Saturday, December 28, 2019

Ronald Reag Rough Draft Essay - 1552 Words

Ronald Reagan Rough Draft Intro. INTRODUCTION Imagine, being the President of the United States of America, you are in charge of everything in the nation, being responsible for the well-being of your country. And imagine being on the verge of nuclear war with the Soviet Union and only having six minutes to decide whether or not civilization as we know it could continue. This is the type of stress Ronald Reagan was under almost every day of his eight year presidency. EARLY LIFE Ronald Wilson Reagan was born in Tampico Illinois on February 6, 1911 to John Jack and Nellie Wilson Reagan. During Reagan s early childhood his family lived in a series of towns and finally settled in Dixon, Illinois in 1920 where his father opened a shoe store. Reagan went to Dixon High school and graduated in 1928. He was an athlete, student body president, and performed in many school plays. During summer vacation he worked as a lifeguard. After high school, Reagan enrolled at Eureka College in Illinois on an athletic scholarship. At Eureka he majored in economics and sociology. Outside the classroom Reagan ran track, played football, and was captain of his swim team. He was elected as student council president and acted in school productions. He graduated in 1932 and then worked as a sports announcer for a radio station in Illinois. ADULT LIFE In 1937 Reagan got his break as an actor and signed a seven year contract with the movie studio Warner Brothers. Over the

Friday, December 20, 2019

Should Smoking Be Banned Public Smoking - 1263 Words

One Ban That Doesn’t Stink: Banning Public Smoking Do people know that cigarettes are responsible for more causalities each year than from HIV, illegitimate drug use, alcohol related incidents, and automobile calamities combined? It is one of the only permissible products that have been long-established to kill when used as intended. Tobacco usage is the main source of avoidable and premature death and disease worldwide according to the Centers for Disease Control and Prevention. Medical studies have shown that smoking not only indicate health issues for the smoker, but also for the people that are in a close proximity to it. Reports have shown that smoke free directives that forbid smoking in public places like taverns and restaurants help advance the general health of employees and the general population. All and any cigarette smoking in public places should be prohibited because of the harmful results of â€Å"passive smoking† on non-smokers and its effect on the sur roundings. People have the right to a healthy, fresh environment and work place. Earth is place that people thrive off and live on. Earth is simply described as one word, â€Å"home†. Destroying its atmosphere, littering its land and polluting its air are not a very nice way of showing appreciation. With the banning of public smoking, it would establish an improved uncontaminated world. The musty stench of cigarettes is awful and a majority of people hate it, even the smokers themselves. It lingers around, attachesShow MoreRelatedShould Smoking Be Banned Public Places?941 Words   |  4 Pagesindividuals get older they try to cope with the stresses of everyday life by continuing to smoking. It makes them feel more relaxed and at ease. Whatever the reason is, it is a hard habit to break once one starts. For many smokers today it is getting hard to find a place to smoke. Comedians joke about going to another planet just to light up. Smoking should be banned in public pla ces because smoking is just as bad for nonsmokers as it is for smokers. The effects of secondhand smoke orRead MoreSmoking in Public Buildings Should Be Banned1194 Words   |  5 PagesSmoking in Public Buildings Should be Banned Is it true that secondhand smoke can have almost the same health effects as smoking a cigarette? Is it true that some countries have banned smoking in public buildings already? Is it easy to guess how those bans turned out? The countries that banned smoking in public buildings are experiencing fewer health problems in their citizens and have had no negative economic effects due to the ban. Even though everyone should be able to do what they want, whereRead MoreShould Smoking Be Banned Public Places?864 Words   |  4 PagesSmoking is one of the practices which is considered highly dangerous to our health because it impacts the smoker and the people around them. There are approximately one billion smokers. Smoking is a big issue that the nonsmoker faces. For example, when the smokers smoke in public places like restaurants, universities and other public places it hurts the non-smoker. The non-smoker breathing the cigarette, marijuana or hookah smoke from the smoker do both of them a re breathing toxic chemicals. In aRead MoreSmoking in Public Places Should Be Banned Essay474 Words   |  2 PagesSmoking in Public Places Should Be Banned I feel very strongly that smoking in public places should be banned. I will list my reasons for my thinking below and explain why I think this. I cannot stand walking down a street behind someone who is smoking. Every time they exhale I then have to walk into a cloud of their smoke. My clothes smell, because they have been saturated with the smoke, it gets into my hair too. It also affects my health. It was found that sevenRead MoreEssay Smoking Should NOT Be Banned in Public Places730 Words   |  3 PagesSmoking Should Not Be Banned in Restaurants      Ã‚  Ã‚  Ã‚   In the perfect situation, smoking policy would be set by bar or restaurant owners, and customers would patronize the establishments with the policy they prefer. Customers would decide-without the governments help-if they want to avoid smoke-filled rooms or enter them. They might even choose to sit in an area sectioned off for smokers or non-smokers, but the ultimate issue is choice (Ruwart 1). When the government starts telling restaurantRead MoreNationwide Smoking Ban: Smoking Should be Banned in All Public Places899 Words   |  4 Pagesthe public about its dangers in 1972 (Schick Glantz, 2005). Do people knowingly have the right to put others’ health at risk? No, they do not. Exposure to cigarette smoke is a public health risk. Therefore, smoking should be banned in all public places, nationwide. There has been no attempt to impose a national smoking ban by the U.S. government. All current bans are in place because of state and local legislation. Americans for Nonsmokers’ Rights lists the various state and local smoking lawsRead MoreEssay on Smoking in Public Spaces Should be Banned2013 Words   |  9 Pagesthink. As you lean in to take that first bite, a puff of smoke surrounds you, your family, and your food. How pleasant is this? A big topic being brought to attention these days is whether or not smoking should be banned from all restaurants and other public areas. Smoking in public areas should be taken into close consideration. There are many reasons of why this is brought to attention. These include the harmful effects it can have on all people, smokers and non-smokers, as well as the environmentRead MoreShould Smoking Be Banned Public Places?950 Words   |  4 PagesOne day I walk in to public place with a friend right away we sat down to eat, we were ha ving a conversation later we smell cigarette smoke in the air. I start coughing from the smell of smoke. I also notice a lot of customers who like eating dinner at a public place smoking cigarette. Smoking is a big health problem I feel it is not fair to take away cigarette for people who smoke in American who desire smoke cigarette. Even thought the same as the concession is able to be taking place on thisRead MoreShould Smoking Be Banned Public Places?885 Words   |  4 PagesOne day I walk into public place with a friend right away we sat down to eat, we were having a conversation later we smell cigarette smoke in the air. I start coughing from the smell of smoke. I also notice a lot of customers who like eating dinner at a public place smoking cigarette. Smoking is a big health problem I feel it is not fair to take away cigarette for people who smoke in American who desire smoke cigarette. Even thought the same as the concession is able to be taking place on thisRead MoreEs say on Smoking In Public Places Should Be Banned463 Words   |  2 PagesSmoking In Public Places Should Be Banned There should be rules enforced for smoking in public places. Smokers just do not know the negative influence they are spreading. A puff of cigarette can harm a smokers health. When I go to a restaurant I do not like to leave smelling like smoke. It is the same going to a garbage dump, and smelling like garbage. I am not a smoker, and I cannot stand having the stench of smoke on my clothes. The smell of smoke is not harmful, but secondhand smoke is

