Monday, September 30, 2019

Jim Hawkins: A Young Pirate Essay

Stories about pirates are some of the interesting and clever stories to tell such as the Treasure Island. It is a classic story about a young pirate, written by Robert Louis Stevenson and published in 1883. It tells about the young boy, Jim Hawkins, who turned into a pirate with his crew searching for the treasure (â€Å"Treasure Island†). Robert Louis Stevenson was a famous Scottish author of travel and adventure books, but he also wrote fiction stories, essays and poems (â€Å"Robert Louis Stevenson†). He pursued engineering first followed by law; however his interest was never in either of those. He was fond of reading and travelled many places before he became a famous writer (â€Å"Treasure Island: About the Author†). The story about Treasure Island is narrated by Jim Hawkins. He tells the story based from his observations, feelings, perceptions, and on how he responds to the people and events around him. He became easily involved in the pirate game and treasure hunting since his family owned the Admiral Benbow inn. There stayed Billy Bones, the captain who has the map of the treasure that Captain Flint buried. Captain Flint is already dead however the men who worked for him are still alive and searching for his buried treasure (â€Å"Treasure Island: Character Profiles†). The first pirate that Jim met is Billy Bones who stayed at their inn. Bones is a ragged, scarred, and drunkard pirate who always sing a pirate song; but he was kind with Jim. He always asks Jim to look out for any seafaring men along the shore which Jim thought that the man only wants some company. However, it turned out that the man is eager to avoid the other seafaring men especially the ‘seafaring man with one leg’ (â€Å"Treasure Island†). One day, another pirate named Black Dog, a companion of Billy Bones, came to Jim and asked for the whereabouts of Billy Bones. Both pirates wrestle until Bones is greatly injured. However, a blind pirate named Pew came with horsemen to Bones and delivered the ‘black spot’. After Bones died, Jim snatched a key and an oilskin packet from Bones. He and his mother left immediately and went to the next village. The village people, however, are not willing to help them and the two hide under the bridge. The men continuously searched for the â€Å"Flint’s fist† but they could not find it. They escaped leaving Pew behind while the horses of the revenue officers from the village trampled him to death (Nelson). Jim and his mother stayed with Dr. Livesey and Squire Trelawney where the squire analyzed the packet that Jim got from Billy Bones. The squire said that it is the account book of the ‘black-hearted hound’. After studying the rest of the oilskin packet, they found a map of Captain John Flint’s Treasure Island. Trelawney became eager to find the treasure and planned the rest of the voyage including the finances. He secured on of the best ships in England, the Hispaniola, and hired several men including a one-legged ‘seafaring man’ named Long John Silver and a group of sailors. Jim unexpectedly became part of the instant adventure (Nelson). Long John Silver was very much liked by Jim and the squire because of his performance as the ship’s cook. At the beginning of their journey, he is friendly and helpful to the rest of the crew however he is as notorious as Captain Flint who is concerned only about the money he can get (â€Å"Treasure Island: Character Profiles†). Jim, while hiding in an apple barrel, accidentally overhears Silver, Israel Hand, and Dick talking about their plan of overtaking the ship once they get the treasure. After getting on land, Captain Smollet together with his men fought with Silver and the pirates. Jim and his group escaped together with Ben Gunn, one of the original members of Captain Flint’s crew who was abandoned in the Treasure Island three years ago. Jim together with his group is lead to Gunn’s secret cave where he relocated Captain Flint’s treasure. In spite of Silver’s plan, Jim, Trelawney, Dr. Livesey, Gunn and the rest of the group are able to retrieve the treasure and haul it to Hispaniola and return to England (â€Å"Treasure Island†). Treasure Island is an exciting book inspired by adventures of notorious pirates. During the early 1700s, thousands of pirates wander along different seas in the world who plundered ships and private vessels for coins and precious metals that were likely hidden in small islands. This perhaps is one of the sources of Stevenson’s pirate stories. However, most of the pirates began in their early twenties until they age fifty or so, some crippled, blind, or dead. Young pirates were also common, but there were no enough records to prove that teenagers became fierce pirates. Young pirates like Jim Hawkins is like a dream come true for kids who always dream of sailing and travelling and someday finding a treasure (â€Å"Treasure Island†). In the early 18th century, there was a story about a young boy who joined a group of buccaneers. The story was based from the records of Captain â€Å"Black Sam† Bellamy. In 1716, Captain Bellamy’s ship Marianne attacked Bonetta, a ship travelling from Antigua to Jamaica. Some of Bonetta’s crew joined the pirates. John King, a kid travelling with his mother, also wanted to join the group of buccaneers so bad that he even threatened to kill himself after the captain did not allow him. It was not clear why John wanted to become a pirate, but there were speculations that maybe he was with a harsh parent or he does not want to go wherever they are going. Later, a kind a charismatic Captain Bellamy allowed John King to join the band (Krystek). In connection with the story of John King, a treasure hunter named Barry Clifford searched for the remains of Captain Bellamy’s boat – Whydah that sunk along Cape Cod. He found a cannon, artifacts, and silver coins. The artifacts they found included a human leg bone, a stocking, and a shoe belonging to a tiny adult, as he said. However in 2006, after the bone was examined in The Center for Historical Archeology in Florida, they found out that the bone belonged to a child aged between eight and eleven years old. The tale of a John King, a little boy who turned into a young pirate indeed was true (Krystek). In the early chapter of Treasure Island, the story was established through the first person narrative of Jim Hawkins. Money is introduced as the major driving force of the characters’ actions. Through Jim’s narration of events, greed and corruption are even more highlighted. As the number of pirates looking for the map increases, it pushes Jim into learning more about the treasure and acquiring the map. The first six chapters slowly unravel Jim’s transformation. He is now not controlled by Billy Jones and the other pirates and he chooses to stand with his mother and save her. He is beginning to take part into the action happening and acted like a hero (Nelson). In the middle chapters, more terrible things happened which challenged how Jim would respond. Jim has witnessed several deaths including Billy Bones’ and Tom’s. However, his response to the death of Tom’s death is different from Billy Bones’. He cried at Bone’s but not to Tom’s death where he just sat in silence. Upon arriving at the island after all the terrible things that he witnessed, Jim found a friend and a father figure whom he has gained trust (Nelson). At the later chapter, Jim is able to develop both physical and moral strength after their triumph against the pirates. Jim is able to survive and gain enough guts to face Silver and his crew and help his crew. He has matured and does not act like a child in the middle of the events. Jim is a child and adult in deciding and justifying the things he did. He is now acting not just to save himself but also the rest of his crew after he stole and find a boat. He became the story’s hero but not because of luck and fortune. Also, Jim does not forget how to be adventurous and try things despite failure. He never gives up although he is now engaging to wrong choices, these are justifiable by the arbitrary death that could happen anytime (â€Å"Treasure Island: Character Profiles†). Throughout the story, Jim Hawkins character changed from a simple observer of the events around him into a character who became actively involved and became a certified pirate. Even though he is just a kid, he is able to help in uncovering the mutiny plan of Long John Silver and retrieve the treasure. He became a competent boy physically and beat Israel Hands. He has grown morally mature after choosing not to run away from Long John silver despite Dr. Livesey urging him to. Jim is a smart boy with courage and good heart. Anyone reading the book could easily identity himself with Jim. Stevenson created it in such a way the reader could put his own imaginations in place of Jim. Jim Hawkins is an open, predictable character who narrates the story by telling what he sees and observed, but is close in telling his own feelings and thoughts about the other characters (Nelson). The transformation in Jim’s character was evident when he delivered a speech to the pirates. He is able to survive and save himself against the fierce pirates by offering deals that an adult would usually do. His courage has developed from their journey, a courage that he does not have back to the inn. An interesting encounter between Jim and Long John Silver once proved Jim’s ability to stand up and fought for himself even though it is Silver, a notorious pirate, he is talking to (Nelson). Jim Hawkins justifies the thoughts and imagination of a teenager and later the beginning stage of maturity developed from the combination of different adversities. The story of Jim Hawkins and the Treasure Island is not as exciting as it is when summarized because there is no other of telling his story in such an engaging way except reading all the chapters. Works Cited Krystek, Lee. â€Å"The Littlest Pirate†. 2006. 5 May 2008. . Nelson, Britanny. â€Å"Gradesaver: Treasure Island – Study Guide – Character List†. 2008. 5 May 2008. . â€Å"Robert Louis Stevenson†. 2008. Jalic Inc. 5 May 2008. . â€Å"Treasure Island†. Bibliomania. com Ltd. 5 May 2008. . â€Å"Treasure Island†. 2008. Wiley Publishing. 5 May 2008. . â€Å"Treasure Island: About the Author†. 2008. Wiley Publishing. 5 May 2008. . â€Å"Treasure Island: Character Profiles†. 2008. Novelguide. 5 May 2008. .

