Wednesday, October 30, 2019

Convergence from GAAP to IFRS Essay Example | Topics and Well Written Essays - 1000 words

Convergence from GAAP to IFRS - Essay Example The paper will further discuss the benefits, which will accrue to United States firms, investors, and the economy as a whole, as a result of converging from United States Generally Accepted Accounting Principles to International Financial Reporting Standards. Convergence from Generally Accepted Accounting Principles to International Financial Reporting Standards Currently, International Financial Reporting Standards are used by more than 12,000 companies in the world and have been in use in over 100 countries around the globe. According to Kaiser et al. (2012), there are various ongoing projects, which were initiated by the International Accounting Standards Board and the Financial Accounting Standards Board with an aim of enhancing the International Financial Reporting Standards and America Generally Accepted Accounting Principles, and eventually making the principles fully compatible. Majority of these projects covers the key components of the financial reports. Through these proje cts, the boards plan to enhance financial disclosure information for shareholders while also aligning U.S. GAAP and international bookkeeping standards. Revenue recognition, financial instruments, and leases are deemed as the priority projects largely as a result of existing difference of IFRS and U.S. GAAP and the necessity for enhancements, especially in the principles they are intended to replace. The boards have also concentrated on financial reports presentation and consolidations projects due to considerable implications they might have (Kaiser et al., 2012). According to Henson (2012), in late 2011, SEC Chief Accountant, James Kroeker, indicated that considerable progress had taken place on numerous IASB and FASB Memorandum of Understanding convergence projects encompassing other comprehensive financial and income reporting fair value guidance. In January 2012, the chairman of IASB, Hans Hoogervorst acknowledged that International Financial Reporting Standards pose several ch allenges for the SEC. U.S. uses a sophisticated, mature and time stated set of bookkeeping standards, and this makes it difficult to make the convergence decision. In June 2012, IASB and FASB agreed on lease bookkeeping model where all leases with a period of one year or more would be reported on the balance sheet. Hans Hoogervorst indicated that the two boards anticipate completing the convergence project by year 2013 (Henson, 2012). The considerable progress in the convergence projects requires the United States companies, to start examining the implications of the convergence on their operations. This would enable companies to plan how to adopt the changes, which will arise from the convergence. This implies that, at the beginning of 2014, the U.S. public traded corporations might be obligated to file financial reports with the SEC using the International Financial Reporting Standards. In my opinion, it is beneficial for the United States to converge from America Generally Accept ed Accounting Principles to International Financial Reporting Standards. The convergence has various challenges and advantages. The challenges facing the transition may be addressed appropriately by all stakeholders involved in the convergenc

Monday, October 28, 2019

Bentham and Mills on Utilitarianism Essay Example for Free

Bentham and Mills on Utilitarianism Essay Im Researching Saved Recents Uploads My Answers Account Products Home Essays Drive Answers Texty About Company Legal Site Map Contact Us Advertise  ©2016 Bentham and Mills on Utilitarianism Utilitarianism, Ethics, John Stuart Mill Mar 28, 2006 1882Words 355Views PAGE 5 OF 5 As an American society statues and laws are placed before us to set a standard of morality and justice. But what truly determines whether an action is moral or immoral? As I analyze the works of Jeremy Bentham, in his Principle of Utility, Alongside John Stuart Mill, on Utilitarianism, we will better understand what the foundations of morality are in accordance to their writings. Furthermore, through their standards of utility I will analyze the situation proposed as to whether cheating on your income taxes can be justified as morally right or wrong in the eyes of the utilitarian. In his Work, Jeremy Bentham states Utilitarianism as that principle which approves or disproves of every action whatsoever, according to the tendency which it appears to have augmented or diminished the happiness of the party whose interest is in question. Plainly stated, Bentham defines utilitarianism as the ethical rightness or wrongness of an action directly related to the utility of that action. Utility is more specifically defined as a measure of the goodness or badness of the consequences of an action. J. S Mill later expands Benthams definition of the term by saying utility holds that actions are right in proportion as they tend to promote happiness, wrong as they tend to promote the reverse of happiness. Mill defines happiness as the absence of pain. Mill further states that there are different levels of pleasures. He states that some pleasures are of higher quality than others and thus more desirable. Mill states that, if all pleasures are equal and the only difference is in their quantities then human beings and lesser beings (such as a pig ) would receive gratification from the same sources of pleasure. Whereas Benthams utilitarianism makes no distinction between different beings and assigns the same pleasure to all members of the community, Mill separates human beings and lesser beings, which have pleasure that is of different category and worth. Mill gives an example by saying, It is better to be a human being dissatisfied than a pig satisfied; better to be Socrates dissatisfied than a fool satisfied. In comparing the two, one can see that Bentham and Mill agree that utility is measured by the result of happiness (or absence of pain) of an action. The next firm foundation of utility, according to Bentham, is the greatest happiness of the greatest number of people who are affected by the performance of an action. He states, The interest of the community (the sum of the interest of several members who compose it) is one of the most general expressions that can occur in the phraseology of morals. He supposed that social policies are properly assessed in light of their effect on the general well-being of the majority of the population that is involved. In a utilitarian philosophy the effects of an action is to be meticulously calculated for the greater good of the masses. Mill later describes the perfection of utilitarian morality with the golden rule of Jesus of Nazareth. In this rule he alludes to the section in the Bible where Jesus claims that we should do as you would be done by, and to love your neighbor as yourself. In saying this he states that laws and social arrangements should place their happiness of every individual as nearly as possible in harmony with the interest of the whole. It can be said that maximum utility results when the following process is undertaken: 1) analyzing the majority (level of happiness experienced by people) after each action made. 2) Summate the levels of happiness experienced in each case. 3) And lastly, compare the results. The one that can be said to lead to the greater amount of total pleasure or happiness is the superior alternative. Perhaps the difference between the two can be that Bentham believes in a precise calculation of the utility of each possible action in a given situation. This precise calculation is achieved through different criteria which are as follows: 1)Pleasure minus pain 2)Intensity 3)Duration 4)Fruitfulness 5)Likelihood The first criteria, of pleasure minus pain, refers to whether the pain produced by the decision is worth the happiness produced. The second, being intensity, refers to the resulting strength. Duration, as the third criteria, relates to the length of time the experience lasts. The fourth factor of fruitfulness refers to the long-term results of the pleasure. And finally, likelihood determines whether it is likely the choice will result in the presumed effect. Through careful calculation of these factors, Bentham believes it is possible to come to select the greatest choice, thus bringing pleasure to the most amount of people. Mill, on the other hand, does not oppose the very nature of calculating utility, but merely the effort and time it would take to calculate the decision made. Mill believes that decisions are superiorly made through the application of rules that have been calculated ahead of time. He states, We shall examine presently of what nature are these considerations; in what manner they apply to the case, and what rational grounds, therefore, can be given for accepting or rejecting the utilitarian formula. With the afore mentioned foundations of Utility, can the following given circumstance be said to be morally right in the eyes of the Utilitarian: Suppose you have a dear friend who needs $1000 for her mothers medical bill and, if not treated, her mother will die and the pain of her family will be enormous. Suppose further that the only way to help your friend is to cheat on your income taxes that will never be audited. You believe that the money will not affect the IRS greatly because the government wastes billions of dollars anyways. You do not tell your friend how you got the money so that her and her family can experience enormous happiness. In deciding whether or not to cheat on your income taxes, a utilitarian must evaluate both sides of the overall welfare of the people affected by this action and the consequences of the action taken. In this case, the people affected would be (on one side) your friend, her mother, her family, and yourself, also (on the other side) the US government. The next step taken by Utilitarians would be to measure the pleasure and pain which would be caused by cheating on your income taxes. The consequences that can relatively be calculated, on the side of your friend, if the action is not taken can be: 1)the mother will have pain and die 2)your friend and her family will suffer enormous pain 3)you will suffer alongside your friend. And the pleasure would be the opposite. On the other hand, the consequences for the government, in your eyes, will be minimal since you will not be audited: 1) they will be oblivious to the fact that they should have received $1000 more 2) the government usually wastes billions of dollars. However, the true consequences of cheating on your taxes can be said to: 1) break the law of paying your taxes in their entirety 2) bring you pain if you are caught 3)effect the budget of a certain program that your money would have gone to. In this case, from the eyes of the person cheating on the income taxes, the greater pain would be to deprive their friend of the money at the present time. However, according to Mill, utilitarianism must be qualitatively weighed. This requires for one to consider, not only, the amount of pain and pleasure, but also the quality of each pain and pleasure. Mill states, According to the Greatest Happiness Principle, the ultimate end, is an existence exempt as far as possible from pain, and as rich as possible in enjoyments, both in point of quality and quantity. A flaw in utilitarianism, is that nothing is really said to be absolute. Every circumstance is relative to each person. What one person may consider to be morally right and just and of good quality, may not be the same for another. Mill suggests that to distinguish between different pains and pleasures a person who has experienced both sides of pleasure and pain should be able to measure and choose which result concludes in more happiness. In this particular case, many things can result from cheating on your taxes. For example, the $1000 that you withheld from the government could have gone to help a school in a poor community, therefore causing pain to the teaching staff that will not receive the money they deserve, or the students who will not receive appropriate supplies. Another result can be that one less item can be bought to support the nation in a fruitless war, which will bring happiness to those who oppose war. In such a case, there really is no way to be able to determine the direct result of what ones income taxes will benefit, so it is very arduous to weigh the quality of pain and pleasure in each side of the circumstance. With the previously given examples it is no wonder why Mill states, It is often affirmed that utilitarianism renders men cold and unsympathising; that it chills their moral feelings towards individuals due to the fact that an individual can not calculate the measured unhappiness of each action. Therefore because we do not have the time to calculate accurately in every instance, Mills supposed, we properly allow our actions to be guided by moral rules most of the time, which in this case would be the laws set forth by the government. As Mill stated we should be able to rely absolutely on ones feelings and conduct, and to oneself of being able to rely on ones own, that the will to do right ought to be cultivated into this habitual independence. Plainly stated, if one feels that it is morally wrong to cheat on your taxes, because it is a direct violation of the laws given by the government, then we must rely on those feelings to make the morally right decision to not cheat on the taxes. Therefore it can be concluded that the action of cheating on your income taxes to help a friend in need can not be accepted as morally right. Though the intentions may be noble, and may be meant to bring quantitative and qualitative happiness, the action still remains morally wrong and can bring about even more quantitative and qualitative unhappiness. In such a case, the conclusion will always be met with some sort of pain. Mill stated that neither pains nor pleasures are homogeneous, and pain is always heterogeneous to pleasure. So alongside the pain caused by an action to cheat or not cheat on your taxes will always bring alongside a pleasure. In conclusion, the utilitarian foundations as stated by Jeremy Bentham and J. S. Mill altruistically put the happiness of others or of the majority ahead of the individual. As stated by Mill, in the long run, the best proof of a good character is good actions and such actions place the masses over the mutually exclusive. So through the works of Bentham and Mill, a greater perception has been given of what the foundations of utilitarianism truly are.