Thursday, December 12, 2019

Reduction in Share Capital

Question: Analysis and Summary of Presentation Reduction in Share Capital. Answer: Introduction Capital reduction, or the reduction of share capital of a company, is the process through which, the shareholder equity of a company is decreased through the use of prescribed methods (Dagwell, Wines and Lambert, 2015). Capital reduction helps in increasing the shareholder value and at the same time, it helps in producing a more efficient capital structure (Nanda, 2015). In the following parts, a summary on the various aspects of capital reduction have been highlighted. Moreover, the issues relating to the capital reduction have also been stated. Capital Reduction In Trevor v Whitworth (1887) 12 App Cas 409, it was held that the company should never reduce its capital (Cassidy, 2006). However, since then, certain exceptions have been developed for this rule. The Corporations Act, 2001 restricts the ability of any company to reduce its share capital or the funds of the shareholders, before such a company is wound up. However, the Act provides, for some circumstances or particular situations the provisions for early reduction of share capital, or for the cancellation of shares (Company Secretarial Services Pty Ltd, 2017a). The act also mandates the reasons for which the capital reduction can be undertaken, and these are: Ensuring fairness between shareholders, Minimizing the risk of leading the company into insolvency, For the disclosure of material information by the company (Company Secretarial Services Pty Ltd, 2017b). The capital reduction has its share of benefits and restrictions. The former include increase value of shareholder; creation of distributable reserves, as a result realized profits; reduction in accumulated profits, thus increasing the distributable reserves; return of surplus share capital; facilitating a redemption or buy-back of shares; and distribution of assets to shareholders (Spetch, 2014). The restrictions relate to the adherence of provisions of the Corporations Act, 2001 and for the prescribed purposes. One of the modes for capital reduction is share cancellation. So, in order to reduce the share capital, the shares have to be cancelled. Though, unlike buy back, under capital reduction, the bought shares have to be compulsorily cancelled. Capital reduction can be either of the two: Equal reduction: which has to be applied in same proportion of shares, as well as, for the same terms, for each of the shareholders In any other case, it can be a selective reduction (Company Secretarial Services Pty Ltd, 2017a). For the capital reduction, the provisions of Corporations Act have to be strictly adhered to, or else legal issues may arise for which penalties may be applied, in addition of sentencing, as a result of the breach of legal provisions. The capital reduction of shares is allowed only when it is reasonable and fair for the shareholders as whole, it is not prejudicial to the ability of the company to repay its creditors, and the same has been approved under section 256C of the Corporations Act, 2001 by shareholders (Australian Government, 2013). The breach of this section attract penalty of 100 penalty units, in addition to imprison of two years (Australasian Legal Information Institute, 2017). It can also be achieved through section 245J to 254K pertaining to the redemption of redeemable preference shares; or section 257A pertaining to the share buy-backs; or section 258A-258F relating to other prescribed share capital reduction- for instance cancellation of forfeited shares (ASIC, 2014). For 258A and 258C, the penalty is of 400 penalty units or else an imprisonment for 4 years; for 257A and 258B, it is 100 penalty units or else an imprisonment for 2 years (Australasian Legal Information Institute, 2017). A company can be reduce its capital and give the financial assistance only when the procedure of law is complied strictly. The reduction of share capital also needs the approval of the members and also has to be disclosed fully. In case the capital reduction leaves the company insolvent, the corporation act makes the directors personally liable for it. In Fowlers Vacola Manufacturing Company Ltd [1966] VR 97, it was held that if the company decides to return the capital, it has to be done in a fair and equitable manner only (Cassidy, 2006). Conclusion To sum up the entire discussion, capital reduction is a manner of reducing the share capital of the company. Through capital reduction, the shareholder value can be increased and an efficient capital structure can be presented. The modes of capital reduction include cancellation, buy-back, and redemption of shares. However, buy-back may not necessarily result in the reduction of capital, if the bought back shares are not cancelled. Capital reduction could be either equal or selective. Further, while reducing the capital of the company, the applicable provisions of the Corporations Act have to be strictly followed. A non-compliance of these provisions may lead to penalty, as well as, sentencing, on the basis of the breach of particular section. Capital reduction also helps in increasing the realized profits of the company. Though, the purpose of capital reduction is restricted through the Corporations Act. References ASIC. (2014) Reduction in share capital. [Online] ASIC. Available from: https://asic.gov.au/for-business/running-a-company/shares/reduction-in-share-capital/ [Accessed on: 31/03/2017] Australian Government. (2013) Corporations Act 2001. [Online] Australian Government. Available from: https://www.legislation.gov.au/Details/C2013C00605 [Accessed on: 31/03/2017] Australasian Legal Information Institute. (2017) Corporations Act 2001 - Schedule 3. [Online] Australasian Legal Information Institute. Available from: https://www.austlii.edu.au/au/legis/cth/consol_act/ca2001172/sch3.html [Accessed on: 31/03/17] Cassidy, J. (2006) Concise Corporations Law. 5th ed. NSW: The Federation Press. Company Secretarial Services Pty Ltd. (2017a) Cancellation of Shares. [Online] Company Secretarial Services Pty Ltd. Available from: https://www.companysecretary.com.au/board_briefings/CancelShares.pdf [Accessed on: 31/03/2017] Company Secretarial Services Pty Ltd. (2017b) Return of Capital. [Online] Company Secretarial Services Pty Ltd. Available from: https://www.companysecretary.com.au/board_briefings/CancelShares.pdf [Accessed on: 31/03/2017] Dagwell, R., Wines, G., and Lambert, C. (2015) Corporate Accounting in Australia. NSW: Pearson Australia. Nanda, D.S. (2015) Reduction in share capital: Analysis. [Online] Corporate Law Reporter. Available from: https://corporatelawreporter.com/2015/02/23/reduction-share-capital-analysis/ [Accessed on: 31/03/2017] Spetch, A. (2014) Reductions of capital: What are they and what can they be used for?. [Online] DWF. Available from: https://www.dwf.law/news-events/legal-updates/2014/11/reductions-of-capital-what-are-they-and-what-can-they-be-used-for/ [Accessed on: 31/03/2017]

Wednesday, December 4, 2019

Finance Capstone Consequences and Solutions

Question: Discuss about the Finance Capstone for Consequences and Solutions. Answer: The current debt level of Netflix is adequate, as debt to equity ratio of 48.45%, which allows the company to operate in turmoil times. The solvency ratio of the company is at high levels, which increase chances of the company to become insolvent if more debt is acquired. Thus, the additional debt through bond might hamper the overall profitability of the company, while it might oscillate future net income. Fargher, Sidhu, Tarca Van (2016) mentioned that companies only opt for debt when capital could not be raised through an IPO. However, Netflix overall rating in has been slashed by Moodys from BB to B and SP cut ratings from BBB to BB, which depict that company is related among junk or non investment category. This is the reason the company is no able to initiate a public offering and is determined to raise debt for its expansion process. Particulars 2012 2013 2014 1.5 Billion Debt 1 Billion Debt Net Income 17,152 112,403 266,799 Short term liabilities 1,675,926 2,154,203 2,663,154 Long term liabilities 3,223,217 4,079,002 5,198,943 1,500,000 1,000,000 Depreciation 204,356 223,591 264,816 Equity 744,673 1,333,561 1,857,708 long term debt 200,000 500,000 900,000 1,500,000 1,000,000 Solvency ratio 4.52% 5.39% 6.76% 5.68% 6.00% Debt to equity 26.86% 37.49% 48.45% 129% 102% Table 1: Depicting the solvency and debt to equity ratio of Netflix (Source: As created by the author) The overall table mainly depicts both solvency ratio and debt to equity ratio of Netflix from 2012 to 2014 and after the debt initiation. From the overlap evaluation it could be detected that accumulation of debt could be catastrophic for Netflix, as its debt to equity ratio could reach an alarming rate of 129% or 102%. However, if the proposal of Jessica is accepted then the company will mainly be financing its activities with higher debt, which could increase volatility in income due to fluctuations in interest payments. The company has been taking more debt each year from 2012, while the decision in 2014 to acquire an additional debt could be disastrous. Fatica, Hemmelgarn Nicodeme (2013) mentioned that high debt accumulation mainly allows the company to take tax advantage, which retains more income in the business. On the other hand, Heikal, Khaddafi Ummah (2014) criticises that higher interest payments might increase cash outflow, which could reduce ability of the company to a ttain higher profits. After evaluation of overall Netflix capability the recapitalisation proposal could be dropped, as the company is in no state to adhere the rising debt. The interest expenses of the company are also raising two fold each fiscal year. This is mainly an indication of higher fluctuation in net profits, if sales remain stagnant (Schippers, 2015). The non-issuance of debt and using the current available cash for supporting its expansion plan could mainly help the company in reducing its financing costs. In addition, non-accumulation of debt could reduce the debt to equity ratio, while maintaining trust of the investors in companys performance and return generation capacity. Thu, it could be advisable that bond issue is not appropriate for Netflix in current business scenario. Reference: Fargher, N., Sidhu, B., Tarca, A., Van Zyl, W. (2016). Accounting for financial instruments with characteristics of debt and equity: Finding a way forward. Fatica, S., Hemmelgarn, T., Nicodeme, G. (2013). The debt-equity tax bias: consequences and solutions.Reflets et perspectives de la vie conomique,52(1), 5-18. Heikal, M., Khaddafi, M., Ummah, A. (2014). Influence analysis of return on assets (ROA), return on equity (ROE), net profit margin (NPM), debt To equity ratio (DER), and current ratio (CR), against corporate profit growth in automotive In Indonesia stock exchange.International Journal of Academic Research in Business and Social Sciences,4(12), 101. Schippers, M. T. (2015). The Debt Versus Equity Debacle: A Proposal for Federal Tax Treatment of Corporate Cash Advances.U. Kan. L. Rev.,64, 527.

