Thursday, November 28, 2019
Computer Networks
Introduction Computer security is a popular term used in modern information age. The term is used persistently to address issues about safety of information systems and networks. As the use of computer networks gains much recognition in the society; there is an urgent need to address the security issues of information stored on such systems.Advertising We will write a custom report sample on Computer Networks specifically for you for only $16.05 $11/page Learn More Computers without any security policies or measures can make a network susceptible to threats, attacks or may even disable network activities within minutes. Similarly, it may take much effort and time to recover a compromised resource. Internet has provided more opportunities for individuals, organizations and governments. However, its simplicity of access has made it insecure for privacy, retrieval and distribution of information. Several protocols used to guarantee security on the internet have proved ineffective; hence tools to eavesdrop or ââ¬Å"sniffâ⬠passwords on the network are often exploited by malicious hackers. Applications which broadcast unencrypted passwords across the network are equally vulnerable. Clients and server applications depend on client and server softwareââ¬â¢s to be ââ¬Å"truthfulâ⬠on issues of user identity using their applications. Other applications depend largely on the client to limit its operations to those connected with what it is obliged to do, with limited or otherwise no enforcement by the server. To address the above mentioned issues, Kerberos was viewed as a solution. Kerberos is a unique network security mechanism which uses cryptography. Cryptography mechanism allows a client to verify its identity to the server and vice versa over the unprotected network connection. Kerberos Kerberos is a modern security mechanism which is used to safeguard communications occurring over insecure network. It achieves this throu gh proving the authenticity of nodes communicating to one another. In other words, it is a computer network authentication protocol that works using the basic of ââ¬Å"ticketsâ⬠to use computers communicating over unprotected networks to verify their uniqueness to one another in a protected mode. Kaufman et al (1995) offers another definition of Kerberos. He asserts that Kerberos may designate a set of free software that was published by the Massachusetts Institute of Technology that implemented the Kerberos protocol. The primary objective of designing Kerberos was safeguarding client-server by providing a mutual authentication facility. That is, both the server and the node identify each otherââ¬â¢s while communicating.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More Kerberos messages are secure against replay attacks and eavesdropping. The technology is based on symmetric key crypt ography and demands a trusted third-party. Correspondingly, this security mechanism may employ a public key cryptography by using asymmetric key cryptography during the process of authentication (Kaufman et al, 1995). Kerberos uses the symmetric Needham-Schroeder protocol. It also utilizes the trusted party known as the Key Distribution Center (KDC). The KDC contains two logically distinct parts, the Ticket Granting Server (TGS), and the Authentication Server (AS). The KDC keeps a database of private keys and element on the network regardless of whether it is a node or a server. The node and the server share the private or secret key known to the KDC and to the nodes and servers. The authenticities of this key act as proof of an elementââ¬â¢s identity. According to Neuman and Tsââ¬â¢o (1994), for communications reasons, the KDC releases a session key which the parties communicating employ to encrypt the contents they are broadcasting. The security of the Kerberos protocol depe nds entirely on temporal assertions of validity referred to as Kerberos Tickets (Neuman and Tsââ¬â¢o, 1994). Elements of Kerberos Protocol Tools Kerberos uses different types of elements of network security to accomplish or manage authentication between the services and users. These elements are important. Without them, the objective of safeguarding network resources would be fruitless. Some of the most important elements are described below. Client and Servers Tickets Client and servers are the primary elements of Kerberos. According to Neuman et al (2005), the client designates a system or a person that wants to access the network or web enabled services. The server on the other hand uses the Kerberos authentication service to ascertain clients have valid access to the program or an application they wish. Tickets are useful in the Kerberos authentication service (Neuman and Tsââ¬â¢o, 1994). They contain information that is essential for identifying the client to the server. Kerberos encrypt the information contained in the ticket to ensure the illegal access is not allowed. Port A characteristic that Kerberos tools have in all Kerberos system administration is the port. Kerberos have by default port 88.This suggests that when communication tools are developed; the passwords, log on IDs and user IDs have to communicate through this port.Advertising We will write a custom report sample on Computer Networks specifically for you for only $16.05 $11/page Learn More If accurate combination of passwords and user IDs is verified by the authentication server, then access or log- in is granted through this port. Network administration can therefore give access to files, database, programs and emails, among other services when they link the encryption keys with this port. Encryption Encryption is a typical element of all Kerberos enabled tools. Encryption illustrates anything inputted by a keyboard or read on a file and translated in to a coded format. The encrypted message makes it unreadable, unrecognized or unutilized by any program or person that is not permitted to do so. A more significant feature of encryption is that no password is stored in an encrypted format. Each encryption algorithm uses a precise key length that can alter an imputed unencrypted password that is entered in an encrypted one to grant strengthened protection. Active Directory Trusts and Domains They are Kerberos tools available for windows server. It is a graphical interface feature that Microsoft Corporation has made it available for network administrators. It assists network administrators in viewing all trusted and domain relationships so they can enforce protection levels within these domains. The tools can be employed for all trusted and related activities such as varying and viewing trusts. Active Directory Computers and Users They are Microsoft management console tools which contain the administration tool pack. The administrati on tool pack uses the Kerberos protocol. The characteristic of Active Directory Computers and Users is that they include the ability of controlling, configuring and publishing information from the Active Directory. All administrative roles in domain controllers that need authentication are encrypted. How Kerberos Authentication Works Kerberos succeeds its