Thursday, December 26, 2019

The Effect Of Telehealth On The Language And Communication...

Introduction Telehealth, also referred to as telepractice, is defined as â€Å"the application of telecommunications technology to the delivery of speech language pathology and audiology professional services at a distance by linking clinician to client/patient or clinician to clinician for assessment, intervention, and/or consultation† (American Speech-Language-Hearing Association [ASHA], 1997). Healthcare personnel use telehealth practices to treat or assess disorders via technology, such as video or webcams, rather than treating patients face-to-face. Speech-language pathologists (SLPs) may use this method to treat a variety of delays and disorders, including stuttering, apraxia, lisps, and others. This paper will explore the use of telehealth in treating the language and communication delays that accompany Autism Spectrum Disorder (autism), specifically in children. Autism Spectrum Disorder is â€Å"a complex developmental disability, typically appearing during childhood and affecting a person’s ability to communicate and interact with others† (Autism Society, 2016). Autism is typically diagnosed in childhood and affects the individual into adulthood. Description of Childhood Autism Diagnoses of autism have increased rapidly over the last ten years, and continue to do so, making affordable and effective treatment for the developmental disorder crucial. Statistics report that â€Å"about 1% of the world is on the Autism Spectrum; prevalence in the US is about 1/68 births, prevalence

Wednesday, December 18, 2019

Media s Influence On Society - 1269 Words

The media is full of countless things, it has completely changed the world and is now a part of our everyday lives (Bookman, 64). With television, radio, newspapers, books, etc†¦ working their way into our everyday lives it is impossible to live without the media today. Along with it being persuasive, informational and a great source for entertainment it also has a large binding influence on societies all over the world. Media aspects are radically reshaping the world (Marina 240) and though some may argue that media has more negative aspects associated with it, there are many positives to it as well. One of the positive aspects of the mass media is the binding influence associated with it and how it is changing our society making the world one large global village — the world as a single community. We now see everything everywhere and it is causing the world to change in the way that people are adapting to new cultures they may not have even known about in past decades. Media has â€Å"the capacity to influence people’s minds† (Castells, 240) in thousands of ways. Television, radio and newspapers are just the beginning of a large list of mass media devices we encounter in a day. We are now exposed to more information than anyone before us could imagine. Society has changed drastically in past decades, â€Å"A few years ago hope for the internet was a utopian† (Wellman, 56) and today most cannot go a day without it. The mass media has changed the world we live in, in many differentShow MoreRelatedThe Media s Influence On Society1462 Words   |  6 PagesThe media s the most powerful entity on earth. They have the power to make the innocent guilty and to make the guilty innocent, and that s power. Because they control the minds of the masses† (Ruddy, 2002). Malcolm X, a prominent African American human rights activist, strongly believed that the media played a vital role in how they make society perceive events and peop le. An issue that is present, historically and currently, is media contributing to racism. When news is reported involvingRead MoreMedia s Influence On Society1454 Words   |  6 PagesThe Media’s Chokehold The media s influence on society is suffocating and undeniable. Body image has become overwhelmingly present in most media today. The front cover of a magazine may critically exclaim â€Å"so-and-so has cellulite† or â€Å"so and so is too thin†. Popular reality stars like Nicole Polizzi (otherwise known as â€Å"Snooki†) have been criticized for being to large and then criticized for being too thin after dropping the weight. The media teaches people to be unsatisfied with their bodiesRead MoreMedia s Influence On Society1256 Words   |  6 PagesThe media are full of countless things, they have completely changed the world we live in and are now a part of our everyday lives (Bookman, 64). With television, radio, newspapers, books, etc†¦ working their way into our everyday lives it is almost impossible to live without the media. Along with it being persuasive, informative and a great source for entertainment, it also has a large binding influence on societies all over the world. Media aspects are radically reshaping the world (Marina 240)Read MoreMedia s Influence On Society1293 Words   |  6 PagesMedia is a major contributor of how social groups are perceived in today’s society. Mediais around us every day almost all day, and it constantly sends messages about the world’s environment. There are many indicators shown pertaining to how media really affects society. One of the most prominent explanations of those questions is the way media influences stereotypes. There has been previous research linking media sources and biased attitudes. This research paper explores articles supporting mediaRead MoreMedia s Influence On Society Essay1250 Words   |  5 Pagescapitalist society the United States has developed a media centered culture. Society has been influenced tremendously by mass media it seems as if it has become a necessity in life. Nine DVDs worth of data per person every day is the amount of all media de livered to consumers whether it be visual or auditorial on a daily basis. As consumers and technology develop that number will continue to increase because of the multi-tasking abilities that will be created (Zverina 13). The hold media has on societyRead MoreThe Media s Influence On Society1654 Words   |  7 PagesMass media is perhaps the most powerful tool in the world for creating, changing or perpetuating society’s ideas about an issue or group of people. It works both blatantly and subconsciously by deciding which issues are important, how to frame those issues, who to show as affected by them, and, increasingly, providing personal commentaries on the matters at hand. Because the majority of media outlets are owned by corporations dominated by white heterosexual men, many minorities are portrayed in waysRead MoreMedia s Influence On Society1475 Words   |  6 PagesMass media has affected our view as a society on social class and what defines one’s social clas s. Throughout this article called â€Å"Making Class Invisible† by Gregory Mantsios, we evaluate the influence media has on our society and as Mr. Mantsios states how â€Å"media plays a key role in defining our cultural tastes, helping us locate ourselves in history, establishing our national identity, and ascertaining the range of national and social possibilities† (para. 1). Our social class determines whatRead MoreThe Media s Influence On Society1560 Words   |  7 Pagesare. How many times have we heard this, yet we live in a society that appears to contradict this very idea. If looks don’t matter then why do women and girls live in a society where their bodies define who they are? If looks don t matter then why is airbrushing used by the media to hide any flaws a person has? What exactly is causing this, why do we feel like we are just not beautiful the way we are? Its the media. It’s because the media promotes a certain body image as being beau tiful, and it’sRead MoreThe Media s Influence On Society1416 Words   |  6 Pagesâ€Å"The media s the most powerful entity on Earth. They have the power to make the innocent guilty and to make the guilty innocent, and that s power. Because they control the minds of the [people]† (Malcolm X). The message of this Malcolm X quote is that society can control the mind of the individual. This is true. For many years, society has influenced everyone worldwide both negatively and positively. That is because society has the ability to control the individual’s decisions. They can controlRead MoreThe Media s Influence On Society2776 Words   |  12 Pagessee many images in the media and they suggest what we should be like. While the media says how we should act or look, these suggestions invade people’s thoughts. The images the media portrays make it hard to break out of socially constructed stereotypes in our lives. The media reflects dominate and social value s of people’s lives. The media also portrays gender by creating stereotypes and gender roles showing how men, women, and transgenders are seen as deviant. In the media, men are portrayed to

Tuesday, December 10, 2019

Changes in Women ; Marraiage Essay Example For Students

Changes in Women ; Marraiage Essay Changes in Women and Marriage- Changes in Women and Marriage- Abstract This paper presents an in-depth discussion about the changing relationship between women and marriage. Economic factors, a rise in feminism, parents influence, attitudes about sex, educational pursuits, and divorce statistics are discussed and their influence on womens attitudes toward marriage are explored. Cultural changes that have impacted womens lives are also examined. The purpose of the paper is to explore the changes affecting women, their attitudes toward marriage, and their expectations of marriage. This paper will primarily concentrate on the question of why women delay marriage. The sources used to develop this paper are published journals, the text for this course along with other books related to this issue, and the Internet. The Changing Relationship Between Women and Marriage Over the past four decades there has been substantial changes in the attitudes toward marriage among women in the United States. These attitudes relate to gender roles and social changes in todays society and have contributed to women marrying later than their ancestors married. Studies show American women are waiting longer than ever to get married. Their median age at first marriage hit a record high of 24. 5 years in 1994, up from 20 years in the mid 1950s (Crispell, 1996). Thats the oldest age since the Census Bureau started to ask about age at marriage in 1890. Of course postponing marriage means an increase, at any given time, in the number of people who have never wed, and that is also reflected in the census study. From 1970 to 1994 the number of Americans aged 18 and over who never married more than doubled from 21. 4 million to 44.2 million. Additionally, women may be less likely to marry in the future. Projections show the proportion of never married women increasing between 1992 and 2010 for all age groups under 55 (Crispell). According to Allen Kalish (1984), the timing of a first marriage is related to the attractiveness of the alternatives to marrying. When women value roles that provide viable alternatives to the role of wife, they delay marriage. The role of women has undergone significant transformation brought about by changes in society. Todays families are smaller and live longer, thereby allowing women to devote a smaller part of their lives to raising children than was the case in earlier times (Allen ; Kalish). Thus, more time is left for other pursuits. A woman who enters her first marriage at an older age is less likely to exchange dependence on her parents for dependence on a husband (Unger ; Crawford, 1992). Elder (1974) found that women who married later were more likely to have careers, financial stability and be middle class as opposed to lower class background. What has transformed societal attitudes toward marriage so that young women delay it, older women get out of it, and some women skip it altogether? Economic factors, a rise in feminism, parental influences, attitudes about sex, educational pursuits, and the divorce rate have all undergone significant cultural changes and are among some of the reasons being credited for influencing the ideas women have about marriage. Lets examine these influences and the attitudes of women which determine their decision to marry or delay marriage. We will also examine the expectations of marriage that todays educated women may have and how these expectations differ from other womens expectations. Economic factors have resulted in women working outside the home, and have had a strong influence over a womans decision to marry. The ever increasing opportunities for women to work outside the home make her less and less dependent, economically, upon a husband (Casler, 1974, p. 30). Late marrying women indicated that careers took relative precedence over marriage during the period of their lives when their less achievement oriented peers were opting for marriage (Allen ; Kalish, p. 141). Women now in the labor market want more than just a job, and therefore, actively pursue a career. Between 1969 and 1979, for example, percentages of women endorsing wanting to be an authority in my field increased from 54.3% to 70.5% and in 1979 were only 4.8% lower than the percentage for men. Women endorsing wanting to raise a family declined in these years from 77.8% to64.8% which equals the percentage for men. (Long, 1983). Beckers (1981) theories of marriage and family behavior hypothesize that womens increasing labor force participation has had a critical and presumably irreversible impact on the family. If half of all marriages are to fail, and with alimony for ex-wives less common, a woman cannot count upon marriage for a lifetime of economic security (Allen ; Kalish). Mens economic status has substantially deteriorated since the 1970s (Oppenheimer, 1994). The median income of men aged 25 to 34 fell by 26% between 1972 and 1994 (Koontz, 1997). The institution of marriage underwent a particularly rebellious and dramatic shift when women entered the work force. People dont have to stay married because of economic forces now . . . we are in the midst of trying to renegotiate what the marriage contracts is what men and women are suppose to do as partners (Gleick, 1995). Studies show the lowest marriage rate of all is for women professionals (i.e., doctors, lawyers). While over three-fourths of all women in the United States aged 35 to 39 are married, fewer than two thirds of these are professional women. Further, when they do marry, professional women are more likely to divorce than their age peers. As for childbearing, these women have significantly fewer children than their nonprofessional counterparts, when they have children at all (Allen ; Kalish). In the case of having children Oppenheimer argues that the major component of the cost of children is the indirect cost the cost of the mothers time (p. 295). A rise in feminism is credited for being another strong influence in womens lives. Feminism movements, with emphasis upon educational and vocational achievements for women, seem to encourage departure from traditional sex roles which were chiefly organized around marriage and children, and toward more extensive careers for women, especially those who are well educated (Becker). Even though not all young women label themselves feminists, the idea that women can and should have aspirations other than wife and mother has been widely accepted (Unger Crawford, pg. 364). While it is true the womans movement has made significant progress in its attempt to equalize opportunities, the situation continues to be blatantly unjust. It has been said that marriage diminishes man, which is often true; but almost always it annihilates woman (Casler, p. 30). Jubilee Year Essay In the 21st century, men will remain more married than women because of the surplus of adult women in all but the under age 25 group (McLaughlin). Gottman found that a major complaint of divorced women was that their ex-husbands had the majority of power. Moreover, it is still overwhelming women, not men, who are called upon to adjust their work lives to the demands of child rearing by quitting their jobs, working part-time or choosing a flexible job over one that offers higher pay (Cherlin, 1990). Women are also showing less patience with problem marriages as growing numbers unravel the marriage bond with divorce. The decline in the ideal of marital permanence one of the most well documented value changes among Americans in recent decades also has tended to make persons less willing and able to make the needed commitments to and investments in marriage (Gleick, 1993, p. 28). While entering into marriage with the utmost care and deepest consideration can only be to the good, it may be marriage itself along with the most basic institutions like the work place that continues to need refining (Gleick, p. 28). Todays women, all too aware of the current divorce numbers, may be hesitant to enter into marriage. I would say were in a stalled revolution . . . women have gone into the labor force, but not much else has changed to adapt to that new situation. We have not rewired the notion of manhood so that it makes sense to men to participate at home (Gleick, pg. 56). Many married women report although their role has changed when they entered the work force, men primary have kept doing what they have always been doing, thus, putting additional burdens on women (Gleick). However it seems that it is not the increased workload itself but rather the increased inequality that makes mothers less satisfied with their marriages than nonmothers (Unger Crawford, pg. 375). Men are making some progress though, in taking on household tasks, including child care, but women still shoulder most of the burden in families. One of the most likely reasons for the decline in marital success is an increase in what persons expect of marriage. The levels of intimacy, emotional support, companionship, and sexual gratification that people believe they should get from marriage differ because of the breakdown of what it means to be husband or wife. Whereas, until recently, the rights and obligations of spouses were prescribed culturally and fairly well understood by just about everyone, they have become a matter for regulation in the individual marriages for some this has led to discord and disappointment (Gleick, p. 26). Altogether then, cultural changes related to sex roles would seem to produce different expectations of marriage. A woman who has supported herself to the age of 25 or above and has lived on her own until that age has had time to get more education, be exposed more to a variety of view points and experiences, and therefore, is more likely to expect a peer relationship with her husband. All in all, she is more likely than a younger woman to enter marriage with a well developed sense of self worth and broad horizons for her life (Unger ; Crawford, pg. 364). Compared with a woman who marries younger she is more likely to expect a more traditional relationship in which the husband is dominant (Everett, 1991). According to Everett, younger women expect greater communication, companionship, and compatibility with their spouses than older women. Possibly younger women, still maturing, have not yet developed their own sense of self worth and, therefore, depend on their spouse to fulfill their needs of worthiness. As opposed to older women who, in most cases, have a more stronger sense of self worth. The traditional bargain struck between men and women financial support for domestic services is no longer valid. Women have shown outstanding improvements in education, and played a major part in the work force. With education and occupation in their hands, women do not need to rely on men for economic support, thus marriage is not an immediate concern anymore. However, it should be noted that when both husband and wife are employed the marriage is given an economic boost. Nonetheless, all of these changes have spurred women to greater autonomy. Each has affected marriage in a different way, but all have worked in unity toward the same result to make marriage less urgent and more arbitrary. Marriage may change for the better if people are committed to making the institution work, although in a new format. Still, studies show young adult women still care about marriage enough that the conflict between work life and family life remains intense. Its resolution remains a major issue on the public agenda for the future. ReferencesAllen, S. M. Kalish, R. A. (1984). Professional women and marriage. Journal of Marriage and the Family, 46(5), 375-382. Becker, G. S. (1981). A Theory of Marriage: Marriage, Children and Human Capital. Chicago, IL:University of Chicago Press. Casler, L. (1974). Is Marriage Necessary? New York:Human Sciences Press. Cherlin, A. (1990). The strange career of the Harvard Yale study. Public Opinion Quarterly, 54, 117-124. Chollar, S. (1993). Happy families. American Health, July/Aug., 52-57. Crispell, D. (1996). Marital Bust. On-line. Available:http://www.marketingtools.com Elder, G.H. (1974). Role orientation, marital age, and life patterns in adulthood. Merrill-Palmer Quarterly of Behavior and Development, 18(1), 3-24. Everett, C. A. (1991). Marital Instability and Divorce Outcomes. Binghamton, NY:Haworth Press. Gleick, E. (1995, February 7). Should this marriage be saved? Time, 48-53, 56. Gottman, J. M. (1994). What Predicts Divorce? The Relationship Between Marital Processes and Marital Outcomes. Hillsdale, NJ:Lawrence Erlbaum Associates Publishers. Koontz, S. (1997). The way we werent. National Forum, (75), 11-14. Long, B. (1983). Evaluations and intentions concerning marriage among unmarried female undergraduates. The Journal of Social Psychology, 119, 235-242. Lundberg, S. ; Pollack, R. A. (1996). Bargaining and distribution in marriage. Journal of Economic Perspectives, 10(4), 139-158. McLaughlin, S. D. (1988). The Changing Lives of American Women. Charlotte, NC:University of North Carolina Press. ONeill, W. (1989). Feminism in America: A History. Princeton, NJ:Transaction Publishers. Oppenheimer, V. K. (1994). Womens rising employment and the future of the family in industrial societies. Population and Development Review, 20 (2), 293-337. Unger, R. ; Crawford, M. (1992). Women ; Gender: A Feminist Psychology. Philadelphia:Temple University Press.

