members of a police union, the largest being the International Union of Police Associations, or the IUPA. 5 Being a member of a union brings benefits such as higher wages, health insurance, and a pension plan. Being a police officer is not one of the highest paying jobs staring off, but with the right promotions, one can earn a very high salary. Being a police officers is a career that is always in demand. In 2010, there were over 750,000 jobs for police officers.

Wednesday, August 21, 2019

Research In Regard To Shoplifting Psychology Essay

Research In Regard To Shoplifting Psychology Essay In critically reviewing the research in regard to shoplifting done by the security manager, a definition of research will be stated and the following aspects will be analysed and critiqued. Initially, throughout the essay the manager would be complemented for taking the initiative to conduct a research founded on a concern to deal with shoplifting, and the research methodologies used to examine the problem. This would be followed by a critical analysis to identify the strength and weaknesses, beginning with examining the first stage of the investigations which looks at the research problems to determine if the author provided a good argument for the research. The essay will focus on the following, a literature review to determine if the researcher reviewed sufficient information before conducting the research. Methods used during the process of the survey are in compliance with established theories such as qualitative, which include unstructured interviews, observation study, also a comparison between qualitative and quantitative research methods. In addition special attention will be paid to the data collection methods together with the examination of existing information and the ethical violations by the researcher which compromised the validity and reliability of the investigation. The final discussion and interpretation to determine of the finding of the research to determine if the discussion fit with the data collected, taking into consideration if any limitations were encountered which could have influenced the discussion from presenting a logical based result. Research by definition, according to the (Merriam-Webster online Dictionary) states it is a studious inquiry or examination especially, investigations or experimentations aimed at the discovery and interpretation of facts, revision of accepted theories or laws in the light of new facts, or practical application of such new or revised theories or laws: The collecting of information about a particular subject. Research Problem All security managers should be complimented for the initiative to conduct a research which would assist in examining and addressing some of the concerns they were faced with in their organization. On the other hand, in the initial stage of any research there are some fundamental stages that need to be followed in order for the research report to be truly noteworthy. The author indicated the objective for his research was to study shoplifting by costumers and focus on a number of other aspects within the store. These included the volume of shoplifting, the influence of the new CCTV equipment on such and why people actually shoplift. When conducting research it is important to identify the following: What exactly one wants to study? Why it is worth studying? Does the proposed study contribute to our general understanding of crime or its policy response? (Maxfield Babbie, 2008:111). The researcher should also begin by clearly identifying the problem and providing a good argument for s ignificance and determining its relevance (Rodgers (1997). The manager needs to acknowledge that in order to achieve the objective of any research report, there are guidelines that ought to be meticulously evaluated in conducting such an exercise. Literature Review An acknowledgement of some previous research on shoplifting previously done is noteworthy. However, the managers opinion that none for the particular shop was done, and earlier research was not relevant, to the existing research, could seriously put the study at a disadvantage. One of the most important elements in the beginning of a research project is the literature review. According to (Hart 1998 cited in Bell 2008:99) without it, you will not acquire an understanding of your topic, of what has already been done on it, how it has been researched, and what are the key issues. A literature review proposes to offer an overview of relevant literature published on the topic, taking the four stages into consideration. Problem formulation, which considers the topic being examined and what are the component issues, literature research includes finding materials relevant to the subject being explored, data evaluation to determine which literature makes a significant contribution to underst anding the topic, and analysis and interpretation of the findings and conclusion of pertinent literature.(Department of Criminology,2010).The absence of a literature review from the research denied the author critical information that could have assisted in addressing the concerns of shop lifting at the store and a guide for the project. Research Method As a consequence of the number of things under consideration by the researcher with regard to shoplifting at the store, research methods needed to be developed for the study. These take into account using all the necessary processes to achieve the best outcome (Schutt 2004:16) states a researcher can get a clearer picture of the social reality being studied by viewing it observed his method included the use of quantitative research by making use of official data and questionnaires in addition to qualitative data by having interviews, also observation studies. Both qualitative and quantitative methods are useful and legitimate. And some research situation and topics require elements of both approaches (Maxfield Babbie, 2008:26). The importance of research methods should not be underestimated, when seeking to find answers or correct a problem of a social reality. Hence research methodologies form an integral part of any research to be conducted, which has the key to observing the same thing from a different viewpoint. Qualitative research The official data used to determine the volume of shoplifting at the shop were computerised records of inventory taken into the shop as compared to goods sold or otherwise accounted for. However, this measure does not accurately determine the reason for high numbers of unaccounted items at the store, for there could be a number of other factors that could have led to such increasing numbers within the four-month period under review, (Maxfield Babbie. 2008:306 states Store inventory records could be used to estimate losses by customer theft, but this obscures the difference between shoplifting by customers and employee theft. Qualitative methods used in studying data as part of the investigation is commendable, qualitative research is the form of research that is not concerned or interested in what is true or false or what can be proved or disproved, as well as considering the way people understand things and patterns of behaviour. activities that make up this method of research inco rporates , interviews, observations, analysing interactions and conversations including analysing documents,(Department of Criminology,2010).The assumption that shoplifting was on the increase in as much as security officers were catching more people at the shop and the past week two persons were processed by police together with more dodgy persons stopping over at the shop was based purely on observations and lacked adequate data whereby they could have appropriately measure the variables. Interviews Unstructured interviews were used to determine the amount of shoplifting at the shop. Nevertheless, in conducting interviews be it structured or unstructured there must be some ethical consideration when using this method. According to Hart and Bond (1995:198-201 cited in Bell 2008 :44) action research in health and social care, provide examples of different types of code of practice or protocol, which requires researchers to ensure that participants are fully aware of the purpose of the research and understand their rights. The manager choice of semi-structured interviews must be highly praised, for unstructured interviews are most appropriate when researchers have little knowledge about a topic and when its reasonable for them to have a casual conservation with a subject (Maxfeild Babbie, 2008:288). Interviews with both line managers and other records indicated that there was a great deal of shoplifting taking place at the shop. However, both interviews were not conducted at the p roper time to elicit the information necessary in assisting the manager to come to a conclusion as to determine that shop lifting was on the increase at the shop. This factors could have result in bias as there is always dangers in research carried out by individual researchers, particularly those who have strong views about the topic they are researching (Bell, 2008: 166).Structured or unstructured interviews must comply with the general ethics of undertaking such an exercise for many organizations now have ethical guidelines, codes of practice and protocols (Bell, 2008:57) Observational study Observation study was one of the methods used by the researcher to determine why people shoplift. While this is one of the methods by which investigation could be used to collect data, it is not an easy option, according to (Nisbet 1977:15 cited in Bell, 2008:184) careful planning and piloting are essential, and it takes practice to get the most out of this technique. However, once mastered, it can reveal characteristics of group or individuals, which would have been impossible to discover by another means. An afternoon spent walking around the store watching for people shoplifting was done by the security manager in order to collect data; this can be explained as solo observation. However, there is always a danger of accusation of bias or misinterpretation