Saturday, October 26, 2019

Osteogenesis Imperfecta Essay -- Disease, Disorders

Osteogenesis imperfecta (OI), also known as brittle bone disease, is a rare genetic disorder with the main characteristic being that the bones break very easily, usually for no apparent reason. The major cause of osteogenesis imperfecta is a mutation in the genes that produce collagen. Collagen is the main protein that works toward the production of connective tissue. Individuals with this disorder will produce less collagen than needed, which causes the bone development to be endangered. This could result in bone deformities. There are four types of osteogenesis imperfecta, and in all four types you will see bone fragility with multiple fractures and bone deformities. Type I of OI is the most common, comprising 70% of all cases. Bruising will occur very easily in this type. The bone fragility is considered mild to moderate, and osteoporosis will be present. In this case it is likely that multiple fractures will have occurred before the age of 5. Type II of OI accounts for approximately 10% of all cases. OI Type II is always lethal in the fetus. This is the most severe form of OI. The ribs will be thin, there will be limited cranial and facial bone ossification, and the limbs will be short. Type III of OI makes up 15% of all cases. This is the next in severity after Type II, and the type most known to radiologists and orthopedic surgeons. Two-thirds of these cases will have fractures at birth. There will be severe bone fragility with multiple fractures and deformity that will be progressive. Children with this type seem to have severe dwarfism due to spinal compression fractures and disturbance in growth plates. Type IV of OI is much rarer, comprising only 5% of cases. The bones may appear normal at the time of the first... ... law enforcement and legal counsel will be involved. It may also be necessary to contact a child psychologist or other therapist to assist. Works Cited "Chapter 37." Operative Techniques in Orthopaedic Surgery. Ed. Sam Wiesel. 4th ed. Vol. 2. Lippincott Williams & Wilkins, 2011. eBook. Hoffmeister, Ellen. "Gene Therapy and Pharmaceuticals Offer Hope for Many Patients With Brittle Bones." Bone and Joint 11.5 (2005): 49-51. eBook. Kaiser, L. R., A. C. O. Surgeons, and W. H. Pearce. Acs surgery, principles & practice. 6th. Webmd Prof Pub, 2007. eBook. McMillan, Julia A., Ralph D. Feigin, Catherine DeAngelis, and M. Douglas Jones. Oski's Pediatrics, Principles & Practice. Williams & Wilkins, 2006. Minor, Patricia. Living with OI One Day at a Time. Publish America, 2006. Web. Picoult, Jodi. Handle With Care. New York, NY, USA: Washington Square Press, 2009

Thursday, October 24, 2019

Hip Hop Music Culture Essay -- Rap, music and cultural movement

This essay aims to examine the importance of the Hip-Hop culture in 21st century society. It will begin with consideration of the history of Hip-Hop, discussing its stylistic adaptations, cultural preferences and concerns, referring to the studies of black culture by Ellis Cashmore and Mark Neal. Within this I will explore the ethnicity and authenticity of the culture, with reference to last years Popular Music and its Cultural Context unit. The essay will then move on to evaluate the culture’s relationship with the media, concentrating on the well documented moral panics associated with the culture; I will make particular reference to the theories of Stan Cohen. By studying the political and historical patterns of the culture, I endeavour to discover the overall meaning which the culture has for its members and for society. It is primarily important to coin what Hip-Hop is, the dictionary definition describes Hip-Hop as: hip-hop (h p h p ) or hip hop noun. 1. A popular urban youth culture, closely associated with rap music and with the style and fashions of African-American inner-city residents. 2. Rap music. As a culture Hip-Hop includes four main categories of expression; Mixing, Dancing, Graffiti Art and Rapping, known as MC’ing. Hip-Hop was first recognised in New York around the mid 1970s, considered as a reaction to social movements of the time. In America the 70s and 80s were subject to negative behaviour towards black communities which consisted of Jamaican and Puerto Ricans as well as African-Americans, it was argued that the ruling of Reagan led to this behaviour. Hip-Hop culture was seen as an escape from the explosion of gang violence throughout the 1970s and 80s, providing black American youths with a space for expression, this freedom of speech led to the spreading of Hip-Hop to other cities where black communities suffered. As Tricia Rose states, ‘It satisfies poor young black people’s profound need to have their territories acknowledged, recognised and celebrated.’ (Rose, 1994: p.11, cited in Neal, 1997: p.136) The first UK top ten Hip-Hop hit wa s recorded in 1979 by the Sugar Hill Gang, called ‘Rappers Delight’. The recognition of this song noted the continuous exchange of musical ideas between black and white. The atmosphere created between black and white musicians from Britain and America was perfect for the sounds o... ...the Hip-Hop culture will continue. The policing of artists and their music are likely to become stricter, with parental advisory placed on increasingly offensive lyrics and with the boost in crime rates associated with Hip-Hop policing will be more specific. However, I do not believe that increased awareness and policing of Hip-Hop will lead to the waning of its popularity, if anything; I think it will continue to add to the novelty of the culture. Bibliography Baker, H. & Diawara, M. & Lindeborg, R. (1996) Black British Cultural Studies: A Reader, University Press: Chicago Cashmore, E. (1997) The Black Culture Industry, London: Routledge Cohen, P. & Baines, H. (1982) Multi-Racist Britain, London: Macmillan Cohen, S. (1973) Folk Devils and Moral Panics, St Albans: Paladin Dyson, M. (1996) Between God and Gangsta Rap, University Press: Oxford Neal, M. (1999) Black Popular Music and Black Public Culture: What the Music Said, London: Routledge Oliver, P. (1990) Black Music in Britain, University Press: Milton Keynes Springhall, J. (1998) Youth, Popular Culture and Moral Panics, London: Macmillan Thompson, K. (1998) Moral Panics, London: Routledge

Wednesday, October 23, 2019

Jane Austen present the reader of Pride and Prejudice Essay

Jane Austen present the reader of Pride and Prejudice with a number of representation of love and marriage, including 2 unsuccessful proposals to Elizabeth Bennett and the relationships of: Mr and Mrs Bennett Jane and Mr Bingley Charlotte and Mr Collins Lydia and Wickham Elizabeth and Mr Darcy Analyse each of the proposals in turn and then discuss what you think Jane Austen’s views on love and marriage were. Pride and Prejudice is one of the most classic love stories of all time. Written by Jane Austen in 1796 when she was just 24, the novel has become a favourite with woman in every generation since. Following the paths of 5 sisters as some come of age and other just grow older in a world where marriage is everything. Around the time of Pride and Prejudice, romantic love wasn’t important. Parents picked a suitor for their children, usually marrying girls off into better off families if they could, financially securing them until death, or so they hope. It was well and truly a mans world in the 1700s, there was no means of a woman creating an independent existence, and so woman relied on marriage in order to lead a half decent life. Elizabeth receives 3 proposals, one from Mr Collins, her cousin, big fan of Lady Catherine DeBurgh and a clergyman, and 2 from Mr Darcy. I will discuss these in detail later in my essay The story follows that of the Bennett family. Mrs Bennett, mother of 5, means well for her daughters, but brings much embarrassment upon them every time she opens her mouth. Mr Bennett, her husband, is the calm that follows the storm that is Mrs Bennett. He is the one his daughters go to when search calm advice, although Mr Bennett does mock the girls’ immature ways. Elizabeth (named â€Å"Lizzie† by close friends and family) and Jane (often referred to as â€Å"Miss Bennett†) are the two older sisters (Jane older than Elizabeth). Then, followed by Mary, then Catherine (or â€Å"Kitty†), then Lydia. Mr and Mrs Bennett are the perfect example of an arranged marriage working out. We can make a guess that the two did get along when first married, but that the relationship was probably built on lust, which after 5 girls, was bound to ware out. As they have been married for so long, they’ve learnt to live with and love each other, like couples were expected to. They annoy and irritate each other, but the Bennett parents love each other despite each other’s embarrassing flaws. The first fresh relationship we come across is that between Jane Bennet and Mr Bingley. There is much gossip following Mr Bingley’s arrival, and when he arrives at a dance in Meryton, the room obviously falls silent. Bingley is a very sweet man, and when he first lays eyes on Jane he’s smitten, and visa versa, and they spend all night dancing. Mary is quite happy with taking up the sidelines, but Kitty and Lydia love all the attention they receive and the non-stop dancing. Elizabeth, on the other hand, does not enjoy herself as much as Mr Darcy refuses to dance with her when Bingley suggests it, and Lizzie overhears. Jane’s story is essentially that of Cinderella. Jane and Mr Bingley were an excellent match, but for Jane there was too bigger social gap. She felt nervous around Bingley, and especially around his family. There were problems, when Mr Darcy believed Jane did not love Bingley as Bingley loved Jane and so convinced Bingley to move away, breaking Jane’s heart. This was part of the reason Lizzie did not take to Darcy. Despite all the problems, Bingley and Jane do marry, but not before Austen made sure her audience sympathized towards Jane, the good-intentioned sister. Jane represents the â€Å"do-good† types that always appear to get everything they deserve (which happens to be everything), which shows these people aren’t just a modern day occurrence, but appear regularly in history. Mr Collins’ proposal to Lizzie was a cringeworthy moment in Pride & Prejudice. His proposal seemed rehearsed, and while Lizzie laughs at him, he leads himself to believe she’s being shy. He tries to convince her by mentioning the fact Longbourne is entailed to him. Lizzie turns him down, but he believes she’s playing hard to get. The entire affair is exceedingly embarrassing as Mr Collins won’t take no for an answer, without realising he isn’t going to get another answer. Following Lizzie turning down his proposal, Mr Collins proposes to Lizzie’s best friend, Charlotte Lucas. Charlotte, unlike Lizzie, accepts in the full realisation that this may by her first and last proposal, and it just wouldn’t be safe to turn it down. This relationship, as it was, was made out to be the example of a safe marriage. It’s not for love, nor money, just simply for security. Charlotte is fully aware that unless out to events, she will never be bothered by Mr Collins, and will be able to lead a safe and quiet life. This is the most realistic marriage out of all other’s in this book when studying typical marriages of the time. Austen writes about Charlotte in a way that makes us feel sympathy for her, and all other women who were forced to marry and spend every living day with someone who’s company they may not even enjoy, but love wasn’t a detail considered important when marrying off children, they were expect to LEARN to love the one they were with. Lydia, being the youngest and giddiest of all the Bennett girls also happened to be the stupidest, when she eloped with Wickham and put a bigger black mark then her mother’s on the family name. Strangely enough, it was Darcy that came to the (silent) rescue. He found Wickham and Lydia, forced them to marry and paid for the whole thing (Lydia loved the entire thing, thinking of it as an adventure, whereas Wickham wasn’t quite so impressed). It’s after this we find out why Darcy dived at the chance to help. Wickham told Lizzie that Darcy had cheated him out of his inheritance from Darcy’s father, when actually, Wickham had tried to elope with Georgina Darcy for HER substantial inheritance. After Elizabeth rejected Mr Collins, he hurriedly married her best friend, Charlotte Lucas, and Elizabeth is invited to visit the newlyweds. While she is staying with them, Darcy visits his aunt, Lady Catherine de Bourgh, at the adjoining estate, Rosings Park. Elizabeth and Darcy are therefore thrown daily into each other’s company. Elizabeth’s charms eventually entrance Mr Darcy, leading him to finally declare his love for her â€Å"against his own will† and his desire to marry her in spite of her objectionable family. Surprised and insulted by Darcy’s high-handed method of proposing, as well as having recently learnt that Darcy convinced Bingley to sever ties with Jane and still contemptuous of Darcy’s supposed wrongs against Wickham, Elizabeth refuses him in no uncertain terms, saying that he is â€Å"the last man in the world whom she could ever be prevailed on to marry.† The next day, Darcy intercepts Elizabeth on her morning walk and hands her a letter before leaving on a cold note. In the letter, Darcy justifies his actions regarding his interference in Bingley and Jane’s relationship, and reveals his history concerning Mr Wickham and Wickham’s true nature. The letter sheds a new light on Darcy’s personality for Elizabeth and she begins to reconsider her opinion of him, particularly in the case of Wickham. Then, while on holiday with her aunt and uncle, the Gardiners, Elizabeth is persuaded to visit Pemberley, Darcy’s estate, while he is away. She is therefore mortified when she bumps into him unexpectedly while on a tour of the grounds. However, his changed attitude towards her shows in his behaviour, distinctly warmer than last time, and his polite and friendly manner towards her aunt and uncle begins to persuade Elizabeth that underneath his pride lies a true and generous nature. Her fresh opinion of Darcy is supported through meeting his younger sister Georgiana, a gentle-natured and shy girl whom Darcy lovingly dotes upon. THEN to top off this new improved Darcy, he finds Wickham and Lydia, and makes sure they marry therefore causing no slander towards the family name. Austen wrote in Darcy as the negative force, and Lizzie as the good, they were bound to come together, but it couldn’t happen without some toing-and-froing. In my opinion, both Lizzie and Darcy are negative, but they were destined for each other from Meryton. Both Jane and Lizzie end up marrying for love, but they both end up marrying someone in a substantially higher class, whereas Lydia, like her mother, married for lust (Wickham on the other hand married for money). Jane Austen wrote this book for entertainment, and perhaps to show the audience that things could be different if a little more respect was paid to women. But also, i think Austen wrote this book with an idea to mock the ridiculous social rules of the time. Writing a story like this placed her way ahead of her time anyway, as the plot is still very relevant today, but was she so ahead of her time that she could see the circus that was the social circuits and the jail-marriages some women were forced to dwell into.