Thursday, November 28, 2019

Computer Networks

Introduction Computer security is a popular term used in modern information age. The term is used persistently to address issues about safety of information systems and networks. As the use of computer networks gains much recognition in the society; there is an urgent need to address the security issues of information stored on such systems.Advertising We will write a custom report sample on Computer Networks specifically for you for only $16.05 $11/page Learn More Computers without any security policies or measures can make a network susceptible to threats, attacks or may even disable network activities within minutes. Similarly, it may take much effort and time to recover a compromised resource. Internet has provided more opportunities for individuals, organizations and governments. However, its simplicity of access has made it insecure for privacy, retrieval and distribution of information. Several protocols used to guarantee security on the internet have proved ineffective; hence tools to eavesdrop or â€Å"sniff† passwords on the network are often exploited by malicious hackers. Applications which broadcast unencrypted passwords across the network are equally vulnerable. Clients and server applications depend on client and server software’s to be â€Å"truthful† on issues of user identity using their applications. Other applications depend largely on the client to limit its operations to those connected with what it is obliged to do, with limited or otherwise no enforcement by the server. To address the above mentioned issues, Kerberos was viewed as a solution. Kerberos is a unique network security mechanism which uses cryptography. Cryptography mechanism allows a client to verify its identity to the server and vice versa over the unprotected network connection. Kerberos Kerberos is a modern security mechanism which is used to safeguard communications occurring over insecure network. It achieves this throu gh proving the authenticity of nodes communicating to one another. In other words, it is a computer network authentication protocol that works using the basic of â€Å"tickets† to use computers communicating over unprotected networks to verify their uniqueness to one another in a protected mode. Kaufman et al (1995) offers another definition of Kerberos. He asserts that Kerberos may designate a set of free software that was published by the Massachusetts Institute of Technology that implemented the Kerberos protocol. The primary objective of designing Kerberos was safeguarding client-server by providing a mutual authentication facility. That is, both the server and the node identify each other’s while communicating.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Kerberos messages are secure against replay attacks and eavesdropping. The technology is based on symmetric key crypt ography and demands a trusted third-party. Correspondingly, this security mechanism may employ a public key cryptography by using asymmetric key cryptography during the process of authentication (Kaufman et al, 1995). Kerberos uses the symmetric Needham-Schroeder protocol. It also utilizes the trusted party known as the Key Distribution Center (KDC). The KDC contains two logically distinct parts, the Ticket Granting Server (TGS), and the Authentication Server (AS). The KDC keeps a database of private keys and element on the network regardless of whether it is a node or a server. The node and the server share the private or secret key known to the KDC and to the nodes and servers. The authenticities of this key act as proof of an element’s identity. According to Neuman and Ts’o (1994), for communications reasons, the KDC releases a session key which the parties communicating employ to encrypt the contents they are broadcasting. The security of the Kerberos protocol depe nds entirely on temporal assertions of validity referred to as Kerberos Tickets (Neuman and Ts’o, 1994). Elements of Kerberos Protocol Tools Kerberos uses different types of elements of network security to accomplish or manage authentication between the services and users. These elements are important. Without them, the objective of safeguarding network resources would be fruitless. Some of the most important elements are described below. Client and Servers Tickets Client and servers are the primary elements of Kerberos. According to Neuman et al (2005), the client designates a system or a person that wants to access the network or web enabled services. The server on the other hand uses the Kerberos authentication service to ascertain clients have valid access to the program or an application they wish. Tickets are useful in the Kerberos authentication service (Neuman and Ts’o, 1994). They contain information that is essential for identifying the client to the server. Kerberos encrypt the information contained in the ticket to ensure the illegal access is not allowed. Port A characteristic that Kerberos tools have in all Kerberos system administration is the port. Kerberos have by default port 88.This suggests that when communication tools are developed; the passwords, log on IDs and user IDs have to communicate through this port.Advertising We will write a custom report sample on Computer Networks specifically for you for only $16.05 $11/page Learn More If accurate combination of passwords and user IDs is verified by the authentication server, then access or log- in is granted through this port. Network administration can therefore give access to files, database, programs and emails, among other services when they link the encryption keys with this port. Encryption Encryption is a typical element of all Kerberos enabled tools. Encryption illustrates anything inputted by a keyboard or read on a file and translated in to a coded format. The encrypted message makes it unreadable, unrecognized or unutilized by any program or person that is not permitted to do so. A more significant feature of encryption is that no password is stored in an encrypted format. Each encryption algorithm uses a precise key length that can alter an imputed unencrypted password that is entered in an encrypted one to grant strengthened protection. Active Directory Trusts and Domains They are Kerberos tools available for windows server. It is a graphical interface feature that Microsoft Corporation has made it available for network administrators. It assists network administrators in viewing all trusted and domain relationships so they can enforce protection levels within these domains. The tools can be employed for all trusted and related activities such as varying and viewing trusts. Active Directory Computers and Users They are Microsoft management console tools which contain the administration tool pack. The administrati on tool pack uses the Kerberos protocol. The characteristic of Active Directory Computers and Users is that they include the ability of controlling, configuring and publishing information from the Active Directory. All administrative roles in domain controllers that need authentication are encrypted. How Kerberos Authentication Works Kerberos succeeds its security operations in various ways. Each activity follows one another in succession. The process of authenticating begins when a client computer makes a formal request to access or use the server. The client requests the authentication service to generate a ticket containing client credentials and sends the information to the server together with session information (Kaufman et al, 1995). The client and Kerberos use the client information such as the password to validate the information. The Kerberos then broadcasts an encrypted ticket to the server with a password known to the server and Kerberos. Strebe (2002) notes the server v alidates the information to verify the source and the identity of the user.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More It can also use the timestamp of the ticket to establish the validity of the request. The lifetime of a ticket lasts a few minutes; this is to ensure the process occurs in the shortest time possible for security purposes (Bellovin and Merrit, 1990). In understanding how Kerberos achieves these roles, the writer will list and describes each packet that is involved between client and application server and clients and the KDC during the process of authentication. Stage 1 Authentication Server Request, AS_REQ According to Neuman et al (2005) this phase is known as the initial authentication request. The client requests the KDC for a Ticket Granting Ticket. The request, in the form of a message is unencrypted. Stage 2 Authentication Server Reply, AS_REP When a preceding request arrives, the AS checks whether the reply contains TGT, which is encrypted with the TGS private key, and the session key encrypted with the secret key from the requesting user (Neuman et al, 2005). If one of the t wo keys fail to exist, an error message is posted to the client, otherwise, the AS process the reply. The processing is carried out using the following format. It randomly fixes a session key which acts as a secret key and shares it with the client and the TGS It also establishes the TGT inserting the requesting user’s principal, which is the service principal. Lastly, it creates and dispatches the reply that contains the ticket produced earlier and encrypted using the secret key for the service. The timestamp, lifetime, service principal and session keys are encrypted using the secret key labeled for the user invoking the service. Stage 3 Ticket Granting Server Reply, TGS_REP At this stage, the user who is authentic, and wants to access the service in context but does not have a valid ticket, sends a request as the Ticket Granting Server replies to the Ticket Granting Service (Neuman et al, 2005). The Ticket Granting Service model is as explained below; It fixes an authen ticator with the client machine, user principal, and timestamp and encrypts with the session key common with the TGS. It also establishes a request packet that contains; the Ticket Granting Ticket, which is already encrypted with the key of the Ticket Granting Service; the service principal which the ticket is needed and lifetime unencrypted; and the authenticator. When the previous requests arrive, the TGS’ initial step is to verify the principal of the requested service is present in the KDC database. If present, it opens the TGT by using the key and extracts the session key. It uses the key to decrypt the authenticator. To achieve service ticket, the following criterion has to be met. The TGT should not have expired. The principal contained in the authenticator should match the one available in the TGT. The authenticator should be available in the replay cache and should not have been expired. Stage 4 Application Request, AP_REQ When the client has credentials to access the service, that is the session key and the ticket, it can request the application server for a right of entry to network resources through the Application Request message. It should be noted that unlike other messages where the KDC is involved, the Application Request is not standard. It varies based on the application in context. Stage 5 Pre-Authentication As represented in Authentication Server Reply, before distributing a ticket, the KDC verifies the principal of the asking service provider and others are available in the database (Strebe, 2002). If the request is from an illegal user, TGT cannot be invoked because of the password, thus it is difficult to release a session key for creating a legitimate authenticator. Kerberos Operation (Author, 2011) Protecting Application Data As explained earlier, Kerberos provides the services of authentication only; an assurance the authenticated element is a dynamic partaker in an exchange. According to Jablon (1996) a derivative of Kerb eros authentication protocol is the swap of the session key between the client and the server (Tanenbaum, 2003). The session key may consequently be used by a program or an application to provide privacy and integrity of communication. The Kerberos describes two types of messages, private and safe messages to summarize data that need to be protected (Strebe, 2002). However, the application is at liberty to use a suitable method to a particular data being relayed. Success of Kerberos Kerberos has achieved notable success in network security issues. This is in contrast with other similar security tools providing security services. Password protection Kerberos does not allow a user’s password to be sent across the network either under encryption or in plain text. Rather, the protocol depends on keys that are transmitted through encryption. Hence the keys cannot be intercepted (Jablon, 1996). For example, when the security of the network is tampered, Kerberos makes it likely for trespassers to construe the content of network transmissions. Similarly, target services and user authentications remain safe. Client/Server Authentication Kerberos allows the client and server to authenticate to each other. Communication can break or fail if they are not able to authenticate. Client/Server Ticket Certification Kerberos timestamps the tickets that pass from the server to client and from client to server, it also encompasses lifetime information besides common authentication. Hence the period of authentication is restricted (Bellovin and Merrit, 1990). The time spent by the user during implementation may be altered by design but the limit is less to ensure that replay attacks are not contained. By limiting time, the strategy makes communication secure. Reusability and Durability Kerberos protocol authentication is reusable and durable. When a user authenticates using the Kerberos protocol, the authentication can be reused during the lifetime of the ticket. This is to imply that it is feasible to remain valid through the protocol without re-entering a username and password over the network. Session Key Generation The Kerberos protocol uses a dual key encryption method. The product of the service session key provides a unique link between the client and the service that is safe. This unique â€Å"secret† link is used as the encryption key during client/server communication (Bellovin and Merrit, 1990). This adds security to Kerberos communication. Internet Standard The Kerberos protocol depends on the open internet platform. It is not restricted to authentication mechanisms or proprietary codes. This enables developers to depend on open and free reference implementation of a public method. Similarly, inexpensive commercial implementations can be developed separately or bought. Ubiquity Kerberos is widely embraced and trusted by security experts, developers and cryptologists. Hence, new breaches are likely to be noted and resolved instantane ously. This is in contrast with proprietary systems. Kerberos has substantial investments hence its security mechanism is difficult to overcome. Besides, the strength of Kerberos is anchored on numbers. Failures of Kerberos Protocol Though Kerberos cancels or guards against severe and common security threats, it may be challenging to implement. This is because of various reasons: Knowledge in Implementation According to Bellovin and Merrit (1990) Kerberos protocol was developed to be used for a single user client system. In cases where a client acts as a multi user system, the Kerberos authentication mechanism may be compromised to various replay attacks and ticket stealing. The general protection of a multi user client system such as memory protection, file system protection among others maybe a restricting reason of Kerberos authentication (Bellovin and Merrit, 1990). No knowledge or cleverness in implementing a Kerberos authentication can substitute system administration practice s Kerberos server and client systems. Support of Proprietary Software Kerberos utilizes mutual authentication model. It is important for client and servers to be deliberated with Kerberos authentication. Some proprietary applications also support Kerberos. Besides, various legacy systems were deliberated and maintained programs. However, they were not designed with third party authentication tools in mind (Kohl et al, 1994). This means that they need to be rewritten to embrace Kerberos authentication. Server Attacks The Kerberos authentication method is susceptible to severe attacks against ticket granting service and the initial ticketing service, KDC. The whole authentication mechanism depends on the â€Å"faithfulness† of the KDC (Kohl et al, 1994). Hence any person who can compromise authenticating users can compromise the authentication of users of the system depending on the KDC. Thus, this needs efficient system administration practices while managing the Kerberos KDC. All Nothing Strategy Kerberos can be an all nothing strategy when utilized in a network. An encrypted password communicated over the network to a non-Kerberos enabled aware the service is in danger. Hence, the networks accrue no benefit from using Kerberos. To make a network secure with Kerberos, a person must use Kerberos enabled version on all clients and server applications that communicates the passwords unencrypted. Conclusion The Kerberos protocol provides the needed security to protect communications occurring over a network. Without its strength, computer networks would be at risk against threats and attacks. Precisely, without the facts of the identity of an element or individual identity requesting an operation, it is challenging to make a decision whether an operation should be denied or granted. Kerberos achieves network security by using shared key cryptography. This makes both the client and server access the same password or key to positively recognize the user. Perh aps, this strength of the Kerberos helps to manage passwords for many users by granting services that assist in coordinating passwords between the services and the users they desire to use. The conventional authentication strategies are not a guarantee for use on networks where attackers can easily check network traffic and seize passwords. Kerberos uses strong authentication approach that does not divulge passwords, hence supporting network security. References Bellovin, S., M., Merritt, M., 1990, Limitations of the Kerberos Authentication system. Computer Communication Review 20(5), pp. 119-132. Jablon, D., 1996, Strong Password-only Authenticated Key Exchange. Computer Communication Review 26(5), pp. 5-26. Kaufman, C., Perlman, R., Speciner, M., 1995, Network Security: Private Communication in a Public World, Prentice-Hall, New Jersey. Kohl, J., T., Neuman, B., C., Ts’o, T., 1994, â€Å"The Evolution of the Kerberos Authentication System†. Distributed Open System s. IEEE Computer Society Press. Washington. Neuman, B., C., Ts’o, T., 1994. â€Å"Kerberos: An Authentication Service for Computer Networks†. IEEE Communications, 32(9), pp. 33–81. Neuman, B., C., Yu, T., Hartman, S., Raeburn, K., 2005, The Kerberos Network Authentication Service (V5). Available at;  https://www.ietf.org/ Strebe, M., 2002, Network Security Jump-Start: Computer and Network Security Basics. John Wiley and Sons, New Jersey. Tanenbaum, A., S., 2003, Computer Networks, Prentice Hall PTR, New Jersey. This report on Computer Networks was written and submitted by user Ult1mates to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Sunday, November 24, 2019

