Saturday, December 28, 2019

Computer Security And Information Assurance - 1692 Words

The academic disciplines of computer security and information assurance emerged along with numerous professional organizations – all sharing the common goals of ensuring the security and reliability of information systems. ROT5 is a practice similar to ROT13 that applies to numeric digits (0 to 9). ROT13 and ROT5 can be used together in the same message. ROT47 is a derivative of ROT13 which, in addition to scrambling the basic letters, also treats numbers and common symbols. Instead of using the sequence A–Z as the alphabet, ROT47 uses a larger set of characters from the common character encoding known as ASCII. Specifically, the 7-bit printable characters, excluding space from decimal 33 ! through 126 ~ , 94 in total, taken in the order of the numerical values of their ASCII codes, are rotated by 47 positions, without special consideration to case. For example, the character A is mapped to p, while a is mapped to 2. The use of a larger alphabet produces an obfuscation than that of ROT13; for example, a telephone number such as +1(positive)-(negative)415-(negative)839-(negative)6885 is not obvious at first sight from the scrambled result Z`c`dgbheggd. On the other hand, because ROT47 introduces numbers and symbols into the mix without discrimination, it is more immediately obvious that the text has been enciphered. The Mora Brothers felt that the Constitution guaranteed basic privacy and confidentiality, they also saw this being tossed out the window recently byShow MoreRelatedRole Of Core Technologies On An Effective It System Essay714 Words   |  3 PagesSystem useful is Computer Networks, Information Assurance, Wed Technologies, Database, Computer Programs and Programming. In order for IT System to become active first Computer Programs and Programming must be put in place. Computer Programs and Programming are simple terms an executable set of commands for the computer to perform. A process is an actively running program which may or may not is running in the background. A program running in the background is one that the computer user may not beRead MoreA Complete Risk Mitigation Strategy997 Words   |  4 Pagesfor IA programs and organizations. An incident response and disaster recovery plan in the event of intrusion and disaster how well and organization deals with incidents gives a picture of how well they have implemented their IA plan. Gathering information is an important part of any plan in the military we used a term called rearward or backward planning. I mentioned this to help explain how I intend to develop my incident response plan. Planning before during and after an incident putting on yourRead MoreCore Technologies : A Functional Information Technology835 Words   |  4 Pagesfunctional Information Technology (IT) system requires all the individual technologies involved to work together to achieve its intended purpose. If one of these technologies fails to perform, the entire system becomes vulnerable to breakdown and failure. In this complex relationship, each component is a receiver as well as a provider of services and data. I will make a connection between core technologies to show how they work together. We will concentrate of the most common and important computer technologiesRead More Na tional Security Agency Essay588 Words   |  3 Pages National Security Agency/Central Security Service The National Security Agency/Central Security Service (NSA/CSS) was established in November 1952 to provide a cryptologic organization for the civilian and military leaders of the United States and to provide them with timely information. The National Security Agency (NSA) coordinates, directs, and performs highly specialized activities to produce foreign intelligence information and protect United States information systems through two main missionsRead MoreComputer Security : Key Components Of Pc Security1099 Words   |  5 PagesComputer Security is an issue of critical significance for all associations, considering the way that data frameworks have turned into an essential piece of vital getting ready for all real organizations. Organizations need to find the key components of PC security while arranging their data frameworks technique. Computer security alludes to the assurance given to robotized data structures with a specific end goal to ensure their respectability, accessibi lity, and secrecy. Computer security includesRead MoreSystem Analysis and Recommendation Report of Natividad Medical Center859 Words   |  3 PagesMedical Centers Hospital Computer Information Systems (HCIS) network and its hospital-grade systems infrastructure and technology components. The system analysis report details the findings of the system analysis in the part of system vulnerability/risk assessment as a critical component of the security plan. Why the system vulnerability/risk assessment was carried out as part of system analysis The security plan for Natividad Medical Centers Hospital Computer Information System (HCIS) network andRead MoreInformation Security And Assurance Department924 Words   |  4 PagesInformation Security and Assurance Department Because of identity theft, terrorism, and other criminal activities, President Obama has made information security a national priority. Not only is information security and assurance an American priority, it is also a global issue. Information security and assurance includes of data confidentiality, integrity, and availability along with accountability and confidence all is well with the processes (White, G. L., Hewitt, B., Kruck, S. E. 2013). OurRead MoreThe ISO 17799 Framework621 Words   |  3 PagesISO 17799 is a detailed security standard organized into major areas of business continuity planning, system access control, system development and maintenance, physical and environmental security, compliance, personnel security, security organization, computer and operations management, asset classification, and control and security policy (Violino, 2005). This framework provides a high level of assurance in various areas of business. It is the most obvious for security and covers e ach topic atRead MoreThe Vulnerabilities And Cyber Kill Chain1243 Words   |  5 Pagestime-consuming activities. This phase can exploit the information gathered about the target’s weaknesses. The type of information the hacker is looking for is how to actually get in: firewall ports that are open, network hosts, services that are running. Critical information that should be obtained during the reconnaissance phase include network information, host information, security policies, and human information. â€Å"Active reconnaissance is a type of computer attack in which an intruder engages with theRead MoreReport on the Security System at Natividad Medical Center1227 Words   |  5 PagesSecurity plan This final part of the project contains an in-depth and comprehensive report on the security system at Natividad Medical Center. Using relevant peer-reviewed and technical reports, I devise an analysis plan that explains thoroughly, how I will analyze as well as evaluate Natividad Medical Centers Hospital Computer Information Systems (HCIS) network and its hospital-grade systems infrastructure and technology components. In this comprehensive report, the details of what is going to

Friday, December 20, 2019

Monopoly A Business With No Competition - 1521 Words

Monopoly Aggressive business owning, buying up your competitors or distributors to maximize a company’s profit, running a business with no competition. Webster’s defines a monopoly as â€Å"exclusive ownership through legal privilege, command of supply, or concerted action† or â€Å"a commodity controlled by one party†. A clear example of what a monopoly is as simple as the board game Monopoly, the game is played exactly what the name says it is, the player becomes a Monopoly, buying up multiple companies that are related in some way to maximize the most money that play can gain from those businesses. Monopolies are quite simple, take for example, there is a local company that makes car parts out of steel, the company purchases the stock steel from a factory that makes steel stock. To make the steel stock the steel stock company buys the raw materials from a mining company. If the car parts company wants to maximize their profits, they simply buy up the st eel company. That way they are not over charged for the steel stock and can get it at a low rate. If the wanted to further maximize their profits they would buy the mining company as well, giving the car parts company total control of where their supply came from and control of the cost, this is called vertical integration. There are two types of monopolies: vertical monopoly and horizontal monopoly. Vertical monopoly or vertical integration is buying up the companies that are a part of the whole manufacturing process. ExamplesShow MoreRelatedMaximizing Profits in Market Structures1287 Words   |  6 Pagesthe higher the competitive the market. Monopolies: Monopolies are a group of business people who act as one. Considerable power is in the company’s ability to set and influence prices. The power is determined by the demand curve cladding the company and with almost no competition. Monopolies have no public ownership. When the competition is low and a company is dominating the demand curve it creates a monopoly because competition is low competition is never nonexistent, there are no otherRead MoreMonopoly and Perfect Competition1045 Words   |  5 Pagesdifference between monopoly and perfect competition? Firm under perfect competition and the firm under monopoly are similar as the aim of both the seller is to maximize profit and to minimize loss. The equilibrium position followed by both the monopoly and perfect competition is MR = MC. Despite their similarities, these two forms of market organization differ from each other in respect of price-cost-output. There are many points of difference which are noted below. (1)Perfect competition is the marketRead MoreEgt1 Task 3 Essay1068 Words   |  5 PagesAnthony J. La Salata BS, Business Management 3/1/2012 Student I.D. #000254042 My Mentor: Nicole Sandburg Cell# 1(360)941-4062 Arlington, WA –PST A. Summarize the four major pieces of legislation collectively known as the Antitrust Laws. United States antitrust law is a collection of federal and state government laws, which regulates the conduct and organization of business corporations, generally to promote fair competition for the benefit of consumers. The main statute was the ShermanRead MoreIntroduction to the Potato Chip Industry1397 Words   |  6 Pagesall of the potato chip firms. In such a setting, the entire industry is now run as a monopoly, called Wonks. In such a setting, three important questions are raised, as follows: What is the impact of the new potato chip monopoly on the various categories of stakeholders? What changes are expected to occur at the level of prices and outputs, based on the transition from the monopolistic competition to the monopoly?, and last What is the most beneficial market structure in which Wonks would operateRead MoreA Monopoly Is A Single Seller951 Words   |  4 PagesA monopoly (from Greek monos ÃŽ ¼ÃÅ'ÃŽ ½ÃŽ ¿Ãâ€š (alone or single) + polein πωÎ »ÃŽ µÃ¡ ¿â€"ÃŽ ½ (to sell)) exists when a specific person or enterprise is the only supplier of a particular commodity (this contrasts with a monopsony which relates to a single entity s control of a market to purchase a good or service, and with oligopoly which consists of a few entities dominating an industry).[2] Monopolies are thus characterized by a lack of economic competition to produce the good or service, a lack of viable substitute goodsRead MoreImportance Of The Micro Economic Environment1471 Words   |  6 PagesActivity one: 1.1Explain the importance of the micro-economic environment to business organisations: Microeconomics looks at how individual players in the economy, such as households and firms, interact. It focuses on the impact that their economic choices have on the allocation of scarce resources to meet unlimited demand. These interactions match what one party wants or demands in economic term and what the other gives in exchange (supply). Each time someone buys a chocolate bar from a newsagentRead MoreMonopoly Industry And Its Economic Effect1695 Words   |  7 PagesMonopoly Industry and its Economic Effect. We live in a world where different economic systems exist and its existence is can create balances or imbalances in the economical arena. These economic system can be characterized as Laissez-faire economy, command economy and a mixed economy, implemented by each state. Within those segments of economy, a country can have companies following different structures of industries in the marketplace with distinctive levels of competitions. To understand howRead MoreTypes of Competition1000 Words   |  4 PagesEconomic theory usually differentiates across the four major types of market structure: monopoly, oligopoly, monopolistic competition, and perfect competition. Although the list of market structures can be virtually unlimited, these four types are considered to be the basis for understanding the principles of market performance in different market conditions. Each of the four types of market structures possesses its benefits and drawbacks. In any of these markets, an entrepreneur can develop a strategyRead MoreWhat Model Of Market Structure1455 Words   |  6 PagesBusiness in any city are challenging commodities that produce gain for the population. This city growth is well developed and incumbent by the market structure it abide by. The wisdom of crowds is based on the assumption that valuable knowledge in social systems frequently exists only as dispersed opinions, and that aggregating dispersed information in the right way can produce accurate predictions. A prediction market provides a vivid illustration of the power of the wisdom of crowds. (Qiu, L.,Read MoreEco 204 Final Paper1488 Words   |  6 Pagescombine an already successful business. They have no competition and they are ready to sell! The management consulting firm they hired will take charge of the advertising, the lay-off of employees, and the new way of operating. After hours on hours of research, I have found there are many opinions. What I do know is the term â€Å"monopolistic competition† is easy to confuse with the term â€Å"monopoly.† The two models are characterized by quite different market conditions. A monopoly is a single firm with high