security operations in various ways. Each activity follows one another in succession. The process of authenticating begins when a client computer makes a formal request to access or use the server. The client requests the authentication service to generate a ticket containing client credentials and sends the information to the server together with session information (Kaufman et al, 1995). The client and Kerberos use the client information such as the password to validate the information. The Kerberos then broadcasts an encrypted ticket to the server with a password known to the server and Kerberos. Strebe (2002) notes the server v alidates the information to verify the source and the identity of the user.Advertising Looking for report on computer science? Let's see if we can help you! Get your first paper with 15% OFF Learn More It can also use the timestamp of the ticket to establish the validity of the request. The lifetime of a ticket lasts a few minutes; this is to ensure the process occurs in the shortest time possible for security purposes (Bellovin and Merrit, 1990). In understanding how Kerberos achieves these roles, the writer will list and describes each packet that is involved between client and application server and clients and the KDC during the process of authentication. Stage 1 Authentication Server Request, AS_REQ According to Neuman et al (2005) this phase is known as the initial authentication request. The client requests the KDC for a Ticket Granting Ticket. The request, in the form of a message is unencrypted. Stage 2 Authentication Server Reply, AS_REP When a preceding request arrives, the AS checks whether the reply contains TGT, which is encrypted with the TGS private key, and the session key encrypted with the secret key from the requesting user (Neuman et al, 2005). If one of the t wo keys fail to exist, an error message is posted to the client, otherwise, the AS process the reply. The processing is carried out using the following format. It randomly fixes a session key which acts as a secret key and shares it with the client and the TGS It also establishes the TGT inserting the requesting userââ¬â¢s principal, which is the service principal. Lastly, it creates and dispatches the reply that contains the ticket produced earlier and encrypted using the secret key for the service. The timestamp, lifetime, service principal and session keys are encrypted using the secret key labeled for the user invoking the service. Stage 3 Ticket Granting Server Reply, TGS_REP At this stage, the user who is authentic, and wants to access the service in context but does not have a valid ticket, sends a request as the Ticket Granting Server replies to the Ticket Granting Service (Neuman et al, 2005). The Ticket Granting Service model is as explained below; It fixes an authen ticator with the client machine, user principal, and timestamp and encrypts with the session key common with the TGS. It also establishes a request packet that contains; the Ticket Granting Ticket, which is already encrypted with the key of the Ticket Granting Service; the service principal which the ticket is needed and lifetime unencrypted; and the authenticator. When the previous requests arrive, the TGSââ¬â¢ initial step is to verify the principal of the requested service is present in the KDC database. If present, it opens the TGT by using the key and extracts the session key. It uses the key to decrypt the authenticator. To achieve service ticket, the following criterion has to be met. The TGT should not have expired. The principal contained in the authenticator should match the one available in the TGT. The authenticator should be available in the replay cache and should not have been expired. Stage 4 Application Request, AP_REQ When the client has credentials to access the service, that is the session key and the ticket, it can request the application server for a right of entry to network resources through the Application Request message. It should be noted that unlike other messages where the KDC is involved, the Application Request is not standard. It varies based on the application in context. Stage 5 Pre-Authentication As represented in Authentication Server Reply, before distributing a ticket, the KDC verifies the principal of the asking service provider and others are available in the database (Strebe, 2002). If the request is from an illegal user, TGT cannot be invoked because of the password, thus it is difficult to release a session key for creating a legitimate authenticator. Kerberos Operation (Author, 2011) Protecting Application Data As explained earlier, Kerberos provides the services of authentication only; an assurance the authenticated element is a dynamic partaker in an exchange. According to Jablon (1996) a derivative of Kerb eros authentication protocol is the swap of the session key between the client and the server (Tanenbaum, 2003). The session key may consequently be used by a program or an application to provide privacy and integrity of communication. The Kerberos describes two types of messages, private and safe messages to summarize data that need to be protected (Strebe, 2002). However, the application is at liberty to use a suitable method to a particular data being relayed. Success of Kerberos Kerberos has achieved notable success in network security issues. This is in contrast with other similar security tools providing security services. Password protection Kerberos does not allow a userââ¬â¢s password to be sent across the network either under encryption or in plain text. Rather, the protocol depends on keys that are transmitted through encryption. Hence the keys cannot be intercepted (Jablon, 1996). For example, when the security of the network is tampered, Kerberos makes it likely for trespassers to construe the content of network transmissions. Similarly, target services and user authentications remain safe. Client/Server Authentication Kerberos allows the client and server to authenticate to each other. Communication can break or fail if they are not able to authenticate. Client/Server Ticket Certification Kerberos timestamps the tickets that pass from the server to client and from client to server, it also encompasses lifetime information besides common authentication. Hence the period of authentication is restricted (Bellovin and Merrit, 1990). The time spent by the user during implementation may be altered by design but the limit is less to ensure that replay attacks are not contained. By limiting time, the strategy makes communication secure. Reusability and Durability Kerberos protocol authentication is reusable and durable. When a user authenticates using the Kerberos protocol, the authentication can be reused during the lifetime of the ticket. This is to imply that it is feasible to remain valid through the protocol without re-entering a username and password over the network. Session Key Generation The Kerberos protocol uses a dual key encryption method. The product of the service session key provides a unique link between the client and the service that is safe. This unique ââ¬Å"secretâ⬠link is used as the encryption key during client/server