Tuesday, October 22, 2019

Radial or Femoral essay

Radial or Femoral essay Introduction Transradial and transfemoral approaches are two different types of techniques that are used to perform diagnostic percutaneous coronary intervention (PCI) and coronary angiography (CA). Transradial approach is currently being used as the most effective alternative approach for cardiac catheterization to transfemoral approach. This is because of the several benefits it has for the patients over transfemoral approach. This paper provides the advantages and the benefits of transradial approach over transfemoral approach in creating care value for PCI and CA patients. Chuntao W Ed. (2011). The Transradial Approach is Associated with Lower Risk of Adverse Outcome Following Percutaneous Coronary Intervention. A Single-Center Experience , 1-9. In this article, the authors are aimed at testing the hypothesis that the transradial approach is more linked to the lower risks of bad results in accordance to percutaneous coronary intervention (PCI) more than transfemoral approach (Chuntao W Ed, 2011). It also analyses whether the approval of transradial approach can lead to improved quality management of PCI in a single center practice (Chuntao W Ed, 2011). ). The researchers identified and reviewed 625 transfemoral and 462 transradial cases that were treated at their center from January 2007 to March 2009. During the treatment of risks associated with hospital mortality, vascular complications and bleeding, the researchers tried to examine the major differences that exist between transfemoral and transradial approaches (Chuntao W Ed, 2011). ). From the research analysis, the researchers established that exposure to bleeding was very much lower in the transradial patients than transfemoral group with the following percentag es, 2.60 percent and 6.08 percent respectively (Chuntao W Ed, 2011). Transradial patients also have lower risks of vascular complications (0 percent) than transfemoral patients (1.44 percent). The mortality rate observed in the hospital indicated that, it was lower for transradial approach (0.87 percent) than transfemoral approach (2.24 percent). Some-day discharges were less common in transfemoral patients than transradial patients (2.2% versus 14.2%) Chuntao W Ed, 2011). From the research results, the researchers established that risk of vascular complications and bleeding were lower for transradial approach and therefore its adoption may lead to improved quality care for PCI. In support of their findings, other scientific studies have also established that patients who receive PCI via radial arteries were less at risk of developing vascular complications and bleeding when compared to patients who receive it through femoral arteries (Chuntao W Ed, 2011). In addition, transrad ial approach was also established to be associated with lower risk of mortality than transfemoral approach. Researchers therefore agree that, radial approach should be adopted for improving quality of care to PCI patients in a specified center of practice Chuntao W Ed, 2011). Sandy M. (2010). Procedure Provides Comfort and Convenience, Reduces Complications of Cardiac Intervention. Radial Artery Catheterization makes a Comeback , 1. This article is about a coronary disease patient, Floyd, who suspected himself of being attacked by heart attack after performing a strenuous activity. He immediately called his doctor on Friday afternoon who instructed him to head straight to the emergency room (Sandy, 2010). Following his two past cardiac catheterization procedures, he was very afraid to undergo it again due to pain he experienced. But after being examined, the doctor established that he suffered no heart attack, but catheterization was still required to diagnose the cause of the chest pain and to treat it if possible. Something that interested Floyd most is that a new technique that would minimize discomfort was going to be used during catheterization process (Sandy, 2010). The method that was used in catheterization process is radial approach. This approach is becoming a very popular treatment technique that is used to treat blocked arteries. This is because of the improved tools, medicine and devices used. Acco rding to the article, patients requiring catheterization need to be diagnosed through radial approach (Sandy, 2010). This is because, through radial artery, the doctors can handle bleeding more appropriately and patients can thereafter, walk and eat. But with the femoral artery, patients leave the theater rooms with a sheath in the femoral artery (Sandy, 2010). After this process patients can not resume their duties because they have to stay in the hospital beds for up to ten hours while bleeding is being controlled depending on the degree of anticoagulants received. With the radial approach, the doctor assured Floyd he was to get back home on the following day and resume work only after three days of rest. Radial approach is more effective and comfortable for treating blocked arteries as compared to femoral approach since it is less complicated, comfortable and bleeding can easily be controlled after the process (Sandy, 2010). With the advent of radial approach, Floyd doctor believ es that patients with cardiac intervention will leave the hospital beds the same day after being treated. Schussler J. M. (2011). Effectiveness and Safety of Transradial Artery Access for Cardiac Catheterization. 1. This article suggests that transradial approach is slowly become more popular in coronary angioplasty and angiography than transfemoral approach (Schussler, 2011). This approach has several benefits to the patients such as reduced discomfort, reduced bleeding and low costs. Diagnosis of coronary angioplasty and angiography are usually characterized by several risks including excessive bleeding, stroke and death. Despite of the increased use of ad hoc angioplasty and blood thinners, exposure to these risks has remained stable. This is because the procedures involved in transfemoral technique are complex since they involve femoral access (Schussler, 2011). In order to take care of this situation, transradial technique was described in late 1980s and it is currently being considered as the best alternative to replace traditional femoral technique. In transradial approach, the risks of damaging the limbs are minimal since there is enough supply of blood from ulnar artery to palmar arch (Schussler, 2011). In transfemoral technique, coronary angioplasty and angiography are performed after drugs that reduce arterial thrombosis and spasm are administered. One of the advantages of transradial technique is that in this process, certain types of specially shaped catheters are used, and they enable the doctors to access both right and left coronary angiograms including venticulogram without switching different catheters (Schussler, 2011). One of the major benefits of transradial approach over transfemoral approach is the reduction in the number of complications that results after the diagnosis. Another benefit of transradial technique is the patient satisfaction. The patients are able to get back home on the same day of treatment and resume working three days after unlike transfemoral technique that required the patients to stay in the hospital beds for more than ten days depending in the complications they receive after the process (Schussler, 2011). Conclusion Both transradial and transfemoral approaches are for diagnostic percutaneous coronary intervention and for coronary angiography. Transfemoral approach, however, is results into several problems after it is performed. The acknowledgement of transradial approach provided an effective basis over which these problems can be solved. Radial approach has thus been established as the best alternative approach diagnostic PCI and CA. It has several benefits to the patients which include low cost of treatment, reduced bleeding , less time spent ihn the hospital beds and they are able to resume their jobs only three days after treatment, and this is supported by all the three articles summarized above.