Thursday, December 12, 2019

Crime - Surveillance - and Technology Policy

Question: Discuss about the Crime, Surveillance, and Technology Policy. Answer: Introdution: Unmanned Aerial vehicles (UAV) or drones as they commonly known are aircrafts which are remotely controlled by humans or autonomously by a pre-programmed code. Drones are commonly used for two major purposes in the field; surveillance and reconnaissance. However, while meeting their objectives drones have been subject to a number of concerns, for one, they infringe privacy rights. Secondly, the scope of those targeted by the technology is still unspecified. In addition to this, the legal or policy implication of those using the technology is still unknown. These issues among many others make UAV a highly controversial topic in the world. Unmanned Aerial Vehicles (UAV) UAV technology presents so many problems that its only logical to categorise them based on the field or aspect of life they affect. Some affect privacy, others security and others affect ethical concerns. Moreover, in the field, some interfere with the existing aircraft regulations, a problem to the existing aviation laws. In this case, this assessment will follow a similar approach, starting with the problems associated with privacy, safety and ethics, then, later on, evaluate the technical issues associated with UAVs. Privacy, Safety and Ethical Problems UAV application introduces serious concern on the privacy and safety of citizens regardless of the state or country they belong. For their surveillance applications drone use commercial airspace used by other regular air crafts. Therefore, it has hard to imagine that these devices collect only the relevant information concerning suspected targets without that of regular citizens (Epic. Org 2017). Furthermore, based on their designs drones are made to be small and can fly high in the airspace making them undetectable to the human eye. These features provide them with the capability to perform persistent and constant surveillance to unwary civilians. For instance, consider their commercial application today where companies are developing paparazzi UAVs to spy on celebrities, this seriously infringes on the privacy rights of the individual involved. Moreover, drones seem to be used in areas prone to violence where human rights are ignored as the areas are either designated as terrorists hotbeds or have minimal contribution to the worlds events. This outlook greatly discriminates against the people affected especially minorities whose voice is unheard. Drones as cyber espionage tools is another serious problem, their flexibility which is enabled by the remote control ability can be used to block or interfere with communication. Furthermore, this notation is no longer an idea but a reality, recent research by a security company in London was able to develop a prototype program that could successfully steal data from surrounding devices. In addition to this, this program could successfully acquire data from moving or mobile objects. What this means is a drone could potentially be used to steal data from aircrafts, vehicles and other moving objects. Therefore data from unsuspecting civilians could be stolen by malicious individuals who may acquire the technology. Moreover, interference is the first step to alteration, a time will come when drones will have the capability to alter data stored by moving objects especially commercial aircrafts. This development is in violation of so many laws and policies, from privacy, safety and secrec y, which are common rights accorded to all human beings (InfoSec Institute 2017). Armed UAV, on the other hand, raises serious ethical, legal and safety problems more so when one considers the people who operate these drones. While manning these armed devices the psychological, physical and emotional state of the soldier must be considered. Moreover, their distance from the place of conflict might alter their perspective and how they choose to deploy the weapons (Nolin 2012). In essence, a soldier far away from the conflict zone may be unaffected by the killings he/she commits exposing them to extrajudicial killings. Now, consider the safety of those in the immediate surrounding who may be affected by the actions of these unsuspecting and uninvolved soldiers. Ethically, it may be hard to determine whether the remote soldier values the lives of the people affected by his actions or he perceives his actions as those seen in a video game setup (Cole Wright 2010). Technical Problems Successful UAV implementation depends on the level of drone integration into commercial/civilian airspace. This requirement means that drones must operate within the regulated constructs of aviation, however, if they do so they fail to meet their overall surveillance objective that depends on secrecy and spy-like tactics. Furthermore, regular manned aircraft have a high safety record owing to the fact that the pilot is usually on the device. However, when the person manning the flight is thousands of miles away the safety question comes in mind. Moreover, based on the current statistics, drones still hold a poor safety record, in fact, according to 2003 Congressional Research report, UAV accidents are 100 times more susceptible to occur as compared to a regular manned flight. Technically speaking, UAVs lack the necessary structure of avoiding collisions a difficult topic still being addressed to date (Degarmo 2004). In addition to this, consider the technical problems that arise due to bureaucracy. A bureaucratic environment is prone to errors, bad operation decisions and poor accountability measures. In the end, the objectives sets by drone operations are not achieved and they interfere with the current aviation procedures (McClure 2015). Emerging issues and who they affect UAVs concerns span a broad spectrum of fields and interests, on one hand, they seem to affect many human rights especially those concerned with privacy and safety. In addition to this, drones have a broad scope of capabilities that threatens the modern way of life, for instance, they can monitor an entire community without detection. Such capabilities raise the questions of social justice when one considers the legality of using the technology and the justification of using it on a particular set of people. So, where are the lines drawn to determine those who can use the technology and also those cannot use it? Furthermore, like any other issue affecting societies the hard hit groups/areas are those populated by minorities and those with the least voice. This perception greatly harbours equality and overall social justice accorded to us all (Carr 2016). According to recent Geneva Convention on human rights (2012), drones still fail to follow the legal channels to execute their objectives, especially armed drones which are now famously known as killer drones. These drones lack the necessary accountability measures and exploit loopholes in legislation to validate killings. In fact, most human rights activities see them as a simple licence to kill (UN Human rights 2010). In addition to this, consider the fact that since 2002 more than 4,000 people have been killed by U.S. drone strikes and even more shocking is that the majority of these people are innocent civilians who were at the wrong place and at the wrong time. Furthermore, various groups across the globe have justified these numbers, from the UN to Amnesty International who holds records of civilian injuries as well as deaths. Moreover, according to many reports, drones are also seen to destabilise communities who live in constant fear and hide from the public. Moreover, these a cts of violence violet international laws as the civilian casualties are experienced in foreign lands and not in the drones country of origin. Drone surveillance and strike missions almost seem to depend on a broad spectrum of assumptions, from those who are disproportionately affected by the missions to the interests expressed by the coordinators. According to the Pakistan Ambassador (2012), his country has faced direct indiscriminate attacks by foreign drones whose actions fail to follow a defined pattern or verified criminal events. To him, drone strikes have targeted innocent civilians especially children and women who are the mass causalities of the strikes (Khor 2012). So, maybe the drone strikes do take out known terrorists but the innocent civilians caught in the crossfires are too many to ignore, more so when they are considered to be women and children who sometimes fail to get past the explosions. UAVs present considerable issues and problems that have different impacts on the lives of innocent civilians. Moreover, they seem to creep into most policies of justice, human rights and privacy. In addition to this, they seem to heavily affect groups in the lowest living class of the society. This is highly unfortunate and immensely unjust, therefore, are drones and their accompanying technology necessary? For some part, yes. Criminals have drastically changed their ways due to technology and innovation. Today, old law enforcement tactics fail to combat law breakers, therefore, new and innovative ways are needed to combat criminals and their heinous acts especially terrorism. UAVs help acquires the relevant intelligence which is then used to combat terrorism, to this end, drones are a justifiable technology (InfoSec Institute 2017). When used as a surveillance and reconnaissance tool they make sense to authorise and mandate within the confines of the law. However, they face a negati ve impact when they are used to carry out air strikes especially on innocent civilians. Therefore, as a tool of acquiring information, authorised by the legal framework they serve to guard the interest of the people and should be supported with the necessary investments. Recommendations Regardless of the problems that are associated with surveillance and especially UAVs, no one can disapprove their importance, from preventing terrorist acts to providing rescue worker with insights into saving lives. Therefore, the solution to these problems lies in the policies developed as well as the ethical investment made in the field, particularly in the development and control mechanisms (Washington University 2013). Moreover, based on the current legislation, drones and their related activities will expand rapidly in coming years due to the provisions to use them in the field (FAA 2012). Therefore, the questions that need to be answered is on how to regulate them within the laws and in a manner that safeguards all human rights. So far, several countries have enacted laws that require law enforcement services to acquire government permits or warrants before using drones regardless of the objectives they are set to achieve. However, the problems with most of these laws are that they are used to govern the technology itself (drone the device) and not the outcome they have on the affected people. Few laws exists that outline the harm produced by drone activities which leave the necessary loopholes to conduct extreme surveillance missions supported by sophisticated technology. In actual facts, today a government agency can commission airstrikes and surveillance missions using unmanned aerial vehicles but an agricultural organisation cannot use the same technology to monitor pollution. These laws need to change in a way that focuses on the outcome and not the technology itself (McNeal 2014). Legislation should define the scope and severity of drone activities to limit the power of drone activities. Nevertheless, when considering the threat of surveillance drones raise one contentious issue. According to privacy advocate, government agencies should acquire warrants prior to using drones for surveillance missions. However, consider public events such as Marathons where previously policemen are used to man rooftops and monitor the events. Now, for a drone to perform a similar operation, the same agencies must prove a possible threat to get a warrant which they mail fail to have hence lack the necessary tools to counter terrorist acts. This scenario shows the dynamic nature of drone activities and the laws used to govern them. Therefore, legislation should consider all possible scenarios and provide unique policies that have the publics best interests at heart. On top of legislation, the governing bodies must develop the standard technical requirements for UAVs to avoid the technical problems associated with these devices. Moreover, these standards should also include the operational framework of each and every device in use as some will have better capabilities as compared to others. In addition to this, aviation agencies e.g. the FAA should come up with specific routes for these devices not only for order but also for monitoring purposes. Finally, ethical concerns and issues, this may fall on the individuals themselves and more so when it comes to military operations. Military codes of conduct that advocates for values such as honour, valour and courage should be at the forefront of all drone activities and missions. These virtues should be emphasised when training the drone pilots and also when developing the controlling programs used to control the devices. Fundamentally, this simple actions may serve as the necessary foundation for developing a moral and ethical UAV systems. A combination of legislative laws and good moral/ethical values may help eliminate some of the problems/issues faced by the UAV programs, which is clearly an important development for future safety. References Amnesty International, 2017, killing outside the bounds of law? Drones, Available from: https://www.amnestyusa.org/our-work/issues/security-and-human-rights/drones [22 January 2017] Carr. E. B, 2016, Unmanned Aerial Vehicles: Examining the Safety, Security, Privacy and Regulatory Issues of Integration into U.S. Airspace, NCPA, Available from: https://www.ncpa.org/pdfs/sp-Drones-long-paper.pdf [22 January 2017] Cole. C Wright. J, 2010, what are drones? Drone wars UK, Available from: https://dronewars.net/aboutdrone/ [22 January 2017] DeGarmo. M. T, 2004, Issues Concerning Integration of Unmanned Aerial Vehicles in Civil Airspace, Centre for Advanced Aviation System Development, Available from: https://www.google.com/url?sa=trct=jq=esrc=ssource=webcd=1cad=rjauact=8ved=0ahUKEwj__uHFjtXRAhULGBQKHWBMC54QFggeMAAurl=https%3A%2F%2Fwww.mitre.org%2Fsites%2Fdefault%2Ffiles%2Fpdf%2F04_1232.pdfusg=AFQjCNE6SciCC7Prs3KB3v2O20XFwyJadgsig2=mD3eFJd-4I-2b6SvnoitUA [22 January 2017] Epic org, 2017, Domestic Unmanned Aerial Vehicles (UAVs) and Drones, Available from: https://epic.org/privacy/drones/ [22 January 2017] InfoSec Institute, 2017, Privacy and Security Issues for the Usage of Civil Drones, Available from: https://resources.infosecinstitute.com/privacy-security-issues-usage-civil-drones/ [22 January 2017] Khor. M, 2012, Drone Strikes Very Much a Human Rights Issue, Global research, Available from: https://www.globalresearch.ca/drone-strikes-very-much-a-human-rights-issue/32281 [22 January 2017] McClure. M, 2015, 5 big problems with the drone programs, FP voice, Available from: https://foreignpolicy.com/2015/12/10/5-big-problems-with-the-drone-programs/ [22 January 2017] McNeal. G, 2014, Drones and aerial surveillance: Considerations for legislatures, Brookings, Available from: https://www.brookings.edu/research/drones-and-aerial-surveillance-considerations-for-legislatures/ [22 January 2017] Nolin. P. C, 2012, Unmanned aerial vehicles: opportunities and challenges for the alliance, NATO Parliamentary Assembly, Available from: https://www.tbmm.gov.tr/ul_kom/natopa/docs/raporlar_2012/b3.pdf [22 January 2017] University of Washington, 2013, Domestic Drones: Technical and Policy Issues, Technology and Public Policy Clinic, Available from: https://www.law.washington.edu/clinics/technology/reports/droneslawandpolicy.pdf [22 January 2017]

