Saturday, August 31, 2019

Burglary Prevention Program Essay

Type of Research Design   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The research is looking forward to adopt the Quantitative Tradition of research.   The Quantitative Tradition of Research employs the method that is based on testing of theories. In addition, such also uses measurement of numbers and statistical analysis. The idea behind quantitative research is often to ascertain that a generalized theory or the prediction of a theory will be confirmed by using a statistical method.   Initially, quantitative research starts with the hypothesis and the theories that require being tested (Benz and Newman, 1998). The approach of quantitative research includes the use of formal and generally recognized instruments. In most instances, quantitative research conducts studies with an underlying expectation that a consensus would be arrived at.   As such, quantitative research usually aims to conclude a predictable generalization, and a causal explanation(Benz and Newman, 1998). Quantitative research also studies controlled and manipulated the participants on experiments and puts immense emphasis on deduction and analysis; as the goal of the aforementioned is to establish consensus by reducing data to numerical indications.   In effect of this, it could be significantly noted that the goal of quantitative research is the determination a given prediction, as the aforementioned seeks to know if certain generalizations could be verified or confirmed. In general, the quantitative methodology assumes that there is an objective reality which is independent of the person doing the research, it also takes the position that the subject of study can be done in an objective manner. The researcher must maintain independence from the research object. And the research is not expected to be value affected as the researcher must make sure that he or she does not become a part of the research (Benz and Newman, 1998) . The quantitative methodology tests cause and effect by using deductive logic. When done correctly a quantitative research will be able to predict, and explain the theory in question (Benz and Newman, 1998). Type of Sampling   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Sampling is the process of identifying the respondents for a particular research in order to attain the data that is necessary for a particular study. Such is also relevant in order to avoid the difficulty of administering the survey on an entire population (Ghauri et al, 1995).   Ã‚  According to Aaker et al (1995) research should cater to a target population that has all the necessary information for the research such as sampling elements, sampling units, and area of coverage.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The research is looking forward to adopt a Cluster Sampling procedure from a number of participants from various police departments who have adopted the burglary prevention that is similar to the Burglary Prevention Program employed by the chief of police in the author’s respective state. Cluster sampling is the process wherein the respondents are chosen in clusters such as police departments in various cities and/or   states using the same burglary prevention and the likes.   This type of sampling is advantageous to save traveling time and cist reduction.   It is also convenient in order to find a good number of participants who since the aforementioned are grouped into clusters (Ghauri et al, 2000). Units of Sampling to be Employed   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Determining the sample size for the survey is very relevant because much of the validity of the quantitative data of the research rests upon it. For the purpose of this part of the research, the research will be focusing on the sample size’s confidence interval and confidence level.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The confidence interval is the plus-or-minus figure that determined the confidence results of a particular study. For the purpose of this research, the projected confidence interval is plus or minus 1.75 on a 95% confidence level and a 120 population size.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On the other hand, the confidence level tells the percentage on how the results of the study could be sure. Often times, the confidence level is expressed in percentage and tells how frequently the population on the study would pick an answer that is within the confidence interval. For the purpose of this study, the author used the 95% confidence level which is most used confidence level among researches (Benz and Newman, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   As such, in analyzing the data for the survey, the research will have to look into a 95% confidence with a plus or minus 1.75 intervals. The wider that the confidence level that the research has to work on, the more certain as well that the population response would be more or less within that range.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the purpose of the research, the following formula will be used for the Sample Size (Benz and Newman, 1998). ss = z2 * (p) * (1-p) _________________ c2 Where as: ss= the minimum sample size z = z value (e.g. 1.96 for 95% confidence level) p = percentage picking a choice, expressed as decimal (.5 used for sample size needed) c = confidence interval, expressed as decimal (e.g., .04 =  ±4) There are three major factors that would affect the confidence intervals, these are the sample size, percentage and the population size.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   A huge sample size would make the results of the research mirror exactly that of the population. This implies that a for every confidence level, a huge sample size reflects a more small confidence interval. Albeit it should be noted that the relationship between them is not linear that if one would double the sample size, such would also make the confidence interval go up (Benz and Newman, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The percentage of a particular response from the survey also is a determinant for accuracy. For instance if a particular response says 51%, therefore it implies that there is a 49% chance of the responses being erroneous. However if the response rates reveal a 99% positive response versus a 1% negative response, there would be no significant difference at all (Benz and Newman, 1998).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The population size also matters when one is studying a segment of population that is relatively small such as those from the specific hotels being studied. On the other hand, if a research would be conducting a study from a very huge population, like for instance 500,000 or more, the size of the sample a sample size that is close to that exact number does not appear to be that relevant (Benz and Newman, 1998). Reliability and Validity   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The study’s reliability and validity go hand in hand as patterns of measurement depend on both the dependent and independent variables (Zikmund, 1994). Reliability primarily focuses on the internal consistency and the repeatability of the variables within the research. On the other hand, validity centers on the correctness and appropriateness of the question that one intends to measure (Ghauri et al, 1995). According to Chisnall (1997), validity is generally considered and established through the relationship of the instrument to the content, criterion or construct that it attempts to measure. A lack of validity can lead to incorrect conclusion. Analysis of Data   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the purpose of the survey, the data that will be gathered will be analyzed using the SPSS Software. SPSS (Statistical Products and Service Solutions) is a powerful, easy to use statistical package designed in a Windows environment, which enabled researchers to tap into various options of interpreting data (Griego and Morgan, 2000, p. 2). SPSS has been viewed as the premiere statistical software that are primarily being used to interpret quantitative research results due to its ease of use, technical support, ease of installation, scope of capabilities, user interface, graphical components, and so forth (Hilbe, 2005, p. 68).   Independent and Dependent Variables Independent Variable   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The independent variable is the causal factor that shapes or determines the dependent variable.   This type of variable is subjected to arbitrary change that is necessary in order to test the results of a particular test (Crown, 1998). The independent variable for this research is the effectiveness of the Burglary Prevention Program. Dependent Variables   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Dependent variables are is a variable that depends on the independent variable for change.   