Thursday, October 31, 2019

Convince school to take specific measurements to improve students Essay

Convince school to take specific measurements to improve students health and fitness - Essay Example The school also needs to watch out for the impacts that the programs has on the students. If the student do not take to the program implemented, they are likely not to participate hence the inevitable failure of the program. Nutrition and physical fitness is important for students because it offers many great benefits such as improved self esteem and confidence, improved performance in class and a general improvement in the physical health of the students (Jackson 56). If the students are in good shape, it reflects in their general self esteem. For teenagers, what others think is more important to them that what they think about themselves. Kids can be cruel in high school as is well known by all. They are bound to make fun of a fellow kid if they were seen as unhealthy and unfit. If the students are physically fit, it instills some form of confidence in them and makes them feel like they are actually worthy. This is a decision made based on their mastery of skills and the aspects of the physical programs. This in turn makes the student more aggressive, have more self-control, be more independent and have more confidence. In addition, physical fitness among the students will reflect in other areas of the curriculum. The students are bound to perform better in class and this benefit them and the school as well. Every management wants the society to see them succeeding and therefore, good student performance reflects well on the managements performance (Jackson, 43). Physical exercise has always been known to be a way through which one can relieve stress. Engaging in physical exercise does not only improve the physical health of the students, but also can be a way for the children to rid themselves of any form of tension and anxiety that they may be experiencing. Consequently, this will improve the student’s emotional stability and resilience. The programs set up for improved physical health can be an

Tuesday, October 29, 2019

Sports minded individuals Essay Example for Free

Sports minded individuals Essay High school days are usually regarded as the most memorable moment in a student’s life. For the conscientious group, it is a preparation for college life and a time to ponder on one’s interest and career choice. For the less serious and happy-go-lucky young students, it is a time to establish close friendship and romantic relationship. For the sports minded individuals, it is a time to gear up and grab the attention of various college and university officials who may hand them their athletic scholarships. Regardless of whether students are deemed hard-working, lazy, diligent, or carefree, there is a special event in their life that will remain unforgettable – the prom night. The summer of 2005 was not only spent swimming and sunbathing in the beach with my family and friends. I took advantage of the school break to scout for a reasonably priced and elegant prom gown. I spent many hours browsing the web for a suitable gown as I was undecided on whether to settle for a halter, strapless, off-shoulder, or V-neck gown. There were many times when I attempted to design my own evening wear but ended up tearing the paper and throwing them in the garbage can. I never realized that preparing for the prom was so difficult for a young high school lady. It was not only the gown that females need to prepare. The matching shoes and bag, earrings and necklace, hairstyle and make-up must also be an important part of our wardrobe. â€Å"Ahhh†¦. I wish that I am a male and all I need to wear is a tux, a white shirt, ribbon, black shoes and socks. No need to wear any make-up and jewelry. All that is needed is a good haircut and a well-shaved face†, I told myself while dropping to the bed when I reached a point of desperation in finding the right attire for me. Two weeks of my summer break was spent on learning how to do my own facial make-over. I had to call my friend, Gale to help me out as she was the most glamorous looking person in class. Gale never left home without fixing her hair and applying make-up. â€Å"Oww†¦that hurts! † I yelled as Gale plucked a fine hair in my eyebrow using a pair of tweezers. â€Å"Hahaha†¦Don’t be a sissy, Faye! † Gale uttered as she giggled at my reaction. â€Å"Can’t you just use a thread instead? † I asked as I vigorously massaged my eyebrow. â€Å"I’m not a beauty expert silly. It will only take a while and your virgin eyebrow will get used to this†, Gale said as she continued to pluck more strands of hair from my eyebrow. â€Å"Oww†¦Gale! † I yelled again and massaged my eyebrow that has turned pinkish due to skin irritation and pain. Gale did not give up on me and she learned to ignore my deafening shout of pain. I am glad that my parents and younger brother were not at home at that time. I could imagine how much my brother would make fun of me and would mimic every action and words that I uttered. Towards the end of the eyebrow plucking session, I felt the cold sweat on my body and the discomfort in my tummy. When I felt the need to run to the restroom, I stood up but it was too late to control the unexpected. â€Å"Poooottt†¦. poootttt†, the sound of my fart strikes the air. â€Å"Yucckkk†¦. Faye! That was gross! † Gale yelled as she covered her nose and walk towards to the window. â€Å"Sorry Gale! † I responded as my face turned pale. To blow the foul odor away, I grabbed a towel and wave it vigorously against the air. Just when I was about to wipe my sweat, Gale noticed something on my chair. â€Å"Faye†¦. what’s this on your chair? † she asked while looking closely at the chair I sat on. â€Å"Gosh†¦you peed on your chair! † she uttered in disbelief as her blue eyes widened. Suddenly, I looked at her, gazed at the chair, touched the front and back side of my shorts and realized that I must have peed while Gale was plucking my eyebrow. While Gale was giggling, I quickly ran to the bathroom to change my shorts and underwear. It was an embarrassing experience for me considering that this was the only time Gale witnessed someone lose control of her bladder as a result of an eyebrow make-over. When I returned to my room, my chair was already clean and dry. Gale cleaned the mess that I created and I felt that I wanted to hide my face under my pillows and bed covers. Sensing my uneasiness and shame due to my silence, Gale tried to divert my attention by discussing the things that I must prepare for the prom. She also gave me tips on how to choose the right gown for my physique and how to fix my hair for the evening occasion. In spite of the humiliating incident, Gale continued to drop by our home to prepare me for the event. There was also a time when we listened to some popular songs and music that may be played during our prom. Then, we pretended to be the King and Queen of the night and we danced to the music of our favorite love song while we were singing together. Before the end of our summer vacation, I was able to apply my make-up and fix my hair with ease. It took some time before I was able to pluck and shape my eyebrow independently. There were many times when I asked Gale to help me and in every session I became wary of my bladder. I learned to take a break each time I find it difficult to tolerate the pain. The prom was indeed a memorable event in my life. Everyone was impressed with the changes in my appearance when they saw me dressed in halter gown, wearing a 3-inch high heeled pair of shoes, a make-up and an attractive hairdo. Gale became the prom queen and I became the girlfriend of the prom king a month after he unintentionally stepped on the hem of my gown that led me to lose my balance on the dance floor and bumped on the waiter who was serving drinks. Well, that was another embarrassing moment. Gale became my best friend and from time to time we both laugh as we recall the summer of our pre-prom preparation days.

Sunday, October 27, 2019

Potential Bottlenecks in Implementing MCTS in Odisha.