Sunday, September 29, 2019

Information Systems Security Essay

In today’s IT world every organization has a responsibility to protect the information and sensitive data they have. Protecting data is not only responsibility of security and IT staff but every individual is involved in protecting the information. The risks to information security are not digital only, but it involves technology, people and process that an organization may have. These threats may represent the problems that are associated to complex and expensive solution, but doing nothing about these risks is not the solution. The case we have been assigned today deals with physical and logical vulnerabilities and protection against the risks and threats by implying the best controls to either mitigate, avoid and transfer the risks. Being an Information Security officer at a newly opened location in a busy mall, I have been asked to identify physical and logical risks to the pharmacy operations and also to suggest remedies to avoid any huge loss to the business. The pharmacy operations involve the unique transactions which involves the critical patients’ data, valuable medication and access to cash. The regulation set by the government obligates a pharmacy to meet certain standards to secure logical and physical access to information systems. The pharmacy is comprised of 4 work stations, there is a drug storage are and an office in the premises which has a file server, domain controller and a firewall. The three of the four work stations are placed at the counter to record and retrieve information of customers’ order. The entry of the store if from the mall and there the drug storage area is securely locked location behind the front counters. The store has a back door entry which is used by the employees and for delivery of new drugs. As an IT officer I have to protect all aspect of security including physical security of IT systems. Information Systems Security Physical security is an essential part of information technology security. Physical security encompasses not only the area containing system hardware, but also locations of wiring used to connect the systems, supporting services, backup provisions and any other part of the systems. Laptops and other types of mobile computing devices must also be protected from theft. The data on the mobile devices sometimes more than the value of the device. Such devices can also be an entry point on network. First look at the physical vulnerable area to IT systems within the pharmacy. After identifying the IT assets of company we can surly identify the physical risks. * Server Room * File server * Domain controller * Front Counter workstations * Switches/hubs The back door as showed in the floor plan is used by the employees of the pharmacy and it is often used for delivery of drugs. The access through this door is a physical vulnerability. Only authorized personal should be allowed to use this door. Any unidentified entry or activity should be monitored carefully. Such incident can result in loss of physical devices. The server room is a highly secured area which should be allowed only to IT people, other personal should be granted access by seeking special approval. The door should be locked all the time to protect IT assets. The workstations at the front counters should also be locked and placed securely to avoid any theft. The caged area cannot be locked all the time, it would result in low productivity as the staff move between the store, office and front counters. Securing the server room by locking it is the first step; surveillance makes it more effective if someone breaks into the server room. In case of an incident, one can easily pull up the video and check it for a particular time or for a particular event. â€Å"A logical breach affects the network, data and software without physically affecting the hardware. One of the problems with any logical breach of security is that the damage is invisible and its extent is unknown†. (Georgia Institute of Technology). As we read in the book, vulnerabilities are found in all seven domains of the network: * User Domain: * Lack of awareness of security policy * Accidental acceptable use policy violation * Intentional malicious activity * Social engineering * Workstation Domain: Unauthorized user access * Malicious software introduced * Weaknesses in installed software * LAN Domain * Unauthorized network access * Transmitting private data unencrypted * Spreading malicious software * LAN-to-WAN Domain * Exposure and unauthorized access of internal resources to the public * Introduction of malicious software * Loss of productivity due to Internet access * WAN DomainTransmitting private data unencrypted * Malicious attacks from anonymous sources * Denial of Service attacks * Weaknesses in software * Remote Access Domain * Brute-force attacks on access and private data * Unauthorized remote access to resources Data leakage from remote access or lost storage devices * System/Application Domain * Unauthorized physical or logical access to resources * Weaknesses in server operating system or application software * Data loss from errors, failures, or disasters† (Kim, 2012) System and data could be vulnerable due a physical breach where an intruder affects any system or node by uploading some invisible malicious code on one of the computers. Usually the logical breach results due an unauthorized access to the system/network. The users on the front desk should be given access to the information they need to perform their job on need to know basis. Any workstation is capable to breach into sensitive information. Access to any machine could lead to confidential information breach. All users are required to use their credential to access information on the network. A strong password is required by the policy outlined by the IT department. Logical vulnerability deals with anything which is to do with computer software/network other than the physical network. People are the weakest link in the whole chain. They are the biggest threat to the IT network; any user could compromise the system without even knowing the result of his/her actions. Users using personal device on the enterprise network is the biggest threat ever. Use of personal media should be strictly prohibited because it could bring in the malicious code which gives access to hackers to break into network and steal confidential information. A weak password also helps intruders to disguise them as the legitimate user and access the information to compromise the network. Software and antivirus updates could also be crucial if it is not done on time, it can lead into breach. The physical threat and vulnerability can result in huge loss in revenue and confidential information leakage. As mentioned above, any physical vulnerability can result in loss such as theft of the equipment, any device plug to attack remotely or record data. We often printers in the network security, most printers nowadays stores information on built in memory on the printers before printing. If somebody walks out with the printer, access to information in printer’s memory can be accessed easily. Figure 1 Key Logger As showed in the picture, there is a small device which is a key logger. If any personal (internal or external) have access to the assets of the company can install such a device which will not be found with careful examination. Such devices can log the keys strokes which will open a door for attackers to get access to information all the time. Figure 2 Threats & Potential Impact The picture above is self-explanatory, is the network is physically or logically vulnerable any attacker can break which can lead to the impact mentioned above. In case of pharmacy where it is required by the law to take very extra care of customers’ confidential information no risks can be taken. In-case the network is compromised due to physical and logical vulnerability, the attacker can disrupt the whole business. Some disgruntle employee can cause DOS which will bough down the network which will result in delay in orders, low productivity. Vulnerability can also cause loss of information, loss of privacy of customers, legal liability due to leakage of confidential information which is governed by the HIPAA. And above of all reputation among customers, it is very difficult to gain customers’ confidence if it is lost just because of any event. To identity and deal with risks, we are going to take the same approach as defined in the book. After carefully examining the risks, we are going to analyze the impact and based on the impact we will develop a strategy either to mitigate, transfer, avoid or accept the risks. Figure 3 Risk Management Process To deal with the physical risks identified above, the best strategy would be to mitigate or transfer it in-case of any event. Numbers of steps are suggested to mitigate the risk due to physical vulnerability. The back door is used by employees only. The server room is always locked and with prior permission no other than IT personal can enter in it. All IT assets have been locked securely to avoid any theft. Surveillance is also part of our strategy to mitigate any risks. Risks transfer strategy comes into play if anything happened to IT assets. Based on the value of assets most of the assets are covered under insurance. But data is such a valuable asset of the company that no insurance can cover the loss of data theft. After evaluating the logical vulnerabilities, I am going to suggest risk mitigation and risk acceptance strategy. â€Å"Malicious attacks increasingly complex variations are continuously being introduced and can sometimes spread widely before protection software companies deliver the latest detection strings and solutions†. Standard for Technology in Aumotive Retail, 2012) . The first step would be to mitigate the risks at any cost) but since the people are weakest link in the whole IT security scenarios they tend to do things unintentionally which compromise the security. Based on these facts I have also suggested the risk acceptance strategy. This fact is known by most of the businesses but they still do it because they do not perform any operations without manpower. The staff working at front desks or any employee at the pharmacy could use personal media which could lead to any attack. The weak password can also help attackers to use logical bomb technique to guess the password. A strong administrative control is required to avoid such incidents. Some of the suggestions to mitigate the logical vulnerabilities: Security Awareness- as mentioned above the people is the weakest link in the IT security. User awareness on virus control is the most effective tool to control it. In the awareness programs they should be reminded that data should be accepted from the trusted sources. Incase they receive files from untrusted source should not be open. Persona media should be approved by IT department to use. Patch Management- latest patch protects the system against the latest viruses. It is a process that updates the vulnerable areas on the application level. Hackers usually use the flaws and weak points in the system and exploit them to get on the network. Software OEM issues a new update to fix the issue, windows and antivirus auto update is common examples of such patch management. Most organization does not allow automatic updates due to interference in current operations. They usually test the patch on test environment before replicating it to production nodes. Anti-virus scanners – these products scan files and email and instant messaging programs for signature patterns that match known malicious software. Since new viruses are continually emerging, these products can only be effective if they are regularly updated with the latest virus signatures. See your product manual for instructions on how to activate this. Anti-virus scanners can be positioned on gateways to the network and/or on network hosts. Anti-virus scanners need to be frequently updated to be effective. Therefore, regularity and method of update are criteria that need to be considered when selecting anti-virus products. The first line of defense is administrative controls against any physical and logical threats. These are the policies which is prepared and approved by the management to staff for compliance. In pharmacy’s case strict policies are suggested to comply with regulatory compliance (HIPAA). First of all physical access to premises especially from the back door needs to be secure. The policy to enter in the building using a cat card or smart token is mandatory which a control to prohibit any unauthorized access. The IT room is also protected by a digital lock which can only be accessed by ntering correct combination of the password. The IT devices cannot be move out without prior approval from management on a prescribed form. Another preventive control is to disable all removable media from the systems at the front desk. The USB/serial ports are disabled and it can only be granted on special approval. To control logical vulnerabilities I have suggested mix of administrative, detective, preventive, corrective controls. All users by policy are required to use strong passwords, the password must contain, one letter in caps, one symbol/numeric value. The total length should be between 8-20 characters. Users are required to change the password every 30 days and they cannot use passwords any 10 previously used passwords. Users are also cautioned about not to write passwords. Most of the employees have role based access to IT systems. All front desk employees go straight to the application required to book patients’ orders. They cannot open or use personal email on the systems. The access to internet is controlled by the web application filter which only allows users to check pre-approved sited required to manage operations. All systems have the latest updated antivirus software which does not allow any infected file to execute. The best strategy to deal it with is preventive. Similarly to prevent any intruder in the network, IDS are deployed to monitor any unusual activity. Backup of data with regular interval makes it possible to continue the business in case of any break down due to any malicious activity. The data is backed up with only last changed items after every 4 hours. As mentioned earlier the patients’ data is highly confidential, any loop whole can result in legal liabilities.

