Monday, September 30, 2019

India and China: Are catch-up theories relevant? Essay

For many decades, Japan has been the dominant power in Asia. Since 1945, America with the help of its close ally, Japan has dominated Asia. The spectacular rise of China during the past two decades has the potential to change this status quo. During the past 6-7 years, with impressive economic growth, India also has emerged as a nation to reckon with. USA and Japan see a stronger India as a means to limit China’s freedom to maneuver in the region. In short, Asia is becoming an arena for balance of power politics. After more than a century of relative stagnation, the economies of India and China have been growing at remarkably high rates over the past 25 years. In 1820 the two countries contributed nearly half of the world’s income; starting from roughly equal levels of per capita real income in 1870, India forged ahead of China until the outbreak of the First World War. Though both experienced declines in their per capita incomes thereafter (China more so than India) by 1950, India’s per capita income was about 40% higher than that of China. During the same period, the industrialized West pulled away, India and China had a share of less than one-tenth of the world income. It took roughly the next three decades for China to catch up with India. Since 1980, China has forged much farther ahead. China and India were the star performers in aggregate GDP growth in the 1980s and 1990s. China’s average growth of 10. 6% per year during the 90s had slowed slightly since to 9. 4%. India on the other hand albeit much lower rate of 6% in the 90s has a slight improvement since to 6. 2% (see Exhibit 1). Today, India and China are in 154th and 121st positions in a listing of the 230-odd countries ranked by per capita GDP. But their share in world GDP is around 2% and 5% respectively thanks to their billion-plus populations . Two countries account for 37. 5 percent of world population and 6. 4 percent of the value of world output. India and China have sustainable growth rates 7% and 10% respectively whereas the developed countries (USA, Japan, Germany, UK, France, Italy, Spain, and Canada) have only 2% even though they contribute nearly 66% of world GDP. Given the kind of dramatic growth relative to the rest of the world, it has become very fashionable to compare India and China and indulge in a bit of crystal ball gazing. The two countries with one third of the world’s population is not only dominating the world statistics but also attracting the due attention of everyone like policymakers, industrial corporate, and economists alike. Understandably, there is a great deal of interest in learning about what has enabled China and India to grow so rapidly while many countries in Sub-Saharan Africa and Latin America have languished during the same period. Their growth already started showing its effect on global resources and if it continues as is expected for next two decades, it will have major implications on the world economy and hence for other countries. China’s economic reforms: During his tenure as China’s premier, Mao Zedong had encouraged social movements such as the Great Leap Forward and the Cultural Revolution which had had as their bases ideologies such as serving the people and maintaining the class struggle. However, two years after Mao’s death in 1976, Chinese leaders were searching for a solution to serious economic problems produced by these movements which left China in a state where agriculture is stagnant, industrial production was low, and the people’s living standards had not increased in twenty years. Communist Party leaders saw economic reform as a way to regain their and their party’s moral virtue and prestige which was eroded by the traumatic experience of the Cultural Revolution (Shirk, 1993). The initial reforms were not that radical in nature. The central government retained the dominant power in economic resource allocation and responsible local officials worked for the interest of the units under their control (Solinger, 1993). However, as time passed, some aspects of the old system were altered. In 1985, further reforms were introduced. The first part of Chinese economic reform involved implementing the household responsibility system in agriculture, by which farmers were able to retain surplus over individual plots of land rather than farming for the collective. Some commodities were freed from government controls so their prices could respond to market demand (Shirk, 1993). This allowed a great percentage of the populace to become involved in private enterprise and investment in family or group ventures. The conditions also allowed rural Chinese to leave the villages and become involved in industry in urban centers. The economy grew so quickly that inflation occurred and the government had to reinstitute price controls. China’s economy retains these characteristics of potential for growth–and inflation–to this day. Another important aspect of Chinese economic reform was the decision of China to join the world economy. Deng Xiaoping and his allies hoped to affect this 1979 resolution in two ways: by expanding foreign trade, and by encouraging foreign companies to invest in Chinese enterprises. The Open Policy, which designated limited areas in China â€Å"as places with preferential conditions for foreign investment and bases for the development of exports† (Nathan, 1990), was extremely successful in the areas where it was implemented. The implementation of the Open Policy was so successful that by 1988 the leaders of the CCP were encouraged to create a new program called the â€Å"coastal development strategy. † In this program, even more of the country was opened up to foreign investment-an area which, at the time, included nearly 200 million people. Moreover, by involving more overseas investors, â€Å"importing both capital and raw materials,† and â€Å"exporting China’s cheap excess labor power,† the new policy was one of â€Å"export-led growth or export-oriented industrialization†. It was explicitly modeled on the experiences of Taiwan and the other Asian ‘small dragons’ (Nathan, 1990). China took another step in the late 1990s and early 2000s, by the closing of unprofitable state-owned factories and the development of social security systems.