Monday, December 2, 2019

The Handsomest Drowned Man in the World free essay sample

The Handsomest Drowned Man in the World by Gabriel Garcia Marquez opens with a group of children playing on the beach of a small fishing village. In the waves, a shadowy, mysterious bulge approaches on the shore. It turns out to be a drowned man, covered in seaweed, stones, and dead Sea creatures. The men head to neighboring villages to see if the dead man belongs to one of them. Then, the women clean off the body and prepare him for his funeral. PART II – Thesis About a Thematic Idea or Subject From the Text The short story explores the ways in which human beings overcome personal isolation through their unified community. In this story, common beliefs in the peculiar bring together the members of a small fishing village. The men, women, and children of this community are strengthened by their common desire for self-improvement. Together, they imagine a better future for themselves, a future in which they are as extraordinary as the myths in which they all believe. We will write a custom essay sample on The Handsomest Drowned Man in the World or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The women stayed behind to care for the drowned man â€Å" (Marquez 127). â€Å"’They thought that if that magnificent man had lived in the village†¦Ã¢â‚¬â„¢he could have drawn fish out of the sea simply by calling their names’†(Marquez 128). â€Å"’They secretly compared him to their own men†¦Ã¢â‚¬â„¢they ended up dismissing them deep in their hearts as the weakest, meanest, and most useless creatures on earth’†(Marquez 128).

Wednesday, November 27, 2019

Prescribing event The WritePass Journal

Prescribing eventï » ¿ Abstract Prescribing eventï » ¿ ). Moreover, the student has thoroughly explored patient’s past medical history, family history and social history by relying on the cooperation of patient’s husband. Specific question were asked in order to determine patient’s susceptibility to chronic pain and injury. Patient’s exposure to hazards has been determined is minimal considering that the bed bound woman is a non-smoker (Marcum et al., 2010). In this case, the student nurse has decided to prescribe 50-50 Paraffin cream. As part of the medication assessment in the prescribing event, the student asked patient for allergies. However, no allergies were mentioned by client at that point. Other aspects of considering patient’s holistic needs included clinical investigations and physical examination. The student measured patient’s temperature and took a swab for microbiological analysis (Bradley et al., 2007). The physical examination involved careful physical assessment of the wound and wo und’s area. Decision Making and Actions Taken P. and Tissue Viability Nurse referral has not been indicated because the student nurse has confirmed that the diagnosis is clear and does not need referral. This means that there are no any severe aspects related to patient’s diagnosis. In the decision making process of the student district nurse, certain considerations have been made in an attempt to reach a relevant prescribing decision (Bradley et al., 2007). By concluding that patient’s wound is simple and lacks any signs of severity, the student concluded that the selection of a primary dressing and Allevyn Gentle Border as a secondary dressing is justified because it is evidence-based (Junqueira and Carneiro, 2005). Patient expectations for a fast recovery of the wound have been thoroughly considered by the nurse while making that particular decision for administering specific types of dressings. It is important to note that the decision of the nurse to prescribe a primary dressing and Allevyn Gentle Border as a second dressing is reasonable considering the wound’s condition which has been determined after professional assessment and careful physical examination (Guarnera et al., 2007). The primary dressing that was prescribed for patient has been indicated as a paraffin gauze dressing. It has important features, such as soft paraffin base, comprehensive size range, and sterile leno weave presentation. The major benefit of the prescribed primary dressing is that it can soothe and protect the wound as well as open up the passage of viscous exudates, which can take place into the prescribed secondary dressing (Chaby et al., 2007). The fact that the prescribed primary dressing is not medicated shows that it can be ideally used with a topical antiseptic of choice. It can be indicated that the mnemonic EASE has been applied in the decision making process of the prescribing event. The product has been identified as rather effective, as all products from the Allevyn Gentle Border range have been especially designed for individuals with fragile and extremely sensitive skin (Chaby et al., 2007). This type of dressing has a soft silicone gel adhesive, which makes it a convenient option for patient’s condition considering the capacity of the dressing to minimise trauma to the wound when the dressing should be changed. Moreover, this contributes to avoiding patient pain and ensuring adequate care (Guarnera et al., 2007). The effectiveness of the prescribed dressing is evident at its triple-action technology, which contributes to maintaining optimal balance in fluid while the wound is being healed. The choice of Allevyn Gentle Border as a secondary dressing is an appropriate decision made by the district nurse because the dressing provides optimal comfort to patient and it is easy to be applied and removed. The product is suitable for this patient, as no allergies have been reported during the initial assessment conducted by the student (Chaby et al., 2007). In addition, the use of the prescribed secondary dressing is completely safe, as patient can even take shower without any problem given that the dressing is shower-proof. The prescription is cost-effective, as a box of 10 Allevyn Gentle Border dressings (7.5 cm x 7.5 cm size) costs approximately  £22.44, and a box of the same type of dressings (10 cm x 10 cm size) is approximately  £29.99 (Hurd et al., 2009). In a research by Hurd et al. (2009), the focus has been on presenting sufficient evidence of the effectiveness of Allevyn Gentle Border. The authors of the research based their evaluation on a multi-centre clinical assessment, which was conducted in 2008. One of the most important conclusions provided by researchers was that this type of dressing was suitable for the specific wound type treated in almost 95% of patients who participated in the study (Chaby et al., 2007). It has been emphasised that patients’ wounds had healed prior to the end of the specified study period. There was substantial evidence indicating a reduction in wound area and depth upon presenting the final assessment of patients. Moreover, there was significant evidence of a reduction in the precise level of exudates in the wound, which applied to the period between baseline and final assessment (Hurd et al., 2009). There was also a visible reduction in the median percentage of devitalised tissue upon conclu ding the final assessment of patients. In order to assess the appropriateness of the prescribed dressing, the student district nurse demonstrated the initial consideration that the process of prescribing wound products cannot occur generically. The nurse has determined that this type of dressing is appropriate to patient’s condition. As presented in research, Allevyn Gentle Border dressing is found to maintain moisture, implying the inability of sticking to the wound (Chaby et al., 2007). The prescribed dressing belongs to the group of hydrocolloids. The qualities of hydrocolloid dressings have been considered by the student in providing an optimal healing environment, insulation and autolytic debridement. In terms of outlining the advantages of this type of dressing, it is essential to note that hydrocolloid dressings are impermeable to bacteria and other contaminants (Guarnera et al., 2007). The most important advantage is that they do not adhere to the wound but to the intact skin near the wound. However, a sign ificant consideration should be given to the fact that hydrocolloid dressings are not recommended for wounds with extremely heavy exudates, or in the presence of infection. The frequency of dressing changes depends on the severity of patient’s wound (Hurd et al., 2009). Yet, it is important to note that the primary dressing should be changed on a daily basis, while the secondary Allevyn Gentle Border dressing should be changed every 3 days (King, 2003). There have not been considerable side effects associated with the use of the prescribed secondary dressing except slight nausea in rare cases. In the process of negotiating a contract, it is essential to note the aspects of concordance and adherence. The student demonstrated a high level of negotiated concordance in the sense that sufficient information was provided to client including possible side effects, the costs of dressing and the impact on lifestyle. In an attempt to promote greater adherence of client to the prescribed treatment, the student district nurse clearly informed client about the two types of dressings that were prescribed, as well as how to use them and their benefits (Bradley et al., 2007). It has been suggested to both client and her husband to record the time of dressing changes, which served as an additional motivating factor to client to monitor the condition of her wound. The nurse demonstrated her competence in conducting effective communication with client considering that she is from the elderly population, which implies a focus on making the prescribed treatment simple (Hurd et al., 2009). Ther efore, the contract between the nurse and client was considered effective in terms of concordance and adherence. Implications for Future Practice This event is quite important for my future practice and learning because it has provided me with a relevant opportunity to apply all essential steps of a prescribing event in practice. Such a practical experience in prescribing has made me more self-confident in the procedures required to indicate a properly conducted prescribing event in the future (Bradley et al., 2007). I would follow the same model of prescribing for any future similar situation, as I find it effective and reliable in bringing an optimal treatment option to client. I have extensively focused on client’s holistic needs, as this is considered fundamental in delivering adequate care and make an informed decision regarding client’s complaint (King, 2003). I am prepared to expand my prescribing experience in the future by actively participating in similar events and acting in accordance with strict nursing and prescribing principles outlined in the field. Reflection The prescribing event provided an opportunity to learn more about the stages of prescribing and making the best possible decision in a similar situation as the one faced by client. However, I am aware that such a decision may differ upon considering the details of another case, with different aspects of complaints. This means that I should be adequately prepared to encounter different prescribing scenarios (Hurd et al., 2009). I have not experience any major problems during this experience. Yet, I have learned a lot about wound care in relation to this incident. The treatment of this condition may be challenging under particular circumstances especially among the elderly population (King, 2003). Self-monitoring and management of wound may be inappropriately done and thus such individuals may need the assistance of a family member or nurse in order to adhere to the schedule outlined in the prescribing event. Conclusion This report provided significant information about a prescribing event in which a student district nurse participated, accompanied by her practice teacher. The prescribing event was based on an incident with a 70-year-old female, who was identified as bed bound due to superficial wound to left sheen. The nurse critically analysed the situation and demonstrated a prescribing decision that a primary dressing should be used as well as Allevyn Gentle Border as a secondary dressing (Hurd et al., 2009). The prescribing decision was adequately justified given that the nurse provided solid evidence of the benefits of using this type of dressing. However, the only limitation considered in this event is that the nurse may not have invested sufficient time to explore the case in detail (Chaby et al., 2007). Despite this limitation, the student expressed an opinion of increased self-confidence that could help her in similar prescribing situations in the future. References Bradley, E., Hynam, B. and Nolan, P. (2007). ‘Nurse Prescribing: Reflections on Safety in Practice’. Social Science Medicine, vol. 65(3), pp. 599-609. Chaby, G., Senet, P., Vaneau, M. et al. (2007). ‘Dressings for Acute and Chronic Wounds: A Systematic Review’. Archives of Dermatology, vol. 143, pp. 1297-1304. Guarnera, G., Tinelli, G., Abeni, D., Di Pietro, C., Sampogna, F. and Tabolli, S. (2007). ‘Pain and Quality of Life in Patients with Vascular Leg Ulcers: An Italian Multicentre Study’. Journal of Wound Care, vol. 16, pp. 347-351. Hurd, T., Gregory, L., Jones, A. and Brown, S. (2009). ‘A Multi-Centre In-Market Evaluation of Allevyn Gentle Border’. Wounds UK, vol. 5(3), pp. 32-44. Junqueira, L. C. and Carneiro, J. (2005). Basic Histology. Rio de Janeiro, Brazil: Lange. King, B. (2003). ‘Pain at First Dressing Change after Toenail Avulsion 2: Findings and Discussion of the Data Analysis’. Journal of Wound Care, vol. 12, pp. 69-75. Marcum, Z. A., Handler, S. M., Wright, R. and Hanlon, J. T. (2010). ‘Interventions to Improve Suboptimal Prescribing in Nursing Homes: A Narrative Review’. The American Journal of Geriatric Pharmacotherapy, vol. 8(3), pp. 183-200. Tjia, J., Gurwitz, J. H. and Briesacher, B. A. (2012). ‘Challenge of Changing Nursing Home Prescribing Culture’. The American Journal of Geriatric Pharmacotherapy, vol. 10(1), pp. 37-46.