It is also known as the criterion variable (Crown, 1998). The dependent variables of the research are risk management strategies employed by a particular department such as proper identification of criminal vulnerability areas, use of effective detection alarms, and employee training. Data Collection The researcher will collect data based on primary and secondary methods. Secondary Data Collection   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Ghaury et al (1995) emphasized the importance of secondary data collection most especially through desk or library research. The review of related literature provided a scholarly perspective on the subject matter and at the same time made the researcher aware of both previous and contemporary research on the subject matter.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The data collection for secondary sources will be lifted from Questia Media America, an on-line Research Library and EBSCO Host with a special emphasis on literatures from London. Primary Data Collection   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the primary data collection, the researcher will be focusing on getting the data that are exactly needed for the research. With prior consideration on the objectives and the literature that will be collected by the researcher, a   seven-point survey will be formulated. Surveys  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The primary data that the research will use will be lifted based on distributing the questionnaires and survey forms through snail mail, e-mail, telephone conversation and personal interactions.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   According to Ritchie & Goeldner (1994) the process of telephone interview or survey for that matter includes conversing with an interviewee through the use of a telephone, rather than do it in person. In some ways, it could be said that a telephone survey is more preferred than a personal survey because it is relatively faster and could have prevented administrative problems. In addition with these, telephone surveys are relatively more cost effective and have the capability to reach those individuals that could not be reached locally. Although this method appears to be very cost effective,   it also proved to be impersonal in nature.   One major reason is the interviewer’s failure to see the exact reaction of the respondents on certain questions. .   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   On the other hand, Chisnall (1997) said that the process of mailing questionnaires include the use of mailing a set of questions to a certain sample population. Such a method could be said to be also relatively cheaper and assures anonymity and confidentiality. Such a method is also preferred when the respondents for the study are located in various locations and a phone interview appears to be not possible. Also, a mailed questionnaire could allow the respondents answer to the questions at their convenience; albeit, it could be significantly noted that it has also been perceived that there is a relatively low response rate on questionnaires. It is said by Chisnall (1977) that a 30% return of questionnaires is already relevant. In addition with this, it could be possible that the respondents might not have understood the questions in the survey form, and a discrepancy could also show in the results. Finally, similar to telephone interviews, the interviewer could also not see the body languages of the interviewee. Justification of the Selected Method   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   For the purpose of this research, the author will be conducting a pen and paper measurement survey that was sent via e-mail, mail, and personal administered basis. The respondents need to answer question based on a Likert Type Scale which ranks responses in seven different levels: Highly Agree, Agree, Somewhat Agree, Neutral, Somewhat Disagree, Disagree, Highly Disagree and Not Applicable. Whenever applicable, the questionnaires will be asked to be answered on a personal basis in order to avoid errors and discrepancy on the results.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The self-administered questionnaires offered a higher response rate and are also relatively cost effective (Bryman, 1992). Foremost of its advantage rests on the notion that the process of data gathering could be more personal and also the researcher could have clarify certain notions that could be unclear on the survey form. However, one distinct disadvantage of such a method is the difficulty of administrating the survey to multiple respondents all at the same time. In addition, the self-administered data gathering could be very time consuming as well.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Due to the time constraints and the monetary concerns that the research might post, the author perceived that it would be more effective for the survey to be administered on a personal or electronic basis, such as the e-mail. Whenever applicable, questionnaires will be also mailed. Questionnaire Design The questionnaire will be made in a manner that will promote a detailed, precise and logical construction of close-ended question. In addition with this, the questions will also be made in accordance with the hypotheses and the objectives of the research (Oppenheim, 1992).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   The questions will be formulated using a 7-Point Likert Type Scale and will be Close-Ended in Nature. Such is relevant so that respondents would only have to encircle the designated number of their corresponding responses (Oppenhein, 1992). In addition with this, close-ended questions are very easy to answer and could enable the researcher create a summated value that could be use for data analysis. Ethical Considerations in Research   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   To be ethical is to conform to accepted professional practices (Bailey, 1994, p. 454).   Utmost on the ethical considerations that this research will focus on is the notion of Informed Consent.   Informed consent is the process wherein respondents are made fully aware of the purpose of the study, possible dangers, and also the credentials of the researchers.   As such, in doing a survey, it is often the case that there is an introductory statement that will accompany the said questionnaire. The aforementioned are relevant in order to induce individuals to participate in a study in a voluntary manner.   For the purpose of the study, the researcher will be providing the respondents with an introductory statement that will accompany their questionnaire.  Ã‚   After reading such, the probable respondents will decide if they wanted to participate in the study or not.   This is very important in order to prevent duress and probable respondents would participate in the study on their own free will.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   It has also been pointed out by Bailey (1994) that sampling could also pose some issues in research as they could have pose privacy issues.   It could be the case that on the course of primary data gathering upon 120 respondents in various police departments, and the respondents felt that there are a number of questions that appears to be invading their privacy, then it could be the case that such an issue could pose a problem in terms of not only the ethical considerations among the respondents but also the validity of the data to gathered as respondents may not choose to answer truthfully such an answer. In the nature of this research, the issue would be a matter of program effectiveness on burglary security.   As such, the research would be cautious to questions that would require respondents to reveal personal information and also specific experiences that could place the respondent in a disposition of inconvenience.  Ã‚   As such it is also then part of the proposed methodology for the study , the anonymity of the respondents.   The responses of the participants will be kept confidential and will only be used for the purpose of the study.       References Aaker, D. A. and Day G. S. 1990. Marketing Research, 4ed. Singapore: John Wiley & Sons. Bailey K. 1994, Methods of Social Research. New York, New York: The Free Press. Benz C. and Newman I, 1998. Qualitative-Quantitative Research Methodology: Exploring the Interactive Continuum. Carbondale, IL: Southern Illinois University Press. Chisnall P. M., 1997. Marketing Research, 5ed., Berkshire: McGraw-Hill. Crown W. 1998.   Statistical Models for the Social and Behavioral Sciences Multiple Regression and Limited-Dependent Variable Models. Westport, CT: Praeger Publishers. Ghauri, P., Gronhaug, K. and Kristianslund, I., 1995. Research Methods In Business Griego O. and Morgan G. (2000). SPSS for Windows: An Introduction to Use and Interpretation in Research. Mahwah, NJ: Lawrence Erlbaum Associates. Studies: A Practical Guide. Great Britain: Prentice Hall. Hilbe J. , 2005. A Review of SPSS 12.01, Part 2. The American Statistician 58 (2), pp. Oppenhein, A. N,, 1992. Questionnaire Design Interviewing and Attitude Measurement. London: Pinter. Ritchie B. and Goeldner C. R., 1994. Travel, Tourism and Hotel Researcher. New York: Wiley and Sons, Inc. Zikmund, G. W., 1994. Exploring Marketing Research. Dryden