Potential Bottlenecks in Implementing MCTS in Odisha. Introduction Mother and child tracking system (MCTS) is the online software used by the National Health Mission (NHM), formerly National Rural Health Mission (NRHM), for tele-monitoring Reproductive and Child Health (RCH) services delivered by the Government of India(1). It is an innovation of Health and Family Welfare (HFW) department supported by the National Health Mission(2). This software was conceived way back in 2008 to increase the coverage of RCH services. Left out and drop out beneficiaries for various services, including immunization, can be tracked name wise using this system. Using this software, beneficiary wise and even health unit wise relevant information can be retrieved from any location by any health or associated authority by logging on to the system using the username and password provided to him/her(3). It can greatly reduce the death rates of infant and mother and even reduce total fertility rates through an attempt to provide universal coverage of services. The origin of the concept is linked to the tracking of ‘due’ beneficiaries in immunization sessions using the tracking bag(4) at the sub-center. The tracking bag consists of 14 pockets, of which 12 are meant for 12 months in the year and two more meant for children with complete and incomplete immunization status respectively. Due beneficiaries for a particular month are tracked using counterfoils which would be kept in the pockets for the particular month. MCTS utilizes two formats for capturing data for new beneficiaries– Format I and Format II. The former one is meant for mothers and the latter is for children born of these mothers. Once a woman is detected to be pregnant, she is registered with the health system in the MCTS register so as to receive all the free health services and details are captured in the format I. The data are then sent every week, via the supervisors to the block level, for online data entry into the MCTS. The same is also done for all newborn babies using format II. Services received by the beneficiaries are supposed to be maintained in the Mother and Child Protection (MCP) card provided to the beneficiaries. Subsequently, every week sub-center wise work plan is generated from the MCTS and distributed through the supervisors to the sub-center Auxiliary Nurse Mid-Wife (ANM), for providing the services, updating the services received and tracking the beneficiaries who could not avail the services. Work plans are generated for various kinds of services like registration of pregnant woman, antenatal care services, delivery services, post-natal care services for mother and neonatal child, child health services including immunization, family planning services, etc(2). In short the system perfectly tries to track the left out and drop out case wise, and ensure universal delivery of services(2)(5). Presently MCTS is used throughout the state and lots of human resources have been deployed by NHM at block and district levels to enter, analyze and track the data for the mother and child services. As compared to the proportionate increase in the human resources and other investments, the service coverage has not increased substantially (for example immunization coverage). Even certain studies on mechanisms for tracking immunization in developing countries show similar results(6). There has been disparity during data validation exercises using health indicators from sources like Health Management and Information System (HMIS)(7) and MCTS. Even no assessment has been undertaken to review the bottlenecks of MCTS. Hence a study was planned to identify and provide suggestions for correcting the bottlenecks in the implementation of mother and child tracking services in the state of Odisha, if any existed. Objectives of the study To understand the process of implementation of Mother and Child Tracking Sytem in Odisha and identify the bottlenecks in the implementation process, if any. To identify feasible solutions and suggest recommendations for the identified bottlenecks. Method of study The study was qualitative in nature. It was conducted in three UNICEF supported districts (all tribal predominant) of Odisha state (having 30 districts) from August 2013 to November 2013. In-depth interview (IDI) was the key tool for data collection. Key program implementers involved in the process were listed down along with their assumed roles and responsibilities (Table 1). Judgmental sampling method(8) was then used and IDI was done with identified key informants involved in the implementation of MCTS (block and district level managers and supervisors). A total of 15-24 in-depth interviews (IDI) were planned for the study (regarded as the stage of thematic and theoretical saturation)(8). The end point planned was the point when no new qualitative information was received(9). Three blocks each of these districts were randomly selected and key informants were identified for IDIs. Consent was taken from the interviewers using WHO’s informed consent form for qualitative studies(10). Personal interviews were performed with a pre-determined and pre-tested tool with more often than not open ended and few close ended questions/ probes (Box 1). Along with that satisfaction level of the implementers was recorded using a continuous scale(11). Practically feasible solutions and suggestions as recommended by the informants were also noted along with bottlenecks. Data collection, cleaning and analysis was done simultaneously. Recorded data were transcribed independently by two researchers onto paper, translated to English and then manually analyzed. The qualitative content analysis method was employed(12)(13)(14) for analysis. Nine major heads were identified for the purpose- human resource issue, data generation issue, issues with skill, data entry issues, cov ering events, software issues, supervision, review and financial topics. All other findings were put under a tenth head. After data analysis, brainstorming sessions were carried with the RCH team of UNICEF Field office to put forth other recommendations for the issues noted. Results A total of 20 interviews were conducted in the study with six to seven interviews on an average from each district. Time for the interviews ranged from minimum of 25 minutes to a maximum of 40 minutes. Block level data managers and block program managers in charge of MCTS in the block were identified as the key informants at the block level. Lady health visitors (LHVs) and Health Supervisor (HS (M)) were likewise included in the process. Interviews were also conducted with District Data Managers (DDM) who was the supervisor of BDMs at the district level. Interviews with the stakeholders revealed that there has been a lot of improvement in certain service delivery components. Some of these include availability of a definite work plan (also called due list) for the ANM and Accredited Social Health Activist (ASHA) every week, validation of HMIS data, entering data and assessing reports from any place using provided username and password, validation of incentives provided to beneficiaries and to ASHA for various activities, improvement in service delivery for various national health programs, etc. â€Å"We are able to review the sectors based upon the MCTS data.† [LHV] â€Å"Now, the health workers have realized the benefits and use of MCTS and are frequently asking for clarifications, when required†. [BPM] It was observed that the work plan and reports passed through all the stakeholders of MCTS, including the supervisors. But the involvement in terms of understanding of the process and providing mentoring support was poor, as cited by a few. The reports were collected at the end of the HWF, who would submit reports to their sector level supervisors. Details of the flow mechanism of reports are shown in Fig. 1. On an average satisfaction level regarding implementation of MCTS among block and district level stakeholders was found to be 7 out of 10 (range 4 to 9). Lack in the perfection of the implementation were many, some of which were analyzed and placed in Table 2. It was also noted that a BDM had to devote a great proportion of his time for data entry thus disturbing the equilibrium between personal and professional life. This was set up especially for those located in big blocks and universally for everyone roughly on an average 15 days (last week of a month and first week of the following month), at the time of report collection and entry. Verbatim of some of the important issues found during the interview are listed down under. â€Å"Health workers collect their work plans on their own or in some indefinite process. But the collection of updated work plans from the workers is being done in sector meetings.†[LHV] â€Å"We are facing problem in covering the beneficiaries in outreach areas due to seasonal and migration issues.† [LHV] â€Å"The software needs to be improved.†[BPM] â€Å"HMIS software is better than MCTS with respect to report generation and review monitoring. The MCTS software is much slower than HMIS and needs high speed internet connectivity.†[BPM] â€Å"Due to network connectivity issues, we often ask the BDMs to come to the district NRHM Office and do the data entry here.† [DDM] Discussion and Recommendations Tracking down beneficiaries to increase the coverage of services can definitely reduce the number of miss outs and drop outs for any services catered, and with stringent implementation as planned can definitely improve service delivery. Moreover the planning component of some of the health programs can be addressed in the process. But it was found that issues invariably did exist at all levels and all components of this naà ¯ve model. A single register needs to be maintained integrating components of mother register and child register, which will reduce the workload of the health workers. The simple availability of logistics like paper and cartridge for printing can be some of the minor issues, which if addressed can bring out successful results. Similarly, engaging the data entry operators in the tasks they are meant for can provide quality inputs to the tracking system, not only in terms of improving the data quality, but also an effective plan generation, follow up and tracking of miss out and drop out cases and health review. It will provide a working environment and boost the motivation of these DEOs. Review of MCTS entry, analysis and tracking of follow up of instances should be done block wise with team effort rather than having any single individual accountable. Supervisors should take on an important part in offering mentoring support for tracking, record keeping and updating. An effective model of intern al monitoring and/or mentoring system for underperforming sub-centers in MCTS implementation (eg. Using Lot Quality Assurance Sampling Method) is needed. Own server can be set up at the state to solve server speed issues. More data entry staff at the block level is needed so as to reduce data entry load in large blocks with huge data load. More number of ANMs or support in the form of additional ANMs is needed in sub-centers with more population. This solution has also been cited in other studies of the same author(15). Data Entry Operators (DEOs) for Rashtriya Swasthya Bima Yojana (RSBY)(16) can be engaged in data entry activities wherever the data entry load is high. A proper operational research can throw light on the mechanism to identify blocks needing more human resources along with other financial support. All services provided and recorded in MCP card should be fed into MCTS to make effective tracking possible. Customization of the software for integrating and validating data of other related programs like Home Based Newborn Care(17), Special Newborn Care Unit(18)(19), etc. can also be done. Adequate contingency provision in the NHM PIP should be made. Collaborating with mobile partners to develop SMS based portal for reporting details of a beneficiary can be done and this can also provide real time reporting. Similarly loading the data in a Geographic Information System (GIS) based maps can be used increase tracking mechanism one step further(20). Extra incentives for each additional work put to the BDMs, may be provided. Training pharmacists in ODMIS(21) can decrease the workload on BDM at the block level. Conclusion Mother and child tracking system is an innovative method of tracking down the beneficiaries name wise, with an objective to bring down the IMR, MMR and TFR. It can help the government to achieve universal coverage of services. Presently MCTS has helped the service providers to effectively manage miss outs and drop outs for various services like immunization, family planning, maternal and new-born care. Validation of HMIS and incentives (to beneficiaries and ASHA) is also being done using MCTS. In spite of all positive aspects, practical issues were found to exist and need to be sorted out. Review, in detail, can sort out many operational and financial issues. Needs of large blocks should be addressed specifically. Server issues need to be addressed along with a provision of SMS based reminders. Real time data entry can make things more convenient. Correct and complete entries in the MCP will help in appropriate utilisation of the software. Acknowledgement: The authors would like to thank program managers from National Health Mission and health staff of the state government for participating in the study and providing field realities. Dr. Ashish Kumar Sen, being supervisor of the team, had supported the study and provided relevant inputs is also acknowledged. Competing interest: This article was accepted and presented as a conference paper at the International Telemedicine Conference held at Jaipur in 2013. References 1. Achievements of MDG Commitments Made Under NRHM [Internet]. Press Information Bureau, Government of India. 2012 [cited 2014 Nov 25]. Available from: http://pib.nic.in/newsite/erelease.aspx?relid=82520 2. Operational Manual: Mother and Child Tracking System [Internet]. National Rural Health Mission; 2010 [cited 2014 Nov 17]. Available from: https://nrhm-mis.nic.in/Home MCH Tracking System/User manual for MCH Tracking by NIC PDF format.pdf 3. Ministry of Health and Family Welfare. Mother and Child Tracking System [Internet]. [cited 2014 Nov 17]. Available from: http://nrhm-mcts.nic.in/mch/ 4. Immunization Handbook for Medical Officers. Department of Health and Family Welfare, Government of India; 2008. 197 p. 5. Operational plan for Mother and Child Tracking System [Internet]. Ministry of Health and Family Welfare; [cited 2014 Nov 17]. Available from: http://mohfw.nic.in/showfile.php?lid=421 6. Leach-Kemon K, Graves CM, Johnson EK, Lavado RF, Hanlon M, Haakenstad A. Vaccine resource tracking systems. BMC Health Serv Res. 2014;14:421. 7. Ministry of Health and Family Welfare. NHM Health Management Information System Portal [Internet]. [cited 2014 Nov 29]. Available from: https://nrhm-mis.nic.in/SitePages/Home.aspx 8. Marshall MN. Sampling for qualitative research. Fam Pract. 1996 Jan 1;13(6):522–6. 9. Baker SE, Edwards R. How many qualitative interviews is enough? [Internet]. National Center for Research Methods; [cited 2014 Nov 25]. Available from: http://eprints.ncrm.ac.uk/2273/4/how_many_interviews.pdf 10. WHO | Informed Consent Form Templates [Internet]. WHO. [cited 2014 Nov 25]. Available from: http://www.who.int/rpc/research_ethics/informed_consent/en/ 11. What’s the best satisfaction survey scale? [Internet]. being CustomerSure Proven advice from Business Rockstars. [cited 2014 Nov 25]. Available from: http://www.customersure.com/blog/best-satisfaction-survey-scale/ 12. Kohlbacher F. The Use of Qualitative Content Analysis in Case Study Research. Forum Qual Sozialforschung Forum Qual Soc Res [Internet]. 2006 Jan 31 [cited 2014 Nov 25];7(1). Available from: http://www.qualitative-research.net/index.php/fqs/article/view/75 13. Thorne S. Data analysis in qualitative research. Evid Based Nurs. 2000 Jul 1;3(3):68–70. 14. Glà ¤ser J, Laudel G. Life With and Without Coding: Two Methods for Early-Stage Data Analysis in Qualitative Research Aiming at Causal Explanations. Forum Qual Sozialforschung Forum Qual Soc Res [Internet]. 2013 Mar 18 [cited 2014 Nov 25];14(2). Available from: http://www.qualitative-research.net/index.php/fqs/article/view/1886 15. Padhy G, Padhy R, Panigrahi S, Sarangi P, Das S. Bottlenecks identified in the Implementation of components of national health programmes at PHCs of Cuttack district of Odisha. Int J Med Public Health. 2013;3(4):271. 16. Ministry of Labor and Employment. Rashtriya Swasthya Bima Yojana [Internet]. [cited 2014 Dec 1]. Available from: http://www.rsby.gov.in/about_rsby.aspx 17. NHM Child Health Guidelines-Revised Home Based Newborn Care Operational Guidelines [Internet]. [cited 2014 Sep 30]. Available from: http://nrhm.gov.in/images/pdf/programmes/child-health/guidelines/Revised_Home_Based_New_Born_Care_Operational_Guidelines_2014.pdf 18. Neogi SB, Malhotra S, Zodpey S, Mohan P. Assessment of Special Care Newborn Units in India. J Health Popul Nutr. 2011 Oct;29(5):500–9. 19. Neogi SB, Malhotra S, Zodpey S, Mohan P. Challenges in scaling up of special care newborn units-lessons from India. Indian Pediatr. 2011;48(12):931–5. 20. Barau I, Zubairu M, Mwanza MN, Seaman VY. Improving polio vaccination coverage in Nigeria through the use of geographic information system technology. J Infect Dis. 2014 Nov 1;210 Suppl 1:S102–10. 21. Odisha Drug Inventory Management System [Internet]. [cited 2014 Nov 29]. Available from: http://dims.nrhmodisha.in/