Sunday, September 29, 2019

The Return: Midnight Chapter 20

Meredith usual y found her parents funny and sil y and dear. They were solemn about al the wrong things like, â€Å"Make sure, honey, that you real y get to know Alaric – before – before – â€Å"Meredith had no doubts about Alaric at al , but he was another of those sil y, dear, gal ant people, who talked al around things without getting to the point. Today, she was surprised to see that there was no cluster of cars around the ancestral home. Maybe people had to stay home to fight it out with their own children. She locked the Acura, conscious of the precious contents given by Isobel, and rang the doorbel . Her parents believed in chain locks. Janet, the housekeeper, looked happy to see her but nervous. Aha, Meredith thought, they have discovered that their dutiful only child has ransacked the attic. Maybe they want the stave back. Maybe I should have left it back at the boardinghouse. But she only realized that things were truly serious when she came into the family room and saw the big La-Z-Boy deluxe lounging chair, her father's throne: empty. Her father was sitting on the couch, holding her mother, who was sobbing. She had brought the stave with her, and when her mother saw it, she broke into a fresh burst of tears. â€Å"Look,†Meredith said, â€Å"this doesn't have to be so tragic. I've got a pretty good idea of what happened. If you want to tel me about how Grandma and I real y got hurt, that's your business. But if I was†¦contaminated in some way†¦Ã¢â‚¬  She stopped. She could hardly believe it. Her father was holding out an arm to her, as if the somewhat rank condition of her clothes didn't matter. She went to him slowly, uncomfortably, and let him hug her regardless of his Armani suit. Her mother had a glass with a few sips left of what looked like Coke in front of her, but Meredith would bet it wasn't al Coke. â€Å"We'd hoped that this was a place of peace,†her father orated. Every sentence her father spoke was an oration. You got used to it. â€Å"We never dreamed†¦Ã¢â‚¬ And then he stopped. Meredith was stunned. Her father didn't stop in the middle of an oration. He didn't pause. And he certainly didn't cry. â€Å"Dad! Daddy! What is it? Have kids been around here, crazy kids? Did they hurt somebody?† â€Å"We have to tel you the whole story from that time long ago,†her father†¦said. He spoke with such despair that it wasn't anything like an oration. â€Å"When you were†¦al attacked.† â€Å"By the vampire. Or Grandfather. Or do you know?† Long pause. Then her mother drained the contents of her glass and cal ed, â€Å"Janet, another one, please.† â€Å"Now, Gabriel a – â€Å"her father said, chiding. â€Å"‘Nando – I can't bear this. The thought that mi hija inocente†¦Ã¢â‚¬  Meredith said, â€Å"Look, I think I can make this easier for you. I already know†¦Well, first, that I had a twin brother.† Her parents looked horrified. They clung together, gasping. â€Å"Who told you?†her father demanded. â€Å"At that boardinghouse, who could know – ?† Calming down time. â€Å"No, no. Dad, I found out – Well, Grandpa talked to me.†That was true enough. He had. Just not about her brother. â€Å"Anyway, that was how I got the stave. But the vampire that hurt us is dead. He was the serial kil er, the one who kil ed Vickie and Sue. His name was Klaus.† â€Å"You thought that there was only one vampire?†her mother got out. She pronounced the word the Hispanic way, which Meredith always found more scary. Vahm-peer. The universe seemed to start moving slowly around Meredith. â€Å"That's just a guess,†her father said. â€Å"We don't real y know that there was more than the very strong one.† â€Å"But you know about Klaus – how?† â€Å"We saw him. He was the strong one. He kil ed the security guards at the gate with one blow each. We moved to a new town. We hoped you would never have to know you had a brother.†Her father brushed his eyes. â€Å"Your grandfather spoke to us, right after the attack. But the next day†¦nothing. He couldn't talk at al .† Her mother put her face in her hands. She only lifted it to cal , â€Å"Janet! Another, por favor!† â€Å"Right away, ma'am.†Meredith looked to the housekeeper's blue eyes for the solution to this mystery and found nothing – sympathy, but no help. Janet walked away with the empty glass, blond French braid receding. Meredith turned back to her parents, so dark of eye and hair, so olive of skin color. They were huddling together again, eyes on her. â€Å"Mom, Dad, I know that this is real y hard. But I'm going after the kind of people who hurt Grandpa, and Grandma, and my brother. It's dangerous, but I have to do it.†She dropped into a Taekwondo stance. â€Å"I mean you did have me trained.† â€Å"But against your own family? You could do that?†her mother cried. Meredith sat down. She had reached the end of the memories that she and Stefan had found. â€Å"So Klaus didn't kil him like Grandmother. He took my brother with him.† â€Å"Cristian,†wailed her mother. â€Å"He was just un bebe. Three years old! That was when we found the two of you†¦and the blood†¦oh, the blood†¦Ã¢â‚¬  Her father got up, not to orate, but to put his hand on Meredith's shoulder. â€Å"We thought it would be easier not to tel you – that you wouldn't have any memories of what was happening when we came in. And you don't, do you?† Meredith's eyes were fil ing with tears. She looked to her mother, trying to silently tel her she couldn't understand this. â€Å"He was drinking my blood?†she guessed. â€Å"Klaus?† â€Å"No!†cried her father as her mother whispered prayers. â€Å"He was drinking Cristian's, then.†Meredith was kneeling on the floor now, trying to look up into the face of her mother. â€Å"No!†cried her father again. He choked. â€Å"La sangre!† gasped her mother, covering her eyes. â€Å"The blood!† â€Å"Querida – † her father sobbed, and went to her. â€Å"Dad!†Meredith went after him and shook his arm. â€Å"You've ruled out al the possibilities! I don't understand! Who was drinking blood?† â€Å"You! You!† her mother almost screamed. â€Å"From your own brother! Oh, el aterrorizar!† â€Å"Gabriel a!†moaned her father. Meredith's mother subsided into weeping. Meredith's head was whirling. â€Å"I'm not a vampire! I hunt vampires and kil them!† â€Å"He said,†her father whispered hoarsely: â€Å"‘Just see she gets a tablespoon a week. If you want her to live, that is. Try a blood pudding.'He was laughing.† Meredith didn't need to ask if they had obeyed. At her house, they had blood sausage or pudding at least once a week. She had grown up with it. It was nothing special. â€Å"Why?†she whispered hoarsely now. â€Å"Why didn't he kil me?† â€Å"I don't know! We Stilldon't know! That man with his front al dripping with blood – your blood, your brother's blood, we didn't know! And then at the last minute he grabbed for the two of you but you bit his hand to the bone,†her father said. â€Å"He laughed – laughed! – with your teeth clamped in him and your little hands pushing him away, and said, ‘I'l just leave you this one, then, and you can worry about what she wil turn out to be. The boy I'm taking with me.'And then suddenly I seemed to come out of a spel , for I was reaching for you again, ready to fight him for both of you. But I couldn't! Once I had you, I couldn't move another inch. And he left the house Stilllaughing – and took your brother, Cristian, with him.† Meredith thought. No wonder they didn't want to hold any kind of celebration on the anniversaries of that day. Her grandmother dead, her grandfather going crazy, her brother lost, and herself – what? No wonder they celebrated her birthday a week early. Meredith tried to stay calm. The world was fal ing to pieces around her but she had to stay calm. Staying calm had kept her alive al her life. Without even having to count, she was breathing out deep, and in through her nostrils, and out through her mouth. Deep, deep, cleansing breaths. Soothing peace throughout her body. Only part of her was hearing her mother: â€Å"We came home early that night because I had a headache – â€Å" â€Å"Sh, querida – â€Å"her father was beginning. â€Å"We got home early,†her mother keened. â€Å"O Virgen Bendecida, what would we have found if we had been late? We would have lost you, too! My baby! My baby with blood on her mouth – â€Å" â€Å"But we got home early enough to save her,†Meredith's father said huskily, as if trying to wake her mother from a spel . â€Å"Ah, g racias, Princesa Divina, Vigen pura y impoluto†¦Ã¢â‚¬ Her mother couldn't seem to stop crying. â€Å"Daddy,†Meredith said urgently, aching for her mother but desperately needing information. â€Å"Have you ever seen him again? Or heard about him? My brother, Cristian?† â€Å"Yes,†her father said. â€Å"Oh, yes, we have seen something.† Her mother gasped. â€Å"‘Nando, no!† â€Å"She has to learn the truth sometime,†her father said. He rummaged among some cardboard file folders on the desk. â€Å"Look!†he said to Meredith. â€Å"Look at this.† Meredith stared in utter disbelief. In the Dark Dimension Bonnie shut her eyes. There was a lot of wind at the top of a tal building's window. That was al her mind had a thought for when she was out of the window and then back into it and the ogre was laughing and Shinichi's terrible voice saying, â€Å"You don't real y think we'd let you go without questioning you thoroughly?† Bonnie heard the words without them making sense, and then suddenly they did. Her captors were going to hurt her. They were going to torture her. They were going to take her bravery away. She thought she screamed something at him. Al she knew, though, was that there was a soft explosion of heat behind her, and then – unbelievably – al dressed up in a cloak with badges that made him look like some kind of military prince, there was Damon. Damon. He was so late she'd long ago given up on him. But now he was flashing a there-and-gone bril iant smile at Shinichi, who was staring as if he'd been stricken dumb. And now Damon was saying, â€Å"I'm afraid Ms. McCul ough has another engagement at that moment. But I wil be back to kick your ass – immediately. Move from this room and I'l kil you al , slowly. Thank you for your time and consideration.† And before anyone could even recover from their first shock at his arrival, he and Bonnie were blasting off through the windows. He went, not out of the building backward as if retreating, but straight ahead forward, one hand in front of him, wrapping them both in a black but ethereal bundle of Power. They shattered the two-way mirror in Bonnie's room and were almost al the way through to the next room before Bonnie's mind tagged the first â€Å"empty.†Then they were crashing through an elaborate videoset-window – made to let people think they had a view of the outdoors, and flying over someone lying on a bed. Then†¦it was just a series of crashes, as far as Bonnie was concerned. She barely got a glimpse of what was going on in each room. Final y†¦ The crashing stopped. This left Bonnie holding on to Damon koala-style – she wasn't stupid – and they were very, very high in the air. And mobilizing in front of them, and off to the sides, and as far as Bonnie could see, were women who were also flying, but in little machines that looked like a combination of a motorcycle and a Jet Ski. No wheels, of course. The machines were al gold, which was also the color of each driver's hair. So the first word Bonnie gasped to her rescuer, after he had blasted a tunnel through the large slave-owner's building to save her, was, â€Å"Guardians?† â€Å"Indispensable, considering the fact that I didn't have the first idea where the bad guys might have taken you and I suspected that there might be a time limit. This was actual y the very last of the slave-sel ers we were due to check. We final y†¦lucked out.†For someone who had lucked out, he sounded a little strange. Almost†¦choked up. Water was on Bonnie's cheeks but it was being flicked away too fast for her to wipe it. Damon was holding her so that she couldn't see his face, and he was holding her very, very tightly. It real y was Damon. He had cal ed out the cavalry and, despite the city-wide mind-gridlock, he had found her. â€Å"They hurt you, didn't they, little redbird? I saw†¦I saw your face,†Damon said in his new choked-up voice. Bonnie didn't know what to say. But suddenly she didn't mind how hard he squeezed her. She even found herself squeezing back. Suddenly, to her shock, Damon broke her koala-grip and pul ed her up and kissed her on the lips very gently. â€Å"Little redbird! I'm going to go now, and make them pay for what they did to you.† Bonnie heard herself say, â€Å"No, don't.† â€Å"No?†Damon repeated, bewildered. â€Å"No,†Bonnie said. She needed Damon with her. She didn't care what happened to Shinichi. There was a sweetness unfolding inside her, but there was also a rushing in her head. It real y was a pity, but in a few moments she would be unconscious. Meanwhile, she had three thoughts in mind and al of them were clear. What she was afraid of was that they would be less clear later, after she had fainted. â€Å"Do you have a star bal ?† â€Å"I have twenty-eight star bal s,†Damon said, and looked at her quizzical y. That wasn't what Bonnie meant at al ; she meant one to record onto. â€Å"Can you remember three things?†she said to Damon. â€Å"I'd gamble on it.†This time Damon kissed her softly on the forehead. â€Å"First, you ruined my very brave death.† â€Å"We can always go back and you can have another try.†Damon's voice was less choked now; more his own. â€Å"Second, you left me at that horrible inn for a week – â€Å" As if she could see inside his mind, she saw this slice into him like some kind of wooden sword. He was holding her so tightly that she real y couldn't breathe. â€Å"I†¦I didn't mean to. It was real y only four days, but I never should have done it,†he said. â€Å"Third.†Bonnie's voice dropped to a whisper. â€Å"I don't think any star bal was ever stolen at al . What never existed can't be stolen, can it?† She looked at him. Damon was looking back in a way that normal y would have thril ed her. He was obviously, blatantly distressed. But Bonnie was just barely hanging on to consciousness at this point. â€Å"And†¦fourth†¦Ã¢â‚¬ She puzzled out slowly. â€Å"Fourth? You said three things.†Damon smiled, just a little. â€Å"I have to say this – â€Å"She dropped her head down on Damon's shoulder, gathered al of her energy, and concentrated. Damon loosened his grip a little. He said, â€Å"I can hear a faint murmuring sound in my head. Just tel me normal y. We're well away from anyone.† Bonnie was insistent. She scrunched her whole tiny body together and then explosively sent out a thought. She could tel that Damon caught it. Fourth, I know the way to the seven legendary kitsune treasures, Bonnie sent to him. That includes the biggest star ball ever made. But if we want it, we have to get to it – fast. Then, feeling that she had contributed enough to the conversation, she fainted.

Saturday, September 28, 2019

How Has the Management of People Evolved In Recent Years Essay

How Has the Management of People Evolved In Recent Years - Essay Example In response, welfare officers performed the paternal role of caring for injured employees and advocating for better treatment among women and children. Further research into the management of labour discovered abuse of managerial power and resources at the height of bureaucracy, which showed no concern for the welfare of workers (Haston n.d. p.3). For this reasons, a humanistic perspective demonstrated the need to understand human behaviour and recognise control among workers as opposed to managers. This approach demonstrated increased productivity in institutions that treated their employees better. Trade unions were formed to serve as a bridge between workers and the management where representatives negotiated terms of services in the organisation. Unionism revolutionised interactions between industrial organisations and their employees by providing a united front against poor working conditions by negotiating for improvements (Edwards 2009, p.227). Similarly, trade unions advocate d for policy adherence and a standard compensation model for workers. In 1970s, the existence of a consistent set of regulations governing organisations’ relations to their employees provide an essential framework termed as personnel management (Aswathappa 2005, p.18). This aspect of management is charged with the responsibility of selecting and recruiting workers, training, offering compensation and rewards, employee welfare, and facilitating employee transition. However, personnel management was not without criticism where critics refer to the ambiguous nature that based on emphasis on workers’ welfare with little gain to the organisation (Watson n.d, p.1). Critics argue that personnel management should be reverted line managers who are familiar with... This report stresses that following globalisation, there has been marked increase in competitiveness across business organisations, which demands a strategic approach to the management of human resources. Strategic planning is illustrative of a methodical and structural process through which an organisation identifies direction, and develops an approach to allocate resources. This process is geared towards identifying and prioritising short-term as well as long-term goals in order to maximise efficiency and profitability. Presently, management of human resources adopts a strategic perspective in order to be aligned with the goals of the organization and to be integrated into the organization’s needs. This paper makes a conclusion that while personnel management and human resource management appear similar, there exists differences that are of significance to the success of an organisation. Personnel management is based on short-termed goals and addresses immediate concerns while on the other hand, HRM involves strategic planning of the institution’s workforce in a long-term perspective. Also, the personnel management approach illustrates the psychological contract as compliance and adherence of workers to the demands made by the employer. On the other hand, HRM subscribes to the idea that employees indicate commitment and willingness to participate in fulfilling the mandate of the organisation without authoritarian specifications.