communication (Bellovin and Merrit, 1990). This adds security to Kerberos communication. Internet Standard The Kerberos protocol depends on the open internet platform. It is not restricted to authentication mechanisms or proprietary codes. This enables developers to depend on open and free reference implementation of a public method. Similarly, inexpensive commercial implementations can be developed separately or bought. Ubiquity Kerberos is widely embraced and trusted by security experts, developers and cryptologists. Hence, new breaches are likely to be noted and resolved instantane ously. This is in contrast with proprietary systems. Kerberos has substantial investments hence its security mechanism is difficult to overcome. Besides, the strength of Kerberos is anchored on numbers. Failures of Kerberos Protocol Though Kerberos cancels or guards against severe and common security threats, it may be challenging to implement. This is because of various reasons: Knowledge in Implementation According to Bellovin and Merrit (1990) Kerberos protocol was developed to be used for a single user client system. In cases where a client acts as a multi user system, the Kerberos authentication mechanism may be compromised to various replay attacks and ticket stealing. The general protection of a multi user client system such as memory protection, file system protection among others maybe a restricting reason of Kerberos authentication (Bellovin and Merrit, 1990). No knowledge or cleverness in implementing a Kerberos authentication can substitute system administration practice s Kerberos server and client systems. Support of Proprietary Software Kerberos utilizes mutual authentication model. It is important for client and servers to be deliberated with Kerberos authentication. Some proprietary applications also support Kerberos. Besides, various legacy systems were deliberated and maintained programs. However, they were not designed with third party authentication tools in mind (Kohl et al, 1994). This means that they need to be rewritten to embrace Kerberos authentication. Server Attacks The Kerberos authentication method is susceptible to severe attacks against ticket granting service and the initial ticketing service, KDC. The whole authentication mechanism depends on the ââ¬Å"faithfulnessâ⬠of the KDC (Kohl et al, 1994). Hence any person who can compromise authenticating users can compromise the authentication of users of the system depending on the KDC. Thus, this needs efficient system administration practices while managing the Kerberos KDC. All Nothing Strategy Kerberos can be an all nothing strategy when utilized in a network. An encrypted password communicated over the network to a non-Kerberos enabled aware the service is in danger. Hence, the networks accrue no benefit from using Kerberos. To make a network secure with Kerberos, a person must use Kerberos enabled version on all clients and server applications that communicates the passwords unencrypted. Conclusion The Kerberos protocol provides the needed security to protect communications occurring over a network. Without its strength, computer networks would be at risk against threats and attacks. Precisely, without the facts of the identity of an element or individual identity requesting an operation, it is challenging to make a decision whether an operation should be denied or granted. Kerberos achieves network security by using shared key cryptography. This makes both the client and server access the same password or key to positively recognize the user. Perh aps, this strength of the Kerberos helps to manage passwords for many users by granting services that assist in coordinating passwords between the services and the users they desire to use. The conventional authentication strategies are not a guarantee for use on networks where attackers can easily check network traffic and seize passwords. Kerberos uses strong authentication approach that does not divulge passwords, hence supporting network security. References Bellovin, S., M., Merritt, M., 1990, Limitations of the Kerberos Authentication system. Computer Communication Review 20(5), pp. 119-132. Jablon, D., 1996, Strong Password-only Authenticated Key Exchange. Computer Communication Review 26(5), pp. 5-26. Kaufman, C., Perlman, R., Speciner, M., 1995, Network Security: Private Communication in a Public World, Prentice-Hall, New Jersey. Kohl, J., T., Neuman, B., C., Tsââ¬â¢o, T., 1994, ââ¬Å"The Evolution of the Kerberos Authentication Systemâ⬠. Distributed Open System s. IEEE Computer Society Press. Washington. Neuman, B., C., Tsââ¬â¢o, T., 1994. ââ¬Å"Kerberos: An Authentication Service for Computer Networksâ⬠. IEEE Communications, 32(9), pp. 33ââ¬â81. Neuman, B., C., Yu, T., Hartman, S., Raeburn, K., 2005, The Kerberos Network Authentication Service (V5). Available at;à https://www.ietf.org/ Strebe, M., 2002, Network Security Jump-Start: Computer and Network Security Basics. John Wiley and Sons, New Jersey. Tanenbaum, A., S., 2003, Computer Networks, Prentice Hall PTR, New Jersey. This report on Computer Networks was written and submitted by user Ult1mates to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.
Sunday, November 24, 2019
Hannibal essays
Hannibal essays Hannibal is a continuation of the movie Silence of the Lambs. Dr. Hannibal Lector was placed in an asylum after killing many people. An FBI agent, Clarice Spalding was over Dr. Lectors case. She spent many nights speaking with Hannibal, listening to his thoughts without criticism. After ten years dealing with Hannibal Lecter face-to-face, Clarice is a much colder and less emotional toward life. Many of the workers were rude to Hannibal and other patients of the asylum. Hannibal acted out as a cannibal, by eating of the faces of the rude workers. Hannibal escaped from the asylum and no one had any idea where he could be hiding. Hannibal begins effectively with Clarice on a drug raid with the help of several other agents. She kills a drug czar, Elvelda, by firing a bullet at her chest. Evelda held a Mac 10 in her hand as well as her baby strapped around her chest. After firing the first shots, she left Clarice with the choice of killing a mother holding her child or to lose her own life. The incident puts Clarice in a difficult position with the FBI, as she has to turn over her gun and badge. There is an agent named Paul Krendler that has it in for Clarice, and desires her sexually. As always, Clarice's interests in life exclude anything sexual. Since she has turned him down several times he begins to act snooty towards her. In one funny scene, shows Krendler looking at photos of Lecter unaware Clarice is watching him. She alerts him and he asks, "What are you doing in the dark?" Her response: "Thinking of cannibalism." After the FBI released new information given by Mason Verger, Clarice reopened the case. Verger was forced to slice off his own face and feed it to his dogs thanks to Hannibal. Hes now a faceless cipher with no eyelids and a horrifying expression. Verger is a billionaire that wants Hannibal fed to his killer boars, and provides a handsome reward to anyone who knows of Hanni ...