Saturday, September 28, 2019

The Formation of Lightning Essay Example | Topics and Well Written Essays - 750 words

The Formation of Lightning - Essay Example A lightning discharge that involves an object on ground or in the atmosphere is sometimes referred to as a "lightning strike". The term stroke or component stroke apply only to components of cloud to ground discharges. Each stroke involves a downward leader and an upward return stroke, and may involve a relatively low level "continuing current" that immediately follows the return stroke. Transient processes occurring in a lightning channel while it carries continuing current are termed M-components. First strokes are initiated by "stepped" leaders while subsequent strokes formed by previously formed channels are initiated by "dart" or "dart-stepped" leaders (Rakov & Uman: 4). extreme heat. A lightning bolt is hotter than the surface of the sun. The wild electricity in lightnings when harnessed, produce power supply for human use. Lightnings are of several types (Google image, 2008). The various stages in the formation of a bolt of lightning (Figure 1.) is as follows: First, cumulonimbus clouds which are towering clouds that spread out on the top, occur between 1,600 and 60,000 feet in the atmosphere, and are associated with heavy thunderstorms, rainfall and lightning. During a thunderstorm, clouds develop a separation of electric charge, with the tops of the clouds positively charged, and the bottoms negatively charged. The production of a lightning bolt begins when the negative charge on the bottom of the cloud gets large enough to overcome air's resistance to the flow of electricity and electrons begin flowing towards the earth in a zigzag, forked path at the speed of about sixty miles per second. This discharge is called a leader and it moves directly towards the ground. As the electrons flow downwards, they collide with air molecules, producing more free electrons. However, this is not the actual lightning bolt that is visible to the human eye (Science 1, 2 008).In the meantime, as the electrons approach the ground, the ground becomes more and more positively charged due to the repulsion of electrons in the ground. This positively charged region moves up through any conducting objects on the ground such as houses, trees, people, into the air. When the electrons moving downwards meet the upward flowing positive regions at an altitude of a hundred meters or so, they form a complete circuit, and the lightning begins. However, the lightning bolt is still forming at this point, and it is not the actual one that is seen. Once the circuit has been formed, it takes less than a millisecond before it is seen as the actual lightning bolt (Science 1, 2008). In less than a millisecond, upto a billion trillion electrons may reach the ground, the current can be up to 200,000 amperes, and the main act of lightning, the return stroke is then seen. The return stroke which travels at almost half the speed of light, is able to reach three or four miles back up to the cloud, and relieve it of its large excess of negative charge, about 100 quintillion electrons. The channel that was established by

Friday, September 27, 2019

Essay question Example | Topics and Well Written Essays - 750 words - 2

Question - Essay Example For example, considering that patriarchal social systems are the norm during the time of revelation, one can see why the choice of a male messenger of God in the form of Prophet Mohammad strengthened the status quo. What Wadud seems to be implying is that although there is no dispute about the revealed word, its documentation and dissemination was exclusively done by men, making it susceptible to sub-conscious (if not deliberate) gender bias. Seen in this perspective, the Holy book could be interpreted as a divine code meant to apply only to men and which employs masculine language and viewpoints throughout. With this new understanding it is then a natural course of action to reinterpret the text from a female point of view, by discounting historical patriarchal prejudices and attitudes toward women. Added to this there are limitations of language itself, which is found inadequate in encapsulating the numinous and transcendent into the range of common human experience. However sophisticated the syntax, grammar and flexibility of Arabic languages, they cannot capture experiences that are beyond words. This could mean that there is a divergence between divine intent and the Holy Quran. Also, divine revelation is a process and not an event. This was true even during the life of Prophet Mohammad, when divine guidance did not cease to arrive to him till his last days. So, if one sees the guidance provided by Allah as perennial and emergent, there is plenty of scope for constructing a fair and just code for womens role in society. If one would accommodate these adjustments to the reading of Quran, as the author Amina Wadud proposes, the the text ceases to be as oppressive for women as it is made out to be. I largely agree with the authors assessment and her suggestions for a progressi ve reinterpretation of the Quran. 2.

Thursday, September 26, 2019

Circuits design and application Essay Example | Topics and Well Written Essays - 1250 words

Circuits design and application - Essay Example Here the output of the analyzer is audio, so it can use any scope for the display. The analyzer functions as a Tunable RF Voltmeter. This makes it function as a natural receiver / transmitter tracing signals. A display of the frequency is provided using the analyzer on a transmitter. Owing to the high sensitivity of the instrument signal tracing receiver circuits are permitted from the antenna through the low-level Radio Frequency stages. Whereas a conventional RF voltmeter adds up all the individual voltages as a summation without indicating the components it is not the case with a spectrum analyzer. Additionally the analyzer displays local oscillator signal and its frequency and injection levels. A tracking generator added to the basic spectrum analyzer makes a powerful receiver system for measurements of stimulus-responses. The tracking generator is a signal source whose RF output tracks the tuning of the analyzer. Since the instantaneous output frequency is matched with the input frequency of the analyzer, this swept frequency test system actually substitutes for an effective synchronous detector. This ideally caters to the measurement of the frequency response of devices such as amplifiers, attenuators, mixers, transmission lines, couplers and even antennas used with an external bridge. Two or more oscillators mixed together generate the output. Typical application of the tracking generator consists of the RF output being connected to the device under test and its output in turn connected to input of the spectrum analyzer. The display resulting is the instantaneous plotting of the frequency response of the device under test. If one were looking out for a CRT display all t hat was needed was a 3 digit readout that could display 0 to 500 MHZ directly covering anywhere from a few MHZ to several hundred. Besides the conventional all-digital circuit solution there exists an alternate solution based on the Precision Frequency-to-voltage converter IC, along with the output of the pre-scaler IC. This is a low cost alternative for directly displaying the received frequency of almost any receiver. Simple adjustments to a potentiometer is all that is required to accommodate any IF frequency from zero to hundreds of MHZ. When the circuit is designed with a digital voltmeter and the DVM set on the 20 volt scale, 0 to 500 MHZ will be displayed as 0.00 to 5.00 volts. Front Panel Layout Instead nowadays we have the digital panel meter module such as the above which is ideal and reads directly in MHZ. Typical Design specifications for a Spectrum Analyzer R3132: 9 kHz to 3 GHz R3132N: 9 kHz to 2.2 GHz (75 ohms) R3162: 9 kHz to 8 GHz Signal Purity - 105 dBc/Hz 20 kHz Offset 100 dBc/Hz 10 kHz Offset Total Level Accuracy - Maximum 1.5 dB High-speed GPIB, Effective for System Applications High Speed Measurement - 20 Traces per Second 6.5-inch TFT Color LCD Built-in Frequency Counter 3 GHz Tracking Generator (Option) Floppy Disk for Data Saving Large Numeric Display for Measurement Results (In Counter and Power Measurement Mode) Printer Port RS-232 Port VGA output 20 dB Preamp QP detector and EMC filtersSpectrum analyzers are used widely to make measurements of radio frequencies. Performances at high levels are guaranteed as compared to a few years ago.

Wednesday, September 25, 2019

Interim Report for an action research Assignment

Interim Report for an action research - Assignment Example How does learning Arabic impact their education and life outcomes? The third purpose of the action research has to do with the ways that I can personally improve the process of teaching Arabic as a second language to students who are not native speakers of Arabic. The key data observation method is observation from the field, with my classroom as the field of observation, and my students and myself as the subjects of the study, relative to the learning and teaching of Arabic as a second language to non-native speakers. From the observations with another teacher of the Arabic language, Qassem, I am able to find out that there are several shortcomings at present with regard to the way we teach Arabic as a second language. These shortcomings are not failures in themselves, but are areas for improvement, derived from daily experience. These observations have led me to craft a new teaching method that I will call â€Å"correct me†. The details of that new and evolving teaching technique follow in the next section. The new technique hopefully is able to cover Arabic language learning in its various aspects: reading, speaking, writing and listening. The â€Å"Correct Me† teaching method is straightforward, but involves a keen interest in student learning, and an alert presence. At the heart of it is an intent listening and a willingness to give oneself to the students so that they may learn. This technique has two aspects. One aspect involves me making real-time corrections to student mistakes in speaking and writing Arabic. The technique involves an alert presence so that the teacher is able to spot mistakes. The second aspect involves students forming groups, and being present to one another as they converse and write in Arabic, correcting their peers as they make mistakes. For feedback, my intention is to survey students at the end of a class to find out how they find this new teaching technique: if they like it, if they are benefitting from it, and what

Tuesday, September 24, 2019

Human Resource Management Models Essay Example | Topics and Well Written Essays - 1500 words

Human Resource Management Models - Essay Example The soft approach appears to be the better option considering the human ability to change and adapt, but as we will see, it cannot be used alone to manage human resources. We need to integrate approaches and find a multidisciplinary approach to dealing with people. How much of people management depends on theory and how much cannot be measured "In theory, practice and in the workplace experience, though people appear to be of central concern, the rich, warm, unpredictable face of humanity are all too clearly absent." Perhaps the most difficult question to answer is whether people are better lead or managed. Do people respond better when encouraged by a leader or when they are managed To begin with, it is necessary to understand what human resource management is and how it works. Every business runs on resources and the one resource that it cannot function without, is its staff. Human resource management is therefore about getting the most out of staff members (Human Resource Management Guide). Human resource management also, however, includes deciding which individuals are better suited to which position as well as conducting sufficient research to determine the best placement of individuals (McNamara 2008). We can now determine what has to be done with regards to human resource management, but there are two ways of going about this: we can either look at the humanistic approach or at the objective 'hard' approach. ... Two schools of thought were developed with hard and soft theories in mind: Harvard and Michigan. Harvard follows the soft model more closely while Michigan is based on the soft model. The normative model seeks to consolidate both the strategic management of the business as well as the interpretive model which is considered soft (Gill: 3). The problem here is that according to Gill (1999) "there are problems in the integration of HRM policy with business strategy and evidence indicates that HRM is more ad hoc than strategic."(Gill 1999: 3). In this case, one cannot assume that what is good for he business is necessarily good for the employee (Gill 1999: 3). The hard model would therefore focus on the employee as a resource, assuming that whatever causes the business to soar, will automatically uplift the employee (Gill 1999: 4). The intuitive problem is that humans are not controllable and they are not constant. Human's cannot be 'paid off' or compensated with more pay without regarding emotions or feelings even though this is a simple solution to a complex issue. In Gill and Meyer (2007) it was ascertained that outsourcing of certain business portions yielded dramatic results (Gill and Meyer 2007: 4). These results were not necessarily good ones, in the sense that businesses no longer had to employ people to do the jobs they could outsource, leading to job-losses and retrenchment. Despite this, there has to be an increase in individual 'soft' model relationships with employees if the employee numbers are smaller (Gill and Meyer 2007: 4-5). According to Gill and Meyer too, human resource management has to "manage the simultaneous pursu it of soft and