Friday, September 27, 2019

Law of Property Act 1925's Research Paper Example | Topics and Well Written Essays - 1000 words

Law of Property Act 1925's - Research Paper Example The land is defined in the Law of Property Act 1925, s. 205(1)(ix) as including 'the surface, buildings or parts of buildings' and whatever is attached to the land becomes part of the land. This raises, in practice, an important problem relating to ownership of those items which, but for the fact that they are attached to the land, would constitute chattels. The distinction needs to be drawn between those items which are fixtures, and therefore part of the reality, and those which are not, and therefore remain personally. One of the very established presumptions of UK Land Law is that whatever is attached to the land is part of the land as a fixture. Thus, if the land is sold, items which can be classed as fixtures pass to the buyer as part of the reality. There is no need for separate mention of these items in the contract as would be the case for chattels. An object which is brought onto land may be classified under one of three Broadheads. In general, a thing fixed to or in a relationship with the land is a fixture and is legally treated as a party of the land itself. The doctrine, therefore, transforms the personal property into real property. The doctrine of fixtures can have dramatic consequences. In Brand Vs Chris Building Society Pty Ltd a house built on the wrong block of land became part of that land, rendering it the property of the owner of the land. It can be difficult to distinguish between chattels and fixtures. The general rule is that when something is annexed to the land it becomes part of the land. It is, however, very difficult to say with precision what constitutes sufficient annexation. Should first look at extrinsic clues, most notably any contract between the parties.

Thursday, September 26, 2019

Enclosed in description Assignment Example | Topics and Well Written Essays - 750 words

Enclosed in description - Assignment Example Forms are abstract and do not change over time. Shields commenting on this states that â€Å"Forms are objects of knowledge, and since knowledge requires stable, unchanging objects, Forms must have these attributes† (Shields 87). 2. The fact that Socrates does not follow Crito’s advice regarding escape from jail and execution is an indication of the man’s strong conviction regarding justice. He sees escape as morally unjust. It is another matter whether Socrates is guilty or not. According to him it is not right to go against the law. Doing a wrong to correct a wrong is not right. It is equal to the concept of ‘an eye for an eye’ and escaping will result in a great man going against justice. It is not correct to provide such an image (of moral injustice) to the public. Escaping will result in such an image. Crito fears shame because unless Socrates escapes, the public will think that friends (of Socrates) had done nothing to save the philosopher’s life. 3. According to Socrates, an expert is a person who should deliver his goods or advice without contradicting oneself. Morality should also be an essential element. The many cannot really do anything good or bad. The problem with going along with the many is that it can corrupt the morals and sense of justice within a person. The many in this context is the large number of people who want Socrates to escape. But the moral expert would not advice such an act since it would be against justice. This is precisely what Socrates wants Crito to understand. 4. It is not the size of the state that matter, but the strength of the reason for which it was created. The people should work towards upholding that reason and should obey each and every direction given by the state. They may even have to die for it. No individual can survive alone and can do so only under a state’s rule. The state has the power to make individual

Wednesday, September 25, 2019

Genetic reprogramming holds great promise for the discipline of Research Paper

Genetic reprogramming holds great promise for the discipline of regenerative medicine, because of the ability to obtain patient- - Research Paper Example These cells are similar to embryonic cells in that they can differentiate into the various body cells under favorable conditions. The advantage of iPSCs cells over the embryonic cells is that they do not need embryos during production. This makes the technology ethically acceptable. IPSCs cells production involves inserting of stem cell associated genes into specialized somatic cells using viral vectors (Xiong et al 1). Genetic engineers hopefully believe iPSCs cells will initiate the production of cells or tissue from a patient that will repair the damaged tissues. The cells regenerated through induced pluripotent stem cell method are most suitable in restoring damaged cells and tissues. This is because the patient’s immune system will readily tolerate them. This will eliminate the problem of graft rejection exhibited in xenografts or isografts. Elimination of immune suppressive drugs on patients usually does happen. Despite all these seemingly possible setbacks, induced plur ipotent stem cells have proofed to be the future of the regenerative medicine. Patients suffering from cardiovascular disease and other disorders will find cure after the establishment of this technology. Application of iPSCs in treatment of cardiovascular disease Cardiovascular disease affects the cardiovascular system (the heart and the blood vessels). These diseases include coronary heart disease, stroke, congestive heart failure, pulmonary embolism among others. The iPSCs technology promises a positive break through to the medicine world (Amit &Joseph112). The ability to induce adult specific cells into stem cell without use of embryo enables clinicians to change other cells from a patient. The body recognizes the cells as self and therefore no rejection can occur. Researchers are successfully modeling many cardiovascular diseases by this technology. The improved understanding of the cardiovascular diseases provides a better treatment in the medicine world. Formation of cardiomy ocytes Reprogramming of somatic cells into iPSCs is by integrating or non-integrating method. The integrating method uses viral vector while the non-integrating method uses a plasmid to deliver the genes. For cardiovascular disease treatment, the most suitable is the non-integrating method. Reprogramming of the fibroblasts of the dermis of the patient produces the iPSCs for use. A method called embroyoid body differentiation turns the iPSCs to revolve into cardiomyocytes (Nelson et al 2). The cardiac cells produced this way show the same characteristics of human cardiac cells although they may differ in morphology. To determine functionality of the iPSCs, cardiomyocytes researchers use molecular techniques such as immunocytochemistry and polymerase chain reaction techniques (Amit & Joseph117). The cardiomyocytes formed from patient cells posses the mutations that cause disease in the patient. These cells serve as the model for the disease and therefore further investigations are pos sible. Modeling of inherited cardiovascular diseases is very important in determining its cure. The iPSCs cardiomyocytes (heart muscle cells) provide the best model for these diseases. The iPSCs provide insights to concerns of heart repair. This technology is a potential source of cells for repairing the heart and blood vessels. Studies done by Li and co-researchers gave the evidence that induced pluripotent stem cells would provide unlimited resources for transplantation. This form of tissue

Tuesday, September 24, 2019

Colonies Essay Example | Topics and Well Written Essays - 500 words

Colonies - Essay Example However, each of them had their own resources, ways, and dispositions. This is where exactly the three of them diverge. Smith believed in employing labor to acquire all the necessities of living. Bradford believes freedom of religion. Winthrop believed in only one kind of worship. While some colonizers did venture through vast lands and perils for the purpose of flourishing wealth thereby expanding their trades and purposes, some still aimed to instill religion and education to the naivetà © of people who needed them and of whom they thought needed a certain social culture. Such were some of the major goals of the three colonizers. Smith’s leadership during the starvation produced a lasting effect upon the people when he resorted to labor to increase production and diminish subsistence. Bradford wanted an intact society especially as he depicted by creating a pact with the Indians. Moreover, although Smith may have believed in God, it was not as explicit as Bradford had professed in his writing. He considered that the hardships they had encountered were only proof’s of God existence. Winthrop’s sermon was less like a combination of Bradford’s and Smith’s ideologies. He believed in equal responsibility towards one another th ough in essence people are not born with equal reserves. This being said, Winthrop was the colonizer who confined religion and faith to one God as his front and weapon. Even without wealth in mind, John Smith successfully inspired the habit of responsibility among the natives with the effective use of labor while instilling that no person survives without working. He provided an integrated form of leadership which actually worked in all due fairness (Seiferth, n.d.). Aside from that, he also managed to unite conflicting lands in Virginia despite the fact that he suffered incarceration. Meanwhile Bradford’s services as

Monday, September 23, 2019

The Effect of Class Size on Student Achievement Dissertation

The Effect of Class Size on Student Achievement - Dissertation Example Therefore, it can be said that, though no significant relation of the class size to student success has been found, a smaller size of the class is preferred by people involved in the learning process. This can be explained by the fact that a smaller number of students makes it easier for a teacher to work with the group. In addition, students feel more comfortable emotionally and psychologically when studying in a smaller class. However, it should be mentioned that the limitations of the research do not allow to make any categorical or ultimate claims. First of all, the number of sample groups is not large enough to reach the statistically significant research results. Secondly, due to a great number of variables, such as differences in students’ prior knowledge, educational and social background, as well instructors’ teaching experience, no statistically grounded argument can be drawn out of the research. Furthermore, another limitation of the study is that there is no knowledge of how the same student would perform in a differently sized type of a class. Therefore, a greater and longer research should be carried out in order to give a definite answer to the question of whether class size influences student’s academic performance. It would be assumed that the hypothesis would have to be rejected. The majority of the people were strongly for reducing class size. It was proven in many studies that the overall progress of students, including achievement levels, did improve in smaller classes. So, the literature review suggests that the hypothesis should be rejected. However, the results of the carried out by me research have shown different results, which, actually, can be used to support the hypothesis. Still, as the analysis of the research suggests, the amount of data received does not allow making any statistically grounded claims. Although I do believe that Grant County high school teachers and students could benefit from a reduction in

Sunday, September 22, 2019

Movies and cultural influences Essay Example | Topics and Well Written Essays - 1000 words