Hannibal essays

Hannibal essays Hannibal is a continuation of the movie Silence of the Lambs. Dr. Hannibal Lector was placed in an asylum after killing many people. An FBI agent, Clarice Spalding was over Dr. Lectors case. She spent many nights speaking with Hannibal, listening to his thoughts without criticism. After ten years dealing with Hannibal Lecter face-to-face, Clarice is a much colder and less emotional toward life. Many of the workers were rude to Hannibal and other patients of the asylum. Hannibal acted out as a cannibal, by eating of the faces of the rude workers. Hannibal escaped from the asylum and no one had any idea where he could be hiding. Hannibal begins effectively with Clarice on a drug raid with the help of several other agents. She kills a drug czar, Elvelda, by firing a bullet at her chest. Evelda held a Mac 10 in her hand as well as her baby strapped around her chest. After firing the first shots, she left Clarice with the choice of killing a mother holding her child or to lose her own life. The incident puts Clarice in a difficult position with the FBI, as she has to turn over her gun and badge. There is an agent named Paul Krendler that has it in for Clarice, and desires her sexually. As always, Clarice's interests in life exclude anything sexual. Since she has turned him down several times he begins to act snooty towards her. In one funny scene, shows Krendler looking at photos of Lecter unaware Clarice is watching him. She alerts him and he asks, "What are you doing in the dark?" Her response: "Thinking of cannibalism." After the FBI released new information given by Mason Verger, Clarice reopened the case. Verger was forced to slice off his own face and feed it to his dogs thanks to Hannibal. Hes now a faceless cipher with no eyelids and a horrifying expression. Verger is a billionaire that wants Hannibal fed to his killer boars, and provides a handsome reward to anyone who knows of Hanni ...

Thursday, November 21, 2019

Action Planning Assignment Example | Topics and Well Written Essays - 500 words

Action Planning - Assignment Example However, there is a specific mechanism of approaching each action to reach the desired goals. The inclusion of actions will interfere with customer service, retention and acquisition. However, it is advisable for human resource managers to establish a social network with more colleges to discuss on similar ideas and generate remedies that do not drag the success of an entity. The process of action planning is very sensitive in the operation of an organisation where the human resource shall compare and contrast the effect of taking certain action as discussed in the goals realised in the study which are going to enhance our business growth below (Kumar 2011, p. 20). The process of enhancing, an action in an organisation to influence any goal of the entity the human resource will cater for several questions, for instance, what is the cost of expenditure. Do we have the right person to recruit? In addition, is it the right time to initiate the action? In the case of improving the staff body, it involves regulating g of the personnel working within a certain period in an entity that is mostly done through head count to ensure that the correct role is being done for the right cost. Critically, the human resource should come up with procedures of prospecting managers who fit the activities run by an entity and high quality interviews for the staff to get the right people. However, in the performance of these activities the human resource will be in a position to reach these goals. However, these actions cannot be enhanced and made by an individual, but it will need a mentor to provide advice to the HR office (Caruth, Caruth, and Pane 2009, p.30). The goal deserves attention in increasing the customers tally and calls for a distinct customer service that stands as the differentiating factor with other organisations trading on the same commodity.

Wednesday, November 20, 2019

Technical Instruction Assignment Example | Topics and Well Written Essays - 500 words

Technical Instruction - Assignment Example This essay revolves around task analysis for a 4th generation iPod Touch from Apple Inc. Hierarchical analysis entails decomposing a complex task into subtasks that are easy to understand. In case of operating an iPod, Hierarchical analysis provides detailed description of all steps starting from switching the device on to playing a tune and adjusting audio volume. On the contrary, cognitive analysis provides informative knowledge on optimizing functionality of a product. At this juncture, iPod task analysis can be broken down into subtasks as in the layout below. After acquiring a new iPod, charging is necessary to ensure battery durability. A green light code on the top right corner indicates the device’s battery status. Presence of 3 or more green light codes signifies a strong battery status while less than 2 codes indicates a low battery. Charge an iPod Touch through the following steps; Configuration of a device is necessary in order to enhance its security and enhance its functionality. Failure to configure an iPod Touch from Apple will restrict the device’s ability to accept and install certain applications from iTunes Store. Configuration of a new device is achieved through the following steps; Modification of contents falls into two broad categories; adding applications and removing applications. Apart from these two tasks, users can engage in other minor modifications like customizing background theme, hiding applications and customizing the lock screen

Monday, November 18, 2019

Marketing Management Assignment Example | Topics and Well Written Essays - 4000 words

Marketing Management - Assignment Example Cadbury has been operating in India for over 60 years now. It started its operation by importing chocolates in 1948. Presently, the company boasts of a market share of above 70% which is the highest share of the brand across the globe. Cadbury’s billion Dollar brand ‘Dairy Milk’ is referred in India as the â€Å"gold standard† in terms of chocolates. Cadbury was also a pioneer in India for developing cocoa cultivation, since 1965. They have given a quality life to thousands of farmers through their continuous efforts to increase the production of cocoa. No wonder that a Cocoa tree in India is popular in the name of Cadbury tree (Cadbury, n.d.). It can be said that Cadbury is the synonym for chocolates in India and also the brand loyalty of Cadbury in India is quite high. Thus, based on these important criteria’s, India has been preferred for the launch of a new brand of Cadbury (Doddamani, 2011). Situation Analysis PESTLE Analysis Political Change in regulations and laws regarding international food labelling and trade are bound to affect Cadbury. Cadbury should be aware of the Food Safety Act and should take care in not violating it. Cadbury should also be cautious and ensure that none of its manufacturing plants are breaking laws related to production such as employing minors or paying less wage compared to the stated amount in the Wages Act (Mullerschon, n.d.). Economical The economy in India is a bit stable at this point, thus, launching a new chocolate bar would be supported (Mullerschon, n.d.). The stable economic condition has increased the per capita income which signifies that the disposable income of the populace of the country is higher at present. High rate in consumer spending and decrease in interest rates would help to encourage launching of a new brand (Mullerschon, n.d.). Increase in the population of middle income group would signify increasing demands. The cost of production in India would be low compared to other countries, thus, this would make market penetration easy for Cadbury. The market of chocolate in India is growing and there is immense scope to be exploited. The chocolate industry of India is a unique mix of attitudes, high consumption patterns, income levels, beliefs and spending. The country has high sales and many segments that are still uncovered (Doddamani, 2011). Social People nowadays have become quite health conscious and are trying to cut down on soft drinks, confectionaries and sweat meat because of high cholesterol and calorie. However, Cadbury has an edge over this as their products are becoming substitutes of sweet meat and confectionaries. Cadbury enjoys strong customer loyalty and their opinion is high regarding this company, thus, there is not any reason for the consumers to stop buying their products. The gift culture in India is growing, which will also enable to keep a sustained demand of Cadbury’s products (Mullerschon, n.d.). Technological Producti on is increasing because of machines with high technology and this enables the factories to produce in