Monday, September 23, 2019

Ethical Issues Regarding Informed Consent in the Workplace Essay

Ethical Issues Regarding Informed Consent in the Workplace - Essay Example Different participants at these establishments have different views and beliefs on what is ethical and what is not ethical. An important concept to be derived from the study of ethics is that its applications in the different fields are interrelated and one application can be used to explain the other in a different field (Hardwig, 2010, p.1). Nevertheless, a lesson learned from ethical issues arising in business could be used to solve analogous issues in medicine or any other field. 2. The need for â€Å"informed consents† The controversial issues arising in ethics are due to the diverse human nature and the difference in cultural values. What an individual values most may be of very little value to the other person. In medical ethics, it would be considered that main aim of providing healthcare services is to promote good health and ensure a longer life for the patients. However, there are other factors that affect human desires and that will limit our access to the health s ervices (Hardwig, 2010, p.1). It would be argued that the health providers should make all the attempts to satisfy the needs of the patients by avoiding issues like the cost consideration. This becomes controversial as a point may be reached when the operations at the health center cannot continue due to lack of resources thereby endangering other people’s lives. Besides, it is worth mentioning the fact that a patient went to the hospital to seek medical services does not mean that the medical officer has a full say on what to be carried out, neither does it mean that the patient needs all that the doctor wants to provide or perform (Hardwig, 2010, p.1). Similarly, the view a shareholder would be that his profit in an investment be maximized. However, there will be other factors that influence the desires and that will determine if the profit maximization is the supposed interest. The effects of this profit maximization on the conditions imposed on the employees of an organiz ation will provide an evidence to evaluate such procedures. In most causes, it would turn out to be unjustifiable for an investor to be only interested in the profit maximization (Hardwig, 2010, p.1). These controversial issues call for what is referred to as â€Å"informed consent.† It involves informing the participants to a given decision making activity the probable risks and the conditions associated with the actions to be carried out (Ilgen & Bell, 2001, p.1). It is aimed at ensuring that ethical standards are observed in handling individuals with different interests. It has been found to be applicable in various fields of social sciences that entail research with human participants. The participants in a research need to be informed of the risks involved in participating in the research. However, the American Psychologist Association asserts that there are certain instances when the use of â€Å"informed consents† can be ignored, though it may not be very clear the circumstances under which this may be true. Various legislations have been enacted in the US that protects the rights of the participants in a given research (White, Parascandola & Bero, 2007, p.1). 3. Ethical issues and informed consent in medicine The basic guiding principles that most people value like profit maximization in business or good health and prolonged life in the healthcare

Sunday, September 22, 2019

FIN501 - Strategic Corporate Finance Mod 3 SLP Essay

FIN501 - Strategic Corporate Finance Mod 3 SLP - Essay Example But we might wonder what determines the rate of return that a shareholder would want on a particular stock? It would depend for one thing on the price of the stock (highs, lows and average) and the historical trend of dividend payouts that has been made in recent years. Though every stockholder would have his personal thoughts and opinions on this, we can be sure that it would be higher than the risk free rate- the rate on US Government bonds maturing in one year and guaranteed by the Government. It would also depend on the Beta coefficient for that particular stock. In fact a good estimate of the rate of return expected by a stockholder in relation to a particular stock would be given by the Capital Asset Pricing Model formula which goes as follows: Rj - RF = ÃŽ ²j [RM - RF]. By using this model, we can estimate the cost of equity or the rate of return that our companys shareholders require. Every financial manager must be aware of this because it will help to determine whether a particular course of action by the company will or will not add value to the shareholders. This is the minimum rate of return and may be regarded as the cost of equity. Given that the average cost of capital for a firm in the S&P 500 is 10.2 percent, I would have expected the Coca Cola Company to have a lower cost of capital than the average firm. This is because the Coca Cola Company is a good stock with consistency in performance and price. The price fluctuation for Coca Cola stock has not been too much, with a current price of $67.46, a low of $61.29 and a high of $71.77 in the last 12 months (Yahoo Finance, 2012). Now I will compare the Beta and compute the Required Rate of Return using the CAPM for Dr. Pepper and the Pepsi Corporation, two competing firms of the Coca Cola Corporation and in the same industry sector. For Dr. Pepper the Beta is 0.74 and for Pepsi Corporation, the Beta is 0.42 (Yahoo Finance, 2012). The required rates

Saturday, September 21, 2019

PLato and Education Essay Example for Free

PLato and Education Essay Plato was the earliest most important Greek Philosopher and educational thinker. Plato thinks education as a key for a society and he stress on education, for this purpose he want to go to the extreme level even removing children from their mothers and rise them by the state, he want to identify the skills of the children and give them proper education for that particular skill which they have so they could be become a suitable member of the society and fulfil their duty in society. Plato want to a search for intelligent and gifted children in the whole society, Platos don’t belief that talent belong to a limited class therefore he stress on education for all so the talented children get the chance to shine. Plato contributed a lot in the form of ideas and it inspired his follower to find new ways for education and training of the children. In fact Plato himself did not contribute directly to science and mathematics but he stress on these subjects, his philosophy of education influenced the developments of these subjects in centuries to come. In the philosophy of Plato we can see some signs of the philosophy of Socrates; However Plato covered the major aspects of philosophy discussed today. Plato was born in an upper class family in Athens; he was interested in political career, but after the death of his teacher Socrates Plato pursues his teacher philosophy. For the purpose of education Plato travel to Egypt and Italy, there he learnt mathematics. After returning home he established an Academy, to teach moral values to the elite youth of Athens to make them better leaders of the society. Plato shows his ability of writing in different fields; ethics, music, drama, poetry, metaphysics, dance, architecture which are the ideal forms of Government. Contribution of Plato in scientific subject is little but his ideas on education inspired his followers to explore new dimension in education. Plato writes in his book Let us describe the education of our men. What then is the education to be? Perhaps we could hardly find a better than that which the experience of the past has already discovered, which consists, I believe, in gymnastic, for the body, and music for the mind. Plato not only consider better education for men but also believe on strong body and sound mind, for body he recommend sports and for sound mind music. Plato †No man should bring children into the world, who is unwilling to persevere to the end in their nature and education. † EDUCATIONAL THEORIES OF PLATO Education for All Plato want every boy and girl educated to it limit. State Education Education should be provided by the state not by parents. Organization and Curriculum. Plato curriculum was consist of gymnastic and music, where in gymnastic include physical training and music used in broad term for dram, history, oratory and music in real term, he define different stages for the organization and curriculum; 1. Elementary School Co-education at elementary level and teach them mathematics, poetry, music and literature till the age of eighteen years. 2. Military Training After elementary education two years of Physical education should be given to them and select best of them for higher education; to prepare for the future guardians of the state. 3. Higher Education Higher education should be given from twenty to thirty-five years of age, he well study the subjects at this stage mathematics, literature and philosophy. Later on he would be opponent at a minor administrative position to get experience for the future more important governing positions. â€Å"The object of education is to turn the eye which the soul already possesses to the light. The whole function of education is not to put knowledge into the soul, but to bring out the best things that are latent in the soul, and to do so by directing it to the right objects. The problem of education, then, is to give it the right surrounding. † -(Plato’s Republic, Book vii, 518) Nothing was more important to Plato in human life as education. He considers education the greatest thing in human life as he mention in his book â€Å"the one great thing†. Plato’s Theory of education was an indispensable necessity for mankind. It was a positive remedy for the problems and operation of justice in an ideal state. Women Education Plato also emphases on women education, he consider the same kind of education for women. Women should the same physical and educational training; they should know the art of war. The main aim of Plato was that each member of the society should undertake his work and responsibilities. Plato believed that women are equal to men and that, although some women are physically smaller or weak, some women are physically equal to men therefore those women who are physically strong should be allowed to learn the same skills that men do. In his book Republic Plato describes how male and female receive the same education and be given the same duties in society as given to the male member. These people are the ones who will be in charge his republic which would be an ideal society, where philosophers are kings. In other words, who know what is good for the people and for the mankind and take their decisions based on that knowledge. Teaching Methods Plato recommended play method at elementary level; student should learn by doing. And when he reached the higher level of education, his reason would be trained in the processes of thinking and abstracting. Plato wants motivation and interest in learning. He is against the use of force in education. Knowledge which is acquired under compulsion obtains no hold on the mind. In another place he writes Do not then train youths by force and harshness, but direct them to it by what amuses their minds so that you may be better able to discover with accuracy the peculiar bent of the genius of each. – Plato Plato writes in his Republic â€Å"Bodily exercise, when compulsory, does no harm to the body; but knowledge which is acquired under compulsion obtains no hold on the mind† Plato â€Å"The most effective kind of education is that a child should play amongst lovely things. † Plato wants a place where children love to go and stay there and they play with things which enhance their education by playing. Plato gives importance to nursery education, he thinks nursery education plays a vital role in the education of man, it help to build his moral character and state of mind The most important part of education is proper training in the nursery. –plato Plato think It will be hard to discover a better [method of education] than that which the experience of so many ages has already discovered, and this may be summed up as consisting in gymnastics for the body, and _music_ for the soul For this reason is a musical education so essential; since it causes Rhythm and Harmony to penetrate most intimately into the soul, taking the strongest hold upon it, filling it with _beauty_ and making the man _beautiful-minded_. The above quotation of Plato show, how he sees education, he wants the total development of a man, mind body and soul by using every possible mean. That why in another place Plato writes; But then, if I am right, certain professors of education must be wrong when they say that they can put a knowledge into the soul which was not there before, like sight into blind eyes. They undoubtedly say this, he replied. Whereas, our argument shows that the power and capacity of learning exists in the soul already; and that just as the eye was unable to turn from darkness to light without the whole body, so too the instrument of knowledge can only by the movement of the whole soul be turned from the world of becoming into that of being, and learn by degrees to endure the sight of being, and of the brightest and best of being, or in other words, of the good. -Platos Allegory of the Cave Exploring Platos Plato Aims of Education* To develop leader among the future rulers. * To develop hard and competent workers. * To produce leaders with military skill among the warriors. * To produce future Civil Servants of the state. The highest goal of education, Plato believed, is the knowledge of Good; to nurture a man to a better human being it is not merely an awareness of particular benefits and pleasures, Stages of Education Plato describes different stages of education in his republic. According to Plato the education of child should be start at the age of seven year and before this stage the child should stay with their mother or elders and learn moral education from them. After the age of six years both girls and boys should be separated and boys should play with boys and girls with girls and they should be taught the use of different arms to both sexes. This stage goes up to the age of seventeen years. During these years they should teach them music and early education. After the age of seventeen years the youth should be brought to battle filed to learn real life experiences. The four stages start at the age of twenty five to thirty years and in this age they get the training of Mathematical calculation and last for another ten years, after the completion the selected one’s are admitted in the study of dialect. During fifth stage they study dialect for another five years and after that, at the sixth stage one is ready to become a ruler and philosopher and the one enter in practical life. Platos View on Moral Ethics Ethics is the most important branch of philosophy. Plato especially gives attention to the moral and ethical education of the men, later on Plato gradually widened the scope of his investigations by reflecting not only on the social and political conditions of morality, but also on the logical and metaphysical presuppositions of a successful moral theory. Plato presents his ideas for an ideal society in his Republic and he provided detail about the curriculum and system of education. According to Plato the ideal society who cares for their youth and the guardian would be responsible for the moral education of their children. Every person would know his duty and his responsibility. Bibliography Annas, J. (1993). The Morality of Happiness. Oxford: Oxford University Press. Franck, Matthew. (n. d). Aldous Huxley’s City in Speech: Brave New World and the Republic of Plato Paper presented at the annual meeting of the The Midwest Political Science Association, Palmer House Hilton, Chicago, Illinois, A Kahn, C. (1996). Plato and the Socratic Dialogue. Cambridge: Cambridge University Press. Numan, M. (2003). Foundation of education. Peshawar: Umair composing center. Posted by Sultan Muhammad at 9:39.