with this type of observation (Bell, 2008:185).In conducting observation studies be it structured or unstructured, participant or non-participant; there are certain guide lines to follow in order to achieve exactly what you need t o know. To begin with consideration should be given as to what information is needed and what approach should be adopted also pilot your method and invite someone to observe with you and compare notes afterwards to see if you saw the same thing (Bell, 2008:185). This emphasizes the point that even though the observation study was unstructured the basic principle for this type of investigation was lacking. On the other hand, the researcher must be commended for employing this method to assist with obtaining the necessary information to establish why people shoplift. Quantitative research Quantitative research methods as compared to qualitative research methods differ primarily in their analytical objectives. While qualitative explores attitudes, and experiences through such methods as interviews, observations, analysing interactions and conversations, including analysing documents,(Department of Criminology,2010).On the other hand quantitative research generates data through the use of a large scale survey via methods such as questionnaires and structured interviews. This type of research reaches many more people, but the contact with target groups is much quicker than it is in qualitative research (Sanchez, 2006) .The researcher decision to design a questionnaire to address why people shoplift is certainly a step in the right direction towards achieving this objective. However, in exercising this option, and considering the survey is likely to get the information required, a well designed questionnaire must be produced that will be acceptable and should pose no prob lem at the analysis and interpretation stage(Bell,2008:136 ). The author points out that he gave out 30 questionnaires to his friends and also to get their friends to fill it in,(Gill,2005:313) stated self administered questionnaire can produce unreliable data as results depend on respondents.(Bell,2008: 148 ) also states, There are distinct advantages in being able to give questionnaires to respondents personally. You can explain the purpose of the study, and in some cases questionnaires can be completed on the spot. You are likely to get better cooperation if you can establish personal contact. The method employed the researcher in delivering the questionnaire could have compromised the information received on their return. Data collection and analysis When deciding to carry out a research project, in the initial stages one should consider how to collect the evidence you require, additionally what is the best way to acquire the information (Bell, 2008:115). The use of official data from the store to identify inventory taken into the shop in comparison to inventory accounted for, as well as unaccounted inventory must be applauded. Analysis of data for the periods under review to determine whether if any significant change in shoplifting before and after the introduction of CCTV confirmed that twenty percent of the inventory was not accounted for in both case. Hence it could not be proven there was a decrease in shoplifting. Generalization is a key concern in research design. We rarely have the resources to study the entire population that is of interest to us, so we have to select cases to study that allow our findings to be generalized to the population of interest. None the less since we can never be sure that our findings will ho ld under all conditions. We should be cautious in generalizing to populations that we do not actually sample. (Schutt, 2004: : 19). Interpretation of results collected from the questionnaire was based on assumptions and not from a proper examination of the data collected. Statements such as, most shoplifting is committed by females for the thrill is not accurate at the point of view two out of ten females answering the questionnaire shoplifted many times, which represents a mere twenty percent.(Bell,2008: 110) writes research findings can be dangerous if they are used in an undisciplined way stating that the research proves x or y without any corroborating evidence to warrant such an assertion. In analysing data collected one should not make claims, which cannot be justified from the evidence presented. Ethical consideration There is no sign throughout the entire research project where the investigator indicated that an ethic committee existed or permission from any supervisor to carry out the survey was granted. (Bell, 2008: 43) explains, at one time, it was possible to have permission for small pieces of research to be done by the head of a department. However, with era change in most cases the supervisor will be aware of any limitations or legal requirement related to researching and ensure that proper standards are in place during the preparation stages of collecting data. Ethical consideration should not be compromised when doing any research project, for any data collected from any of the research methods without consent from participants, create an inherent danger to the reliability and validity of the information collected,(Department of Criminology,2010).The semi- structured interviews, with both line managers is an excellent research method, but they were unaware that an interview was been carr ied out at the time and information collected would be used by the researcher to inform certain conclusions.(Bell,2008:156) points out researchers still have a responsibility to explain as fully as possible what the research is about ,why you wish to interview them, what will be involved an what you will do with the information obtained. During the observational study the young woman arrested for shoplifting and was offered a reward in exchange for information illustrates the importance for ethical concerns in obtaining information. The reliability of the information received through coercion will dispute the authenticity of the data collected. Whenever a research is conducted on persons the well being of the research participants must be top priority. The question of the research is of secondary importance. This explains that if a choice is made between doing harm to the participants and doing harm to the research, it is the research that is sacrificed (Sanchez, 2006). Discussion and Interpretation of findings Raw data taken from the questionnaires, interviews and other methods used need to be recorded analysed and interpreted. (Bell, 2008:203).The researchers discussion and analysis as a consequence of the data collected, asserts that shoplifting is a real problem that is only going to get worse. However, the results presented did not indicate if the results fits with the data collected, any conclusions forwarded need to be accompanied by evidence to support its claim. Taking into consideration data collected during the research as compared to authors statements highlighted this fact. The findings needed to identify limitation of the study and how it affected the quality of the study; challenges encountered in collecting the questionnaire together with the low return ratio would have certainly compromised the fact as to why persons shoplift together with the ages and sex of the offenders. Gathering large amount of information in the hope that something will emerge is not recommended in sm all investigations also selecting research method which are suitable for the task and which can easily analysed, interpreted and presented (Bell, 2008:203).Reliability and validity of the information to determine that CCTV is the solution to the problem is not supported by the statistical data presented. Before and after the installation of the CCTV simple arithmetical procedures related to percentage was not used to analyse the numbers so as to determine if shoplifting prior to and following produced significant changes. According to (Bassey, 1981:85 cited in Bell 2008:202) An important criterion for judging the merit of case study is the extent to which the details are sufficient and appropriate for a teacher working in a similar situation to relate his decision making to that described in the case study. The reliability of a case study is more important than its generalizability. Interpretation of the data collected requires greater analysis before revealing that several things were clear from the research. In determining if a research project ought to be undertaken it must be resolved if the problem is clearly identified, together with providing a good argument for such an investigation. The objective of any research by its definition is aimed at the discovery and interpretation of facts. However, in striving to achieve such this requires the researcher follow the necessary steps that would assist in accomplishing the goals of the investigations. A literature review of previous researches could be an essential first step in understanding the subject. The utilitization of multiple methods to study the research is recommended, which would assist to observe things from a perspective which could challenge or confirm the finding of one method with those of another. Both qualitative and quantitative used were legitimate and helpful in assisting to address the compilation and analysis of information. The differences between both methods were identified, and it was understood that they varied primarily in their analytical objective, while qualitative methods are not keen in what is true or false or what can be proven or disproved. Quantitative on the other hand, produce data through the use of a large scale survey. The possibility of doing a research project should not prevent researchers from considering ethical issues, and aiming at the principle of one having the informed approval from the appropriate review board where the rights of human participants are protected. In the final discussion and analysis of data collected during the investigation, one has to be conscious of the fact that interpretation of the findings must be logically based before making any declaration.