Friday, October 25, 2019

Albert Einstein Essays -- Essay s Papers

Albert Einstein Einstein was born on March 14, 1879, in Ulm Germany. He lived there with his parents, Herman and Pauline. After a year in Ulm, due to the failure of his father's electrical and engineering workshop, the Einstein family moved to Munich (the capital of Bavaria), where after a year in residence there, Einstein's mother had Maja, Einstein's sister. Despite the fact that he was Jewish, from age five until age ten, Einstein attended a Catholic School near his home. But, at age 10, Einstein was transferred to the "Luitpold Gymnasium," where Latin, Greek, History, and Geography were pounded into childrens' heads. His parents wanted him to finish school, get his diploma so he could go to a University, and then become an electrical engineer. But Einstein had other Ideas for his future. Einstein's father wanted him to attend a university but he could not because he did not have a diploma from the Gymnasium. But there was a solution to this problem over the Alps, in Zurich, there was The Swiss F ederal Institute of Technology which did not require a diploma to attend. The one thing it did require was the applicant to pass an entrance exam. But then yet another problem arose, most scholars were 18 when they entered the institute, and Einstein was only 16. Einstein took the risk, and in the autumn he was dispatched over the Alps. Einstein took the exam, but did not pass. The principal of the school was impressed with his abilities, so he was admitted to the cantontal scho... Albert Einstein Essays -- Essay s Papers Albert Einstein Einstein was born on March 14, 1879, in Ulm Germany. He lived there with his parents, Herman and Pauline. After a year in Ulm, due to the failure of his father's electrical and engineering workshop, the Einstein family moved to Munich (the capital of Bavaria), where after a year in residence there, Einstein's mother had Maja, Einstein's sister. Despite the fact that he was Jewish, from age five until age ten, Einstein attended a Catholic School near his home. But, at age 10, Einstein was transferred to the "Luitpold Gymnasium," where Latin, Greek, History, and Geography were pounded into childrens' heads. His parents wanted him to finish school, get his diploma so he could go to a University, and then become an electrical engineer. But Einstein had other Ideas for his future. Einstein's father wanted him to attend a university but he could not because he did not have a diploma from the Gymnasium. But there was a solution to this problem over the Alps, in Zurich, there was The Swiss F ederal Institute of Technology which did not require a diploma to attend. The one thing it did require was the applicant to pass an entrance exam. But then yet another problem arose, most scholars were 18 when they entered the institute, and Einstein was only 16. Einstein took the risk, and in the autumn he was dispatched over the Alps. Einstein took the exam, but did not pass. The principal of the school was impressed with his abilities, so he was admitted to the cantontal scho...

Thursday, October 24, 2019

Is Privacy In The 21st Century Possible? Essay

Privacy was once valued and protected. But now with so many new and convenient technological advancements, is privacy in the 21st century possible? To protect our privacy Congress created the Electronics Privacy Acts (ECPA) to protect us from government access to private information that is transmitted and stored on the Internet, such as emails, private photos, or corporate data. Congress has not updated the ECPA on technology since it was created, in 1986. When the ECPA was created there was no â€Å"World Wide Web†, social networking was something in the future, and nothing was stored in what we call the â€Å"cloud.† With all the technological changes in today’s society no one is protected. Privacy is defined as being free from the public eye. Yet we have so many people sharing personal information on social networking websites, and government agencies monitoring emails, and phone calls most of the time without our knowledge. There is no privacy in the 21st century, it is just a nostalgic feeling, and it is no longer practiced. Today’s privacy laws aren’t up to date with today’s technology. Things are rarely sent through the mail, and emails and text messages have replaced written communication. Online messaging and social networking was something of a novelty when lawmakers created the ECPA (Frolik, 2013). A recent article from the Dayton Daily news written by Cornelius Frolik on June 2013 he mentioned, â€Å"The Government can easily access many personal communications and other private information without sufficient probable cause†. Instead of acquiring a warrant that requires more standards and procedures. Government agencies instead obtain subpoena’s to obtain people’s emails, and telephone records (Frolik, 2013). Although, local authorities catch lots of dangerous criminals through information online like emails, photos, and social media sites like Facebook some critics still feel it is an invasion of privacy. Also as our technology advances by leaps, and bounds so does the way Government uses new high tech tools to surveillance law-abiding citizens. Though our Fourth Amendment states to protect the American people from unreasonable searches and seizures. Almost everything is done through  technology in the 21st century. This meaning that government can seize any emails that are 180 days or that has been opened without a warrant; subpoenas have become the most used investigator tool for Government agencies. The reason why is because they can be easily written inside the prosecutors office without any further review from a judge. This means there is an exception to the Fourth Amendment of the United States Constitution, if it satisfies the requirements. The question we should be asking when it comes to Government and our privacy are † Is to explain a clear understanding of the word privacy†? If the Government cannot clarify the term privacy then how can they protect our privacy? The lack of clarity makes it hard for lawmakers to create new policies that will keep our privacy out of harm (Libin, 2012). Two reasons why privacy can be considered threaten in today’s society one being the Government powers are limitless, and two being we the American people expose ourselves digitally (Libin, 2012). The people of America should come together and declare for the Government to protect our privacy rather than participate in warrantless searches (Libin, 2012). The fact that the Government can argue that the Fourth Amendment does not apply because there is no exception to privacy when it comes to prot ecting national security, then that leave the American people in times of calamity, and crisis. Laws like the ECPA is a law that the Government has an obligation to respect (Libin, 2012). The ECPA protect the privacy of the electronic communications, but when law enforcement and prosecutors have to protect and enforce laws, personal information has to be collected to build a case (Libin, 2012). The solution is more complex than simply, and right now the Government is facing difficulties figuring out the best way to protect the American people (Libin, 2012). Given all the information privacy seems to be the problem. It can be portrayed in many ways, one as it’s protecting the public from terrorism, and local crime; and two being if you are innocent, what do you have to hide? In 2014 I find that most American people store their digital lives in what we call â€Å"The Cloud† which included emails, calendar data, photos, and other sensitive information. The ECPA has become obsolete. Technology today leaves the ECPA outdated, the laws have not changed since it was originally created  in 1986. The existing privacy laws only focus on the text-based personal records, and the issues that people face today with this outdated privacy law is gathering of digital multi-media files, and the way this unauthorized data is used (Lipton, 2010). Do you consider video surveillance systems out on the street personal data? Some may say yes and some may say no. According to a case study researched by Jacqueline D. Lipton, if the face of an individual is recognizable, than it is considered personal data. Some people feel protected with the video surveillance capturing their every moment. Then on the other hand some people feel they are being scrutinized being watched by video surveillance. The U.S. has a protection for free speech and for free of a press under the First Amendment. However there is no express constitutional right to privacy (Lipton, 2012). The question that American people should rigorously examine is whether or not Congress should repeal the ECPA and creates new privacy laws to replace it (Kerr, 2014). The ECPA should be considered top priority when it comes to being reformed. If Congress were to start fresh on what changes to make on the ECPA the technologic changes would have to be particularly considered. Being that the cost of stored information has changed it also changes how law enforcements surveillance people, it threatens privacy. In 1986 this all made sense because the internet was designed at this time to only hold limited storage, and wire-tapping was a threat more than stored information (Kerr, 2014). Overall access to stored record has become the greatest privacy threat. Technology has changed enormously, now everything is stored. With everything being stored now in what we call â€Å"The Cloud† like mentioned before stored information begins to reveal the same level of details as real time surveillance or real-time access (Kerr, 2014). Stored information has become more revealing an invasive. (Kerr, 2014). References _Cohen, J. E. (2013). What is Privacy For._ Harvard Law Review Association_,_ 126_(7), 1904,29. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=5& sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edsgbe&AN=edsgcl.333333595_ _Kerr, 0. S. (2014). The Next Generation Communications Privacy Act._ University of Pennsylvania Law Review_,_ 162_(2), 373-419. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/command/detail?vid=26&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=aph&AN=93917886_ _Libn, N. (2012). PRIVACY AND ACCOUNTABILITY IN THE 21ST CENTURY: Foreword._ Harvard Law and Policy Review_,_ 6_, 263. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=15&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edslex&AN=edslex2F0EC940_ _Lipton, J. D. (2010). Digitlal Multi-Media and The Limits of Privacy Law._ Case Western Reserve Journal of International Law_,_ 42_(3), 551-571. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=24&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=51909959_ _Sutanto, J., Palme, E., Chuan-Hoo, T., & Chee Wei, P. (2013). Addressing The Personalization-Privacy Paradox: An Empirical Assessment From a Field Experiment on Smartphone Users._ MIS Quarterly_,_ 37_(4), 1141-A5. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=29&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=91906295_

Tuesday, October 22, 2019

Attachment File Example

Attachment File Example Attachment File – Essay Example Essay In â€Å"Five Myths about Who Gets into College† the basic claim is that there is a big discrepancy in education between the poor and the rich. The highest percentage (74%) of students in selective colleges is from rich families with just a few from poor families. According to the article, admission policies of colleges favor rich student more. Further, there is a significant difference between SAT points for advantaged and disadvantage students attributed to race and socioeconomic factors. Also financial constraints make college dropout among poor students higher than their rich counterparts. The author uses data from previous researches, which makes his presentation more valid and authentic. In order to promote schooling of disadvantaged children, policies of selective colleges should be reviewed to promote equality in admission; students’ life context should be considered besides SAT points when admitting students and financial aid to poor students should be in creased.Darius Rejalis notion in â€Å"Five Myths about Torture and Truth† is that torturing of innocent individuals can be more detrimental than beneficial. According to him, torture is ineffective way of extracting the truth from the innocent, but rather a way of intimidating people. Rejalis presents historic evidence that portrays torture as a failure in intelligence. Many torture incidences in the past were far from success with detainees leashing no information at all in some cases. The author appears to be informing the readers about the topic because he takes no position throughout his presentation. The author’s presentation is so heart fetching that the readers can only see the animosity in torturing innocent people rather than the intention of the torturers. The author thus effectively communicates his idea that torture does more good than harm to its victims.