Monday, October 21, 2019

How did Africans begin to conceptualize unity Essays - Africa

How did Africans begin to conceptualize unity Essays - Africa How did Africans begin to conceptualize unity November 6, 2014 Afro-American Studies Framing Question 4 How did Africans begin to conceptualize unity in thought and action beyond national boundaries in the face of European and American imperialism? Abstract: By the late eighteenth and nineteenth century, Africans learned the techniques about how to resist slavery and how to form unity in thoughts and actions. Africans also being to conceptualize unity in thought and actions beyond national boundaries in the face of European and American imperialism with The Practice of Diaspora, which enabled Africans to begin to see themselves as part of the African world. They did this even though they already struggled against local social, economic, political, and cultural racial oppressions. Africans grasped many techniques such as resistance form white people, United States and Western Hemisphere. Critical Review of Scholarship: In order to fully understand and answer this question, I will be using information from the power point provided by Dr.Carr and information from his lecture. I will also be using information from the readings of different books. Books called Black Movements in America , The Atlas of African-American History and Politics and Of AfriA will assist me with answering this question. Discussion: In reference to the question at hand, African begin to conceptualize unity in thought and action beyond national boundaries in the face of European and American imperialism due to their diversity. In his novel, Wole Soyinka stated that Africa is more a concept than a bounded space, which means, in turn: more concepts than simply one. Africans began to see themselves as having meaning as opposed to just an occupation of an area. Because Africa is so diverse, it is very accepting and tolerant of a wide range of other cultures. Africa has come to host many diverse cultures due to colonialism. Colonialism has contributed to the misplaced geography of the African continent. Since they have been integrated for so long, Africans have embraced this advantage in order to solve developmental problems. This allows them to easily attack issues regarding unity because Africans embrace others with solely open arms. Industrial labor served as a pull dynamic in African migration patterns. Africans were also able to conceptualize unity in thought and action beyond national boundaries by the creation of music, dance, spoken and written texts that preserve and recognize the existence of specific icons, shrines, and rituals (locally and internationally). First, we are still using languages that are not ours, or not in any meaningful sense African. For the moment the most widely used of these languages are not merely not ours; they also happen to be the cultural property of Europeans and Arabs whose long-range projects were intended to dehumanize Africans as a way of enhancing their own claims to human and superhuman status. A certain ambivalence among Africans using such languages is logical. It is also a sign that we shall outgrow these languagesif and when we get organized. This quote basically explains Africans have picked up things from other people to grow the African community. Even though these languages do not belong to Africans. They used these languages to try and degrade Africans but Africans picking up this language became somewhat logical. Further Questions: Do Africans still allow the same things to be done to them today? How have Africans overcome such unfair treatment?

Sunday, October 20, 2019

Free Essays on Study On Animal Instinct Behavior- Fear

Study on Animal Instinct Behavior- Fear The study conducted at the University of California entitled â€Å"Temporally Massed CS Presentations Generate More Fear Extinction Than Spaced Presentations†, not only helped mice get passed their fears but also helped to better understand clinical behavioral therapy and how it helps treat anxiety disorders, phobias, panic disorder, post-traumatic-stress disorder, and obsessive-compulsive disorder. This experiment was conducted to get a better understanding if a controlled reaction; in this case being fear, could be unlearned by just applying the stimulus without the control over many times. There researchers joined eight mice at a time and taught them to fear a simple noise through the use of conditioning. First they played the noise for the mice to hear. Then they sent an electrical shock though the floor of the mice cage. Afterwards, the researchers separated the mice into groups. They forced the mice to hear the noise about twenty times for two minutes without administering any shocks. The researchers found that by presenting the stimulus to the mice over and over again without providing a shock, they were able to eliminate the fear. The mice learned to not fear the noise because a painful shock would not always follow it. The mice began to lose the association of the noise with the schock. During the experiment, the researchers associated the small noise with a shock to the mice. They also significantly separated the shocks the mice received. Some of the mice learned that not all of the noises meant that they would feel pain. For humans, someone who has been badly bitten by an animal has probably developed a fear of it. To extinguish this fear, that person should be presented with well-behaving animals. By doing so, the person will not fear them because he or she has learned that not all of them will bite. The researchers also found that both short and long-term extin... Free Essays on Study On Animal Instinct Behavior- Fear Free Essays on Study On Animal Instinct Behavior- Fear Study on Animal Instinct Behavior- Fear The study conducted at the University of California entitled â€Å"Temporally Massed CS Presentations Generate More Fear Extinction Than Spaced Presentations†, not only helped mice get passed their fears but also helped to better understand clinical behavioral therapy and how it helps treat anxiety disorders, phobias, panic disorder, post-traumatic-stress disorder, and obsessive-compulsive disorder. This experiment was conducted to get a better understanding if a controlled reaction; in this case being fear, could be unlearned by just applying the stimulus without the control over many times. There researchers joined eight mice at a time and taught them to fear a simple noise through the use of conditioning. First they played the noise for the mice to hear. Then they sent an electrical shock though the floor of the mice cage. Afterwards, the researchers separated the mice into groups. They forced the mice to hear the noise about twenty times for two minutes without administering any shocks. The researchers found that by presenting the stimulus to the mice over and over again without providing a shock, they were able to eliminate the fear. The mice learned to not fear the noise because a painful shock would not always follow it. The mice began to lose the association of the noise with the schock. During the experiment, the researchers associated the small noise with a shock to the mice. They also significantly separated the shocks the mice received. Some of the mice learned that not all of the noises meant that they would feel pain. For humans, someone who has been badly bitten by an animal has probably developed a fear of it. To extinguish this fear, that person should be presented with well-behaving animals. By doing so, the person will not fear them because he or she has learned that not all of them will bite. The researchers also found that both short and long-term extin...

Saturday, October 19, 2019

Law in relation to Data Protection Essay Example | Topics and Well Written Essays - 1250 words

Law in relation to Data Protection - Essay Example In the present set-up of the society, a lot of people's data are misused by others for money laundering, loans, misrepresentations and other similar occurrences which sometimes creates unfavorable scenario those who owns such data. In doing such, the people who handle data must realize that they are the ones who are being trusted to keep such variables and their primary concern is to keep those as confidential as possible. The case of Creative is no different from the aforementioned premise as they deal with numerous data from the people who in one way or the other factors for them to generate income. In this case, they must bear in mind that they should be responsible in storing and keeping such entries. Also, the awareness of Creative that they are accountable to the law should there be cases of leakage and mishandlings of data. In dealing with similar occurrences, the example of Creative computers suggests that this company has the freehand of access of data from both the buyers and sellers of the computers. Upon reviewing their process of data, one might say that Creative Computers is organized in sorting the information of data from the buyer and seller which is a practical way of referencing. In this case, the data would help Creative computers track transactions that entered the company and therefore it is very crucial to have these kinds of data. Also, several factors including the profile of the person who sells the computer unit is a vital data for Creative Computers as this kind of practice assures them that the quality and the origin of the computer units to be sold. It is a common thought that computers do not have serial numbers and they are not subject for registration like vehicles in which in case of loss and similar instances could be traced down because of its plate numbers. The move of creative company to obtain details from the two parties would also help them locate the sellers if in case there are problems that would arise-instances such as warranty concerns, theft and other related phenomenon are of big help in resolving these kinds of problems. The sorting out of data is indeed a good step for the sake of classification which would prevent confusion in the future should there be changes in the company or with these two parties. However, in handling these data, there are a lot of queries that are in need of answers. There are things that are needed to be clarified in order to ensure that the data that are being obtained are kept within the prescribed bounds of law. On the second thought, Creative Computers must be aware that there would come a time that problems might arise with regards to handling of data. There are scenarios that might confuse Creative Computers with regards to handling of Data. For example, a certain customer who bought the computer from the seller wishes to obtain the information from the seller as police authorities accused the latter as involved in fencing as it was known to them that the computer set was stolen. The problem is, does creative computers owns the right of divulging the information to the buyer Another scenario would be there is a mistake committed by the seller as he sold the other item rather than the intended one. To be able to obtain the computer set

Friday, October 18, 2019

Value Diversity in Workplace Essay Example | Topics and Well Written Essays - 1000 words

Value Diversity in Workplace - Essay Example Every company needs to have a solid legal framework behind its diversity policies. According to Tyre, (2007) " while there is no specific law governing 'diversity' per se, the framework for diversity is shaped by judicial interpretations of actions taken to affect diversity that violate equal opportunity or constitutional rights" (n.p.) A good diversity program should not be subject to any quotas or any inherent rigidity ; in actuality it should be flexible and permeable. Setting aside a quota would merely perpetuate the notion of the 'minority', and would merely pave the path to more discrimination. Aside from that, it would serve companies significantly if it hire people based on the entirety of their qualifications, and not just utilizing race as the primary mitigating factor. The essential challenge facing employers is to create a working environment where people working at all levels are ingrained with the company's drive and vision, and they are continually recognized for their efforts. Executing this platform effectively would ensure a synergistic approach towards innovation, growth, and success. Culled from my own personal experience, I have borne witness to several situations where workforce diversity could have been a mitigating factor if only properly executed and rendered. One particular incident which particularly stands out was during my stint as a sales representative for one of the nation's leading real estate firms. The company specialized in developing properties in the Mayaguez and Aguada areas. The primary duty assigned to me was to handle its premium line of exclusive oceanfront homes, which appeal to a very high-end niche market. A good part of the company's prospective clientele is comprised of wealthy foreigners looking for a good vacation home in the country. My experience had me dealing with a rich politician hailing from the Dominican Republic. He had some close ties in the Aguada area, and was planning on buying a vacation home with his new wife. I was tasked to handle his account, and he was very keen on purchasing one of our featured properties, which was an oceanfront, three- level home worth $535,000. If the deal would fall through it would have been my biggest sale at the time, and would have greatly augmented the company's flagging fortunes. This happened at a time when the housing market was really plummeting, and real estate companies were fighting tooth and nail for every sale that they could get their hands on. The effects of the subprime mortgage crisis were far-reaching, and a sale of this magnitude would have certainly helped my company a great big deal. I had personally accompanied the couple to the site, and they were highly impressed with the oceanfront property. They were displaying a high level of interest, and I was almost certain that this was a sure sale. I could almost feel that my fat commission was on the way. The main issue emanated from what at first seemed like an almost trivial matter. On the way back from our viewing trip, the client had learned that the driver of the company car that we were using also hailed from the Dominican Republic. They engaged in light banter, and I thought that was a pleasant coincidence. My complacency soon was shaken, as

The Food that Makes People Heed Assignment Example | Topics and Well Written Essays - 250 words

The Food that Makes People Heed - Assignment Example The power that he has is based from the craving for good food the customers want to sate. It is actually the power of knowing that giving the best service in exchange for people’s money to satisfy them that the book possesses. As he portrayed with his words, he is not satisfied by just the things he already knows but also enriches himself by reading many books. His hard work is not concentrated in his kitchen but also in the kitchen of others through their books. Moreover, he considers the nutritional value of his food so that even doctors and nurses approve of his cooking, therefore, making them regular customers as well. The article was well written to present the positive and negative attributes of Mr. Yeganeh but not to the effect of putting the man down. Instead, his negative attributes present logical reasons which make readers appreciate the cook even more.