Tuesday, August 20, 2019

Uses Of Computer Network Data Transmission Modes Information Technology Essay

Uses Of Computer Network Data Transmission Modes Information Technology Essay We all are aware with some sorts of communication in our day to day life. For communication of information and messages we use telephone and postal communication systems. Similarly data and information from one computer system can be transmitted to other systems across geographical areas. Thus data transmission is the movement of information using some standard methods. These methods include electrical signals carried along a conductor, optical signals along an optical fibers and electromagnetic areas. Suppose a Managing Director of a company has to write several letters to various employees . First he has to use his PC and Word Processing package to prepare his letter. If the PC is connected to all the employees PCs through networking, he can send the letters to all the employees within minutes. Thus irrespective of geographical areas, if PCs are connected through communication channel, the data and information, computer files and any other program can be transmitted to other computer systems within seconds. The modern form of communication technologies like e-mail and Internet is possible only because of computer networking. Computers are powerful tools. When they are connected in a network, they become even more powerful because the functions and tools that each computer provides can be shared with other computers. Networks exist for one major reason: to share information and resources. Networks can be very simple, such as a small group of computers that share information, or they can be very complex, covering large geographical areas. Regardless of the type of network, a certain amount of maintenance is always required. Because each network is different and probably utilizes many various technologies, it is important to understand the fundamentals of networking and how networking components interact. In the computer world, the term network describes two or more connected computers that can share resources such as data, a printer, an Internet connection, applications, or a combination of these. Prior to the widespread networking that led to the Internet, most communication networks were limited by their nature to only allow communications between the stations on the network. Some networks had gateways or bridges between them, but these bridges were often limited or built specifically for a single use. One common computer networking method was based on the central mainframe method, simply allowing its terminals to be connected via long leased lines. This method was used in the 1950s by Project RAND to support researchers such as Herbert Simon, in Pittsburgh, Pennsylvania, when collaborating across the continent with researchers in Santa Monica, California, on automated theorem proving and artificial intelligence. At the core of the networking problem lay the issue of connecting separate physical networks to form one logical network. During the 1960s, several groups worked on and implemented packet switching. Donald Davies, Paul Baran and Leonard Kleinrock are credited with t he simultaneous invention. The notion that the Internet was developed to survive a nuclear attack has its roots in the early theories developed by RAND. Barans research had approached packet switching from studies of decentralisation to avoid combat damage compromising the entire network. By mid-1968, Taylor had prepared a complete plan for a computer network, and, after ARPAs approval, a Request for Quotation (RFQ) was sent to 140 potential bidders. Most computer science companies regarded the ARPA-Taylor proposal as outlandish, and only twelve submitted bids to build the network; of the twelve, ARPA regarded only four as top-rank contractors. At years end, ARPA considered only two contractors, and awarded the contract to build the network to BBN techologies on 7 April 1969. The initial, seven-man BBN team were much aided by the technical specificity of their response to the ARPA RFQ and thus quickly produced the first working computers. The BBN-proposed network closely followed Taylors ARPA plan: a network composed of small computers called Interface message processor (IMPs), that functioned as gateways (today routers) interconnecting local resources. At each site, the IMPs performed store-and-forward packet switching functions, and were interconnected with modems that were connected to leased line, initially running at 50 kilobit/second. The host computers were connected to the IMPs via custom serial communication interfaces. The system, including the hardware and the packet switching software, was designed and installed in nine months. The first-generation IMPs were initially built by BBN Technologies using a rough computer version of the Honeywell DDP-516 computer configured with 24 Kilobyte of expandable core memory, and a 16-channel Direct Multiplex Control (DMC) Direct Memory Access unit. The DMC established custom interfaces with each of the host computers and modems. In addition to the front-panel lamps, the DDP-516 computer also features a special set of 24 indicator-lamps showing the status of the IMP communication channels. Each IMP could support up to four local hosts, and could communicate with up to six remote IMPs via leased lines. 1.2 ARPANET The Advanced Research Projects Agency Network (ARPANET), was the worlds first operational Packet Switching network and the core network of a set that came to compose the global Internet. The network was created by a small research team at the Massachusettas Institute of Technology and the Defense Advanced Research Projects Agency (DARPA) of the Defence Department of United States. The packet switching of the ARPANET was based on designs by Lawrence Roberts of the Lincoln Laboratories. Packet switching is the dominant basis for data communications worldwide and it was a new concept at the time of the conception of the ARPANET. Data communications had been based on the idea of Circuit Switching, as in the traditional telephone circuit, wherein a telephone call reserves a dedicated circuit for the duration of the communication session and communication is possible only between the two parties interconnected. With packet switching, a data system could use one communications link to communicate with more than one machine by collecting data into Datagram and transmit these as Packet onto the attached network link, whenever the link is not in use. Thus, not only could the link be shared, much as a single PostBox can be used to post letters to different destinations, but each packet could be routed independently of other packets. 1.3 SNA Systems Network Architecture (SNA) is IBMs proprietary Computer Network architecture created in 1974. It is a complete Protocol Stack for interconnecting Computer and their resources. SNA describes the protocol and is, in itself, not actually a program. The implementation of SNA takes the form of various communications packages, most notably Virtual telecommunications access method (VTAM) which is the mainframe package for SNA communications. SNA is still used extensively in banks and other financial transaction networks, as well as in many government agencies. While IBM is still providing support for SNA, one of the primary pieces of hardware, the IBM 3745/3746 communications controller has been withdrawn from marketing by the IBM Corporation. However, there are an estimated 20,000 of these controllers installed and IBM continues to provide hardware maintenance service and micro code features to support users. A strong market of smaller companies continues to provide the 3745/3746, features, parts and service. VTAM is also supported by IBM, as is the IBM Network Control Program (NCP) required by the 3745/3746 controllers. IBM in the mid-1970s saw itself mainly as a hardware vendor and hence all its innovations in that period aimed to increase hardware sales. SNAs objective was to reduce the costs of operating large numbers of terminals and thus induce customers to develop or expand Interactive terminal based-systems as opposed to Batch Processing systems. An expansion of interactive terminal based-systems would increase sales of terminals and more importantly of mainframe computers and peripherals partly because of the simple increase in the volume of work done by the systems and partly because interactive processing requires more computing power per transaction than batch processing. Hence SNA aimed to reduce the main non-computer costs and other difficulties in operating large networks using earlier communications protocols. The difficulties included: A communications line could not be shared by terminals whose users wished to use different types of application, for example one which ran under the control of CICS and another which ran under Time Sharing Option. Often a communications line could not be shared by terminals of different types, as they used different vernacular of the existing communications protocols. Up to the early 1970s, computer components were so expensive and bulky that it was not feasible to include all-purpose communications interface cards in terminals. Every type of terminal had a Hardwired Control communications card which supported only the operation of one type of terminal without compatibility with other types of terminals on the same line. The protocols which the primitive communications cards could handle were not efficient. Each communications line used more time transmitting data than modern lines do. Telecommunications lines at the time were of much lower quality. For example, it was almost impossible to run a dial-up line at more than 300 bits per second because of the overwhelming error rate, as comparing with 56,000 bits per second today on dial-up lines; and in the early 1970s few leased lines were run at more than 2400 bits per second (these low speeds are a consequence of Shannon-Hartly Theorm in a relatively low-technology environment). Telecommunications companies had little incentive to improve line quality or reduce costs, because at the time they were mostly monopolies and sometimes state-owned. As a result running a large number of terminals required a lot more communications lines than the number required today, especially if different types of terminals needed to be supported, or the users wanted to use different types of applications (.e.g. under CICS or TSO) from the same location. In purely financial terms SNAs objectives were to increase customers spending on terminal-based systems and at the same time to increase IBMs share of that spending, mainly at the expense of the telecommunications companies. SNA also aimed to overcome a limitation of the architecture which IBMs System/370 mainframes inherited from System/360. Each CPU could connect to at most 16 channels (devices which acted as controllers for peripherals such as tape and disk drives, printers, card-readers) and each channel could handle up to 16 peripherals i.e. there was maximum of 256 peripherals per CPU. At the time when SNA was designed, each communications line counted as a peripheral. Thus the number of terminals with which powerful mainframe could otherwise communicate is severely limited. SNA removed link control from the application program and placed it in the NCP. This had the following advantages and disadvantages: Advantages Localization of problems in the telecommunications network was easier because a relatively small amount of software actually dealt with communication links. There was a single error reporting system. Adding communication capability