Wednesday, December 4, 2019

Report on Nestle for Balanced Scorecard- myassignmenthelp.com

Question: Write about theReport on Nestle for Balanced Scorecard. Answer: Introduction The following report includes the background of Nestle Company along with its vision and mission. The internal and external factors that affect Nestle Company have also been included in the report. The report also explains the long-term goals along with the range of alternative strategies utilized by Nestle. Moreover, discussion has been made regarding the annual policies and objectives of Nestle. The report further specifies the required resources for Nestle and balanced scorecard evaluation measures. Background of Nestle Nestle is one of the leading companies in the food and beverage industry which delivers its services in 191 countries. The headquarters of Nestle is situated in Vevey, Switzerland. In the Middle East, 18 factories are owned and controlled by Nestle that are responsible for making supplies to their respective areas and providing employment opportunities to nearly 11,000 people. Indirect employment is also offered by such factories to various people. In the year 1997, the formation of Nestle entity took place in the Middle East. The investment of nearly US $400 million has been made by Nestle in the Middle East for growth and innovation. Vision of Nestle Nestles vision is to become a competitive and leading company in nutrition, health and wellness that provides value to their shareholders by playing the role of a favored employer, a favored corporate resident and a favored supplier that vendors favored products. Mission of Nestle Nestles mission to provide quality food to their customers all across the world each and every day. The focus of Nestle is towards the enhancement of the quality of life by way of fulfilling the requirements of their customers and finding solutions of their problems. Values of Nestle Nestles values are reflected in their business conduct when the principles of fairness, honesty and concern for people are followed by them in their operations. Non-negotiable standards have been set by Nestle by the way it conducts its business and are applicable for everyone who works with them. Internal factors of Nestle Strengths Distribution System- the diversified products of Nestle have attained success both in urban and rural market. Famous- Due to the individual branding of its products, Nestle has been capable of spreading awareness regarding its products among their customers and has succeeded in become the largest food company across the globe. The adoption of this strategy was due to the reason that in case when one brand gets affected like Maggi, the sales of other brand such as Nescafe does not gets affected. Weaknesses Issues- The global brand Nestle also faces legal and consumer issues and fall under a variety of controversies such as the use of child labor, boycott of baby formula by Nestle, price fixation of chocolates which ultimately results in the negative image of Nestle. Various Brand- A single group controls a variety of brands under Nestle which leads to difficulty in managing the individual brands and has the possibility of creating conflict. External Factors of Nestle Political The expansion of the business of Nestle in different countries requires it to abide by their respective rules and regulations. Problems are faced by Nestle whenever any changes are made in the regulations regarding food and beverage. Market analysis should be done by Nestle from time to time. Economic- The revenue of the business is affected by the changes in budget of customers, their purchasing power and the prices of raw materials. Social- Problems are created for Nestle as a result of changes in the lifestyle of the customers. Therefore, flexible strategies should be adopted so that it can be changed in order to meet the changing demands of the customers. Effective advertisements can be utilized that focuses on societys welfare and ultimately result in clearing the image of Nestle. Long-term Objectives of Nestle The targets of sustainability and development are set by Nestle which is the largest food company if the world. Nestle further focuses on the reduction of emissions of greenhouse gases in every ton of their products by 35% by the year 2020. Moreover, steps are being taken for the reduction of water usage by 40% in its range of products which includes Nescafe, Purina pet food and Perrier. Nestle further aims to provide better quality of lives to 50 million children, making every possible effort for minimizing effect caused to the environment due to their processes and recovering 30 million livings in society that are associated with the operations of business. The fulfillment of the social commitments is the ultimate focus of Nestle. For example, Nestle aims to reduce the use of sugar by 5% in their products by the year 2020. The achievement of this target in Europe only will mean the reduction of 18000 tons of sugar in their operations. Alternative strategies Nestles business level strategy is cost leadership combined with less cost operators and a wide range of products. Its strategic leadership helps in making its business efficient in order to create a network of regional manufacturing, integrate the business of international level and to bring a reduction in marketing expenditures. The future aim of Nestle include the development of a research and development network by way of refining its current products and producing sustenance for tomorrow. Annual Objectives of Nestle The business objectives and marketing objectives are aligned with each other. The objective of Nestle is to attain the position of best branded and largest manufacturer of food all across the globe along with assuring the highest quality in its products. The attainment of compatibility is also aimed by Nestle with the global volunteer standards on global management system. It also focuses on trust building with government authorities, customers and business partners. Policies of Nestle Policy of Nestle is to make sure that the board members, employees and external shareholders, who are in possession of any price sensitive or confidential information, do not disclose it and be aware regarding the law imposed on the disclosure of such information. It is the responsibility of all the shareholders to safeguard the confidential information. Resources of Nestle The resources of Nestle are classified into tangible, intangible, financial and human resources. Human Resources- The employees and staff are the main reason behind the success and growth of Nestle. The productivity and well-being of Nestle is influenced by its staff members. Culture- The satisfaction of stakeholders and encouraging innovation comprise the culture of Nestle. For the purpose of business decision making, the use of balanced scorecard is made for managing the performance. It is the method with the help of which progress of organizational goal is monitored. Conclusion Nestle is one of the leading manufacturer and seller of food and beverages products having its operations in 191 countries. Its vision is to attain the position of worlds leading company that provides quality products to its consumers. Internal factor analysis of Nestle provides that the strengths of Nestle include its fame and range of products. Moreover, its weaknesses include its handling of products rangeunder single group.