Friday, August 30, 2019

Relational Databases

CHAPTER 4 RELATIONAL DATABASES SUGGESTED ANSWERS TO DISCUSSION QUESTIONS4. 1 Contrast the logical and the physical view of data and discuss why separate views are necessary in database applications. Describe which perspective is most useful for each of the following employees: a programmer, a manager, and an internal auditor. How will understanding logical data structures assist you when designing and using database systems?4. 2 Databases are possible because of their database management system (DBMS). As shown in Figure 4. 2, the DBMS is a software program that sits between the actual data stored in the system and the application programs that use the data. As shown in Figure 4. 4, this allows users to separate the way they view the data (called the logical view) from the way the data is actually stored (the physical view). The DBMS interprets the users' requests and retrieves, manipulates, or stores the data as needed. The two distinct views separate the applications from the physi cal information, providing increased flexibility in applications, improved data security, and ease of use.In a database system, the manager will rarely need to understand or be familiar with the physical view of the data. Nor, in most instances, will the internal auditor and the programmer as most everything they do involves the logical view of the data. If accountants understand logical data structures and the logical view of the data, they are better able to manage, use, and audit a database and its data. 4. 2 The relational data model represents data as being stored in tables. Spreadsheets are another tool that accountants use to employ a tabular representation of data.What are some similarities and differences in the way these tools use tables? How might an accountant’s familiarity with the tabular representation of spreadsheets facilitate or hinder learning how to use a relational DBMS? A major difference between spreadsheets and databases is that spreadsheets are design ed primarily to handle numeric data, whereas databases can handle both text and numbers. Consequently, the query and sorting capabilities of spreadsheets are much more limited than what can be accomplished with a DBMS that has a good query language.Accountants’ familiarity with spreadsheets might hinder their ability to design and use relational DBMS because many links in spreadsheets are preprogrammed and designed in, whereas a well-designed relational database is designed to facilitate ad-hoc queries. Accountants’ familiarity with spreadsheets sometimes leads them to use a spreadsheet for a task that a database could handle much better. Over the years, the Journal of Accountancy has published a number of very good articles on how to use databases and when to use databases and when to use spreadsheets. These articles can be found on the Journal’s website: http://www. ournalofaccountancy. com/4. 3 Some people believe database technology may eliminate the need fo r double-entry accounting. This creates three possibilities: (1) the double-entry model will be abandoned; (2) the double-entry model will not be used directly, but an external-level schema based on the double-entry model will be defined for accountants’ use; or (3) the double-entry model will be retained in database systems. Which alternative do you think is most likely to occur? Why? There is no correct answer to this question because it is asking the student to express his opinion on what will happen in the future.Therefore, the quality of his answer depends on the justifications provided. Good answers should address the following:Database technology does permit abandonment of double entry, but there will likely be great resistance to such a radical change. Thus, students choosing this option need to present reasons why they think such a radical change would succeed.The use of a schema for accountants seems quite plausible. It does eliminate the redundancy of double entry from the database system, yet it still provides a framework familiar and useful to accountants and financial analysts.There is a good possibility that double entry will remain, even in databases, due to inertia. Indeed, many modern AIS, such as ERP systems, use databases but also retain the principles of double entry.4. 4 Relational DBMS query languages provide easy access to information about the organization’s activities. Does this mean that online, real-time processing should be used for all transactions? Does an organization need real-time financial reports? Why or why not? ;lt;/para;gt;;lt;/question;gt;;lt;/general-problem;gt;;lt;/problemset;gt; On-line real-time processing is not necessary for every business transaction.For example, batch processing is adequate for payroll: there is little need for the data to be current except on payday. Real-time financial statements are useful for planning and provide management with better ability to react to changes in the environm ent. Nevertheless, real-time financial statements may present distorted pictures of reality if accruals have been ignored or not properly recognized.4. 5 Why is it so important to have good data? Bad data costs businesses over $600 billion a year. Some people estimate that over 25% of business data is inaccurate or incomplete. In addition, incorrect database data can lead to bad decisions, embarrassment, and angry users. The text illustrated this with the following examples: For quite some time, a company sent half its catalogs to incorrect addresses. A manager finally investigated the large volume of returns and customer complaints and corrected the customer addresses in the database.He saved the company $12 million a year. Valparaiso, Indiana used the county database to develop its tax rates. After mailing the tax notices, it was discovered that a $121,900 home was valued at $400 million. Due to the $3. 1 million property tax revenue shortfall, the city, the school district, and g overnmental agencies had to make severe budget cuts.   Managing data is not going to get any easier as the quantity of data generated and stored doubles every 18 months.4.6 What is a data dictionary, what does it contain, and how is it used? contains information about the structure of the database. Table 4-1 shows that there is a record in the dictionary describing each data element. The DBMS maintains the data dictionary, whose inputs include new or deleted data elements and changes in data element names, descriptions, or uses.Outputs include reports for programmers, designers, and users. These reports are used for system documentation, database design and implementation, and as part of the audit trail.4. 7   Compare and contrast the file-oriented approach and the database approach. Explain the main advantages of database systems. Information about the attributes of a customer, such as name and address, are stored in fields. Fields contain data about one entity (e. g. , one cus tomer). Multiple fields form a record. A set of related records, such as all customer records, forms a file (e. g. , the customer file).A set of interrelated, centrally coordinated files forms a database. illustrates the differences between file-oriented and database systems. In the database approach, data is an organizational resource that is used by and managed for the entire organization, not just the originating department. A database management system (DBMS) is the interface between the database and the various application programs.The database, the DBMS, and the application programs that access the database through the DBMS are referred to as the Database systems were developed to address the proliferation of master files. This proliferation created problems such as the same data stored in two or more master files. This made it difficult to integrate and update data and to obtain an organization-wide view of data.LimitAccount Balance| 4. 2Most DBMS packages contain data defini tion, data manipulation, and data query languages. For each of the following, indicate which language would be used and why. 1. A database administrator defines the logical structure of the database The DDL – this is the language used to define the database. b. The controller requests a cost accounting report containing a list of all employees being paid for more than 10 hours overtime in a given week. The DQL – this is an example of a query. c. A programmer develops a program to update the fixed-assets records stored in the database.The DML – this is the language used to actually process transaction data and update the database. d. The human resources manager requests a report noting all employees who are retiring within five years. The DQL – another example of a task that involves querying the database. e. The inventory serial number field is extended in the inventory records to allow for recognition of additional inventory items with serial numbers con taining more than 10 digits. The DDL and the DML – the former to alter the structure, the latter to make the change. f. A user develops a program to print out all purchases made during the past two weeks.The DQL – this listing can be produced by a query. g. An additional field is added to the fixed-asset records to record the estimated salvage value of each asset. The DDL and the DML – the former to add the field, the latter to enter data in it. 4. 3Ashton wants to store the following data about S;amp;S’s purchases of inventory: item numberdate of purchase vendor numbervendor address vendor namepurchase price quantity purchasedemployee number employee namepurchase order number descriptionquantity on hand extended amounttotal amount of purchase a. Design a set of relational tables to store this data.Do all of the data items need to be stored in a table? If not, which ones do not need to be stored and why do they not need to be stored? b. Identify the prima ry key for each table. c. Identify the foreign keys needed in the tables to implement referential integrity. Table Name| Primary Key| Foreign Keys| Other Attributes| Inventory| Item Number| | DescriptionQuantity on Hand| Purchases| Purchase order number| Vendor numberPurchasing Agent (employee number)| Date of purchaseTotal amount of purchase| Purchases-Inventory| Item numberPurchase order number| |Quantity purchasedUnit cost (actual)Extended amount| Vendor| Vendor number| | Vendor nameVendor address| Employees | Employee number | | Employee name| Extended amount and Total amount of purchase do not have to be stored in the database as they can be calculated from other values. Extended amount is Quantity purchased x Unit cost. Total amount of purchase is the sum of all the extended amounts for all items on a particular purchase order, d. Implement your tables using any relational database product to which you have access.Test your specification by entering sample data in each table. f. Create a few queries to retrieve or analyze the data you stored. There is no solution to parts d through f as students will select different software packages and come up with different queries. 4. 4Retrieve the S;amp;S In-Chapter Database (in Microsoft Access format) from the text’s Web site (or create the tables in a relational DBMS product).NOTE: In order to get a list of lenders without duplicates the property sheet of the query needs to be modified by setting the value of the Unique Values property to Yes. This can be seen in the screenshot below. The property sheet is found under the Design tab of the ribbon. Setting Unique Values to Yes is the equivalent of entering the DISTINCT keyword in SQL select statements. Query Result f. Which borrower requested the largest mortgage? Query Notice that in the Design section on the ribbon, you must set the Return value to 1 (located in the Query Setup group).This indicates to Access to only return the top result. See the image below for a screenshot of this. Query Result g. Which borrower requested the smallest mortgage? Query Query Result As with problem 4-10-f, you must set the Return value to 1 in the Design section of the ribbon (located in the Query Setup group). This indicates to Access to only return the top result. See the image below for a screenshot of this. SUGGESTED ANSWERS TO THE CASES 4. 1As in all areas of information technology, DBMSs are constantly