to an application program was much easier because the formidable area of link control software that typically requires interrupt processors and software timers was relegated to system software and NCP. With the advent of APPN, routing functionality was the responsibility of the computer as opposed to the router (as with TCP/IP networks). Each computer maintained a list of Nodes that defined the forwarding mechanisms. A centralized node type known as a Network Node maintained Global tables of all other node types. APPN stopped the need to maintain APPC routing tables that explicitly defined endpoint to endpoint connectivity. APPN sessions would route to endpoints through other allowed node types until it found the destination. This was similar to the way that TCP/IP routers function today. Disadvantages Connection to non-SNA networks was difficult. An application which needed access to some communication scheme, which was not supported in the current version of SNA, faced obstacles. Before IBM included X.25 support (NPSI) in SNA, connecting to an X.25 network would have been awkward. Conversion between X.25 and SNA protocols could have been provided either by NCP software modifications or by an external protocol converter. A sheaf of alternate pathways between every pair of nodes in a network had to be predesigned and stored centrally. Choice among these pathways by SNA was rigid and did not take advantage of current link loads for optimum speed. SNA network installation and maintenance are complicated and SNA network products are (or were) expensive. Attempts to reduce SNA network complexity by adding IBM Advanced Peer-to-Peer Networking functionality were not really successful, if only because the migration from traditional SNA to SNA/APPN was very complex, without providing much additional value, at least initially. The design of SNA was in the era when the concept of layered communication was not fully adopted by the computer industry. Applications, Database and communication functions were come together into the same protocol or product, to make it difficult to maintain or manage. That was very common for the products created in that time. Even after TCP/IP was fully developed, X Window system was designed with the same model where communication protocols were embedded into graphic display application. SNAs connection based architecture invoked huge state machine logic to keep track of everything. APPN added a new dimension to state logic with its concept of differing node types. While it was solid when everything was running correctly, there was still a need for manual intervention. Simple things like watching the Control Point sessions had to be done manually. APPN wasnt without issues; in the early days many shops abandoned it due to issues found in APPN support. Over time, however, many of the issues were worked out but not before the advent of the Web Browser which was the beginning of the end for SNA. 1.4 X.25 and public access Following on from DARPAs research, packet switching networks were developed by the International Telecommunication Union (ITU) in the form of X.25 networks. In 1974, X.25 formed the basis for the SERCnet network between British academic and research sites, which would later become JANET. The initial ITU Standard on X.25 was approved in March 1976. The British Post Office, Western Union International and Tymnet collaborated to create the first international packet switched network, referred to as the International Packet Switched Service (IPSS), in 1978. This network grew from Europe and the US to cover Canada, Hong Kong and Australia by 1981. By the 1990s it provided a worldwide networking infrastructure. Unlike ARPAnet, X.25 was also commonly available for business use. X.25 would be used for the first dial-in public access networks, such as Compuserve and Tymnet. In 1979, CompuServe became the first service to offer electronic mail capabilities and technical support to personal computer users. The company broke new ground again in 1980 as the first to offer real-time chat with its CB Simulator. There were also the America Online (AOL) and Prodigy dial in networks and many bulletin board system (BBS) networks such as The WELL and FidoNet. FidoNet in particular was popular amongst hobbyist computer users, many of them hackers and radio amateurs. 1.5 UUCP In 1979, two students at Duke University, Tom Truscott and Jim Ellis, came up with the idea of using simple Bourne shell scripts to transfer news and messages on a serial line with nearby University of North Carolina at Chapel Hill. Following public release of the software, the mesh of UUCP hosts forwarding on the Usenet news rapidly expanded. UUCPnet, as it would later be named, also created gateways and links between FidoNet and dial-up BBS hosts. UUCP networks spread quickly due to the lower costs involved, and ability to use existing leased lines, X.25 links or even ARPANET connections. By 1983 the number of UUCP hosts had grown to 550, nearly doubling to 940 in 1984 1.6 Uses of Computer Networks Computer networks have many uses in present life. However, the usage goes on increasing from day to day, More and more people use networks for their corresponding applications and thus increasing the area of usage. However, we categorize the usage of computer network as follows Resource Sharing: The global here is to make all programs equipment and especially data available to anyone on the network without regard to the physical location of the resource and the user. High Reliability: Always all the files could be replicated on one or more machine. So if one of them is unavailable the other copies could be used for the reference. Saving money: Small computers have a much better price / performance ratio than larger ones .Mainframes are roughly a factor of ten faster than personal computers, but they cost Thousand times more. This imbalance has caused many system designers to build systems Consisting of personal computers, with data kept on more than one machine Communication medium: A computer network can provide a powerful communication medium among widely separated employees. Using a network, it is easy for two or more people who live far apart to write a report together. When one person makes a change, the other can easily look into that and convey his acceptance. Access to remote information: Many People, pay their bills, manage their accounts, Book tickets, electronically. Home shopping has also become popular, with the ability to inspect the on-line catalogs of thousands of companies. There are also cases where people are able to get information electronically. Email: Electronic Mail or E-Mail is an application through which a person can communicate With another person present anywhere. E Mail is used today by millions of people and they Can send audio or video in addition to text. WWW (World Wide Web) : A main application that falls into the application category is access to information systems like the current World wide Web, which contains information about arts, books, business, cooking, government, health so on. 1.7. Data Transmission Modes: Data communication circuits can be configured in a huge number of arrangements depending on the specifics of the circuit, such as how many stations are on the circuit, type of transmission facility, distance between the stations, how many users at each station and so on. Data communication circuits can however be classified as either two point or multipoint . A two-point configuration involves only two stations, whereas a multipoint configuration involves more than two stations. Regardless of configuration, each station can have one or more computers, computer terminals or workstations. A two point circuit involves the transfer of digital information from a mainframe computer and a personal computer, two mainframe computers, two personal computers or two data communication networks. A multipoint network is generally used to interconnect a single mainframe computer to many personal computers or to interconnect many personal computers. Coming to transmission modes, there are four modes of transmission for data communication circuits namely- 1. Simplex 2. Half-Duplex 3. Full Duplex Simplex In a simplex mode, the transmission of data is always unidirectional. Information will be sent always only in one direction Simplex lines are also called receive-only, transmit-only, or one-way-only lines. A best example of simplex mode is Radio and Television broadcasts. Fig. 1.1 Simplex Communication Half-Duplex In the half-duplex mode, data transmission is possible in both the directions but not at the same time. When one device is sending, the other can only receive, and vice-versa. These communication lines are also called two-way-alternate or either-way lines. Fig. 1.2 Half Duplex Communication Full Duplex In the full-duplex mode, the transmissions are possible in both directions simultaneous, but they must be between the same two stations. Full-duplex lines are also called two-way simultaneous duplex or both-way lines. A good example for full-duplex transmission is a telephone Fig. 1.3 Full Duplex Communication Types of Data Transmission Modes There are two types of data transmission modes. These are: Parallel Transmission Serial Transmission 1. Parallel Transmission In parallel transmission, bits of data flow concurrently through separate communication lines. Parallel transmission is shown in figure below. The automobile traffic on a multi-lane highway is an example of parallel transmission. Inside the computer binary data flows from one unit to another using parallel mode. If the computer uses 32-bk internal structure, all the 32-bits of data are transferred simultaneously on 32-lane connections. Similarly, parallel transmission is commonly used to transfer data from computer to printer. The printer is connected to the parallel port of computer and parallel cable that has many wires is used to connect the printer to computer. It is very fast data transmission mode. 2. Serial Transmission In serial data transmission, bits of data flow in sequential order through single communication line. Serial dat transmission is shown in figure below. The flow of traffic on one-lane residential street is an example of serial data transmission mode. Serial transmission is typically slower than parallel transmission, because data is sent sequentially in a bit-by-bit fashion. Serial mouse uses serial transmission mode in computer. Synchronous Asynchronous Transmissions Synchronous Transmission In synchronous transmission, large volumes of information can be transmitted at a time. In this type of transmission, data is transmitted block-by-block or word-byword simultaneously. Each block may contain several bytes of data. In synchronous transmission, a special communication device known as synchronized clock is required to schedule the transmission of information. This special communication device or equipment is expensive. Asynchronous Transmission In asynchronous transmission, data is transmitted one byte at a time. This type of transmission is most commonly used by microcomputers. The data is transmitted character-by-character as the user types it on a keyboard. An asynchronous line that is idle (not being used) is identified with a value 1, also known as Mark state. This value is used by the communication devices to find whether the line is idle or disconnected. When a character (or byte) is about to be transmitted, a start bit is sent. A start bit has a value of 0, also called a space state. Thus, when the line switches from a value of 1 to a value of 0, the receiver is alerted that a character is coming.