Thursday, November 28, 2019

The Epic of Gilgamesh

All through historic times, stories, poems, and songs have been written with common themes, which played a significant role in explaining some aspects of societal life. One of these is friendship. There is no one in the world who does not need a friend; therefore, it is a necessary aspect of life. Advertising We will write a custom essay sample on The Epic of Gilgamesh- Theme of Friendship specifically for you for only $16.05 $11/page Learn More In the Epic of Gilgamesh, which was developed over a period of nearly a thousand years from about 2500 to 1500 B.C., friendship plays an important role in the development of the story. Gilgamesh, who is described as two-thirds god and one-third man, is the oppressive fifth king of Uruk while Enkidu is the ruler of the animals. The friendship between these characters develops in the course of the story. As the story begins, King Gilgamesh of Uruk is depicted to be in mature manhood and superior to all other men in both beauty and strength. There was no one who could match up with him in the ancient Mesopotamian society. The unsatisfied cravings of his demigod nature could not find a suitable mate for him in love or war. In addition, his unsatisfied daemonic energy made the people of Uruk to be unsatisfied with his reign. Because he was lacking love and friendship, Gilgamesh turned to excess and indulgence, and he celebrated his victories with too much debauched partying, which annoyed the individuals in the city as well as the gods in the temples. Because of his oppressive rule, the people asked for help from the gods since they feared that someday Gilgamesh would ask for a greater part of his divine heritage, challenge the gods and even rock the pillars of heaven if he was not controlled. Therefore, to counter the threat, the gods devised a plan of creating Enkidu, who was the mirror image of Gilgamesh. They believed that the king would divert his dangerous energies toward that rival there by stop challenging heaven. The gods then made Enkidu from clay and left him in the wilderness to live and eat as the animals do. In the wilderness, though he established friendship with the wild animals, his cravings for a mate were not adequately satisfied. Therefore, when a harlot from the city seduced him, he quickly agreed to leave and live in the great-civilized city of Uruk. When Enkidu goes to the city, he seems not to like Gilgamesh at first since the two engaged in a fight soon after they met. However, they quickly started to like one another. The theme of friendship is shown when the two giants become very close and start to rely on one another in conquering their enemies with ease. Thereafter, the solidarity between the two characters assists in developing the plot of the story, which is a mixture of pure adventure, morality, and tragedy, as subsequent experiences are based on this newfound eternal comradeship.Advertising Looking for essay on literature languages ? Let's see if we can help you! Get your first paper with 15% OFF Learn More The newly found comrades soon grow weak and become indolent with the city life. Therefore, Gilgamesh suggests a great exciting activity, which involves going to the forest to cut down trees so as to construct a memorable monument to the gods. However, since the terrifying demon called Humbaba is endowed with the responsibility of protecting the forest that is also prohibited to mortals, they have to kill him first. At first, Enkidu disagrees with this proposal but gives in after persuasion from his friend. Their friendship gave them the astounding courage and unwavering confidence to succeed in killing Humbaba. As the King of Uruk cleans himself, Ishtar offers to become his wife because his beauty was appealing to her; however, he turns her down with insults, recounting to her the dire fates that all her mortal lovers have met. Ishtar, the goddess of love and beauty, is infuriated at the rejectio n and goes to heaven to request his father, Anu, to send the Bull of Heaven to terrorize the people of Uruk. However, Gilgamesh and his compatriot work together to defeat the bull sent by the gods from heaven. After the success of their missions, Enkidu dreamt that they had gone contrary to the wishes of the gods so much that one of them must be sacrificed for murdering Humbaba and the Bull of Heaven. Thereafter, he quickly succumbed to a fatal disease after twelve days of suffering. The loss of Enkidu brings remorse to Gilgamesh and he realizes that death is inevitable. Because of the loss of the great friendship, he sets out on a journey to find Utnapishtim, the one man holding the secret of everlasting life. On the journey, he encountered various obstacles and on finally meeting Utnapishtam, he successively failed different tests that could have given him the secret of immortality. In the end, Gilgamesh, though being the King of Uruk, succumbed to the same fate that befell his fr iend. Although the type of friendship between Gilgamesh and Enkidu corresponds to contemporary friendship, it differs in some way from it. All through the ages, humans have treasured friendship since it determines our survival on this world. In the current society, human relationship is of essence for helping one another in times of difficulty, just as Gilgamesh and Enkidu assisted one another in conquering their enemies. Most people look for various traits in friends, especially attributes that they may be having in common. However, the current society takes friendship for granted. Most people see it as something that exists naturally.Advertising We will write a custom essay sample on The Epic of Gilgamesh- Theme of Friendship specifically for you for only $16.05 $11/page Learn More How many yearn for their better halves, as did Gilgamesh and Enkidu for each other? Who can go in the world to search for a suitable mate in love? The Mesopotamian society, as depicted by taming of Enkidu so that Gilgamesh could accept him, valued friendship such that they could go in search for it. I do not think that two ordinary peasants in Mesopotamia were capable of forming the kind of bond that existed between Gilgamesh and Enkidu. In the epic, Gilgamesh is depicted as being two-thirds god. Therefore, to make him have his equal, the gods created Enkidu to satisfy his cravings for a mate. This implies that the gods predestined their friendship, a thing that could not just happen among ordinary peasants in Mesopotamia. Before the coming of Enkidu, Gilgamesh had a cold heart and he never befriended anyone. However, the coming of Enkidu changed all these as he placed a check on Gilgamesh powerful energies. On the other hand, Gilgamesh pulled him out of his egocentricity. This even matching of characteristics is only possible when someone is specifically created for the other, but not otherwise as may be in ordinary men. This essay on The Epic of Gilgamesh- Theme of Friendship was written and submitted by user Lesly Patrick to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Three Basic Elements Essays

Three Basic Elements Essays Three Basic Elements Essay Three Basic Elements Essay To enumerate the different types of Bed positions 2. To be able to describe and demonstrate the different bed positions 3. To discuss the functions of different bed positions 4. To be able to define draping 5. The students must be able to discuss the concepts and principles of draping 6. To demonstrate the proper way of draping a patient Proper Body Mechanics Efficient , coordinated and safe use of the body to produce motion and to maintain balance during activity ; reduces fatigue and the risks of injuryTHREE Basic Elements: 1. Body alignment /posture 2. Balance or stability a stable posture in which ones body weight is well balanced 3. Coordinated movement Principles: Lifting lift client as close as possible to the body’s COG Pulling pull client rather than pushing, enlarge the base of support by either moving the rear leg back if facing the obj or moving the front foot forward if facing away from the obj. Pushing enlarge the base of support by moving the front foot for ward Pivoting ody is turned in a way that avoids twisting of the spine; place one foot forward, put body wt. On the balls of the feet and turned about 90 in the desired direction , then the foot ahead of the other will now be placed behind. POSITIONING THE CLIENT Any position correct or incorrect can be detrimental if maintained for a prolonged period of time, position of choice for client who have difficulty breathing / with heart problem BASIC BED POSITIONS Supine position – patient lies on his back Side lying – patient lies on one side Prone – patient lies on his stomach Supportive aids Used when positioning pts. In order to keep body in correct alignment, provide support to the body parts ; restrict movements of certain parts Pillows, sandbags, handrolls, foot boards, trochanter roll IMPORTANCE OF CHANGING BED POSITION ; PROPER BED POSITIONING It contributes to patients comfort. It relieves pressure thus preventing pressure sores It prevents onset of contractures ; other deformities It improves circulation esp in the limbs It prevents undue ms strain. In re-positioning of pts. Avoid the ff improper body positions like – – – – – Neck ; back flexion Ankle plantarflexion Hip ER Lying over one arm when in sidelying Unsupported arm ; leg when in sidelying ? Potential sites of ms strain in completely supine position pts without supporting pillows Neck, small of the back, elbow, wrist, knee ; foot Potential sites of Injury when Patient is Maintained in one position DRAPING Manner of arranging the covering in order to expose the part being examined treated or cleaned.A Pt. cultural, religious or personal preferences may affect the caregiver`s ability to drape the Pt. (ex. Female muslim may not permit the area to be exposed , esp to a male caregiver) DRAPING Provide modesty for Pt. Maintain Appropriate body temperature Provide acces and exposure to areas to be treated while protecting the other area s Protect the Pt. skin or clothing from being soiled or damaged DRAPING Materials 3 pcs draping towel Pillows Supporting aids DRAPING Procedures Inform the Pt about the type of clothing to be worn for the Tx session. Clothing maybe need to removed and tell why removal is necessary. Adjust the room temperature and ensure that blinds/windows are close prior to draping. The area to be treated should be exposed and have freedom of motion so that treatment can be performed effectively. Have another person to assist the Pt to apply the proper clothing (if necessary) Expose only the body part needed to be expose. 1 or both extermities Upper back Lower back One specific body segment