Thursday, October 17, 2019

Computer Security, 2 actual examples of where Security has failed Research Paper

Computer Security, 2 actual examples of where Security has failed (detailed description below) - Research Paper Example Such two instances have been discussed in the paper, along with the probable reasons of the security breach and preventive measures that should be taken for such matters in the future. 2. Sony PS3 Security Breach Sony Online Entertainment (PlayStation Network) is one of the market leaders in providing online games to its users around the world. Many users subscribe to the service to purchase games and online activities. In April 2011, the company faced a major setback regarding their service and data assets. The impact was so massive that they failed to offer their services even after two weeks of the incident. 2.1 Nature of the Attack Sony PlayStation network experienced denial of service attacks from one or more cybercriminals in April, 2011. According to Stuart and Arthur (2011a); the extravagance of the denial-of-service attacks occupied the company to such a great extent that another on-going attack went unnoticed by the authorities, i.e. cybercriminals were also trying to attem pt the intrusion attack around that same time. Another aspect that seems evident from the data theft activities is that the sophistication and extensive planning of the attack made it undetectable. Two weeks later, the company realized that their data assets had also been stolen from Sony Entertainment Online multiplayer domain. The intruders gained access to $77 million records of the customers of the company that had their names, postal addresses, email addresses, credit card information and birthdates. Later, the company admitted that more than $25 million had also been stolen from an outdated database of 2007 that contained data of similar nature. The massive theft of credit card information and personal information are feared to result in catastrophic instances of identity thefts and other misuse of data for a long period of time. Arthur (2011) provided the information that the data server, that contained information from the year 2007, was known to constitute of records of int ernational users from Austria, Germany and few other countries. Therefore, this attack has not only threatened the image of Sony in the local markets, but also internationally. 2.2 Causes of the Attack Batty (2011) reported the information that an unknown file named ‘Anonymous’ was found on one of their servers that had a message to warn the authorities about more attacks. This proves that the intruders had successfully gained access of their servers and systems and therefore managed to copy millions of data records for their use. The means of gaining access or intrusion in the systems can be based on multiple factors. Some of the most probable ones have been discussed below: Some employees might not be aware of the security policies that are supposed to be followed to safeguard the security of the data assets of the company; hence their negligence caused the exposure of sensitive login information. Hackers may have targeted some employees’ systems and sent them spam, phishing emails or advertisement links on social networks to lead the employees to a compromised source. Upon the download of any malicious attachments or entry at unauthentic websites, the malicious software is automatically transferred to the system of the user (with or without the knowledge of the user). This software can perform automated malicious

Finish three finance questions Essay Example | Topics and Well Written Essays - 2000 words

Finish three finance questions - Essay Example The recessionary woes prevalent in the country have adversely affected the business of company. As the recession has taken a strong hit on the manufacturing organizations, so has service sector been affected by it. Although revenue has declined by a meager percentage, the profitability of the company has been slashed down by 73.5% during the same year. The operating expenses have themselves decreased by 2.6% on account of declining revenues and a better allocation of resources by management during the period. Exceptional items occurrence in the operating expenses section have trimmed the profitability. They have increased from a tiny ?4.7 Million in 2008 to ?37.4 Million in 2009 which represents an increase of 687% over the period. Finance costs have also painted a dim picture of profitability increasing by 10.28% during the period from CY08 to CY09. The financial burden was magnified because of an increase in exceptional items occurring in the financial charges table which increase from ?4.2 Million to ?11.9 Million. Income taxes paid during the year decreased by 65.3% with the credit going to the inverse effect of exception items on the taxable income. In a nutshell, if we exclude the effects of exceptional items, the profitability has only shrunk by 20%. ... High gross margins of the company depict that the company is operating in service industry. Operating margins have decreased from a hefty 23.6% in CY08 to 17.6% in CY09. Increase in operating expenses has caused the company to bear the brunt of falling profitability. Operating expenses have increased by 8.38% during the calendar year. Incorporating the effect of exceptional items show that operating margins have only declined from 24.3% in CY08 to 22.8% in CY09. The explanation can be attributed to the ground that the company has incurred ?37 million additional in exceptional items under the operating expenses table. Hence, we expect that the future of the company will remain upbeat as these exceptional items will have a limited affect on future operations. Net Profit Margin of Marston group has squeezed from 9.3% in CY08 to 2.5% in CY09. Again, exceptional items are the main culprit to such a large decline in margins. Financial costs have jumped up by 10.3% during the period on acco unt of increasing exceptional items incurred within the financial charges category. Efficiency Analysis Asset turnover ratio decreased from 0.27 in CY08 to 0.265 in CY09. This implies that the company is generating ?0.265 in revenues for every ?1 in its assets. This decline is a result of squeezing out of revenues in FY09, although the impact has also been mitigated by a slight decrease in assets from ?2465.9 to ?2431.3 in CY09. Trade receivables day outstanding has increased from 41 days in CY08 to 45 days in CY09 which implies that receivables are being collected in a higher number of days in the previous year, thus marking a negative sign on efficiency of the company. As the organization is not a manufacturing concern,

Wednesday, October 16, 2019

Computer Security, 2 actual examples of where Security has failed Research Paper

Computer Security, 2 actual examples of where Security has failed (detailed description below) - Research Paper Example Such two instances have been discussed in the paper, along with the probable reasons of the security breach and preventive measures that should be taken for such matters in the future. 2. Sony PS3 Security Breach Sony Online Entertainment (PlayStation Network) is one of the market leaders in providing online games to its users around the world. Many users subscribe to the service to purchase games and online activities. In April 2011, the company faced a major setback regarding their service and data assets. The impact was so massive that they failed to offer their services even after two weeks of the incident. 2.1 Nature of the Attack Sony PlayStation network experienced denial of service attacks from one or more cybercriminals in April, 2011. According to Stuart and Arthur (2011a); the extravagance of the denial-of-service attacks occupied the company to such a great extent that another on-going attack went unnoticed by the authorities, i.e. cybercriminals were also trying to attem pt the intrusion attack around that same time. Another aspect that seems evident from the data theft activities is that the sophistication and extensive planning of the attack made it undetectable. Two weeks later, the company realized that their data assets had also been stolen from Sony Entertainment Online multiplayer domain. The intruders gained access to $77 million records of the customers of the company that had their names, postal addresses, email addresses, credit card information and birthdates. Later, the company admitted that more than $25 million had also been stolen from an outdated database of 2007 that contained data of similar nature. The massive theft of credit card information and personal information are feared to result in catastrophic instances of identity thefts and other misuse of data for a long period of time. Arthur (2011) provided the information that the data server, that contained information from the year 2007, was known to constitute of records of int ernational users from Austria, Germany and few other countries. Therefore, this attack has not only threatened the image of Sony in the local markets, but also internationally. 2.2 Causes of the Attack Batty (2011) reported the information that an unknown file named ‘Anonymous’ was found on one of their servers that had a message to warn the authorities about more attacks. This proves that the intruders had successfully gained access of their servers and systems and therefore managed to copy millions of data records for their use. The means of gaining access or intrusion in the systems can be based on multiple factors. Some of the most probable ones have been discussed below: Some employees might not be aware of the security policies that are supposed to be followed to safeguard the security of the data assets of the company; hence their negligence caused the exposure of sensitive login information. Hackers may have targeted some employees’ systems and sent them spam, phishing emails or advertisement links on social networks to lead the employees to a compromised source. Upon the download of any malicious attachments or entry at unauthentic websites, the malicious software is automatically transferred to the system of the user (with or without the knowledge of the user). This software can perform automated malicious

Tuesday, October 15, 2019

Hitlers Table Talk Term Paper Example | Topics and Well Written Essays - 1250 words

Hitlers Table Talk - Term Paper Example Therefore, Hitler stated in his talks that he will always be before Catholic. He believed in God and considered Christianity as the basis of western culture. Hitler’s criticism in table talks in relation to Christianity is very authentic and contradicts earlier systems of Christians. He did this debate to take out his frustration in relation to the failure of German Protestant churches. Despite all these situations he continued to believe in Jesus Christ and considered him to be an Aryan who was against the Jews. In accordance with the Hitler’s table talks, Jesus is a true Christian and all Jewish teaching have been given by Paul. He translated all teachings in Jewish terms in order to promote equality among all men before God and insisted to prevent all kinds of human slavery, which created consequences in Roman Empire and European civilization. Hitler also focused on a united Christian church in Germany. Among various talks of Hitler, I have selected a talk made on 11 July 1941, because this talk mainly focuses on religions and have formed totally a different and broader perception towards it. This talk helped to identify a belief in God and religion influence on the society. Religion greatly affects human life and Hitler has shown this importance to people in this talk. He opposed the idea of human slavery through immigration of people from one nation to the other. However, in order to give a positive impact many benefits of migration were also highlighted in this talk. History shows that would have been ruled on the basis of National Socialism, but in the present condition of the world cannot rely just on one aspect. Religion and National Socialism cannot work together. Both are quite a different aspect. These controversies will not lead to a war but the main solution of it is to leave religion to solve the dilemma on its own without any persecution.  

The stories success Essay Example for Free

The stories success Essay Technology would have the greatest overall effect on the stories success. To keep up with the competition constant training and flow of inventory has to be maintained drawing heavily on capitol resources. Also the skill level of employee’s would dictate a higher pay structure then required by regular toy stores. Rapid changes in technology would require a very liquid inventory. Items could quickly become antiquated, decreasing there value possible beyond original cost; at the very least putting pressure on the companies profit margin. This also means stock must be replaced whether old stock has been sold or not. This puts pressure on devaluing old stock even further to make space for incoming new stock. People already skilled in the industry need to be acquired. This will require offering more competitive salaries and benefit incentives to gather and retain these individuals. As these individuals are trained in new technology and gain more experience the company will have to aggressively instigate programs to retain these individuals with rich compensation raises and other more costly incentives such as stock options or profit sharing. Finding such rarified individuals might prove difficult causing the involvement of staff agencies, again increasing overhead costs. Also people might not like the idea of a toy store, filled with children, right next to where they will eat. Meal time is considered by most as a time to relax and unwind, which might not be done as easily in a restaurant attached to a congregation point for children with buzzing and flashing toys. A quieter establishment across the way might look more appealing.