Monday, August 19, 2019

Analysis of Do not go Gentle into that Good Night :: Do Not Go Gentle into That Good Night

"Do not go Gentle into that Good Night" is written in lyric style. The poem is written by Dylan Thomas who is expressing his thought’s and experiences of death. The title disclosed the poet’s thoughts about death and the importance of fighting to live life to the fullest. The poem speaks of different views of death from different people who all demonstrated one common struggle - to hold on to life. The poem is fairly short and the language is figurative. The poet uses simile to compare death to a good nigh. There is also foreshadowing is the first verse. The poet opens the poem with "Do not go gentile into that good night" which right away indicates that the poet is referring to not taking death lying down. The reader is given a sense of growing old. In the first stanza of the poem describe old age, "Old age should burn and rave at close of day" As you get old there is a daily struggle against death; you should fight for your life and take it day by day. In the second stanza the poet says "Though wise men at their end know dark is right, because their words had forked no lighting they don not go gentile into that good night" I thin what the poet is trying to say is even though you’re getting older and you know the time is coming you haven’t shown a sign of death you ‘re still have life so fight against death. Then in third stanza the poet describes someone w ho lived a good life but doesn’t want to let go "Good men, the last wave by, crying how bright their deed might have danced in a green bay, rage rage against the dying of the light." It was as if he was saying had he lived longer things could haven been better. In the fourth stanza " Wild men who caught and sang the sun in flight, and learn, too late they grieved it on its way, Don not go gentile into that good night. The poet is saying Sinners who led a bad life learn too late that they could have led a better life so they fight against death in hopes for a second chance. In he fifth stanza the poem talks of someone who has had a near death experience "Grave men, near death, who see with the blinding sight Blind eyes could blaze like meteors and be gay, rage rage against the dying of the light.