Movies and cultural influences - Essay Example With the sudden urbanization on a large scale, the ordinary factory workers in the city became psychologically isolated, though they were in the midst of a huge mass of urban population. This situation was further aggravated by the arrival and assimilation of a large number of immigrants, most of whom were not English speaking, and from a different cultural background. With time and money at their disposal due to the rising affluence, the urban workers needed to find avenues for entertainment. They still could not afford to attend entertainment shows such as music performances, theater plays etc. The invention of the moving picture towards the end of the nineteenth century, suited this demand perfectly. This amazing novelty captured the imagination of the common man. This medium had several advantages over other forms of entertainment. It was cheap. It could be copied, transported, and staged simultaneously at several places. Initial silent movies had no language barrier, and hence had a universal appeal. The earlier movie producers, mostly jews, Italian or greek immigrants who could not get in the mainstream industrial workforce, but were nonetheless hungry for success, utilized these advantages to attract a huge audiences and make maximum profits. Nickelodeon theaters, with shabby seating arrangements inside, and crude and gaudy posters outside, sprang up throughout the cities and even countryside. Some owners included vulgar and objectionable content in their movie shows. The dark environment inside the theatre was also found to foster unsocial and immoral activities. Cul tural traditionalists saw, in this movement, a potential to corrupt the minds of the young generation and a threat to the moral society. This commercial amusement activity was directly in contrast to playgrounds, libraries, school recreation centers, church sponsored recreation, which were considered to be the conserving moral agencies of a respectable society. Large scale criticism of the uncontrolled commercialism, as regards to movies, ultimately led to stricter theater regulations and even a temporary closure of all the movie houses in New York in 1908.Susequently, the movie men fought and won legal battles with the administration against this action, but with a clear message, that some form of regulation was needed. The first comprehensive law in the United States, regulating movie theaters was enacted in 1913, banning objectionable content such as vaudeville acts, enforcing the provision of better amenities inside the theaters etc. Movies and advertisement: The success of the industrial revolution, which started around the middle of the nineteenth century, was a collective result of several factors acting simultaneously in a complementary manner. The practical application of technological innovations, like telephony and telegraphy, effective use of electricity development of transport systems, and development of mechanized assembly lines greatly helped the economic growth of the American society as a whole. This further fueled the demand, not only for technology based products by the industries, but also for consumer based products and services by the masses. The Cycle of demand and growth prompted the manufacturers towards large scale production of goods. At the same time, these manufacturers had to compete with each other for maximizing their market share in the fully

Saturday, September 21, 2019

General safety issues Essay Example for Free

General safety issues Essay General safety issues for any training programme eg kit chewing jewellery etc minimum four  The programme  This would mean giving detail as to the number of repetitions done at each station, and a clear description of how each exercise was completed (method,).  This should be written up as a diary see example  After each session there needs to be an evaluation how did it go. You need to appreciate that the circuit you develop and undertake will not be perfect. It will need adjusting. Some exercises will be too hard and/or too easy -you need to say which (and why) and to suggest how you will adjust the programme for the next time. This is where you need that detail of what you managed. So for example if your circuit includes sit ups and you managed to achieve 40 in one minute without the slightest feeling of fatigue, you need to make them harder next time -maybe changing you leg position or arm position. On the other hand if you only managed 3 in one minute then the exercise I obviously too difficult and you need to adjust it to an easier one.  Evaluation of programme  When you have finished the whole programme you need to summarize the benefits that the sessions had for you.  This will need to in include the re-testing of the fitness and skills tests that you initially undertook, The differences between the initial results and the final results for each test need to be commented on use figures did you improve, did it help your performance, was it a suitable test (reliable or valid) Did the program achieve what it set out to achieve this means referring hack to your original aims. Were the tests suitable should you have included others, were some not specific enough why not  Eg Yes I can hold off players better at football or no I cannot. Were the training methods that you used suitable/ideal in other worth was circuit training the best means of improving your fitness if not what else could you have done. This needs to be discussed and also suggestions made how the tests and/or programme could be improved upon. Appraisal of programme  This needs to include detail of how you used training theory specificity, overload, duration intensity, frequency, reversibility, progression etc. to work out your programmes and was the programme intensity and /or frequency perfect or could there have been some adjustments give examples from your ongoing evaluations  You need to discuss whether the PEP was a success or not and whether the programme could be used again.  When it is used again, what modifications would you suggest to anybody else undertaking this same programme.ie I would work at 50% intensity instead of 60%  What effects did the programme have on you performance in your activity did you find that you played better have you got any evidence that you played better more goals, coaches comments?