Thursday, November 21, 2019

Managing patient on antipsychotic medication Essay

Managing patient on antipsychotic medication - Essay Example Since that decade more than twenty of the antipsychotic agents have been introduced in United States. The antipsychotics used during the 1980s are collectively called conventional antipsychotics and the drugs that were introduced in the 1990s are called the atypical antipsychotics. Antipsychotics, unfortunately, have the tendency to be misused if the practitioner has sound knowledge about the psychopharmacological aspects of the drugs. Elderly patients are also at an increased risk of developing drug-induced motor or movement disorders as compared to the younger population (Saltz, Robinson, & Woerner, 2004). It is crucial to understand the pharmacological aspects of the antipsychotic drugs as improper management can lead to adverse drug reactions, drug-drug interactions, drug resistances and poor patient compliance. The second generation antipsychotics (SGA) are different from the first generation antipsychotics (FGA) because they also block the serotonin receptors. SGAs also have lesser extrapyrimidal symptoms as compared to the FGAs, however, SGAs ae associated with an increased risk of obesity, hyperglycemia and hyperlipidemia. According to studies only two SGAs cloazipine and olanzipine has been proved to be more effective than the FGAs. Antipsychotics are approved by the FDA for use in schizophrenia as well as some other psychiatric conditions and non-psychiatric disorders. They are also indicated in the treatment of bipolar disorders, autism, generalized anxiety disrder, major depressive disorder, perioperative nausea, preoperative restlessness, severe behavorial probles, severe nausea and vomiting, and refractory tourette syndrome and for the management of neuropsychiatric symptoms of dementia (Moore, DeJoseph, & Simmons, 2014). Both SGAs and FGAs are associated with risk factors and it is important to carry out a detailed assessment of the patient

Wednesday, November 20, 2019

Fallacies and conspiracy theories, Roswell UFO incident Essay

Fallacies and conspiracy theories, Roswell UFO incident - Essay Example With this in mind, the fallacy goes on to state how scientists have taken years of hard work studying the equipment on-board the craft and have managed to gain some understanding, at least on a minimal level and not fully, which has brought about modern technologies. This has been done through reverse engineering of alien devices found onboard, which has seen â€Å"discoveries† made to the benefit of the military and the good of the people. A good example exists in the form of technological application in some unfathomable items such as night vision goggles and the Kevlar body armor. This is because the alien spacecraft did not have windows or any openings that could grant access, which means they were able to use accurate estimation instrument for navigation, and even got to the earth without being detect by the then defense mechanisms. The insinuation of this fallacy is that aliens gave birth to the technology that man holds dear in modern times as there is no other explanat ion to how it came into being, and that all pieces of the puzzle fit and point to Roswell. The technologies, besides the ones mentioned earlier include stealth technology, lasers and the integrated circuit chip, which have into existence recently after years of research and reverse engineering of alien technology (Speigel). Another fallacy is that the US military is in possession of highly effective weapons mounted on planes that could see to it that no enemy survives. This story is backed by the information given by a number of former military officials who put through their arguments for the existence of the conspiracy in that there were actually two alien spacecrafts and not one, as commonly believed by those that believe. This they back with tales of how the first craft came to crash, which is that there was a new test plane in the air force. The test plane is said to have fired its out of this world weapon, which is supposed to be some form of advanced pulse gun, which shot out electromagnetic pulses, which took out the electronics of the craft (Daily mail). With this idea, conspiracy theorists issue the concept of annihilative power of the US military in that as soon as the experimental plane took out the UFO, it came down crushing to see the developments that later followed after the craft was sa lvaged and towed to storage for exploration. This fallacy shows the alleged power of the US military and how much advanced it is in developing military applications for technologies that are discovered every now and then. As this pertains the main reason for the development of these theories or fallacies, one may view it starting from political to sensational conspiracies from several angles. In terms of political ambition, it is meant to discredit the government in that is not

Sunday, November 17, 2019

Response to Coments on DQ1 JS and DQ2 MBw7 Essay

Response to Coments on DQ1 JS and DQ2 MBw7 - Essay Example As you mentioned a company can wipe off the balance sheet a portion of its debt by converting the bonds. The bondholder also benefits in case of a conversion because the investor benefits from all the coupons payments that were received and from the equivalent value in stocks which can be converted into cash by selling them in the open market. DQ2 I agree with you that convertible bonds are a win-win proposition. The bondholder benefits when the bonds are converted into common stocks because the investor would be trading in a principal bond balance which was not liquid for an asset that is extremely liquid due to the fact that common stocks can be sold in the open market instantly. I once owned some common stock of Wal-Mart. When I needed some money I called my broker and he sold my common stocks the same day I placed the sale order. Common stocks are a liquid asset. The cash in the form of coupon payments that the bondholder received represents an added benefit for the bondholder. T he company that issues convertible bonds benefits from the flexibility that convertible bonds provide. Convertible bonds are great investments options that provide the investor with the best of both the equity and debt market (Little, 2011). References Investopedia.com (2011). Convertible Bonds: An Introduction. Retrieved May 18, 2011 from http://www.investopedia.com/articles/01/052301.asp Little, K. (2011).

Friday, November 15, 2019

Energy Conversion Energy Transfer Assignment

Energy Conversion Energy Transfer Assignment The technical specification for a transformer may be found by examining its name plate. All transformers on the distribution and transmission network have a name plate. This plate has useful information about the transformer, e.g. how it is cooled, its KVA rating, the year it was mad and its LV HV arrangement. The information is stamped or etched on so it is permanent. [1] Image 1 SSE GMT Dorset KVA This is the transformers apparent power rating. Volts This is the Primary and Secondary voltages values of the transformer Amperes This is the Max current rating for the transformer Phases The amount of phases on the HV and LV sides Diagram DWG No Transformer schematic reference number Makers Serial No This is the serial number from the transformers manufacture Polyphase KVA Type of cooling The way the transformer is cooled Frequency Number of cycles per second in an alternating current Impedance A ratio of the transformers normal full load current to the current available under short circuit conditions Vector group ref indicates the windings configurations and the difference in phase angle between them Core and windings This is the weight of the core and windings Weight of oil This is the oil weight Total weight this is the combined weight of the oil, core and windings Oil This is the amount of oil in the transformer Year of manufacture This is the year the transformer was made Owners No This is where the owner of the transformer can label there asset With electrical machines it is very often the temperature rise permitted in the windings and insulation that determines the output, this applies particularly to transformers. Transformers are identified according to the cooling medium employed and its circulation method. The designated letters are assigned. Medium/Method Symbol Cooling Medium Mineral Oil Gas Water Air Synthetic Insulating Liquid O G W A L Circulation Method Natural Forced Forced Directed N F D The identification code used consists of 4 letters giving details of the cooling medium and circulation method for both primary and secondary cooling system. 1st letter Method 2nd letter Circulation 3rd letter Medium 4th letter Circulation Cooling medium in contact with winding Cooling medium in contact with external cooling system 2. The following items are associated with power transformers. Conservator tank The oil conservator is a single protecting device made of sheet steel, resistant or not to vacuum. It is cylindrical and has two fixing brackets. Usually, it is placed on a structure fixed on the transformer, above the cover level. In each side of the conservator there is one hole allowing its eventual washing during the exploitation. This hole is closed by means of a plate, which can hold (depending on the needs) an oil level magnetic indicator. The conservator has several holes to which are connected the corresponding piping. Each one of these piping has its specific activity (connection to the air breather, to the transformer cover, sampling, etc.). If the transformer is equipped with on-load tap changer, the conservator is divided by a septum. The larger compartment feeds the tank of the transformer and the smaller one feeds the on-load tap changer-breaking chamber. [3] Buchholz relay Every type of fault which occurs in oil filed transformer gives rise to the generation of gas which may be slow in the case of minor faults or violent in the case of major faults. The Buchholz relay is inserted in the pipe connection between the transformer tank and conservator. The Buchholz relay comprises of a cast iron housing which contains 2 elements. A mercury float switch which detects a fall in oil level and a combined deflector plate and float switch mounted so that it will detect any rapid movement of oil from the transformer to the conservator. The slow production of gas due to a minor fault causes a stream of bubbles to pass into the Buchholz chamber, resulting in a slow displacement of the oil and lowering the upper float which when sufficient will generate a Buchholz Alarm. A serious fault will produce an explosive generation of gas which rapidly displaces the oil and causes a surge to pass along the pipe towards the conservator and in doing so displaces the deflection plate, operating the lower switch which produces a Buchholz Trip which causes the transformer circuit breaker to trip. A leakage of oil from the transformer tank causes a gradual fall in the level of oil which when sufficient will be seen by the Buchholz Alarm float switch. The relay is also fitted with a petcock which can be used to take oil samples for analysis of the fault. Image 3, SSE S/S Paisley Road, Southbourne, Buchholz relay Neutral Earthing Resistor (NER) Neutral earthing resistors are a type of protection device, protecting equipment when there is a fault on the network. They work by restricting the amount of voltage and current that flows through the neutral point of the transformer its connected to, to a level that is safe preventing any damage. Neutral earthing resistors are generally connected between ground and neutral of the transformer. [2] Image 4, SSE S/S Paisley Road, Southbourne, NRE Image 5, NER Diagram [2] 3. Circulating currents can sometimes occur in a power transformer, explain why this happens and whether it is a good thing for power transmission and distribution networks. Â  [4] References [2] https://www.captech.com.au/solution/neutral-earthing-resistor/ [3] Table from SSE Document Library Ref: TG-PS-445 33kV transformers [4] http://www.gozuk.com/blog/circulating-current-in-parallel-transformers-585733.html