Sunday, August 18, 2019

Life: The Personal Experience :: essays research papers

Life: The Personal Experience   Ã‚  Ã‚  Ã‚  Ã‚  Who would have thought that a night out with a church group could turn into a deadly accident? En route to a spring break camp, one of our van was hit by a 18 wheelers' truck; creating a night we wouldn't forget.   Ã‚  Ã‚  Ã‚  Ã‚  The story began with a trip to summer retreat. It was ticket to bring me back to reality, and also tickets for some people to heaven. We loaded our luggage into the back of the vans, and we headed off toward our destination. It is about one or one and half hour later, one of our van stop at the stop sign, when the driver of that van saw no car was coming, (some blind spot cover the area that the driver can't see) he step the paddles and drive off, but a on coming truck was driving too fast and didn't saw one of our van, it crushes the van into three different pieces, everyone in our van saw it happened and everyone is shocked of that terrible scene. Few minutes later, the cops and the ambulances quickly arrived. We heard the loud noise come from the police and ask us to help them, we quickly got off the van and helping the fire fighters and the cops to pull people out of that vans, I saw lot of our church friend got burned to death and some other just crushed by Small pieces. Everyone is in tears including the police and fire fighters. After the rescue, we find out most of people in that van died, but some in serious condition. After that accident, I learned that life is meaningless, and learned that we should help others while we can. My goal was to let God into my life. It was one of the most relaxing and peaceful things I have ever done. Because we all inspired by God, he helps us when we really needed him. He brings us out of the nightmare that no one will ever forget. We gather all our church friend in a small meeting every Friday, every time we meet, we would have small group meetings and share anything that came to mind. We prayed for people to find God in their life, and for everything that needed assistance. We also planned the prayer service, meal plans, and chores for the next day. We saw God comes in our life and helps us while we have trouble of doing some stuff that we just cannot understand. He gives us power to think and solve the problem successively.

Servant Leadership :: Servant Leadership

The concept of servant leadership is one that many of today’s leaders struggle with, yet it is shown to be one of the more productive forms of leadership. The concept is really about the leader helping to grow their follower’s in a manner that involves empathy, listening skills, and compassion. Servant leadership is a way for leaders to connect with their teams and show that they understand the trials and tribulations that go along with the work. Think of an inverted pyramid. The leader is the point of the pyramid stabilizing the structure at its base. Servant leaders tend to create unique bonds with their team. This, in turn, makes them more productive than other leaders. As a result of the bond servant leaders are more in tune with the insights and necessary information that members of their team might possess or need to possess. While trying to ensure that their team members are successful, servant leaders become highly regarded and can benefit from this in the form of a more detailed understanding of the needs of their team for success. One consistent key to servant leadership is that information, knowledge, and opportunity needs to be passed along accordingly. Playing favorites is not a part of the equation in servant leadership. All team members are valued and information and assistance is doled out to everyone. There is no â€Å"Well I am a servant leader in this situation, but a power leader in others.† Servant Leadership is a mindset that should not have flexibility.

Saturday, August 17, 2019

Reflective Article Review – Sexual Harassment

According to a survey by Crocker and Kalemba (1999) in â€Å"The Incidence and Impact Of Women’s Experiences of Sexual Harassment in Canadian Workplaces†, sexually harassed women in the workplace has been considered a contentious social dilemma as half women in the workforce went through incidence of various types of sexual harassment at work which made sexual harassment as the most widespread form of female sexual victimization, 1,990 women divulged their sexual harassment experiences, responses and how it affected their work and personal lives; furthermore, this analysis hows the characteristics of female sexual harassment and its consequences at workplace; moreover, the results are used to discuss complications and the organizational power theory’s understanding of workplace harassment complications. Crocker and Kalemba (1999) first present a sexual harassment survey done by Fitzgerald et al (1988) in the late 1980s in which the survey explore specific issues pertaining to risk factors and women’s responses to sexual harassment at workplace. The study was considered as the largest Canadian survey describing 1,990 number of women hat participated about incidence and consequences of female sexual harassment in Canadian workplaces. Behaviours that are derogatory about women such as visual sexual materials are considered as gender harassment (542). Furthermore, verbal and non-verbal treatment are described as unwanted sexual attention while bribery or intimidation to gain sexual favours are part of sexual coercion (542). Victims of workplace sexual harassment go through feelings of job dissatisfaction,absenteeism, nervousness, anger, irritability, low self-esteem and increased stress level (543). Thacker and Gohmann (1996) research findings showed workplace sexual harassment are worst in male dominated settings that involved supervisor sexual harassment, sexual coercion and long term sexual harassment (543). The authors pointed out that organizational power theory pertains to workplace superiors harassment of subordinates and how employees are vulnerable to be sexually harassed due to their superiors authority to be in control of their subordinates work situations such as salary factor (543). The authors explained that contact theory illustrates the ill effects of exual harassment incidents in workplaces; thus, sexually harassed employees suffered more negative effects in male dominated work environments (543). Moreover, the authors described positive control theory as the positive relationship between the length of sexual harassment and ill feelings which means that failure to control the situation as time goes on makes a sexually harassed victim feels worse (543). However, the authors mentioned that sexual coercion has the worst effects and most recognized form of sexual attention (543). Victims of sexual harassment in workplace responded in ifferent ways such as confronting or ignoring their harassers, discussing the problem with a superior and filing an official complaint which is very uncommon (543). Victims of sexual harassment tend to confront their co-workers but not their superiors for fear of job loss or complaints consequences against someone with authority at work (544). There are several factors why targets of sexual harassment respond differently; consequently, sexual harassment is being viewed as a stressful life situation in order to conceptualize the way victims respond to sexual harassment (544). The sampling method conducted by female interviewers through telephone interviews performed in 1992 consisted of 1,990 Canadian working women between 18 and 65 year old, who were working or had worked in the past year at paid labour outside the home (544). The survey showed that 56% of Canadian working women were victims of sexual harass- ment in the previous year prior to the survey while the total working life rate was 77% (545). According to the survey, staring, remarks about women and jokes about the respondents were the top three form of sexual harassment while attempted physical orce, threats and bribery were the least frequent incidents of sexual harassment in the workplace (545). However, the survey showed that women were upset in all forms and frequency of sexual harassment in the workplace. Furthermore, the survey showed that gender harassment was the most common type of sexual harassment compared to non- verbal and verbal unwanted sexual attention and sexual coercion was t he rarest form of sexual harassment (546). One-third of the women reported that sexual harassment affected their job, 45% of the women reported an increased stress level, 48% indicated eing unable to perform their jobs and 14% reported personal obstacles such as preoccupation, stress at home and loss of trust in men (548). Job and personal effects were related to the type of sexual harassment and status of the harasser (548). The survey showed women harassed coercively reported more job –related and personal problems than women sexually harassed by co-workers (548). Gender harassment was only related to job effects and did not show a high level of job-related or personal effects while a bigger proportion of women reported more job-related problems in emale dominated environment than male dominated or gender-balanced work environment (548). Women react to sexual harassment directly by reporting, opening up to someone or confronting the predator at the same time women respond equally through indirect reactions such as be ing unresponsive, ignoring the problem, not taking sexual harassment seriously, avoiding the situation or altering own’s attitudes. The survey showed that women confront their co-worker harassers compared if harassed by others. In addition, women react differently when harassed by superiors such as leaving or quitting and retaliating when harassed by clients (550). The authors point out results of this survey that shows few women reported significant work related or personal issues and fairly direct responses to sexual harass- ment that are in contrast with the psychological literature that illustrates adverse effects and indirect responses (552). The findings does not contradict psychological literature and should not be perceived that sexual harassment is not a serious problem since a big percentage of working women reported worried of experiencing being sexually harassed. The authors reliazed that the inaccurate findings and the psychological literature n effects might be due to the way questions were asked and could have received an elevated emotional issues if a psychological instrument was asked. Furthermore, the authors find it hard to assume why the participants in the survey reported assertiveness and direct responses while psychological literature focuses on passive and indirect responses. The findings of the survey did not support the contact theory that the authors presented such as the ratio of male and female in the workplace, level of contact with male related to effects and a higher proportion of women who responded bout job performance being affected worked in a female-dominated environment (553). This contradicts Thacker and Gohmann’s (1996) predictions about contact theory and findings that they presented. However, the organizational power theory was well supported with the findings that more adverse effects and passive responses associated with harassment committed by a superior or someone with authority in a workplace. Women respond directly if harassed by their co-workers and more likely quit their Job when harassed by superiors ; thus, this shows that women avoid confronting their superiors. I do not find the article informative enough because the survey done was very limited in nature. For example, they are only focused on determining effects and responses of Canadian working women in male dominated settings and if they included women sexually harassed by fellow women as I think this is possible too, then the survey could have been more concise and interesting to read. Another thing is that they did not describe the ethnicity of these women who participated in this survey. I had read other articles about sexual harassment and different women with various ethnicity responds ifferently from each other about how sexual harassment affects them. I found out from other articles that women with colour are not as assertive and willing to share about their experiences as Caucasian women due to their culture and their residency status in Canada. Sexual harassment is a social issue that needs to be addressed for the protection and safety of all women of colour. Any woman does not deserve to be sexually harassed in any kind of form of harassment. Furthermore,women should voice their concerns and seek help if they fear for their safety especially in public places or at workplace.