Friday, September 20, 2019

Cruise Shipping Industry Impacts On Tourism In Jamaica Tourism Essay

Cruise Shipping Industry Impacts On Tourism In Jamaica Tourism Essay CHAPTER 1 Introduction of the Cruise Shipping Industry and how it impacts on tourism in Jamaica Tourism is the travel for leisure, business or recreational purposes outside of ones norms for no more than a year. It has become the largest and fastest growing industry in the global economy. In 1871 an American sea captain called Lorenzo Dow Baker sailed into Port Antonio and took with him a cargo of coconuts and 1,450 stems of bananas. The profit that he made in Boston quickly made him realize the potential for the area because profits from the sale of the bananas were great he soon built a thriving export business, called The Boston Fruit Company, which later became the United Fruit Company. He owned 40 banana plantations and shipped three million bunches annually at its peak. He later saw the potential for tourism in Jamaica and established the first cruise ship to and from Port Antonio. So he started sailing visitors from the freezing New England states to Jamaica of Port Antonio in his empty banana boats. He then built Jamaicas first hotel called the Titchfield Hotel in the e arly 1900s. In 1905 the hotel was 600 feet of open space and 400 rooms. It was said that no hotel on that side of the Atlantic Sea had provided with any of those amenities that minister so largely to the pleasure of travelers. This began to prosper in Jamaica after World War I, when improved methods of transportation made it easier for people to get from one country to the other. Indications are that in the early 1920s the number of tourists visiting the island annually probably did not exceed a few thousand. By 1938 the figure had risen to 64,000, and in 1952 the number of arrivals almost doubled to over 104,000; in 1966 the number exceeded 345,000, and in 1970 nearly 415,000. In 1982 it exceeded 600,000. Since the 1987 ­88 season, the number of visitors has exceeded one million a year and has continued to grow, partly as a result of the great increase in the arrivals of cruise-ship passengers. Total arrivals for 1993 were 1,616,430. The cruise shipping industry has many different impacts on the Jamaican tourism industry. It is one of the fastest growing sectors of the tourism industry, is becoming more popular to tourists and has a good potential for growth. In Jamaica the industry appeals to the mass market cruises. These are the cruises which are moderately priced and appeals to just about every type of person. The Caribbean is one of the most tourism dependent regions in the world with Jamaica being the most dependent as the main source of income which brings 25 percent of GDP. Impacts faced by the tourism industry vary from the environmental point of view, socio- cultural, and economical. As it relates to the environment Cruise ships represent less than 1% of the global merchant  ¬Ã¢â‚¬Å¡eet yet it has been estimated that they are responsible for 25% of all waste generated by merchant vessels. This volume of waste produces pressures on the environment, particularly with respect to ship-generated waste disp osal at home ports and ports of call. Other negative impacts include carrying capacity which is the maximum number of persons recommended on a particular eco-system before this result in depletion of its natural resources. Negative socio-cultural impacts faced locals include the use of resources which may cause conflicts, such as competition between tourist and local populations for the use of prime resources like water and energy because of the scarce supply. Another negative impact is economic inequality, between locals and tourists, where tourists normally spend more than they usually do at home, locals may seem to feel inferior to the tourists as they cannot do such large spending which may cause cultural clashes. Positive impacts are locals and tourists get to share their cultural differences with each other. Economical impacts of cruise shipping in Jamaica are the increase of foreign exchange earnings, profit and taxes, employment, externalities, terms of trade, and economies of scale. In addition, cruise tourism requires less infrastructure compared to stopover tourism at a tourist destination. Negative impacts on the tourism economy are leakages of tourist expenditure which present a problem to cruise destinations. Leakages consist of tourist revenue flowing out of Jamaica in which it was spent. The main sources of leakages are consumer goods (especially food and drink), repatriation of profits, overseas promotional expenses and paying back of external debt. If the income from tourism goes to people who reside outside of the country, instead of residents, the benefits of tourism are small. Cruise tourism has been criticized for imposing local costs without compensating benefits. Cruise passenger spending is directed towards shopping where local content is low. Purpose of the study Jamaica is a beautiful island but in the past decades the country has been transformed into a monumental tourist destination, and in the process destroying a few of the natural beauty along the way. In investigating the cruise shipping industry, I am hoping to find out the positive and the negative impacts of the cruise shipping industry on Jamaica and if it can sustain all the cruise ships seen coming in to the ports, considering that it is a booming business. I will also seek to find out if Jamaica will be able to accommodate all the people coming to the island at once through each port. Impacts such as; what impacts does cruise ships have on the ecological system of Jamaica? What are the ecological impacts on the ports visited? What are the effects on consolidation going on in the cruise industry? 1.2 Significance of the Study The stakeholders that this study will benefit are the Jamaica Tourist Board, tourism students, the Cruise Shipping industry and the tourism sector as a whole, as this will assist them in making further decisions weighing the pros and the cons of this industry on not just its economic benefit but its impact on the environment. 1.3 Statement of the problem If sewage from the cruise ships is released in the ports at each visit, then the marine ecosystem will be damaged and cause harm to living organisms. If too many people visit the island at once from a cruise ship then the total amount of acceptable accommodation will be exceeded causing irreversible damages to Jamaica. 1.4 Research Questions At the end of this end of this research the questions I hope to answer are: What the plans are for the sewage control for each port in Jamaica? Who mostly benefits from the tourists when they visit the government or the public (locals)? If the criticism is true on whether or not has imposed local costs without compensating benefits. If the locals are deprived from water and electricity when cruise ships are at the ports. Definition of Terms Cruise ship- If the locals are deprived from water and electricity when cruise ships are at the ports. Consolidation- The process of maturation in some markets whereby smaller companies are acquired or run out of business, leaving only a few dominant players Ecological impacts- Effect on living organism and their non-living (a biotic) environment due to human activity or natural phenomenon Economical Impacts- Economy-wide (macroeconomic) effect on employment and incomes produced by a decision, event, or policy. GDP- Gross Domestic Product Leakages- leakage is the non-consumption uses of income, including saving, taxes, and imports Ports- a city, town, or other place where ships load or unload Port of call- A port visited by a cruise ship but where passengers do not begin or terminate their journey. Socio-cultural impacts- social and cultural problems