Thursday, November 21, 2019
Action Planning Assignment Example | Topics and Well Written Essays - 500 words
Action Planning - Assignment Example However, there is a specific mechanism of approaching each action to reach the desired goals. The inclusion of actions will interfere with customer service, retention and acquisition. However, it is advisable for human resource managers to establish a social network with more colleges to discuss on similar ideas and generate remedies that do not drag the success of an entity. The process of action planning is very sensitive in the operation of an organisation where the human resource shall compare and contrast the effect of taking certain action as discussed in the goals realised in the study which are going to enhance our business growth below (Kumar 2011, p. 20). The process of enhancing, an action in an organisation to influence any goal of the entity the human resource will cater for several questions, for instance, what is the cost of expenditure. Do we have the right person to recruit? In addition, is it the right time to initiate the action? In the case of improving the staff body, it involves regulating g of the personnel working within a certain period in an entity that is mostly done through head count to ensure that the correct role is being done for the right cost. Critically, the human resource should come up with procedures of prospecting managers who fit the activities run by an entity and high quality interviews for the staff to get the right people. However, in the performance of these activities the human resource will be in a position to reach these goals. However, these actions cannot be enhanced and made by an individual, but it will need a mentor to provide advice to the HR office (Caruth, Caruth, and Pane 2009, p.30). The goal deserves attention in increasing the customers tally and calls for a distinct customer service that stands as the differentiating factor with other organisations trading on the same commodity.
Wednesday, November 20, 2019
Technical Instruction Assignment Example | Topics and Well Written Essays - 500 words
Technical Instruction - Assignment Example This essay revolves around task analysis for a 4th generation iPod Touch from Apple Inc. Hierarchical analysis entails decomposing a complex task into subtasks that are easy to understand. In case of operating an iPod, Hierarchical analysis provides detailed description of all steps starting from switching the device on to playing a tune and adjusting audio volume. On the contrary, cognitive analysis provides informative knowledge on optimizing functionality of a product. At this juncture, iPod task analysis can be broken down into subtasks as in the layout below. After acquiring a new iPod, charging is necessary to ensure battery durability. A green light code on the top right corner indicates the deviceââ¬â¢s battery status. Presence of 3 or more green light codes signifies a strong battery status while less than 2 codes indicates a low battery. Charge an iPod Touch through the following steps; Configuration of a device is necessary in order to enhance its security and enhance its functionality. Failure to configure an iPod Touch from Apple will restrict the deviceââ¬â¢s ability to accept and install certain applications from iTunes Store. Configuration of a new device is achieved through the following steps; Modification of contents falls into two broad categories; adding applications and removing applications. Apart from these two tasks, users can engage in other minor modifications like customizing background theme, hiding applications and customizing the lock screen
Monday, November 18, 2019
Marketing Management Assignment Example | Topics and Well Written Essays - 4000 words
Marketing Management - Assignment Example Cadbury has been operating in India for over 60 years now. It started its operation by importing chocolates in 1948. Presently, the company boasts of a market share of above 70% which is the highest share of the brand across the globe. Cadburyââ¬â¢s billion Dollar brand ââ¬ËDairy Milkââ¬â¢ is referred in India as the ââ¬Å"gold standardâ⬠in terms of chocolates. Cadbury was also a pioneer in India for developing cocoa cultivation, since 1965. They have given a quality life to thousands of farmers through their continuous efforts to increase the production of cocoa. No wonder that a Cocoa tree in India is popular in the name of Cadbury tree (Cadbury, n.d.). It can be said that Cadbury is the synonym for chocolates in India and also the brand loyalty of Cadbury in India is quite high. Thus, based on these important criteriaââ¬â¢s, India has been preferred for the launch of a new brand of Cadbury (Doddamani, 2011). Situation Analysis PESTLE Analysis Political Change in regulations and laws regarding international food labelling and trade are bound to affect Cadbury. Cadbury should be aware of the Food Safety Act and should take care in not violating it. Cadbury should also be cautious and ensure that none of its manufacturing plants are breaking laws related to production such as employing minors or paying less wage compared to the stated amount in the Wages Act (Mullerschon, n.d.). Economical The economy in India is a bit stable at this point, thus, launching a new chocolate bar would be supported (Mullerschon, n.d.). The stable economic condition has increased the per capita income which signifies that the disposable income of the populace of the country is higher at present. High rate in consumer spending and decrease in interest rates would help to encourage launching of a new brand (Mullerschon, n.d.). Increase in the population of middle income group would signify increasing demands. The cost of production in India would be low compared to other countries, thus, this would make market penetration easy for Cadbury. The market of chocolate in India is growing and there is immense scope to be exploited. The chocolate industry of India is a unique mix of attitudes, high consumption patterns, income levels, beliefs and spending. The country has high sales and many segments that are still uncovered (Doddamani, 2011). Social People nowadays have become quite health conscious and are trying to cut down on soft drinks, confectionaries and sweat meat because of high cholesterol and calorie. However, Cadbury has an edge over this as their products are becoming substitutes of sweet meat and confectionaries. Cadbury enjoys strong customer loyalty and their opinion is high regarding this company, thus, there is not any reason for the consumers to stop buying their products. The gift culture in India is growing, which will also enable to keep a sustained demand of Cadburyââ¬â¢s products (Mullerschon, n.d.). Technological Producti on is increasing because of machines with high technology and this enables the factories to produce in
Friday, November 15, 2019
Effect of Low Income School on Parent Involvement Article