Friday, August 16, 2019

Pride and Prejudice by Jane Austen Analysis Essay

Introduction In the novel Pride and Prejudice Jane Austen identifies the key components of successful marriage – love, tolerance, affection and financial stability. The whole novel is written to underline the importance of marriage which shouldn’t be based on social status, wealth or affection of the youth. For her time the author was very radical as she strongly defended marriage for love, whereas in those times it was prestigious to marry for financial stability and social status. Through her characters – Elizabeth, Mrs. Bennet and Mr. Darcy – she shows the right and wrong attitudes towards the ideal marriage. Elizabeth and Mr. Darcy represent true love and true relationships, whereas Mrs. Bennet is motivated only by wealth when she decides to get her beloved daughters married. Through characters Austen makes readers believe that love and happiness can’t be bought. Character Analysis Mrs. Bennet is characterized as a miraculously tiresome character. Moreover, she is frivolous and too foolish. Mrs. Bennet is an irritating woman who becomes obsessed with idea to get her daughters married simply to improve her financial stability and social status as after her husband’s death she has been refused certain social entertainments. She cares for nothing in the world except money. Austen is willing to show that Mrs. Bennet does lack sense of virtue and property, and, what is more awful, she is not interested in intellectual and emotional education of her five daughters. Mrs. Bennet affects the attitudes of her younger daughters – Lydia and Charlotte Lucas – towards marriage. Mrs. Bennet is very pleased when Lydia gets married to an officer and she never reproaches her for shameful behavior. However, she can’t be blame as she was married only for beautiful appearance and she didn’t see another life. I think the author introduces Mrs. Bennet to highlight the necessity of marriage for young ladies. In contrast to Mrs. Bennet the author introduces the character of Elizabeth to show true virtues and necessity of love and happiness. Elizabeth is the most quick-witted and intelligent. Moreover, Elizabeth is clever, lovely and brilliant. Her positive character traits enable her to rise above shameful conduct of her mother and sisters. Elizabeth is strong enough to overcome all difficulties and to get married for love, not for financial stability or higher social status. Elizabeth is entailed with sharp tongue and ability for hasty judgments. She is the only character who manages to make Darcy love her for personality and who overcomes the power of prejudice: â€Å"My feelings will not be repressed. You must allow me to tell you how ardently I admire and love you†. (p.35) We see that Elizabeth has pride in her abilities to express herself and to perceive the truth. Mr. Darcy is one more positive character in the novel who overcomes prejudice and finds his true love – Elizabeth. Mr. Darcy is a wealthy aristocrat being extremely conscious of class differences.   Nevertheless, he has sense of virtue and honor. Firstly, he is not interested in Elizabeth saying that â€Å"she is tolerable; but not handsome enough to tempt me; and I am in no humour at present to give consequence to young ladies who are slighted by other men†. (p.13) However, with novel progression his character transforms and he recognized his faults of prejudice and pride. His character affects the novel as, despite high social status and wealth, he manages to overcome prejudice and to show that marriage should be based on love. He proves that a man should love women for her intelligence and personality, not only for beautiful appearance. Conclusion Mrs. Bennet, Elizabeth and Mr. Darcy affect the novel in different ways. Mrs. Bennet symbolizes misconception of true marriage as she is obsessed with financial stability and social status. Elizabeth and Mr. Darcy represent true virtues in the novel as they teach others that marriage should be grounded on love, happiness, and attraction. Works Cited Austen, Jane. Pride and Prejudice. UK, London: Penquin Books, 2005.