Saturday, November 23, 2019

Use Weather Maps to Make a Forecast - A Lesson Plan

Use Weather Maps to Make a Forecast - A Lesson Plan Purpose of lesson The purpose of the lesson is to use meteorological data on a weather map, including a variety of weather map symbols, to predict weather events and produce a mock forecast. The intent is to show how data is collected and analyzed. Students first analyze a weather report to discover its parts. They then use these same techniques to analyze weather data. By creating a web at the beginning of the lesson, they can then complete an assessment where they complete another web that, this time, outlines the steps a forecaster takes to produce a forecast. Objectives Given wind speed and direction data in a weather station model from various locations around the United States,correctly label the map with the locations of high and low pressure zones.Given temperature data on a United States isotherm map, chose the correct frontal boundary from the four types of frontal boundaries and draw it on the map so that a forecast can be produced. Resources AMS Datastreme at ametsoc.org/amsedu/dstreme/ for up-to-date weather mapsNOAA Jetstream website at srh.noaa.govNOAAJetstream website at NOAA Jetstream online school for weather srh.noaa.gov/jetstream// for background informationDaily newspaper weather section (minimum 5 days collected at least one week in advance of lesson)The Weather blog at http://weather.about.com Materials needed for lesson Teacher needs to collect the daily newspaper forecast for 5 days in advance of the lesson. Teacher must also print daily isotherm, frontal, and pressure maps from the AMS datastreme site. A computer projector (and a computer) would be helpful in reviewing the online Jetstream school. Students will need colored pencils and access to research online through computers or the library. Students will need a KWL chart to fill in at the beginning, middle, and end of the class. Background Teacher will show a video of a weather report that includes a weather map. Students will watch the video while thinking about the essential question – How do scientists gather and report data to create weather reports? The video segment of the lesson acts as a hook to get students interested in the data. Also included will be a demonstration of various meteorological tools including a barometer, thermometer, wind speed indicator (anemometer), hygrometer, weather instrument shelters, and photos of weather satellites and the resultant images. The students will then formulate a pair-share group to produce a web of all the parts of a weather report. They will include methods and tools used to gather meteorological data as well as the components of weather maps and forecast reports. Students will share some of their main points in the webs they created with the teacher. The teacher will record the information on the board and ask for discussion in the class for what they think is the best way to create a web. Once the video segment is shown, students will go through a series of steps to practice analyzing weather maps.Students will also fill out a KWL chart once they see the weather video. Once they are complete, they will be able to check their forecasts based on the newspaper forecasts the teacher already collected. Assessment The assessment will be a weather map of the CURRENT class day, printed in the morning by the teacher, and students will have to predict the weather for the next day. In the same pair-share groups, students will create a 1 minute forecast report as if they were on TV. Remediation and review Practice reading temperature data in Celsius and Fahrenheit on a standard alcohol thermometer.Show students a model of a building or doll. Explain the idea of the use of models in science.Obtain a weather map from Datastreme site and distribute to students so they can see examples of a real weather map.Introduce students to the online Jetstream site and the parts of a weather map. Students will record the various parts of a station model.Locate a station model for a city and record temperature, pressure, wind speed, etc. in a data table. Describe to a partner the different conditions present in that city. Optional-Using laptop computers, instant message a partner across the room about the conditions in your city.Use a simplified map to locate the isotherm lines on a weather map. Connect similar temperatures in increments of 10 degrees with different shades of colored pencils. Create a key for the colors. Analyze the map to see where different air masses are and try to outline a front al boundary using the correct symbols learned from the Jetstream online course. Students will obtain a pressure reading map and determine the pressure at a station. Color the region around several cities that show pressure anomalies. Students will then try to determine high and low pressure zones.Students will draw conclusions about their maps and check the key with the teacher. Conclusion The conclusion will be the presentation of forecasts from students. As students explain why they feel it will rain, get colder, etc., students will have a chance to agree or disagree with the information. The teacher will go over the correct answers the next day. If done right, the next days weather is the real weather the student forecasted because the map used in the assessment was the CURRENT weather map. The teacher should review the objectives and standards on the bulletin board. Teachers should also review the learned portion of the KWL chart to show students what was accomplished in the lesson. Assignments Students will use a weather map (model) to create a weather report.Students will use observation and analysis to determine the methods, data, tools, and information used in forecasts of the weather by creating a graphic organizer (webbing).Students will have periodic self-checks available as they analyze older maps to gain the skill in interpreting and predicting future weather.

Thursday, November 21, 2019

English composition Essay Example | Topics and Well Written Essays - 500 words

English composition - Essay Example For instance, one may say, â€Å"It is my joy to serve you because I love you†. This would mean, it is one’s pleasure to serve a person he loves, that there would be no complaints or difficulties in doing the job. joy is a feeling that lifts the heart of a person so that whatever hardships may come, they would seem nothing compared to the pleasure one finds in accomplishing a task. It almost makes someone strong in everything he does because the feeling that it brings seem to lift the burdens up and makes things light and easy. Joy may also be expressed in merriments like festivities where giving is a distinguished feature, with the abundance of food, drinks and stories that make the attendees enjoy the time and event. Probably, one who is truly joyful could be such light hearted as to be so generous not only in material things but also in being kind to irritating people, loving one’s enemies and being at peace with them. It may be observed that a joyful person seems to have a magnetic force within him that attracts people to join his company and enjoy the time spent with him without a dull moment. This could be due to the influence one could bring to other people when he has joy in his heart. As they say, a smile could be epidemic, so joy could be more infectious. Joy could also be a person or thing which is a source of happiness and satisfaction. For example, a beloved child could be a parent’s joy. Whatever achievements the child may have would bring a sense of pride however, for a child who is said to be a source of joy, achievements would just be bonuses for them and not the source of joy itself. A well loved child, no matter what becomes of him, if he is considered a joy, would still be loved and well accepted without achievements. Although it is every parent’s desire for their children to become achievers, if one is considered a parent’s joy, achievements are not the basis of being proud and happy about them

Tuesday, November 19, 2019

Women Discrimination in Business World Research Proposal

Women Discrimination in Business World - Research Proposal Example According to the sex and power report submitted by the UK Equality and Human rights commission in 2008, women hold only 11 positions in the FTSE directorships. The study revealed that even though anti discrimination legislations have been constituted to help women and it had been implemented long ago, still the position of the women has undergone only little improvement as they are not represented in many of the occupations especially in senior positions (Broughton and Miller, 2009). Very recently BBC news has reported that women discrimination is wide spread in Europe (Viewpoint: A fair deal for women, 2009). It was also revealed that the chances of a woman to get a job in Europe is only 47% because of discrimination against women (Discrimination in the European Union, 2009) Business world is the area where women discrimination is prevalent even today (Peiss,1998). This could be understood from the fact that only a very few number of women are running their own business. When it comes to the senior management only very few women are there in the scenario. This is true through out the world irrespective of the level of development. In USA and in most of the countries in Europe although there are many organizations that draw attention at a global level, only very few have a female in the board level position (Brougton and miller, 2009). Many reasons are attributed to this like women are reluctant to take up such positions, people at the senior management level as well as public have negative opinion on women coming to such high positions, etc. But there might be several reasons behind these main reasons. So there is a great need to understand the full range of reasons, which discourage women to take up promotions to the board level positions to find out s olutions to this problem. In fact one of the key objectives of executive coaching is to encourage women to take up these positions. The reasons why they are not preferred by their employers when it comes to the senior management positions also has to be clearly understood so as to take appropriate measures to encourage these employers to give opportunities for women at least to prove themselves. For this, such studies are highly essential to develop strategies that could help women to achieve progress in their career. So the present study is intended to find reasons for less representation of females in the business world of Europe especially at the senior positions. Review of literature 5.1. Effect of discrimination in Child hood According to Wolfe (2009) stereotyping from the childhood onwards results in women becoming less confident to enter into the business world. From the childhood