Effect of Low Income School on Parent Involvement Article (Smith 2006, p. 43) in her article has tried to measure the impact of strategies undertaken to involve parent in child education at a low income school using qualitative research methods. Aims of Article The main aims of this article are to: Define how a low-income school defines intentional parental involvement strategies Define effects of those strategies The Methodology The above article is done as a qualitative research. Qualitative research is done to gain a deep understanding of a specific event, rather than a description of a large sample of a population. It is also called ethnomethodology or field research. It helps create information about human groups in social settings. Qualitative research aims to provide a better understanding of a phenomenon through experience, correct reporting, and quotations of actual conversations. It aims to provide an understanding about how participants tend to interpret their surroundings, and how their interpretations influence their behaviors. The main methodology for conducting this research was conducting a study at a low income school whose new structure was replacing an outdated structure in 2002. During the planning stage of the school community members, parents and agency professionals were involved in development of the new school structure to cater for the needs of low income families and of programs to involve parents in students education at the school. The efforts were then measured using qualitative data collection methods such as participant observation, interviews and document reviews. Participant observation is a period of intensive social interaction between the researcher and the subjects, in the latter's environment. It becomes the full-time occupation of the researcher. Participant observers are trained in techniques of observation, which distinguishes them from regular participants. Interviewing is one of the most commonly used methods for gathering data in qualitative research. Qualitative interviewing is usually different from quantitative interviewing in a number of ways. Interviewing tends to be much less structured in qualitative research. In quantitative research, interviews are usually kept much more structured in order to provide a valid measurement of key concepts that can answer some specific research questions. In qualitative interviewing, deviating is encouraged to give insight into what the interviewee sees as important. This is however discouraged in quantitative research. In qualitative interviewing, interviewers can significantly change the schedule and guide of the interview. In qualitative interviewing, The questions of interview get detailed answers; in quantitative research the interview generates answers that can be processed and statistically analyzed quickly. Researchers supplement qualitative research methods such as interviewing and observation with gathering and analyzing documents produced specifically for the research at hand . As such, the review of documents is an unobtrusive method, rich in portraying the values and beliefs of participants in the setting. Sampling was done using snowball sampling technique. A snowball sample is anon-probability sampling techniquethat is appropriate to use in research when the members of a population are difficult to locate. A snowball sample is a sample in which the researcher collects data from the few members of the target population they can find, then they ask those members from whom the data is collected to provide information on the location of other members of that population whom they know. Snowball sampling hardly leads to a representative sample, but sometimes it may be the best option available. For instance, if you are studying people smoking cannabis, you are not likely to find a list of all the people smoking cannabis in your city. However, if you identify one or two people smoking cannabis that are willing to participate in your study, it is likely that they know other cannabis smoking people in their area. However snowball sampling can be avoided if data about something is readily available. Source: http://www.northumbria.ac.uk/static/images/schoolimages/ar_images/cetl/gilldavisondiagram1.jpg The Setting The setting for this research was Clark Elementary School which was situated beside a city park in a small community surrounded by large industrial complexes. Most of the residents in neighborhood were low income. During the 2003-2004 school year, 5% of the students were American Indian, 3% of the students were Asian, 7% were Black, 19% were Hispanic, and 67% were White. According to the Clark Elementary School website, as of October 1, 2003, the languages spoken were 79% English, 11% Spanish, 6% Russian, 3% Ukrainian, 1% Vietnamese, and 2% other. In 1998 the district began to build a new school in order to replace the old one. A advisory group was formed consisting of members from community organizations, government agencies, the local church, the neighborhood association, the Clark Parent Teacher Organization (PTO), educators from Elementary School, and school district personnel to provide input for development of new school. The school was finally completed in 2002. Data Collection This research was qualitative in nature. Data was collected from the participants in three ways: Observation Interviews Document Reviews Observation:The author acted like a participant observer for before and after school programs, Read and play programs and awards assembly to which all families had been invited. Interviews: Semi-structured, open-ended interviews were conducted with educators, family workers, and parents from Clark Elementary School. 4 administrators were interviewed including the principal, the district consultant, The family Liaison coordinator and the Family Services coordinator. 6 teachers were interviewed, 6 parents were interviewed. For interviews snowball sampling was used. Source:http://www.featurepics.com/FI/Thumb300/20090704/Interview-1236952.jpg Document Reviews: Documents reviewed pertained mostly to the development process for the new school. All materials collected during the design process were examined and all references to the school in the local paper were reviewed. In addition, the school website and monthly newsletters were reviewed. source:http://blogs.adobe.com/acrolaw/files/2011/01/00_quick_review_illustration.png Findings A Foundation of Understanding: Since the school architecture and its programs were developed keeping the opinions of the communities, parents and members of community associations. After the school opened teachers and staff were made to understand the life circumstances of school families. This helped teachers understand parents more and reduced the probability of teachers blaming parents when their children faced academic difficulties and instead has increased the desire for teachers to assist the children. A Broad Definition: A definition of parental involvement emerged at the school which recognized a wide array of behaviors of involvement such as receipt of social services or picking up food or clothing at Family Resource centre. These behaviors also included the learning activities families engaged in while at home. Creating Intentional Parental Involvement Strategies: The intentional parental involvement strategies were designed in two distinct ways: Strategies to Provide Services: During initial meetings after considering the needs of neighborhood families it was decided to make the school in a community center style so as to provide services for low income families. The family resource center in the school helped connect parents with the various activities in school and also provide them with many facilities including computers, free food and clothing provided by government agencies. Strategies to Enhance Parental Involvement: The Clark Committee had designed parental involvement plans based on broad definition of parent involvement and on foundation of understanding. These strategies included inviting parents to school conferences, family nights and access resources offered by Family Resource Centers. All these services were found to have a positive impact of parent involvement and hence positively impacted Clark Elementary School. Benefits of Parental