Thursday, August 29, 2019

HIPAA’s Pros and Cons Essay

HIPAA or what is known as the â€Å"Health Insurance Portability and Accountability Act of 1996† has its pros and cons (United.., 2007).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Pros include the following:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   HIPAA guarantees dependability and promptness of â€Å"electronic patient health, administrative, and financial data† (HIPAA, 2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   HIPAA implements rules, policies, and standards that maintain the confidentiality and soundness/constancy of â€Å"individually identifiable health information covering the past, present, as well as, the future† (HIPAA, 2006). For instance, in case where an established institution needs an individual’s record, this individual is ensured that his or her personal information is safe with that institution (HIPAA, 2006).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Cons, on the other hand, include the following:   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   HIPAA negatively affects the access of clients to their medical records (United.., 2007). This is because information may be â€Å"pending† to those who have the right to get hold of it because of the penalties enforced (United.., 2007). This is also because of the fact several health care providers are unsure when it comes to the legalities of the Act (United.., 2007).   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   HIPAA also does not have a positive impact or effect on health research (United.., 2007). This is because of the fact that HIPAA limits or controls the researchers’ conscientiousness to carry out â€Å"retrospective, chart-based research† (United.., 2007). In addition to that, HIPAA restricts researchers to â€Å"prospectively assess patients by getting in touch with them for the purpose of follow-up† (United.., 2007). Not to mention of course that, in terms of, â€Å"informed consent† forms, wide-ranging and far-reaching detail on how confidentiality is safeguarded is necessitated making it more complicated for subjects to grasp before they could sign in, which usually ends in not signing at all because they do not know what they will be signing on (United.., 2007). References       United States Department of Health and Human Services. (2007). HIPAA. Retrieved December 5, 2007 from   http://www.hhs.gov/ocr/hipaa/ HIPAA. (2006). Unsure How to Handle HIPAA? Retrieved December 5, 2007 from   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   http://www.hipaa.org/

Wednesday, August 28, 2019

FedEx International Aviation Policy Research Paper - 1

FedEx International Aviation Policy - Research Paper Example nies in the world. It has expanded in more than 220 nations. The company has successfully placed itself as a dominant player in the logistics and shipping network. Presently, FedEx possesses strong international consignment network, through which it can rapidly deliver the packages globally. In the international arena, there are many competitors of FedEx who are also striving to achieve the leading position in the logistics and shipping market. Thus, it is essential for FedEx to keep expanding and developing new markets to maintain its position in the market (Smirt & Et. Al., 2007). Competitive One of the biggest competitors of FedEx is UPS (United Parcel Service). UPS is renowned as one of the biggest global courier enterprises. It has a capacity of shipping 15 million packages per day to approximately 6.1 million people in more than 200 nations. Besides UPS the other competitors of FedEx are Japan Post, TNT N.V., Deutsche Post, Royal Mail, India Post, and others. In the domestic ma rket the major competitor of FedEx is USPS (United States Postal Service). FedEx had expanded its business operations in the year 1998 by acquisition of RPS (Roadway Package System) and rebranded it to FedEx Ground in the year 2000. In the year 2003, FedEx’s competitor DHL had entered the US market by taking over Airborne Express and thus developed its strong presence in the logistics and shipping market. This acquisition had increased the competition in the ground delivery market. To maintain their position, UPS had made partnership with USPS. This affiliation had allowed UPS to pick up mail and deliver to USPS for final distribution (Gomez, 2009). For many years, FedEx and UPS have expanded their business operations. There are little differences in the operation of these two rivals. UPS depends mainly on the ground delivery system and FedEx focuses on air delivery system. FedEx can reach almost every international business destination in less period of time (Anton, 2010). D istributive National and International Agencies Available In China There are four kinds of companies available for distributing goods and services in China which are ‘state owned transport and warehouse companies’, private domestic logistics enterprises, overseas logistic enterprises and in-house logistics enterprises. The top state owned agencies of China are COSCO logistics, Sinotrans Limited, China National Port Logistics, and others (Chin & Kim, ND). National and International Agencies Available in Canada Besides FedEx there are other national and international agencies which provide quality distribution solution to customers in Canada. The renowned logistics companies