Friday, November 15, 2019

Effect of Low Income School on Parent Involvement Article

Effect of Low Income School on Parent Involvement Article (Smith 2006, p. 43) in her article has tried to measure the impact of strategies undertaken to involve parent in child education at a low income school using qualitative research methods. Aims of Article The main aims of this article are to: Define how a low-income school defines intentional parental involvement strategies Define effects of those strategies The Methodology The above article is done as a qualitative research. Qualitative research is done to gain a deep understanding of a specific event, rather than a description of a large sample of a population. It is also called ethnomethodology or field research. It helps create information about human groups in social settings. Qualitative research aims to provide a better understanding of a phenomenon through experience, correct reporting, and quotations of actual conversations. It aims to provide an understanding about how participants tend to interpret their surroundings, and how their interpretations influence their behaviors. The main methodology for conducting this research was conducting a study at a low income school whose new structure was replacing an outdated structure in 2002. During the planning stage of the school community members, parents and agency professionals were involved in development of the new school structure to cater for the needs of low income families and of programs to involve parents in students education at the school. The efforts were then measured using qualitative data collection methods such as participant observation, interviews and document reviews. Participant observation is a period of intensive social interaction between the researcher and the subjects, in the latter's environment. It becomes the full-time occupation of the researcher. Participant observers are trained in techniques of observation, which distinguishes them from regular participants. Interviewing is one of the most commonly used methods for gathering data in qualitative research. Qualitative interviewing is usually different from quantitative interviewing in a number of ways. Interviewing tends to be much less structured in qualitative research. In quantitative research, interviews are usually kept much more structured in order to provide a valid measurement of key concepts that can answer some specific research questions. In qualitative interviewing, deviating is encouraged to give insight into what the interviewee sees as important. This is however discouraged in quantitative research. In qualitative interviewing, interviewers can significantly change the schedule and guide of the interview. In qualitative interviewing, The questions of interview get detailed answers; in quantitative research the interview generates answers that can be processed and statistically analyzed quickly. Researchers supplement qualitative research methods such as interviewing and observation with gathering and analyzing documents produced specifically for the research at hand . As such, the review of documents is an unobtrusive method, rich in portraying the values and beliefs of participants in the setting. Sampling was done using snowball sampling technique. A snowball sample is anon-probability sampling techniquethat is appropriate to use in research when the members of a population are difficult to locate. A snowball sample is a sample in which the researcher collects data from the few members of the target population they can find, then they ask those members from whom the data is collected to provide information on the location of other members of that population whom they know. Snowball sampling hardly leads to a representative sample, but sometimes it may be the best option available. For instance, if you are studying people smoking cannabis, you are not likely to find a list of all the people smoking cannabis in your city. However, if you identify one or two people smoking cannabis that are willing to participate in your study, it is likely that they know other cannabis smoking people in their area. However snowball sampling can be avoided if data about something is readily available. Source: http://www.northumbria.ac.uk/static/images/schoolimages/ar_images/cetl/gilldavisondiagram1.jpg The Setting The setting for this research was Clark Elementary School which was situated beside a city park in a small community surrounded by large industrial complexes. Most of the residents in neighborhood were low income. During the 2003-2004 school year, 5% of the students were American Indian, 3% of the students were Asian, 7% were Black, 19% were Hispanic, and 67% were White. According to the Clark Elementary School website, as of October 1, 2003, the languages spoken were 79% English, 11% Spanish, 6% Russian, 3% Ukrainian, 1% Vietnamese, and 2% other. In 1998 the district began to build a new school in order to replace the old one. A advisory group was formed consisting of members from community organizations, government agencies, the local church, the neighborhood association, the Clark Parent Teacher Organization (PTO), educators from Elementary School, and school district personnel to provide input for development of new school. The school was finally completed in 2002. Data Collection This research was qualitative in nature. Data was collected from the participants in three ways: Observation Interviews Document Reviews Observation:The author acted like a participant observer for before and after school programs, Read and play programs and awards assembly to which all families had been invited. Interviews: Semi-structured, open-ended interviews were conducted with educators, family workers, and parents from Clark Elementary School. 4 administrators were interviewed including the principal, the district consultant, The family Liaison coordinator and the Family Services coordinator. 6 teachers were interviewed, 6 parents were interviewed. For interviews snowball sampling was used. Source:http://www.featurepics.com/FI/Thumb300/20090704/Interview-1236952.jpg Document Reviews: Documents reviewed pertained mostly to the development process for the new school. All materials collected during the design process were examined and all references to the school in the local paper were reviewed. In addition, the school website and monthly newsletters were reviewed. source:http://blogs.adobe.com/acrolaw/files/2011/01/00_quick_review_illustration.png Findings A Foundation of Understanding: Since the school architecture and its programs were developed keeping the opinions of the communities, parents and members of community associations. After the school opened teachers and staff were made to understand the life circumstances of school families. This helped teachers understand parents more and reduced the probability of teachers blaming parents when their children faced academic difficulties and instead has increased the desire for teachers to assist the children. A Broad Definition: A definition of parental involvement emerged at the school which recognized a wide array of behaviors of involvement such as receipt of social services or picking up food or clothing at Family Resource centre. These behaviors also included the learning activities families engaged in while at home. Creating Intentional Parental Involvement Strategies: The intentional parental involvement strategies were designed in two distinct ways: Strategies to Provide Services: During initial meetings after considering the needs of neighborhood families it was decided to make the school in a community center style so as to provide services for low income families. The family resource center in the school helped connect parents with the various activities in school and also provide them with many facilities including computers, free food and clothing provided by government agencies. Strategies to Enhance Parental Involvement: The Clark Committee had designed parental involvement plans based on broad definition of parent involvement and on foundation of understanding. These strategies included inviting parents to school conferences, family nights and access resources offered by Family Resource Centers. All these services were found to have a positive impact of parent involvement and hence positively impacted Clark Elementary School. Benefits of Parental Involvement: Interviewers described better parent involvement leading to academic success. Teachers found that students were more motivated and had better self confidence as a result of parent involvement. Parents also were found to have other benefits of involvement other than academic ones and they could feel themselves part of a community. Recommendations Following things are recommended in this study: In order to develop strategies for parent involvement in low income schools it would be better to input the advice of neighbors and interested agency representatives in order to understand the lives of people the school shall serve. If we can get a clear understanding of the lives of their school families, we ought to encourage definition of parental involvement which would acknowledge a wide list of parental behaviors that lead to academic success. Educators serving low-income populations must consider offering services to the families of their students, thereby bringing parents into the school buildings. Full-service schools can provide services based on the understanding of the needs of the neighborhood, intended to meet the needs of low-income school families. Educators should invite the input and participation of community agencies, businesses, and faith-based groups in any efforts to meet the needs of school families. Offering the opportunity to provide input can encourage them to own the process and make them have a long term participation in the process Educators need to accept that parents may not choose to be involved in education in commonly accepted ways. Conclusion The main point of the article is that a better understanding of the community needs is a must for forming a better definition of parent involvement for the community. Hence, Educators working in low-income communities need a willingness to learn about their student populations and a high degree of commitment to school families in order to better formulate parent involvement strategies in schools. The author has used qualitative research methods to show a relationship between better understanding of the community by the school for introducing steps to increase parent involvement at the college. However, the main problem lies here in the sampling for interviews. Here snowball sampling is being used. This should have been avoided as snowball samples are hardly representatives of target populations and are just used for exploratory purposes. Since data for teachers and parents could have been made available by the school I this case, Using that data could have lead to a better sample cou ld have been prepared that would have been more representative of the population at hand. As it stands the study can be considered a good starting point of research for introducing steps for parent involvement in low income schools. Bibliography Smith, J. G. (2006). Parental Involvement in Education Among Low-Income Families: A Case Study. School Community Journal , 43.

Wednesday, November 13, 2019

We Have the Right to Use Cell Phones While Driving :: Argumentative Persuasive Argument Essays

We Have the Right to Use Cell Phones While Driving Imagine driving in a car and not being able to adjust your radio, roll down your window, or even talk to your passenger. This may sound a bit extreme, but little by little a person's rights are being infringed upon by those who think that using a cellular phone while driving should be illegal. Using a cell phone while driving is no different than a mother tending to her children in the backseat, a person eating in a car, or even someone engrossed in conversation with their passenger. Can these rights be taken away, can common sense be legislated? Cell phones first became available in the year 1984 and have only grown in popularity since (Stutts et al.). Today there are over one hundred and twenty-eight million users (Pickler). In recent years, cell phones have been in the spotlight for causing drivers to be distracted, resulting in a number of crashes. New York has become the first state to ban the use of hand-held phones when driving on public highways. This new law went into effect on December 1, 2002. Drivers may only use a hand held phone "in an emergency, to call for help or to report a dangerous situation." However, drivers are allowed to use hands free devices such as speaker phones ("New. . ."). Currently, there are thirty-eight other states with bills like this one in the process (Breslau and Naughton 46). Many are upset about these laws because data on the actual number of cell phone related car accidents is not complete. According to a spokeswoman for Cellular Telecommunications and Internet Association, " There ar e not a lot of substantial findings" (Pickler). It's too early to tell if New York's new law is lowering the number of deaths caused by cell phones (Alonso-Zalvidar). Although around 2,600 people die each year from cell phone related accidents, a cell phone user only has around thirteen chances in a million of dying in a cell-phone related automobile accident. This is three times less than the chances of being killed by not wearing a seatbelt. Other motorists and pedestrians have a four in one million chance of being killed by a driver using a cell phone; the chance of getting killed by a drunk driver is four times as high (Pickler). Granted, every single human life is important, but these figures show that cell phones pose only a very small risk.

Sunday, November 10, 2019

Philosophy Sections 7.1 & 7.2 Essay

1. What are the requirements for knowledge? 4.What is Plato’s allegory of the cave supposed to demonstrate? Plato’s allegory of the cave is supposed to demonstrate not only the human situation in general but Socrates’ life in particular. Socrates glimpsed the true nature of reality and tried to convince the inhabitants of Athens that they didn’t know what they thought they knew. The objects that cast shadows on the wall represent what Plato considers to be the truly real objects: the forms. 5.What is Descartes’ dream argument? Descartes’ dream argument is as followed: 1) We can’t be certain that we’re not dreaming. 2) If we can’t be certain that we’re not dreaming, we can’t be certain that what we sense is real. 3) If we can’t be certain that what we sense is real, we can’t acquire knowledge through sense experience. 4) Therefore, we can’t acquire knowledge through sense experience. According to Descartes, you can’t rule out the possibility that you’re dreaming so you’re senses can’t give you knowledge of the external world. 8. Why do empiricists believe that there are no synthetic a priori truths? Empiricists believe that there are no synthetic a priori truths because they believe that sense experience is our only source of knowledge of the external world. 9.How does Kant explain the possibility of synthetic a priori truths? Kant explained the possibility of synthetic a priori truths by examining the method of inquiry used by mathematicians. Kant found that what makes it possible for mathematicians to discover such truths is that they study the principles the mind uses to construct mathematical objects. Section 7.2 (3 and 4) 3. What is representative realism? Representative realism is the doctrine that sensations are caused by external objects and that our sensations represent these objects. 4. What is the distinction between primary and secondary qualities? The distinction between primary and secondary qualities is that while secondary qualities exist in the mind not in the actual object, primary qualities are possessed by material objects.