Monday, October 21, 2019

Free Essays on Hypercriminals

What is the "super predator"? He or she are young hyper-criminals who are committing acts of violence of unprecedented coldness and brutality. This newest phenomena in the world of crime is perhaps the most dangerous challenge facing society and law enforcement ever. While psychopaths are not new, this breed of super criminal exceeds the scope of psychopathic behavior. They are younger, more brutal, and completely unafraid of the law. While current research on the super predator is scarce, I will attempt to give an indication as to the reasons a child could become just such a monster. Violent teenage criminals are increasingly vicious. John DiIulio, Professor of Politics and Public Affairs at Princeton University, says that "The difference between the juvenile criminals of the 1950s and those of the 1970s and early 1980s was the difference between the Sharks and the Jets of West Side Story and the Bloods and the Crips. It is not inconceivable that the demographic surge of the next ten years will bring with it young criminals who make the Bloods and the Crips look tame." (10) They are what Professor DiIulio and others call urban "super predators"; young people, often from broken homes or so-called dysfunctional families, who commit murder, rape, robbery, kidnapping, and other violent acts. These emotionally damaged young people, often are the products of sexual or physical abuse. They live in an aimless and violent present; have no sense of the past and no hope for the future; they commit unspeakably brutal crimes against other people, often to gratify whatever urges or desires drive them at the moment and their utter lack of remorse is shocking.(9) Studies reveal that the major cause of violent crime is not poverty but family breakdown - specifically, the absence of a father in the household. Today, right now, one-fourth of all the children in the United States are living in father... Free Essays on Hypercriminals Free Essays on Hypercriminals What is the "super predator"? He or she are young hyper-criminals who are committing acts of violence of unprecedented coldness and brutality. This newest phenomena in the world of crime is perhaps the most dangerous challenge facing society and law enforcement ever. While psychopaths are not new, this breed of super criminal exceeds the scope of psychopathic behavior. They are younger, more brutal, and completely unafraid of the law. While current research on the super predator is scarce, I will attempt to give an indication as to the reasons a child could become just such a monster. Violent teenage criminals are increasingly vicious. John DiIulio, Professor of Politics and Public Affairs at Princeton University, says that "The difference between the juvenile criminals of the 1950s and those of the 1970s and early 1980s was the difference between the Sharks and the Jets of West Side Story and the Bloods and the Crips. It is not inconceivable that the demographic surge of the next ten years will bring with it young criminals who make the Bloods and the Crips look tame." (10) They are what Professor DiIulio and others call urban "super predators"; young people, often from broken homes or so-called dysfunctional families, who commit murder, rape, robbery, kidnapping, and other violent acts. These emotionally damaged young people, often are the products of sexual or physical abuse. They live in an aimless and violent present; have no sense of the past and no hope for the future; they commit unspeakably brutal crimes against other people, often to gratify whatever urges or desires drive them at the moment and their utter lack of remorse is shocking.(9) Studies reveal that the major cause of violent crime is not poverty but family breakdown - specifically, the absence of a father in the household. Today, right now, one-fourth of all the children in the United States are living in father...

Sunday, October 20, 2019

3 Types of Solutions with Semicolons

3 Types of Solutions with Semicolons 3 Types of Solutions with Semicolons 3 Types of Solutions with Semicolons By Mark Nichol In each of the following sentences, a structural flaw is easily repaired by use of one or more semicolons in place of one or more commas. Discussion and revision of each example explains the problem and demonstrates the solution. 1. Smith’s father called an ambulance, however, she was pronounced dead at the scene. However is not parenthetical to the first clause or to the entire sentence. To demonstrate that it applies only to the second clause, a semicolon should precede it: â€Å"Smith’s father called an ambulance; however, she was pronounced dead at the scene.† (A simpler alternative with more basic punctuation is â€Å"Smith’s father called an ambulance, but she was pronounced dead at the scene.†) 2. Apps can store shoppers’ receipts, gift cards, and shopping lists; present discounts and coupons; enable comparison shopping; make the checkout process simple and fast, and more. Because â€Å"make the checkout process simple and fast† and â€Å"and more† are equivalent to each other and to the three previous list items, a semicolon, rather than a comma, is required between them: â€Å"Apps can store shoppers’ receipts, gift cards, and shopping lists; present discounts and coupons; enable comparison shopping; make the checkout process simple and fast; and more.† 3. The risks include large-scale terrorist attacks or cyberattacks, failure of national governance, profound social instability, interstate conflict with regional consequences, or state collapse or crisis, food or water crises, extreme weather events, and failure of climate change adaptation, or high structural unemployment or underemployment, asset bubbles in a major economy, or fiscal crises in key economies. This sentence suffers from a lack of differentiation of several lists of categorically similar phenomena within the sentence, which is essentially a list. To improve readability, separate the sublists by inserting semicolons: â€Å"The risks include large-scale terrorist attacks or cyberattacks, failure of national governance, profound social instability, interstate conflict with regional consequences, or state collapse or crisis; food or water crises, extreme weather events, and failure of climate change adaptation; or high structural unemployment or underemployment, asset bubbles in a major economy, or fiscal crises in key economies.† (However, a complex list such as this might be better presented as a vertical bullet list.) Want to improve your English in five minutes a day? Get a subscription and start receiving our writing tips and exercises daily! Keep learning! Browse the Punctuation category, check our popular posts, or choose a related post below:Arrive To vs. Arrive AtWhat to Do When Words Appear Twice in a Row10 Humorous, Derisive, or Slang Synonyms for â€Å"Leader† or â€Å"Official†

Saturday, October 19, 2019

Against tithing in the modern-day christian church Essay

Against tithing in the modern-day christian church - Essay Example Tithing should not be practiced in the modern-day Church. There are several reasons for this, five good ones being the following: God does not dwell in churches made with human hands; the old Covenant cannot justify men through works and righteousness anymore; there would be less prosperity churches as well as their propaganda; the church can have a different approach towards giving than tithing; and the practice of tithing ended with the last book of the Old Testament in Malachi. These are just a few of the many reasons why tithing should not continue to be practiced in the modern Christian church. Tithing is an outdated notion which only serves to place a burden upon the people who have very little already—and casts a pall over the church as an organization that is only motivated by money and getting congregation members to handily donate or give to the Church. II. God’s New Covenant Dwells in a Body of Believers, Not a Physical Building Under the new Covenant, God do es not dwell in churches made with human hands—but rather dwells within a temple that is made of the body of believers. This is significant because Christians should not be focusing entirely on the revenue that a church creates through tithing, but rather make it a situation where people can donate or give openly or anonymously—in whatever fashion they see fit that is in line with church standards. Additionally, now believers under the new Covenant are now God's temple—and as such, the issue of tithing and giving 10% of one’s income is not an option.... , and—while people should still be encouraged to give freely to the church if it is within their power to do so—people should not be bullied into giving such a large portion of their income over to the Church, an obvious fact. III. Christ’s Appearance Abolished the Necessity for Tithing People used to tithe in the church in order to ensure that the Levirate (the priests who were descendants of Levi) were taken care of in order so that they could serve the church. Therefore, ten percent of the peoples’ offerings went to the priesthood. To continue such a practice by supporting pastors with ten percent of one’s income is not only based on a Biblical concept that is now out-of-date, but also unnecessary. The old Covenant cannot justify men through works and righteousness anymore, as Christ has already come. Since Christ came to the world because he loved the world—God having given ‘His only [begotten] son’ to pay recompense for the sins of the world—it no longer became necessary for the old rule of tithing to continue to stay in place.1 Christ died in order to bring the new Covenant into fruition, thus becoming the fulfillment of the law. People no longer had to abide by doing good works and seeking righteousness in order to secure their place in heaven. That is not saying people should not do good works or continue to live righteously—but works and righteousness are evidences that a Christian is still practicing the faith. These are the fruits of righteousness, which ever Christian should display. This is more important than some fabricated obligation to â€Å"give God 10%.† Christ should be the focus in the Church’s congregation, with every church appropriately divining God’s message as the churches’ missions are developed into full-fledged

Friday, October 18, 2019

Assignment Essay Example | Topics and Well Written Essays - 250 words - 18

Assignment - Essay Example Where is it at this time? Plan: Remember that gravity is acting against the ball, so the acceleration a = -g = - (constant of gravity near Earth’s surface) = - 9.8 m/s2. Due to gravity, at some point the ball is going to stop (v=0 at the maximum height that the ball reaches) and start to fall back down. We will use +y direction as the up direction. 2b.Next, from the same position, you throw an identical ball (Ball 2) straight down with the same launch speed as in the previous question. How fast will the ball be traveling 2 seconds later and where is it at this time?   The reason for this is that ball 1 reaches its maximum height, then falls back down. When it crosses the point where the platform is, it has the same speed it initially had when thrown up, only now it is going downwards with the same speed. Proof of this: Take ball 1, and find the final speed it would have if the final y value is the same as the initial y value (so that the ball is released from the platform, goes up, and comes right back to the platform). Use the equation vf2 = v02 -2g(yf-y0); the initial and final y values are the same, so their difference is 0 and we have vf2 = v02 -2g(0)= v02 ïÆ' ¨ in other words, vf and v0 have the same magnitudes, but different directions: vf = -v0 3.The ceiling of a classroom is 3.75 m above the floor. A student tosses an apple vertically upward, releasing it 0.5 m above the floor. What is the maximum initial speed that can be given to the apple if it is not to touch the