Monday, October 14, 2019

Effect of Water Velocity on Erosion Corrosion Behavior

Effect of Water Velocity on Erosion Corrosion Behavior Effect of water velocity on erosion  corrosion behavior of materials used  in marine conditions Corrosion, among others, is one of the main and considerable causes which is liable for the failure of the equipment and the material used in marine applications. Up to now, the majority of the materials that have been developed for marine applications are carbon steel, copper-base alloys, nickel-base alloys, titanium and apparently stainless steel and its variations such as super austenitic, duplex and super duplex stainless steel. (Meng, 2009) Last decade, the use of composites in maritime industry has also increased. (Jones Summerscales, 2016) One parameter, which influences the extent of corrosion on these materials is the water flow velocity, as a result of mass transfer and other incidents, such as erosion corrosion. (Scheers, 1992) For that reason, they are required to withstand to a wide range of velocities. Water can be either static during shutdown periods or have movement. At low movement speed, the cathode reactants affect the rate of the erosion corrosion process. This most usually brings about higher rates of deterioration, but there are some cases in the case of passive alloys, that this results in decreased rates. Furthermore, the provision of oxygen on the external surface of the corroding metal is extremely dependent on the water velocity. (Chandler, 1985) Oxygen can fuel the cathodic reaction in seawater which can also lead to higher corrosion rates. In conditions where the water velocity is increased, apart from the corrosion arising from the electrochemical process of corrosion, there is also mechanical action with much worse consequences. In other words, high velocity results in enhanced erosion corrosion of the components and the installation parts. The concentration gradients in the bulk of the fluid are destroyed by the turbulent conditions. The action which affects neg atively the phenomenon of erosion corrosion appears in a very thin layer of the fluid which is bordering to the pipe wall. (Scheers, 1992) In addition to, there is also the impingement attack and cavitation corrosion which are more extreme forms of erosion corrosion. Conditions offering high water velocity can be found in tubes, pipes and rotating machinery. Figure 1:Schematic of turbulent eddy mechanism for downstream undercutting of erosion-corrosion pits On this dissertation, the effects of water velocity on erosion corrosion behavior of the materials that are used in marine conditions will be examined. Furthermore, the second part of this project will include the impingement of the water from different angles while the amount of the material loss during the impingement and electrochemical corrosion varies between different angles. Cathodic can be also applied, in order to investigate the effects on the erosion corrosion during the changes in flow velocity. It is very important and crucial to know exactly the effects of velocity because the combination of the electrochemical reactions with the synergy of the mechanical reactions due to the impingement in aqueous environments can cause horrible failures of the metallic components used in industry (Meng, 2009) . In addition there is also great need to know the difference in the number and in the size of the pits while velocity is increased (Wing, et al., 2016), as long as materials have suffered and caused serious accidents before in the marine environment and in the hole marine society. Moreover, pipes are used everywhere in ships and offshore structures, so after the study engineers will construct them with bigger safety and reliability (Jin, et al., 2016). The dissertation I about the experimental investigation of the consequences on erosion corrosion behavior in materials, as long as the impact of the impingement from different angles. Afterwards, an anode will be placed on the specimen to investigate with accuracy the changes on erosion corrosion. The major aim of this project is the accurate plot of the corrosion rates, in comparison with the different flow velocities. What is more, one of the aims of this research is the determination of the difference on corrosion behavior between materials and compare the deterioration process and extent of erosion to them. In other words, erosion corrosion, might not be the same in all marine materials, therefore engineers will have a better indication of the effect on each on of them, because in conditions where high velocity occurs, as the dissolved oxygen controls the rate of corrosion in sea water (Larson King, 1954) . It is still very difficult to choose the most optimum material for a specific job in the current working environment, selecting a more erosion corrosion resistant material. (Meng, 2009) The ongoing protocols for design and selection are extremely basic and are based on empirical service data (Neville Hu, 2001). Moreover, another aim is to compare the degree of electrochemical and mechanical reactions in changing angles. The durability of steels and cast iron and other materials will be further interpreted. Lastly, the removal of the protective oxide film in stainless steels might accelerate corrosion (Bonner, 2016) Many water characteristics influence the rate of corrosion process, like Ph, dissolved gases, temperature, dissolved salts, but the one under consideration is the flow velocity. The effect of velocity on corrosion is also Ph dependent. Seawater is alkaline and it is more at the base side 7.9-9.0 and carbonate ion concentrations increase as ph increases (Sabrowski Silva, 2010). Therefore, in basic or alkaline water, the higher velocities have as a consequence enhanced supply of the cathodic reactant, oxygen. For that reason, the cathodic reaction is stimulated and higher corrosion rates take place, causing erosive damage to the metal surface (Hodgkiess, 2013). According to (Meng, 2009), an increase on velocity has as a result the acceleration of corrosion on behalf of the motion of the fluid, as well as (Neville, et al., 1995) state that the reason of the increased rate of corrosion is the enhanced turbulence and the mixing of water on account of the supply of oxygen. Furthermore, as Giourntas stats in his study (Giourntas, et al., 2015), stainless steels have the ability to abide high flow rates. However, in the presence of solids I seawater the persistence is decreased. It also states the application of cathodic protection as a very important feature. As reported by (Neville, et al., 1999), with or without the absence of solids, the E corr drifts to more positive values, during the impingement. As stated by (Neville Hu, 2001), in places with high velocity and sudden changes in direction because of pimps, elbows in pipeworks etc. higher rates occur. Moreover, as Weber reports in (Webber, 1992) the effects are divided in three categories at low flow velocity, medium and high velocity. In the first category, natural convention is responsible, while at the second corrosion increases but without any significant mechanical effect of flow. During high velocities, the damage mechanisms becomes very complex. In keeping with (Li, et al., 1994), erosion corrosion problems enlarge catastrophically but the outflow of water. In agreement with Lin and Shao, with increasing impingement angles and velocities, the erosion is developing also. The rate of 1020 steel is lower than pure aluminums. During erosion conditions, many mechanisms act but only one or two of them is the principal mechanism. (Lin Shao, 1990) Concerning (Scheers, 1992), the simultaneous effects of velocity and ph have been investigated and turn out that in mild steel, there is an increase in corrosion rate with the velocity of flow, according to the ph value. Not to mention that, L. Wang notices that erosion corrosion increases rapidly with the development of the flow velocity at 14 m/s at 80% HR (Wang, et al., 2016). The dissertation of the effects of water velocity on erosion corrosion behavior of materials is mostly experimental. First of all, all available sources, papers and books will be investigated concerning erosion corrosion on materials that are used in marine condition. Furthermore, the effects of velocity and impingement angle will be searched. Relating the experiment, specimens have to be chosen. Possibly, only the major materials of maritime industry will be selected. These will have a cylindrical shape. Furthermore, those specimens will be placed in a recirculating rig as shown in the figure below. Afterwards, saline water will pass through a pump and therefore accelerate. Water will flow through pipes, where at the end of the piping system, a nozzle is installed, in order for the flow to take the exact preferable velocity. Nozzles will be changed. Directly vertical from the direction of the flow is the stagnation point. In the figure besides is a representation of the region where the liquid jet impinges to the solid material (Neville, 1995). The velocity depends on the diameter of the nozzle. Thence, water will impinge to the specimen causing erosive and corrosive damage. With the use of an equipment, the vertical impingement will change and erosive damage from different angles will be investigated. Afterwards, the exact amount of the material that has been degragated will be investigated through scale and metallography. References Bonner, R., 2016. Passivation coatings for micro-channel Coolers. s.l.:s.n. Chandler, K., 1985. Marine and offshore corrosion. s.l.:s.n. Giourntas, L. G., Hodgkiess, T. Galloway, A., 2015. Comparative study of erosion-corrosion performance on a range of stainless steels. s.l.:s.n. Hodgkiess, T., 2013. University of Strathclyde: General-Surface Corrosion. s.l.:s.n. Jin, H. ÃŽÂ ºÃƒÅ½Ã‚ ±ÃƒÅ½Ã‚ ¹ à Ã†â€™Ãƒ Ã¢â‚¬ ¦ÃƒÅ½Ã‚ ½., 2016. Failure analysis of multiphase flow corrosion-erosion with three-way injecting water pipe. s.l.:s.n. Jones, G. Summerscales, J., 2016. Marine applications of advanced fibre-reinforced composites. s.l.:s.n. Larson, T. King, R., 1954. Corrosion by Water at Low Flow Velocity. s.l.:s.n. Lin, F. Shao, H., 1990. Effect of impact velocity on slurry erosion and a new design of a slurry erosion tester. s.l.:s.n. Li, Y., Burstein, G. Hutchings, I., 1994. Influence of environmental composition and electrochemical potential on the slurry erosion-corrosion of aluminium. s.l.:s.n. Meng, H., 2009. Erosion-Corrosion of marine alloys. s.l.:s.n. Neville, A., 1995. An Investigation of the Corrosion Behaviour of a Range of Engineering Materials in Marine Environments. s.l.:s.n. Neville, A., Hodgkiess, T. Dallas, J., 1995. A study of the erosion-corrosion behaviour of engineering steels for marine pumping applications. s.l.:s.n. Neville, A. Hu, X., 2001. Mechanical and electrochemical interactions during liquid-solid impingement on high-alloy stainless steels. s.l.:s.n. Neville, A., Reyes, M., Hodgkiess, T. Gledhill, A., 1999. Mechanisms of wear on a Co-base alloy in liquid-solid slurries. s.l.:s.n. Sabrowski, A. Silva, P., 2010. ph:Regulation of Seawater, the role of Carbonae and Biicarbonate. s.l.:s.n. Scheers, P., 1992. The effects of flow velocity and pH on the corrosion rate of mild steel in a synthetic m;newater. s.l.:s.n. Scheers, P., 1992. The effects of flow velocity and pH on the corrosion rate of mild steel in a synthetic minewater. s.l.:s.n. Wang, L. ÃŽÂ ºÃƒÅ½Ã‚ ±ÃƒÅ½Ã‚ ¹ à Ã†â€™Ãƒ Ã¢â‚¬ ¦ÃƒÅ½Ã‚ ½., 2016. Erosionecorrosion behavior of 2205 duplex stainless steel in wet gas environments. s.l.:s.n. Webber, J., 1992. Br. Corrosion. s.l.:s.n. Wing, L. ÃŽÂ ºÃƒÅ½Ã‚ ±ÃƒÅ½Ã‚ ¹ à Ã†â€™Ãƒ Ã¢â‚¬ ¦ÃƒÅ½Ã‚ ½., 2016. Erosionecorrosion behavior of 2205 duplex stainless steel in wet gas environments. s.l.:s.n.