Friday, September 20, 2019

Cisa Questionnaire The Is Audit Process Information Technology Essay

Cisa Questionnaire The Is Audit Process Information Technology Essay This is sampling example of compliance, as it states whether controls are functional as per the policy. This will include taking samples of new user account creation forms and match it to ensure process is being followed. Variable sampling is used to determine numerical value. Substantive sampling tests the integrity of process such as credit / debit values, balances on financial statements. Stop or go sampling technique prohibits excessive sampling of an attribute. The Stop and go statistical sampling technique in a scenario where it is believed or perceived that relatively few errors will be exposed, so there is point in wasting over sampling of an attribute. Use of statistical sample for tape library inventory is an example of ____ type of sampling technique. Variable Substantive Compliance Stop or go Ans. B Explanation This is an example of substantive sampling which confirms the integrity of a process. This test will determine whether tape library records are stated in a correct manner. What is the major benefit of risk based audit planning approach? Planning scheduling in advance over months Staff exposure to varied technologies Resources allocation to areas of top concern Budget requirements are met by audit staff Ans. C Explanation The objective of risk based audit approach is focus on areas where risk is high. Various scheduling methods are used to prepare audit schedules and it does not come under risk based approach. It also does not relate to budget requirements met by staff and number of audits performed in a given year. Examples of substantive sampling technique include: Review of password history reports Approval for configuration parameters changes Tape library inventory Verifying list of exception reports Ans. C Explanation Tape library inventory is an example of substantive sampling as it confirms the integrity of a process associated with determining whether tape records are stated in a correct manner. All others are example of compliance sampling as they determine whether the process in practice is inline with the established policies and procedures. The characteristic of an audit charter is: Is dynamic is nature and keeps changing frequently as the technology changes It contains the objectives of audit, maintenance and review of internal records by delegated authority Detailed audit procedures Overall scope, ownership and responsibility of audit function Ans. D Explanation Audit charter states management objectives, scope, ownership and delegation of responsibility of audit function. It should not change frequently and approved by higher management. Also it does not contain detail audit procedures. The auditor actions and decisions impact the ___ type of risk in a major manner. Inherent Detection Control Business Ans. B Explanation Auditor selection / decisions during the audit process have direct impact on detection risks, such as enough number of samples not taken into consideration etc. Company actions manage the control risks and business and inherent risks are also not impacted by auditor. Particular threat to overall business risk can be articulated in terms of: Likelihood and magnitude of impact , where threat successfully exploited a vulnerability Magnitude of impact, where source of threat successfully exploited a vulnerability Probability of a given source of threat exploiting a vulnerability Risk assessment team group decision Ans. A Explanation The choice A addresses both likelihood and magnitude of impact and measures risk to an asset in best manner. Choice B doesnt consider the magnitude of possible damage to an asset. Choice C dont consider the possibility of damage due to source threat exploiting a vulnerability and choice D is an arbitrary method of determining risk and it is not a scientific risk management approach. Risk management approach over baseline approach in information security management gives a major advantage in terms of: Overprotection of information assets Base level protection to all assets irrespective of asset value Adequate protection applied to all information assets Equal level of protection for all information assets Ans. C Explanation Baseline approach applies a standard set of protection to all information assets whereas the risk management based approach determines the level of protection to be applied depending on a given level of risk. This saves the costs incurred on overprotection of an information asset. In baseline approach equal level of protection is applied for all information assets irrespective of asset value so as a result some assets could be under protective and some could be overprotective. Which testing method is most effective when doing the compliance testing? Attribute sampling Variable sampling Stratified mean per unit Difference estimation Ans. A Explanation Choice A is appropriate in this scenario. As attribute sampling model estimate the rate of occurrence of a specific quality in a population to confirm whether quality is present in compliance testing. The other means of sampling are used in substantive testing where details and quantity testing is done. Why email is considered a useful source of evidence in litigation in IS audit process? Wide use of email systems in enterprises as medium of communication Access control mechanisms to establish email communication accountability Backup and archiving of information flowing through email systems Data classification guidelines dictating information flow via email systems Ans. C Explanation Option C is most appropriate as archived/ backed up email files, may contain documents which have been deleted and could be recovered. Access controls only establish accountability but dont give evidence of the email. Data classification standardizes what to be communicated by email but dont provide information needed for litigation process. A post implementation review of an application is scheduled by IS auditor. What could be the possible situation which can hamper the independent assessment of IS auditor. Involved in the development of specific application and implemented specific functionality / control Integrated an embedded audit module in the application for auditing purpose Was member of application system project team but not involved at operational level Given advice on considering best practices while system was in development stage Ans. A Explanation Choice A is most appropriate in this scenario because the auditor independence is impaired in case he was involved actively during the development, acquisition and implementation of the new application. Choice B and C dont hamper auditor independence. And Choice D is not correct as auditor independence is not hampered by given advice on best known practices. What is the benefit of continuous audit approach: Collection of evidence is not required on system reliability during the processing stage Review and follow up on all information collected Improvement in overall security in time sharing environment where large number of transactions processed No dependency on complexity of organizations systems Ans. C Explanation Choice C is most appropriate w.r.t to continuous audit process major benefit as overall security is improved in time sharing environments where large number of transactions is processed but leaving insufficient trail of papers. Choice A is not correct as auditor need to collect evidence while processing is ON. Choice B is also not correct in this case as auditor does review and follows up on errors and material deficiency. Choice D is also incorrect as complexity of organization systems determines the use of continuous audit process technique. The objective of enabling audit trail is: Better response time for users Institute Accountability of processed transactions Improving operational efficiency of systems Better tracking of transactions to give useful information to auditors Ans. B Explanation Choice B is most appropriate in this scenario as accountability and responsibility can be established for processed transactions and tracing could be done end to end. Enabling audit trail dont improve user experience as it might involve additional processing which may impact user response time in other way. Choice D could also be considered valid but it is not the main reason for the purpose of enabling audit trails. In a risk based audit strategy, risk assessment is done by IS auditor to ensure: Risk mitigation controls are in place Threats and vulnerabilities are identified Risks related to audit are taken into consideration Gap analysis is done as per the need Ans. B Explanation Choice B is most appropriate in this scenario. Identification of threats and vulnerabilities is crucial in determining the scope of audit. Effect of an audit would be to develop controls to mitigate risks. Audit risks are not relevant to risk analysis of environment. Gap analysis compares the actual state to expected or desired state. A gap could be result of a risk not being correctly addressed or missed out. In order to achieve best value to organization in terms of audit resources we should : Do audit scheduling and measure the time spent on audits Training of audit staff on latest audit technologies Chalk out detailed plan based on risk assessment Progress monitoring of audits and have cost control measures in place Ans. C Explanation Choice C is most appropriate in this scenario. This will deliver value to organization in terms of dedicating resources on higher risk areas. Choice A, B and D will improve the staff productivity only. An IS audit charter includes: Plan for IS audit engagements Scope and objective of audit engagement Training plan for audit staff IS audit function role Ans. D Explanation Choice D is applicable in this scenario. Choice A is responsibility of audit management. Scope and objective is agreed on engagement letter and training of staff is again responsibility of audit management based on audit plan. In the evaluation of risk assessment of Information system. The IS auditor will first review: Controls in place Effectiveness of implemented controls Monitoring mechanism for risks related to assets Threats/ vulnerabilities impacting assets Ans. D Explanation Risks associated with using assets need to be evaluated first so choice D is most appropriate in this scenario. Controls effectiveness is part of risk mitigation stage and risk monitoring is part of risk monitoring function after risk assessment phase. During an audit plan, the most critical step is: High risk areas identification Skill set identification of audit team Identification of test steps in audit Identification of time allotted to audit Ans. A Explanation The choice A is appropriate in this scenario. The identification of high risk areas is most critical step as that will determine the areas to be focused during the audit. Skill set is determined before audit to begin. Test steps and time for audit is determined on the basis of areas to be audited. How much data to be collected during audit process will be determined on the basis of: Ease of obtaining the information records Familiarity with the environment to be audited Ease of obtaining the evidence Scope and purpose of audit Ans. D Explanation Scope and purpose will determine the amount of sample data to be collected during the audit. All other choices are irrelevant in this scenario as audit process is not hampered by ease of obtaining records or evidences or familiarity with the environment. During the audit plan, assessment of risk should provide: An assurance that audit will cover material items Material items would be covered definitely during the audit work Reasonable assurance that All items will be covered by audit work Assurance to suffice that all items will be covered during the audit work Ans. A Explanation Choice A. ISACA audit guideline G15 clearly states that An assessment of risk should be made to provide reasonable assurance that material items will be adequately covered during the audit work. Definite assurance clause in choice B is impractical, option C is also not correct as it states all items. Statistical sampling should be used by IS auditor and not judgmental sampling in the scenario: Objective quantification of error probability Avoidance of sampling risk by auditor General use audit software is available Unable to determine the tolerable error rate Ans. A Explanation With an expected error rate and confidence level, objective method of sampling is statistical in nature as it helps auditor to determine size of sample and quantify error probability or likelihood. Choice B is not correct because sampling risk is risk of sample. Choice C is also incorrect as statistical sampling doesnt need general software. Choice D is also incorrect because tolerable error rate is predetermined in statistical and judgmental sampling. The primary goal of an auditor during the IS audit planning stage is: Address audit objectives Sufficient evidence collection Mention appropriate tests Use less audit resources Ans. A Explanation As per ISACA guidelines auditor plan must address audit objectives. Choice B is not correct because evidence is not collected at planning stage. Choice C and D are also incorrect because they are not initial goals of audit plan. During an audit procedure selection, auditor will have to use professional judgment to ascertain: Sufficient evidence collection Identification of significant deficiencies and there correction in reasonable time period Material weakness identified Maintain minimal level of audit costs Ans. A Explanation Professional judgment during the course of an audit process involves subjective and qualitative evaluation of conditions. It is based more on past experience of auditor and auditor past experience plays a key role in this. Identification of material weaknesses is result of experience and planning thoroughness and also it does not deal with financial aspects of audit as stated in choice D. While evaluating logical access controls an auditor first: Documentation of controls applied to all possible access paths to system Testing of controls to access paths to determine they are functional Evaluation of security environment w.r.t. policies and procedures laid down Obtaining an understanding of security risks to information processing facilities Ans. D Explanation Choice D is most appropriate in this scenario. The first step is to gather security risks to information processing facilities, by studying documentation, inquiries and doing risk assessment. Documentation and evaluation is next step. Third step is to test access paths to ensure controls functionality. The last is auditor evaluation of security environment. The objective of forensic audit is to: Participation in investigations related to corporate fraud Evidence collection on systematic basis after system irregularity Assessment of correctness of organizations financial statements Determine if there was any criminal activity Ans. B Explanation Choice B is correct as evidence collection is used for juridical process. They are not only for corporate frauds. Financial statements correctness determination is not purpose of forensic audit. And criminal activity could be part of legal process but it is not the objective of forensic audit. An auditor is reviewing a backup log report of remote server backup. One of the entries in the backup log indicates failure to login to remote server for backup and there is no entry in log which confirms that backup was restarted. What IS auditor should do? Issue audit finding Explanation required from IS management Issue a non compliance Increase sample of logs to be reviewed Ans. D Explanation Choice D is appropriate in this case. Before issue audit finding or seeking explanation, or issue of non compliance auditor needs to gather additional evidence to properly evaluate the situation. For the purpose of auditing critical servers audit trail, auditor wants to use _______ tool to determine the potential irregularity in the user or system. CASE tools Embedded data collection tool Heuristics scanning tool Trend/variance detection tools Ans. D Explanation Trend/variance detection tools are used for determining the potential irregularity in the user or system. CASE tools are used in software development and embedded data collection tool is used for sample collection and Heuristics scanning tool used to detect virus infections. What could be the possible cause of great concern for an auditor while evaluating a corporate network for possible penetration from employees? Number of external modems connected to network Users have right to install software on there desktops Limited network monitoring or no monitoring at all User ids with identical passwords Ans. D Explanation Choice D is most appropriate in this scenario. It is the greatest threat. Choice A threat is there but depends on use of valid user id. In choice b likelihood is not high due to technical knowledge needed for penetration. Network monitoring is a means for detection. What is the major benefit of using computer forensic softwares in investigations? Preservation of electronic evidence Saving time and costs More efficient and effective Efficient search for violation of Intellectual property rights Ans. A Explanation The main purpose of forensic software is to preserve the chain of electronic evidence for investigation purpose. Others choice B and C are concerns to identify good / poor forensic software. Choice D is example of using forensic software. Data is imported from client database by auditor, now the next step is to confirm imported data is complete, what step need to be followed to verify the same. Match control total of imported data with original data Sort data to confirm data is in same order as the original data Review first 100 records of imported data with first 100 records of original data Category wise filtering of data and matching them to original data Ans. A Explanation The logical step in this scenario would be option A. this will confirm the completeness of process. Sorting may not be applicable in this scenario because original data may not be sorted order. Reviewing partial data does not suffice the purpose either. Filtering data would also need control totals to be established to ensure completeness of data. An audit is to be conducted to identify payroll overpayments in last year. Which audit technique would be best appropriate in this scenario? Data testing Use of general audit software Integrated test facility Embedded audit module Ans. B Explanation General auditing softwares include mathematical calculations, stratification, statistical analysis, sequence and duplicate checks and re-computations. So auditor can use appropriate tests to re-compute payroll data. Test data would not detect the anomalies and overpayments. Integrated test facility and embedded edit modules cannot detect previous errors. During an audit process, auditor finds out that security procedures are not documented what he should do? Auditor create procedure document Stop audit Do compliance testing Evaluate and identify exiting practices being followed Ans. D Explanation The purpose of audit is to identify risks, so the most appropriate approach would be identify and evaluate current practices being followed. Auditors dont create documentation, compliance testing cannot be done as no document is there and stopping audit will jeopardize the objective of audit i.e. risks identification. Threats and their potential impacts are identified during the course of an risk analysis stage what should be next most appropriate step? Identification and assessment of risk assessment approach of management Identification of all information assets and systems Disclosure of threats and impacts to management Identification and evaluation of existing controls Ans. D Explanation The next step would be choice D. once the threats and impacts are identified. Next step is to share them with management. Out of the following which one is the most significant concern for an auditor? Non reporting of network attack Notification failure to police of an attempted intrusion Periodic review of access rights not present No notification of intrusion to public Ans. A Explanation Failure to report a network attack is major cause of concern. Reporting to public is organization choice and notification to police is also matter of choice. Periodic examination of access rights could be causing of concern but not as big as option A. Which is the most dependable evidence for an auditor out of the following: Letter from 3rd party on compliance Line management assurance that application is performing as per design Information obtained from www Reports supplied by organization management to auditor Ans. A Explanation The most reliable evidence is the one given by external party. Choice B, C and D are not considered reliable. While evaluating a process on the basis of preventive, detective and corrective controls, an IS auditor should know? The point at which controls used as data flow through system Preventive and detectives controls are only relevant ones Corrective controls are only relevant Classification is required to determine which controls are absent Ans. A Explanation Choice A is most appropriate. Choice B and C are incorrect as all controls are important. Choice D is also not correct because functioning of controls is important and not its classification. The best evidence of duties segregation is identified by using ____ audit technique? Discussions with management Organization chart review Interviews and observations User access rights testing Ans. C Explanation Based on choice C an auditor can evaluate the duties segregation. Management may not be aware of detailed functioning, organization chart only depicts hierarchy of reporting, and testing will only tell user rights but will not give any details on function being performed by users. While reviewing a customer master file, auditor discovers that many customer names are appearing in duplicate causing variation in customer first names. How auditor will determine the amount of duplication in this scenario? Testing data to validate input Testing data to check sorting capabilities Use general audit software to detect address field duplications Use general audit software to detect account field duplications Ans. C Explanation As names are not same, so we need to use some other field to determine duplication such as address field. Test data will not help in this case and searching on account number may not yield desired result because customers could have different account numbers for each entry. While testing for program changes what is the best population to choose sample from? Library listings testing Listing of source programs Change request programs Listing of production library Ans. D Explanation The best source to draw sample or test system is automated system. Choice B would be time consuming. Program change request are initial documents to initiate changes; test libraries dont present approved and authorized executables. An integrated test facility is an efficient tool for audit: Audit of application control in a cost effective manner Integrating audit tests for financial and IS auditors Comparison of processing output with independently calculated data Tool to analyze large range of information Ans. C Explanation It is a useful audit tool because it uses similar program to compare processing with independently calculated data. This involves setting up dummy entities and processing test/production data. IS auditors use data flow diagrams to: Hierarchical ordering of data Highlighting high level data definitions Summarize data paths and storage in graphical manner Step by step details of data generation portrait Ans. C Explanation Data flow diagrams are used to chart flow of data and storage. They dont order data in hierarchical manner. Data flow not necessarily match hierarchy or order of data generation. Review of organization chart is done by auditor to: Understand workflows Identify all communication channels Responsibility and authority of individuals Network diagram connected to different employees Ans. C Explanation Organization chart always depicts the responsibility and authority of individuals in an organization. This is required to understand the segregation of functions. While performing an audit of network operating system, an auditor should review the following user feature? Network document availability online Support for terminal access to remote systems File transfer handling between users and hosts Audit, control and performance management Ans. A Explanation Network operating system user features comprise online availability of network documentation. Choice B, C and D are some examples of network OS functions. In order to ascertain that access to program documentation is only restricted to authorize users, an auditor should check: Evaluation of retention plan for off site storage Procedures being followed by programmers Comparison of utilization records to operational schedule Review data access records Ans. B Explanation Interview of programmers to understand procedures being followed is the best way to ascertain the access to program documentation is only with authorized personnel. Off site storage, utilization records and review of data access records will not address security of program documentation. Auditor is evaluating an application which does computation of payments. During the audit it is reveled that 50% of calculation is not matching with the set total. What should be the next step auditor need to follow as part of audit practice? Do further test on calculations having error Identification of variables that generated inaccurate test results Testify some more test cases to reconfirm the anomaly Documentation of results, findings, conclusions and recommendations Ans. C Explanation Auditor needs to examine some more test cases where incorrect calculations happened and then confirm with the final outcome. Once calculations are complete further tests can be performed and then report to be made only after confirmation and not before that. In order to prove the correctness of system tax calculation the best practice to be followed is: In depth review and analysis of source code Using general auditing software to recreate program logic for monthly totals calculation Simulate transactions for results comparison In depth analysis and flow chart preparation of the source code Ans. C Explanation The best way to prove accuracy of tax calculation is simulation of transactions. Detailed review, flow chart and analysis of source code will not be effective and monthly total will not confirm the correctness of tax calculations at individual level. In Applications control review , auditor must analyze : Application efficiency in meeting business processes Exposures impact Business processes performed by application Optimization of application Ans. B Explanation Application control review requires analysis of application automated controls and analysis of exposures due to controls weaknesses. The other options could be objective of audit but not specifically meant to analyze application controls. What is the most accurate evidence to prove that purchase orders are legitimate while auditing an inventory application? Application parameters can be modified by unauthorized personnel Purchase order tracing Comparison of receiving reports to purchase order details Application documentation review Ans. A Explanation Access control testing is the best way to determine purchase orders legitimacy and is the best evidence. Choice B and C are part of further actions and choice D will not serve the purpose as application documentation process and actual process could vary. Irregularities at an early stage can be detected in the best manner by using ______ online auditing technique. Embedded audit module Integrated test facility Snapshots Audit books Ans. D Explanation The audit book technique also involves embedding code in applications to reveal early detection of irregularity. Embedded audit module is used for monitoring application systems on select