Involvement: Interviewers described better parent involvement leading to academic success. Teachers found that students were more motivated and had better self confidence as a result of parent involvement. Parents also were found to have other benefits of involvement other than academic ones and they could feel themselves part of a community. Recommendations Following things are recommended in this study: In order to develop strategies for parent involvement in low income schools it would be better to input the advice of neighbors and interested agency representatives in order to understand the lives of people the school shall serve. If we can get a clear understanding of the lives of their school families, we ought to encourage definition of parental involvement which would acknowledge a wide list of parental behaviors that lead to academic success. Educators serving low-income populations must consider offering services to the families of their students, thereby bringing parents into the school buildings. Full-service schools can provide services based on the understanding of the needs of the neighborhood, intended to meet the needs of low-income school families. Educators should invite the input and participation of community agencies, businesses, and faith-based groups in any efforts to meet the needs of school families. Offering the opportunity to provide input can encourage them to own the process and make them have a long term participation in the process Educators need to accept that parents may not choose to be involved in education in commonly accepted ways. Conclusion The main point of the article is that a better understanding of the community needs is a must for forming a better definition of parent involvement for the community. Hence, Educators working in low-income communities need a willingness to learn about their student populations and a high degree of commitment to school families in order to better formulate parent involvement strategies in schools. The author has used qualitative research methods to show a relationship between better understanding of the community by the school for introducing steps to increase parent involvement at the college. However, the main problem lies here in the sampling for interviews. Here snowball sampling is being used. This should have been avoided as snowball samples are hardly representatives of target populations and are just used for exploratory purposes. Since data for teachers and parents could have been made available by the school I this case, Using that data could have lead to a better sample cou ld have been prepared that would have been more representative of the population at hand. As it stands the study can be considered a good starting point of research for introducing steps for parent involvement in low income schools. Bibliography Smith, J. G. (2006). Parental Involvement in Education Among Low-Income Families: A Case Study. School Community Journal , 43.
Wednesday, November 13, 2019
We Have the Right to Use Cell Phones While Driving :: Argumentative Persuasive Argument Essays
We Have the Right to Use Cell Phones While Driving Imagine driving in a car and not being able to adjust your radio, roll down your window, or even talk to your passenger. This may sound a bit extreme, but little by little a person's rights are being infringed upon by those who think that using a cellular phone while driving should be illegal. Using a cell phone while driving is no different than a mother tending to her children in the backseat, a person eating in a car, or even someone engrossed in conversation with their passenger. Can these rights be taken away, can common sense be legislated? Cell phones first became available in the year 1984 and have only grown in popularity since (Stutts et al.). Today there are over one hundred and twenty-eight million users (Pickler). In recent years, cell phones have been in the spotlight for causing drivers to be distracted, resulting in a number of crashes. New York has become the first state to ban the use of hand-held phones when driving on public highways. This new law went into effect on December 1, 2002. Drivers may only use a hand held phone "in an emergency, to call for help or to report a dangerous situation." However, drivers are allowed to use hands free devices such as speaker phones ("New. . ."). Currently, there are thirty-eight other states with bills like this one in the process (Breslau and Naughton 46). Many are upset about these laws because data on the actual number of cell phone related car accidents is not complete. According to a spokeswoman for Cellular Telecommunications and Internet Association, " There ar e not a lot of substantial findings" (Pickler). It's too early to tell if New York's new law is lowering the number of deaths caused by cell phones (Alonso-Zalvidar). Although around 2,600 people die each year from cell phone related accidents, a cell phone user only has around thirteen chances in a million of dying in a cell-phone related automobile accident. This is three times less than the chances of being killed by not wearing a seatbelt. Other motorists and pedestrians have a four in one million chance of being killed by a driver using a cell phone; the chance of getting killed by a drunk driver is four times as high (Pickler). Granted, every single human life is important, but these figures show that cell phones pose only a very small risk.
Sunday, November 10, 2019
Philosophy Sections 7.1 & 7.2 Essay
1. What are the requirements for knowledge? 4.What is Platoââ¬â¢s allegory of the cave supposed to demonstrate? Platoââ¬â¢s allegory of the cave is supposed to demonstrate not only the human situation in general but Socratesââ¬â¢ life in particular. Socrates glimpsed the true nature of reality and tried to convince the inhabitants of Athens that they didnââ¬â¢t know what they thought they knew. The objects that cast shadows on the wall represent what Plato considers to be the truly real objects: the forms. 5.What is Descartesââ¬â¢ dream argument? Descartesââ¬â¢ dream argument is as followed: 1) We canââ¬â¢t be certain that weââ¬â¢re not dreaming. 2) If we canââ¬â¢t be certain that weââ¬â¢re not dreaming, we canââ¬â¢t be certain that what we sense is real. 3) If we canââ¬â¢t be certain that what we sense is real, we canââ¬â¢t acquire knowledge through sense experience. 4) Therefore, we canââ¬â¢t acquire knowledge through sense experience. According to Descartes, you canââ¬â¢t rule out the possibility that youââ¬â¢re dreaming so youââ¬â¢re senses canââ¬â¢t give you knowledge of the external world. 8. Why do empiricists believe that there are no synthetic a priori truths? Empiricists believe that there are no synthetic a priori truths because they believe that sense experience is our only source of knowledge of the external world. 9.How does Kant explain the possibility of synthetic a priori truths? Kant explained the possibility of synthetic a priori truths by examining the method of inquiry used by mathematicians. Kant found that what makes it possible for mathematicians to discover such truths is that they study the principles the mind uses to construct mathematical objects. Section 7.2 (3 and 4) 3. What is representative realism? Representative realism is the doctrine that sensations are caused by external objects and that our sensations represent these objects. 4. What is the distinction between primary and secondary qualities? The distinction between primary and secondary qualities is that while secondary qualities exist in the mind not in the actual object, primary qualities are possessed by material objects.