Sunday, November 17, 2019

The Effects of Hair Relaxers Essay Example for Free

The Effects of Hair Relaxers Essay For a long time, hair relaxers have been used to straighten hair thus making it easier to style. These hair relaxers straighten hair by destroying the protein composition of hair and the most effective active ingredients in these relaxers are Sodium Hydroxide and Guanidine hydroxide (Baran Maibach, 2005). Hair is primarily composed of keratin which is a form of fibrous protein that is made up of long amino acid chains (polypeptides). In these chains, the amino acids are linked to one another through chemical bonds which are known as peptide bonds. These polypeptide chains are linked to each other through salt, disulphide, and hydrogen bonds (Dale, 1997). These hydrogen bonds contribute greatly to hair strength and in fact their contribution forms a third of the total hair strength (Dale, 1997). These hydrogen bonds are so weak that they are easily broken by heat and water. Salt bonds just like hydrogen bonds are weak physical bonds and are broken easily by agents such as weak acid or alkaline solutions as well as pH changes. Unlike the other two, disulphide bonds are chemical in nature and are stronger and less. However, they are susceptible to alkaline solutions. These disulphide bonds links the sulphur atoms found in cysteine to each other and they are the ones primarily responsible for hair’s strength. More hair strength is contributed by betaine. In an investigation done by Pulliainen et al. (2009) using high performance liquid chromatography, natural betaine was established to be a part of hair and it is believed to provide hair strength by helping to maintain the function of protein. There are two types of keratin-soft and hard-and the one found in hair is the hard type. This type of keratin is insoluble in water and it is generally resistant to degradation by various agents for instance proteolytic enzymes (Sustaita, 2007). The keratin proteins in a hair fiber forms 65-95% of the fibers total weight (Keratin. Com, 2009). Hair is composed of various chemical elements which include carbon, hydrogen, sulphur, oxygen, and nitrogen. Hair relaxers act on hair in two major ways-physical and chemical. The chemical action is due to breakage of disulphide bonds following the action of the alkalis found in hair relaxers. Since the disulphide bonds are the ones primarily responsible for providing hair strength as well as determining hair curls, breakage of these bonds leaves the hair soft (relaxed) and thus it can be manipulated (Dale, 1997). These alkalis also break the salt and hydrogen bonds further softening the hair. The physical action comes about due to the breakage of the bonds leaving the hair free of natural curls thus it can be straightened by combing. In other words it changes hair physically from curly to straight thus giving it a new shape. Following application of hair relaxers, the structure of hair changes due to breakage of bonds but these bonds are reformed. Use of water and heat during relaxing breaks hydrogen bonds but these are reformed when the hair is dried and cooled. The broken salt bonds are reformed by use of neutralizers (acids) which normalizes the hair pH. Disulphide bonds are also reformed following application of neutralizers but their position changes so that they hold hair in the new straight shape. The neutralizer also re-hardens hair. From the discussion above, it is clear that the hair relaxers targets the protein components of hair and it does this by destroying the bonds that link polypeptide chains together. After this breakage, neutralizers are applied and hair dried to reform these bonds.

Friday, November 15, 2019

Leaving for College - A Heartbreaking and Bittersweet Experience Essay

Leaving for College - A Heartbreaking and Bittersweet Experience â€Å"Here’s to the nights we felt alive, here’s to the tears we knew you’d cry, here’s to goodbye, tomorrow’s gonna come too soon.† - Eve 6. I’ve heard this song many times before, but it took me so long to finally understand the real meaning behind it. The last night I spent in Tucson before moving away to college has proved to be the most heartbreaking and bittersweet life experience I’ve ever had to endure, yet it is also my fondest memory of home. I wanted that night to last forever because I never wanted to see tomorrow come. August twentieth was my last night in Tucson. The last night I had to spend with my family, my friends, and my dog. That would be my last night to spend in my own house, with my own personal bathroom, and a big bed. That would also be my last night to pack all of my important material possessions and then downsizing because my dorm room probably wouldn’t hold everything I thought I â€Å"needed.† The night began with that afternoon at what we call the â€Å"G.R. Party.† This is commonly known as a good riddance party. My parents, extended family, and friends gathered together inside my home for my last dinner. All the males were, of course assembled by the grill cooking our wonderful all American feast of hamburgers, barbeque chicken, and hot dogs. Most of the women were mingling with each other, each one almost in tears listening to others talk about how hard â€Å"letting go† of their own children would be and fearing the next few days when my friends would be away to different colleges. My friends and I were busy talking amongst ourselves and watching my younger cousins dazzle us in the pool with their most recent dive or trick. Finally, someone... ... ever had to do. Who knew it would be so difficult to leave those people who shaped the person you are today? I had to face the people that I loved so much and say good bye. I knew I would see them again, but somehow that wasn’t a comforting thought. The only thing I could seem to think of was how hard it was to leave and how excruciating it felt. This experience has left a huge impression on my life. I realized how much I love my life and the people in it. I recognized the fact that this was me, growing up and becoming an adult. I also finally understood the meaning of â€Å"family.† Even though I was leaving my home of eighteen years, I knew I still had a wonderful place to return to. That chapter of my life ended beyond perfectly. Although that night was somewhat depressing it was also filled with fun, laughter, and love. It is by far, my favorite memory of home.

Tuesday, November 12, 2019

Effects of Internet on Child Development

180 to learn was reported in 65 cases, to play was reported in 57 cases, to browse in 35 cases, and to communicate in 27 cases. Thus, the five indices of child home Internet use in cluded: 1) the continuous variable years of home Internet access and the dichotomous (report ed-unreported) variables of child home In ternet use to 2) learn, 3) play, 4) browse, and 5) communicate. Family Socioeconomic Characteristics The parent questionnaire assessed five family characteris tics commonly used to determine socioeconomic status (Bradley & Corwyn, 2002; Sirin, 2005).Two items queried father’s and mother’s employment status. Approximately 70% of mothers and 96% of fathers were employed, full-time or part-time. Two questionnaire items requested father’s and mother’s level of education, coded as: elementa ry = 1, junior high school = 2, high school incomplete = 3, high school complete = 4, technical school/college (complete or incomplete) = 5 and university (complet e or incomplete) = 6. The mean educational level of mothers was 4. 79 (SD = 0. 95) suggesting that many mothers had post-secondary education; the mean educational level of fa thers was 4. 45 (SD = 1. 2) suggesting that some fathers had post-secondary education. The final socioeconomic item on the questionnaire asked parents to indicate annual family income by selecting one of the following options: < $20 000 = 1, $20 000 to $40 000 = 2, $40 000 to $60 000 = 3, $60 000 to $80 000 = 4, $80 000 to $100 000 = 5, > $100 000 = 6. Annual income for participating families was approximately $60,000 CD (M = 4. 07, SD = 1. 48). Table 2 presents a summary of measured constructs which includes: four tests of children’s cognitive development, five indices of children’s home Internet use, and five fa ily socioeconomic characteris tics. Which are the better predictors of cognitive development during childhood, — el ements of the microsystem or elements of the techno- subsystem? Two series of stepwise regression analysis we re conducted with the four c ognitive development scores as the dependant variables. In the first regression analyses , family socioeconomic characteristics (elements of the microsystem) were the independent variables. In the second analyses, indices of home Internet use (elements of the techno-subsystem) were the independent variables. Tab le 2 Description of Constructs and Measures Ecological System System Elements Specific Measures Bioecology Cognitive Development Expressive Language Metacognitive Planning Visual Perception Auditory Memory Techno-Subsystem Home Internet Use Years of Internet Access Online Learning Online Playing Online Browsing Online Communication Microsystem Family Characteristics Father Employment Mother Employment Father Education Mother Education Annual Family Income Results Results of analyses revealed that fa mily socioeconomic characteristics (eleme nts of the microsystem) explained a odest (but significant) amount of the variation in children’s cognitive deve lopment scores. As presented in Table 3, adjusted R 2 values indicated that father’s level of education accounted for approximately 7% of the variation in children’s level of expressive language (as measured by the WISC-IV vocabulary subtest), 5% of the variation in children’s visual perception and auditory memory (as measured by the CAS nonverbal matrices subtest and CAS 181 word series subtest, respectively). Whether or not moth ers were employed, part-tim e or full-time, accounted for pproximately 6% of the differences in children’s capacity to execute metacognitive functions such as planning (as measured by the CAS matching numbers subtest). While the other measures of familial socioeconomic status (e. g. , mother’s education and family income) explained some of the variance in children’s cognitive development, such measures did not improve upon the predictive utility of fa ther ’s education or maternal employment; variation is prerequisite to prediction. Almost all fathers were employed and almost all mothers had finished high school. For participating middle-class families, father’s education a d mother’s employment were more sensitive to children’s cognitive development scores than were family income, father’s employment, and mother’s education. Tab le 3 . Stepwise Regression Analysis: Family Characteristics Predicting Child Cognitive Development Cognitive Score Predictor Beta Weight t value R 2 (adj) F value Expressive Language Father Education . 292 2. 70** . 074 (1, 78) = 7. 29** Metacognitive Planning Mother Employed . 270 2. 46* . 061 (1, 77) = 6. 05* Visual Perception Father Education . 244 2. 22* . 047 (1, 78) = 4. 93* Auditory Memory Father Education . 258 2. 6* . 054 (1, 78) = 5. 55* *p < . 05; **p < . 01 Results of analyses further revealed th at indices of home Internet use (elements of the techno-subs ystem), in general, explained more of the variation in children’s cognitive de velopment than did family socioeconomic characteristics (elements of the microsystem). Summarized in Table 4, specific types on online behavior (i. e. , learning, communicating, and playing) and years of home In ternet access combined to predicted child cognitive developmental outcomes. Indicated by adjusted R 2 , children’s online communication, ears of home Internet access, and online learning (as reported by parents) accounted for ap proximately 29% of the varia tion in children’s level of expressive language as measured by the WISC-IV vocabulary subtest. Online learning and communicating (reported- unreported) combined to explain 13. 5% of the variation in children’s metacognitive planning. Online learning and playing (reported-unreported) combined to explain 10. 9% of the variation in children’s auditory memory. Years of home Internet access explained approximately 3% of the diffe rences in children’s visual perception scores. With the xception of visual perception, indices of home Internet use (elements of the techno-subsystem) were better predictors of children’s cognitive development than were family socioeconomic characteristics (elements of the microsystem). Tab le 4 . Stepwise Regression Analysis: Home Internet Use Predicting Child Cognitive Development Cognitive Score Predictor/s Beta Weight t value R 2 (adj) F value Expressive Language Online Communication . 344 4. 00*** Years of Internet Access . 263 3. 12 ** Online Learning . 256 2. 99** . 287 (3, 101) = 14. 97*** Metacognitive Planning Online Learning . 287 3. 03** Online Communication . 201 2. 12* . 35 (2, 101) = 9. 06*** Visual Perception Years of Internet A ccess . 192 1. 99* . 028 (1, 104) = 3. 98* Auditory Memory Online Learning . 242 2. 60* Online Playing . 228 2. 46* . 109 (3, 101) = 14. 97*** *p < . 05; **p < . 01; ***p < . 001 Discussion A variety of mechanism s linking family socioeconomic status to child cognitive development have been proposed including parenting (Petrill, Pike, Price, & Plomin, 2004 ; Mistry, Biesanz, Chien, Howes, & Benner, 2008) and 182 resources (Bradley & Corwyn, 2002). For the current samp le of middle class children, paternal education and maternal employment were associated with measures of hild cognitive development. More educated fathers tended to have offspring who scored high on three of the four cognitive measures (expressive language, visual perception, and auditory memory). Mothers who were employed tended to have children who scored high on the measure of metacognitive planning. Educated fathers and employed mothers may genetically transmit to their offspring some neurological processing advantage (bioecology). Simultaneously, educated fathers may provide enhanced language models and stimulating environments that facilitate the cognitive development of their children (microsystemic influence). Employed mother may provide models of organization and place increased demands on children to self- regulate thereby enhancing the metacognitive planning abilities of their offspring (microsystemic influence). Family socioeconomic status (as measur ed and for the current sample) accounted for 5% to 7% of differences in child cognitive development scores. In contrast, indices of home Internet use (as measured and for the current sample) accounted for 3% to 29% of differences in child cognitive development scores. Me ta-analysis confirms that the impact of socioeconomic status on academic achie vement is eroding over time (Sirin, 2005). Increasingly ffective structures of social equali zation (e. g. , public education, quality daycare, preschool intervention, and prenatal programs) and the expanding middle class create the need for more precise description of home environments. Current results suggest th at indices of home Internet use (i. e. , elements of the ecological techno- subsystem) pro vide more useful information regarding cognitive development than do family socioeconomic characteristics (elements of the microsystem). Only two of five family socioeconom ic characteristics added to the regres sion equation, suggesting that some measures (i. e. , family income father employment, and mother education) did not differ in relation to children’s cognitive development. In contrast, four of the five indices of home Internet use during childhood added to the regression equation, suggesting that these measures differe d in relation to children’s cognitive development. In the context of the current investigation, soci oeconomic status is a crude construct re lative to home Internet use. Internet use includes both organized (e. g. , search) and disorganized (e. g. , browse) interactions with both human (e. g. , chat) and nonhuman (e. g. , database) elements in online environments (Johnson & Kulpa, 2007).Internet use is a complex set of behaviors that vary widel y across individuals and th at is influenced by cognitive and personality characteristics (Joinson, 2003). For the current sample of children, patterns of home Internet use explained more of the variation in cognitive development than did family socioeconomic characteristics. In the context of middle class families, elements in the techno-subsystem (e. g. , Internet access) may not necessarily facilitate child cognitive development; effective use of those elements, highly dependent upon parent behavior, may promote development.For example, Cho and Cheon (2005) surveyed families and found that parents’ perceived control, obtained through shared web activities and family cohesion, reduced children’s exposure to negative Internet content. Lee and Chae (2007) reported a positive relations hip between parental mediation techniques (website recommendation and Internet co-use) and children’s educa tional attainment. In the current investigation, the cognitive experienc es provided to children by employed moth ers may include Internet skills instruction (e. g. , sending email) and models of information management (e. g. acc essing websites for informa tion). Such experiences, over time, may provide children with enhanced opportunities to direct their own cognitive development via increasingly sophisticated uses of the Internet. According to Livingston and Bober (2005), â€Å"a new divide is opening up between those for whom the internet is an increasingly rich, diverse, engaging and stimulating resource and those for whom it remains a narrow, unengaging, if occasionally useful , resource of rather less significance† (p. 2). Bruner (2005) recen tly reiterated that â€Å"our minds ap propriate ways of representing th world from using and relating to the codes or rules of available technology† (p. x). Cognitive abilities prerequisite to utilization of Internet applications constitute an implicit component of contemporary notions of intel ligence (Maynard, Subrahmanyam, & Greenfield, 2005). The ecological techno-s ubsystem furthers our understanding of environmental influences on child development by emphasizing the impact of digital technologies on cognitive growth during childhood. The techno- subsystem provides precise description of microsystemic mechanisms of developmental influence which lead to intervention strategies.According to Livingston and Bober ( 2005), many parents lack the skills to guide and support their children’s Internet use and Intern et-literate parents have Internet-litera te children. Subsequent research may evaluate the effectiveness of techno-subs ystem interventions for elementary school children at-risk, for example, the provision of home Internet access and pa rent Internet literacy training. As stated elsewhere, â€Å"current anxiety surrounding children’s Internet use should be for those whose cognitive processes are not influenced by the cultural tool† (Johnson, 2 006, p. 570).