Thursday, September 19, 2019

Women and Technolgy - The Gender Gap in Computer Science Essay

Women and Technolgy - The Gender Gap in Computer Science Abstract: This paper reviews the gender gap that exists in computer science. By analyzing the probable causes of the divide, solutions may be developed and possibilities of minimizing the gap increase. Although the general public’s efforts toward shrinking the divide subsist, modern society must change its views of women before the technological world can fully appreciate women’s talents. A gender gap undeniably exists in the field of computer science. Hundreds of headlines in newspapers, journal articles, and magazines continually demonstrate the divide to society, and studies performed by well-respected universities like Harvard and MIT highlight its continuing effects. More recent studies provide evidence that the number of women in computer science is decreasing, despite the recruiting efforts of the technology field. The underrepresentation of women results from stereotypes of computer scientists, weaknesses within the computing community, and the social construction of women in computer science. In order to boost women's presence in technology, society must have a firm grasp on the problems themselves, and address them with fundamental changes in the way we perceive women in computer science on the cognitive level. The increasing gender divide in computer science is well documented. As an issue of Technical Training recorded, â€Å"intake of [women] computer science students in the UK has dropped from 37 percent a decade ago to 5 percent in 1998.†[5] Other nations, including the United States, have noticed a decline in the number of women in the field. New Scientist found, â€Å"[w]omen dominate in several subjects, namely degrees preparing students to be infant sch... ...un IT, Bill Goodwin. [9] Newsbytes, January 16, 2001, 337 words, Gender Salary Gap Smaller in Tech Industry – Study, Dick Kelsey [10] Information Week, August 9, 1999, Women Make Gains in Top Management, Jennifer Mateyaschuk. [11] http://www.mills.edu/ACAD_INFO/MCS/SPERTUS/Gender/pap/pap.html Why are There so Few Female Computer Scientists? Ellen Spertus - 1991 [12] The Times Union, February 7, 2001, 565 words, Albany, N.Y., Council Meeting Offers Women Advice on Using Technology, Danielle T. Furfaro. [13] Achieving Gender Equity in Science Classrooms, 1996, NECUSE Colleges and Brown University students and faculty [14] Encouraging Women in Computer Science, 1996, Eric S. Roberts (Stanford University) [15] Electronic Engineering Times, February 12, 2001, 1261 words, Engineers Week Aim: to Reach Schoolgirls, Terry Costlow

Wednesday, September 18, 2019

Execution of the Mentally Retarded Essay -- Argumentative Persuasive E

Execution of the Mentally Retarded Stories regarding terrorism and war plaster every news broadcast, newspaper, and television show in the country; however, there has recently been a story that has become just as important, and is being focused upon by almost every state in our nation. The story regards the issue of execution and if it is wrong to execute those who are considered mentally retarded, due to the Constitution’s Eighth Amendment. The amendment states that â€Å"Excessive bail shall not be required, nor excessive fines imposed, nor cruel and unusual punishments inflicted† (â€Å"Eighth Amendment†). Due to this amendment, I believe it is not only constitutionally wrong, but also morally wrong as well to execute those who are mentally retarded. According to an article written by Linda Greenhouse of The New York Times, entitled, â€Å"Top Court Hears Argument of Execution of Retarded†, Daryl Atkins was convicted for the 1996 shooting death of Eric Nesbitt, an airman at Langley Air Force Base who was kidnapped from a Virginia 7-11 store by Akins and another man, William Jones. This case has brought about one of the most perplexing and intriguing questions to the U.S. Supreme court regarding criminal punishment; should Daryl Atkins, who was convicted of murder and who has been sentenced to death, be executed even though he is mentally retarded? I believe that he should not be executed, due to the fact that it would be considered cruel and unusual punishment killing someone who is mentally retarded, which is against the Eighth Amendment to our Constitution. Atkins has an IQ of 59, which is equivalent to that of a 10-year-old child (Curriden). He made C’s and D’s in middle school and flunked out of high school. He has neve... ...2002. http://caselaw.lp.findlaw.com/data/constitution/amendment08/. Greenburg, Jan Crawford. â€Å"Justices Give Little Clue to Leaning on Death Penalty for Mentally Retarded.† Chicago Tribune 20 February 2002 pK0362. 2 March 2002. Greenhouse, Linda. Top Court Argument on Execution of Retarded. 21 February 2002. The New York Times. 26 February 2002 http://www.nytimes.com/2002/02/21/national/21SCOT.html. Myers, Jennifer. â€Å"Death Penalty for Mentally Retarded May Slide off High Court’s Docket Again.† Daily Business Review v76 i160. 28 January 2002 pA12. 2 March 2002. Stout, David. Execution of Retarded to Be Reviewed by Supreme Court. 20 February 2002. The New York Times. 26 February 2002 http://www.nytimes.com/2002/02/20/national/20CND-SCOTUS.html. â€Å"U.S. Supreme Court.† FindLaw.com. 10 March 2002. http://laws.findlaw.com/us/217/349.html.

Tuesday, September 17, 2019

The Communist Manifesto Essay -- Reaction Paper

The Communist Manifesto   Ã‚  Ã‚  Ã‚  Ã‚  The communist Manifesto is the author’s way of interpreting the goals of Communism, as well as the theory underlying this movement. Two major points of the manifesto explain how class relationships are defined by an era’s means of production. Also, the manifesto incorporates how class struggles, or exploitation of one class by another, are motivating force behind all historical developments. If those two points are not followed then a revolution occurs and a new class emerges as the ruling one. This outcome represents the ‘march of history’ which is driven by economic variables. The Manifesto argues that this development is inevitable, and the capitalism is inherently unstable. Elimination of social classes cannot come about through reforms or changes in g...

Monday, September 16, 2019

Aztec Belief System Essay

Throughout the history of mankind civilizations have trusted in the existence of a higher power. Although the existence of a higher power doesn’t bear as large of an impact on societies like the United States today, it was the focal point of life in many civilizations of the past. A great example of a civilization that was extremely reliant on the connection between humans and higher powers was the Aztecs. The Aztecs believed that they were connected to the universe by a sacred energy. They believed this energy was the source of all natural events and if it were unbalanced, they would suffer. In order to maintain the balance, the Aztecs performed ceremonial sacrifices, bloodletting, and other forms of violent cultural behavior. The connection between the Aztecs and the universe is evident among their myths about how humans were created. One creation myth is the story of the goddess Tlaltecutli. In the story Tlaltecutli was ripped apart by the gods Quetzalcoatl and Tezcatlipoca and her body parts were used to create the earth and the other gods. This event caused Tlaltecutli to desire human hearts and she would not be quiet until they were brought to her. Nor would she bear fruit until she had been drenched in human blood. Another creation myth, and the most common legend amongst the Aztecs, was that the god Quetzalcoatl descended into the underworld and retrieved the bones and ashes of previous human beings in order to recreate humanity because the universe had been destroyed after the fourth Sun went out. Quetzalcoatl ground the bones into powder and used his blood to fertilize it and create humans.   The Aztecs also had a myth that explained how the Sun and moon were created. According to legend, the gods Nanautzin and Tecuziztecatl sacrificed themselves by jumping into a fire, which turned them into the Sun and moon. The other gods also sacrificed themselves to provide nourishment for the Sun. However the Sun and the Earth still had an insatiable craving for human blood, therefore war was created to satisfy the Sun’s needs. What’s interesting about these creation myths is that they all included some form of death, sacrifice, or blood shed in order to create something. The creation myths shaped the foundation for why Aztecs placed so much emphasis on violent cultural behavior. In the Aztec society, human sacrifice was extremely common. This is because sacrifices were the main method of creating cosmic order between humans and the universe. Pubic sacrifices took place at the beginning of each of the 18 twenty-day months. The sacrifices consisted of mostly captured warriors, but in rare cases included children and young women. The purpose of public sacrifice was to acquire the divine forces embedded in the physiology of human beings in order to nourish the Sun, Earth, and rain. Aztec ceremonies consisted of days of ritual preparation, ceremonial sacrifice, and acts of nourishing the gods and the community. Priests carried out the sacrifices, which included many forms such as decapitation, burning, hurling from great heights, strangulation, and arrow sacrifice. The most common was the removal of the heart. The heart and the head were the two most important body parts to the Aztecs. Tonalli was a type of energy that came from the head and determined the shape of one’s temperament and destiny. Tonalli was first acquired as an embryo in a female uterus. The Sun was the most powerful way to increase tonalli. It was believed that hair prevented tonalli from leaving the body. Therefore hair was a major prize in warfare. When heads were decapitated during ceremonies, the city as a whole gained tonalli. Teyolia, or â€Å"diving fire†, was the energy that came from the heart and determined a person’s sensibilities and thinking patterns. When a person died his or her tayolia traveled to the world of the dead, or â€Å"sky of the Sun†. Tayolia gives energy to the Sun, which is why heart sacrifices were so popular.   Giving hearts and heads wasn’t the only donation made to the higher powers. Bloodshed was also seen as a type of nourishment. The Aztecs believed that spilling blood was vital to please the gods and to ensure natural forces such as strong harvests. Another Aztec creation myth, the story of Tezcatlipoca, gives strong insight into the importance of bloodshed. In the story the body of Tezcatlipoca was cut into pieces and divided over the four directions of the world, with his blood flowing into the center. The divine blood redistributed energy to animals, body parts, vegetation, and the calendar. Although The Aztecs believed that by giving the hearts and heads of their victims to the gods and the universe, they would be blessed with gifts like bountiful harvests, strength in war, and healthy lives, they didn’t practice sacrifice just to receive blessings; they also feared that the universe would be destroyed. The Aztecs believed that there had been four previous ages that the universe passed through prior to the present age, the Fifth Age. At the end of each age, the Sun went out and caused a catastrophic event that destroyed all life on Earth. In the Second Age, for example, it was believed that the beings that lived there were carried away by the wind. (AD1, p. 4) The fear of the Sun going out again and ending the Fifth Age is one the main catalysts for explaining why the Aztecs placed so much importance on human sacrifice, warfare, and other violent cultural behavior. In order to ensure that the Sun wouldn’t go out again, the Aztecs participated in what is known as the New Fire Ceremony. It took place once every fifty-two years and was used to ensure that the Sun would last for another fifty-two years. The rebirth was achieved by the heart sacrifice of a brave, captured warrior specifically chosen by the king. The ceremony began at the top of a mountain with a priest cutting out the warrior’s heart and throwing it into a fire. The people in the village would then cut themselves and splatter their blood in the direction of the fire. The fire was then brought down the mountain and the people blistered themselves with fire. The Aztecs believed that if they did not perform the ceremony properly to nourish the Sun, it would go out and the demons of the darkness would descend to eat all human beings. The New Fire Ceremony is a great example of how the Aztecs viewed the connection between human beings and the cosmos. The role of humankind in the Aztec society was very pre-determined. Men were devoted to warfare and females were devoted to the household. Warfare was extremely important to Aztec men because it was used as a way to appease the gods with the hearts of prisoners of war.   It was also used a way to rank the importance and worth of a man. Men higher up in the military rank received more luxuries and entitlements than men of lower ranks. For example, a top war commander, or â€Å"quauhpilli†, was given land by the ruler and could run schools for commoners.   Military service was a compulsory obligation by all free men. The Aztec’s innate desire for combat is a direct impact of the believed connection between conflict and nourishment for the universe. When a male child was born, he is dedicated to the Sun, and â€Å"the flowery death† of the warrior in battle or on the killing stone. This shows that the Aztecs believed that the only honorable death for a male is on the battlefield or being sacrificed on another tribes killing stone. The Aztec devotion to the universe was so strong that they not only believed that they had to sacrifice others in battle to please the gods; they had to sacrifice themselves as well. The culture and beliefs of the Aztec civilization were much different than the culture and beliefs of society today. Human sacrificing no longer occurs because it is considered cruel and unusual punishment. Humans do not believe that sacrifices and bloodshed are necessary to please a higher power. Although there are certain religions that believe that the way humans act bear some consequence on things like karma and where we go in the afterlife, it is rare to find a society in today’s world that believes wholeheartedly that there is a direct connection between human’s actions, the divine, and natural forces, like the Aztecs believed. Science and technology have allowed humans to understand that we can control all aspects of processes such as growing crops and that the gods have no effect on it. Warfare, although still important, does not have nearly as strong of an impact on humans today. Warfare is only needed for protection, to defend other countries, or in certain areas of the world, to attempt to settle religious differences like the Shiite and Sunni Muslims. Today, men and women have the choice to grow up and become whatever they want. Men are not required to serve in the military and women have the ability to do more than just take care of the household. The main difference between the Aztecs and humans today is that for the Aztecs, the connection to the universe was the most important aspect of life, while today creating a family, treating others fairly, and having proper morals are the most important aspects of life. The majority of people just want to make the most of their lives on Earth while they still have time, and depending on their beliefs, if they do it right they will reach an afterlife when they die. The Aztecs were one of mankind’s most interesting civilizations. They devoted their lives to pleasing the universe and believed that sacrifice and bloodshed were the best ways of doing it. They attempted to control every aspect of their lives in order to keep the connection between humans and the universe in balance. The Aztec belief system was very extreme. No other civilization has put so much emphasis on sacrifices, and more than likely, no civilization ever will again.

