Thursday, December 26, 2019

English Halloween Essay - 918 Words

A perfect halloween It was a perfect Halloween night. There was a full harvest moon, the wind was howling, the neighborhood was quiet; even though kids were trick-or-treating. My friends and I were waiting to go outside. Andrew, a blue eyed nerd, was already excited to go outside. Ashley, Alex and I were calm, but anxious. We all agreed to go out when it got darker. We were all dressed up as zombies, the ones that ate guts and such. â€Å"Lets go! Can we please start and get some candy now!!† Yells Andrew. We all gear up for the night. We say good-byes to our parents and head off into the darkness. Our first couple of houses were great! We each got handfuls of delicious candy! After about 20 houses, we could barley lift our bags.†¦show more content†¦It was dark. It was drafty. It was dead. We look around to find a light switch, only to find 2 candles and 1 match. The soft glow of the candles illuminates the room. We see cob webs in the corners, dust on the tables, and sheets on furniture. In another room we see nothing but piles of broken cement from the slowly cracking ceilings, decaying walls, and broken glass from windows. A stray black cat hisses and scurries past our feet into the dark. As we start touring the house, we start hearing moans and groans, then voices from upstairs. All of a sudden our candles blow out and we all scream. We all run in different directions, trying to find a way out. It felt like a maze, we were the dumb rats trying to find that one piece of cheese. One by one, I hear screams of my friends. I start running faster and faster, till my hea r explodes trying to find the front door. Scared, and petrified I feel a cold bloody hand pull me back into the darkness. ----------------------- MISSING! Annie Johnson, Ashley Springs, Andrew Collins. and Alex Smith Gone Missing since October 31st. Last seen trick-or-treating on Sleepy Hallows Drive. If you see them, Please call theShow MoreRelatedSimilarities Between Halloween And Day Of The Dead1051 Words   |  5 PagesHalloween is a fun, worldwide holiday. Today, Halloween, for children, is going out onto the streets and roaming from house to house asking for, mainly, candy. For adults, Halloween could mean parties, or handing out things to the children, or spending time with family. A similar holiday to Halloween, Day of the Dead. Day of the Dead is mainly limited to hispanic culture, however it has started to spread in more recent years. During Day of the Dead families create altars to attract and guide lovedRead MoreWhy I Have Not Failed920 Words   |  4 Pagesabout, right? These words have been inspiration for many people over many years, including myself, at least since I began my first writing course. I have come to wonder if I have become a decent writer or just a less awful one. G oing through past essays, both final drafts and rough drafts, I have come to realize how awful I actually was and how much I have improve. Despite this improvements, I still have distinct mechanical errors I need to keep working on. Nevertheless, my ability to research, andRead MoreA First Generation Salvadoran American Student s Pursues Higher Education902 Words   |  4 Pagesable to have English conversations with my professors and sometimes with my friends. Even though some friends would speak Spanish, I would reiterate speaking English. College has been a new experience because all my friends speak English all the time. I feel that I have been improved in maintaining English conversations better (Interview, Lucy, May 7, 2016). Moreover, Lucy acknowledged that American’s traditions such as the English music, Thanksgiving Day, Santa Claus, and Halloween. However, sheRead MoreComparing William Shelley s Frankenstein Essay1421 Words   |  6 PagesHaylee Mooneyham English 1010 099 October 3, 2016 Mrs. Miller Project 1: Compare/Contrast Blood Sucking Romeo With Halloween being right around the corner, children are preparing for ABC’s â€Å"Thirteen Nights of Halloween,† parents are picking up pumpkins to celebrate the Celtic holiday, and the urge for a good horror story is emerging. The monster, such as vampires or zombies, is taking the spotlight and it’s hard to ignore. From Dante’s Inferno to Mary Shelley’s Frankenstein, being frightened hasRead MoreThe Task Of Composing A Descriptive Essay1310 Words   |  6 PagesRecently, my Composition I teacher assigned the class the task of composing a descriptive essay. This led me to the question, â€Å"what is a descriptive essay?† What topic could I possible write about for three whole pages? What have I done, seen, or experience that could fill these three long pages? My life thus far has been quite sheltered, so this has created quite the dilemma for me. Being that I am supposed to be descriptive, I feel the need to describe the stress that th is has created for me. MyRead MoreCurse Essay In English964 Words   |  4 Pagescould be use in formal mail or in a emergency announcement. Expatiate could be used in a textbook or in the guidelines of something such as a essay. Hagiography would appear in a review or a book description. Mellifluous could also be used in a book review or even romantic poetry. Mirabile dictu could be used in a translation from something from Latin to English or a news report or article. Patronize can be used in a play(drama) or a rebuking article. The word autochthonous is very unique because itRead MoreDescriptive Essay971 Words   |  4 PagesChandell Gabler English 099-22-Intro to College Writing 9:05-10:15 am Professor Braxton-Robinson/Professor Sheffield Assignment: Write a Descriptive Essay describing a storm you have witnessed. The storm I witnessed was Hurricane Sandy. When I first heard of the hurricane I thought it wouldnt be as bad as some people were prediciting, but as the storm approached I certainly changed my mind. As we sat in the house it became very real how bad the storm was going to be. It was scary toRead MoreMy Interview On My Roommate s Boyfriend1711 Words   |  7 Pagesthat his adaptation has a lot to do with him being from Tijuana and growing up near the border that divides the USA and Mexico. This gave him the ability to celebrate traditions of the American culture. For example, he mentioned that, â€Å"Christmas, Halloween and long weekends are some of the most popular ones they practice back in Tijuana. It amuses me to know that people from Tijuana are aware of even long weekends†, he confessed. This is due to â€Å"tourists crossing to Mexico in order to enjoy the atmosphereRead MoreOf English 10. 8 May 2017. Ryan Memmer. 6Th Period. Mrs.1618 Words   |  7 Pagesof Englis h 10 8 May 2017 Ryan Memmer 6th Period Mrs. Parker English 10 13 April 2017 The Story of Harper Lee There are many famous authors in the world known today. These authors put in the work required and sacrificed much of their time. Harper Lee is one of these authors who faced obstacles in her life. She published many different works and had a successful career. Even though there were challenges she had to endeavor, nevertheless she showed perseverance because of her dedication. Nelle HarperRead MoreHarry Harlow : An American Psychologist Who Studied Monkeys And Their Behavior1243 Words   |  5 Pagesunderstanding of human behavior. Dr. Harlow’s research also helped to better understand the psychology of children. This essay will discuss Dr. Harlow’s background, education, social influence, historical significance, and major contributions in the study of psychology. â€Æ' Background Early Childhood Harry Harlow’s original last name was Israel, and he was born on Halloween in 1905. He grew up in Fairfield, Iowa. His parent’s names were Mabel Rock and Alonzo Israel. He had four brothers, and

Wednesday, December 18, 2019

Compare And Contrast Malala Yousafzai And Houston - 797 Words

†Success is not final, failure is not fatal; it is the courage to continue that counts.† (Winston Churchill) In times when one’s faith is shaken, standing one’s ground can be difficult. However, in these dire circumstances, some endure and fight in spite of adversity. Malala Yousafzai, survivor of a Taliban shooting, and Sam Houston, hero of San Jacinto, both displayed these traits. They fought without any regards to public opinion; Sam Houston defended his ideologies, whereas Malala fought for her rights, but they both sacrificed their wants for the cause. Despite their differences, Malala Yousafzai and Sam Houston both exhibited their fierce tenacity and courage as they gritted through their struggles. When the public eye is involved,†¦show more content†¦While both Sam Houston and Malala Yousafzai certainly exuded courage, their hindrances differed greatly. As important as the preservation of the union was to Houston, its dissolution would arguably not have left countless children unable to attend school. Moreover, Houston’s family didn’t have to constantly worry for his safety like Yousafzai’s mother. While a speech denouncing succession in Waco resulted in the â€Å"explosion of a keg of powder behind the hotel in which he slept unharmed,† (205) that fear pales in comparison to the terror of not knowing if one’s child will live to the next day. Ziauddin, Malala’s father and fellow girl’s education advocate, too, received threats, but always fretted more over the safety of his daughter. â€Å"‘I personally am more comfortable when she leads a normal life,’ he [said]. ‘Too much light on her disturbs meâ €™â€  (Roth). Even though Houston’s ideology of preservation proved a powerful, albeit dangerous, stance to take, his circumstances differed deeply from Malala’s. However different their undertakings, both individuals willingly made sacrifices to their cause. As she spent most of her time speaking at events and accepting awards, Malala’s studies, the very thing she advocated and spoke about, fell behind. She remarked â€Å"After the exams in March the cup that went into my new cabinet was for second place† (226). Additionally, she almost ended up paying for her advocacy with her life