Diversity in Law Enforcement Annotated Bibliography

Diversity in Law Enforcement - Annotated Bibliography Example people belonging to different races and working in law enforcement agencies and to identify the various strategies that are being used by these agencies in order to attract as well as hire individuals belonging to different races in law enforcement agencies. The researchers identified that there is a lack of communication between the recruiters of law enforcement agencies and institutions that belong to racial minorities and they even identified that lower level of information is being supplied to racial minority communities and their institutions. The research article titled â€Å"Gay men in the police: identity disclosure and management issues† was authored by Rumens et al. and published during the period of 2012 (Rumens, 2012). The purpose of this research article was to focus on the research conducted to identify the ways individuals belonging to the LGBT groups were managed when they disclosed that they were gay or lesbian. The researchers identified that police officers who belonged to the LGBT group did not face difficulties in disclosing their sexual orientation and were looking for ways to disclose this information. The research even states that disclosed identities can be managed well in organizations that follow an open culture. The researchers conclude that it is quite difficult for gay police officers to integrate in an organization where masculinity is valued and empowered. Sadler, M. S., Correll, J., Park, B., & Judd, C. M. (June 01, 2012). The World Is Not Black and White: Racial Bias in the Decision to Shoot in a Multiethnic Context.  Journal of Social Issues,  68,  2, 286-313. The research titled â€Å"The World Is Not Black and White: Racial Bias in the Decision to Shoot in a Multiethnic Context: was authored by Sadler et al (Sadler, 2012). The purpose of this research was to identify the racial biasness that is experienced by police officers while they make the decision of shooting or not shooting possible offenders. The researchers identified

EDU 508 Family Chapter Presentations Assignment Example | Topics and Well Written Essays - 250 words

EDU 508 Family Chapter Presentations - Assignment Example The transition helps the child when leaving secondary school life and prepares him for adult life. One of the greatest challenges is faced in the transition period. During this period, parents and facilitators must engage in substantive dialogue about the child. In most cases, families from diverse backgrounds get upset or confused. The issue behind this setback is culture. I would employ an intercultural communication approach so that the parents who play key role in development of IEP appreciate their culture rather than feel upset or confused. The assessment done on the students revealed that the student is disabled and must be accommodated in the learning atmosphere. The criterion used by the team is satisfactory to help the needy child. It has identified some ways to accommodate the students with disability in a future classroom and as shown in the film and the lessons learnt from the

Thursday, October 17, 2019

Reflection paper on a documentary Night And Fog(1955) directed by Essay

Reflection paper on a documentary Night And Fog(1955) directed by Alain Resnais - Essay Example The film combines both images and narrated stories to unveil a great deal of evidence of atrocities that were committed in Europe in the 1940s as part of discrimination against particular groups of individuals. Genocide is therefore a central theme in the film and the infamous holocaust and anti-Semitism, as well as other inhumane treatments in the detention camps, have been used as examples to illustrate the effects of this crime. Genocide can be defined as the systematic and deliberate destruction of a group of individuals on the basis of their ethnic origin, religion, tribe, race, caste or nationality. The UN Convention on the Prevention and Punishment of t5he Crime of Genocide (CPPCG) in 1948 described genocide a deliberate crime that involves killing, causing mental and physical harm as well as inflicting on the conditions of life of a group or part of it based on nationality, ethnicity or race. Genocide is a crime punishable in international law. In this essay, I will reflect o n the concept of genocide and the film, Night and Fog, as well as other issues expressed in the film. The film details a very contemplative, moving and emotional account of the situation in the Nazi concentration camps. I concur with film critic Francois Truffaut that the short documentary film is one of the greatest movies ever made. After watching, Night and Fog, I firmly support the need for international regulation of genocide. The international community needs to come together and establish stringent laws and regulations that can prevent events such as the holocaust from reoccurring. Individuals and governments or any other groups supporting, financing or orchestrating the mass killing of individuals as a way of discriminating against their group for one reason or the other ought to be brought to book and forced to face justice. The emotions expressed in the short film Night and Fog, are too much for one to bear, let alone to witness such events unfolding in real life. I hail t he director of the documentary, Alain Resnais, for detailing such events in a classical film that even future generations will look at and regret actions committed by other human beings. I felt the general mood of the film was bleak, disturbing and thought provoking. I also think the approach taken by the documentary in explaining the series of events is very realistic, solemn and serious. This helps the film to delve in to details of the incident, enough to give viewers a reality check on how bad human nature can get if not controlled. In my opinion, the documentary is a masterpiece and classical. The film is very much relevant today as it was when it first came out. I would recommend the documentary to any individual fascinated by history and past events as well as international crimes and anyone who is interested in finding out the truth about the Nazi Rule in Germany. The film documents history lesson of utmost significance using a masterful and stylistic approach to deal with t he horrible subject of genocide and the holocaust. However, before one sits down to watch the film, I would advise them to be fully prepared to go through the difficult, albeit an invaluable experience. The film, despite being only 31 minutes long, tells a long story of past injustices and crimes that had been committed in Europe in the mid 1940s. The documentary is set in Poland and follows back on victims of the infamous

Exploring Qualitative Problems Essay Example | Topics and Well Written Essays - 1000 words

Exploring Qualitative Problems - Essay Example This may be due to them holding down a full time job, or their personal commitments that do not allow them to travel to school. Some students may be ill or may not be in a position to move out of their present residence to be able to attend college. Distance education schools provide such student with the chance to study and add to their knowledge and expertise without attending daily classes. These courses may be run via the internet by publishing lectures, by sending course material and receiving physical or electronic assignments from students or by using podcasts and interactive sessions on occasion. Many schools combine a number of methods in order to provide the best possible learning experience to their students. But often, this experience does fall quite short of the benchmark set by regular courses. This is often attributed to the reduced stimulation received by students taking distance education courses. Thus, a large body of research has been attempting to understand and a ddress this concern over the last few years. Research Addressing Quality Enhancement In a study by De Smet, Van Keer, and  Valcke (2008), the interactions amongst fourth year students who were trained to be peer tutors and freshmen were analyzed using content analysis (Shank, 2006; Bogdan, & Biklen; 2007). The study attempted to evaluate the kind of interactions and the topics covered by tutors and the support strategies provided by them in asynchronous discussion conditions. The authors evaluated the discussion threads and collected data by identifying the type of discussions and the points of change in topics. It was found that the importance of tutors was constant throughout. The discussions among participants and the strategies used by the tutors varied as per the discussion themes; but did not evolve to higher levels of conversation. The study also used cluster analysis to identify the types of tutors; and found three styles - motivators’, ‘informers’ and ‘knowledge constructors’. This was taken as more proof for the importance of tutors. While content analysis of conversation amongst peer tutors and the students has provided valuable information on this study (Bogdan, & Biklen; 2007); it would have been more valuable if some professional tutors were also to interact with students. The value and need of tutors is dependent on the students’ need to gain information that may not be otherwise accessible. Professional tutors may handle discussions differently from peers, and these differences may help us identify the kind of inputs that help distance education participants’ gain more knowledge and skills from their courses. The content analysis also gives us the type of interaction and the styles of interaction used to approach a given problem. This is a truly valuable technique in this case, as it helps us identify the structure of conversation that best helps in student development in a given topic. Another s tudy published by Menchaca and Bekele in 2008 provides an understanding of the elements that contribute to making distance education a success. The researchers wanted to identify the strategies and the tools that helped both instructors and students to succeed in online courses. To this end, they collected data from students, instructors and administrators over a long period and applied a qualitative method for constant comparative analysis

Wednesday, October 16, 2019

EDU 508 Family Chapter Presentations Assignment Example | Topics and Well Written Essays - 250 words

EDU 508 Family Chapter Presentations - Assignment Example The transition helps the child when leaving secondary school life and prepares him for adult life. One of the greatest challenges is faced in the transition period. During this period, parents and facilitators must engage in substantive dialogue about the child. In most cases, families from diverse backgrounds get upset or confused. The issue behind this setback is culture. I would employ an intercultural communication approach so that the parents who play key role in development of IEP appreciate their culture rather than feel upset or confused. The assessment done on the students revealed that the student is disabled and must be accommodated in the learning atmosphere. The criterion used by the team is satisfactory to help the needy child. It has identified some ways to accommodate the students with disability in a future classroom and as shown in the film and the lessons learnt from the

Tuesday, October 15, 2019

Exploring Qualitative Problems Essay Example | Topics and Well Written Essays - 1000 words

Exploring Qualitative Problems - Essay Example This may be due to them holding down a full time job, or their personal commitments that do not allow them to travel to school. Some students may be ill or may not be in a position to move out of their present residence to be able to attend college. Distance education schools provide such student with the chance to study and add to their knowledge and expertise without attending daily classes. These courses may be run via the internet by publishing lectures, by sending course material and receiving physical or electronic assignments from students or by using podcasts and interactive sessions on occasion. Many schools combine a number of methods in order to provide the best possible learning experience to their students. But often, this experience does fall quite short of the benchmark set by regular courses. This is often attributed to the reduced stimulation received by students taking distance education courses. Thus, a large body of research has been attempting to understand and a ddress this concern over the last few years. Research Addressing Quality Enhancement In a study by De Smet, Van Keer, and  Valcke (2008), the interactions amongst fourth year students who were trained to be peer tutors and freshmen were analyzed using content analysis (Shank, 2006; Bogdan, & Biklen; 2007). The study attempted to evaluate the kind of interactions and the topics covered by tutors and the support strategies provided by them in asynchronous discussion conditions. The authors evaluated the discussion threads and collected data by identifying the type of discussions and the points of change in topics. It was found that the importance of tutors was constant throughout. The discussions among participants and the strategies used by the tutors varied as per the discussion themes; but did not evolve to higher levels of conversation. The study also used cluster analysis to identify the types of tutors; and found three styles - motivators’, ‘informers’ and ‘knowledge constructors’. This was taken as more proof for the importance of tutors. While content analysis of conversation amongst peer tutors and the students has provided valuable information on this study (Bogdan, & Biklen; 2007); it would have been more valuable if some professional tutors were also to interact with students. The value and need of tutors is dependent on the students’ need to gain information that may not be otherwise accessible. Professional tutors may handle discussions differently from peers, and these differences may help us identify the kind of inputs that help distance education participants’ gain more knowledge and skills from their courses. The content analysis also gives us the type of interaction and the styles of interaction used to approach a given problem. This is a truly valuable technique in this case, as it helps us identify the structure of conversation that best helps in student development in a given topic. Another s tudy published by Menchaca and Bekele in 2008 provides an understanding of the elements that contribute to making distance education a success. The researchers wanted to identify the strategies and the tools that helped both instructors and students to succeed in online courses. To this end, they collected data from students, instructors and administrators over a long period and applied a qualitative method for constant comparative analysis