Thursday, September 19, 2019

Rabies :: essays research papers

Rabies Rabies is an infectious disease of animals which is a member of a group of viruses constituting the family Rhabdoviridae. The virus particle is covered in a fatty membrane, is bullet-shaped, 70 by 180 nanometres and contains a single helical strand of ribonucleic acid (RNA). Although rabies is usually spread among domestic dogs and wild carnivorous animals, all warm-blooded animals are susceptible to infection. The virus is often present in the salivary glands of infected animals, referred to as rabid, and is excreted in the saliva. The bite of the infected animal easily introduces the virus into a fresh wound. In humans, rabies is not usually spread from man to man, rather the majority of infections occur from rabid dogs. After a person has been inoculated, the virus enters small nerve ends around the site of the bite, and slowly travels up the nerve to reach the central nervous system (CNS) where it reproduces itself, and will then travel down nerves to the salivary glands and replicate further. The time it takes to do this depends on the length of the nerve it must travel - a bite on the foot will have a much lengthier incubation period than a facial bite would. This period may last from two weeks to six months, and often the original wound will have healed and been forgotten by the time symptoms begin to occur. Symptoms in humans present themselves in one of two forms: ‘furious rabies', or ‘ dumb rabies'. The former is called such because of the severe nature and range of the symptoms. The virus, upon reaching the CNS will present the person with headache, fever, irritability, restlessness and anxiety. Progression may occur on to muscle pains, excessive salivation, and vomiting. After a few days or up to a week the person may go through a stage of excitement, and be afflicted with painful muscle spasms which are sometimes set off by swallowing of saliva or water. Because of this the afflicted will drool and learn to fear water, which is why rabies in humans was sometimes called Hydrophobia. The patients are also extremely sensitive to air or drafts blown on their face. The stage lasts only fews days before the onset of a coma, then death. Dumb rabies begins similarly to furious rabies, but instead of symptoms progressing to excitement, a steady retreat and quiet downhill state occurs. This may be accompanied with paralysis before death. Rabies diagnosis in this type of cases can be missed. Unfortunately with both furious and dumb rabies, once the disease has taken hold

Wednesday, September 18, 2019

Starting a New Business Essays -- Setting Up a Business

Introduction As Regina Meyers contemplates opening a Satanic coffeehouse in her hometown, she must make a number of critical business decisions related to business organization, ownership, structure, and management. A number of her friends and family members have expressed interest in partnering with her or simply being involved. As Regina’s legal adviser, I have been asked to provide advice to her on a variety of topics outlined below. Business: Friends, Family, and Foes As an entrepreneur and business owner myself, I applaud Regina for taking the first steps towards establishing her business - a Satanic coffeehouse – while also respectfully providing advice based on some of my personal lessons learned. The first, and from my perspective the most important, decision Regina must make is related to the ownership structure of her business. While respecting that Ben, her husband, is willing to make a capital investment in the business but does not desire to participate in the operation and management, Regina needs to ensure that, as a married couple, they both understand and accept the responsibilities and risks involved with starting a business. From the information presented in the background notes, I am concerned that Ben’s pledge of a financial investment in the proposed company was from personally managed funds and not jointly-managed funds. If, indeed, the financial support pledged was from her husband’s personal funds, I would respectfully advise Regina against the accepting the investment as the marriage relationship would likely suffer by adding a non-union investor-investee financial relationship. With this noted, if Ben’s financial contribution is actually a confirmation supporting the use of their joint financial re... ...trieved from BCP Business Center: http://www.business.ftc.gov/documents/inv05-buying-franchise-consumer-guide Gaston Regional Chamber. (2013, December 2). Just starting out/business formation. Retrieved from Gaston Regional Chamber: http://gaston.toolsforbusiness.info/northcarolina/1b/formation/ North Carolina Department of the Secretary of State. (2013, December 2). Search for a corporation by name. Retrieved from Corporations Division: http://www.secretary.state.nc.us/corporations/searchresults.aspx?onlyactive=OFF&Words=STARTING&searchstr=The%20Gathering%20Place United States Patent and Trademark Office. (2013, December 2). Trademark Electronic Search System (TESS). Retrieved from United States Patent and Trademark Office: http://www.uspto.gov/trademarks/index.jsp Wagner, E. (2013, September 12). Five reasons eight out of ten businesses fail. Forbes.com, p. 1.

Tuesday, September 17, 2019

Nitrogen Management :: Environment, Agriculture, Crop Production

Nitrogen management is crucial component for sustainable crop production, it is desirable to adapt N supply with crop N use to maximize efficiency. In Egypt, due to intensive cultivation of high yielding crop varieties, the nutrients supplying capacity of soil is declining. Producers tend to apply insurance application of N to make them feel more confident about N sufficiency. These practices may lead to over application of N fertilizer and result in groundwater pollution by nitrate (NO3) due to the elevated levels of NO3 in the soil profile (Asadi et al. 2002). Accordingly, searching for alternative N sources and maintaining long term soil fertility and sustainability are a priority for studying. Cultivar performance varies as related to genotype Ãâ€" environmental interactions (Eberhart and Hallauer 1967). In general, corn hybrids are highly productive and respond to N application, however their ability to maintain yield under water or N stress are different (O’Neill et al. 2004). Nitrogen availability represents a major limiting corn grain yield under intensive cropping system. The identification of hybrids response to different combination of N rates and bio-fertilizers could reduce the amount of applied N and increase efficiency. Several research in the literature document significant cultivar Ãâ€" N interaction differences in growth such as LAI and plant weight and yield traits (Ahmed 1990; Tollenaar and Wu 1999; and Hokmalipour 2010). Determining specific hybrids response to N inputs would make a great contribution to plant breeding for sustainable agriculture (Presterl et al. 2002). It is clear that current unsuitable handling of N fertilizers may be responsible for NO3-N contamination of both surface water and soil water (Wang et al. 1996). Yield goal as N based recommendation usually represent large geographic areas. According to (MOA 2004) they provide a N recommendation for corn that is a linear function of yield goal. Although these recommendations are generally suitable, they may lead to over application of N as hybrids and environment change. Corn grain yield has been significantly increased by varying N rate from 190 to 380 kg N ha-1 (El-Hendawy et al. 2008). A positive response for grain yield has been reported by (Halverson and Reule 2006) up to 285 kg N ha-1 while maximized at 180 kg N ha-1 in another study (Lamm et al. 2001). Determining N recommendation could be further improved by considering field-specific soil-crop-climate conditions along with different hybrids and Bio-fertilizers effects.