Tuesday, December 10, 2019

Cloud Computing Security Issues

Question: Discuss about the Cloud Computing Security Issues. Answer: Introduction The concept of cloud computing is based on the set of resources that are being allocated for making use of a network of servers which are hosted at a remote location on the Internet for the purpose of storing, managing, and processing data, in place of using a personal computer or a local server. Cloud computing is basically a collection of resources which could be allocated to the users on the basis of demand. Cloud computing suggests new methods to deliver facilities. the method in which businesses are operated undergo changes because if these novel advanced, technical and assessing prospects. Cloud computing is thus considered as a unparalleled computing technology and beginning of new era in the world of computing. Although the idea of sharing resources is an old one, but cloud computing is a new version of those old notions. A cloud service provider operates to provide a collection of resources and services in this concept. These services can be made available from data canters located anywhere in the world. It allows the users to make use of various virtual resources through the internet in accordance with their needs. With the increase in famous computing companies bringing in their cloud computing services and products the entire concept of cloud computing has gained a great impetus. Some of the famous services of cloud computing in the market are Oracle Cloud, Google Engine and Office 365 (Rittinghouse and Ransome, 2016). With the rapid development in the cloud computing in the computing industry so are the risk and threats associated with the security becoming matter of greater concerns. Unless the security issues are managed and fixed the success and universal acceptance of the cloud computing services are not possible. The fast enhancement in the popularity of cloud computing proves to bring in higher security challenges for the users as well as providers. It is correct that there are risks involved with the use and application of cloud computing. However, the benefits of cloud computing far outweigh the risks. With the use of cloud computing the small organizations can also have effective IT infrastructure at place. With cloud computing, the small organizations are not expected to make heavy investment to procure IT hardware and software. Literature review A lot of studies have been done in the area of cloud computing. The literature review for cloud computing can be sub divided into sections like: Models of Cloud Service For implementation of the cloud computing concepts various models are available in the market. The cloud could be used for software to be used as a service, Platform to be used as a service or Infrastructure to be used as a service. These models of cloud computing can be discussed as: Model: Cloud Software as-a-Service (SaaS) is software supply arrangement with the purpose of giving authority to access remotely a software and its functions, in the form of a web-based facility (Ercolani, 2013). Software-as-a-Service authorizes companies to get access of the various business functionality of a software at relatively low price, these prices are generally much less than the actual cost of licensed applications. SaaS costs are made up on a monthly fee basis (Ojala, 2013). Also because of remote hosting of the software, users can also save money as they do not require any extra hardware. Software-as-a-Service abolishes the all likelihoods for companies to manage the set-up, installation, daily protection or upkeep (Jadeja and Modi, 2012). Model: Cloud Platform-as-a-Service (PaaS): the competence given to the operators to make use of the cloud infrastructure or platform (Zaslavsky, Perera and Georgakopoulos, 2013). In this PaaS model, the supplier or the cloud technology collaborates with a computing platform, comprising of Programming language, Operating System, implementation of database, environment and wed servers. In this scenario, the developers of applications or software can make and execute their software using the cloud platform without incurring extra cost and trouble of obtaining and management of the chief software films or hardware (Pandey and Varshapriya, 2014). We can consider the example of Oracle cloud platform-as-a-service. In this Oracle offers the database services as a platform to be accessed remotely. PaaS can mainly be categorized as environments for application development projected as a Service through the suppliers of the cloud. The platforms have an Integrated Development Environment (IDE), which are accessed by the users uses. These IDEs mainly includes the compiler, editor, build or execute and deploy structures to progress their applications. Thus by using the infrastructure given by the cloud supplier users deploy their applications (Zhou et al., 2013). Model: Cloud Infrastructure-as-a-Service (IaaS): in case of the IaaS cloud, the infrastructure like servers, hardware, routers, storage and other networking elements all are arranged by the IaaS provider (Manvi and Shyam, 2014). As per their individual requirements the user takes advantage of these accessible amenities and accordingly make payments for the facilities used by them. The applications, Operation Systems etc. are used by the end user, which has ability to organize and run any software (Dykstra and Sherman, 2012). The liability of supervising and monitoring the core could infrastructure does not come on the end user, however, he can use the operation systems and deployed his application (Kar and Rakshit, 2014). In order to use the IaaS effectively, the end user has to understand the resource necessities or the exact applications. Thus making scaling and flexibility as the end users responsibility and liability instead of the supplier. Models of Cloud Deployment There are various models that can be used in order to deploy a cloud computing model. Some of these models are as follows: Private Cloud: in this model the cloud forms the facility to give services to only selected organization. This could be controlled by the user organisation itself or by some external third party. When it service provider is an external entity is called an externally hosted private cloud, while if it is done by the company using it, its called an on premise private cloud (Goyal, 2014). Public Cloud Model: this is the type of deployment model where the cloud amenities like software applications, storages capacities, etc. are being made available on the publicly accessible network. A user can use such public clouds by paying the fees as schedules, which maybe according to per usage or other monthly purchases, yearly offers, etc. (AlZain, Pardede, Soh and Thom, 2012). Hybrid Cloud: it is a combination of private and public cloud choices. Community Cloud: in this model, the computing resources and infrastructure is shared among the companies which have similar community (Bora and Ahmed, 2013). Security Threats in Cloud Computing Even though there has been increase in popularity of the cloud computing, its complete acceptance and utilisation would only be possible when the various security issues associated with it are recognised and resolved. These threats are of numerous types, according to the 2013 research by the Cloud Computing Alliance some of the most dangerous threats are, insecure interface and APIs, traffic hijacking, malicious insider, denial of service, abuse of cloud facilities, insufficient due diligence, breaches in data, vulnerabilities of the shared technologies, breaking of perimeter security model and unknown risk profiles (Qaisar and Khawaja, 2012). Security issues in the cloud computing Cloud computing is attractive because of its effective ease and efficient saving of costs, however, it has various major upsetting security issues that are essential to be taken care. Especially when the highly crucial application and delicate data is made public by using the cloud computing environment. The chief characteristic of any latest computing technology could be seen by examining the extent of security that is provided by that system (Asma, Chaurasia and Mokhtar, 2012). Thus it is important to have thorough knowledge that the important data present on the cloud is rightfully protected from unsolicited access. Among major security issues some are: The issue of confidentiality of data: with the highly competitive business world, information is the real power. The importance of critical data cannot be undermined and thus the significance of confidentiality is paramount. Confidentially can be considered as a contract or guidelines which restrict the free admission or put on boundary on the location for some critical information available in the cloud data publicly. Thus in cloud computing scenario, the confidentiality means keeping the clients applications and data close for access for other cloud users as well as the cloud service provider. The only possible scenarios where the service provider can disclose the confidential user data, is when the service provider has knowledge about the location of user data in the cloud systems, or when the service provider has the right authority to admission and collect the clients private data from the cloud systems. Another possibility is when the service provider is able to recognise the s ignificance of clients data on the cloud (Gonzalez et al., 2012). The present cloud computing contains three layers, the Software layer, the Platform layer and the Infrastructure layer. The Software layer offers the clients access to the user interface for the applications that runs in the infrastructure of the cloud. The platform layer gives the necessary platform like as environment for software operation to be executed by making use of the available resources of the system. The infrastructure layer gives the required hardware support for the computing, such as network, storage, etc. the different service providers use their individual layers of software, platform and infrastructure, therefore the client which is using the application of the software layer of the cloud provided by a service provider, tends to use the platform along with the infrastructure offered by that service provider, thereby making it evident the location of critical user data which could be accessed by the service provider (Hashizume, Rosado, Fernndez-Medina and Fernandez, 2013). Issue of data availability: since the critical data is kept at a remote location, which is owned and managed by the service provider, the owner of data at times might have to deal with the issues like system failure from the side of service provider. In the case the cloud fails to work properly, the client will not be able to access his own data because of dependence on the single service provider. The denial of service (DOS) or the Direct Indirect (DOS) attack are dome of the major threats with respect to the data availability. The facility of giving on-demand services at various levels must be done by the cloud computing service provider. The Service Leve l Agreement (SLA) is drown to gain the trust of the clients for the usage of cloud computing by the service providers. Issue of data integrity: for information technology the integrity of data is of paramount importance, the data must be complete and whole. Similar to the data integrity om the local databases, the importance of data integrity in the cloud storage system is also crucial. This forms one of the prime factor to decide the effectiveness and performance of the cloud. The integrity of data gives evidences of the data validity, reliability and uniformity. Issue of data security: with respect to idea of the software deployment scheme or the storing of data in the cloud computing system, which is on the user premise, the delicate information of the company remains to exist in the company premises and could be subjected to the logical, physical as well as personnel arrangements of security and control of access. However, in the cases like, the public cloud or Software-as-a-Service model, the client data is stored separately beyond the physical company boundary, by the cloud service provider. Therefore, the could service provider must have proper agreement with the client to use extra security checks so as to ensure complete data security necessary for prevention of illegitimate breaches. Because of vulnerability of the security in the software application or because of some employee with malicious intentions (Chou, 2013). There is very strong need for using a good and impenetrable encryption procedures for ensuring to present the above mentioned security issues from materialising. Because of the remoteness of data and accessibility to greater number of clients and potential clients, availability of cloud in public domain and the main purpose of the cloud to be available for access to greater number of users makes the classical encryption techniques insufficient for the protection of the clients interest. Therefore, strong techniques for data protection are required to safeguard data from the uncertainties like the trust issues, location of data issues, etc. In the information technology business, whether it is traditional or the cloud based, trust is very essential between the client and the service providers. In the cloud computing business, the trust is one of the major issues. Similarly, the location of data, on the cloud without the knowledge of the client could also lead to some legal implication s if not dealt appropriately. Potential solution for the Cloud Computing Security issues It is necessary for the success of cloud computing to sort its security issues and build trust among the clients. Some of the potential solutions could be to the availability of support for scrutinizing the cloud facilities provided by the service provider. The location of data is unknown to the clients using cloud storage, thus if the proper audit tools are offered by the cloud service provider would ensure building of trust as well as confidence of the client in the cloud services. The client can indulge in legal examination, regulation and scrutiny of the data stored by them (Rong, Nguyen and Jaatun, 2013). Availability of robust recovery facilities would also enable the uses to make more use of the cloud facilities. In case of loss of data or severe fragmentation, the strong and easy recovery methods would make cloud services more attractive (Ryan, 2013). Likewise, the backup facility in case of physical damage or natural disasters would ensure increase in clients using the cloud facilities. Moreover, use of strong encryption algorithm techniques to safeguard the user data confidentiality, integrity and availability would further enhance the appeal of using cloud services. Also the enhance enterprise infrastructure with the ease of hardware installation and configuration like servers, fire walls, routers, proxy server, etc. would facilitate the clients and encourage them to use the cloud facilities (Zissis and Lekkas, 2012). Conclusion The attractiveness of the revolutionary cloud computing lies its ability to provide is high performance in the rapid and cost effective manner. The sharing of resources leads to greater integration of available resources and thereby enabling the clients to profit from the concept of cloud computing. However, the serious security issues are inbuilt in the virtue of the concept of cloud computing. The concerns of data integrity, confidentiality, security of resources and authorisation of access are of paramount importance for any organisation. These issues must be managed and sorted out effectively for the desired improvement in the usage of the cloud computing facilities and overall success of this idea. The above report highlights that cloud computing is attractive because of its effective ease and efficient saving of costs, however, it has various major upsetting security issues that are essential to be taken care. Especially when the highly crucial application and delicate data is made public by using the cloud computing environment. Therefore, it is important that the organizations should assess all the threats associated with the use of cloud compuing. It is also important that the organizations should conduct the training sessions for employees. It would help the organizations to overcome the security threats associated with cloud computing. The complete benefits of cloud computing can be achieved if the organization has a vision for the effective use of Information Technology. References AlZain, M.A., Pardede, E., Soh, B. and Thom, J.A., 2012, January. Cloud computing security: from single to multi-clouds. In System Science (HICSS), 2012 45th Hawaii International Conference on (pp. 5490-5499). IEEE. Asma, A., Chaurasia, M.A. and Mokhtar, H., 2012. Cloud Computing Security Issues. International Journal of Application or Innovation in Engineering Management, 1(2), pp.141-147. Bora, U.J. and Ahmed, M., 2013. E-learning using cloud computing. International Journal of Science and Modern Engineering, 1(2), pp.9-12. Chou, T.S., 2013. Security threats on cloud computing vulnerabilities. International Journal of Computer Science Information Technology, 5(3), p.79. Dykstra, J. and Sherman, A.T., 2012. Acquiring forensic evidence from infrastructure-as-a-service cloud computing: Exploring and evaluating tools, trust, and techniques. Digital Investigation, 9, pp.S90-S98. Ercolani, G., 2013. Cloud Computing Services Potential Analysis. An integrated model for evaluating Software as a Service. Cloud Computing, pp.77-80. Gonzalez, N., Miers, C., Redigolo, F., Simplicio, M., Carvalho, T., Nslund, M. and Pourzandi, M., 2012. A quantitative analysis of current security concerns and solutions for cloud computing. Journal of Cloud Computing: Advances, Systems and Applications, 1(1), p.1. Goyal, S., 2014. Public vs private vs hybrid vs community-cloud computing: A critical review. International Journal of Computer Network and Information Security, 6(3), p.20. Hashizume, K., Rosado, D.G., Fernndez-Medina, E. and Fernandez, E.B., 2013. An analysis of security issues for cloud computing. Journal of Internet Services and Applications, 4(1), p.1. Jadeja, Y. and Modi, K., 2012, March. Cloud computing-concepts, architecture and challenges. In Computing, Electronics and Electrical Technologies (ICCEET), 2012 International Conference on (pp. 877-880). IEEE. Kar, A.K. and Rakshit, A., 2014. Pricing of Cloud IaaS Based on Feature Prioritization-A Value Based Approach. In Recent Advances in Intelligent Informatics (pp. 321-330). Springer International Publishing. Manvi, S.S. and Shyam, G.K., 2014. Resource management for Infrastructure as a Service (IaaS) in cloud computing: A survey. Journal of Network and Computer Applications, 41, pp.424-440. Ojala, A., 2013. Software-as-a-Service Revenue models. Pandey, S. and Varshapriya, J.N., 2014. Using Platform-As-A-Service (Paas) for Better Resource Utilization and Better Quality Applications. International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN, pp.2349-2163. Qaisar, S. and Khawaja, K.F., 2012. Cloud computing: network/security threats and countermeasures. Interdisciplinary journal of contemporary research in business, 3(9), p.1323. Rittinghouse, J.W. and Ransome, J.F., 2016. Cloud computing: implementation, management, and security. CRC press. Rong, C., Nguyen, S.T. and Jaatun, M.G., 2013. Beyond lightning: A survey on security challenges in cloud computing. Computers Electrical Engineering, 39(1), pp.47-54. Ryan, M.D., 2013. Cloud computing security: The scientific challenge, and a survey of solutions. Journal of Systems and Software, 86(9), pp.2263-2268. Zaslavsky, A., Perera, C. and Georgakopoulos, D., 2013. Sensing as a service and big data. arXiv preprint arXiv:1301.0159. Zhou, J., Leppnen, T., Harjula, E., Ylianttila, M., Ojala, T., Yu, C. and Jin, H., 2013, June. Cloudthings: A common architecture for integrating the internet of things with cloud computing. In Computer Supported Cooperative Work in Design (CSCWD), 2013 IEEE 17th International Conference on (pp. 651-657). IEEE. Zissis, D. and Lekkas, D., 2012. Addressing cloud computing security issues. Future Generation computer systems, 28(3), pp.583-592.