Friday, November 8, 2019

Chasmosaurus Facts and Figures

Chasmosaurus Facts and Figures Name: Chasmosaurus (Greek for cleft lizard); pronounced KAZZ-moe-SORE-us Habitat: Woodlands of western North America Historical Period: Late Cretaceous (75-70 million years ago) Size and Weight: About 15 feet long and 2 tons Diet: Plants Distinguishing Characteristics: Huge, rectangular frill on neck; small horns on face About Chasmosaurus A close relative of Centrosaurus, and thus classified as a centrosaurine ceratopsian, Chasmosaurus was distinguished by the shape of its frill, which spread out over its head in an enormous rectangle. Paleontologists speculate that this giant awning of bone and skin was lined with blood vessels that allowed it to take on bright colors during mating season and that it was used to signal availability to the opposite sex (and possibly to communicate with other members of the herd). Perhaps because the addition of horns would have been simply too much (even for the Mesozoic Era), Chasmosaurus possessed relatively short, blunt horns for a ceratopsian, certainly nothing approaching the dangerous apparatus of Triceratops. This may have something to do with the fact that Chasmosaurus shared its North American habitat with that other famous ceratopsian, Centrosaurus, which sported a smaller frill and a single large horn on its brow; the difference in ornamentation would have made it easier for two competing herds to steer clear of each other. By the way, Chasmosaurus was one of the first ceratopsians ever to be discovered, by the famous paleontologist Lawrence M. Lambe in 1898 (the genus itself was later diagnosed, on the basis of additional fossil remains, by Charles R. Sternberg). The next few decades witnessed a bewildering multiplication of Chasmosaurus species (not an unusual situation with ceratopsians, which tend to resemble one another and can be difficult to distinguish at the genus and species level); today, all that remain are Chasmosaurus belli and Chasmosaurus russelli. Recently, paleontologists discovered the amazingly well-preserved fossil of a Chasmosaurus juvenile in Albertas Dinosaur Provincial Park, in sediments dating to about 72 million years ago. The dinosaur was about three years old when it died (most likely drowned in a flash flood), and lacks only its front legs.

Wednesday, November 6, 2019

Government Term Paper Topics

Government Term Paper Topics In the recent years government term paper topics are becoming more and more popular. Students all over the US need to write a good paper on a government term paper topic. In order to be able to write a good paper on government term paper topic – a student has to possess certain information on the government term paper topic he chooses. Basically, the writing a paper on government term paper topics – is conducting a quality research on the government activity and the effect it makes on modern life of an American. The research can be conducted in several ways: An experts opinion. This is the most trusted way, as if you have access to an experts opinion on a government issue – you are guaranteed to have a good term paper, and its relevance will be proved by the opinion that is generated by the expert. This way is the best, but by far not the most convenient and easy. The internet – is an easy way to find information on the topic. The great strength of this method is that you can find multiple opinions on the government term paper topic and make your own conclusions towards this issue. The weakness of this technique is that it is not always so easy to find even one opinion. You will need to browse through thousands of web pages and not even find a single relevant thing. Multiple newspaper articles and professional journals may be used a relevant source of information. These types of information usually contain professional opinions on things going on in the government, but it may be difficult to find something according to your topic as well as use it without citation and referencing. If you decide to write a paper on either of the government term paper topics – the main idea is to conduct proper research and only then – write the term paper. If you are having difficulties with writing a paper on various government term paper topics – why not consider having an expert write it for you? CustomWritings.com is eager to help you with any of your assignments. We have hired experts, who are proficient in almost all government term paper topics, and all of them can be easily assigned to your paper. If you are seeking for proper government term paper topics help – consider CustomWritings.com as your number one assistant. We will make sure you will be delivered a good paper on a government term paper topic. We provide top quality custom term papers written absolutely from scratch. Here is a list of the most popular governmental essay topics: 1. Government Monitoring the Public Right or Wrong? 2. Fascism as a form of government. 3. Principles of the American Government 4. Government Supplied Health Insurance for all Taxpayers and their Dependents 5. How effective was the provisional government? 6. Government Intervention in Individual Markets: A Look at Government Intervention and Antitrust Law via the Microsoft Case 7. Colombian Government vs. The FARC. Who are they and what are they fighting for? 8. The role of government in the economy 9. Issues Facing the New Federal Government 10. Issues in Australian Government and foreign policy 11. Presidential and parliamentary governments 12. 1984 Governmental control over the media and loss of privacy 13. Links between GDP, Consumption, Investment and Government Expenditure 14. What are the major ideas of government and society contained in the Indian Constitution? 15. History of Roman Government 16. American citizens duties and obligations to the government based on the constitution 17. How has the Australian Government and media portrayed the refugee situation? 18. The Government’s Role in a Market Economy 19. E-Government and E-Procurement 20. Outline Government 21. State Local Government Accounting 22. How do government policies influence the level of inequality in the distribution of income and wealth? 23. Government control over equality 24. Government Relations and business 25. Religions impact on US government 26. Government Censorship 27. Internet Regulation – Government Involvement 28. What is presidential government and parliamentary government? 29. US Airways and Government Aid 30. Globalisation and Government Incentives

Monday, November 4, 2019

Space Race (specifically the early years) Research Paper

Space Race (specifically the early years) - Research Paper Example strong technological and security, competition, Russia was ahead of the United States, but this later changed when the United States sent the first man to moon. This research will demonstrate the space race timeline and highlight some of the major events of this period. The initial advantages that Russia had over the united states will also be discussed and other programs that the united states have launched in order to achieve their space interests. The fall of the Nazi German after the Second World War saw the United States and German emerge as major superpowers who had the technological abilities to control major innovations in the world. The two countries were embroiled in a major silent political, geographical and military tussle that was christened the cold war, an era when technological advancements were at their peak. Based on the newspaper headlines of the 50s and the 60s, the Soviet Union was way ahead of the United States on the development of space capability, a situation that bolted the later into action, opening the area for major competition. The initial periods of the space race was marked with major secret spying between the United States and the Soviet Union as the two countries were concerned of the major technological research activities being undertaken by the other. The united states were still concerned with the pearl harbor attack and was interest in revenging against the soviet union, a country that was using all means possible to keep their depleted army resources a top secret1. President Dwight Eisenhower of the United States introduced the open skies in 1955, marking the beginning of an era of space exploration and major discoveries. This policy allowed the Soviet Union and the United States to fly reconnaissance aircrafts over each other’s airspace as a way of gathering intelligence information. In the same year, the United States announced that it will be working on the development of a scientific satellite, prompting the Soviet

Friday, November 1, 2019

Company profile for the media company HBO (Home Box Office) Term Paper

Company profile for the media company HBO (Home Box Office) - Term Paper Example The channel is expanding its broadcast continuously by licensing its broadcast to television networks and presently people of about 151 countries around the world are enjoying its original programs. At the same time, HBO’s branded premium pay and basic cable networks are operating in about 50 countries of Latin America, Central and Western Europe, and some parts of Asia as well (http://www.timewarner.com). At the end of 2011, it had about 81 million global subscribers out of which 42.5 million are international premium pay and basic cable subscriber while rest of 39.4 million are nationwide premium pay subscriber. HBO is available in HD on number of multiplex channels like Direct TV, Cox Communication, Xfinity, Time Warner Cable, and Dish Network etc. The year 2011 is the fourth consecutive year when HBO has won 4 Golden Globes award more than any network while it has been the 10th consecutive year when it has won 8 Sports Emmys and 19 Primetime Emmys in 2011 (HBO Annual Repor t, 2010). Strangers No More, a documentary film of HBO received Academy Award for the category of Best Documentary. 1. What do they do in media? HBO mainly operates television films, comedy shows and concerts, motion pictures and original series, and occasionally boxing matches via cable, direct broadcast satellite (DBS), C-band satellite, and microwave (MMDS). The network has offered HBO On Demand. It means HBO has given a wonderful option to its subscriber to watch its programs according to their own schedule. A big share of HBO’s programs consists of egalitarian theatrical motion pictures. For this purpose, HBO acquires license agreements from the producers or distributors of such recently released films. Under such agreements, HBO gets exclusive rights to broadcast and distribute recently released or old films. The license agreement always depends on the performance of films on the box office. High-quality award winning original comedy and theatrical series is another bro adcast segment of HBO e.g., Boardwalk Empire, Curb Your Enthusiasm, True Blood, and Boardwalk Empire. Besides these, HBO also shows boxing matches, family programs, sports news, and commentaries. 2. How long has this business been in operation, what is their history? Charles Dolan, one of the pioneers of cable networks systems in United States of America, presented the business plan of ‘Green Channel’ to Time Life Inc. On 8 November, 1972 the channel became Home Box Office or HBO (Forsyth, 2002). ‘Sometimes a Great Notion’ was the first ever program aired on HBO. In 1973, Time Life Inc took over the control of newly established channel as Gerald Levin became the first President as well as CEO of HBO. Initially churn rate from subscribers was so high. HBO was tumbling and any debacle could have been occurred. At that time, Levin introduced the broadcasting in Massachusetts. Here a preview of service was offered for free on Channel 3. This offer showed promis ing results as HBO gained a good number of subscribers. Later on the same strategy was applied in other states. On 30th September 1975, HBO put on air the first ever live boxing match between Muhammad Ali and Joe Frazier and thus became the first television channel which delivered the telecast through satellite medium (http://transition.fcc.gov). HBO launched its companion network Cinemax in 1980 which is still very popular and known for its late night soft-core adult shows and series. In 1981, HBO extended its broadcast from 09 hours to 24 hours. In 1983, HBO presented its first kids’ show. Until 2001, HBO showed number of programs for children when these programs were shifted entirely to HBO Family channel. The decade of 80s