Tuesday, August 27, 2019

Star Wars and the Bible Research Paper Example | Topics and Well Written Essays - 750 words - 1

Star Wars and the Bible - Research Paper Example For instance, the original trilogy appears focused more on Jedi and the saving power of the Force’s Light Side. The Prequels on the other hand seems more focused on enticing power of the Dark Side which is consistent with the Biblical seductiveness of the evil. It is my humble submission that it is not a mistake that Palpatine’s rope contain red streak the moment he first uses the Dark Side to lure Anakin. There is strong evidence to suggest that Palpatine symbolizes Satan because just like the bible would like us to know, the Evil one is manipulative, a liar, and a person who like twisting the truth, not to mention his knack of playing with emotion. As for Ankin, he applaud Jedi for selflessness when he says that he (Ankin) only care of others which remind one of Philippians 2:3-4 which warns â€Å"do nothing out of selfish ambition, but in humility consider others better than yourself,† Which according to Paul was the main attitude that Jesus exhibited during h is time here on earth, and that he wanted us to replicate. We can also draw parallels between master Jedi qualities and those described in Galatians 5:22-23 concerning the fruit of the Holy Spirit. In this regard, we have qualities like; joy, kindness, love, faithfulness, self-control, gentleness and peace as the fruit of the Holy Spirit majority of which can be found in the character Master Jedi. Obi-Wan also exhibit traits that immortalize him in the memory of those that he leaves behind ultimately. First, his loyalty, dedication, knowledge and potential are legendary. These are virtues that we see in majority of characters in the Old Testament. Even after being conscripted into the radicalized Qui-Gon Jinn, he does not seem to lose objectivity and orthodox in his approach to issues.

Philosophy of Filmanalysis of filmTouch of Evil (Orson Welles, 1958) Movie Review

Philosophy of Filmanalysis of filmTouch of Evil (Orson Welles, 1958) - Movie Review Example For example, there are obvious film noir characteristics, most notably in the visualization of shots. Long shadows, angled lighting on characters, dingy settings, the suggestions of secrecy through mise-en-scene all testify to the film noir spirit. Moreover, the pivotal plot element of a murder (through bomb detonation) is consistent with the genre. While the cinematography is novel in this fashion, the core themes of the story are ancient and universal. Some critics have even identified Shakespearean themes in the film. â€Å"European cinephiles, who were quick to enshrine Welles in a pantheon of auteurs, easily incorporated the Shakespeare films into the Wellesian cinema, recognizing in them themes and dramatic emphases present as well the destructive consequence of power, even when employed in a just cause; the inevitability of betrayal; the loss of paradise—all of these films are, in their own way, Shakespearean texts, if in no other sense than in the way they impose a large, poetic intensity on questions of family and domesticity and thus wed the social with the personal.† (Anderegg, 1999, p. 70) In relation to Shakespearean texts, one can see shades of Othello and Hamlet in the personages of Quinlan and Vargas. While envy was the undoing of Othello, misplaced pride and egoism were the root of Quinlan’s suffering. It is not an exaggeration to claim that the main focus of the film is personal anguish, which, of course, is illustrated through the framework of a crime thriller. Despite the heavy boozing and smoking, a murky past and question marks over professional integrity, Captain Quinlan can still be interpreted as a hero, for he inevitably got the culprits convicted. His methods and means of achieving them are dubious, but the results were fair and just, even by his own evaluation. The famous ‘intuitions’ of Quinlan may not arise from systematic or scientific analysis, but they nearly always happen to be right. Even the framing of Sanchez

Monday, August 26, 2019

Information Politics Essay Example | Topics and Well Written Essays - 250 words

Information Politics - Essay Example It is not to say that other situations are more important than the others, rather the executor of the informational politics such as the speakers or the representors of the information could play a major role to skew the direction of the information in either way. I have got to witness more attention being given to equipment and machines that military have to their disposal over and above the people who use the equipment and suffer consequences and loss of wars. For instance, the war veterans, victims and their families are accorded least of attention despite the emotional turmoil and suffering that they undergo in their course of action and service. Instead, they are neglected and given least of attention which is not a good reverence and show to the people who get to push the nation’s military agenda in other countries and places (Ward, 2014). In brief, politics of information may hinder the organisation and society by extension from realizing and appreciating the things that truly matter in their simplest and most ordinary