Monday, December 2, 2019

Miss Stephanie’s Slander free essay sample

When searching for a new book to read, people are often drawn to one that has an intriguing cover, not even bothering to learn what the book is actually about. Although the old saying â€Å"don’t judge a book by its cover† may seem foolish, people often use this tendency. Similar to judging a book by its cover, people commonly judge others based on rumors and reputations. Harper Lee depicts this theme in To Kill a Mockingbird, demonstrating that one must dig beyond the surface to find the truth. Although Miss Stephanie’s outrageous claims about Boo Radley have the potential to sway Jem and Scout, the children boldly choose to look beyond the erratic rumors Miss Stephanie feeds them and instead believe in Atticus’ core philosophy of climbing in another person’s skin and walking around in it. Since doing so enables the children to better understand Boo’s situation and establish an unconventional friendship with him, this one simple decision ultimately results in Boo saving their lives, which most likely would not have happened if Jem and Scout had believed Miss Stephanie’s false gossip. We will write a custom essay sample on Miss Stephanie’s Slander or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page The unknown nature of Arthur â€Å"Boo† Radley gives the children a blank canvas of his personality that is painted by the prejudiced views of Miss Stephanie to create a distorted image of him. The neighborhood relationship the children have with Miss Stephanie is based largely on the phony information she tells them. This is conveyed from the moment that the reader is first acquainted with Miss Stephanie. She is introduced as the neighborhood source of gossip on the Radley family. Interestingly, Jem and Scout turned to Miss Stephanie, of all people, in hopes of learning more about their mysterious neighbor. This shows that Miss Stephanie is infamous for sticking her nose into other people’s business, which is not something to be proud of. At the same time, her fabricated stories give the children a false image of Boo. Being young and gullible, Jem and Scout have no further knowledge of Boo to contradict Miss Stephanie’s lies. They were deceived into judging Boo without knowing the slightest bit of his true nature. Miss Stephanie’s attempt to brainwash the naive children into believing that Boo is a monster is illustrated when she spreads false rumors: â€Å"‘Miss Stephanie Crawford said she woke up in the middle of the night one time and saw him looking straight through the window at her†¦said his head was like a skull lookin’ at her’† (12-13). Once again, Miss Stephanie is implanting lies into the minds of the innocent children about Boo that present him in the worst light. Obviously, the children are mesmerized by these fictional stories. Because of Boo’s mysterious past and unusual life, Scout and Jem are led to believe that Boo is a monstrosity of the human race. Miss Stephanie’s skewed image of him creates a prejudiced painting of Boo in the minds of the children. This intolerance of diversity could permanently affect the manner in which Scout and Jem view the members of their community. The reader knows that the children take Miss Stephanie’s claims as truth and think of Boo as a freak because of the judgments they pass themselves. Take for example when Jem is illustrating Boo’s appearance to Dill: â€Å"Jem gave a reasonable description of Boo: Boo was about six-and-a-half feet tall, judging from his tracks; he dined on raw squirrels and any cats he could catch, that’s why his hands were bloodstained—[†¦] his eyes popped, and he drooled most of the time† (13). The reader can definitely see how the children have been disillusioned into believing that Boo is some type of malicious monster. It is exemplified that the children are quick to make judgments on the unknown. Moreover, these prejudices are based on no factual evidence. The children obviously believe her because scout said Jem gave a â€Å"reasonable† description of Boo. Atticus is extremely disappointed with how his children are dealing with the information they are getting. He sees that his children are slipping into a trap and are starting to mimic a society that has for a long time been prejudiced towards anyone and anything peculiar. Atticus struggles to stop the bleeding by commanding the children to leave Boo alone, but the damage has been done. This damage that is the skewed portrait of Boo in the minds of the children, can only be remodeled through the paintbrush of Atticus’ wisdom. Jem and Scout, through Atticus’ teachings, strive to uncover the true Boo Radley. After a disappointing first day of school, Scout comes home with complaint about her new teacher, Miss Caroline. In response, Atticus tells Scout to find out who a person really is before formulating an opinion: â€Å"‘You never really understand a person until you consider things from his point of view—’ [ ] ‘—until you climb into his skin and walk around in it’† (30). Atticus’ core philosophy leads him to always see the best in people. He cannot comprehend how a human being could judge a person without actually knowing who they are. This point of view is in sharp contrast to Miss Stephanie’s. Miss Stephanie instinctively judges people based on the smallest sliver of information. She believes you can get an accurate interpretation of a person without finding the facts. Atticus provides a counter insight for the children to oppose the views of Miss Stephanie. This new perspective teaches them not to judge people until they understand them fully. The simplicity of this concept helps Scout realize how one must understand others’ personal situations. This puts Scout and Jem at crossroads where they must make a difficult decision: should they continue judging people based on appearance or should they take Atticus’ advice and get to know people before they formulate opinions? Their struggle between the two contrasting ideas of Atticus and Miss Stephanie continues in the case of Mrs. Dubose. Atticus boldly claims that Mrs. Dubose was the bravest person he knew. The children are appalled by this statement. They viewed Mrs. Dubose as bitter old woman. They were unaware of her morphine addiction and hastily jumped to a conclusion. The consequences of prejudice are now crystallized in their minds. As the novel progresses, Scout and Jem take on Atticus’ ideology towards judgment, and they try to see things from other people’s points of view. One instance of this comes up when Jem is hypothesizing why Boo Radley stays inside: â€Å"‘I think I’m beginning to understand why Boo Radley’s stayed shut up in the house all this time †¦ it’s because he wants to stay inside†Ã¢â‚¬â„¢ (227). Jem and Scout take the initiative to try and see things from Boo’s point of view. They make a conscious effort to understand where Boo is coming from and he befriends Jem and Scout through subtle gestures: He leaves little gifts and knickknacks for the children in the knothole of the big oak tree in his yard. The reader now can see that Jem finally understands that Boo is one of the many victims of the town’s prejudice which is inflamed by Miss Stephanie. One of Jem’s theories of Boo’s seclusion is that Boo does not want to face the cruelty of mankind. Atticus has now gotten through to Jem with Atticus’ most valuable lesson and a major theme in this book how it is a sin to kill a mockingbird. This has given Jem a far more mature perspective on people than before. Miss Stephanie has failed to corrupt the minds of the town’s youth; coincidentally; Atticus has prevailed in trying to better the future of Maycomb. The ability of Scout and Jem to look past prejudices set forth by Miss Stephanie will end up helping them in the long run. By being able to realize the innocence in Boo Radley, Scout and Jem make a life or death decision. Soon after the trial, Bob Ewell becomes exceedingly hateful towards the Finch Family. On the way home from a school play, Scout and Jem are attacked by Bob Ewell. They are saved from the clutches of death by a mysterious figure. Scout later identifies their savior as Boo Radley. Scout and Jem’s effort to befriend Boo gives Boo the courage to come out in public for the first time in over twenty years. This is a testament to the characters of Scout and Jem and how refused to fall victim to the trap that most Maycomb residents are not so lucky to escape. If Jem and Scout had taken Miss Stephanie’s baseless opinions on Boo as truth, then it is highly likely that they would both be dead. Fortunately, they make a decision to find out who the real Boo is and it led to their lives being saved. They showed Boo that they respected him for who he was, a mockingbird who â€Å"sings† for the children without seeking any recognition. Jem and Scout are finally able to realize the positive effects of seeing things from others’ points of view. After this unforgettable event, the children will never judge people without all the facts again. After Boo is no longer needed, Scout walks him home. As Scout is about to leave the Radley residence, she has a revelation: â€Å"Atticus was right. One time he said you never really know a man until you stand in his shoes and walk around in them. Just standing on the Radley porch was enough† (279). In this passage, the reader can see that Scout has finally learned not to judge people without looking from their perspective. Scout is literally and figuratively able to see from Boo’s point of view in this passage. Earlier in the novel, Scout was terrified of the Radley estate because of all the horrific tales she had heard from Miss Stephanie. Now actually standing on the porch and looking out, Scout sees what Boo has been seeing for all these years. This is the turning point in the novel where Scout is finally beginning to understand why Boo is the man he is. Scout and Jem have been able to fight the prejudices laid out by Miss Stephanie and the town of Maycomb and by doing so they have saved their lives. The readers can see Scout apply this new-found knowledge to a fictional story, The Gray Ghost: â€Å"An’ they chased him ‘n’ never could catch him ‘cause they didn’t know what he looked like, an’ Atticus, when they finally saw him, why he hadn’t done any of those things Atticus, he was real nice. † This passage exemplifies the major theme of the book: looking past prejudices. This scene, coming at the end of the book, sums up the whole story very well and sends a clear message to the reader. Throughout the book, many people become the victim of Miss Stephanie’s prejudice. From this passage, the reader can see that Scout has finally rid herself of Miss Stephanie’s misrepresentations of others’ characters. This prejudice was replaced by Atticus’ belief of looking at things from different people’s perspectives. After this experience, Atticus’ philosophy will be forever engraved in Scout and Jem’s minds. By the end of the novel, Scout and Jem are mature enough to follow Atticus’ philosophy and not give into Miss Stephanie’s severe ways of avoiding the plain truth. Although they did not know it at the time, this one decision saved their lives. Scout and Jem do not follow in Miss Stephanie’s footsteps. They do not try to hide their fear of the unknown by being prejudiced. This displays a strong theme of looking past personal prejudices and getting to know people for who they really are. This can be applied to every day life and is very prevalent in our world today. As with a book, the reader must interpret and unearth the truth behind a book’s cover to ultimately come to an informed conclusion. Although extremely cliche, one lesson still holds the test of time and can be applied to everyone in every corner of the world: do not judge a book by its cover.