Sunday, November 10, 2019

Alcohol Industry, External Environments Essay

Diageo is a company that produces and distributes alcoholic beverages. Its products include all three branches of this industry – spirits, wine and beer. The brands that the company produces include well-known names like Smirnoff, Johny Walker scotch whiskey, Baileys, Captain Morgan rum, Tanqueray gin, Guiness beer, Don Perignon champagne, and many others. One can find the products produced by this company in nearly 180 countries all around the world. The company’s offices are located in 80 countries and employ 20,000 people. Manufacturing facilities are spread out all around the world, including Great Britain, Italy, Australia, Latin America, Canada, Ireland, United States, Caribbean and India (Diageo, 2011). Every company experiences the influences of seven key environments. One of them is internal environment that defines the corporate culture. The other six environments are external. They are: economic, technological, cultural, natural, governmental and legal environments. Every environment consists of forces that influence every business and their relationship with government and society (Steiner & Steiner). Diageo is a UK based company, but the United States of America is responsible for 40% of its revenue. The company has numerous offices, breweries and distilleries based in the USA, and they exist within influential frames of external environments of the country (Diageo, 2011 ). Regulatory Environment The United States of America has very strict laws and regulations that concern Alcoholic Beverage Industry. Alcoholic beverage consumption, as well as its distribution, is regulated by the government. Every state has different liquor consumption rules and regulations. However, the minimum drinking age of 21 years old is the same in every state. A place and time when alcoholic beverages may be consumed are regulated as well. The retail sales of liquor products are usually provided by the specialized stores. Some of the states, like Ohio, prefer to own the stores and have control over prices and sales. Some other states have privatized liquor stores (Kwon, 2010). According to the Alcohol and Tobacco Tax and Trade Bureau, any retail dealer has to operate with the compliance with the principal Federal liquor laws and regulations. For every manufacturing location Diageo had to obtain manufacturing liquor license from the State Liquor Authority. Alcohol and Tobacco Tax and Trade Bureau regulates labeling process of wine, malt beverages and distilled spirits. It also determines the health warning statement that manufacturers have to put on the label (Alcohol and Tobacco Tax and Trade Bureau, n. d. ). Macroeconomic Environment The macroeconomic environment has a great influence on the functioning of the company. There are certain trends that characterize the present economic environment. The recession made more people stay at home than go out; it led to the development of the off-premise consumption. During the recession consumers were trading down by purchasing less expensive brands (Kwon, 2010). For the manufacturing business of Diageo it meant the slower growth of revenues through the years. The range of products had to change as well, as the less expensive brands and products took the lead. After the decrease of investments into the industry in general and Diageo in particular during the recession, investors’ interest in the company is rising. At the present moment, the on-premise consumption is recovering after the recession. Increase in disposable personal income in 2011 is leading to the growth of company’s sales and consumption of more expensive premium brands. Consumers are starting to trade up (Kwon, 2010). The rise of the Producer Price Indexes put pressure on the profit margins of the company. Decreased interest rates mean an opportunity for active acquisitions and introduction of new products (Kwon, 2010). Cultural Environment The present cultural environment dictates Diageo produce more low-calorie products, as the population of the United States of America is going towards the healthier life style and is fighting obesity (Kwon, 2010). The growing number of Hispanic population increases demand for the liquor that is typical for that area, like tequila. It is very important to always target different age groups while conducting a marketing campaign or advertising. Different age groups have different product preferences and different spending habits. The wine producing segment of Diageo, especially the premium wines, is going to benefit from the increasing numbers of consumers in the over-55 age group. Increasing number of young legal-age drinkers will contribute to the increase in beer consumption (Kwon, 2010). In general, mature consumers drink moderately, and are very conscious about alcohol abuse and drunk driving. Governmental environment The United States government controls sales and marketing of alcoholic beverage products, collects taxes, and works on reducing underage drinking. Alcohol and Tobacco Tax and Trade Bureau is the main federal agency involved in the alcohol policy. It regulates labeling, packaging, advertising and is responsible for product approval (Alcohol and Tobacco Tax and Trade Bureau, n. d. ). All alcoholic beverage businesses have to get the authorization to produce and sell from Alcohol and Tobacco Tax and Trade Bureau under the Federal Alcohol Administration Act. Some of them also have to be authorized under the Internal Revenue Code. Before starting manufacturing, distilled spirits plant, brewery or winery have to apply for a permit of operation from The Alcohol and Tobacco Tax and Trade Bureau. Soon it is going to be possible to apply for these permits online (Alcohol and Tobacco Tax and Trade Bureau, n. d. ). Manufacturing and sale of the Alcoholic Beverages is taxed. â€Å"A tax is imposed upon the privilege of engaging in business as a manufacturer or as an importing distributor of alcoholic liquor† (USLegal, 2011). For example, in the year of 2008, the Alcohol and Tobacco Tax and Trade Bureau collected around $17,4 billion dollars in taxes. It made this bureau, the third largest tax gathering organization in the federal administration (Kwon, 2010). There are several reasons why the excise taxes are imposed on the liquor products. First of all, it slightly increases the price of the products. According to the National Institute on Alcohol Abuse and Alcoholism, lower prices on the alcohol beverages lead to the increased consumption of the alcohol mainly among the underage drinkers. This usually leads to the traffic crash fatalities, increase of the level of crimes and alcohol associated health complications. The second reason for the taxation is the revenue that may be used for public health, safety programs, prevention of underage drinking, enforcement of liquor laws, and prevention and treatment of alcoholism (Center for Science in the Public Interest, n. d. ). Government enforces the three-tier alcohol industry products distribution system. Manufacturers and importers sell their products to the wholesalers, then the wholesalers sell them to the retailers. Technological Environment For the maximum efficiency of the alcoholic beverage production industry, manufacturing company has to stay up-to-date with all the technological innovations. Combination of Rothes Distilleries is a joint venture in the United Kingdom, which was created in 1904 to process whiskey waste. Diageo is a proud member of this group and is taking part in one of their latest technological achievement. Waste from the whiskey distilleries is going to be used to create electric power for up to 9,000 homes. The power plant has won funding from the Royal Banking Group and the Royal Bank of Scotland. The engineering work is already in process, and the construction is about to start within twelve weeks. The plant is going to be built by the existing animal feed factory owned by the Rothes Distilleries. Solid residue from the distilleries will be taken to the plant and burned with the wood to provide electricity which is going to be used to power local homes and run the animal feed production process (Ranscombe, 2011). Diageo is using enzymes as a part of the brewing process. Beer is usually made of barley, which contains starch that has to be broken down to fermentable sugars before the yeast can make alcohol. Therefore, there is a process named malting, where enzymes are needed for the degradation of starch into fermentable sugars (Molecular-Plant-Biotechnology, n. d. ). New technology of using anaerobic bacteria, to reduce the degree of pollution in the waters created by the processes of brewing and distilling, is used by Diageo (Dnce, Ayman-Oz, Turker, Celikkol, Dnce, n. d. ). New technologies allow the production of new types of packages like draft beer boxes and vortex bottles (Kwon, 2010). New software options were recently developed by the On-Trak company based in Cincinnati and Belgian company, Copa-Data. The new software allows manufacturers and distributors of food and beverage products track every item from the factory to the retail sector (Copa-Data, 2010). Natural Environment Processes of manufacturing of the alcoholic beverages cause damage to the natural environment. They generate large amounts of acidic, recalcitrant and colored wastewaters with high organic content (Steiner & Steiner, 2009). In 1970s, the Congress of the United States of America passed the number of new laws concerning the environmental protection. When the Environmental Protection Agency was created, this started the â€Å"environmental decade. † The agency has consistently worked on protection of human health and preservation of the natural environment (Steiner & Steiner, 2009). There are numerous possibilities to reduce the bad influence of the industry on the environment, and Diageo takes the path of sustainability as well as many other manufacturing companies. Diageo has reached ‘Gold Class’ rating in the admired SAM Sustainability Yearbook 2011. The yearbook measures more than 2,500 of the world’s largest companies in terms of their impact on economic, social and environmental performance (Diageo, 2011). All breweries and distilleries have numerous options on how to reuse their wastes, like growing mushrooms on the fermentation wastes or sending spent grains to farms for animals feed. It is also possible to recover the heat from the hot water using the heat exchanger saving energy (Cleaner Production International LLC, n. d. ). Trend interaction The six external environments do not exist apart from each other. They are connected and interact with one another. An important trend from one environment may be as important for another environment as well. For example, the regulations and policies provided by the Alcohol and Tobacco Tax and Trade Bureau are connected to each other and can be related to both the Regulatory and Governmental environments. The same thing can be said about all the technological innovations. Most part of the new technologies were created with the sustainability in mind. The new technology of anaerobic treatment of waste waters helps to reduce pollution. With the help of new recyclable materials Diageo can create more sustainable packaging for its products. Trends of macroeconomic and cultural environments are usually connected. Consumers’ buying behavior is more or less easy to predict knowing the current economic situation and having data on the personal disposable income. The most important trends Having all this in mind, it is easy to detect the most crucial trends for Diageo’s future. To be aware of the range of products that are going to be needed in future, the company has to predict the economic situation in the country. If there is a recession to come, and personal disposable income is going to drop, consumers will trade down, and more cheap brands will be consumed. In the opposite situation, trading-up will be going on, and Diageo will have to produce more premium products. Types of the products that will be consumed will also depend on the popularity of the on-premise or off-premise consumptions. Management of every company has to know company’s customer base and be well aware of the demographical changes to come. Aging population of the USA is dictating the increase in the popularity of the premium brands, especially in wine and spirits sectors. Growing Hispanic population will increase the consumption of the import South American brands, some of which create a strong competition for Diageo (Kwon, 2010). Another crucial trend for Diageo is constant development of new technologies that allow the company to increase its level of sustainability and reduce its negative impact on the natural environment, as well as increase company’s efficiency and profits. Over the next five years, positive influence of the economic environment will take place. Recovery after the recession will allow people to get more freedom in their spending habits. Consumers will be trading up, and the on-premise consumption will thrive. The number of consumers in over-55 age group will be increasing, and demand for the premium brands will rise. It is important for Diageo to concentrate its attention on the innovation sector and introduce new brands and products that will match the growing demand for more expensive and sophisticated drinks. Old-fashion classic cocktail mixes manufacturing is another path that can be taken by the company. Diageo successfully applies most innovations that modern technology has to offer. I am sure, that in the course of the next five years, sustainability rating of the company will increase even more. Summary Exploring the present environment of business gives us a good idea on how the company operates in frames of the external conditions that influence the company. In its turn, every business impacts the environments, society and influences the course of history (Steiner & Steiner, 2009). It is easy to predict changes of many factors and trends. Knowing the way these changes will affect the company, we can create the optimal scenario for its development. However, there are some aspects that will remain uncertain, and some that will be changed with the influence of the company. Refernces Alcohol and Tobacco Tax and Trade Bureau. (n. d. ) . Liquor laws and regulations for retail dealers. Retrieved on April 26, 2011 from http://www. ttb. gov/public_info/5170-2a. htm Alcohol ans Tobacco Tax and Trade Bureau. (n. d. ) Labeling laws and regulations. Retrieved on April 26, 2011 from http://www. ttb. gov/labeling/laws_and_regs. shtml Center for Science in the Public Interest. (n. d). Why Raise Alcohol Excise Taxes? Retrieved on April 27, 2011 from http://www.cspinet. org/booze/taxguide/TaxIndex. htm Cleaner Production International LLC. (n. d. ). The Alcholic Beverages Industry: Improvement of Resource Efficiency and Environmental Performance. Retrieved April 19, 2011 from http://www. cleanerproduction. com/directory/sectors/subsectors/beveragesa. html COPA-DATA – process control and line management systems. (2010). Retrieved April 20, 2011 from http://www. drinks-business-review. com/suppliers/copa_data Diageo. (2011). About us. Retrieved April 21, 2011 from http://www. diageo. com/en-row/ourbusiness/aboutus/Pages/default. aspx Diageo. (2011, March 11). Diageo achieves Gold Class sustainability rating. Press Release. Retrieved April 28, 2011 from http://www. diageo. com/en-row/newsmedia/pages/resource. aspx? resourceid=764 Kwon, E. Y. (2010, October 7). Alcoholic beverages and tobacco. Standard and Poor’s Industry Surveys. Retrieved on April 7, 2011 from http://0-www. netadvantage. standardandpoors. com. olinkserver. franklin. edu/NASApp/NetAdvantage/showIndustrySurvey. do? code=abt Molecular-Plant-Biotechnology. (n. d. ). Enzyme in Beer Manufacturing. Retrieved April 28, 2011 from http://www. molecular-plant-biotechnology. info/foods-and-beverages/enzymes-in-beer-manufacturing. htm Mergent online. (2011, April 21). Business summary. Diageo PLC. Retrieved April 21, 2011 from http://0-www. mergentonline. com. olinkserver. franklin. edu/companydetail. php? compnumber=94345&pagetype=synopsis Ranscombe, P. (2011, April 15). Power plant that runs on whisky waste wins funding. The Scotsman. Retrieved April 28, 2011 from http://thescotsman. scotsman. com/business/Power-plant-that-runs-on. 6752016. jp Steiner, J. F. & Steiner, G. A. (2009). Business, government, and society. New York, NY: McGraw-Hill Irwin U. S. Census Bureau. (2010, January 20). Resident population by age and state – projections: 2010 and 2015. The 2011 Statistical Abstract. Retrieved on April 27, 2011 from http://www. census. gov/compendia/statab/2011/tables/11s0018. pdf USLegal. (2011). Liquor Tax Law and Legal Definition, Retrieved on April 27, 2011 from http://definitions. uslegal. com/l/liquor-tax/ Dnce, B. K. , Ayman-Oz, N. , Turker, G. , Celikkol, S. , Dnce O. (n. d. ). Microbial ecology of anaerobic reactors for treatment of alcohol industry wastewaters. Retrieved April 19, 2011 from http://www. formatex. info/microbiology2/988-999. pdf.