Sunday, October 13, 2019

Free Essay on Shakespeares Macbeth - Deceitful Lady Macbeth :: Free Essay Writer

Deceitful Lady Macbeth Lady Macbeth’s wicked character has an extreme impact towards her husband. Lady Macbeth is responsible for influencing her husband to commit both crimes; she unleashes the dark side of him and motivates him to become an evil and horrendous man. In various parts throughout the story we find that Lady Macbeth strives beyond limits to be converted into a bitter and sour women. The audience is revolted by her horrific actions and although she may seem repugnant, she is an extremely talented actor. In her role, having a deceitful and convincing character is important We start to see Lady Macbeth’s actions have a huge impact on Macbeth’s character as he transforms from a decent being to an overly bitter creature. The cause of his alteration is due to the fact that Lady Macbeth is constantly excreting heartless information into his mind. "Art thou afeard to be the same in thine own act and valour as thou art in desire?" (I;vii;39-41) "And, to be more than what you were, you would be so much more the man." (I;vii;50-51) Lady Macbeth uses these quotes to push her husband beyond limits and is therefore responsible for his dramatic change in attitude. She is constantly feeding his thoughts with negative comments and later on Macbeth realizes that he has another side to him. As he moves along to discover the concealed side of him, Macbeth falls in love with himself and begins to be drawn towards his evil desires. Because Lady Macbeth was the main cause of his new hidden discovery, she is fully responsible for opening up the door and lettin g the darkness in. This results in Macbeth committing both murders. In the beginning of the play, Lady Macbeth is overly whelmed by the letter she receives about Macbeth. This pushes her to the extreme and causes her to react outrageously. " Come, you spirits that tend on mortal thoughts, unsex me here†¦make thick my blood†¦take my milk for gall, you murdering ministers†¦come thick night." (I;v;40-50) All these images of darkness and horror reveal the true character of Lady Macbeth; she feels the need to become wicked. Her attitude is even more horrific when she calls on evil spirits to come and possess her, taking control of her actions. This sort of behavior causes the audience and reader to assume Lady Macbeth is a psychopath, and therefore would have reason to hold her responsible for having a major impact on her husband and driving him off, enlightening a twisted sinister and threatening dark side of him.

Saturday, October 12, 2019

Understanding Product Knowledge When Purchasing a Computer :: Essays Papers

Understanding Product Knowledge When Purchasing a Computer Buying a computer seems like a daunting task to many. There are many factors to consider when making a purchase. Brand name, functionality, speed and customer support are just some of the factors that one must consider when researching the options. In order to wisely purchase a computer, one must attain a considerable amount of product knowledge, to get the most value for their dollar. Consumers have different levels of product knowledge, which they can use to interpret information and make product choices. (Peter 64) When researching computers, product knowledge could range in consumers minds from abstract to less abstract thoughts about the options. Within this scope of abstract to less abstract options could be 4 sub-categories of product knowledge. These include product class, product form, brand name and the model or features. The most abstract and first of the four categories is product class. This is the most basic of the four categories. Simply for this demonstration, the product class being discussed is a desktop computer or generally the product type. Now this class differs slightly from some other similar computing product classes such as laptop computers, mainframes and personal digital assistants (PDA’s). The second of the four sub-categories is product form. The basic product form differentiation that one must make is what do you need a computer for and if you need a home-based PC or business-based PC. This would be considered identifying the product class, a home-based system versus a business based-one. The fact is that the average home user who needs a general-purpose PC to go on the Internet and run productivity applications differs little from the average worker in an office. â€Å"Indeed, the actual features in a vendor's business line does not differ much from what's in the home, except at the extreme end of the spectrum, such as a non-upgradeable closed-box corporate PC versus a loaded gamer's system with all the entertainment trappings that a business user would find superfluous.† (MSN) If the computer is strictly for business or word processing purposes and will rarely be relied upon for gaming and multi-media applications than sound and graphics component s are less important because there's little need to keep up with the newest games that require the best graphics and sound components.

Friday, October 11, 2019

Sentence and Answer Selected Answer

Question 1 . 2 out of 2 points Correct Stringing a bunch of independent clauses together with â€Å"ands† and â€Å"buts† results in the infamous Answer Selected Answer: c. Run on sentence . Question 2 . 2 out of 2 points Correct When two independent clauses are glued together with nothing more than comma the result is a Answer comma splice. . Question 3 . 2 out of 2 points Correct An dependent clause masquerading as s sentence is known as a Answer CorrectAnswer: a. fragment. . Question 4 . 2 out of 2 points Correct When the elements of a sentence are put in series or a list and are the same grammatical kind, the technique is called AnswerCorrect Answer: b. parallelism. . Question 5 . 2 out of 2 points Correct Your text tells you that no racial, ethnic or sexual _____________ should ever appear in your writing. Answer derogation. . Question 6 . 2 out of 2 points Correct Expressions that are not necessarily logical by grammatical, but which have evolvedto convey a meanin g nevertheless are known as Answer Selected Answer: c Idiom . Question 7 . 2 out of 2 points Correct When a writer communicates by using overly technical language peculiar to another field he or she is usingCorrect Answer: a. jargon. Question 8 . 0 out of 2 points Incorrect The textbook explains that everything written within a business or technical format has the intent of achieving a(n) _______________ response. Answer Correct Answer: c. targeted. . Question 9 . 2 out of 2 points Correct Your textbook says it might be best to describe the kind of writing it discusses as Answer Correct Answer: d. â€Å"transactional. † . Question 10 . 2 out of 2 points Correct When a writer inappropriately uses the technical language of one field in another field it is an example of Answer Correct Answer: b. isapplied language. . Question 11 . 2 out of 2 points Correct The governing principles in organizing transactional writing are the use and recognition of Answer. Correct Answer: d. patte rns. . Question 12 . 2 out of 2 points Correct Your textbook explains that transactional writing typically begins with a Answer Selected Answer: c. . statement of claim. . Question 13 . 2 out of 2 points Correct Transactional writing usually closes with a statement that establishes or encourages a(n) Answer Selected Answer: b. obligation. . Question 14 . 0 out of 2 pointsIncorrect The logical order in transactional writing is said to involve a pattern similar to what you learned in your English composition classes, the ________________________________ approach. Answer Correct Answer: d. thesis-development-conclusion. . Question 15 . 0 out of 2 points Incorrect Governing the general logical pattern approach, as stated in the textbook, are Answer Correct Answer: d. message-support-closure. . Question 16 . 2 out of 2 points Correct Putting the thesis at the beginning of your document, declaring the point in the introduction, is the first step in the _____________________ approach.Corre ct Answer: a. deductive. . Question 17 . 2 out of 2 points Correct Beginning with a question, following with data that must be understood and concluding with an answer thesis constitutes the _______________________ approach. Answer Selected Answer: d. inductive. Correct Answer: d. inductive. . Question 18 . 2 out of 2 points Correct The texbook tells you that just as process derives from narrative, analysis derives from Answer Selected Answer: b. description. Correct Answer: b. description. . Question 19 . 2 out of 2 pointsCorrect Your textbook tells you that there are several templates that are best suited for ordering certain logical patterns of information. The template that assists in condensing a description of something, frequently utilizing narration, is Answer Selected Answer: a. summary. Correct Answer: a. summary. . Question 20 . 2 out of 2 points Correct The template that is used to divide something into its parts to discuss them — perhaps to evaluate them is Answe r Selected Answer: d. analysis. Correct Answer: d. analysis. . Question 21 . 2 out of 2 points Correct The typical fax cover sheet derives its format from the AnswerSelected Answer: c. memo format. Correct Answer: c. memo format. . Question 22 . 2 out of 2 points Correct The business letter form your text explains can impart directness yet seem intimate is the Answer Selected Answer: b. semi-block form. Correct Answer: b. semi-block form. . Question 23 . 2 out of 2 points Correct The accepted ways in which in-house communications are organized, written, formatted and sent is referred to as Answer Selected Answer: b. protocol. Correct Answer: b. protocol. . Question 24 . 2 out of 2 points Correct The word â€Å"memorandum† actually means Answer Selected Answer: c. omething to be remembered. Correct Answer: c. something to be remembered. . Question 25 . 2 out of 2 points Correct In a memo to a co-worker, the style and tone of the communication should be Answer Selected Answer: c. casual, friendly, cooperative. Correct Answer: c. casual, friendly, cooperative. . Question 26 . 2 out of 2 points Correct The tone of a memo to a subordinate should be Answer Selected Answer: a. formal, official, straightforward. Correct Answer: a. formal, official, straightforward. . Question 27 . 2 out of 2 points Correct The tone of a memo from a supervisor or a manager should be AnswerSelected Answer: d. formal, conversational, respectful, diplomatic. Correct Answer: d. formal, conversational, respectful, diplomatic. . Question 28 . 2 out of 2 points Correct The module notes tell you there are three parts to the strategies for organizing your memo. They are Answer Selected Answer: b. introduction-discussion-conclusion. Correct Answer: b. introduction-discussion-conclusion. . Question 29 . 0 out of 2 points Incorrect Memo-ike forms to be filled ut and enclosed with business documents are frequently called Answer Selected Answer: a. mail forms. Correct Answer: c. transmmittals . . Question 30 . out of 2 points Correct Your textbook explains that communications sent via the Internet are assumed to be Answer Selected Answer: d. public. Correct Answer: d. public. . Question 31 . 2 out of 2 points Correct For your resume, the names, addresses and phonenumbers of those who can vouch for your character and work quality should be maintained in a current lost of Answer Selected Answer: d. references. Correct Answer: d. references. . Question 32 . 0 out of 2 points Incorrect Your text tells you that resumes intended to overcome problems and employment gaps are ______________________ resumes. Answer Selected Answer: c. nalytical. Correct Answer: b. functional. . Question 33 . 2 out of 2 points Correct Resumes that display and emphasize both chronology and evployment as well as key abilities are _________________ resumes. Answer Selected Answer: d. mixed. Correct Answer: d. mixed. . Question 34 . 2 out of 2 points Correct Resumes that use narrative as the basis for organization are _______________ resume. Answer Selected Answer: a. chronological. Correct Answer: a. chronological. . Question 35 . 0 out of 2 points Incorrect The resume is sometimes called a(n) Answer Selected Answer: c. portfolio. Correct Answer: d. data sheet. Question 36 . 0 out of 2 points Incorrect The resume should be regarded as a(n) Answer Selected Answer: c. work-history file. Correct Answer: b. persuasive advertisement. . Question 37 . 2 out of 2 points Correct In the real world, your resume should be prepared well before you Answer Selected Answer: c. plan to graduate. Correct Answer: c. plan to graduate. . Question 38 . 0 out of 2 points Incorrect Always _____________ your resume, tailoring it to each job you are seeking. Answer Selected Answer: d. re-copy. Correct Answer: a. customize. . Question 39 . 2 out of 2 points Correct The word â€Å"dossier† means AnswerSelected Answer: c. bundle of documents. Correct Answer: c. bundle of documents. . Question 40 . 0 out of 2 points Incorrect The word â€Å"dossier† Answer Selected Answer: b. Spanish. Correct Answer: a. French. . Question 41 . 0 out of 2 points Incorrect An extended document that acts as a combination of resume, narrative of work history, categorization of strengths is a(n) Answer Selected Answer: a. multipage resume. Correct Answer: c. curriculum vitae. . Question 42 . 0 out of 2 points Incorrect Fieldsa relying on artistic and speaking ability may require creation of a ___________________ to accompany the resume.Answer Selected Answer: c. curriculum vitae. Correct Answer: a. portfolio. . Question 43 . 2 out of 2 points Correct It is customary to close a resume with Answer Selected Answer: c. references. Correct Answer: c. references. . Question 44 . 2 out of 2 points Correct It is always best to address your cover letter to a(n) Answer Selected Answer: d. individual. Correct Answer: d. individual. . Question 45 . 2 out of 2 points Correct The cover letter of application should be thought of as a(n) _________________ that reinforces your resume. Answer Selected Answer: c. ales letter. Correct Answer: c. sales letter. . Question 46 . 2 out of 2 points Correct Which of the following resume details should be excluded from your cover letter? Answer Selected Answer: b. personal data Correct Answer: b. personal data . Question 47 . 0 out of 2 points Incorrect How many main parts of a letter are discussed in the Course Module 2 notes? Answer Selected Answer: d. four Correct Answer: b. three . Question 48 . 0 out of 2 points Incorrect The tone of your cover letter should be Answer Selected Answer: b. brief and courteous. Correct Answer: d. rofessional and positive. . Question 49 . 0 out of 2 points Incorrect How many questions should be answered by the first paragraph pf your cover letter? Answer Selected Answer: a. one Correct Answer: c. three . Question 50 . 0 out of 5 points Incorrect BONUS The sentences of your cover letter should be varied and Answer Selected Answer: a. properly structured. Correct Answer: d. reader-centered. . Question 51 . 2 out of 2 points Correct The part of a cover letter that invites further communication is the Answer Selected Answer: c. closing. Correct Answer: c. closing.