Wednesday, November 13, 2019

Is There Anyone Out There? Essay -- Astronomy

Earth is small. Many people find it hard to believe, but when one thinks of earth in its context, amongst billions of galaxies, stars, planets, and an infinite universe, earth is a mere grain of sand on the beach that is space. With this in mind, one may, quite understandably, find it hard to believe that earth is the only planet that sustains life. With today’s advanced technology and science, extensive evidence has been found suggesting a great likelihood of life on other planets. The discovery of life on other planets has huge implications for humankind, as it would likely give a more thorough understanding of what human life is, how it came to be, and possibly even insight into why humans exist. Oftentimes, people ignore rhetoric regarding the possibility of life on other planets. This may be for religious reasons or because many people see it as more science fiction that scientific, but there is a substantial difference between Hollywood’s perception of aliens and what is likely to be the first extraterrestrial life discovered (Borenstein). In all reality, carbon, hydrogen, oxygen, and a few other basic elements are all it takes to create the miracle of life, and these chemicals could exist in countless places other than earth (Bryson 2). Some life may not even require that, like the microbe found in a lake in California, which was able to survive on arsenic and phosphorus alone (Borenstein). According to Borenstein, the â€Å"life† that scientists are looking for is more accurately described as a life form or microbial slime, much like the microbes that became humans via evolution. Approximately 140 billion galaxies inhabit the universe, with somewhere between one hundred billion and four hundred billion stars in Earth... ...rawstory.com/rs/2010/12/08/ evidence-mounting-daily-proven/> Bryson, Bill. A Short History of Nearly Everything. New York: Broadway Books, 2003. Print. Cohen, Daniel. The Ancient Visitors: Have Creatures from Other Planets Ever Lived On Earth? Garden City, NY: Double & Comp., Inc., 1976. Print. Kaufman, Marc. â€Å"Reaching for the Stars: It’s Alive Out There! Scientists Seek Out the Evidence.† McClathy-Tribute News Service. 17 June 2011: n.p. Web. 15 Mar 2012. Spotts, Pete. â€Å"In Search of Life, More Planet ‘Candidates’ Are Found. Are Any Just Right?† Christian Science Monitor. 12 Sep 2011:n.p. Web. 15 Mar 2012. "Story of the Universe." European Space Agency, 2011. Web. 15 Apr 2012.

Sunday, November 10, 2019

Biographical Analysis of the Crucible Essay

What lies deep down in the Crucible characters that not everyone can see? The former husband of Marilyn Monroe managed to keep one aspect of his life private from the media for over four decades. Was it because of shame, selfishness, or fear? The Crucible is based on the Salem Witch Trials of 1692. Miller has read all about the Witch Trials, but has never really understood it until he read the book published by Charles W. Upham, the mayor of Salem at that time (â€Å"Why I Wrote The Crucible†). He knew right away that he had to write about that time period. Even though the play provides an accurate representation of the trials, the truth lies in Arthur Miller’s past history. Pursuing this further, Arthur Miller has hidden a life-long secret that recently has come out. When his son, Daniel was born, Miller was very happy, but immediately knew something was wrong. The doctors had diagnosed the baby with Down syndrome. He was the son of Miller’s third wife, Inge Morath. Miller said. â€Å"I’m going to have to put the baby away†, but Inge wanted to keep him (â€Å"Arthur Miller’s Missing Act†). Within days the baby was gone. They sent him to one of the Connecticut institutions for the mentally retarded. Inge went to see him every day, but Arthur never wanted to set eyes on him. Afterwards, nothing was mentioned of Daniel. He was cut out from Miller’s life. Was it because of selfishness, or fear that the world will know? His personal story seems to contradict his theme in The Crucible. Through the character Abigail Williams, we can see that people are willing to give up and abandon their connection with their own values in order to protect themselves. Just as Abigail hid the fact that she had an affair with John Proctor, Arthur Miller has hidden the fact that he also had a brief affair with Marilyn Monroe. Abigail William is the girl who leads this play into disaster. She is most responsible for the meeting in the woods and when Paris finds out, she tries to conceal it as fast as possible, because if she reveals that she has cast a spell on Elizabeth, it will reveal the affair she had with Elizabeth’s  husband, John Proctor. To protect herself from future punishment that may come, she starts to accuse others of witchcraft. By telling lies, that is how she manipulates the whole town into believing that she is innocent (Miller 114-115). Abigail is independent and she knows that nothing is out of her grasp. Once she finds herself attracted to Proctor, she won’t suppress her desires that she wants him. However many times she reviews her memories, the more she is sure that she is the ideal wife for John. The only thing in the way is Elizabeth. Declaring witchcraft among the majority will keep the secret out of reach. She uses this to create fear and intimidation among the townsmen people. The only reason her evil little plan is working is that the girls have got her back. She has threatened them with violence if they refuse to do as she says. â€Å"Now look you. All of you. We danced. And Tituba conjured Ruth Putnam’s dead sisters. And that is all. And mark this. Let either of you breathe a word, or the edge of a word, about the other things, and I will come to you in the black of some terrible night and I will bring a pointy reckoning that will shudder you. †¦ And I can make you wish you had never seen the sun go down!† (Miller 20). In order to get Proctor, she must eliminate Elizabeth and choose her individuals she will accuse wisely. She thinks nothing of the fact that the individuals will be hanged based upon her accusation. When she sees her plan failing, she will react the same by not showing any signs of fear. She has condemned Proctor to hang and flees right away from the town, leaving all the action well behind. John Proctor is the protagonist of the play, while Abigail is the antagonist. One of his flaws is his temper. Proctor leads to shouting and even physical violence. There are occasions in the play where he threatens to whip his wife, servant, and even his ex-mistress, Abigail. He was the average good man, who owned a farm and was respected by everyone he knew. He had three children a good wife to raise a family with and all was well until Abigail came into his life. At first Abigail was the housekeeper, who has quietly come into the life of Proctor. He must have been tempted by her fiery personality, which he cannot resist. This affair only happened, because at that time Elizabeth was sick, which allowed Abigail to make her  first move. John may have also been attracted to Abigail’s personality shown in Act 1. She tells John that the witchcraft isn’t true and that the girls were just having a party with Tituba. â€Å"PROCTOR, his smile widening: Ah, you’re wick ed aren’t y’! You’ll be clapped in the stocks before you’re twenty† (Miller 22). From this line we can conclude that Proctor is charmed by Abigail’s naughty tricks. The temper of John Proctor ties into the anger of Arthur Miller towards the McCarthy hearings. The Crucible relates to the McCarthy hearings, because Arthur Miller claimed to have written The Crucible to criticize the theme, while many people saw the resemblance between the Salem Witch Trials and the McCarthy Hearings. Just like McCarthy, the people of Salem were not interested in facts; instead, they took their hatred towards the people of their community. Miller himself was brought to the House of Un-American Activities Committee and was falsely accused of Communism. (â€Å"Fear as Governance: Arthur Miller The Crucible as Contemporary Reflection†). For the first two acts we see John doing little effect to the play. However, when Act 3 comes into play, he is there to protect his wife. He has three weapons that he can use against the court. First is Abigail’s admission that there was no witchcraft, proof from Mary Warren that the girls were faking, and the fact that he had an affair with Abigail. All this declines in the favor of Abigail. He only ends up ruining his name and getting himself condemned for witchcraft. The only way to save him from being hanged is by admitting that he is with the Devil and that he justifies that he was a bad person anyway. Horror struck when asked to sign his name. By signing his name he believed he will be signing his soul away. Even though, he is so close to being free once again, he refuses to sign his name. He says, â€Å"I do think I see some shred of goodness in John Proctor. Not enough to weave a banner with, but white enough to keep it from such dogs.† (Miller 144). At first we may believe that The Crucible is just a story about witch trials that took place in Salem, but by paying a greater attention to the  minor details we can understand that the book has another meaning to it. Every detail can be connected to Arthur’s personal life.

Friday, November 8, 2019

Juveniles in Society essays

Juveniles in Society essays Over the years, countless efforts have been made to find a comprehensive explanation for delinquency. The results of these efforts have offered possible reasons as being both biological and social. It is still debatable as to what forces have the greatest influence on youth crime, but it is undoubted that several factors clearly make an impact. The direct relationships a child has with concrete social elements, like his family and friends, are likely to give some intimation of his involvement in crime. However, it must be noted that there are more abstract contexts for socialization that also exist as potential explanations for a childs behavior. The most prominent of these less specific forces are the media, community, and religion. It has been argued extensively that these three elements represent a major source of delinquency in the U.S. today. Everyone has at one time or another heard accusations against television, for instance, and how it has such degenerating capabilities in r elation to young minds. Equally common are the various public proclamations about the lack of brotherhood among citizens of this country. These complaints are nothing new to our society; before television was vilified, it was radio, and before radio it was comic books. In short, these problems merely exist as different manifestations of an age-old concern. Another, seemingly less obvious, aspect of this argument deals with the role of religion in society. In paralleling it to delinquency, for all its power and influence, religion is much more perplexing than the media or sense of community. For one, religion exists on many different levels and is extremely difficult to define in a fashion suitable to the debate. In addition, the fact that religion is such a controversial and sensitive subject only complicates the pursuit of characterizing and understanding it. These obstacles notwithstanding, the multifaceted effects of religion on crime have been arg...