Sunday, August 25, 2019

Database Essay Example | Topics and Well Written Essays - 2000 words

Database - Essay Example In this scenario, IT managers face a lot of challenges in an attempt to bring real business intelligence within time and budget constraints. In the past, when the huge mainframe system empire clasped into a desktop era, IT businesses evolved as well. Additionally, the system storage capacity, processing power, specialized tools and decision-making information were distributed to clients who required freedom of corporate decision making. However, after few years, the pendulum started to shift and with the development of intranets and the Internet connected PC clients formed a networked society that valued information sharing. In this scenario, the IT businesses at the present must develop again. Nowadays they are forced to offer the central data repository and control that illustrate the mainframe era, in addition the rapid decision making and self-directed analysis that grows in the PC era (SAS, 2005), (Jiang et al., 2010) and (Lee & Noah, 1999). Carrefour, which is a France based co rporation, has decided to implement a new technology based solution for overall corporate marketing analysis and decision making. This report will present a detailed analysis of implementation of enterprise intelligence platform at Carrefour. OVERVIEW of Business Carrefour, which is a France based corporation, has decided to implement a new technology based solution for overall corporate marketing analysis and decision making. This report presents a detailed analysis of important aspects of the new enterprise intelligence platform establishment and investigates possible security and confidentiality related issues in customer data in business data warehouse. INTRODUCING NEW ENTERPRISE INTELLIGENCE PLATFORM The basic purpose of implementing enterprise intelligence platform at Carrefour business is to enhance the business productivity and performance through better operational technology solutions. Seeing that, an enterprise intelligence platform is a collection of manual or computer-s upported methods and tools that help manage a number of decision-making activities. In addition, in present day business structure, enterprise intelligence platforms are frequently recognized to be computerized administration information structures to facilitate business owners, decision-makers and executives to determine complicated business issues and challenges. In this scenario, a high-quality enterprise intelligence platform can be helpful for the business staff to carry out a broad range of jobs such as concept ranking, cash flow analysis, product performance development, multistage fore-casting and resource sharing investigation. Furthermore, in the past it was considered as a method or tool for huge corporations, but enterprise intelligence platform has now become equally important tool for small to large size businesses (ReferenceForBusiness, 2011), (Tang, 2006) and (Essaidi, 2010). Enterprise intelligence platform is a wide-ranging group of high-tech and advanced interacti ve computer systems and tools, mainly customizable systems, intended to support business data analysis and managerial decision making. In addition, enterprise intelligence framework is a member of a very large group which is known as management support systems. Furthermore, the main objective of implementing enterprise intelligence platform applications is to build an administrative structure in a more well-organized

Saturday, August 24, 2019

Portfolio of Work Completed in Harbin Bank Term Paper

Portfolio of Work Completed in Harbin Bank - Term Paper Example Additionally, the banker’s magazine of china ranks Harbin bank at position 9 among the companies that trade with assets of more than 80 billion Yuan in the whole country. Harbin bank’s mission statement is â€Å"to create profits to her shareholders, make customers get more value, make the employees have hope in their future and also create wealth to the society†. This is in line with her philosophy of â€Å"inclusive finance and harmoniously getting rich†. Being based in the Northeast of China, Harbin bank is geared to supporting the SME’s and also in creating an international micro credit bank which is renowned. Harbin bank made a wise decision to offer loans to small and medium size enterprises (SME’s) since 2004 and the shifting of the focus to the SME’s has solved the financial problems of the SME’s. Harbin bank’s small loans are classified into four main parts, namely, loans for farmers, loans for small enterprises, loans for personal consumption, and loans for micro-enterprises. According to the banks financial statement, by the end of 2009, the small loan bank balance was 18.933 billion Yuan. This accounted for 60% of the bank’s total credit asset. ... The focus of my work specifically was in issuing of loans to the small and the medium sized enterprises. As part of the orientation to the company and to renaissance myself to the processes in the bank, the manager assigned one of the employees who was knowledgeable and very familiar with the processes of lending of the money to help me with most of the work. After some time, with the assistance I got from her, I got the whole idea and came to learn the whole process of issuing of the loans. This improved the rest of my working days with the bank. The initial step in the process of lending was communication between the customer with the bank. Moreover, the company which needs the money need to have a meeting with the bank for the purpose of sharing information between the bank and the company. The information arrives at a common agreement on the laid down conditions between the two parties. During this process we ask questions concerning the condition of the company. For instance, ho w much they need, their plans for the loan, the number of creditors and the number of the debtors and the collateral they plan to pledge. After analyzing their application and their documents, we give them information on how much the bank is willing and capable of lending them and their required payback amount. If the two parties strike a common ground in the negotiation table then, we ask the company to prepare materials for the bank to process the loan. The documents we always request to be provided are supposed to be original and their copies and they include company ownership documents, licenses of the business, loan application, financial report capital verification report, tax registration certificate among others.

Friday, August 23, 2019

International Outsourcing of Clothing Industry Dissertation

International Outsourcing of Clothing Industry - Dissertation Example At international level several attempts have been made by the international trading bodies like WTO to liberalize the trade system and as a result there is increase in the outsourcing of different industries. Globalization has drawn lasting effects on the clothing industry as well and global outsourcing is occurring in the industry at increasing rates. Outsourcing of different industries draws significant impacts of the performance of that industry as well as on the entire economy. There are different view points about the potential effects of global outsourcing. Some researchers (e.g. Antras, Helpman, 2004) believe that increased global outsourcing cause unemployment of thousands of domestic highly skilled professionals as the companies offer the employment opportunities to the labor of another country from where they might get the labor at low wages or salaries. On the other hand some social scientists (e.g. Bruce S. Berton, 2004; Amiti, Wei, 2005) strongly believe that the economies in the 21st century must need outsourcing in different industries because it bring variety of benefits and advantages to the countries like the consumers get more choices available in front of them and they also have an easy access to purchase the products at different levels of distribution. Along with these effects of global outsourcing attempts are also made to examine the impacts of outsourcing on the workforce of the countries (e.g. Campa and Linda S. Goldberg 1997; Maria Pia Hernandez, 2004). Despite the fact the a considerable portion of literature is concerned with examining the effects of global outsourcing on industries and the economies, there are few researches that study the impact of global outsourcing of clothing... The dissertation unfolded the international outsourcing of the clothing industry from the US and also provided the information about the various issues that are related to the clothing industry outsourcing. It came out from the study the clothing industry is being outsourced internationally from America for many years ago. It means that there is enough awareness in the businesses of the American clothing industry that they paid attention towards the outsourcing and discovered that the outsourcing will provide them certain benefits. As a result of this thinking outsourcing of clothing industry by the US, clothing firms become a common practice and many of the famous brands also get their clothing assembled in other countries where the manufacturing cost is less than America. The two important factors that were pointed out as the main player that encourage the outsourcing of industries (Technology advancement and Trade liberalization measures) also played an active role in the internat ional outsourcing of the US clothing industry. The clothing firms of US is not only facilitated by the technology to get into the outsourcing practice but the favorable investment and trade condition also makes it possible that the companies to look towards international outsourcing and save the money that is saved from the labor salaries. The clothing industry mostly looks towards the positive consequences of the international outsourcing and they do not take much care of the matter that what will happen to the skill and unskilled labor of home country.