Wednesday, October 30, 2019

Human Resource Change Research Paper Example | Topics and Well Written Essays - 3000 words

Human Resource Change - Research Paper Example Historically, Jack Cohen (Tesco, 2011) was the person who founded Tesco in East London in late 1910s. From a small retail outlet in East London in the year 1919, Tesco has now approximately four thousand eight hundred locations around the world. In specific, Tesco (2011) began from selling grocery items; however, now involved in selling of consumer goods, as well as financial services globally. Initially, during its beginning, Tesco Tea was the only brand product that was available at Tesco (2011) in 1920s. By proving it as a leader, in the year 1979, Tesco (2011) was successful in reaching the annual sales of one billion pounds. However, within three years, the annual sales doubled indicating its success in the global retail market. On international level, Tesco (2011) enjoys the credit of becoming the first retailer to indicate nutritional values of its products. During 1990s, Tesco began its journey towards Asian countries, and it has been successful in Asian region until today. I n the year 2000, Tesco (2011) launched its official website, and in the year 2007, Tesco (2011) was able to launch its first outlet in the USA. In this regard, from 1919 to 2011, Tesco (2011) has been successful in becoming a global retailer giant. Besides such achievements, Tesco (2011) has been offering a motivational workplace environment to its employees as well. According to its website (Tesco, 2011), the company offers a training and development opportunities to its workforce by allowing them to continue their education while working at the same time, which is an efficient way of the company to encourage its employees to develop themselves while putting efforts to... This essay stresses that autonomy indicates the level of freedom that individuals get during their different tasks in the organizations in terms of their decision-making power. Lastly, the last trait refers to the extent to which managers give value to feedback of the employees in an organization. From recognition of these five core job traits, it is an understanding that the organization will be able to employ the most appropriate motivational strategy on the employees, and will be able to acquire most efficient outcomes. HR managers now face a greater responsibility of dealing with the employees according to their social and cultural values. The paper included analysis on some of the major issues that HR managers at Tesco and several other organizations confront while dealing with their employees. Although Tesco has now become one of the leading organizations globally, however, still, its managers face several issues while bringing out change in their different procedures and processes. In specific, to ensure high-productivity and quality-performance employees, it is very important that managers should endeavor to understand the situation first and then put efforts in employing a motivational strategy. Although money plays an important role in motivating humans, however, several other factors are imperative in ensuring success in an organization. Finally, HR managers have the major responsibility to evaluate and decide about the tools and strategies that can result in the most efficient outcomes.

Monday, October 28, 2019

Classification and Format in the Income Statement Essay Example for Free

Classification and Format in the Income Statement Essay Investors commonly assess a firm’s value based on the firm’s expected future sustainable earnings stream. To inform analysts and other financial statement users about sustainable earnings, firms often report income from recurring business activities separately from income effects from unusual or nonrecurring activities (such as asset impairments, restructuring, discontinued business segments, and extraordinary events). To provide more useful information for prediction, U.S. GAAP (Generally Accepted Accounting Principles) requires that the income statement include some or all of the following sections or categories depending on the nature of the firm’s income for a period: †¢Income from Continuing Operations. Reports the revenues and expenses of activities in which a firm anticipates an ongoing involvement. When a firm does not have items in the second and third categories of income in a particular year, all of its income items are related to continuing operations; so it does not need to use the continuing operations label. Firms report their expenses in various ways. Most firms in the United States report expenses by their function: cost of goods sold for manufacturing, selling expenses for marketing, administrative expenses for administrative management, and interest expense for financing. Other firms, particularly those in the European Community, tend to report expenses by their nature: raw materials, compensation, advertising, and research and development. †¢Income from Discontinued Operations. A firm that intends to remain in a line of business but decides to sell or close down some portion of that line (such as closing a single plant or dropping a line of products) generally will report any income, gain, or loss from such an action under continuing operations. On the other hand, if a firm decides to terminate its involvement in a line of business (such as selling or shuttering an entire division or subsidiary), it will report the income, gain, or loss in the second section of the income statement, labeled â€Å"Income, Gains, and Losses from Discontinued Operations.† †¢Extraordinary Gains and Losses. Extraordinary gains and losses arise from events that are (1) unusual given the nature of a firm’s activities, (2) nonrecurring, and (3) material in amount. Corporate annual reports rarely disclose such items. Many firms have reported restructuring charges and impairment losses in their income statements in recent years. Such items often reflect the write-down of assets or the recognition of liabilities arising from changes in economic conditions and corporate strategies. Because restructuring charges and impairment losses do not usually satisfy the criteria for discontinued operations or extraordinary items, firms report them in the continuing operations section of the income statement. If the amounts are material, they appear on a separate line to distinguish them from recurring income items. Income, gains, and losses from discontinued operations and extraordinary gains and losses appear in the income statement net of any income tax effects. The majority of published income statements include only the first section because discontinued operations and extraordinary gains and losses occur infrequently.

Saturday, October 26, 2019

English Lamott :: essays research papers

Paper #2   Ã‚  Ã‚  Ã‚  Ã‚  Lamott’s statement about acceptance provides the writers with an understanding of being able to acknowledge who they are in the inside, as well an understanding how society views them on the outside. The experiences of Walker, Grealy, and Daum all relate strongly to Lamotts statement about surrendering to one’s situation. Walker, Grealy, and Daum all encountered uncomfortable situations, which in the end, all had to learn to live with and overcome their insecurities.   Ã‚  Ã‚  Ã‚  Ã‚  Alice Walker grew up as ordinary as any other child would; she was pretty little girl who enjoyed life to the fullest until the â€Å"accident†. â€Å"It was great being cute. But then, one day, it ended† (43). Alice was playing outside when all of a sudden she was shot in her eye from her brothers BB gun. It was an accident, but â€Å"Where the BB pellet struck there is a glob of whitish scar tissue, a hideous cataract, on my eye†¦now when I stare at people-they will stare back. Not at the â€Å"cute† little girl, but at her scar† (43). The accident made Alice conceal herself from the world and view it differently; it was as if she became introverted from society. She could no longer be outgoing and be who she thought she once was.   Ã‚  Ã‚  Ã‚  Ã‚  Alice was undergoing a change within her, but on the outside everyone said she did not change, the only thing that was different was her eye. After several years of her â€Å"glob† that was implanted in her eye she decide to see a doctor to have it removed. After the operation she felt more confident, but not anywhere to the best of her capabilities. She was interviewed and asked for a photo shoot for her book, but Alice thought about not taking the picture. She thought she would be criticized if she were not pictured in her book. â€Å"My meanest critics will say I’ve sold out† (46).   Ã‚  Ã‚  Ã‚  Ã‚  After many years of being afraid to show her face in public and interact with people, Alice finally had one dramatic day that turned the rest of her life upward and made her realize that her eye isn’t all that bad. Her daughter says, â€Å"Mommy there’s a world in your eye†(48). This comment made Alice feel astounded and she was basically able to overcome her uncomfortable situation.   Ã‚  Ã‚  Ã‚  Ã‚  Lucy Grealy’s story also supports Lammot’s statement. Lucy was a young girl who had cancer in her jaw and had to receive Chemotherapy.

Thursday, October 24, 2019

Calculate the revised product costs for the four pens Essay

1.Calculate the revised product costs for the four pens, based on the activity information collected by Assignment: This case may be completed in groups of two or individually. You are responsible for finding a partner if you choose to complete the case with another student. Purchase and read the Harvard Business School Case: Classic Pen Company: Developing an ABC Model located at the following link: https://cb.hbsp.harvard.edu/cbmp/access/27312446. (Note: The last case for the course, Foxy Originals is also contained in this course pack and should also be purchased for your final case). After reading the case, perform the following: 1.Calculate the revised product costs for the four pens, based on the activity information collected by Dempsey. Prepare this analysis using an excel spreadsheet (please print out the spreadsheet on one page – it should fit). 2.Prepare a new Income Statement, using excel or word, for Classic Pen (by product and in total) using the ABC cost information (please print this out on one page). 3.Compare the ABC Income Statement to the Traditional Income Statement presented in the case. 4.Based on this comparison, write a memo, to me, addressing the actions this new ABC cost information could stimulate Classic Pen to pursue. Be thorough while still maintaining strong business writing skills: conciseness; clarity; critical  thinking; readability; proper use of grammar, punctuation and spelling. The memo should be prepared in Microsoft Word or a comparable word processing application, use 1 inch margins, times new roman 12 point font, single spacing and not exceed 2 pages (this does not include your supporting spreadsheet data 1 and 2 above). 5.Turn in your memo and supporting data in class on Thursday, June 12, 2014. Please note: It is a violation of the academic code of ethics to refer to case notes or solutions obtained through the internet or from people who previously performed the work or studied the class materials, cases or projects. Use of any of these materials will be considered plagiarism. Not only will this not help you on the course exams and CPA exam; it will cheat you of the academic experience. It is the responsibility of every student to report anyone who violates this principle. I reserve the right to request submission in electronic format and have access to plagiarism detection software. You are free to discuss this case with other students; however you (and your partner if applicable) must produce your own set of work to be turned in as your deliverable. Use of someone else’s work in any form will be considered plagiarism and dealt with accordingly. I am available as a resource but I should be viewed as a â€Å"last resort†. I will answer specific questions but I will not frame the deliverable or pre-screen your work prior to submission of your final deliverable. The calculations in this case are quite straight-forward, the more challenging part of the case is framing your response to question 4 and it is good practice for you as current/future business professionals. There is not â€Å"one right answer†; your response should, however, be logical, critically thought out and well communicated. Good luck!! A Note on Business Writing: Effective business writing is critical to your future professional success. In addition, the AICPA evaluates candidates’ writing skills in the computerized Certified Public Accountant (CPA) Exam. Please use this case as a chance to practice your business writing. A great resource to use if you feel you need help in this area is the following: Effective Writing: A Handbook for Accountants; Claire B. May and Gordon S. May; Pearson Prentice Hall. The Uniform CPA Examination consists of multiple-choice questions and condensed case studies called simulations. Each case study simulation will include a writing skills exercise. In this portion of the exam, candidates must read a situation description and then write an appropriate document (â€Å"constructed response†) relating to the situation. The instructions will state what form the document should take (such as a memo or letter) and its focus. The candidate’s response should provide the correct information in writing that is clear, complete, and professional. Only those writing samples that are generally responsive to the topic will be graded. If your response is off-topic, or offers advice that is clearly illegal, you will not receive any credit for the response. Constructed responses will be scored holistically. Scores will be based on three general writing criteria: Organization, Development, and Expression. Organization: the document’s structure, order ing of ideas, and linking of one idea to another: †¢Overview/thesis statement †¢Unified paragraphs (topic and supporting sentences) †¢Transitions and connectives Development: the document’s supporting evidence/information to clarify thoughts: †¢Details †¢Definitions †¢Examples †¢Rephrasing Expression: the document’s use of conventional standards of business English: †¢Grammar (sentence construction, subject/verb agreement, pronouns, modifiers) †¢Punctuation (final, comma) †¢Word usage (incorrect, imprecise language) †¢Capitalization †¢Spelling