Wednesday, November 27, 2019

Cold War2 essays

Cold War2 essays The Cold War never presented any real threat on America. It was nothing more than the propaganda of two battling super powers. The two super powers involved in the Cold War were The United States of America and The Soviet Union. The two countries were constantly battling over who is the most powerful on the planet. The supposed threats were mere techniques of propaganda used to scare the other countries public into believing they were more powerful. Over and over again the U.S would flex its muscles and then The Soviet Union would flex its muscles until eventually one country couldnt. The Cold War lasted a very long time and it was fought through battles such as the Korean War and Vietnam. Each battle split the country and the U.S would take a side and The Soviet Union would take a side and they would use the country as a battle ground. This was the only actual fighting that occurred. The Cuban missile crisis was an important event that took place during the cold war. In the Cuban missile crisis, America was fearing that The Soviet Union had certain missile instalations in Cuba . The U.S found out about these missile installments from satellite imagery that showed the missiles being transported to Cuba and show the missile sites inside Cuba. "With Castro's approval, the Soviet Union began building secret missile bases in Cuba. On October 16, President Kennedy was shown photographs of the missile installations in Cuba." (Rawnsley, 7) On the surface one would get scared by something like this and that is exactly what The Soviet Union wanted to happen. The whole Cold war was propaganda so by scaring the U.S into thinking they had missiles in Cuba gave them the edge on the war. If The Soviet Union wanted to bomb the U.S they could have easily snuck the missiles in and hidden them. They knew about the satellites and purposely exposed the missiles. "A naval blocka de was imposedosed on Cuba to stop the cons...

Saturday, November 23, 2019

The Relation between SAT Scores and Academic Achievement

The Relation between SAT Scores and Academic Achievement SAT / ACT Prep Online Guides and Tips You're a top student in your class does that mean you can skip SAT prep because your GPA will carry you? Or you're just average in the class, does that mean you can't do well on the SAT? It turns out, that the college board admits themselvesthat SAT score is not highly related to your high school GPA. In statistical speak, high school GPAs predict less than 30% of the variation on SAT scores. Through my own experience and numerous students I work with, this is actually not surprising at all. Why is this the case? 1. The SAT is standardized. First, the SAT scores are standardized. This means that it doesn't matter if you're from Manhattan, New York, or rural northern Mississippi, the test is the same. If you have the same skill, you'll do equally on the SAT. Not so for your GPA: if you go to a less challenging high school, you'll have a higher GPA, and if you go to a top school like Stuyvesant, you'll get a much lower GPA. In other words, GPA compares you within that school, SAT compares you across the nation. 2. The SAT Doesn't Measure Many Classroom Factors. The SAT can't tell that you're a great team player, follow the teacher's instructions, or that you're a nice kid, all of which do go into your GPA in general. Getting good grades in school is a skill that you've spent years honing and perfecting. Most of these skills don't translate to the SAT. To prepare for the SAT you'll need to, in some ways, start from square one. Preparation is key to getting ahead again. 3. The SAT Strongly Measures Analytic Test Taking Skills. Whereas schools measure your ability to be creative in essays and thoughtful in your work, the SAT measures your abiluty to guess efficient, spent time correctly, and think logically and mechanically. These skills need to be practiced for the test. Long story short, academic achievement doesn't solely determine your SAT score. If you've done well in school, you want to keep up the good work and not tarnish your chances. To do this you'll need to start learning SAT skills soon. If you haven't done well in school, this is your second chance, your shot to show the world that you still have it in you. Because the situation is different, you can have a fresh start in acing the SAT. Found this article useful? Get a lot more helpful with our Free SAT Ebook!

Thursday, November 21, 2019

Epidemiology Assignment Example | Topics and Well Written Essays - 750 words

Epidemiology - Assignment Example It also discusses the three parts of the epidemiological triangle in a clear and outright way. Voigt explains various symptoms in the Hong Kong and SARS article. It is evident that the symptom common to all patients is a fever above 38 degrees Celsius. Some patients experience mild respiratory symptoms at the first stage, but later the cold experienced resembles influenza. Statistics shows that 10 percent to 20 percent of the patients have diarrhea. It is also apparent that SARS lead to either bacterial pneumonia or viral pneumonia. SARS was diagnosed in patients who had any of the symptoms. Also, SARS was suspected in patients who had contact with individuals who had been infected with SARS. One was advised to visit the health centers for diagnosis in the case where one had travelled to any of the regions identified by World Health Organization (WHO) as areas with prone to SARS (Voigt, 2013). Voigt also give statistics of the SARS epidemic as per the World Health Organization (WHO) report. The statistics showed that a total of 8,097 people worldwide became infected with SARS during the 2003 outbreak. The patients among these who died were 774. In considering the epidemiological triangle, the host of this epidemic was a farmer in Foshan county in the Guangdong province of china. He died soon after the infection, and there was no definite diagnosis done on his cause of death. The outbreak is believed to have been prone in November of 2002. The unfortunate thing is that the Peoples Republic of China (PRC) informed the World Health Organization (WHO) on February about the outbreak. The report they brought forward at that time showed 305 cases of infected individuals, and that there were 5 deaths caused by the epidemic (Voigt, 2013). Sars Legacy still felt in Hong Kong article shows that lack of openness by the government of china delayed the control effort to the SARS epidemic in the region and thus the disease spread at a high rate in the Guangdong

Wednesday, November 20, 2019

Adults with Chronic illness Essay Example | Topics and Well Written Essays - 750 words

Adults with Chronic illness - Essay Example The precise regions, in this case, are sub-Saharan Africa and South Asia. However, infectious diseases are also claiming lives of people in developing countries due to poor nutrition and sanitation causes but still chronic diseases are leading killer condition in the world. Also, the elderly population is more vulnerable to chronic ailments, and their cases are on the rise (Pinquart, 2014). The chronic disease amongst adults supersedes the other killer infectious diseases like HIV/AIDS. Obesity is one of the worldwide problems as per the universal health organization report. Internationally, the chronic diseases are also threatening lives of various countries in developing and developed countries, for instance in America, the prevalence of chronic disease is high and, as a result, affects the financial and public health. The condition has also contributed to fast growing of older adult’s population, and other risk factors. In developing countries such Kenya, chronic diseases a re on the rise and mostly the adults are affected (Pinquart, 2014). It also affects the youth significantly because of the lifestyle reasons. On the other lower middle income, chronic diseases like diabetes, cardiovascular diseases, and diabetes also significantly affect medium and rich countries more than infectious diseases affect them. At the local scenario, a good example is Bronx New York the issue of chronic illness affects five main neighborhoods. The most common chronic disease is diabetes and obesity in the Bronx. The causes of the high rise of diabetes and obesity condition I Bronx New York is a lifestyle, poor habits of feeding. A half of the population of Bronx New York is reported to have chronic diseases this far much higher than countries America, Africa, and Caucasians. Junk food and calories intake are also highly consumed in the Bronx, vegetables, fruits are hardly available, and when they are, they are more expensive.

Sunday, November 17, 2019

Iliad as a war literature Essay Example for Free

Iliad as a war literature Essay Homer’s epic poem, â€Å"The Iliad,† is probably one of the best stories that tell us about war. In this poem, we see humans fighting with humans, gods fighting with humans, and even gods fighting with gods. Even though it was made some time around the 7th century BC, we can associate with our modern warfare. In Homer’s â€Å"Iliad,† we see how the gods manipulated the people in fighting their own wars, just like how political leaders of different countries manipulate their army to fight another country. We can also see that modern wars, just like the Trojan war in â€Å"the Iliad,† can be caused by small matters which were just blown up to huge proportions by those who manipulate these wars. The book can be seen as Homer’s perspective of war. It is somewhat an anti-war literature because it showed how wars usually end. Both sides lost great lives, including some of their respected heroes. In the Greeks’ side, they lost Achilles’ best friend, Patroclus (23. 1-7). On the Trojans’ side, they lost their prince, Hector (24. 21-23). Achilles eventually died some time after, when he was shot by Paris, Hector’s brother in the heel of his foot which was his weakness. It showed that no one really reigns victorious, even after winning the war. This is because both sides suffer great losses, not only in properties, but also the lives of those who are involved in the war, both armies and civilians. Some attitudes towards war that Homer depicted in Iliad were the possible motives of engaging in wars. The most evident motive in the Trojan War was to retrieve the wife of Menelaus, the brother of the Greek King Agamemnon. They decided to launch an all out war, deploying a fleet of more than a thousand ships in order to retrieve Helen (of Troy) who was abducted by a Trojan prince, Paris (3. 29-31). Another attitude towards war shown in this epic poem was the intervention by higher powers. With the intervention of the Olympian gods and goddesses, the war to regain Helen of Troy was blown up to greater proportions. It became a personal war for these gods and goddesses, especially when they chose to take sides between the Trojans and the Greeks. The gods and goddesses who took the side of the Greeks include Hera, Athena, Poseidon, and Hermes (4. 37-49). On the other hand, the gods who took the side of the Trojans include Aphrodite, Apollo, Artemis, and Leto (1. 10-15). They backed up the soldiers whenever they fight and are usually the ones who decide on how the fight would end. Only Zeus remained in the middle, wherein he forbade the intervention of these gods in the war. Homer was able to depict a war which is similar to our modern day warfare. His depiction of gods was like the political leaders of various nations who would encourage their people to engage in wars against other nations. These are the leaders who are not physically in battle, but are the ones who actually dictate how the wars would go. Also, the wars that they often start would usually mean great losses for both warring sides. The reasons for these wars were very much the same like that of Homer’s â€Å"the Iliad. † These are usually small things which could be solved by negotiations, but the pride of the leaders is usually the ones that fuel the war. Leaders like Menelaus and Agamemnon are the same as the political leaders that we have today, who prefers violent negotiations rather than peaceful means to solve conflicts. This usually leaves the country with great problems, like loses of lives and property and a bad economy. Works Cited: Homer. The Iliad. 2006. Spark Notes. October 15 2007. http://pd. sparknotes. com/lit/iliad/section2. html. Sienkewicz, Tom. The Gods in the Iliad. 2002. October 15 2007. http://department. monm. edu/classics/Courses/CLAS210/CourseDocuments/Epic/gods_in_the_iliad. htm.

Friday, November 15, 2019

Perceptions of Anomalous Cognition :: Biology Essays Research Papers

Why Psi: Perceptions of Anomalous Cognition Why would I risk the ridicule of my peers to explore a topic as controversial and inflammatory as that which is known as "psi" phenomenon? And more importantly how and why is it relevant to the study of neurobiology? Given the nature of the topic, it may not always be easy to discuss such scientifically or diplomatically. It is my contention; however, that serious review of the scientific evidence, legitimate scientific discourse and funding for research has been seriously impeded because of its controversial nature. And, furthermore, that it is as relevant a topic for investigation as are other methods by which information is perceived by humans. There are some valid reasons for the prejudice that surrounds this topic. Often when one thinks of psi phenomenon some strange themes come to mind such as UFO's and Alien Abductions, ESP, crop circles, Astrology, Ghosts, Mediums, Channeling and Angles. Most of these come under the heading of "paranormal" and are decidedly difficult to examine scientifically. The plethora of information on such subjects that floods the internet is more likely to reference mysticism, faith and spiritually than offer scientific theory or experimental outcomes and I will leave such to those realms. I, therefore, in this paper will not be referring to alien astrologers channeling their horoscopes through mediums who have been abducted. Only the concepts that comprise that which is known as "anomalous cognition will be discussed." Its components are telepathy, clairvoyance, and precognition (1). My first exposure to the term "anomalous cognition" came as a result of my research for this paper. I just had always called it "knowing." Ever since I was a little girl, however, I have been repeatedly told that my experiences were "all in my head." That had been exactly my position also. But what my critics, who included my family members, friends and my husband, really meant was that my experiences existed only in my imagination. They argued, as is commonly believed and sometimes verified, that experiences like mine could be caused by selective or faulty memory, wishful thinking or subliminal clues (2). And for many years, I tried to believe that one of those explanations applied to me. My husband the scientist, engineer and amateur magician has been telling me for years what he believed to be the prevailing opinion about psi within much of the scientific community. The picture was not very flattering.