Thursday, August 15, 2019

Is it fair to blame investment bankers for the global downturn? Essay

It seems to be quite easy to jump on the ‘bank-wagon’ and blame investment bankers for the current global economical downturn. The current downturn in question is one which is generally accepted by the financial industry to have started in 2007, and was officially dated December 2007 by the National Bureau of Economic Research (NBER).The question is, whether this industry and its bankers are the root cause, and if so, could they have avoided it? The word ‘bankers’ can imply different meanings to different people, so to clarify, when I use the word ‘bankers’ in this text, I am referring to investment bankers. The first article I analysed is by Jonathan Wang, Ph.D., and entitled ‘Real Causes For US Financial Meltdown and Global Recession’ (March 2009). Wang is the President of Amlink, a multi-million dollar company which provides links in trade and politics between China and the United States of America (USA). He is based in Michigan, USA. I will be comparing it to John Gapper’s ‘Promises that proved ultimately empty’ (January 9th 2012)[1]. Gapper is the assistant editor and chief business commentator for the Financial Times newspaper and website. He is based in New York, USA. Wang has an opinion that the bankers are unaccountable as the blame is with the governments whereas Gapper has an antipodal view in line with the assessment Wang gave, stating ‘it was within banks where the crisis emerged and where its heart still lies’. Wang seems to have a widespread knowledge of many fields. He has a Ph.D in geosciences from the University of Michigan. Geosciences have no relevance to economist articles on the banking industry but this Ph.D allowed him the expertise to start Amlink a year later, as he originally focused on importing and exporting high quality marble between US and China. He increased his links with the two countries by giving financial & trade advice (business consulting), intervening in politics, research & development, manufacturing and IT services. This how we gained his expertise. This expertise of 19 years strengthens his perspective as he has gained the relevant knowledge and skills to talk about this topic with credibility. However, his trade is between (mainly) US and China thus may so it is questionable to whether his experience can be applied to Europe, where many economies collapsed, such as Greece. Gapper currently works for the Financial Times (FT) since 1987, an international daily broadsheet newspaper and website, available in 24 countries. They have a daily readership of 2.1 million and 5.7 million online subscribers. His position is associate editor and chief business commentator. He was trained by the Mirror Group and worked for the Daily Mirror, Daily Mail & Daily Telegraph newspapers in the United Kingdom. Additionally, he has worked as columnist for the BBC, UK & Worldwide. His resume also lists New York Magazine, CNBC & CNN among his employers. This striking list of employers may show, at first glance, that he is not politically bias possibly leading him to be known as a highly reputable columnist. the Conservative Party, one that is centre-right; The Daily Mail is also a Conservative supporter; and However, his political stance may be more Conservative as the FT is a public supporter of the Daily Telegraph has been nicknamed the ‘Torygraph’ due to its support of the Conservative party. He has previously worked for politically independent media but his main contract of employment has been with FT since 1987. This political bias may narrow his perspective. Additionally, in 2011, he won four awards in multiple countries. In the United States he was awarded the Best Columnist Citation by the Society of American Business Editors & Writers; and in the UK he was award with the Best Business Columnist at the Comment Awards. He also has a degree in Philosophy, Politics and Economics from Oxford University. Both articles have strengths and weaknesses, and it is better to analyse these sections rather than attacking the author (ad hominem). The chain of argument in both articles has been constructed quite rigidly, and allows the statements made by the respective authors to reach their necessary conclusions. Wang concludes that increasing tax on the top income groups becomes necessary as the government must focus on stabilization rather than expansion. His main reasoning for this is ‘when the share of total income going to [the] top 10% reached 50%, the capital market crashed in the United States’. He also has an intermediate conclusion that the ‘Government’s improper interventions in the capital market before both episodes of crisis had accelerated the extreme inequalities and ultimately intensified the crisis.’ Wang reasons that ‘It is the extreme inequality that has resulted in the great depression in 1929 and again caused the global recession today’. This is fallacy of the single cause as the recession in 1929 has three are three general theories on what caused the 1929 depression, Keynesian, Monetarist & Austrian. None of these theories are based on inequality. The Monetarist view blamed the Federal Reserve for ignoring the importance of money, who themselves agreed with this and apologised on the 8th of November 2002 via Chairman Ben Bernanke[2]. It may be that the recession is part of the business cycle, and happens quite frequently whereas a depression is a sustained, long term economical downturn. The NBER stated that ‘The expansion [from November 2001 onwards] lasted 73 months’ which then strengthens Wang’s reason that ‘two major economic expansions led to two episodes of extreme inequalities in the United States. Both ended in severe economic depression.’ [3]Elizabeth Allgoewer (2002) states that this was the cause of the Great Depression, however the true cause is still being debated by economists, with around a dozen other heterodox economical theories such as non-debt inflation or population dynamics. His reasoning here needs further clarification or research before this can be fully taken as evidence. Gapper states that ‘driven by the rise of derivatives, the loosening of regulation and capital standards, and a hubristic belief that they had somehow broken their old habit of losing billions of dollars in downturns’. He does not strengthen this with any evidence on the ‘loosening of regulation’ etc., and deserted his statement. He also quotes credible sources such as Ranu Dayal, senior partner at the world’s leading advisor on business structure, the Boston Consulting Group – ‘There is a deep question of legitimacy that banks need to face up to’. However one of his sources is credited as being a Professor but in fact he is only an Associate Professor, a position which still has very high credibility, but of less than the one quoted by Gapper. Also, Gapper does not give any conflicting perspective, the only views you read are the ones that agree with him. This weakens his argument as he has not considered alternative perspectives. After analysing both articles, my view is still similar to Gapper and I already thought that it was fair to blame investment bankers for the 2007 downturn. Whilst I note that they dealt with a lot of money and it was not handled in a correct manner by anybody who had access to it (including the Federal Reserve), I also can see where Wang‘s concept bases its format. His perspective of social inequalities is only US based but I can understand his assumptions that expansion was high and the consequence of this led to social inequalities. This has happened elsewhere, such as during the Chinese Mao era of 1949-1976, in particular during the Great Leap Forward (1958-61). Gapper’s perspective has persuaded me that he is of more expertise than Wang as he is so influential in finance media. His analysis was concise and constructive. He quoted many important figures in his article including an executive director of the Bank of England; Chairman of the Financial Services Authority; and a Professor of Entrepreneurship at MIT Sloan school. His arguments are quite strong however he does go a stage of a circular argument where he should be concluding his article. His evidence did strengthen my perspective however Wang’s comments led me to read more into financial theories, especially of those surrounding the 1929 Great Depression. He managed to intrigue me into the history of the financial world and I do believe that 1929 and 2007 are very similar in the cause, but the cause is the banking industry, not the housing market. Wang has only commented on the United States but his views may apply worldwide however his lack of evidence weakens his perspective as it is too narrow. My final conclusion is that investment bankers were the major, not the only, cause of the global downturn which started in 2007, and we have to share the blame for the current economical state