Wednesday, November 6, 2019

Book Review Song of Solomon

Book Review Song of Solomon Summary of the Book The central theme in Toni Morrison’s book, â€Å"Song of Solomon†, is the quest for self-identity. In the novel, the author narrates the life journey of a young man, â€Å"Milkman† Dead, who lacks enthusiasm for his life, is alienated from his relatives, his cultural roots and his community.Advertising We will write a custom essay sample on Book Review: Song of Solomon specifically for you for only $16.05 $11/page Learn More At first, Milkman appears psychologically and spiritually enslaved, but later, his aunt, Pilate, and his ally, Bains, help him to embark on a journey of self-discovery. It is through his quest for spiritual and physical restoration that Milkman is able to relate to his inner self and regain his sense of self-worth. The events of Milkman’s journeys span over thirty years. In part I of the book (Chapters 1-9), Morrison narrates Milkman’s early life in his hometown, a small town in Mich igan. From his birth to his early thirties, Milkman is spiritually empty; his aunt’s conservative tendencies and the father’s worldly lifestyle could not help him grow spiritually. At one time, Milkman’s father and his sister, Pilate, are forced to flee their home following their father’s killing over land. Later, following a disagreement, they go separate ways only to meet again in this small town in Michigan. The two still have a grudge against one another and could not communicate. Towards the end of part I, Milkman sets out on a quest to find his aunt’s hidden gold, which, according to his father, would become his inheritance. In part II, Milkman travels to the South ostensibly to search for gold (his inheritance). His quest leads him to a farm in Danville, Pennsylvania, his grandfather’s home. He would later trace his lineage to a small town, Shalimar, in Virginia and go there. It is in this small town that his quest ends when Milkman m eets his paternal relatives and discovers his true self-identity. Developing Milkman’s Quest Morrison uses many narrative elements in part I in developing Milkman’s quest in the American South in part II. One such narrative element is setting. The South harbors Milkman’s past history particularly slavery in the South. Morrison uses the name â€Å"Southside†, Pilate’s residence in the town, to denote their southern ancestry, the origins of the Black population. Thus, Pilate’s place gives Milkman a direct emotional connection to his ancestors in the South. Also, Morrison predicts the importance of Milkman’s journey to his southern ancestral home when he states that Milkman’s walk in the Not Doctor Street was dreamlike and strange following his quarrel with his father.Advertising Looking for essay on american literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More His quarrel with his father marks a turning point in his life as he learns of his father’s materialistic tendencies over family traditions. Also, in part I, as Milkman walks down this street to his aunt’s Southside residence, he encounters people â€Å"all going the direction he was coming from (78). Here, Morrison signals that in order for Milkman to discover his identity, he will have to go against the grain and transcend not only the Northward migration of the Black population but also his selfish desires and pleasures. Morrison, in part I, narrates Milkman’s inquisitiveness to know the meaning of one’s name to signify Milkman’s as well as his ancestral origins. It is the South that harbors the secrets of Milkman’s ancestral past and the origin of his family name, which they lost because of their high mobility. As his father explains, Macon Dead, was the name given to his grandfather by a Freedman Bureau official, which the Macon family kept because Milkman’s mother insisted that it was new and would wipe out the past (53). His father’s explanation marked another turning point as Milkman later sets out to find his family origins and his true identity. By dropping their family name the Macon family lost their traditions and history. The surname is significant to the family as it gives them a sense of self-determination. Thus, Morrison uses Milkman’s urge to know his family name in part I to herald his subsequent quest to the South to discover his heritage and self-identity. Another narrative element Morrison uses in part I of the novel to herald Milkman’s journey in part II is sequencing of events. Milkman’s self-alienation and disaffection to his family and the black community required complete restoration. He had lost his sense of heritage and therefore, could not relate well with his family or community. Morrison first symbolizes Milkman’s uniqueness during his birth. He narrates tha t Milkman is born, the first Black baby, in an all-White hospital called Mercy Hospital. Morrison also narrates how Milkman’s prolonged breastfeeding distinguishes him from other children. At only age four, after Milkman learns that people cannot fly, he loses â€Å"all interest in himself and likewise has no interest in those around him (9). The author narrates how Morrison was excluded by other children while growing up. His siblings treated him with â€Å"casual malice† (10), which, ironically, made Milkman, from an early age, to develop the urge to seek answers about his true identity and familial origins. The social exclusion Milkman suffers marks a turning point in his life as he realizes that he is different from other kids. It also makes him to seek to find out about his ancestry, hence his quest to the South. As Milkman becomes older, his life is fraught with failures, partly because of his childhood alienation and lack of empathy and self-awareness. Morrison narrates that, at 22 years of age, Milkman still acts and behaves as a child. He writes that Milkman had not â€Å"thought of his mother as a person, a separate individual, with a life apart from allowing or interfering with his own (75).Advertising We will write a custom essay sample on Book Review: Song of Solomon specifically for you for only $16.05 $11/page Learn More Also, Morrison portrays Milkman’s perceptions as inaccurate and self-centered. He assaults his father to please his mother but learns that â€Å"there was no one to thank him-or abuse him, his action was his alone (68). This marks another turning point in his life, as he learns that he is responsible for his actions and by extension, his destiny. Morrison also gives his point of view regarding Milkman’s actions. He states that Milkman’s â€Å"sleeping with Hagar had made him generous, or so he thought, wide-spirited, or so he imagined (69). The author’s poin t of view portrays Milkman as a self-absorbed and selfish young man, with no dream in life. It is no wonder the prospect of hidden treasures (gold) makes him set out on a quest to find it. Morrison also gives his views about Milkman’s adulthood dream. He states that Milkman contemplated relocating from the Not Doctor Street to a new place with â€Å"new people, new command. That was what he wanted in his life† (180). The author’s views and sequencing technique to herald Milkman’s future quest to the South. Magical Realism in the Book Morrison uses many examples of magical realism to advance the novels’ themes. One such example relates to his use of descriptions that appeal sense perceptions such as odors, tastes and colors. For instance, he describes the realistic, yet the mysterious quality of the smell of ginger, when he compares his hometown in Michigan with a mystical place in the Far East. He writes: â€Å"An odor like crystallized ginger, or sweet iced tea with a dark clove floating in it†¦ made you think of the East and striped tents and the sha-sha-sha of leg bracelets†¦.† (184). His magical description evokes emotions of Milkman’s lost personal identity and culture. It helps to elaborate the novel’s realistic themes of bemoaning lost culture and personal identity. It underscores Milkman’ and his friend’s (Guitar) search for self-identity, which is a key theme of the book. Another example of magical realism occurs in chapter 11. In this scene, Morrison describes the sounds made by the hunting dogs during the hunt. He describes the sounds as â€Å"all those shrieks, those rapid tumbling barks, the long sustained yells, the tuba sounds, and the drumbeat sounds†¦ (278). His depiction of the voices, though, distinctive and realistic, is, in time and space, shrouded in mystery. Morrison also links the conscious experiences and the memories of the characters’ past li ves. Morrison uses this approach to advance the novel’s theme of the search for one’s self-identity as exemplified by Milkman’s search. It is through his epic search for self consciousness that readers understand the significance of familial and communal identity in his life.Advertising Looking for essay on american literature? Let's see if we can help you! Get your first paper with 15% OFF Learn More Another example of magical realism that involves personal consciousness occurs in chapter 10. Morrison describes Circe’s house as â€Å"looking as if it had been eaten by a galloping disease, the sores of which were dark and fluid† (220). She then proceeds to describe what is going on in Milkman’s memory including his flight from his hometown in Michigan to Pennsylvania, his final chat with his personal friend, Guitar, his journey on to Circe’s house and his interaction with his father’s friends before returning to Circe’s house where Milkman is. This approach of superimposing past memories with the present is an important magical realism technique that helps Morrison to describe the dynamics of the characters’ conscious experiences. A new sense of self-identity transforms the once narcissistic Milkman into an empathic man as shown in his realistic interaction with his girlfriend, Sweet: â€Å"He made up the bed. She gave him gumbo t o eat. He washed the dishes†¦ He scoured her tub (285). Here, Morrison encourages greater consciousness among the black people to seek to understand their history and community identity. Her description of how Milkman connected with his personal and familial consciousness borders magical realism. Milkman, in chapter 15, on completing his quest, reflects on the people he has interacted with and how they helped shape his destiny. He becomes conscious of his familial and community origins as shown in the list of names of his black kinsmen. Morrison uses this mental imagery to illustrate the book’s theme of personal and community sense of identity. Toni Morrison’s Female Character Portrayal Morrison depiction of the female characters in the novel illustrates the defects of gender relations among the blacks. She portrays female characters as crucial in the development of personal and community identity. All the females Milkman interacts with, though he mistreats them, help him discover his self-identity. One such female character is Pilate, an influential figure in Milkman’s life, who, unlike Macon Dead, is conservative and disdainful of Macon’s materialistic lifestyle. Morrison uses Pilate to represent the deep connection that females have to their people and ancestors. A stark contrast to Pilate values her ancestry and longs for a reunion with her relatives in the South. However, to her brother, Macon, kinship is not important. Pilate plays a crucial role in Milkman’s life. Her incomplete song makes Milkman to seek for the missing words of the song later in the book. The words of her song are symbolic because she is attempting to assist Milkman discover his identity. At the end of the book, Milkman gets all the words and is able to sing the entire song, which makes him feel that he has found his true identity. Pilate helps Milkman, who had lost all personal and cultural consciousness because his father was ‘deadâ€⠄¢ emotionally, to discover himself. Thus, Pilate helps to develop an emotional connection to his ancestors. Morrison also portrays female characters as role models. In the novel, all of Milkman’s role models are females who guided him throughout his life. Even his close male friend, Guitar, is a rogue murderer who could not guide Milkman. In the end, Milkman discovers that Pilate’s teachings were relevant to his final destiny, though, initially, he had sidelined her. As it turns out, Pilate is the most influential figure in Milkman’s quest for self-identity. Morrison, Toni. Song of Solomon. New York: Vintage International, 1977. Print.

Sunday, November 3, 2019

History of Policing in America Essay Example | Topics and Well Written Essays - 750 words - 1

History of Policing in America - Essay Example However, as colonies shifted into towns, as well as towns into big cities, the Justice of the Peace organization was not sufficient. It was time for a well structured and salaried police service unit. Nevertheless, during that time, there were no policewomen. Boston initiated Night Watch in the early 1600s, which worked logically well in areas where the settlers embraced a rural culture, as well as an agrarian lifestyle (London, 2006). New York City, on the other hand, in 1651, set up the Shout and Rattle Watch, but, in 1705, Philadelphia thought that it was necessary to split the city into ten patrol regions. This was, in reality, the first stab in the United States at "controlled law enforcement" as it was worth the effort (London, 2006). Sometime between the Civil Wars and Revolutionary, the over-rapid increase of industrialization and population in the United States mandated the development of metropolitan police departments. Philadelphia, in 1833, prepared an independent, 24/7 watch squad (London, 2006). In 1844, New York, in 1844, maintained two police units, one unit worked during the day and the other one took their shift at night. During this time, police departments were run by police chiefs, chosen and answerable to political bosses inharmoniously comparable to what was observed in the black and white police films of the 1950s. Corruption ran out of control. Another law enforcement technique that American inherited from Britain was The Sheriff System. As America migrated west, in a majority frontier townships, the sheriff was the main law enforcement officer (London, 2006). He could be hired from the local community, or more regularly a Sheriff was elected by his repute and the gloomier the representative, th e more likely he was to be selected.  