Friday, November 8, 2019
Chasmosaurus Facts and Figures
Chasmosaurus Facts and Figures Name: Chasmosaurus (Greek for cleft lizard); pronounced KAZZ-moe-SORE-us Habitat: Woodlands of western North America Historical Period: Late Cretaceous (75-70 million years ago) Size and Weight: About 15 feet long and 2 tons Diet: Plants Distinguishing Characteristics: Huge, rectangular frill on neck; small horns on face About Chasmosaurus A close relative of Centrosaurus, and thus classified as a centrosaurine ceratopsian, Chasmosaurus was distinguished by the shape of its frill, which spread out over its head in an enormous rectangle. Paleontologists speculate that this giant awning of bone and skin was lined with blood vessels that allowed it to take on bright colors during mating season and that it was used to signal availability to the opposite sex (and possibly to communicate with other members of the herd). Perhaps because the addition of horns would have been simply too much (even for the Mesozoic Era), Chasmosaurus possessed relatively short, blunt horns for a ceratopsian, certainly nothing approaching the dangerous apparatus of Triceratops. This may have something to do with the fact that Chasmosaurus shared its North American habitat with that other famous ceratopsian, Centrosaurus, which sported a smaller frill and a single large horn on its brow; the difference in ornamentation would have made it easier for two competing herds to steer clear of each other. By the way, Chasmosaurus was one of the first ceratopsians ever to be discovered, by the famous paleontologist Lawrence M. Lambe in 1898 (the genus itself was later diagnosed, on the basis of additional fossil remains, by Charles R. Sternberg). The next few decades witnessed a bewildering multiplication of Chasmosaurus species (not an unusual situation with ceratopsians, which tend to resemble one another and can be difficult to distinguish at the genus and species level); today, all that remain are Chasmosaurus belli and Chasmosaurus russelli. Recently, paleontologists discovered the amazingly well-preserved fossil of a Chasmosaurus juvenile in Albertas Dinosaur Provincial Park, in sediments dating to about 72 million years ago. The dinosaur was about three years old when it died (most likely drowned in a flash flood), and lacks only its front legs.
Wednesday, November 6, 2019
Government Term Paper Topics
Government Term Paper Topics In the recent years government term paper topics are becoming more and more popular. Students all over the US need to write a good paper on a government term paper topic. In order to be able to write a good paper on government term paper topic ââ¬â a student has to possess certain information on the government term paper topic he chooses. Basically, the writing a paper on government term paper topics ââ¬â is conducting a quality research on the government activity and the effect it makes on modern life of an American. The research can be conducted in several ways: An experts opinion. This is the most trusted way, as if you have access to an experts opinion on a government issue ââ¬â you are guaranteed to have a good term paper, and its relevance will be proved by the opinion that is generated by the expert. This way is the best, but by far not the most convenient and easy. The internet ââ¬â is an easy way to find information on the topic. The great strength of this method is that you can find multiple opinions on the government term paper topic and make your own conclusions towards this issue. The weakness of this technique is that it is not always so easy to find even one opinion. You will need to browse through thousands of web pages and not even find a single relevant thing. Multiple newspaper articles and professional journals may be used a relevant source of information. These types of information usually contain professional opinions on things going on in the government, but it may be difficult to find something according to your topic as well as use it without citation and referencing. If you decide to write a paper on either of the government term paper topics ââ¬â the main idea is to conduct proper research and only then ââ¬â write the term paper. If you are having difficulties with writing a paper on various government term paper topics ââ¬â why not consider having an expert write it for you? CustomWritings.com is eager to help you with any of your assignments. We have hired experts, who are proficient in almost all government term paper topics, and all of them can be easily assigned to your paper. If you are seeking for proper government term paper topics help ââ¬â consider CustomWritings.com as your number one assistant. We will make sure you will be delivered a good paper on a government term paper topic. We provide top quality custom term papers written absolutely from scratch. Here is a list of the most popular governmental essay topics: 1. Government Monitoring the Public Right or Wrong? 2. Fascism as a form of government. 3. Principles of the American Government 4. Government Supplied Health Insurance for all Taxpayers and their Dependents 5. How effective was the provisional government? 6. Government Intervention in Individual Markets: A Look at Government Intervention and Antitrust Law via the Microsoft Case 7. Colombian Government vs. The FARC. Who are they and what are they fighting for? 8. The role of government in the economy 9. Issues Facing the New Federal Government 10. Issues in Australian Government and foreign policy 11. Presidential and parliamentary governments 12. 1984 Governmental control over the media and loss of privacy 13. Links between GDP, Consumption, Investment and Government Expenditure 14. What are the major ideas of government and society contained in the Indian Constitution? 15. History of Roman Government 16. American citizens duties and obligations to the government based on the constitution 17. How has the Australian Government and media portrayed the refugee situation? 18. The Governmentââ¬â¢s Role in a Market Economy 19. E-Government and E-Procurement 20. Outline Government 21. State Local Government Accounting 22. How do government policies influence the level of inequality in the distribution of income and wealth? 23. Government control over equality 24. Government Relations and business 25. Religions impact on US government 26. Government Censorship 27. Internet Regulation ââ¬â Government Involvement 28. What is presidential government and parliamentary government? 29. US Airways and Government Aid 30. Globalisation and Government Incentives