Graduation Speech Essay Example for Free

Graduation Speech Essay â€Å"The heights by great man reach and kept were not attained by sudden flight, but they while their companions slept were toiling upwards through the night. †   (Henry Wadsworth Longfellow  ) Members of the school board, principal and staff, distinguished guests in the audience and on the platform, parents, guardians, graduate, good afternoon. Our guest speaker for this afternoon is Mrs. Merlette Barrett-Fender. She was born in the parish of St. James. There, she attended the Salt Spring All Age School- later the Mt. Alvernia High School then went on to further her education at Shortwood Teachers’ College. She has worked at the Jamaica Telephone Company as an international operator. She later acquired a Bachelor’s Degree in Middle Grades Administration offered by Western Carolina University, at the Montego Bay site. Her zeal for leadership led her to access the Master of Science in Educational Leadership just two years later with the Jamaican Programme of Central Connecticut State University. She has worked at the Primary, Secondary and Tertiary levels of the education system, having the experience as class teacher, subject teacher of English Language and Literature at Cornwall College and as Principal. She presently holds the position of Academic Vice-Principal of Knox Community College. Mrs. Barrett-Fender posses a great love for her country and as a result has made the decision to remain in Jamaica. She takes great pleasure in working amongst Jamaica’s poorest, to help train and educate them and being the voice for some who are voiceless. As a member of the Upper St. James Consultative Committee, she conducts motivational talks to students and teachers. She is the lay preacher of the United Church in Jamaica and the Cayman Islands. She is dedicated to spreading the work of God for the upliftment of people. She possesses a vibrant personality, loves the outdoors, loves good company and enjoys helping others. Mrs. Barrett-Fender believes in having a sound character thus her everyday life is grounded in integrity. Her community involvement includes being a member of the Friends of the Hospital, the founder of Salt Spring All Age Past Students’ Association, past president and fund raising committee member, speaking at graduation exercises, Patron of the Knox Early Childhood Institute, motivational speaker, mentor and counselor. Ladies and gentlemen, boys and girls; please put your hands together as I introduce to some and present to the others Mrs. Barrett-Fender.