Tuesday, November 12, 2019

Arguments Against Slavery in the British Caribbean Essay

As a newspaper reporter in 1825, write an article presenting arguments AGAINST slavery in the British Caribbean under the following headings: i) Economic ii) Religiousiii) Humanitarian On every street corner, in every household, on every tongue and on every wall, contradictory views on the system of slavery are being disputed. The public is being bombarded by the economic, religious and humanitarian views of slavery. The pressing issue that will be highlighted in today’s article is the arguments against slavery. The economic arguments against slavery concentrate on the economic losses experienced by planters and their interests (like the West India Interest etc) from having a system of forced labour as opposed to free paid labour. It is argued that slavery is uneconomic as provisions have to be made to the control of slaves. These provisions are more expensive than the employment of free labour.Slavery is expensive when you add up the costs of buying and keeping the slaves and paying towards the forces needed to prevent revolts. The economist, Adam Smith, in his book â€Å"The Wealth of the Nation† wrote that ‘the work of free men comes cheaper in the end than performed by slaves.’ Slavery makes the slaves a reluctant labour force and so the slaves fell that their labour is useless as all the profits go to the master as the slaves are not allowed to own anything, not even themselves.The investments in slaves are now being wasted as they are dying in large numbers from measles, yaws, dysentery and other diseases. Also slavery is allowing the countries in the British Caribbean, example Jamaica, to become monocultural which is dangerous to our economy; as most of the income comes from there. It can be said that the most important point that can be argued is that British industrial development would be stimulated by free trade as the merchants would be able to buy cheaper goods elsewhere as there would no longer be mercantilism. Adam Smith also said in his book that ‘the laws which stood in the way of free trade were bad for the prosperity of a country as a whole.’ In addition, the religious arguments that were presented by the humanitarians were few; they were used against the enslavement of people. These arguments were from the Christian people in England. They are stressing that slavery is contrary to the will of God. Also, it is said in the bible to â€Å"love thy neighbor as thyself†; however the system of slavery engendered hate rather than role. All men are equal in the sight of God but slaves were subjugated to the will of their master. They believe it is morally wrong to be involved in slavery. The system of slavery violates the notion of justice as it is based on the exploitation of the slaves’ labor with almost total disregard for their rights. The humanitarian arguments are presented as justification for the abolition of slavery. Supporters of slavery argue that slavery is inhumane, unjust cruel, unjust and that punishment meted out to slaves is harsh and brutal. It is also argued that the system of slavery dehumanizes and humiliates slaves as it regards them as part of stock, not as human beings. It is believed that slave owners are not concerned with the wellbeing of their slaves, as food, clothing, housing and medical care are often inadequate. This is also believed to be the reason the slaves often fall prey to a number of diseases. It is also argued that slaves were not protected by the law. The colonial laws for the control of slaves are seen as repressive and do not provide security for them. The judicial system is believed to be titled against the slaves. This person appears so as some judges and magistrates are themselves slave owners, and they did not allow slaves to give evidence against a white person. Slaves also posses no legal right to own any property; they don’t have any right to their families, identify or even their names. The fact that slavery is already existent in Africa is an argument referred to many times in support of slavery, but it is often argued that the conditions of slavery in the Caribbean are far worst than the conditions of the domestic slavery practiced in Africa. Speaking of Africa, it is also believed that slavery has caused a lot of civil war within the continent. The slave trade, it is believed, had led to inter-tribal warfare in Africa, and destroyed family and political structures in its time, leaving the continent in complete devastation.

Sunday, November 10, 2019

Production & Operations Management

Vidhya Shikshak Seva Mandal [pic] Government Registered INDIAN INSTITUTE OF MANAGEMENT RESEARCH AND TECHNOLOGY Government Recognized An ISO 9001: 2008 International B-School SUB: PRODUCTION & OPERATIONS MANAGEMENT Section –A Fill in the blanks 1. Production planning functions can be broadly identified as ______, _______ and _______. a) Estimating , routing , distribution b) Estimating, routing, scheduling c) Estimating, distribution, collection d) Distribution, collection, scheduling 2.For efficient process of order picking by personnel, communication plays a vital role in any Organization and the directives they need to have are ____, _____ and _______. a) Simple, clear and straight b) Straight, clear and easy c) Precise, timely and appropriate d) Accurate, timely and sufficient 3. The three major functions of any business organization are _______, _______ and ______. a) Coordinating, organizing, delegating b) Organizing, supervising, executing c) Controlling, manning, procur ing d) Operations, marketing, finance 4. Formulation of the strategy depends on the _________. ) Assessments of strengths, understanding of the weaknesses, the nature of external environment and the resilience of the internal environment. b) Understanding strategies, formulation of plans, utilization of resources, enabling opportunities c) Resilience of internal environment, resilience of external environment, understanding strategies, enabling opportunities d) Decision making abilities, strategizing the actions, preparation of master plan, resource planning 5. Match the following: P) Market analysis x) needs assessment Q) Competitive priorities y) design analysisR) Product design z) cost quality Which of the following is correct? a) P-X, Q-Y, R-Z b) P-X, Q-Z, R-Y c) P-Y, Q-Z, R-X d) P-Z, Q-Y, R-X 6. All operation systems are based on criteria of _____, ______ and _____. a) Output of product, specification of product and flow pattern b) Input of product, characteristics of product a nd prices c) Quality of services, operations and input of product d) decision making ability, input of product and output of product 7. Consider the following statements: P) Evaluation is done for the processes and quality assurance measures.Q) Sometimes suppliers are given total responsibility for design, procurement of materials, processing, Quality and deliveries as per schedules. Which of the following is correct? a) Both are true b) Both are false c) True and false respectively d) False and true respectively. 8. The method used mainly where transportation costs either for distribution of products or collection Of materials from different suppliers is the main criterion. a) Centre of gravity method b) Break even analysis c) Point rating method d) Factor rating method 9. PDCA stands for ________. a) Prepare, Develop, Control, Act ) Plan, Develop, Coordinate, Analyze c) Product, Development, Cost, Analyze d) Plan, Do, Check, Ac 10. Success of JIT depends upon a lot of ________ and _______. a) Preparation and committed implementation b) Teamwork and technology c) Cooperation and effort d) Information technology and planning 11. Write short notes on the following : (I) CPM Vs. pert technique (II) Total slack (III) Advantages of matrix organization (IV) Commission of projects 12. a. How would operations strategy for a service industry be different if any from that for a manufacturing industry? (It’s an example & explains) . What are the levels of aggregation in forecasting for a manufacturing organization? How should this hierarchy of forecasts be linked and used? 13. How would forecasting be useful for operations in a BPO (Business processes outsourcing) unit? What factors may be important for this industry? Discuss. 14. A good work study should be followed by good supervision for getting good results. Explain with an example. 15. What is job evaluation? Can it be alternatively used as job ranking? How does one ensure that job evaluation evaluates the j ob and not the man? Explain with examples? 6. What is the impact of technology on jobs? What are the similarities between job enlargement & job rotation? Discuss the importance of training in the content of job redesign? Explain with examples? 17. What is internet connectivity? How is it important in to days business would with respect to materials requirement planning & purchasing? Explain with examples? 18. Would a project management organization be different from an organization for regular manufacturing in what ways? Examples. 19. How project evaluation different from project appraisal? Explain with examples.