Thursday, August 22, 2019

Working with calculus Assignment Essay Example for Free

Working with calculus Assignment Essay The nightmare has come to pass. All of Kelleys extensive surgeries and nasal passage scrapings have (unfortunately) gone awry, and he waits in the Ear, Nose, and Throat doctors office waiting area spewing bloody snot into a conical paper cup at the rate of 4 in3/min. The cup is being held with the vertex down (all the better to pool the snot in, my dear). The booger catcher has a height of 5 inches and a base of 3 inches. How fast is the mucous level rising in the cup when the snot is three inches deep? Investigating the problemÃ'Ž The volume of a cone V = where r is the radius of the cone and he is its height For the full cone or any part of it, the ratio of r:h remains fixed, so As we are only interested in the rate of change of the height we need to eliminate r so use r = 3h/10 for all levels So the new V = so to find h3 = and h = So making a table to find for t= 0 to 25 and hence work out roughly how long the cone takes to fill up, and the height value at each stage and also radius each time. As can be seen, the full height and radius is reached at about t 15 minutes. Lets hope the doctor is on time today! Here are the formulae used to generate the tableHere is the graph of h and r against time: Both h and r increase rapidly in the 1st 5 minutes before the rate of increase slows as t increases. Using Numerical methods Various rates of change could be investigated, including the rate of change of h with respect to V, the rate of change of r with respect to t and so on. However, the question asks about the rate of change of h with respect to t, so this will be investigated using the Leibnitz formula : to estimate gradients using a spreadsheet. The following graph was obtained: As can be seen this graph of the rate of change of height (the speed at which height changes) is not very helpful, as there is a lot of change for t = 0 to t = 2 but after that the rate of change is much less. Some investigation shows that most of the change takes place between t = 0 and t = 1. So tracing the rate of change of the 2 sections on different graphs, with the one involving the first section in much more detail, will give a better picture. The table: And the graph The reduction in speed of the heights rise is very marked The table for t = 1 to t = 14: and the graph: The question requires the rate of change at h = 3. From the table this can be see between t = 2 and t = 4, where the gradient is between 0. 46 and 0. 29 inches per minute Using differentiation V = so and we were also told So using the Chain Rule: = Filling what is known: 4 = so So when h = 3 = 0. 393 inches per minute Conclusion: The numerical method does not give a very accurate result and provided the Chain rule is used, the calculus method is much betterÃ'Ž