Friday, November 8, 2019

The Sting essays

The Sting essays The re-releasing of The Sting on DVD will hit stores on April 5, 2005. It hits store as anticipated as it did when it was first released in 1973. The Sting is a cinematic masterpiece even three decades after the first release date. The plot is simply astonishing. It has more twists and turns then any other movie to date. The Sting also doesnt just lure in the audience by promising an unpredictable plot, it actually delivers. Instead of the standard one-twist and the movie is over, The Sting never lets its audience rest with new developments around every corner. The plot is truly one that never allows a dull moment. This clever and hilarious movie is set in the depression years. A small-time drifter, Johnny Hooker, (played by Robert Redford), is making ends meet in the tough times of the depression by living off of scams that he and his partner Luther Coleman, played by Robert Earl Jones, pull on unsuspecting civilians. When Hooker and Coleman pull their favorite con, the old switch-a-rue, they think they have won the lottery when they come to realize that they just conned a guy out of eleven thousand dollars. Hooker wasnt able to enjoy his money for long as he blows his take on roulette. Coleman keeps his money and decides to retire, after he finally pulled off "The Big One". What neither of them realize is that their mark, the unsuspecting civilian, was a numbers-runner for some big-time gangster in New York. That powerful gangster was Doyle Lonnegan, played by Robert Shaw. Lonnegan, hearing of this grim news, puts a bounty on both of their heads. Lonnegan's thugs find one-half of the tande m; Luther in his debacle of an apartment. The thugs then throw Luther out the window to the solid ground below. This was a very convincing reason for Hooker to flee town and seek refugee. Swearing to revenge his partner's death, Hooker contacts Henry Gondorff, played by Paul Newman, an old friend of Luther's and as reputatio...

Tuesday, November 5, 2019

Moral Attitudes and Values Development in School

Moral Attitudes and Values Development in School Hashtag: #FailingTheHonest Moral Attitudes and Values Development in School Most parents typically taught their children not to lie and be honest in everything they do as our society in general favors those who are truthful, sincere, and equitable. Similarly, educational institutions play a major role in ensuring that each student recognizes the worth and value of being honest in purpose, work, and principle. However, despite social norm and value learned in school, honestly in some society received punishment rather than admiration or respect. The reason why schools typically avoid false systems of merits and demerits is the fact that such practice teaches children to work for end results rather study and learn. However, telling the truth in this world is not always the best policy particularly when it involves admitting your fault or exposing somebody in power. One reason is the fact that our perception of things offends those that are note aligned with them. Some people find it difficult to confront the truth as such complex reality demands emotional and intellectual integrity. Many college students according to one study consider freedom, honesty, happiness, and competence as important personal values but they do not consider honestly as an obligation. These college students may be aware that such attitude sometimes frustrates other people. The study shows that some people actually gave up their honest behavior because of a bad experience. Punishing people for being honest makes them avoid such situation again through lies and deceit. You may also like these articles: The Value of Academic Debate The Scientific Basis for Defining Seasons Remembering Our First Stage of Education Junk Food in School Practice What You Preach The Effect of Dysfunctional Social Norms Honesty builds trust and should be treated with respect but in many circumstances, a person’s honesty seems more of a disadvantage than a helpful characteristic. One problem is that traditional belief on the value of honesty is now overshadowed by alternative social norms that tolerate dishonesty. According to study, some society rationalized dishonesty and other dysfunctional norms as unavoidable and even condone fraudulent and inefficient decisions made by social leaders and public authorities. In fact, this type of attitude prevails regardless of economic costs and serious consequences such as violations of public interests. In business organizations according to research, an establishment of a norm of dishonesty among employees often make honest employees accept the norm and start viewing themselves as people who can also engage in theft and fraud. The organizations responses over this dysfunctional employee norm such as investing in high-tech security and surveillance systems seem to worsen the problem more. For instance, as costly security measures send the message that the company does not trust its employees, the sense of organization community is decreased. Moreover, it can also lead to employee hostility and retaliation as security system facilitates the belief that management is an enemy. In school, students who regularly cheat and get away them makes cheating an acceptable behavior to their peers. In time, such academic dishonesty will become a dysfunctional but well-accepted social norm among students. Moreover, since people internalized norms and cheating does not stop after graduation, these students will likely continue doing other forms of dishonesty in later life such as cheating their spouse, lying to their workplace superiors, cheat customers, theft, fraud, and others. The saddest thing about it is the fact that habitual dishonesty often makes people view their misconduct as morally acceptable regardless of company financial losses and severe social consequences.

Sunday, November 3, 2019

Personal Development Planning Coursework Example | Topics and Well Written Essays - 1500 words - 1

Personal Development Planning - Coursework Example The paper will discuss the benefits of studying PDP at a higher education level. It will also highlight on the changes the changes that I would like to bring into PDP for the future students’ justifying the change with a rationale behind it. Lastly, the paper will provide a reflection on how PDP has helped me at the university. PDP in higher education usually comprise of portfolio that contains evidence if the skills that have been acquired over a specific time period. Studying PDP at the university is very crucial since it assists in creating self-directed independent learners who have a higher probability of progressing to higher levels of academic achievement (Rughani, 2001). As cited by Grellier and Goerke (2006), the other benefit is that students can take responsibility for and personalise their learning. Essentially, personal development is a process and not a final product. Therefore, it can be utilised to support the personalisation of learning by facilitating pathways selection that suit individual learner. Through the utilisation of tools like auditing of personal transferable skills that are often used in the personal development frameworks linked with employability, the students can actually make links between their extra-curricular and curricular activities and what the employers value. These particular activities are advantageous in the context of work placements, work-based learning, or internships. Generally, students usually report in questionnaires and focus groups that CV development is something that they find very beneficial. PDP assists the university students to be effective in reviewing and monitoring their own progress and make use of their own evidence and records to show to others what they know they can actually do (Fry, Ketteridge, & Marshall, 2008). According to Fry, Ketteridge and Marshall (2008, p. 120), PDP promotes deeper learning through increasing awareness of the students are actually learning and to

Friday, November 1, 2019

Audit process Research Paper Example | Topics and Well Written Essays - 1750 words

Audit process - Research Paper Example Some of them are like the independent auditors; these are the types of auditors who are always CPA’s. These individuals are always either practitioners or otherwise members of the public accounting firms who always hire their services to the professional auditing to the customers in need. On the other hand, these individuals are always licensed after going through the CPA tests after which they are certified. These individuals are always ready to render their services after having a factual experience in a working auditing firm. In the contemporary world, the elevated levels of competition subjects external auditors to roles of value incorporated services that can be characterised by business risks as well as providing the necessary management of a business internal management risks. It is noted to be very necessary for the external auditors to act in the control as well as under the perception of an independent thinker as well as with the intents done on good faith while performing their audit responsibilities. The internal auditors are always employees of an organisations concerned with the auditing activities. These types of auditors are always concerned with the analysis of facts in the organisations, often referred to as internal auditing. The major responsibility of the internal editors is always concerned with the management in the firm with the aim of impacting the objectives of the organisation. On the other hand, there are the government auditors. These kinds of auditors are always employees of a particular local government, state or otherwise the federal government. This class of auditors can be further categorised into three other classes; general accounting officers, internal revenue services and lastly the defence contract audit agency. On the other hand, the last classification of auditors is the independent auditors. The independent auditors are neither employed by the government or other agencies but rather they provide their