Friday, November 8, 2019

buy custom Women in America and Britain Post World War II essay

buy custom Women in America and Britain Post World War II essay The Second World War occurred between the years 1939 and 1945. It is often referred to as the total world war since it pitted the whole worlds against each other. Britain and her allies formed the allied forces while Germany and her allies formed the axis forces. It is the roles that women played in this war that later helped to shape their roles in the society, post the war. Their role in the war largely stemmed from their voluntary work during the First World War. During the First World War, women in Britain and the U.S. volunteered to perform essential duties so that they could release their men to go to war (Barrow, 2010). This seemed to work since it helped the mobilization of army/solders to fight in the war. Therefore, when the Second World War was on the verge in 1939, it was largely publicized that woman should volunteer in the same manner that they did 25 years earlier (Barrow, 2010). However, the demands of war were overwhelming this time. A secret report released by Sir William Beveridge in 1940 seemed to recognize this fact. It consequently advised that there was need to recruit both men and women to be actively involved in the war itself (Barrow, 2010). Sir Williams report subsequently led to a mass registration and recruitment of British women aged between 18 and 60 year in the spring of 1941. They were required to choose the type of job they could perform at the battle ground. These saw the women working in the battle fronts and even in enemy lines to facilitate easier fighting conditions for their male counterparts (Brayley Ingram, 1995).Although it was categorically stated that women would not work with arms, most of them were later to work and die under heavy fire. In Britain, the recruitment of women into the army was made legal in December of 1941 under the National Service Act (II) (Barrow, 2010). It initially targeted single women aged 20-30 but later involved all single women and some married women. Soon, women were working as radio controller, air raid wardens, and rescue. Meanwhile, back at home, more women were recruited to work in the factories to cover up fir the limited labour force caused by the mens participation in the war. They went on to cement their places in the workplace and men had a hard time displacing them after the war (Brayley Ingram, 1995).However, it was the events during the World War II that later shaped the roles of women in the allied nations after the war (Kannan, 2010). Thesis Statement Never before had women been so involved in a war all over the world. In deed, when this war came to an end, the women of America and Britain were not the same again. They had stepped out of their dockets of work and were now doing what traditionally used to be done by the men. It is, therefore, safe to state that the Second World War altered the role of women in the society, bringing into being the rise of feminism gender equality movements of the 1950s (Kannan, 2010). How the Roles Changed Before the beginning of the war, most women in the US and Britain were expected to be, and were in deed housewives. Women had been only allowed to work outside their homes if they had no family but even then were paid smaller wages as compared to their male counterparts, even if doing the same kind of job (Brayley Ingram, 1995).The number of women working out in the factories had been however considerably low. These women had little involvement in the matters of national governance as they were not even allowed to vote. Vying for public positions for women was almost unthought-of. There had been no women in the military before the war neither had there been any woman offering supportive services to the military (Barrow, 2010). However, after the Second World War, the role of women far much fell into place with their participation in the war. Women who had volunteered in the war became members of the Womens Lands Army (WLA) and the Womens Army Corp (WAC) (Theodore, 2008),that trained women on activities that pertained to agriculture, heavy metal industries, chemical industries, ship and plane building, and even bus building. In deed, sooner than later, these industries had over thirty percent of their employees being women. This group of women even worked in the building of Railways and canals. Perhaps the most notable of their work is the building of the waterloo bridge in London (Theodore, 2008). After the Second World War had been won, it was apparent hat women had played an important role in the victory and for that reason, their role in the society was about to take a new turn. They were accorded the right to vote so as to have equal chances/opportunity to choose who they felt would lead the nations appropriately (Lewis, 2011). Their power as a voting bloke soon became apparent when, after not so long, they started electing women to the parliament. On the domestic from, the existing governments made the laws of divorce more lenient on the women and even advocated for their compensation, with substantial benefits, in case of such eventualities. At the work place, competition was stiff between the women employees who had established themselves with the mens absence, and the men for all kinds of job. Among the women that evolved politically and became landmark names in the U.S. and Britain playing key roles in leadership and governance were: Queen Elizabeth and her daughters; Princesses Elizabeth and Margaret, the then US first lady Eleanor Roosevelt, and an American-born Feminist turned Member of Parliament Nancy Astor (Barrow, 2010). These women had been active during the war acting as morale boosters and mobilizers. Queen Elizabeth had continued to stay with her daughters at the Buckingham palace even though the Germans were heavily bombing the city of London, and providing the city residents with aid after the bombings (Harris, 2011). This provided a morale booster to the British and her fellow allied troops to soldier on and repel the attacks. Princess Elizabeth later became the new Queen (Queen Elizabeth II). The then first lady of the United States of America Eleanor Roosevelt was an active participant in the public affaires. Her husband, President Theodore Roosevelt, was on a wheel chair and did not want to appear in public as disable. The first lady therefore travelled a lot to offer moral support to the troops and the people of the US. This she also did through a newspaper column she continued to write even at in the middle of war. The first lady also advocated for the inclusion of women and minority groups in the responsibility of winning this war. American-born Nancy Astor was a member of parliament in Britain and a Feminist campaigner. She hosted the US troops in England unofficially, and also played a morale boosting role in her constituency. She was seen as a symbol of hope by her constituents and inspired a lot of young women in England and the US to join the feminist movement (Harris, 2011). Other women who became actively involved in decision making in governance included: Frances Perkins, Oveta Culp Hobby, Mary McLeod Bethune, and Alice Paul. Oveta was the US secretary of labour between the years 1933 and 1945 and, during the Second World War, headed the War Departments Womens Interest Section and later became the director of Womens Army Corp (WAC). Bethune was the director of the Negro Affairs Division in WAC and tirelessly advocated for the incorporation of black women into the WAC (Harris, 2011). Perhaps the boldest of them was Alice Paul. She dared to reintroduce the Equal Rights Amendment into congress session after the war was over (Lewis, 2011). This amendment had been introduced and rejected by every session of congress since the attainment of vote rights by women in 1920. Inevitably, the height of womens involvement in the just concluded war had convinced her that congress would be more willing to pass the amendment. However, this amendment failed to pass cong ress until the 70s, and even then it failed to pass in the mandatory number of states. Womens involvement in the Second World War also brought a lot of change to the fashion world. Women involved in military lines often wore trousers or the so-called one piece siren suits. Headgears and large handbags also became the obsession of many (Lewis, 2011). These were borne out of the necessity to tack hair away and need to carry all ration books of a family respectively (Lewis, 2011). They however went on to become fashion statements all over the two nations. The need to survive at the battle ground led many female soldiers and service providers to learn how to knit their cloths. Knitted clothes were believed to be more durable. This art of knitting, however, soon after war became the obsession of many females throughout the two nations. Indeed, fashion designers inevitably took advantage of this culture to make knitted cloths and scramble for the large market. The victory roll of hair was also widely adopted post the war. This style had been quite frequently used during the war and was argued to add considerably to a womans glamour. It was thought that such kind of feminine glamour caused them ad the men around them to be with a lot of morale. Worth noting however is the great sense of social freedom that women acquired during and after the war. There was a general sense that the governments ware more preoccupied with the war rather than monitoring the citizens for misdemeanour. This provided greater opportunity for the women to encounters members of the opposite sex. The results however were devastating- there was a sudden increase in the number of people with venereal diseases and illegitimate children (Harris, 2011). The gain however was the increasingly explicit sex education that left most people better informed about their sex lives than before the war. Women discovered Birth control methods and used them to control their futures, making them able to pursue their goals in life without the hindrances of getting a baby. This has increasingly enabled women to effectively compete with men in jobs and sectors formerly reserved only for the latter. However, critics of this topic of the World War II and the change of the role of women argue that it did not at all change the role of women. They argue that women had been trained to perform industrial and agricultural duties merely to allow men to participate in the war. The result of the end of the war, they argue, was the return to the status quo, with women going back to being housewives and the men resuming their industrial and agricultural duties. What actually caused the change in the roles of women in the society in the US and the UK, among other nations, was the Feminism Movement. The Feminism Movement This was a movement by women in 1950s and 60s advocating for equal opportunities at the workplace, including payment, with the male counterparts. This movement swept across the continents of Europe and America faster than was widely expected by the political elites. There is a general agreement that though the women leading these movements were of a younger generation, the fuel that fuelled that spread was those women that had done the mens job at the Second World War. This augmented by the emergence of such works as The Feminine Mystique by Betty Friedan, and the development of birth control pills, allowed women to alter their social roles in the society. This allowed women more authority and autonomy and helped them to enhance their self-esteem. This farther caused them to focus more on being in control of their lives and their capacities. The movements therefore inevitably evolved from their social settings as was the case in the 60s to target economic changes looking at the situations of women at the workplace. These alterations ensured that women were no longer content with sitting at home all day cooking or cleaning, and caring for the children-they wanted to get out and work. Conclusion Traditionally, women had been confined to the roles of housewives and taking care of crops at home gardens. If there ever was a situation they got entirely involved, it must be in the Second World War. It is worth noting however that despite their immense participation and contribution, they wee still not considered as equal participants. This is evident by the denial by their male counterparts for the females to use arms even in situations where they were working with the arms (like the anti-aircraft crew) (Lewis, 2011). Later, after the war is over, the unionised organisations at the workplaces advocates for the men to reclaim their previous occupations, subsequently displacing a huge number of women who had been employed to cover the vacant positions. This goes along way to show that despite their massive contribution at the war, peoples perception about women have not changed much. The women are therefore forced to go back to their traditional chores and stay low. Such was the case until the launch of the Women Movements (Commonly referred to as the Feminine Movements). With the launch of these movements, women who had vehemently participated in the Second World War found a platform to voice their sentiments. These strong sentiments were coupled with the zeal of women of younger generation, making the movements unstoppable fires. It was indeed these feminine movements, influenced by the experiences of the World War II that caused major alterations in the socio-economic status of women in America and Britain. Buy custom Women in America and Britain Post World War II essay

Tuesday, November 5, 2019

Biography of John Garang de Mabior, Sudanese Rebel

Biography of John Garang de Mabior, Sudanese Rebel Colonel John Garang de Mabior was a Sudanese rebel leader, founder of the Sudan Peoples Liberation Army (SPLA) which fought a 22-year civil war against the northern-dominated, Islamist Sudanese Government. He was made vice president of Sudan on the signing of the Comprehensive Peace Agreement in 2005, shortly before his death. Date of Birth:  June 23, 1945, Wangkulei, Anglo-Egyptian SudanDate ofDeath:  July 30, 2005, Southern Sudan Early Life John Garang was born into the Dinka ethnic group, educated in Tanzania and graduated from Grinnell College in Iowa in 1969. He returned to The Sudan and joined the Sudanese army, but left the following year for the south and joined the Anya Nya, a rebel group fighting for the rights of the Christian and animist south, in a country which was dominated by the Islamist north. The rebellion, which was sparked by the decision made by the colonial British to join the two parts of Sudan when independence was granted in 1956, became a full-blown civil war in the early 1960s. 1972 Addis Ababa Agreement In 1972 the Sudanese president, Jaafar Muhammad an-Numeiry, and Joseph Lagu, leader of the Anya Nya, signed the Addis Ababa Agreement which gave autonomy to the south. Rebel fighters, including John Garang, were absorbed into the Sudanese army. Garang was promoted to Colonel and sent to Fort Benning, Georgia, USA, for training. He also received a doctorate in agricultural economics from Iowa State University in 1981. On his return to the Sudan, he was made deputy director of military research and an infantry battalion commander. Second Sudanese Civil War By the early 1980s, the Sudanese government was becoming increasingly Islamist. These measures included the introduction of  Sharia law throughout Sudan, an imposition of black slavery by northern Arabs, and Arabic being made the official language of instruction. When Garang was sent south to quell a new uprising by the Anya Nya, he instead swapped sides and formed the Sudan Peoples Liberation Movement (SPLM) and their military wing the SPLA. 2005 Comprehensive Peace Agreement In 2002 Garang began peace talks with Sudanese president Omar al-Hasan Ahmad al-Bashir, which culminated in the signing of the  Comprehensive Peace Agreement on January 9, 2005. As part of the agreement, Garang was made vice president of Sudan. The peace agreement was supported by establishing a United Nations Mission in Sudan. U.S. President George W. Bush expressed hope that Garang would be a promising leader as the U.S. supported South Sudanese independence. While Garang often expressed Marxist principles, he was also a Christian. Death Only a few months after the peace agreement, on July 30, 2005, a helicopter carrying Garang back from talks with the president of Uganda crashed in the mountains near the border. Although both Al-Bashirs government and Salva Kiir Mayardit, the new leader of the SPLM, blamed the crash on poor visibility, doubts remain about the crash. His legacy is that he is considered to be a very influential figure in the history of South Sudan.

Sunday, November 3, 2019

Database management systems Research Paper Example | Topics and Well Written Essays - 2500 words

Database management systems - Research Paper Example Organizing and maintaining such enormous amount of data in only papers is almost impossible. If back up is not maintained properly, the business might lose critical information which could lead to losses. Thus, the migration of existing and current data to cloud based platform will require well defined architecture as well as strategies. The cloud database model should have specific objectives in line with policies of the organization. The model should also include sufficient security, encryption, and control over information which will be transferred. The biggest challenge lies in maintaining the balance between speed of data transfer, cost of data transfer, data accuracy and consistency. If all these aspects of cloud database management are not ensured then the consequences could be data loss, wrong location data placement or data alteration during transfer process. Even though cloud based computing platforms are becoming popular, especially for e-business and MNCs, due to cost eff iciency, there are issues related to data safety, speed and security. The objective of this paper is to critically analyze the cloud database by pointing out disadvantages of cloud data. Introduction and Background of the Research The cloud computing technology has been receiving significant attention in the market lately. For many sectors and companies in various industries, cloud is not just an umbrella for marketing but a consolidated technology that offers grid computing, SAAS (software as a service), distributed computing, and so on. There are many companies that offer cloud services including Amazon RDS and Microsoft SQL Azure. A cloud database is basically a database management system that runs on cloud computing platform (Curino, pp.1-2). Some of the cloud computing platforms are Go Grid, Amazon EC2, and Rack space. (Source: Curino and et.al, n.d, p.2) The main vision on the basis of which cloud computing was developed is based on certain key features that cloud database is expected to perform. Some of the important features that was kept in mind while creating cloud data platform were data storage, processing, software installation, software delivery from local servers and desktops across various networks. The key concept was that the target users must get access to remote data from anywhere at any time without requiring to carry a hard drive or other storage device. The concept was created to free big corporations from generating own power and capital investment. Thus, the most important candidate of cloud computing is the database management applications. The main reason behind this is that large corporations spend huge sum of money to safely manage enterprise data which involves upfront investment in both hardware and patented software services. The advantage that the different enterprises would get from cloud computing is that they could reduce their annual data management cost significant with the help cloud database. By using cloud data the comp anies will not have to install, own and maintain dedicated expensive software packages. The reason is that cloud computing service providers or vendors provide their customers with virtual machines or platforms from where the customer will be able to install and manage software services without having to own and store a version in their

Friday, November 1, 2019

Journal Article Critique Essay Example | Topics and Well Written Essays - 500 words - 1