Monday, November 4, 2019
Space Race (specifically the early years) Research Paper
Space Race (specifically the early years) - Research Paper Example strong technological and security, competition, Russia was ahead of the United States, but this later changed when the United States sent the first man to moon. This research will demonstrate the space race timeline and highlight some of the major events of this period. The initial advantages that Russia had over the united states will also be discussed and other programs that the united states have launched in order to achieve their space interests. The fall of the Nazi German after the Second World War saw the United States and German emerge as major superpowers who had the technological abilities to control major innovations in the world. The two countries were embroiled in a major silent political, geographical and military tussle that was christened the cold war, an era when technological advancements were at their peak. Based on the newspaper headlines of the 50s and the 60s, the Soviet Union was way ahead of the United States on the development of space capability, a situation that bolted the later into action, opening the area for major competition. The initial periods of the space race was marked with major secret spying between the United States and the Soviet Union as the two countries were concerned of the major technological research activities being undertaken by the other. The united states were still concerned with the pearl harbor attack and was interest in revenging against the soviet union, a country that was using all means possible to keep their depleted army resources a top secret1. President Dwight Eisenhower of the United States introduced the open skies in 1955, marking the beginning of an era of space exploration and major discoveries. This policy allowed the Soviet Union and the United States to fly reconnaissance aircrafts over each otherââ¬â¢s airspace as a way of gathering intelligence information. In the same year, the United States announced that it will be working on the development of a scientific satellite, prompting the Soviet
Friday, November 1, 2019
Company profile for the media company HBO (Home Box Office) Term Paper
Company profile for the media company HBO (Home Box Office) - Term Paper Example The channel is expanding its broadcast continuously by licensing its broadcast to television networks and presently people of about 151 countries around the world are enjoying its original programs. At the same time, HBOââ¬â¢s branded premium pay and basic cable networks are operating in about 50 countries of Latin America, Central and Western Europe, and some parts of Asia as well (http://www.timewarner.com). At the end of 2011, it had about 81 million global subscribers out of which 42.5 million are international premium pay and basic cable subscriber while rest of 39.4 million are nationwide premium pay subscriber. HBO is available in HD on number of multiplex channels like Direct TV, Cox Communication, Xfinity, Time Warner Cable, and Dish Network etc. The year 2011 is the fourth consecutive year when HBO has won 4 Golden Globes award more than any network while it has been the 10th consecutive year when it has won 8 Sports Emmys and 19 Primetime Emmys in 2011 (HBO Annual Repor t, 2010). Strangers No More, a documentary film of HBO received Academy Award for the category of Best Documentary. 1. What do they do in media? HBO mainly operates television films, comedy shows and concerts, motion pictures and original series, and occasionally boxing matches via cable, direct broadcast satellite (DBS), C-band satellite, and microwave (MMDS). The network has offered HBO On Demand. It means HBO has given a wonderful option to its subscriber to watch its programs according to their own schedule. A big share of HBOââ¬â¢s programs consists of egalitarian theatrical motion pictures. For this purpose, HBO acquires license agreements from the producers or distributors of such recently released films. Under such agreements, HBO gets exclusive rights to broadcast and distribute recently released or old films. The license agreement always depends on the performance of films on the box office. High-quality award winning original comedy and theatrical series is another bro adcast segment of HBO e.g., Boardwalk Empire, Curb Your Enthusiasm, True Blood, and Boardwalk Empire. Besides these, HBO also shows boxing matches, family programs, sports news, and commentaries. 2. How long has this business been in operation, what is their history? Charles Dolan, one of the pioneers of cable networks systems in United States of America, presented the business plan of ââ¬ËGreen Channelââ¬â¢ to Time Life Inc. On 8 November, 1972 the channel became Home Box Office or HBO (Forsyth, 2002). ââ¬ËSometimes a Great Notionââ¬â¢ was the first ever program aired on HBO. In 1973, Time Life Inc took over the control of newly established channel as Gerald Levin became the first President as well as CEO of HBO. Initially churn rate from subscribers was so high. HBO was tumbling and any debacle could have been occurred. At that time, Levin introduced the broadcasting in Massachusetts. Here a preview of service was offered for free on Channel 3. This offer showed promis ing results as HBO gained a good number of subscribers. Later on the same strategy was applied in other states. On 30th September 1975, HBO put on air the first ever live boxing match between Muhammad Ali and Joe Frazier and thus became the first television channel which delivered the telecast through satellite medium (http://transition.fcc.gov). HBO launched its companion network Cinemax in 1980 which is still very popular and known for its late night soft-core adult shows and series. In 1981, HBO extended its broadcast from 09 hours to 24 hours. In 1983, HBO presented its first kidsââ¬â¢ show. Until 2001, HBO showed number of programs for children when these programs were shifted entirely to HBO Family channel. The decade of 80s
Subscribe to:
Posts (Atom)