Monday, October 14, 2019

Analysis of One-step Self-etch Adhesive Systems

Analysis of One-step Self-etch Adhesive Systems Abstract: Purpose: To evaluate the performance of two types of one-step self-etch adhesive systems and one type of two-step etch-and-rinse (as a control) by examining the resin-dentin interface and assessing the nano-leakage. Materials and Methods: Cervical class V cavities were prepared in 30 sound human premolars. Two types of one-step self-etch adhesive, G-Bond (GB) and Adper Prompt L-Pop(APL), and one type of two-step etch-and-rinse adhesive, Excite (Ex), were used to bond the composite restorations. The restored teeth were incubated in water at 37ÂÂ ±1 oC for 24 h. Fifteen were subjected to further immersion in 50% ammoniacal silver nitrate solution for 24 h and soaked in photo-developing solution for 8 h. All teeth were sectioned across the bonding surface in bucco-lingual direction. The cut surfaces were polished, followed by 6N HCL application for 45s. All surfaces were metal coated before conducting the ultra-morphological observation, using the Field Emission Scanning Electron Microscope (FE-SEM), to characterize the hybrid layer and evaluate the nanoleakage. Results: A significant difference in the thickness of the hybrid layer was evident between all adhesive systems (ANOVA, p Conclusion: GB provides a nano-interaction layer at the dentin/adhesive interface that seems to play an important role in minimizing the degree of associated nanoleakage. Keywords:Â  Dentin adhesive, interface characterization, nano-leakag, one-step adhesives Introduction Although gap-free margins at the dentin/restoration interface could be achieved with some adhesive systems utilizing the total-etch technique, Sano et al., have described another pattern of leakage, by observing the penetration of silver nitrate along gap-free margins by the aid of either scanning (SEM) or transmission electron microscopy (TEM). Since leakage was found to occur within the nanometer-sized spaces around the collagen fibrils within the hybrid layer, it has been termed nano-leakage[1-5]. The nano-leakage usually represents permeation laterally through the hybrid layer and could be the result of the incomplete infiltration of adhesive resin into the demineralized dentin[3]. This kind of leakage may also allow the penetration of bacterial products or oral fluids along the interface, which may result in hydrolytic breakdown of either the adhesive resin or collagen within the hybrid layer, thereby compromising the stability of the resin-dentin bond[5]. In spite of the technique-associated difficulties, previous studies indicated the efficiency of 50% silver nitrate solution in detecting nano-leakage within the hybrid layer[3,6,7]. However, the acidity of that solution (pH = 3.4-4.5), during long time immersion could induce demineralization around the edges of the restorations, particularly into the partially-demineralized dentin, leading to false positive results[7-9]. The modified silver-staining technique was recently suggested to overcome the drawback of silver nitrate solution. It utilizes 50 wt% ammoniacal silver nitrate having pH measured at 9.5 aiming to eliminate the possibility of dentin dissolution at the hybrid layer[10]. Although the nano-leakage for various adhesive systems and its influence on bond strength have been evaluated in previous studies[11,12]. As well as the effect of different parameters as thermo-cycling and etching time on nano-leakage, this in vitro study aimed to evaluate the thickness of the interaction layer and nano-leakage of 2 types of one-step adhesive systems and one type of two-step etch-and-rinse (as a control)[8,13]. The null hypothesis tested was that the one-step adhesive system (G-Bond) might offer better adhesion to cavity walls via formation of a nano-interaction zone instead of the traditional hybrid layer. Materials and Methods Thirty sound freshly extracted premolars of patients indicated for orthodontic treatment were collected. The collected teeth were cleaned using the Pro-sonic 300 MTH (Sultan Chemists, Englewood, NJ, USA), and examined to ensure the absence of cracks using a binocular microscope at 20x magnification (Olympus Co., Tokyo, Japan). The selected teeth were stored in deionized water that contained antibacterial agent (0.2% sodium azide) for a maximum of 1 month[14]. Using No. 330 bur (Brasseler USA, Savannah, GA, USA) at high speed with copious air/water spray, standardized 2 mm deep class V cavities were prepared at the buccal surfaces 0.5 mm coronal to the cement-enamel junction of all teeth. The prepared margins were all placed in enamel. A metal, buccal-fitted, index was used to guide the external cavity outlines and a rubber stopper hanged to the burs shank has aided in determining the accurate cavity depth. All the prepared cavities were thoroughly rinsed with water and air-dried before receiving the composite restorations. Table1.shows the description and manufacturers of materials used in this study. Two one-step, self-etch (G-Bond); and (Adper Prompt L-Pop) adhesive systems were used to retain the Tetric Ceram hybrid composite restorations. In addition, 1 two-step, etch-and-rinse (Excite) adhesive system was also selected to serve as control (n= 10 cavities for each). The self-etch adhesive systems were applied to the prepared cavities and left for 10s before air thinning. Curing of both self-etching adhesives was performed by the use of a light-curing device (Hawe-Neos, Gentilino, Switzerland) for 10s. The dentin surfaces of control cavities were etched with 37% phosphoric acid (Ivoclar-Vivadent) for 15s, washed under copious air-water spray, then the excess water was removed by blotting with a tissue paper leaving the dentin visibly moist. The Excite adhesive was then applied using a brush for 10s and light-cured for 20s after air-drying of the excess material. The cavities were then filled with composite, and cured for 40s before finishing using 1000-grit abrasive paper (SAIT AC Abrasive, Torino, Italy) in presence of water-cooling. The restored teeth were incubated in distilled water at 37ÂÂ ±1ÂÂ °C for 24 h before sectioning and testing have taken place. Assessing the dentin/adhesive interface Five premolars from each group were half-sectioned bucco-lingually across the bonding surface with a low-speed diamond saw (model 650, South Bay Technology Inc., CA, USA). The cut surfaces were then lightly finished using a sequence of 600, 800, and 1000-grit abrasive papers (SAITAC Abrasive) in presence of water-cooling followed with light polishing with diamond paste. The samples were then immersed in 6N (mol/L) HCL for 45 seconds then rinsed with distilled water and dried for 24 h at 37ÂÂ °C (Binder Incubator, Type B28, Tuttlingen, Germany). The dried samples were sputter coated with gold-palladium (JEOL, JFC, 1100e, Tokyo, Japan.) The dentin/adhesive interface of each sample was then examined using a field emission scanning electron microscope (FE-SEM) at 30 KV (JEOL, JSM, 5600LV, Tokyo, Japan)[14]. The thickness of interaction layer was measured in micrometer using a standard microscale calibrated FE-SEM Evaluating the nano-leakage The root apices of the remaining five teeth of each group were covered with sticky wax (Dentsply DeTrey, Bois Colombes, France), while their entire surfaces were coated with two layers of nail varnish except for the cervical margin of the restored cavity and 1 mm around. A modified silver staining technique, was used with basic 50wt% ammoniacal silver nitrate (pH=9.5)[15]. The chemical reagents from which the staining solution was prepared are listed in (table 1). The solution was freshly prepared by dissolving 25 g of silver nitrate crystals in 25 ml of distilled water. Concentrated (28%) ammonium hydroxide was used to titrate the black solution until it became clear as ammonium ions complexed the silver into diamine silver ([Ag(NH3)2]+) ions. This solution was diluted to 50 ml with distilled water to achieve a 50wt% solution. The teeth were immediately immersed into the freshly-prepared ammoniacal silver nitrate solution in total darkness for 24 h, followed by thorough rinsing with running distilled water for 5 min. The stained teeth were then placed in a photo developing solution for 8 h under fluorescent light to reduce the diamine silver ions into metallic silver grains within the voids along the bonded interfaces[2,3]. After removal from the developing solution, the teeth were placed under running distilled water for 5 more minutes. The stained teeth were then sectioned and their cut surfaces were finished, polished and acid-treated foll owing the previously mentioned conditions. The measurements of silver penetration were calculated directly on the SEM monitor, using a multi-point measuring device, observing all the internal cavity margin lengths, in steps of approximately 100 ÂÂ µm[6]. The leakage values were expressed as the sum of the cavity margin lengths showing silver deposition. A comparison between these lengths among the three adhesive systems was possible since the dimensions of all cavities were standardized as mentioned before. Statistical analysis The data were statistically analyzed using SPSS statistical package version 10. The data were examined for normal distribution using Kolmogorov-Smirnov test. One way analysis of variance ANOVA was used to compare the values of the three groups. The Tukeys post hoc analysis was used to confirm the significance of differences detected between the test groups and the control. The test was considered significant when p Results SEM images representing the adhesive/dentin (A/D) interfaces (Fig 1-3) revealed a variation in the thickness of the detected interaction layers between the tested adhesive systems. ANOVA indicated significant differences between thickness of interaction layers of tested adhesives (p These differences were confirmed among the mean values of Ex and GB (Tukeys comparison, p Penetration of silver along the cavity walls was observed in all samples. (Fig.4-6). Table 3 summarizes the results of nanoleakage testing. ANOVA indicated significant differences between the mean values of the sum of the cavity margin lengths showing silver deposition in the tested adhesive systems (p Discussion Fear of bacterial ingress at the restoration/tooth interface and the subsequent caries recurrence has pushed the interest of researchers to assess the adaptation and adhesion of restorative materials against tooth cavity walls. Several studies, had the concern to evaluate the source of adhesive-dentin bond through assessing the interface characterization[2,16,17]. In vitro study, it is evident that the G-Bond created a thinner interaction zone in comparison to those formed with other adhesives (Figs1-3). Both the Ex and APL formed traditional hybrid layers as a result of resin infiltration within the demineralized dentin through the collagen fibrils. However, the demineralization in case of Ex seems to be more deep as a result of longer time of acid contact (30s). This assumption could explain the formation of the thicker hybrid layer[17] [17]. The interface formed by GB looks different as the surface of dentin is decalcified only slightly and there is almost no exposure of collagen fibrils. This suggest that functional monomers contained in the bonding material react with hydroxyapatite to form insoluble calcium, forming a thin transitional zone that could be measured in nanometers, so it could be termed a nano-interaction zone with the ability to reduce the risk of bond deterioration[18,19]. Moreover, evaluating the microleakage and recently the nanoleakage represent important means of assessing the defective adaptation of materials[20]. Although the use of silver nitrate dye was effective in detecting the nanoleakage, this in vitro study used the ammoniacal silver nitrate dye because of its efficiency doing the same job and to eliminate the drawback of the regular silver nitrate deminerlizing the dentin[3,4,10,15]. SEM images (Figures 4-6) indicated the presence of nanoleakage in all samples bonded with different systems as manifested by the infiltration of silver ions at the adhesive/dentine interface and in some instances around the collagen fibrils. These findings could be attributed to the effect of resin contraction at the time of its polymerization[21]. In addition, the improper wetting of the resin to dentin and collagen surfaces could exist as a result of the wet nature of dentin tissues and bonding resin viscosity[22]. The previously nominated factors could create nanogaps between the bonding resin and dentin surfaces. Confirming the same assumption, other researchers have related the occurrence of nanolekage to the presence of areas of imperfect resin infiltration, retained water or other solvent, poor polymerization, or phase separation[22,23]. On the other hand, various degrees of silver penetration and brightness were evident between samples of different groups indicating different degrees of nanoleakage. This result could be related to the chemical nature of the adhesive systems themselves that is reflected on the expected degree of polymerization shrinkage and the degree of water sorption (dye solution). The recently-marketed adhesive system, G-Bond, includes water and organic solvents in its chemical formula to improve resin infiltration within the wet dentin substrate, as well as nanofiller particles to reduce the extent of polymerization contraction[24]. A study by Pashley EL et al., stated that when HEMA is included as a polymerizable solvent for resin monomers, residual water may persist during evaporation as a result of lowering the vapor pressure of water by HEMA[25]. In previously published TEM observations, pure polymerized HEMA permitted extensive silver impregnation. The authors stated that when HEMA is copolymerized with other resin monomers in the presence of water, it could form hydrogel in the hybrid layer, resulting in additional silver filled patterns in the interfacial layer. In the present study, both APL and Ex. contain HEMA and water which could be the reason of the higher degree of nanoleakage. However the presence of alcohol solvent in the Ex formulation could improve the resin infiltration and accordingly reduces the degree of nanoleakage in comparison to the solvent-free adhesive APL[22,26]. Conclusion Within the limitation of this study, the hypothesis that G-Bond adhesive system can offer better adhesion to cavity walls is acceptable. The formation of a nano-interaction layer seems to play an important role in minimizing the degree of nanoleakage at the bonding interface Clinical relevance: Using the G-Bond adhesive system for bonding composite restorations can minimize the expected degree of nanoleakage and accordingly could reduce the possibility of the future caries recurrence. Figures: Fig (1): SEM image of the interface bonded with G-Bond. The area shown by arrows, between the cured adhesive layer (A) and the dentin (D), is the very thin interaction (hybrid) layer. The electron density in this area is higher than that found with other adhesives. C= composite resin, A= adhesive; D= dentin Fig (2): SEM image of the interface bonded with Adper Prompt L-Pop. The area shown by arrows, between the cured adhesive layer (A) and the dentin (D), is distinct (hybrid) layer with a uniform thickness than that with G-Bond. The funnel shaped configuration of the resin tags is visible, which is resulted by removal of the highly mineralized peri-tubular dentin. C= composite resin, A= adhesive; D= dentin Fig (3) SEM image of the interface bonded with Excite. The area shown by arrows, between the cured adhesive layer (A) and the dentin (D), is distinct (hybrid) layer with a uniform thickness than that with G-Bond. The funnel shaped configuration of the resin tags is visible, which is resulted by removal of the highly mineralized peri-tubular dentin. C= composite resin, A= adhesive; D= dentin Fig (4): SEM image of the interface bonded with G-Bond showing minimal silver deposition in the form of a small distinct localized area (arrows) C= composite resin, A= adhesive; D= dentin Fig (5): SEM image of the interface bonded with Adper Prompt L-Pop showing greater and more intense silver deposition in the form of a small distinct localized area (arrows) when compared to G-Bond ( Fig 4) and Excite (Fig 6) C= composite resin, A= adhesive; D= dentin Fig (6) SEM image of the interface bonded with Excite. The silver deposition presented a less intense pattern when compared to Adper Prompt L-Pop (Fig 5). It was less continuing in the form of a dashed line(arrows) . The silver deposits were mostly located at the base of hybrid layer, but were sometimes also observed at the top. C= composite resin, A= adhesive; D= dentin Tables: Table (1): Materials used in the study:- Categories Materials Description Composition Manufacturer I- Adhesive systems 1. G-Bond (GB) Self-etch one step no mix adhesive Phosphoric acid ester monomer, UDMA, 4-MET, TEGDMA, Acetone, Water, initiators. GC America, St.Alxip. IL, USA. 2. Adper Prompt L-Pop (APL) Self-etch one step no mix adhesive Compartment 1: Methacrylated phosphoric acid esters, photo-initiator, Stabilizers Compartment 2: Water, HEMA, Polyalkenoic acid, Stabilizers 3M ESPE Dental Products, St. Paul, MN, USA. 3. Excite (Ex) Etch and rinse adhesive HEMA,DMA,Phosphoric acid acrylate, highly dispersed silicon dioxide,initiators and Stabilizers in alcohol solution. Ivoclar Vivadent Schaan, Liechtenstien. II- Restorative Materials 1. Tetric Ceram Light curing, fine particle hybrid resin composite BisGMA, UDMA, TEGDMA, Ytterbium trifluoride, Barium glass pigments and initiators. Ivoclar Vivadent III- Chemical reagents 1. Silver nitrate crystals Sigma Chemical Co.St. Louis. MO. USA 28% Ammonium hydroxide solution Table 2: Means and standard deviations of thickness of the interaction layer (ÂÂ µm) in tested adhesive systems Adhesive system Means SD 95% confidence intervals ANOVA P-Value Turkeys P-Value G-Bond (GB) 0.75 ÂÂ ± 0.16 0.49 1.00 Ë‚ 0.000 P1 Ë‚ 0.001 APL 1.65 ÂÂ ± 0.23 1.56 1.95 Ë‚ 0.000 P2 Ë‚ 0.05 Ex (control) 2.22 ÂÂ ± 0.23 1.53 2.50 Ë‚ 0.000 P1 Ë‚ 0.000 P1 : Turkeys comparison among the means of GB and APL. P2 : Turkeys comparison among the means of APL and Ex. P3 : Turkeys comparison among the means of GB and Ex. Table 3: Means and standard deviations of the sum of cavity margin lengths (ÂÂ µm) showing silver deposition in tested adhesive systems Adhesive system Means SD 95% confidence intervals ANOVA P-Value Turkeys P-Value G-Bond (GB) 12.70 ÂÂ ± 3.27 8.76 16.64 Ë‚ 0.001 P1 Ë‚ 0.002 APL 37.34 ÂÂ ± 6.56 28.83 45.85 Ë‚ 0.001 P2 Ë‚ 0.05 Ex (control) 20.74 ÂÂ ± 5.09 14.49 26.99 Ë‚ 0.001 P1 ˃ 0.05 P1 : Turkeys comparison among the means of GB and APL. P2 : Turkeys comparison among the means of APL and Ex. P3 : Turkeys comparison among the means of GB and Ex.

Sunday, October 13, 2019

Jack Kerouac’s On The Road - The American Quest Essay -- On The Road

On The Road and the American Quest      Ã‚  Ã‚  Ã‚   Jack Kerouac's On The Road is the most uniquely American novel of its time.   While it has never fared well with academics, On The Road has come to symbolize for many an entire generation of disaffected young Americans.   One can focus on numerous issues wh en addressing the novel, but the two primary reasons which make the book uniquely American are its frantic Romantic search for the great American hero (and ecstasy in general), and Kerouac's "Spontaneous Prose" method of writing. On The Road is an autobiographical first-person book written in 1951 and based on Kerouac's experiences of the late 1940's. At the time, America was undergoing drastic changes and the sense of sterility brought on by a mechanized Cold War era society resu lted in a feeling of existential dislocation for many. Numerous Americans began to experience a sense of purposelessness and the air was rife with disillusionment.   Kerouac was one of these restless postwar young people and he longed for...something.   A n ew kind of hero?   A return to a Romantic tradition and simpler days?   When Kerouac met Neal Cassady, he knew Cassady was the kind of hero he had been seeking.   Eventually, as Robert Hipkiss notes, "Kerouac began to see Neal as an 'archetypal American Man' "....and, in fact, when Kerouac created Dean Moriarty out of Neal, "he created a new symbol of flaming American youth, the American hero of the Beat Generation" (32-3).   Indeed, as Hipkiss argues, Dean Moriarty   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   is the most singular hero of the road America has ever had.      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Mixing the individualism of the freeborn American with that      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   great present-day extension of this freedom, the motor car, ... ...opeless and yet be determined to make them      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   otherwise.... On The Road is an example of such a test's      Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   being taken -- and passed.... (132)    Kerouac, like Bellow and Plath, sees that things are hopeless but he remains determined to go on, and on, and on....          Works Cited    Bartlett, Lee, ed.   The Beats: Essays in Criticism.   Jefferson, C.: McFarland, 1981.    Bartlett, Lee.   "The Dionysian Vision of Jack Kerouac."   Bartlett 115-26.    Dardess, George.   "The Delicate Dynamics of Friendship: Reconsideration of Kerouac's On The Road."      Hipkiss, Robert A.   Jack Kerouac: Prophet of the New Romanticism. Lawrence: Regents P of Kansas, 1976.    Hunt, Tim.   Kerouac's Crooked Road.   Hamden, CT: Archon, 1981.    Kerouac, Jack.   On The Road.   New York: Signet, 1957.      