Friday, November 1, 2019

How Can a Child with ADHD Be Supported And Included In School Essay

How Can a Child with ADHD Be Supported And Included In School Education - Essay Example Potential teacher factors which might be important to consider in such compatibility equations are discussed, along with the implications of these variables for school-based assessment and intervention processes and future research. A substantial literature on children with attention deficit/hyperactivity disorder (ADHD) has accumulated over the past 2 decades. An impressive portion of this literature has addressed the difficulties students with ADHD experience in school classrooms and the efficacy of interventions to minimize these difficulties. Medication and behaviour management procedures remain the two most commonly employed school-based interventions for children with ADHD (Rapport, 1992, 155-163). Due to well-documented limitations associated with both strategies, some combination of the two is generally accepted as the optimal approach to treatment. Nevertheless, an increasingly common finding in studies which examine the efficacy of such a combined approach to treatment is the considerable variability in treatment response among individual students (Pelham, 1993). As such, a case-by-case assessment of treatment ingredients and potencies is necessary (Abramowitz, 1994; Hoza, 1992). Hence, successful sch ool outcomes for students with ADHD depend upon the degree to which treatment components and potencies match the needs of particular children. This "match" between treatment and student may best be conceptualized as a "compatibility equation" (in this case, student-treatment compatibility) in which characteristics of both child and treatment are taken into consideration in planning treatment and evaluating outcome. Studies examining student response to treatment can be criticized for an almost singular focus on treatment ingredients, as well as a relative neglect of student characteristics that may mediate treatment outcome. Yet perhaps the most striking limitation of school-based treatment outcome research has been the lack of consideration of teacher characteristics that may have a significant bearing on outcome. Two additional compatibility equations --teacher-treatment compatibility (the match between different teachers and different treatment ingredients and potencies) and student-teacher compatibility (the match between a particular teacher and a particular student with ADHD with regard to a variety of factors) -- have been virtually ignored. This article suggests that a more adequate and predictive model from which to conceptualize classroom outcome for students with ADHD will be one in which "teacher factors" are given greater consideration. Goodness-of-Fit and System Theory The terms compatibility and match can be traced most directly to the goodness-of-fit literature (Thomas, 1998). Goodness-of-fit is a concept that has been applied productively to child-care-giver interactions (Bell & Harper, 2003; Thomas & Chess, 2001); several authors have noted that the concept may be relevant to child-teacher

Wednesday, October 30, 2019

Give a full summary of the movie Crash Assignment

Give a full summary of the movie Crash - Assignment Example Detective Waters, a black man, speaks of how people in Los Angeles almost assist upon getting into car accidents. Waters, who had been in the car involved in the accident, gets out of the car to inspect a crime scene in the immediate vicinity. Waters is told by a fellow police officer that a body had been discovered; however, what Waters sees at the crime scene is not immediately known to the audience, for the scene jumps to a lengthy montage of scenes that took place almost two days prior to the accident: Inside a gun shop, a Persian father, Farhad, and his daughter, Dorri, are purchasing a gun, but are hampered and hurried from the shop by the shop owner, who is against the two not speaking English; the defense attorney and his wife, Rick and Jean, are carjacked by two black men, Anthony and Peter; Jean is having the locks changed on her house, and the locksmith, Daniel, overhears himself being regarded as a gang member; in a diner where two Asians are conversing amongst themselves , a police officer, Ryan, is on the phone with a medical assistant, Shaniqua, who promptly hangs up when he makes a racist comment. After Ryan and his partner, Hansen, leave and begin their duties, they pull over a black vehicle on suspicions of sexual activity while driving. The black couple, Cameron and Christine, exit the vehicle when Ryan directs them to; Cameron is polite and cooperative, though Christine is drunk, which shows through her actions and speech. Ryan frisks Christine, though what he is essentially doing is sexually molesting her. After he finishes, he allows the couple to continue on their way. Another series of montages begins again, going off of the original scenes, continuing from the previous montages. Christine is beside herself with anger that Cameron did nothing to stop with Ryan had done to her, though Cameron firmly believes that he acted in the way that he was supposed to; Daniel is putting his daughter to bed

Monday, October 28, 2019

Achieving the American Dream Essay Example for Free

Achieving the American Dream Essay One would think that purchasing your first home would be a very fascinating experience; after all it is one of the most major purchases of your entire life. In America, home ownership ties in with the American Dream and the spirit of working hard to one day earn through hard work a home with a white picket fence. My husband and I felt that it was time for us to reward ourselves for all the hard work we have been putting in over the years by purchasing our first home, which was well overdue. I quickly learned the process of purchasing your first home can be very frustrating and stressful. However, if you survive the home buying process the reward is priceless once you move into your â€Å"American Dream.† Before we started shopping for our home we both agreed it was important for us to have a mortgage loan preapproval. Although I assumed that obtaining a preapproval would be the most challenging part of purchasing a home, it happened to be the easiest part of the entire process. I was able to be preapproved by my bank over the phone in a matter of minutes pending certain guidelines. Acquiring the preapproval was so easy I was sure the remainder of the process would be effortless. I was startled to learn that I would be faced with many obstacles to overcome in order to complete the process of buying our first home. Next, it was time for us to shop for a new home. I was excited and anxious to shop for our first home. Unfortunately, I was unaware that the housing market in Houston, TX was flourishing and it was very competitive. On my quest for the perfect house, I looked at several beautiful homes. I found one in particular that I liked, and it was a foreclosure. I decided to place an offer on the home. However, only a few days later I was informed that I was outbid by another buyer. Since this was the first home I placed an offer on I did not foresee the outbidding being a major issue. We decided that we would continue our search for our â€Å"American Dream.† The next home I fell in love with was a model home; however, I soon learned that it was a short sale. A short sale can take up to six months to be approved, and I did not have time for that ,because, my existing lease had already expired on my rental home. I begin to work with a realtor who was also an investor. She had a lovely home for sale in a beautiful neighborhood. I extended an offer to her on the home, and she said that she would need to talk it over with her husband. She later contacted me to advise me that she had agreed to accept a cash offer on the home. I continued to look for the perfect home and was not having much success. I soon discovered that the realtor had a new house on the market in the same beautiful neighborhood. I contacted her right away and made an offer on the house. Once she accepted my offer we signed and faxed the contract to the bank right away. The realtor and I both agreed on a closing date which was 45 days from the date we signed the contract. At this point, it was time to make sure that we met all of underwriting guidelines. It was not only important for us to meet all of the bank stipulations but the actual house had to meet bank standards in order for the bank to approve the loan. Shortly, after faxing the contract over to the bank I was contacted by my loan processor, her name was Emily. She told me everything that I needed and I emailed Emily the requirements within 24 hours. The only thing that was pending to my knowledge was the appraisal on the house which I had completed within one week. After, I faxed over the appraisal I did not hear from Emily until three days before my 1st closing date. Emily was contacting me to make me aware that the underwriting department was requesting that a 2nd appraisal on the home be completed before we could close on the home. I was very disappointed that three weeks had passed and I heard nothing from her and now three days before closing she was contacting me to relay this information to me. However, I was not about to give up. I got the appraisal and sent it to the bank, only to have Emily contact me a few days later to tell me that the underwriter was now requiring a termite inspection. We were already well past our 1st closing date and quickly approaching our 2nd closing date, I contacted a termite inspector and had the termite inspection performed right away. Emily then informed me that she was sending all of our information over to the title company so they can arrange a closing date. She gave me the title company’s contact information and told me to contact the title company for my closing date. I contacted the title company and was very surprised to discover I could not close on the house until the seller returned from the Bahamas because she needed to sign a release form. The seller returned from the Bahamas two weeks later and I finally got a real closing date which was October 18, 2012. Finally, I said to my husband we have an actual closing date. I was beyond excited. My husband and I went to the title company on October 18, 2012 to finalize our purchase on our home. I can’t explain the feeling we felt as we signed the mortgage papers on our new home. After signing what felt like a million papers we got the keys to our new home. When we got in our car we had to take a moment to give thanks to God, for not only allowing us to purchase our first home but for letting our first home be our dream home. Why was the process so difficult and complicated to purchase my first home? I can imagine it was due to the housing crisis in America. I believe that banks require so much now because they are trying to prevent homebuyers from losing their homes to foreclosure. They are making every effort to make sure that homebuyers are not overpaying for homes and making every attempt to ensure that homebuyers can afford the homes. Although, I was very frustrated I want prospective homebuyers to know that it was worth all of the trouble. I think homeownership is the American dream and encourage everyone to work towards achieving the American dream by not giving up or becoming frustrated. I think it is very important for prospective homebuyers to focus on the final prize-homeownership. Reflections Paragraph The step I found to be the easiest was major revisions. It was easy because I was able to tie in my conclusion with my introductory paragraph. I am hoping that will grab the readers’ attention and keep them more interested in my essay. The step I found the hardest was proofreading. While I was proofreading I noticed that many sentences did not sound correct. I did my best to try and correct the sentences that did not sound correct. I learned that writing by revising your essay allows you the opportunity to make your essay even better. I still have many errors for improvement; however, I am confident that with practice I will become a great writer.