Journal Article Critique - Essay Example The test materials comprised of dried meat soluble product (DMS) and yeast fermentation product (YFP). In all the three experiments, soybean meal (SBM) of 48% CP content served as the control ingredient. Various batches of every by-product were investigated in all the three tests making use of an apparent ME assay for poultry and digestibility assay for the barrows. In experiment 1, the nitrogen-corrected AME (AMEn) for YFP, DMS, and SBM were 3.292, 2.801, and 2.909 kcal, correspondingly. In experiment 2, the AMEn was 3.565, 3.207, and 2.809 kcal, in that order. In experiment 3, the AMEn was 3.552, 2.208, and 3.844 kcal, for SBM, DMS, and YFP, respectively. However, in this third test the diets were formulated such that the test ingredients gave the only source of amino acids in every experimental diet. According to the experimental results, for the ME assay for poultry, the DMS product is comparable to the SBM and appears fit for consumption by non-ruminant species according to thei r poor ability to support nitrogen retention in both species. The article flows logically and succinctly explaining its major talking points. The authors clearly state an explicit thesis and have a specific point of view; to evaluate the nutritional value of two non-traditional by-products for ducks and pigs. The article analyzed the DMS by-product and found out that it was associated with high crude protein as well as gross energy contents. In the same way, the SBM was clearly superior to the DMS. This was evidenced by marked differences in retained energy, digestible and apparent ME, nitrogen retention, biological value, and net protein utilization (Ragland, et al., 1998). The researchers cited the work of Lyons and Vandepopuliere that found the potential use of DMS for animal feeding because they used a similar by product to DMS. This makes the argument compelling

Wednesday, October 30, 2019

Masculinity and Violence in Fight Club and Drowning Tucson Essay

Masculinity and Violence in Fight Club and Drowning Tucson - Essay Example However, when â€Å"a generation of men† is raised by women, there is no â€Å"male example† (Palahniuk 50) to follow and males only have that urge for liberalization and the need to ascertain their masculinity. One can see that the Tyler in Fight Club is the real macho man who tries to struggle away from the feminized Narrator, or, in other words, Tyler is the real male self of the Narrator. In fact, what Palahniuk points out and what the reader feels is that real masculinity involves surplus aggressiveness and sexual and emotional desires. In the real society, most males are forced to employ surplus repression to look civilized. Thus, there are institutions of male bonding which offer them a way to unleash this hidden aggression in the safest possible way. They engage in fist fight in such institutions and enjoy a sense of power. In the novel, the Narrator is a person who has lost his sense of manhood. He does not have a name, lives alone, and is unable to make health y relations with others. This extreme pain and alienation makes the real man in him struggle away and become Tyler who wants to become the leader of the â€Å"space monkeys† (Palahniuk 132).... The more comfortable the Narrator becomes with Marla, the more detached he gets with the destructive plans made by Tyler. Finally, by the time he admits he likes her, the Narrator is in total contradiction with Tyler, and eliminates him (Palahniuk 15). However, the men who are still isolated continue demanding the return of the anarchic Tyler. At least the Narrator realizes Marla is not the reason behind anarchy. Thus, one can see that there are various factors Palahniuk tries to point out as the reasons behind violence. The first one is the lack of role models of maleness for the new generation which is often brought up in a feminized society. The feminist era took away everything that is good as the virtues of femaleness and men of the post-feminist period were left with nothing more than mere ambiguity regarding masculinity and parenting (Palahniuk 141). The second important factor is the ‘homophobia’ developed by men in a patriarchal society. It is admitted facts tha t many hate crimes occur as a result of doubts over sexual orientation. In Fight Club, the Narrator gives Angel Face a severe beating to see that his beauty is reduced because the Narrator hates the favoritism Tayler shows towards him. (Palahniuk 96) Evidently, males have their own ways of measuring masculinity. To illustrate, in Fight Club, it is seen that the ability to conquer a woman is an important aspect of deciding ones maleness. As a result, there is a kind of rift between males that arises out of this competition to win women, and in the novel, there is a great degree of tension between Tayler and the Narrator in this regard. (Palahniuk 113) Thus, it becomes evident that men’s lives are structured around aggressiveness and power relations. The highly phallic notion of masculinity