Sunday, September 15, 2019

American Nurses Association Essay

According to American Nurses Association website, nursing- sensitive indicators are defined as the structure, process and outcomes of nursing care (nursingworld.org). Quality care for patients in the hospital is important to their healing process. It is important to know what the nursing-sensitive indicators are and how they affect patients. The indicators are intended to focus plans and programs to increase quality and safety in patient care. In this scenario with Mr. J, many members of the healthcare team were not doing enough to make sure he was safe and that his needs were met to the fullest. Knowing what the nursing- sensitive indicators are could have helped prevent Mr. J from developing a pressure ulcer and making sure he was getting the correct diet. The healthcare team responsible for Mr. J did not advocate for him like they should have and let things slip when they should have been reported and taken care of. Understanding nursing-sensitive indicators can help nurses deliver the best care possible to their patients and help minimize complications and increase patient satisfaction. Some of the issues that happened with Mr. J’s case could have led to more serious complications. Restraining Mr. J when it was not necessary increased his chance of developing a pressure ulcer and could also have led to further serious complications such as developing post surgical complications such a deep vein thrombosis which would increase his stay in the hospital. Another example that could have been avoided was making sure that Mr. J was receiving the correct food for his diet. The healthcare team did not address Mr. J’s incorrect dietary meal in a timely manner which could have led to a more serious event. Not addressing patient needs will decrease patient satisfaction, which is one of the nursing-sensitive indicators.

Relation between jew of malta and merchant of venice Essay

The two novels, Christopher Marlowe’s ‘The Jew of Malta’ and William Shakespeare’s ‘The Merchant of Venice’, the main characters are Jews, a characteristic that makes the comparison of the books easier. However, the way the characters are presented has made the two stories have deep and active anti-Semitic notions and messages. Right from the beginning of the play, we can see some clear negative stereotypes towards Jews. Barabbas is undoubtedly portrayed as a man who loves money to an extent that he seems addicted to them. In the opening, we see a merchant, counting his money with passion, and later on complaining about not having made enough by his recent business activities. Marlowe straightly defines his whole character and attitude by this portrayal, showing us that Barabbas is nothing more than a greedy Jew. As the story progresses and the plot unfolds, the character of Barabbas also unfolds, showing us how he doesn’t even hesitate doing unethical and heartless things just so that he can protect himself from losing money. When his wealth is taken away, after he refuses to give half of it like the other Jews did, he unleashes his ruthless effort to regain his wealth. He doesn’t hesitate using his daughter to retrieve the gold and jewels he has hidden in his house, and it is meaningful to see how he reacts after Abigail throws him the bags of gold out of the window and he embraces them while ignoring his own daughter. Although this is not the only example of how he puts money over more important things, the fact that he seems to place money above Abigail, his own daughter, shows his general attitude. But of course it doesn’t stop there, as apart from his avaricious self, he has to quench his thirst for revenge and execute his plan for retaliation. His plan consists mainly of taking revenge from the man who took away the most precious thing he has, his wealth. That man of course is Ferneze, the governor of Malta. So, Barabbas decides to kill Ferneze’s son, Lodowick, that way taking the revenge he so passionately seeks. Once again he uses his own daughter as decoy, to execute his plan, showing that she has mainly a functional purpose for him. After he completes his plan and kills not only Lodowick but also Mathias, the man that his daughter loves, he feels betrayed by his daughter, as she converts to Christianity. I believe that this is where the insanity and sickness of Barabbas reaches a peak. He is determined to kill his own daughter, because he feels that she disrespects her family’s name. The epilogue to this madness comes when finally Barabbas gets killed by his own evil plots. In the end of the story we can easily identify the negative characteristics that Barabbas has, which are also strongly connected to the fact that he is Jewish. His elitist nature, his illogical actions that are all driven by his avarice, and his lack of sentiments towards other people, make him fit ideally the stereotypes of Jews that existed at the time. So, every single part of his hateful and insane being, is justified by the fact that he is Jewish, and thus it is natural that he is unstable and inferior to Christians. The next example of anti-Semitic portrayals comes from ‘The Merchant of Venice’. The main character, Shylock is portrayed as a greedy Jewish moneylender that is just like Barabbas, when it comes to hate towards Christians and other people in general. He is also a heartless man, not feeling pity for anyone, showing a rather sadistic nature. The hate he feels for Antonio is so immense that makes us question to what extent he is actually rational at all. Throughout the development of the plot he seems to hold so many negative values that it is impossible not to make a connection between his character and the fact that he is a Jew. Just like Marlowe, Shakespeare makes the fact that he is Jewish the root of all evil, as from that very fact all the other negative traits arise. As Bloom mentions in his essay, Shylock is a walking nightmare, and that should be the only way that anyone portrays him. As we can see from his speeches, he clearly has a great love for his wealth and he is not jeopardizing his financial position for any reason. It is not a coincidence that when Jessica runs away with his money, he mostly worries about his wealth and not so much about his daughter. Also, the fact that Jessica had to run away shows that Shylock is far from an ideal father. His speeches also show that he has an extremely negative attitude towards Christians that he justifies as the retaliation for all the anti-Semitism he has faced. He seems very resentful towards the people that have acted in a bad way towards him and as I mentioned earlier, especially Antonio. So, his actions are mainly driven by his rage and what he thinks as retribution. By the portrayal of Barabbas and Shylock, a logical question approaches. Are the two writers inspired and influenced by racism and the anti-Semitic ideas of their time? In ‘The Jew of Malta’ it is hard not to recognize all the negative Jewish stereotypes presented in the form of a very unappealing character, Barabbas. Barabbas is not just an unethical and evil man, he is the typical money-loving Jew, with all the disgusting characteristics that the racist society of the two writers has attributed to Jews. Such a racist society had created all these negative stereotyping for Jews, making them seem like greedy monsters. So I find it impossible that Marlowe as an author hasn’t been affected and influenced by the stereotypes of his time. That is mainly because in societies that racism towards a specific religion is so acceptable, there is very high tolerance for reproduction of such ideas and thus such a portrayal would not arise any questions or hate. Such situation reminds me of what happens with many fictional evil characters like the devil. I doubt that even a single reader would object if a writer attributed evil characteristics to the devil! Although it may seem like an oversimplified example, I believe it captures the very essence of the attitude of people at the time. That is, because the society had condemned Jews of being the cause of everything bad. Such portrayals are very similar to what Carl Marx has written hundreds of years later, describing Jews as mere worshipers of money. Although in our days the Jew of Malta can be viewed as a cynical work, I seriously doubt that Marlowe has such an intention, as he characterized it atragedy. Â  It is clear to me that no matter how anti-Semitism is viewed today after many important events like the Holocaust, the play was influenced by a lot of religious racism and prejudice, and Barabbas’ characteristics were nothing but the actual portrayal of ‘evil Jews’ as the English at the time viewed them. Consequently, Barabbas seems like the epitome of a real ‘Jew’, the epitome of evil, greed and lack of conscience. The case is similar in ‘The Merchant of Venice’, as Shylock is also portrayed like a perfect example of a Jew, as stereotyped in the Elizabethan times. I personally feel that Shakespeare was also influenced by the general anti-Semitic environment he lived in. Although a verdict of whether he was actually racist in his story is hard to be reached, I find it impossible that a play meant for Christians would not follow the trends of the time. The examples in the story are numerous and clear, straightforwardly proving the position of the Jews. From the fact that the Jews are presented the way they are, up to the point that they are forced to convert to Christianity or give up a part of their wealth, it is evident how negative the Jewish religion was as a characteristic. The fact that it was the same thing for the government to gain wealth and convert a Jew, show the deep-rooted hatred against this religious group, and the fact that Christians simply wanted to get rid of them as they viewed them like parasites. Such sort of treatment reminds us, newer generations, of the Nazis and their monstrous acts but at the time of the original play, as aforementioned, racism was perfectly fine! Nevertheless, Shakespeare does act in a racist way, if we assume that a writer is judged by what he actually writes. I would strongly doubt that Shakespeare intended to make his play anything similar to a parody or a criticism of stereotypes, and I believe that he expresses what he purely thinks. As we have seen from the two plays, the Jewish protagonists, Barabbas and Shylock have a very negative and unethical personality. Their vile and evil acts, paired with their appalling characters, seem to be the actual description of a negative stereotype towards the Jews. Although it may seem ambiguous whether these portrayals are actual and literal or simply ironic, it is clear to me that the answer is simple. The two authors have no intention at all of criticizing racism and simply portray Jews just as a normal Elizabethan would. So, the two stories, although politically incorrect and really prejudiced, are the result of truthful portrayals and honest approaches of the description of characters with a Jewish religion. No matter how wrong and inaccurate, these descriptions were made with complete seriousness by writers living in an environment were such sort of prejudice was rooted from many years ago and continued to bloom.