Monday, September 16, 2019

Project Noah Essay

The Philippine government’s Department of Science and Technology or DOST Advanced Science and Technology Institute along with the help of the Philippine Atmospheric, Geophysical and Astronomical Services Administration (PAG-ASA), Philippine Institute of Volcanology and Seismology (PhilVolcs) and University of the Philippine’s National Institute of Geological Science and its College of Engineering launched its project called â€Å"National Operation Assessment of Hazards and Risk† known as â€Å"Project NOAH† last July 6, 2012 in the city of Marikina to promote and combine advance science and technology to enhance the disaster management and prevention capacity of the Philippines. This project was designed to answer the need for a systematic early warning system for floods in the country. As we all know, the Philippines have experienced unexpected huge calamities these past few years examples of those were the Typhoon Ondoy happened last 2009 and the recent monsoon happened two weeks ago that caused great damages on the lives of our fellow countrymen, their properties and source of living which also affected the whole country’s economy. Due to this repetitious and unavoidable condition, this project would provide a more accurate, timely and easy to access warning about hazards that would affect the country for the safety of our people in every area of the Philippines. With the use of advance technology, this project would be able to provide a six hour ahead of time warning in the communities subjected to danger against incoming floods by the use of a geo- hazard vulnerability map which will be accessed using the internet. Presently this project has only eight major components which will provide the Project NOAH quick, accurate and more reliable information about floods and disaster. These are the Hydromet Sensors Development, the Disaster Risk Exposure Assessment for Mitigation (DREAM), Flood information Network (FLOODNET), Weather Hazard Information Project (WHIP), Enhancing Geo- hazards Mapping through Light detection and ranging (LIDAR), Local Development of Doppler Radar Systems (LaDDeRS), Landslide Sensors Development Project and the Coastal Hazards and Storm Surge Assessment and Mitigation (CHASSAM). This project was said to distribute Hydrometeorological (Hydromet) devices in different areas in the Philippines composed of 600 automated rain gauges (ARG) and 400 water level monitoring stations (WLMS) in 18 major river basins of the Philippines namely, the Marikina River Basin, the Cagayan de Oro River Basin, Iligan River Basin, Agno River Basin, Pampanga River Basin, Bicol River Basin, Cagayan River Basin, Agusan River Basin, Panay River Basin, Magaswang Tubig River Basin, Jalaur River Basin, Ilog- Hilabangan River Basin, Agus River Basin, Davao River Basin, Mindanao River Basin, Tagum- Libuganon River Basin, Tagaloan River Basin and Buayan- Malungun River Basin in December 2013 that will provide a better picture of the country’s surface waters which will be very helpful in detecting floods. It also aims to provide three- dimensional hazard maps in the major river systems and water sheds as well as in the flood prone areas like the city of Marikina throughout the country. Building the Flood Information Network or FloodNet which will provide computer models for critical River Basins, automation of data gathering, modeling and distribution of information about flood forecasts was also said to be completed as well as the 50 sites in the Philippines to added by the newly adopted landslide sensors which the cities of San Francisco, Surigao del Norte, Tago, Surigao del Sur, Tublay Bugias, Bokod in Benguet, Guihulngan, Negros Occidental, St. Bernard, Southern Leyte and Tubungan in Iloilo presently have now was said to be completed at the end of 2013.. On the other hand, by year 2014 the government targets to use a LIDAR or Light detection and ranging and computer- assisted analysis technology that will identify exact areas in the country prone to landslides. They also targets to complete the installation of the Coastal Hazards and Storm Surge Assessment and Mitigation technology that will generate wave surge, its refraction and coastal circulation models that would help the people understand, find solutions and prepare early in case of coastal erosion. Presently, it has been reported that Doppler radars which will help in sensing the dynamic parameters of our country’s sea surfaces like wave, wind field and its surface present velocity are currently installed already all throughout the country as preparation for the completion of the Project NOAH in two years of time. This project was highly supported and participated by public and private; both local and international agencies and organizations in the country namely by PAG-ASA, DOST- ASTI, PHILVOLCS, DOST-STII, -UP NIGS EML Laboratory, ClimateX Project, UP NIGS VTEC Laboratory, nababaha.com, UP DEGE- TCAGP, UP- MSI, British Council, British Embassy, UK Environment Agency, Cabot Institute of Bristol University, Institute of Earth and Environmental Sciences of the University of Potsdam, MediaQuest Holdings Inc., Manila Observatory, DRRNet, DILG, MMDA, Smart Communications Incorporated, SUN Cellular, Globe Telecommunications, Google Crisis Response, Petron, Government of Japan, DENR, DPWH and the lifesomundane.net THE PROJECT NOAH SYSTEM 1. First, go to www.noah.dost.gov.ph 2. The website of Project Noah will appear like this: 3. Suppose that you are in Intramuros, Manila†¦ You may put your location on the Search Tab above then click enter to show the map of your location 4. You may look for the Probability of Rain in the Weather Outlook Tab, the Flood Map, the available weather stations, stream and rain gauges in the Weather Stations Tab on your location 5. It will also inform you about the Flood hazard based on the Flood Hazard Map released by the Philippine government by clicking the Legend Tab FLOOD HAZARD MAP BY DOST FLOOD HAZARD ON NOAH.DOST.GOV.PH 6. The website will also provide you basic information that makes you understand what PROJECT NOAH is about by clicking the ABOUT Tab 7. It gives step by step instructions on how to use the system by clicking the Help Tab in the upper right side of the website†¦ Since the World Wide Web and the development of technology are very rampant nowadays on the present generation, having an access to the DOST’s Project NOAH would not be a problem. It would be very helpful to the people to prepare and plan ahead before a disaster would strike their areas. It would help in reducing casualties and extreme property loss due to hazardous events like what happened during the monsoon two weeks ago in many parts of the country where not only the livestock of the people were sacrificed but also the lives of our fellow men. BIBLIOGRAPHY http://noah.dost.gov.ph/ http://www.nababaha.com/ http://region4a.dost.gov.ph/index.php/press-release/296-dosts-project-noah-to-strengthen-nationwide-disaster-risk-reduction-efforts.html http://ad2.ycasmd.info/custompopup.php?ref=animehere.com&aid=18 http://www.philippinecollegian.org/project-noah/ http://www.gov.ph/ http://www.pia.gov.ph/news/index.php?keywords=DOST http://www.manilatimes.net/index.php/news/headlines-mt/28746-monsoon-flood-toll-reaches-60 http://newsinfo.inquirer.net/244837/tuesday-rains-surpass-ondoys-2009-rainfall-pagasa http://www.dost.gov.ph/index.php?option=com_content&view=frontpage http://www.thepoc.net/thepoc-features/lintech/how-tos-and-lifehacks/16730-project-noah.html http://blogwatch.tv/2012/08/nababaha-tutorial-of-project-noah-via-twitter/ http://kamalayangkalayaan.wordpress.com/agham-o-siyensiya/project-noah-nationwide-operational-assessment-of-hazards/ http://inagist.com/gone

How Will Science and Technology Change Our Lives in the Future

EMOTIONS AS BLOCKS OR LESSONS There has always been a question in my mind regarding the use of emotions in attaining enlightenment/self-awareness. It is said that emotions come and go in waves. That often times we try to suppress the negative emotions like anger, lust, greed, jealousy, fear, sadness etc. thereby creating a shadow space in ourselves comprising all the unaccepted parts of ourselves like the negative emotions. If we were to allow these emotions to run their course than they would simply pass through our body without leaving any residues.It is in generating/offering resistance to the emotions that we build the obstacles to the free flow of energy in our body. Given that all emotions are energies of different patterns and wavelengths we only need to give them free passage to enjoy good health and wellbeing. So far, so good. But how does one allow a negative emotion to ride through without being adversely affected by it. Say I am in a situation where I feel intensely angry /lustful/greedy/jealous/fearful/sad, allowing the emotion's wave to flow through I need to remain aware that I am not the emotion. I do not identify with the emotion nor do I deny it.I take responsibility for the emotion acknowledging that it is mine and I can use the energy in the emotion any which way I want. Patterns of emotional expression Of course there are cultural definitions to the expression of emotions as for example we generally weep when we are sad or sit with a long face, shout or bang doors when we are angry or cringe and try to hide when we are afraid etc. patterns of expressing emotions tend to run in families since that is where we get our most intense emotional training. There might also be genetic predispositions to certain styles of expression.But emotions come and go in every one. Perhaps even in the most enlightened beings, except I would imagine that they have reached a stage where they experience a constant flow of different sensations, energy in a pure form . No labels, no names, which is what emotions are, our perceptions of situations including our minutest physical sensations. An example For example I see a person across the road it is the next door neighbor, the one I do not like too much. Already the sensations are beginning to get labeled. I pretend I have not seen her in order to not have to interact with her. I put energy into looking away.There is a tightening of the stomach muscles, a tension in the forehead, all very miniscule, nothing that a passer-by might notice. I barely notice them myself. Yet it is there, the aversion that I practice in order to avoid an unpleasant interaction. The cumulative effect of these unacknowledged sensations all add up to give us the dis-eases that we carry. Hence I maintain that all disease is psycho-somatic. If I see my next door neighbor and allow myself to meet her and learn from the event, recognizing the fact that she has the ability to get my goat, I may perhaps greet her in a civil man ner.Neither expressing a dislike nor feigning a warmth. I might listen to what she has to say, without allowing myself to get hooked into any barbs or taunts she chooses to fling at me, remaining aware of the sensations that arise and pass to the best of my ability. Or perhaps it is a day when I simply do not want to meet her and I cross the street aware of the fact that she might take offense but all the while remaining aware of my motivations and taking responsibility for my actions.So the next time that I encounter her and she questions me about why I crossed the street I can look her in the eye and tell her that it was because I had a heavy day and had not wanted to put any effort into socializing with her, especially since there are many times when I find interacting with her a challenge. responsibility The point is when I take responsibility I ride the wave of the emotion/sensations rather than feeling that I am driven to act in a certain way or compelled to do such and such. In the latter case the choice is always mine, as far as my actions are concerned.I have no control over what she might say or do and I do not attempt to have any control over that. The ever wider circle of responsibility The last statement is a bit gray. I believe that we are eventually completely responsible for our reality. So if my next door neighbor is nasty with me, it is also because I send out some negative vibrations towards her that she un/consciously reacts to. If I meet her with love and compassion in my heart then there is no way that she would fling any taunts or barbs at me. It might be that she serves as a mirror for my insecurities.Perhaps, I am an unmarried woman living with my male partner. In my culture this is still a new thing. I imagine that her negativity is a sign of her lack of acceptance of my sexuality. She may or may not have these issues but as long as I have these insecurities I will find someone or the other (most likely her), who reflects these back a t me as a reminder for me to address these issues in myself and find my peace with them. Whether I see the interactions as lessons or just as unpleasant events that one has to grit one's teeth and bear, is again a matter of my choice, conscious or otherwise.Wow that is a big fat load to carry. So I am responsible not just for my actions, thoughts, feelings and attitudes but also for other people's behavior! Phew that is huge. No wonder most people want to escape into fantasy and make the movies such big business. But the fact remains we cannot forever put our heads in the sand. Some time or the other we will have to acknowledge the truth so might as well start now. And be gentle with ourselves on this journey. It is after all a journey of self-acceptance as much as of self-awareness/understanding. Read more at Buzzle:Â  http://www. buzzle. com/editorials/9-15-2006-108809. asp