Wednesday, October 30, 2019

The pros and cons of globalism Essay Example | Topics and Well Written Essays - 2500 words

The pros and cons of globalism - Essay Example It extends to all forms of activities such as commercial, financial, or even religious as well as cultural. Such a development over the years has broadened the scope of human activities significantly thus giving rise to higher consumer expectations. One of the key reasons behind the sudden spurt in globalization is the range of technological innovations in the recent years, which has helped in transcending boundaries by breaking down barriers and made it possible for various businesses to take shape and reach a wider audience. The fact that technological revolutions have single handedly revolutionized the global arena has been documented by various authors and researchers alike (Langhorne, 2001). The internet revolution which has given rise to e-Business and e-Commerce has helped in creating global virtual communities These communities are known to display a strongly developed sense of awareness and play a vital role in participating in matters such as political as well as economic d iscourses, thus becoming a strong dominant force in enforcing their perspectives in matters related to public policies. The development of enterprise application systems, wireless communications technology as well as a range of effective business software have enabled the businesses to cater to the large and varied requirements of their consumers, in the fastest way possible. People have now taken to shopping online and expect their orders to be shipped to them as fast as possible. The marketing department has found a new virtual ground for aggressively advertising their products, while the company management are now aiming to sell their products virtually. Global connectivity has expanded the business hours and now provide for a new 24/7 working schedule thus, implying the intensity of competition in the global marketplace. Furthermore, technological advancement has also afforded various countries to enter into economic partnerships with each other for the provision of goods and se rvices, thus paving way for international e-commerce (Tompkins, 2007). Globalization also signifies the tendency of businesses to invest their funds in projects and avenues which are beyond their national boundaries and venture into international territories, thus expanding their scope to different markets worldwide. The proponents of globalization have termed such a change as a positive influence especially with respect to the developing nations, who can now avail the opportunities afforded to them, to develop faster by co-coordinating with the industrialized nations. However, the opponents of globalization on the other hand, have countered this recent development stating that it acts as a barrier for a nation's progress, questions its sovereignty and paves way for the development of other nations by compromising / trading the local jobs for cheaper jobs off shore. This paper on the ‘Good and bad of globalism’ seeks to assess and analyze the perspectives presented by T homas Friedman in his book ‘The World is Flat’ and derive conclusions regarding the actual impact of globalization in contemporary times. The World is Flat: Thomas Friedman's book "The World is Flat" examines and assess the various facets of globalization, and serves as a guide to those at the helm of affairs to analyze and introspect their policies and their resultant impact on the economies of their respective nations. Friedman states that there are various forces which has led the world to become flat. He has refers these