Monday, October 28, 2019

Understanding The Concept Of Gender Mainstreaming Sociology Essay

Understanding The Concept Of Gender Mainstreaming Sociology Essay This report is about gender mainstreaming which entered the mainstream of international public policy in September 1995, when it featured in the platform for Action of the Fourth World Conference on Women in Beijing where most nations have signed the Platform. The report present the background and the foundation of gender mainstreaming and discusses why, how and outcome of gender mainstreaming application in the institution and some problems and restrictions will be presented which may hinder the process of mainstreaming. 2.0 Background The road to guaranteeing equality between men and women began some decades back, and progress was made in certain sectors of society but we still a long way far from being to announce and state that equality exists in terms of womens access too all of society sphere. Access has been restricted in areas of power or those requiring further education which has lead to the glass ceiling phenomena which still exist up to now in most organizations and institutions. There has been always efforts and progressive approaches to achieve equality for women in the society and the main concern was over womens issues and womens access and opportunity to the different positions in the society. In the 1970s, which this period called the period of individual rights women in development (WID) main focus was on how women could better be integrated into existing development initiatives and was regarded as beneficiaries rather than full member of development. This approach has relevance to women only which had the effect of isolation and marginalizing of women n the decision making. In the 1980s, which this period called the period of specific action due to the ineffectiveness and limited approach of the (WID), it became an evident that a new paradigm was needed to explain the relationship between women and men, Gender and Development GAD approach was different from WID and is it approach was: The gender is not a women issue but both men and women Both men and women have different and special needs. Women can not be treated as homogenous group. Women are disadvantaged to men The inequality between men and women is systemic and structural. Gender equality and equity in institutions and organization must be looked at with the understanding the complex lives of people and in order to have an effective gender analysis, must make a practical explaining the differences n mens and womens lives and helping to produce policies and programs that reduce inequalities. The concept of gender mainstreaming was first proposed at the 1985 Third world Conference on Women in Nirobi and was developed further by the United Nation development community and is recognized as a global strategy for the promotion of gender equality. The idea of gender mainstreaming was formally featured in 1995 at the Fourth Conference on women which was held in Beijing. The UN Economic and Social Council defined the concept of gender mainstreaming as: Mainstreaming a gender perspective is the process of assessing the implications for women and men of any planned action, including legislation, policies or programs, in all areas and at all levels. It is a strategy for making womens as well as ens concerns and experiences an integral dimension of the design, implementation, monitoring and evaluation of policies and programs in all political, economic and societal spheres so that women and men can benefit equally and inequality is not perpetuated. The ultimate goal is to achieve gender equality. The importance of gender mainstreaming has been widely discussed since governments committed to the concept in Beijing Platform for Action in1995. It has become a generally accepted procedure that gender equality is a prerequisite for a sustainable human development. Gender mainstreaming is an essential strategy not only for attaining gender equality, but also for the sustainable development of societies as whole. National womens machineries (NWM) around the globe have been grappling with the complex task of turning concepts into reality to implement gender mainstreaming strategies. Gender mainstreaming incorporates the GAD perspective and aims to look the relationships between men and women in their access to and control over resources, decision making and benefits and rewards within a particular system. The system could be an institution, organization, a government or a department society. The mainstream refer to an inter-related set of dominant ideas, values, practices, institutions and organizations that determine who gets what within a society. The ideas and practices within the mainstream tend to reflect an reinforce each other and thus provide a rationale for any given allocation of societal resources and opportunities. Being part of the mainstream means that women and men have equitable access to resources, including opportunities and rewards. It implies equal participation influencing what is valued in shaping options within society. Becoming part of the mainstream means sharing equitable in the benefits of development. Becoming part of the mainstream offers the opportunity to influence who does what in a society, who won what, who has access to jobs and income, who controls the societys resources and institutions, who makes decisions and who sets priorities. Gender mainstreaming is a long term, complex and multi dimensional process that focuses on the needs of both men and women in order to achieve the optimal development and equality in the organization, gender streaming can defined as follows: Is a process or a strategy to work toward the goal of gender equality and it is not and end in itself. It is an approach to governance that makes mens and womens concerns and experience and integral part of the design, implementation, monitoring and evaluation of policies and programs in all sectors of society. It involves changing policies and institutions so that they actively promote gender equality. It is a long term, transformative process that involves rethinking socio-cultural values and development goals. The gender mainstreaming involve not restricting efforts to promote equality to the implementation of specific measures to help women, but mobilizing all general policies and measure specifically for the purpose of achieving equality by actively and openly taking the account at the planning stage their possible effects on the perspective situation of men and women. An effective gender mainstreaming policy consists of four steps: Getting organized is on implementation and organization, and building awareness and ownership. Implementation and organization of gender mainstreaming refers to the process of providing a structural and cultural basis of equal opportunity. This includes formulation of objectives and targets, making a plan and drawing a budget and defining responsibilities and accountability of the different actors involved. All stakeholders involved in the policy should take equal opportunities of men and women in account. Training is essential in order to create a certain degree of gender awareness and expertise. Learning about gender differences, a description of the actual situation is essential in order to access actual gender inequality. In addition, monitoring the situation over time and making an assessment such as participation (group/population) such as the share of men and women in unemployment, among the disabled or among those with flexible contracts. Resources such as access or distribution of time, money, space, information, political and economic power. Norms and values such as influence gender roles, gender division of labor, the altitude of men and women. Values attached to men and women. It is essential to identify the role of policy measures in reinforcing social norms and values that maintain gender inequality. Rights pertain to direct or indirect sex discrimination, human rights, and access to justice in the legal, political or socio-economic environment. Assessing the policy impact is to analyze the potential gender impact of the policy with reference to participation, resources, norms and values and rights. Both quantitative and qualitative aspects should be taken account of participant. Its important to differentiate between particular groups of men and women such as ethnic minority groups, age groups, and regional groups. Its the changing policies and institutions so that they actively promote gender equality. It is a long term transformative process that involves rethinking socio-cultural values, development goals and redesigning policies to identify ways in which the policy could be redesigned to promote gender equality in the even of having negative impact on gender equality or to be broadly gender neutral. An effective gender mainstreaming policy diagram 3.0 Gender Streaming why, how and outcome: 3.1 Why Gender Streaming Gender mainstreaming is an important aspect of good governance. It seeks to ensure that institutions, organizations, policies and programs respond to the needs and interests of women as well as men and distribute benefits equally and justice for women and men. Thus enhancing the accountability of organizations / governments to achieve results for all citizens. The gender mainstreaming process does not mean a move away from specific women programs, special measures or women specific activities may still be required to address inequalities. Reducing poverty, boosting economic growth and strengthening citizenship is a proactive process designed to tackle inequalities which can discriminate against either sex. Gender mainstreaming is not only about women but it is also about men and society in general. It is also important for both men and women to feel comfortable as pat of the gender mainstreaming process and must play an active role in ensuring gender equality. It will benefit the organization directly in terms of improving its image, credibility ad enhancing their political capital. Mainstreaming can play an important role in eliminating sexual harassment and unprofessional attitudes towards people involved in gender work are series barriers that may not be easily surmountable through good augmentation strategies. Gender sensitivity and efforts to change attitudes within organization structure are vital elements in the gender mainstreaming process. Gender mainstreaming may load to changes which give women and men equal access to the operation, power and resources. In addition the mainstreaming will have a direct effect on the effective service of the organization and better distribution of resources for both men and women. It will lead also to more legal security, better democracy in that women and men are treated equally and a better grasp of gender equality policy and of the needs of those who use the organizations services. Why gender mainstreaming can be summarized as follows: Target major economic and social policies that deliver resources Make good economic sense ensuring that women as well as men are active, using full of the productive labor force. Represent a further step in the search for equality. Gender is the one of the most fundamental organizing features in society and affects our lives from the moment we are born. Recognition of male and female identities and recognizes that differences exist in mens and womens lives and therefore our needs, experience and priorities are different. Willingness to establish a balanced distribution of responsibilities between women and men. Needs determined political action and support with clear indicators and targets. Will not happen overnight, it is a continuous process. Equal division of power and influence between women and men. Women and men shall have the same rights and opportunities to be active citizens and to shape the conditions for decision making. Economic equality between women and men. Women and men shall have the same opportunities and conditions with regard to education and paid work that provide lifelong economic independence. Men violence against women must stop. Women and men shall have equal rights and opportunities in terms of physical integrity. 3.2 How, Gender Mainstreaming Gender mainstreaming in any organizations policy must first take stock to determine where equality needs to be established. We need a clear idea of the political measure for change. Previously such measures were usually understood to the promotion of women, thus the new strategy is called the gender mainstreaming which combined political perspective should then provide and idea of what must be changed, how, and with what means. All measures must first be checked for their political effects for both sexes and implemented only of they contribute to gender equality. Many measures must still contribute essentially to the promotion of women, that is, the dismantling of structural disadvantages for women, and to active gender equality. Gender mainstreaming resides in gender controlling, that is, in the analysis of each and every political activity from the perspective of its contribution to the establishment of equal opportunity. For such an analysis to be successful, expert knowledge, gender competence, and power must come together. Expert knowledge refers to knowledge of processes, that is, one must have a through knowledge of the legal, political, and bureaucratic conditions of the given field of action. Gender competence signifies the development of critical view of gender that will help to recognize gender hierarchies. Pointing out general patriarchal structures is no longer enough; rather, subtle processes of constrictions on men as well as women must be recognized. Power also means the power to define problems in any given situation by pointing and filtering out issues that needs and require action in order modify its situation. The inequalities exist in the organization is part of the domain of knowledge that would have to be made broadly available and should not remain in the hands of only a few specialists and mainstreaming means introducing gender relations in all themes and the fields they cover. A key point of gender mainstreaming is the demand that gender questions be made an obligatory theme in all areas, and a special theme for only a few. Giving this approach a political and legal foundation that is, as a measure applied from above will certainly makes things easier for activities struggling for general equality from below. But how to approach the theme, where it belongs, and how it is to be pursued remain largely open and needs expert recommendations. The different pattern of participation of the sexes in the varies departments and levels of the institution must be achieved, this apply to all people within the institutions. We need acknowledgment that unequal distributions are a problem and obstacle in equality, such an acknowledgment is relevant in identifying and applying the particular policies to achieve equality. Gender mainstreaming involves varies actions to be determined in order to formulate a policy of gender integration to achieve the final outcome, these actions include: Carefully assessing the situation of women and men in the organizing and identifying the different vulnerable groups of women and men and thats include ethnic minorities, disabled in relation to the objectives we need to achieve in our work. Determining the steps needed to improve the gender equality within the organization in order to support this improvement. Tracking the progress of mainstreaming with indicators or other means of monitoring the gender equality related issues. Raising awareness about gender equality problems, obstacles and the importance of adopting a gender prospective. Building a capacity program among the organization and partners to adopt a gender sensitive approach. Ensuring visibility of the gender dimensions of the activities in the organization with proper documentation, reports, seminars and public information materials. Sex disaggregated data and statistics Skills and opportunities to carry out gender analysis. Effective monitoring and evaluation systems and tools. Effective communication, networks and linkages Skilled human resource base Civil society participation. 3.3 Outcome of Gender Mainstreaming Gender mainstreaming was established as a global strategy for achieving gender equality, and in turn for achieving sustainable economic development in the 1995 Beijing platform for action ratified by all United Nations member states. It is now incumbent upon nation-states and international organizations to carry out gender mainstreaming and as such, has achieved widespread endorsement by individuals governments, regional suptra state bodies such as the European Union, the Nordic Council of Ministries and the Organization of American States, the United nations and its varies agencies, the Organization foe Economic Cooperation and Development and the Council of Europe. Gender mainstreaming is a process rather than a goal, where efforts to integrate gender into existing institutions of the mainstream have little value for their own sake. Mainstream gender concerns to achieve gender equality and improve the relevance of development agendas. Such an approach shows that the cost of womens marginalization and gender inequality are born by all. Gender mainstreaming include attempts to establish a gender-equality perspective across all policy areas, even where the gender issues at stake may be not immediately apparent, and where the impact of mainstreaming policy on gender relations is often indirect. Gender mainstreaming is neither conceived of as an achievement in itself nor as a liberal policy to include women in decision making roles, rather it is conceived as a strategy to re-invent the process of policy design, implementation and evaluation by taking into account the gender specific and often diverse interests and values of differently situated women and men. All accounts of gender mainstreaming imply significant changes to gendered institutions, a range of different visions or models of gender equality have been invoked. Three main models of gender equality have been identified: The first model is one in which equality based on sameness is fostered, especially where women enter previously male domains and this known as the transformations of gender relations. The second in which there is a move towards the equal valuation of existing and different contributions of women and men in a gender segregated society known as tailoring situations to fit the needs of the women. The third is one in where there is a new standard for both men and women, which is the transformation of gender relations in which there are new standards for everyone, replacing the segregated institutions and standards associated with masculinity and femininity. Gender mainstreaming is highly diverse with uneven impacts, it is situated within the development of global politics, multi forms of governance and diverse discourses of human rights. All gender mainstreaming agendas and policies must should be evaluated from the perspective of whether or not it reduces or increases gender inequalities, unfair and unequal gender outcomes can be redresses. Gender equality and justice thus rely on the creative and technical capacity of gender analysis and gender specialists in the institutions. The gender mainstreaming main aim and the resulting goal is to help to transform a society to better gender equality, the result of such an events can be difficult to identify and track. The signs of the outcome of the gender streaming may be observed after a long term and can be identified by the increase in equality and the development results may include: Womens increased access to and control over a societys development resources and opportunities. Reduction in poverty for both women and men assessed through several indicators associated with areas where significant gender gaps exist, such as health and income. More equitable participation in decision making concerning allocation of development resources that might produce results such as improved health service delivery or better access to opportunities. Improved media images of womens roles in relationship and society, promoting women as individuals with full human rights and discouraging intolerance and violence against women. The emergence of committed gender-sensitive leaders, planers and implementers, both men and women applying gender analysis to their work on a regular basis. Identification of gender focal points in various government ministries with the capacity to provide leadership and accountability. The provision of adequate resources for the collection and analysis of sex disaggregated data, particularly to track impact of policies and programming. Putting mechanism in place to facilitate regular consultation and validation of policy decisions with civil society groups and organizations promoting gender equality. 4.0 Possible Problems or restrictions of gender mainstreaming Gender mainstreaming is a new strategy which has not been a great success so far, and essentially contested form of feminist politics and policy, existing in the tension between the mainstream and interventions to secure gender equality. The gender mainstreaming in development policies has been limited by its discursive construction as well as the failure to empower key gendered actors and its development has been uneven and weakened by its subordination to other policy goals. Gender mainstreaming has been criticized as a confusing conceptual framework at best, and at worst, a force that has totally undermined womens rights. Some say that it has resulted in the disappearance of attention to womens specific needs and the gender differentiated impacts of policies and programs. Mainstreaming has been described as a deceptive simple concept that is likely to be extremely difficult to operationlize and as an extraordinary demanding concept, which requires the adoption of a gender perspective by all the central actors in the policy process. Most Organizations embrace mainstreaming without implementing the extensive ground work and structural change that is necessary to ensure effective outcomes. Gender mainstreaming has emerged as a strategy in a period in which many governments and organizations have been anxious to reduce the costs and burdens imposed on market actors. Present approaches to macroeconomics have tended to reinforce a simplistic anti-poverty agenda that is incompatible wit process of gender mainstreaming. The lack of general understanding of what gender mainstreaming entails in practical terms and a lack of access to support mechanism and the gaps between policy and practice, with particular challenges to inadequate institutional mechanism, including the area of data collection, accountability, monitoring, reporting and training, as well as inadequate resource allocation. Other factors which hindered and restricted the gender mainstreaming include: Women organization may influence the outcome of mainstreaming due to their claim that streaming is not the appropriate procedure to achieve equality and feel that their situation will even become worse than before. The policy of gender mainstreaming sometime will lead to the abandonment of specific, positive actions on behalf of women and the particular policies on behalf of women may be discontinued and the equal opportunity unit will be weakened in the name of mainstreaming. There is a far that gender mainstreaming might be an attempt to integrate womens work to cut down costs and to downsize staff and the fear of some women is that it might lead to integration and elimination of womens movement and therefore lad to invisibility rather than to transformation. Many of the initiative undertaken under its mandate fail to create and legally enforceable rights, such as equal pay. The promise of the mainstreaming approach lies not in the short term creation of legally enforceable rights, but in the long term transformation of the policy process to serve the goal of equal opportunity between women and men. Political will and leadership: Understanding and commitment from authorities is obviously crucial to creating an enabling environment for the implementation of gender mainstreaming. Formal acknowledgement from political leaders that gender equality is an essential component of sustainable development is a starting point. Policy framework: without a formal policy in place related to gender streaming, often the results will be weak and missed. Unavailable of Sufficient Resources: without sufficient of resources, the commitment to gender streaming will not be achieved. Resources must be allocated to support the structure and practice required of mainstreaming. Sex-disaggregated and data information system: Information are not available to assure that there differences in circumstances and opportunities between women and men in order to provide the basis for policy and program development and evaluations. Tools and knowledge for gender analysis is not available and missing, such as inappropriate person in key position, lack of understanding concerning national gender equality and rational, scarce human, financial and technical resources, a lack of incentives / recognition rewards, lack of professionalism or political skills within the organization who will be responsible for establishing linage with other agencies and government departments. 5.0 Steps and procedures needed to address issues in mainstreaming Gender mainstreaming is relatively new phenomena and drives from only 20 years experience and the main procedure needed to the successful polices of mainstreaming is capacity building and training is needed to ensure and enhance the system gender sensitivity and gender expertise and these include: Integrate a gender perspective into all training programs. Provide continuous gender training for all staff, including those at the highest levels. Provide special training for gender experts to enhance their skills. Ensure that specialized gender expertise is available to them. Coordinate their training efforts though a system-wide evaluation of the impact of gender training. Gender disaggregated statistics and indicators to be collected and analyzed. Information exchange on gender mainstreaming within organization in particular women watch groups. Provide gender sensitive public information activities and materials to all concerned parties. In addition all problems and restrictions of gender mainstreaming of previous section can be avoided in order to not to hinder the development policies of gender mainstreaming. 6.0 Conclusion The gender mainstreaming is relatively new and has taken a center stage in the world order since the United Nations Conferences in Cairo, Copenhagen and Beijing have created very important aspects for women equality and rights to move the International development agenda from small scale to emphasizing the importance of gender mainstreaming in impacting the status of women in economics, social and political development. The mainstreaming gender equality is a commitment of organization to ensure that womens as well as mens concerns are the main parameters of the design policy in order to achieve equality for all sexes and to shatter the glass ceiling.