Sunday, September 15, 2019

JFK: The Epitome of Success

â€Å"Once you say you're going to settle for second, that's what happens to you in life.† This quote was said by and embodied by a man who was very effective and smoothly functioning in life. This man was the late John F. Kennedy. JFK was one of the most successful and influential people to ever live. He had strong beliefs and never succumbed to pressure. Kennedy's success was shown through his tough foreign and economic policies. JFK kept the USA as a world powerhouse and will forever be remembered as one of the greatest presidents to ever live. Kennedy was born in Brookline, Massachusetts on Tuesday, May 29, 1917. He spent the first ten years of his life in Brookline until he moved with his family to Riverdale, Bronx. Two years after that he moved to a 21-room mansion on a six-acre estate in Bronxville, New York. JFK had a very sickly childhood dealing with appendicitis, colitis, and possible symptoms of leukemia. In September 1936 he enrolled as a freshman at Harvard College where he eventually graduated cum laude with a degree in international affairs. Kennedy then spent four years in the US Navy during World War II. Before his political career, JFK originally aspired to become a journalist. However, in 1946, Kennedy ran for a vacated U.S. Representative seat and beat his opponent by a large margin. On January 2, 1960, Kennedy officially declared his intent to run for President of the United States. It was a tight race against Richard Nixon but JFK won and was sworn in as the 35th President at noon on January 20, 1961 (Ke lly). At Kennedy's inaugural address, he spoke of the need for all Americans to be active citizens, famously saying, â€Å"Ask not what your country can do for you; ask what you can do for your country.† JFK felt that all the responsibility should not rest in the hands of the government; instead it should be shared amongst all Americans. He also spoke of his hope for unity amongst the nations in order to end â€Å"tyranny, poverty, disease, and war itself† across the world. His inaugural address alone showed signs of future success for this young president. JFK immediately gained great popular support amongst Americans. His strong willed personality and hope for change were some of the many reasons for his success. Little did he know his abilities would be tested early in his presidential term. In October of 1962, a Soviet ballistic missile site was discovered under construction in Cuba. JFK was faced with a dilemma; attack the missile site and face a possible nuclear war with the Soviets, or stand down and risk a nuclear attack on the U.S. Another consideration was that if the U.S. backed down it would appear to the world as weak in its own hemisphere. Kennedy decided to take action and ordered a naval quarantine in which the U.S. Navy inspected all ships arriving in Cuba. He began negotiations with the Soviets and ordered the Soviets to remove all defensive material that was being built in Cuba. Kennedy's risky actions proved successful as Khrushchev agreed to remove the missiles subject to U.N. inspections if the U.S. publicly promised never to invade Cuba and quietly removed US missiles stationed in Turkey (Sierra). JFK's iron-willed actions prevented a possible all out nuclear war with the U.S.S.R. Not only was JFK strong-minded with his foreign policy, he was also forceful with his economic policy. His plan entitled the â€Å"New Frontier† ambitiously promised federal funding for education, medical care for the elderly, and government intervention to halt the recession (Rosenthal). Kennedy also promised an end to racial discrimination. In 1954 the United States Supreme Court had ruled in Brown v. Board of Education that racial segregation in public schools was unconstitutional. Despite public opposition Kennedy did what was right and made sure this ruling would be upheld throughout the country. In 1962, James Meredith tried to enroll at the University of Mississippi, but he was prevented from doing so by white students. Kennedy responded by sending some 400 federal marshals and 3,000 troops to ensure that Meredith could enroll in his first class. He was a very caring president and would do anything to enforce justice. Kennedy's determination and perseverance helped end segregation in our great nation. Another great example of Kennedy's strong-willed personality is shown through the space race of the 1960's. After recent Soviet success of space exploration, JFK felt the need to put the U.S. on the map in terms of space discovery. Kennedy asked Congress to approve more than $25 billion for the Apollo Project, a human spaceflight program undertaken by NASA with the goal of conducting manned moon landing missions (Dumoulin). Not only did JFK feel that landing a man on the moon would benefit science, but that it would create nationalism and make a statement to the world that America was on top. Unfortunately, Kennedy wouldn't live to see his Apollo project take place. On November 22, 1963, while on a political trip to Texas, Kennedy was shot twice and pronounced dead at 1:00 PM. At the age of 46, President Kennedy died younger than any U.S. president to date. Despite Kennedy's short term as President, he is still considered as one of the greatest. His success can be attributed to his strong willed personality and determination in everything he did. JFK was the epitome of a successful and effective individual.

Saturday, September 14, 2019

The Odyssey – What Is a Hero

Ashley Literature and Composition 1 8 March 2010 â€Å"The Odyssey† by Homer What is a hero? One who holds a proud countenance or obtains a strong build? Different cultures and ethnicities may have their own, unique definition of a hero. Although the Greeks believed that such a principled individual is someone that people look up to, and a title such as this cannot be bestowed upon the ordinary. In Homer’s â€Å"The Odyssey†, it is Odysseus who possesses the true characteristics of a hero wisdom, loyalty and showing moral improvement.Homer describes Odysseus as an intelligent individual; this statement is proven fact when in the cave of the Cyclops Polyphemus, Odysseus’s first thought was to kill the giant. Instead of acting upon his first thoughts Odysseus takes the time to use his intelligence and realize that Polyphemus is the only way out of the cave. Odysseus offers wine to Polyphemus who then asks his providers’ name, Odysseus wittily replies with â€Å"Nohbody: mother, father, and friends, everyone calls me Nohbody† (Homer Lines 360-361). Even as he spoke, he reeled and tumbled backward, his great head lolling to one side and sleep took him like any creature† (Lines 360-366). Odysseus and his men blind Polyphemus while sleeping which results in the giant yelling to his brothers that, â€Å"Nohbody, Nohbody’s tricked me. Nohbody’s ruined me! † and no one came to his aide (Line 443). In this example, Odysseus shows his intelligence, a trait one can infer that the Greeks admired, by lying to Polyphemus to save the lives of his men.Also, after 2 eturning home to Ithaca to find many suitors begging for his wife’s hand in marriage, Odysseus disguises himself as a beggar to avoid attention. The seemingly beggar at first glance enters the home of Odysseus to witness the emotional destruction of his wife Penelope. Odysseus is disguised until the last possible moment when he eventually rev eals himself after completing the task to win Penelope’s hand in marriage. Odysseus is a marvel character whose characteristics allow readers to infer that the Greeks held the trait f intelligence in respect for a hero. During 720 BC, when â€Å"The Odyssey† was first published, the book explained that Odysseus preferred not to go to war, especially a war fought for an unfaithful woman. The Greeks showed no signs of disloyalty as a respectable trait for any man or woman, therefore when Odysseus is described as a faithful man, he is immediately categorized as a hero. To an extent Odysseus’s bravery can be substantiated by Athena’s constant support, and also proving his loyalty to the Greek Gods during his twenty years away from home.Locked away on the goddess Calypso’s island, Odysseus, despite the attraction he feels toward the nymph goddess, stayed as faithful as possible to his Penelope proving his devoted love for her. Calypso had offered him im mortality and a life bound her, but with his one goal in mind, (to return home) Odysseus declines the offer proving his loyal character. Along with the promised loyalty to his wife, Odysseus was equally faithful to his men. When in the face of danger, his men looked to Odysseus for help and guidance knowing that he will come to their aide.An example of this mutual relationship is when Odysseus and his followers landed on the island of Aeaea, where they rested to replenish their strength. His men were divided in half and Odysseus and his half of followers stayed behind when the rest of his men journeyed through the island to investigate. After finding the palace of the goddess Circe the men were 3 welcomed into the palace by the goddess herself. One man, Eurylochus, sensed danger and stayed hidden outside while the others ate and drank the pleasures provided by Circe.The win was drugged, causing the men to forget all memories of their home. After drugging the men, Circe used her twis ted magic and transformed the men into swine. Eurylochus quickly returned to Odysseus and explained the evil doings of Circe. Odysseus traveled to the house of the goddess alone, where she invited him in and gave him the same drugged wine. With the help of the Messenger God Hermes, Odysseus managed to escape the magic of Circe and threatened her with his sword into changing his men back.Taking responsibility for his men’s lives and sacrificing his own instead of running away from the danger is proof of his loyal character. Odysseus’s principle attribute is loyalty which the Greeks believe, is in belonging to a heroic figure. Everyone deserves a second chance; learning from your mistakes provides evidence of your improving character. Throughout â€Å"The Odyssey† one may make comments about the numerous faults they find in Odysseus’s character such as; his love of glory, and his abiding arrogance.However, nearing the end of the tale Odysseus does not immed iately react violently upon the dreadful sight of the many suitors destroying the heart of his Penelope. Instead of acting quickly, Odysseus patiently waits until the right time to reveal his identity and surprise the suitors with their own death. Learning and improving your reputation are the qualities one can infer from the epic that were greatly admired by the Greeks as a heroic trait. During the period where heroes were described as intelligent, loyal, and dedicated, Odysseus is described as a model warrior in Homer’s â€Å"Odyssey† and a true heroic being.With his intelligence Odysseus saves the lives of his devoted followers when a desperate situation calls for hero. His loyalty provides reassurance to his wife 4 Penelope and his men that he will soon return home. Odysseus shows his improving character by learning from his past mistakes to improve the future. These traits are just a few traits that the Greeks, during Homer’s time period, held in the highes t regard for a hero. 5 Works Cited Homer. â€Å"The Odyssey†. New York: Ballantine Books, 1973