Monday, October 28, 2019

How To Secure Routers And Switches Information Technology Essay

How To Secure Routers And Switches Information Technology Essay You have been approached by your manager give a talk on the Network security standard ISO 17799. Write a short precise detailing the purpose of this document and the main components within parts 1 and 2 of the document. (http://www.17799central.com/iso17799.htm) Write a brief analysis detailing the possible threats and consequences for a company that does not have an adequate Security Policy. Write a summary of how an Edge router can be configured into a firewall; include detail of how it can be used to filter traffic. Describe the operation of CBAC Detail the encryption techniques that are used in VPN systems and explain how/when they are used. Describe how you can secure/harden routers and switches Router hardening, password requirements, ssh, parser views, etc Port security, vlan hopping, anti-snooping, private vlans Multi-choice Review Questions 1. In which type of attack does the potential intruder attempt to discover and map out systems, services, and vulnerabilities? stake out reconnaissance tapping sniffing 2. Which type of attack prevents a user from accessing the targeted file server? Reconnaissance attack Denial of service attack Prevention of entry attack Disruption of structure attack 3. Which type of action does the ping sweep pose to an organization? eavesdropping reconnaissance denial of service unauthorized access 4. An employee of ABC Company receives an e-mail from a co-worker with an attachment. The employee opens the attachment and receives a call from the network administrator a few minutes later, stating that the employees machine has been attacked and is sending SMTP messages. Which category of attack is this? B) denial of service trojan horse port scanning password attack social engineering 5. What is a major characteristic of a Worm? D) malicious software that copies itself into other executable programs tricks users into running the infected software a set of computer instructions that lies dormant until triggered by a specific event exploits vulnerabilities with the intent of propagating itself across a network 6. A large investment firm has been attacked by a worm. In which order should the network support team perform the steps to mitigate the attack? A) A. inoculation B. treatment C. containment D. quarantine C,A,D,B A,B,C,D A,C,B,D D,A,C,B C,B,A,D 7. At XYZ Company, the policy for network use requires that employees log in to a Windows domain controller when they power on their work computers. Although XYZ does not implement all possible security measures, outgoing traffic is filtered using a firewall. Which security model is the company using? D) open access closed access hybrid access Restrictive access 8. Which three of these are common causes of persistent vulnerabilities in networks? (Choose three.) new exploits in existing software misconfigured hardware or software poor network design changes in the TCP/IP protocol changes in the core routers on the Internet end-user carelessness 9. A new network administrator is assigned the task of conducting a risk assessment of the companys network. The administrator immediately conducts a vulnerability assessment. Which important task should the administrator have completed first? threat identification security level application patch and update deployment asset identification perimeter security upgrade 10. A company deployed a web server on the company DMZ to provide external web services. While reviewing firewall log files, the administrator discovered that a connection was made to the internal e-mail server from the web server in DMZ. After reviewing the e-mail server logs, the administrator discovered that an unauthorized account was created. What type of attack was successfully carried out? phishing port redirection trust exploitation man-in-the-middle 11. Users are unable to access a company server. The system logs show that the server is operating slowly because it is receiving a high level of fake requests for service. Which type of attack is occurring? reconnaissance access DoS worms, viruses, and Trojan horses 12. Which two are examples of Distributed Denial of Service attacks? (Choose two.) B) D) SYN Flood Stacheldraht Ping of Death Smurf WinNuke Targa.c 13. Which two of these are examples of DDoS network attacks? (Choose two.) A) B) smurf attack Tribal Flood Network (TFN) teardrop.c man-in-the-middle attack port redirection social engineering 14. Which two are technological weaknesses that can lead to a breach in an organizations security? (Choose two.) C) D) software compatibility weakness DHCP security weakness TCP/IP protocol weakness operating system weakness LDAP weakness 15. What is the effect of applying this command to a Cisco router? E) router(config)# no service finger UNIX commands are disabled on the router. All TCP/IP services are disabled. PING usage is disabled. Users logged into the router remotely will not be able to see if other users are logged into the router 16. A partial router configuration is shown in the graphic. The network administrator adds the following command at the router prompt. router(config)# security passwords min-length 10 Which of the following is correct? A) The current password will continue to be used as a valid password until changed. No password is required. The current password is invalid and will not allow a login. A password that is at least ten characters long must immediately be implemented for a successful login. 17. The Security Wheel promotes a continuous process to retest and reapply updated security measures. What is the core or à ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ãƒâ€¦Ã¢â‚¬Å"hubà ¢Ãƒ ¢Ã¢â‚¬Å¡Ã‚ ¬Ã‚  component of the Security Wheel? D) testing policy monitor improve security policy 18. After providing for all operational requirements of the network, the network support team has determined that the servers should be hardened against security threats so that the network can operate at full potential. At which stage of the network life cycle does server hardening occur? E) planning design implementation operation optimization 19. A network administrator installs a new stateful firewall. Which type of security solution is this? secure connectivity threat defense policy enforcement trust and identity authentication 20. XYZ Company recently adopted software for installation on critical servers that will detect malicious attacks as they occur. In addition, the software will stop the execution of the attacks and send an alarm to the network administrator. Which technology does this software utilize? host-based intrusion detection host-based intrusion protection host-based intrusion prevention host-based intrusion notification 21. A security team is charged with hardening network devices. What must be accomplished first before deciding how to configure security on any device? Audit all relevant network devices. Document all router configurations. Create or update security policies. Complete a vulnerability assessment. 22. Which two objectives must a security policy accomplish? (Choose two.) provide a checklist for the installation of secure servers describe how the firewall must be configured document the resources to be protected identify the security objectives of the organization identify the specific tasks involved in hardening a router 23. Which router command will result in the router only accepting passwords of 16 characters or more? service password-encryption enable secret min-length 16 security passwords min-length 16 security passwords max-length 16 24. Which command will encrypt all passwords in the router configuration file? D) enable secret password encrypt all enable password-encryption service password-encryption no clear-text password 25. MD5 can be used for authenticating routing protocol updates for which three protocols? (Choose three.) B), D) E) RIPv1 RIPv2 IGRP EIGRP BGP 26. Which configuration will allow an administrator to access the console port using a password of password? B) router(config)# line aux 0 router(config-line)# login router(config-line)# password password router(config)# line console 0 router(config-line)# login router(config-line)# password password router(config)# line console 0 router(config-line)# password password router(config)# line console 0 router(config-line)# access router(config-line)# password password router(config)# line vty 0 router(config-line)# password password router(config)# line vty 0 router(config-line)# access router(config-line)# password password 27. Which command sets the inactivity timer, for a particular line or group of lines, to four minutes and fifteen seconds? E router(config)# line-timeout 4 15 router(config-line)# line-timeout 4 15 router(config-line)# exec-timeout 255 router(config-line)# timeout 255 router(config-line)# exec-timeout 4 15 router(config-line)# line-timeout 255 28. Which encryption type uses the MD5 hash algorithm? Type 0 Type 1 Type 5 Type 7 29. Which privilege level has the most access to the Cisco IOS? level 0 level 1 level 7 level 15 level 16 level 20 30. Which algorithm implements stateful connection control through the PIX Security Appliance? Network Address Translation Algorithm Access Control Security Algorithm Adaptive Security Algorithm Spanning Tree Protocol Algorithm 31. The Cisco Security Device Manager (SDM) allows administrators to securely configure supported routers by using which security protocol in Microsoft Internet Explorer? B) IPSec SSL SSH L2TP PPTP 32. A network administrator has received a Cisco PIX Security Appliance from another division within the company. The existing configuration has IP addresses that will cause problems on the network. What command sequence will successfully clear all the existing IP addresses and configure a new IP address on ethernet0? B) pix1(config)# clear ip all pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 pix1(config)# clear ip pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 255.255.255.0 pix1(config)# no ip address pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 255.255.255.0 pix1(config)# clear ip pix1(config)# interface ethernet0 pix1(config-if)# ip address 192.168.1.2 0.0.0.255 33. A network team is configuring a Cisco PIX Security Appliance for NAT so that local addresses are translated. The team is creating a global address pool using a subnet of network 192.168.5.0 with a 27-bit mask. What is the proper syntax to set up this global address pool? B) pix1(config)# global (inside) 1 192.168.5.33-192.168.5.62 pix1(config)# global (outside) 1 192.168.5.33-192.168.5.62 pix1(config)# global (inside) 1 192.168.5.65-192.168.5.95 pix1(config)# global (outside) 1 192.168.5.65-192.168.5.95 pix1(config)# global (inside) 1 192.168.5.64-192.168.5.127 pix1(config)# global (outside) 1 192.168.5.65-192.168.5.127 34. A network administrator has configured an access control list on the Cisco PIX Security Appliance that allows inside hosts to ping outside hosts for troubleshooting. Which debug command can be used to troubleshoot if pings between hosts are not successful? debug icmp inside outside debug ping debug icmp trace debug trace icmp 35. Which protocol provides time synchronization? STP TSP NTP SMTP L2TP 36. Which command would configure a PIX Security Appliance to send syslog messages from its inside interface to a syslog server with the IP address of 10.0.0.3? D pixfirewall(config)# syslog inside 10.0.0.3 pixfirewall(config)# logging inside 10.0.0.3 pixfirewall(config)# syslog host inside 10.0.0.3 pixfirewall(config)# logging host inside 10.0.0.3 37. The configuration in the graphic has been entered into a PIX Security Appliance with three interfaces. The interfaces are inside, outside, and DMZ. What source address range will the traffic from inside devices use when they access devices in the DMZ? 10.0.0.1 to 10.0.0.254 172.16.0.20 to 172.16.0.254 172.16.0.1 to 172.16.0.254 192.168.0.20 to 192.168.0.254 10.0.0.1 to 10.255.255.254 38. What source IP address will the traffic from devices in the 10.0.2.0 network have when they leave the trusted network? C) 192.168.0.8 always 192.168.0.9 always 192.168.0.8 if ports are available, or 192.168.0.9 if 192.168.0.8s ports are exhausted 192.168.0.9 if ports are available, or 192.168.0.8 if 192.168.0.9s ports are exhausted 39. The commands in the graphic have been entered into a PIX Security Appliance. Which two statements are accurate descriptions of what will happen to outgoing traffic when it leaves the trusted network? (Choose two.) B) C) The source IP address will be from a pool of addresses in the 192.168.0.3 to 192.168.0.254 range. The source port will be a random port above port 1023. The source IP address will be 192.168.0.2 for all outgoing traffic. The source port will be port 1024. The source IP address will be in the range 10.0.0.1 to 10.0.255.254. 40. Interface Ethernet3 on a PIX Security Appliance has been configured with three subinterfaces to pass tagged traffic from three different VLANs. What protocol will be used to tag the VLAN traffic? ISL 802.1x VTP 802.1q 41. Which two commands will configure a static default route on the PIX Security Appliance in the network shown in the graphic? (Choose two.) route inside outside 0.0.0.0 0.0.0.0 172.16.0.2 1 route outside 0.0.0.0 0.0.0.0 172.16.0.2 1 ip route inside outside 0 0 192.168.0.2 1 route outside 0 0 172.16.0.2 1 ip route inside outside 0 0 172.16.0.2 1 route outside 0 0 192.168.0.2 1 42. How are transactions between a RADIUS client and a RADIUS server authenticated? by using a shared secret which is never sent over the network by hashing the secret using MD5 and then sending it over the network by hashing the secret using MD4 and then sending it over the network by using a clear-text password and then sending it over the network 43. RADIUS uses which transport layer protocol? C) IP TCP UDP ICMP DLC 44. Which authentication method is susceptible to playback attacks? C) passwords using S/KEY passwords using token card passwords requiring periodic change passwords using one-time password technology 45. Which authentication method sends passwords over the network in clear text yet protects against eavesdropping and password cracking attacks? C) authentication with FTP authentication with Telnet authentication with S/KEY authentication in POP3 e-mail 46. After a security audit, network managers realized that the authentication method used by their telecommuting employees needed to be improved. They set up a server and installed client software on the employee laptops of their remote users. They also provided a device for each remote user that generated a password every time they needed to make a remote network connection. Which authentication technology does this process describe? B) authentication with S/KEY authentication with token card authentication with encrypted password authentication with compressed password 47. What function does a digital certificate offer to information security? C) authorization accounting nonrepudiation intrusion prevention 48. Bookline Inc., an online bookstore, recently installed a web server running Microsoft Windows 2003 Server. Where should the company obtain a digital signature for the web server in order to assure customers that they are connecting to Booklines server and not an impersonating web server? a digital signature generated by the CA in Microsofts corporate headquarters a digital signature generated by the CA from a trusted third party a digital signature generated by the CA from a government agency a digital signature generated by any CA that establishes a secure connection 49. A large law firm wishes to secure dialup access to its corporate network for employees working at home. Since much of the data to be transmitted is highly confidential, the firm requires a high level of encryption and also prefers that each component of AAA be provided separately. Which security protocol best meets these requirements? TACACS XTACACS TACACS+ RADIUS 50. What are three reasons TACACS+ is preferred over RADIUS for authentication services? (Choose three.) RADIUS has limited name space for attributes. RADIUS is not an industry supported standard. TACACS+ encrypts the entire TACACS+ packet. TACACS+ authentication is included with more recent Windows Server versions. TACACS+ separates authentication and authorization. RADIUS uses TCP as a transport protocol creating additional overhead 51. A static username/password authentication method is susceptible to which three types of attacks? (Choose three.) playback theft teardrop syn flood eavesdropping 52. Company security policy requires the use of a centralized AAA server for network access authentication. Which two protocols are supported by the AAA server? (Choose two.) C) D) IPSec SSL RADIUS TACACS+ SSH 53. Which three are functions of AAA? (Choose three.) A), C) E) accounting availability authentication architecture authorization accessibility 54. A network administrator wishes to use port-level authentication technology to determine network access and assign IP addresses from different DHCP pools to authenticated and unauthenticated users. What standardized framework supports this objective? A) IEEE 802.1x IEEE 802.11af IEEE 802.1q IEEE 802.1p 55. What will be the result of executing the command in the graphic? C) The default login method will use TACACS+ only. TACACS+ accounting will be enabled at login. The enable password will be used if a TACACS+ server is not available. The default TACACS+ user shell will be enabled. 56. Which AAA service reduces IT operating costs by providing detailed reporting and monitoring of network user behavior, and also by keeping a record of every access connection and device configuration change across the network? authentication accreditation accounting authorization 57. What tool should you use to add a single user account to the Cisco Secure ACS for Windows user database? database replication Unknown User Policy RDBMS Synchronization Cisco Secure ACS HTML interface 58. Refer to the exhibit. Which two services can the network access server use to direct requests from the remote user to the Cisco Secure ACS authentication service? (Choose two.) CSAuth CSUtil RADIUS RDBMS TACACS+ 59. RTA(config)# tacacs-server key [emailprotected]? RTA(config)# tacacs-server host 10.1.2.4 RTA(config)# tacacs-server host 10.1.2.5 What will be the effect of these commands on router RTA? C) The TACACS+ server is now authenticating for the hosts 10.1.2.4 and 10.1.2.5. The TACACS+ server key has been exported to the hosts 10.1.2.4 and 10.1.2.5. The TACACS+ servers 10.1.2.4 and 10.1.2.5 and the router have been set to share the same authentication key. The TACACS+ servers are 10.1.2.4 and 10.1.2.5 and the configuration adds router RTA as a third TACACS+ server. 60. RTA(config)# aaa new-model RTA(config)# aaa authentication login default group tacacs+ enable After entering the configuration shown, the administrator loses the connection to the router before having the chance to create a new TACACS+ account. What is the easiest way for the administrator to regain administrative access to router RTA? C) Connect to the router, and use the default TACACS+ username and password. Erase NVRAM, and redo the configuration from scratch. Connect to the router, and supply the enable password. Perform a password recovery procedure on the router 61. Which command associates the group MYGROUP with the AAA server using the TACACS+ protocol? D) Pixfirewall(config)# aaa-server MYGROUP tacacs+ protocol Pixfirewall(config)# aaa-server protocol tacacs+ MYGROUP Pixfirewall(config)# aaa-server tacacs+ protocol MYGROUP Pixfirewall(config)# aaa-server MYGROUP protocol tacacs+ 62. Which configuration command defines the association of initiating HTTP protocol traffic with an authentication proxy name MYPROXY? C) Router(config)# ip auth-proxy MYPROXY http Router(config)# auth-proxy MYPROXY ip http Router(config)# ip auth-proxy name MYPROXY http Router(config)# auth-proxy name MYPROXY ip http 63. With the following configuration command, how long does the PIX Security Appliance try to access the AAA server 10.0.1.10 before choosing the next AAA server if there is no response from 10.0.1.10? aaa-server MYTACACS (inside) host 10.0.1.10 secretkey 12 seconds 15 seconds 20 seconds 30 seconds 64. Which command will enable AAA services on a router? B Router(config)# aaa enable Router(config)# aaa new-model Router(config)# aaa set enable Router(config)# aaa new-model enable 65. What is the default timeout in minutes for the inactivity-timer parameter of the ip auth-proxy command? 15 30 45 60 90 66. The network administrator configured the aaa authorization command below on the PIX Security Appliance. What is the effect of this command? pix(config)# aaa authorization include tcp/22 outside 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 auth1 FTP traffic from outside is subject to authorization by the AAA server. SSH traffic from outside is subject to authorization by the AAA server. HTTP traffic from outside is subject to authorization by the AAA server. SMTP traffic from outside is subject to authorization by the AAA server. 67. Which type of authentication is being used when authentication is required via the PIX Security Appliance before direct traffic flow is allowed between users and the company web server? C) access authentication console access authentication cut-through proxy authentication tunnel access authentication 68. What will be the effect in the router after these configuration commands are entered? B) Router(config)# ip auth-proxy name aprule http Router(config)# interface ethernet0 Router(config-if)# ip auth-proxy aprule An authentication proxy rule called aprule is created making all authentication proxy services available only through the ethernet0 interface. An authentication proxy rule called aprule has been created for the HTTP protocol and is associated with the ethernet0 interface. An authentication proxy rule called aprule has been created for all protocols except the HTTP protocol and is associated with the ethernet0 interface. An authentication proxy rule called aprule has been created for the HTTP server running internally to the router and is associated with anyone attempting to access the web server from the ethernet0 interface. 69. When Cisco IOS Firewall authentication proxy is enabled, a user sends HTTP traffic which will trigger the authentication proxy. What is the first action taken by the proxy? C) The user will be asked to supply a valid username and password. The TACACS+ server will be contacted to see if the user is a valid user. The authentication proxy will check to see if the user has already been authenticated. If the authentication proxy has no user account for the user, it will check to see if a default guest user has been defined. 70. A TACACS+ server is configured to provide authentication, authorization, and accounting. The IP address of the server is 192.168.50.1, and the AAA authentication encryption key is S3crtK3y. Which command sequence will configure a Cisco router to communicate with the TACACS+ server? D) Router(config)# aaa new-model Router(config)# aaa authentication default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# aaa tacacs-server host 192.168.50.1 Router(config)# aaa tacacs-server key S3crtK3y Router(config)# aaa enable Router(config)# aaa authentication default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# tacacs-server host 192.168.50.1 Router(config)# tacacs-server key S3crtK3y Router(config)# aaa enable Router(config)# aaa authentication login default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# aaa tacacs-server host 192.168.50.1 Router(config)# aaa tacacs-server key S3crtK3y Router(config)# aaa new-model Router(config)# aaa authentication login default group tacacs+ Router(config)# aaa authorization auth-proxy default group tacacs+ Router(config)# tacacs-server host 192.168.50.1 Router(config)# tacacs-server key S3crtK3y 71. The lead network administrator notices that unknown users have made router configuration changes. These changes are adversely affecting the network. Which command can be entered on the router to help identify future configuration changes and who made these changes? aaa accounting show uauth aaa accounting console aaa accounting match 72. Refer to the exhibit. Since ABC, Inc. is strengthening security, a PIX Security Appliance firewall must be configured with AAA services. Accounting should be provided for all FTP and HTTP traffic from any host to the WWW server at 192.168.2.10. Which command sequence would successfully process the desired traffic to the NY_ACS accounting server? A pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting match 110 outside NY_ACS pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting access-list 110 outside 10.0.0.2 pixfirewall(config)# access-list 110 permit tcp any host 10.0.0.2 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 10.0.0.2 eq http pixfirewall(config)# aaa accounting match 110 outside NY_ACS pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq ftp pixfirewall(config)# access-list 110 permit tcp any host 192.168.2.10 eq http pixfirewall(config)# aaa accounting match 110 outside 10.0.0.2 73. Which command displays the current authenticated users, the host IP to which they are bound, and any cached IP and port authorization information on a Cisco PIX Security Appliance configured for AAA? B) pixfirewall(config)# show aaa all pixfirewall(config)# show uauth pixfirewall(config)# show aaa statistics pixfirewall(config)# show aaa-server 74. A user has initiated an HTTP session through a firewall and has been authenticated by an authentication proxy. They have not generated any traffic in a while and the idle timer has expired for that user. What will the user have to do to allow them to go through the firewall again? D) The user can manually restart the idle timer. The user can simply TFTP their user profile to t