Saturday, October 12, 2019

Abraham Lincoln and Calamity Jane :: essays research papers

In The Boys’ Life of Abraham Lincoln by Helen Nicolay and Life and Adventures of Calamity Jane, By Herself, tone is employed to more effectively display the purpose of the essays. In The Boys’ Life of Abraham Lincoln, Nicolay uses a tone that demonstrates triumph through tragedy, weaving specifics about Lincoln’s ancestors with the trials he faced. In Life and Adventures of Calamity Jane, By Herself, Mrs. Burk (Calamity Jane) uses a tone that is familiar to the world of documentaries, starting her story at her birth and ending with where she was when she wrote the autobiography. One must remember that The Boys’ Life of Abraham Lincoln is a biography, and Life and Adventures of Calamity Jane, By Herself is an autobiography. The contrasting of these two fine pieces of literature makes some specifics about tone and purpose stick out in one’s mind. The Boys’ Life of Abraham Lincoln uses a tone that is personal and endearing in order to inspire the reader to face circumstances in their life with the notion that a sunnier day will come only if they try their hardest to make the best of their current situation. Tone is also used to display Abraham Lincoln as a man who did just that to become â€Å"the greatest man of his time†. The biography begins nearly 175 years before Abraham Lincoln was born. It traces its way through the pioneering of his forefathers into the â€Å"west† by specifically pointing out hardships faced on the unfriendly trail. (They faced solitude, privation, and all the dangers and hardships that beset men who take up their homes where only beasts and wild men have had their homes before.) However, â€Å"they continued to press steadily forward† even though they lost most of what they had when they started their journey. The determined family continues on through the death of Abraham ’s grandfather, till Abraham is born â€Å"in deep poverty†. Throughout this initial background, it is hinted that Abraham will be â€Å"a wonderful man†, and it is noted how ironic it is that such a great man is to be born and raised in such a humble place. It is stated that of his early childhood â€Å"almost nothing is known†. The author still manages, however, to dig up an anecdote which portrays Abraham as a â€Å"generous child†. He was â€Å"large and strong for his age†, and when a â€Å"severe mysterious sickness† breaks out, Abraham pulls through, though many die around him.

Friday, October 11, 2019

Individualism vs. Societal Norm and Acceptance Essay

In the community of Salem, Massachusetts of 1692, their community is set as a theocratic society, where the church and the state come as one. Moral laws and state laws are also combined as one. Everyone is expected to live up to the established social norms. Any individual within the Puritan community whose private lives doesn’t conform to the moral laws established by the government is represented as a threat to the community and to the rule of God and true religion. In Salem, everything and everyone belongs to either God or the devil, anything that is unlawful is considered a devil’s work. Everyone in this community is expected to meet the expectations of the society, every little thing they do will be held against them. John Proctor is an example of an individualist in this society. John Proctor was unfaithful to his wife, Elizabeth Proctor, when he had committed an affair with a younger female, Abigail Williams. Committing adultery and telling lies are some examples of sinning in the Puritan community. John Proctor is breaking from the mores, beliefs and ethical codes of the Puritan community because not only does he commit adultery, but he also hides it from the community. His actions were the main cause of false accusation of witchcraft in this society. Eventually, when he realizes everyone else’s life is at risk because of him, he confesses. John proctor chose to hide his adultery because he was afraid of his reputation being ruined and having his life put at risk because he went going against the Puritan law. Another way John Proctor breaks away from the united societal norm of the Puritans is going against the court. The court is in high power in this society. At first, he lies to the court, admitting to witchcraft to save his own life, but when John proctor realizes it is wrong and a sin to the religion to tell a lie, he goes against his false confession to witchcraft. He caused contempt at court while trying to prove everyone’s innocence, but it did not go so well. John Proctor went against the Puritan law because he does not want to dishonor the innocent prisoners and he will not be able to live with himself knowing that other innocents died while he committed sins and the innocents were paying for it. The following quote said by John Proctor in Act IV, clearly shows contempt at court in the Puritans’ way of life:  Ã¢â‚¬Å"Because it is my name! Because I cannot have another in my life! Because I lie and sign myself to lies! Because I am not worth the dust on the feet of them that hang! How may I live without my name? I have given you my soul; leave me my name!† At the end, John Proctor was hung. He was hung for his mistakes, and died without lies to his name. In a theocratic society, where the church and state comes as one, every little thing you do is held against you in the long run. Individuals in the Puritan community whose lives did not meet moral laws were considered a â€Å"witch.† In Salem, everything and everyone belongs to either God or the devil, anything that is unlawful is considered a devil’s work.

Thursday, October 10, 2019

Describe and explain the value of industrial location models Essay

What is an industrial location model? [5] 1) A model is a mathematical representation that is used to show why patterns have occurred, or to predict how things will occur in the future. A location model shows why certain things have located in certain spaces and aims to show where they will locate in the future. An industrial location model therefore aims to show why industry has located in the area it has, and where it will locate in the future. The term industry includes primary, secondary, tertiary and quaternary sectors. All sides of industry can be incorporated in these models, this includes tertiary and primary as well as secondary employment, although most models are designed with manufacturing specifically in mind. There are many types of industrial location model. Weber designed a model that showed where secondary manufacturing industry would locate based on the weight of raw materials used and the weight of the final product. Smith (1971) built an alternative to Weber’s model, which is more updated and takes into account new types of transport and industries other than secondary. There are also models such as the behavioural matrix which attempt to show what type of companies are more likely to choose the optimum location for their business. Describe and explain the value of industrial location models [20] 2) A model of industrial location put forward by Alfred Weber in 1909 assumes that industrialists choose a least-cost location for the development of new industry. The theory is based on a number of assumptions. Weber assumes that there is a flat relief, uniform transport, culture, climate, labour costs, political and economic system, and that markets are of fixed size and location. It is also assumed that transport costs are proportional to the weight of the goods and the distance covered by the goods, and that perfect competition exists. One of the main assumptions is that raw materials are either ubiquitous or localised. Ubiquitous raw materials are found everywhere and are evenly distributed, and therefore would affect industrial location e.g. water and clay. Localised raw materials are not evenly distributed. Weber suggested that raw materials and markets would attract the location of an industry due to transport costs. Industries with a high material index would be pulled towards the raw material. Industries with a low material index would be pulled towards the market. The material index is calculated by dividing the total weight of raw materials by the total weight of the finished product. A material index of much greater than 1 indicates that there is a loss of weight during the manufacturing process; for example butter making. The factory should therefore locate near to the raw material. A material index of less than 1, where weight is gained during manufacturing, would locate near to the market. An index of less than 1 could be achieved by an industry using largely ubiquitous materials, like water, as in the brewing industry. Once a least-cost location has been established through the material index, Weber considers the effect of labour costs in deflecting industry away from the least cost location. Isodapanes are constructed to determine the area within which an industry can locate without losing money. The critical isodapane is the greatest distance an industry can locate from the least-cost location without losing money. If a source of cheap labour lies within an isodapane below the critical isodapane, it would be more profitable to choose the site with low labour costs rather than the least transport costs location. Weber also takes into account agglomeration of industries, the model suggests that some factories locate within critical isodapanes of other factories, to share resources labour and transport costs. Weber’s model doesn’t relate well to modern conditions. This is because it doesn’t take into account many recent developments such as reduced costs of transport and government intervention. Weber assumes a lot of things that in reality wouldn’t be found e.g. perfect knowledge of the market, and physical geography is ignored. Weber also ignores changes in costs and sources of raw materials over time. Overall Weber’s model is largely applicable to heavy industries only. In 1971 David Smith provided an alternative to Weber’s model of industrial location. Smith suggested that as profits could be made anywhere where the total income is greater than total costs, then although there is a point of maximum profit, there would be a larger area where production is possible and profit is still made. Smith suggested that industries rarely located at the least-cost location, but more often at a sub optimum and practical location. He suggested that this was due to imperfect knowledge about production and market demand, imperfect decision makers, who can be influenced by other factors, or may not act ‘rationally’, or a government policy, which may tempt industry to locate in areas of high unemployment or development areas. Smith’s model takes into account all types of transport although a circular margin of profitability is rarely produced in real life. Where Weber’s model can only be used for secondary manufacturing Smith’s model can easily be modified to include all types of industry. However Smith’s model is based entirely on money and other factors such as employees needs are not taken into account. The UK iron and steel production is a good example of industrial location compared to Weber and Smith’s models. Before the 1600’s, iron making was found near to outcrops of ore, where there were plenty of trees, e.g. Forest of Dean, because transport was poor and they were unable to move raw materials large distances. This fits Weber’s model because iron making would have a material index of greater than one, due to iron ore being much greater in weight than the iron produced as the finished product. However Weber’s model says that a resource such as trees will be ubiquitous, which is not the case here. After 1700 coke began to be used to smelt iron more efficiently. The new furnaces were located near coalmines, where coal would have been the heaviest raw material to transport e.g. Sheffield and South Wales. This fits Weber’s model. Today the coalmines have run out, but the industry hasn’t relocated because good transport systems mean that ores and coal can be transported in from abroad. This complies with Smith’s model because profit has been made in a sub optimum location. Other reasons for the iron and steel industry remaining in the same areas are large amounts of labour and agglomeration, which are covered in Weber’s model.