Thursday, October 10, 2019

Issues with Juveniles

Juveniles can break the law just like adults can. The difference is in the way they are treated after the fact, from the police interaction to the type of punishment they will ultimately receive. In most cases getting to the child before criminal behavior begins may stop a life of crime before it begins. In this paper I will be going over the importance of child development, crime control, interrogation and Miranda warnings, crime prevention, deterrence, and punishment. Children that grow up in homes where the parents are not around or do not care about them are more likely to become caught up in a life of crime than the kids that have a loving family. Children that have parents that are criminals themselves will probably become criminals as well. â€Å"According to one researcher, 63 percent of boys with convicted fathers themselves had criminal convictions, compared to 30 percent among those who did not have convicted fathers†. (Worrall, 2008, p. 259) If a child does not have a positive role model to follow, they will follow the negative one. This is also true if the father is not in the home or part of their lives or if their parents are in to drugs. Lack of parental supervision, improper abuse, rejection, neglect, conflict between the parents and many other problems can also lead to behavioral issues in children. Domestic violence in the home, single family households and families with large amounts of people are also more likely to produce children that have behavioral issues as they develop. Lack of attention or negative attention is hard on a child and it has been proven to lead them to a life of delinquency. There are many steps that families can take to work on crime control before it becomes a problem. The first is parent training and education. â€Å"Just as there are good drivers and bad drivers, there are good parents and bad parents. † (Worrall, 2008, p. 261) Parenting does not come overnight. It takes time and practice and information. Sometimes the harm to children is done accidentally and knowing this, the government has started programs such as the Strengthening Families Program. The SFP was founded in 1983 and is for parents who are also drug abusers and teaches them appropriate parenting skills. Parenting classes can be done in and out of the home and appear in several forms. One such form is during pregnancy when a nurse practitioner comes to the home and gives the expectant mother information on her pregnancy and on things to expect when the child is born. Head Start programs are provided to poor African-American families so that their children are given extra help with educational needs. Research has shown that these and other programs have been successful in lowering the rate of delinquency in juveniles. The chance of child abuse is lower in families that have gone through treatment than those who have not. Mothers are bettering their lives through the programs as well so the rate of arrest is lower in the mothers and their children than those left untreated. Once a juvenile has police contact, the interaction is very different than it would be if it were an adult. There are several rights that a juvenile has to protect them. The first right is the Fourth Amendment. The Fourth Amendment to the U. S. Constitution states: â€Å"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized. (Bartollas & Miller, 2008) Juveniles have the same rights to privacy that adults do. If the police want to search a juvenile or their home or vehicle they must provide a search warrant unless the juvenile waived their rights, consented to the search, or got caught in the criminal act they were committing. Interrogation of a juvenile, confessions, and Miranda Warnings go hand in hand. Juveniles, as well as adults, are to be read their Miranda rights at the time of arrest. These Miranda Warnings give the juvenile six rights including: the right to remain silent, the right to an attorney, an attorney provided if they are unable to afford one, whatever the juvenile says to the police is fair game to be used later in court, if a juvenile starts talking they may stop at any time, and whatever the juvenile says to persons other than the juvenile officer or court personnel may be used against the juvenile if they are tried as an adult. The juvenile officer is responsible for providing the juvenile with these rights and must protect the interest of the youth. â€Å"A juvenile officer’s role in the interrogation process is the protection of the juvenile’s rights by initial explanation and subsequently by stopping the interrogation if it is so requested by the juvenile. Participation by the juvenile officer in the interrogation of a juvenile renders the confession and evidence discovered as a result thereof inadmissible [sic] in a subsequent adult prosecution. (McCarver, 2006) All questioning of the juvenile must be done by law enforcement. â€Å"The admissibility of a juvenile’s statement taken in the presence of the juvenile officer is determined from the totality of the circumstances on a case-by-case basis. The court will evaluate the juvenile’s age, experience, education, back ground, intelligence and whether the juvenile has the capacity to understand the warnings given to him, the nature of his Fifth Amendment rights and the consequences of waiving those rights. (McCarver, 2006) If a juvenile is tried as an adult they must have been made aware before his confession that it is possible that he may be tried as an adult and anything that any statements he makes can be used against him. Any officer that questions a juvenile must specifically state that he or she may be certified to be tried as an adult. â€Å"In the absence of an attorney, the confession of a juvenile which results from a custodial interrogation may not be used against the juvenile unless oth the juvenile and his parent, guardian or adult friend were informed of the juvenile’s rights to an attorney and to remain silent, and the juvenile must be given an opportunity to consult with his parents, guardian, adult friend or attorney as to whether he wishes to waive those rights. † (McCarver, 2006) Deterrence or prevention is very important in keeping juveniles out of trouble. In my opinion, one of the most effective preventative measures for preventing juvenile crime is community-based programs. These programs, such as, Big Brothers Big Sisters of America, Bully Prevention Program, and Functional Family Therapy allow youths to be part of the community in a positive way. â€Å"An eighteen-month evaluation found that compared with a control group waiting for a match, youths in the mentoring program were 46 percent less likely to start using drugs, 27 percent less likely to start drinking, and 32 percent less likely to hit or assault someone. † (Bartollas & Miller, 2008) In single parent homes where the parent works it is hard to keep tabs on your child at all times. Getting them into a program will keep the youths occupied and out of trouble in a perfect world. With the statistics listed community-based programs are effective and do a good job of reducing juvenile crime. There are many, many programs like these I listed. The problems that arise are a lack of funding and volunteers. It is important for the communities to sponsor and volunteer for these programs or they really cannot complain about children running the streets, learning negative behaviors, and committing crimes. Another effective preventative measure is programs like the Chicago Area Projects. The projects have three basic goals: Frist, they provide a forum for local residents to become acquainted with new scientific perspectives on child rearing, child welfare, and juvenile delinquency. † (Bartollas & Miller, 2008) Second, they open up lines of communication between the community and the institutional representatives of the larger community, the ones that help influence the local youth. Third, they allow local adults to come in to contact with local youths, â€Å"especially those having difficulties with the law†. (Bartollas & Miller, 2008) This and programs like this one have the local communities take responsibility or the youths before they are sent to the juvenile justice system. The adults in the community can speak on behalf of youths in court and they organize programs to keep the youth out of trouble. If a child is distracted in a positive way, they are less likely to act out in a negative way. When punishment is needed, probation is usually the answer. Probation is the number one sentence in the juvenile court. â€Å"About 400,000 youths are placed on formal probation each year, which amounts to more than 60 percent of all juvenile dispositions. † (Bartollas & Miller, 2008) This number has increased greatly since 1993. Probation is a judicial disposition under which youthful offenders are subject to certain conditions imposed by the juvenile c ourt and are permitted to remain in the community under the supervision of a probation officer. † (Bartollas & Miller, 2008) Juvenile probation focuses on programs for the offending youth in order to keep them out of jail. A probation officer is assigned and will work with the juvenile to help meet the conditions of their probation. Some think that the purpose of juvenile probation is to give the child a second chance. This is not necessarily correct. The main focus of juvenile probation is provide programs and services so that the youth will learn to stay out of trouble with the law in the future. There are several reasons why probation is the most desirable alternative to jail time. Juveniles are able to remain free of incarceration but society has protection from further law breaking. â€Å"It promotes the rehabilitation of offenders because they can maintain normal community contacts by living at home, attending school, and participating in community activities. † (Bartollas & Miller, 2008) It also costs less and allows the juvenile to avoid the negative impact of confinement. While treated differently than adults in most cases, juveniles still break the law and encounter the justice system. Juveniles are afforded the same rights as adults but are handled in a way that usually allows them to have a second chance and become a productive member of society. While stopping a life of crime before it begins is the more favorable approach, it is not always a possibility. In this paper I have discussed child development, crime control, interrogation and Miranda warnings, crime prevention, deterrence, and punishment.