Wednesday, October 23, 2019

Hamlet’s Construction of Sanity Essay

In William Shakespeare’s Hamlet many characters appear to suffer from what appears to be mental instability, most notably Hamlet, Ophelia, and Gertrude. The apparent â€Å"madness† of these characters develops and drives the plot, which results in the play’s tragic ending. It is the reader’s responsibility to decipher which characters are actually mentally ill and which are merely pretending. Furthermore, it is important to keep track of which characters believe other characters are mentally ill. The most important of these is Gertrude, Polonius, and King Claudius’ belief that Hamlet is mad. Gertrude’s suspicion is confirmed by Hamlet’s slaying of Polonius and then shortly after his discussion with the ghost of King Hamlet, whom his mother cannot see. Shortly after the ghost leaves, Hamlet tells his mother, â€Å"No, in despite of sense and secrecy,/Unpeg the basket on the house’s top. /Let the birds fly, and like the famous ape,/To try conclusions, in the basket creep/And break your own neck down† (III. IV. 196-200). In this passage Hamlet instructs his mother to tell King Claudius what has happened. When Claudius discovers the apparent madness of Hamlet this begins a large series of events that leads to the death of all of the main characters. The above passage uses a simile, personification, and a pun to draw the reader’s attention to its importance. The most noteworthy of the figurative language comes in this line, â€Å"Unpeg the basket on the house’s top† (III. IV. 197). The line instructs Gertrude to reveal to Claudius the events that just transpired. However, to â€Å"unpeg† â€Å"the houses top† is a pun, which refers to tricking Claudius (the houses top) into believing that Hamlet is indeed insane. This line is followed by a simile: â€Å"Let the birds fly, and like the famous ape/To try conclusions, in the basket creep† (III. IV. 198-199). According to the footnotes, the story of the famous ape is no longer known, so it is impossible to understand the allusion and what comparison Shakespeare is trying to make. However, it is presumed that the audience of the day would understand the reference. For modern reading it simply shows the reader it is an important passage because of the use of figurative language. In addition, it is important to notice the use of the word â€Å"basket† in this passage. The line, â€Å"Unpeg the basket on the house’s top† (III. IV. 197) appears to be a saying similar to â€Å"letting the cat out of the bag† i. e. revealing a secret or telling Claudius what happened. Moreover, the second use of basket seems to refer to Claudius’s mind or head. This strengthens the pun uses earlier in the â€Å"houses top† by referring to what Claudius is thinking, or should think about Hamlet. The above quote sets up a huge piece of dramatic irony in the play. The audience is aware that Hamlet is not truly insane because they have seen the ghost and understand Hamlet’s intentions. However, Gertrude and Claudius are unaware of this and merely think that Hamlet has gone mad. This prompts Claudius to banish Hamlet and ask the King of England to execute Hamlet upon his arrival in England. Upon Hamlet’s return to Denmark the king makes new plans to kill Hamlet, which results in the deaths of Gertrude, Claudius, Hamlet, and Laertes. The use of figurative language in the above passage helps to drive the dramatic irony in the play. Hamlet wants his uncle, King Claudius to believe he is mad. The line, â€Å"To try conclusions, in the basket creep† (III. IV. 199) refers to Hamlet’s desire to trick Claudius into thinking he is mad. Hamlet wants Claudius to come to the conclusion the Hamlet is insane, although he really is not, so Hamlet can achieve his revenge. This passage is extremely important to the action of the play. These lines set up the action for the rest of the play and incite Claudius, Gertrude, Ophelia, and Laertes to take action in some way or another. It is here that Shakespeare begins to set up for the dramatic denouement where all the main characters die. The actions of Hamlet coupled with the dramatic irony that Shakespeare is establishing make these lines extremely important to the outcome of the play. Shakespeare’s use of figurative language here draws the reader’s attention to the importance of these lines.

Tuesday, October 22, 2019

Rennaisance vs. Rap essays

Rennaisance vs. Rap essays In the latter part of the 15th century, there began a cultural revolution known as the Renaissance. This artistic rebirth changed the way people lived and thought for the next century and a half. In the last decades of the 20th century, a new voice in music has arisen. This voice called Rap represents the cries that emanate from the urban areas of Western civilization. Superficially, no comparisons can be drawn between Rap music and the Renaissance but if there is an understanding of the cultural impact that each ascertained then the connection is clear. The Renaissance began as a rebellion against the medieval church. The church during the middle ages controlled every aspect of the people under its jurisdiction. All forms of art, from painting to music, were evaluated using the churchs standards of acceptability. Therefore, if the church did not agree, it was prohibited. In an effort to escape this lack of creativity an explosion of artistic imagination occurred. Secular music was no longer look upon as damned. Courts often had two sets of musicians. That way if the occasion called for holy music and secular music the feat could be achieved. This creative overflow caused the production of more music that ever before. And with the advent of the printing press, music was now distributed by the masses. The impact of the Renaissance was tremendous in making new boundaries and advancing music as a whole. In the late1970s, Rap was making its first strides in becoming a major music power in America. Coming from humble beginnings, it has evolved over the last two decades into a domination force in this culture. At its early stages, Rap was confined to exclusively to African Americans but that too has changed. By the 21st century a substantial percentage of listeners of Rap are not black. Due to its nature and content Rap has been heavily criticized by politi ...

Monday, October 21, 2019

Concepts Of Lifetime Fitness Essays - Physiology, Heat Transfer

Concepts Of Lifetime Fitness Essays - Physiology, Heat Transfer Concepts of Lifetime Fitness September 1, 1997 Homeostasis is the state of equilibrium in which the internal environment of the human body remains relatively constant. Two excellent examples of homeostasis are how the body maintains a constant temperature and blood pressure during strenuous physical activity or exercise. Although there are many other activities in the body that display homeostasis, I will only discuss these two. Temperature in the human body is usually kept at approximately 37 degrees Celsius. To maintain such a strict temperature, the body has a few functions to combat the outside elements. People cannot make themselves cold as readily as make themselves hot, however I will mention both homeostasis functions. When the external temperature decreases, a portion of the brain called the hypothalamus detects the drop by means of the blood. To compensate, the brain sends chemical and electrical impulses to the muscles. These impulses tell the muscles to begin to contract and relax at very high intervals. This is commonly known as shivering. The production of Adenosine Triphosphate or ATP in the mitochondria of the muscles produces heat. If the body temperature does not rise immediately after this, then a second function begins. The brain will signal the blood vessels near the skin to constrict or narrow in diameter. This occurs so the heat deep in the muscles is conserved. Sinc! e the vessels are now smaller in diameter, less blood is needed to fill them. Since less blood is needed through the vessels, the heart begins to slow. If the body remains in this slowed state, hypothermia could result. Hypothermia is the condition in which metabolic processes are inhibited. The medical world has taken advantage of this by inducing hypothermia in patients that are undergoing organ transplants. To fight temperatures higher than normal, as in exercise or on hot days, the body reacts in the opposite way than with cold. Again, the hypothalamus detects the change of temperature in the blood. The brain signals blood vessels not to constrict, but to dilate. This increases the diameter of the vessels, and results in the need for more blood. Since more blood is needed to fill the vessels, the heart pumps faster and that causes respiration to increase. The increased respiration will make the body exhale some of the internal heat, like placing a fan in a window to cool a room. The blood vessels are dilated so the heat deep in the muscles is easily released. Another commonly known mechanism to fight heat is sweating. Sweat glands found throughout the body are stimulated by the hypothalamus to excrete sweat and when the sweat evaporates, the skin is cooled. If the body is not cooled by the time all of the internal water supply is used, it could go into hypothermia. Th! is is when the body becomes dehydrated and proteins begin to denature. Hypothermia can result in certain death if the water supply is not immediately replenished. Some advantages to these mechanisms are the cleansing effect of sweating and weight loss. Sweat, when excreted, removes waste materials such as bacteria and water. Fat material, during exercise, is actually "eaten" by the body thus reducing overall weight. The second example of homeostasis is blood pressure regulation. When the hydrostatic pressure of blood is above normal, pressure sensors in the blood vessels tell the brain through chemical means. The brain will then stimulate the heart to contract or beat in slower intervals. This will cause less blood to enter the blood vessels and that will lower the hydrostatic pressure. If the pressure is lower than normal, the exact opposite happens. The sensors in the vessels tell the brain and the brain will then make the heart beat faster so more blood enters the vessels and the pressure is raised. The body uses many mechanisms to regulate temperature and blood pressure. Be it stimuli to the heart from the brain or messages from the blood, the body maintains its internal environment through a process called homeostasis.