Saturday, September 14, 2019

Micromanagement: Leadership and Shelly

Answer to Case of â€Å"Micromanagement† Q1: Is George guilty of micromanaging? Why or why not? Answer: No. George hates micromanaging and even disagrees that he is micromanaging. He thinks â€Å"micromanaging† is an excuse that Shelly threw out to dissemble her incapability, for the reason that a successful manager would never micromanage those employees who are capable enough. In additional, he thought Shelly is not so enthusiastic and hungry-to-learn as the beginning, which costs him a lot of time to correct her mistakes. Therefore, George may be angry rather than guilty.Q2: What influence tactics does George use with Shelly and what is her reaction to those tactics? Give an example to support your response. To what degree do his tactics engender trust with Shelly? Answer: George used 1) Rational persuasion, 2) Ingratiation, 3) Pressure. 1) Rational persuasion. After reading the release draft at the first time, George recommended a new title, and Shelly countered tha t she doesn’t agree. To make Shelly align with him, George used the rational persuasion tactic to analyze the situation logically and give evidence, and argued why he consists to use such a strong title.The reaction of Shelly here is she pursed her lips and nodded slightly, which means she wanted to argue, but gave up and accepted his suggestion reluctantly. Without enough participation from Shelly, George made the decision himself, largely harming the trust between them in this situation. 2) Ingratiation. After persuading Shelly to adopt his suggestion, George tried to encourage Shelly a little bit by flattering her: â€Å"Thanks Shel, you are the best†. Ingratiation tactic was used here.However, Shelly didn’t feel any happiness when hearing this, and she no longer like him as before. Again, the trust was failed to engender. 3) Pressure. This tactic was used many times in this case. For example, George demanded Shelly to do two things on the release. George als o said: â€Å"I count on you to get these things right. † Etc. Shelly had different response on the two situations I mentioned above. In the first case, Shelly accepted George’s suggestion reluctantly. In the second case, Shelly made up her mind nd defended herself by explaining why she wrote it in her way but not George’s way. Obviously, trust was failed to engender again since Shelly didn’t meet George’s expectation, and she was unsatisfied with George as well. Q3: Using our knowledge of the â€Å"full-range of leadership† model presented in class, how would you classify the type of leader behavior used by George to manage Shelly? Be specific and provide an example. Answer: To my understanding, George manages Shelly with the transactional leadership. To be specific, he used Management-by-Exception actively.For example, once George found a mistake on the unfinished release draft, he gave feedbacks and corrections immediately. Then he starte d to follow the case, and tried to monitor and correct Shelly’s mistakes and keep things constructive in an active manner. This is exactly as Rich said, â€Å"when George takes an interest, hands-on isn’t the beginning of it. He’s elbow deep in the stuff. † He thought he was providing guidance and necessary feedbacks to Shelly so that she would improve. This type of leadership behavior is a part of transactional leadership.Q4: The Company in this case is not meeting its goals regarding visibility, leads and sales. Shelly is responsible for this functional area of the business. What should George do to lead her more effectively to meet these business objectives? Answer: George can lead Shelly more effectively in several ways. Firstly, according to the Leader-Member Exchange theory, Shelly belongs to the out-group of George’s team. In this group, the relationship between leader and members is cold and impersonal with formal leader authority and less effective influence on members.Under this tense relationship, eventually, members would be tired off to boss by bad performance and less OCBs. To make it better, George can try to give Shelly more freedom, latitude, and responsibility, give her more support, and try to build trust with Shelly. In return, Shelly would probably generate higher performance and satisfaction, and greater dependability, involvement, and eventually, better OCBs would occur as well. By bringing Shelly from out-group to in-group, Shelly could enhance her performance and meet company’s business objectives more effectively.Secondly, George should learn how to apply efficient transactional leadership on Shelly. Besides the MBE active he uses, he should also use contingent reward and punishment. By using this tactic would help Shelly better meet George’s expectations. In this situation, George should communicate with Shelly and give her clear guidance on what would be rewarded and what would be pun ished, and deliver the promised rewards or punishments every time, therefore, trust would be built between George and Shelly.Thirdly, after effective application of transaction leadership, George should go beyond it and try to upgrade to transformational leadership. Transformational leadership requires more trust, credibility and integrity between George and Shelly. George should empower Shelly at a higher level, trust her and respect her decisions. Besides, George should discuss with Shelly about what are their shared goals and values, deliver the company’s short-term and long-term objectives to Shelly, and let she know how her work and efforts would help company to approach the objectives.Moreover, George should move Shelly to address higher needs besides salary, such as bigger growth opportunity, etc. Also, according to Bass’s theory, idealized influence, inspirational motivation, intellectual stimulation and individualized consideration are some useful methods well implementing transformational leadership. Overall, using transformational leadership would help Shelly to perform beyond George’s expectation, so that their team would finally achieve company’s business objectives more effectively.

Friday, September 13, 2019

It is unfair to deny students financial aid Research Paper

It is unfair to deny students financial aid - Research Paper Example The cost of a higher education is an issue of great concern for most students and even their families as well (Goldberg 81-84).   Regardless of the financial situations of ones family, paying for a higher education requires a considerable commitment of ones resources for several years and the problem is made even worse if more than two children have been admitted into a college or a university.  It may be surprising for some people to learn that a good number of full-time undergraduate students are incapable of paying the cost of their education without assisted financially.  The problem here is even more intricate if the st This paper discusses the aspect of unfairness in the context of student financial aid. Specifically, the paper argues that is unfair to deny students financial aid. To clearly bring out the subject, the paper will detail circumstances leading to award or failure to grant student financial aid. If inflation is held as a constant to assess the real cost of tu ition in relation to the real amount of federal aid, in public colleges and universities, it can easily be established that between 1990s and 2012, financial aid per student increased by about 200 percent (Ehrenberg 3-4). In the same period, tuition rose by more than 260 percent. However, in private colleges and universities, the cost of tuition over the same period only increased by less than 170 percent. In fact, this seems like a rush by colleges to proof William Bennett’s theory right. ... If really this is the case, then everybody who applies should be given some financial assistance to also cushion the ever increasing cost of tuition. Public colleges and universities have constantly maintained that traditionally, in economic difficulties, higher learning institutions record an increased enrollment. Supporting their arguments, the enrollments of the 1980s, 1990s and the mid 2000s are used. According to their argument, at such a time, the rate of unemployment results in diminished tax revenues. This, therefore, means that there is a reduction in subsidies for public schools, and to mitigate the situation, tuition must be increased so that the same quality of education can be maintained. In reality, these are just excuses. This is because; such costs never come down even when there is not economic downturn. Even though they are factors that contribute to ever increasing cost of tuition, available federal subsidies like student financial aid cannot be overlooked. This is because even private schools are affected by such economic conditions yet they have maintained their tuition increases at a much lower percentage than public schools. Therefore, it is easier to argue that the federal subsidies impact or contribute the extra percentage. This is because the only differentiating factor between private and public colleges is the federal subsidies in the form of student financial aid. It is without a doubt that it is next to impracticality to make any system fair at least for every person, unfortunately, in the case of awarding financial aid, things are not fair at all. In most cases, when students are denied financial aid for the first time, some are allowed to file an appeal