Wednesday, August 21, 2019

Saving Helpless Animals Essay Example for Free

Saving Helpless Animals Essay Do people realize the amount of animals that are killed each year for merely just a small portion of their body? Whether it is hide, hoofs, or urine, it’s never enough to make it worth killing the animal, taking parts of the body and leaving the rest go to waste. Writers such as Peter Hammarstedt in â€Å"Defending Whales and Seals,† goes on to explain how he dedicated his career to saving these animals. Hammarstedt states, â€Å"I wanted Peter in this book because he illustrates very well how rewarding it is to follow your heart and have huge impact on those with no voice. This quote captured my heart and led me into the research of Premarin Mares. Horses are being hung from the ceiling by a harness, with a machine hooked to them to collect their urine. They are being given half the amount of water a horse should have, all so their urine will be more pure. These horses are called Premarin Mares. They get the name Premarin from â€Å"Pregnant mare’s urine† (HRT Drug Widely Prescribed, 2003). Premarin is a medicine created fro women going through menopause. These women have no clue how Premarin is being made. Once the mares have gone through the pregnancy and give birth, the foals are immediately on their way to death. They are either sent to a pre-slaughter house to gain weight, or they go straight to the slaughter house, because foal meat is a delicacy in some countries. Women need to be aware that Premarin should not be used because horses are being abused and killed for the creation of a medicine that has negative side affects upon human consumption. Premarin is a medicine that is produced from pregnant mares and is made by Wyeth-Ayerest to give to women who are going through menopause. The company that distributes and markets it world-wide, is Ayerst Organics Ltd. Premarin has been available to purchase since the year 1942. When stats were last checked in June of 2009, there were over nine million women who live in America that have purchased and been taking Premarin (HRT Drug Widely Prescribed, 2003). The drug has been around for such a long time,  people immediately assume it must work. According to its creators, Premarin helps to relieve or eliminate a variety of female hormonal problems (Benefits of Premarin, 2012). Premarin is a hormone therapy that contains a blend of estrogens available in low dose options. In general women can expect relief within a few short weeks.PREMARIN is a hormone therapy that contains a blend of estrogens available in low dose options. In general, you can expect relief to begin within a few weeks. Being a female myself, I’m sure that very line is enough to spark anyone’s curiosity. The only thing is, these women were not informed of how Premarin is made, and the doctors make the side effects sound like they are no big deal. Some of the side effects Premarin will give women are chances of having a stroke is increased by 41%. The chances of having a heart attack are also increased by 29%. Premarin increases the chance of blood clots forming by 100%, and will increase the chances of getting breast cancer (HRT Drug Widely Prescribed, 2003). These women should just find a new medicine that is not from chemicals that have to abusively be taken out of animals. The usage of Premarin is known to make hot flashes and night sweats become less frequent and intense. Premarin lets women begin to feel relief from hot flashes in as little as 3 weeks. The Benefits of Premarin states, â€Å"In a clinical trial, the lowest dose (0.3mg) of Premarin reduced the number of hot flashes from 13 to less than 3 per day at 12 weeks of therapy† (Benefits of Premarin, 2012). What people don’t realize is every year, there are at least 75,000 mares that are abused in order to produce Premarin. Since Premarin has been used, over one million innocent horses have died from its needs (Morrison, 2004). Since they have been researching how Premarin is made, there have been some changes to try to help these innocent horses. Morrison states, â€Å"The amount of horses needed went from 40,000 to 20,000 overnight† (Morrison, 2004). Premarin Mares will be used for up to twenty years if they keep getting pregnant and give out good strong urine. If not then they are simply sent away for slaughter. The harnesses that are put on the Premarin Mares make it so the horses are unable to move around at all. Being in this harness will cause serious abrasions to the horse’s body. Even this will not stop them from being put in the harness over and over (Premarin, 2012). A common breed of horses that is used to produce Premarin  is a draft horse. In the eleven months that mares are pregnant, six of that time their urine is painfully being taken from them. Morrison states, â€Å"And the result of all these pregnancies? Lots and lots of foals, baby horses† (Morrison, 2004). There are several reasons why women are so eager to use Premarin. Benefits of Premarin expresses, â€Å"Premarin has been shown to significantly improve vaginal symptoms due to menopause at every dose† (Benefits of Premarin, 2012). Wyeth Pharmaceuticals states, â€Å"Premarin’s vaginal cream is the first vaginal estrogen treatment made to relieve moderate to severe vagina itching, burning or dryness† (Wyeth, 2012). A small application of the cream can help to reduce or eliminate physical discomfort experienced by menopausal women during intercourse. With prolonged usage, the cream can reverse vaginal changes associated with menopause. It can take up to 3 weeks for the benefits to begin to be realized. What women don’t realize is that Premarin foals get taken from their mother, and either turned into Premarin Mares, or are sent away to get fattened up and then sent to the slaughter house (HRT Drug Widely Prescribed, 2003). Once foals are born, they have alm ost no hope for a good life. If the foals are not an attractive color they have no chance of being sold for normal horse uses (Premarin, 2012). Sometimes when foals are sold to good families, they have deep concern for a health problem in the foal, so they have a harder time being adopted. Foals can be bought for recreational use. Most often though, they are bought by â€Å"killer buyers.† The babies that are born are not allowed to stay with their mother any longer than four months. Every year, there are at least twenty-five thousand babies who will be killed or who die from neglect (HRT Drug Widely Prescribed, 2003). â€Å"These babies are then sent to slaughter houses or unsheltered feedlots to gain weight to be slaughtered for human consumption† (Premarin, 2012). Premarin foals get eaten by humans often. According to USDA, young foal meat tends to be very tender. This just shows how easily these babies can be neglected, because no one cares for them. Looking on the bright side of things, â€Å"Premarin has been proven to increase bone density of the hip and the spine and can help prevent osteoporosis† (Benefits of Premarin, 2012). This is an ongoing problem in women so the fact that Premarin can help solve this problem is a big plus  for the company. Mare’s used to produce Premarin are greatly abused on a daily basis and being deprived of their every day needs. Horses that are well taken care of are normally put in stalls that are around or close to 10 by 10 or even 10 by 12. These horses are being put in stalls that are eight by three-and-a-half feet. These poor horses do not have enough room to turn around. So the mare’s urine is stronger, the PMU farms give the mares half the amount of water they should receive on a daily basis (Premarin, 2012). The mares are kept on tiny stalls for one hundred fifty days hooked up to machines to collect their urine (HRT Drug Widely Prescribed, 2003). The mares are kept in very small areas so they cannot move or even lay down (Premarin, 2012). The horses used for Premarin are given no attention love wise, and for a horse it is quality not quantity that matters to it. A popular doctor, Dr. Ray Kellosalmi, even says, â€Å"The production of Premarin is a source of pure torture to these mares† (Morrison, 2004). The mares used for this are highly abused. The LCA investigation found, â€Å"a still-alive mare hanging upside down with part of her leg cut off† (HRT Drug Widely Prescribed, 2003). Premarin is a convenient drug to take. Premarin offers five different strengths of the drug therefore it can be given to all different women due to the convenient dosing options (Benefits of Premarin, 2012).Premarin farms, also called PMU farms, are where the neglect of these horses takes place, and where Premarin is made. â€Å"There are thirty PMU farms located in North Dakota near the Canadian Border† Premarin, 2012). â€Å"There are more than five hundred PMU farms in North America with the majority being located in Canada† (Premarin, 2012). â€Å"Most Canadian PMU farms have re-emerged in Manitoba, Alberta, and Saskatchewan† (Premarin, 2012). To collect the urine, they place a rubber funnel almost like a hose in between the horse’s hind legs in order to be able to get the urine. The PMU farmers who do this think it is their last hope to keep their farm going. â€Å"On October 10, 2003, Wyeth Organics (Wyeth Inc.) started its first round of cuts in their PMU production contacts by notifying PMU farmers in Alberta, Saskatchewan and Manitoba that they’ll be reducing the number of ranchers who produce the urine by one-third† (Premarin, 2012). Premarin farms were never investigated for abuse until 1986; remember it started in 1942. The PMU  farmers try to breed their mares with stallions, hoping the foals will look more attractive, so they will sell easier at a sale. Killing Whales and Seals is also a pointless cause. This is why Peter dedicated his life to defending them. Just like poaching these sea lives, Premarin is a cruel way to make medicine for women going through menopause. Horses are being abused daily, and women are not aware of how it is being produced. Women going through menopause need to be aware of how Premarin is made, in hopes that they will not purchase it, so Premarin can no longer be produced.

Tuesday, August 20, 2019

Advantages Or Disadvantages To Popular Tourist Areas

Advantages Or Disadvantages To Popular Tourist Areas There is no doubt that modern tourism has become one of the biggest popular industries in the world nowadays. It is an activity in which people can recreate and relax themselves. Furthermore, it seems that tourism not only can improve the transportation and most public facilities of a country, but also it can improve local services such as entertainment, accommodation, catering and hospital for tourists and local people. For another thing, tourism stimulates the growth of local economy. Even more, large numbers of organizations and governments invest much money in this industry at present. However, this essay will elaborate advantages and disadvantages of the way in which modern tourism affects the popular tourist areas in relations to the local services, local economy and environment and the local people. For one thing, one major advantage of tourism is the fact that developing travel industry can stimulate the popular tourist areas consumption ability and economy. According to the OVTA, there are 12 million visitors who travel to Ottawa and consume 128million dollars each year. Moreover, the development of tourism leads to generating 45 million dollars income for the local government per year (Chase, 2011). In addition, China National Tourism Administration showed that there is a 15 percent increase of the price level of products which selling in the Middle East and Europe during the New Year holidays, compared to their daily price. However, these increases give some impacts on ecnomy and it is reported that in 2010, 52 million Chinese people travelled abroad (Lixia, 2011). For another thing, tourism industry either can increase peoples income and the rate of employment. As David Cameron says in Barnett (2010), if the UK tourism industry can attract 0.5% more international tourists, this could generate 50,000 new jobs for local citizens. Thus, it is obvious that tourism directly increase the employment rate because those industries like accommodation, tour, travel operations and factories manufacturing can provide large numbers of employment opportunities for the local people (Nworisara, 2011). These business operations invisibly generate large revenue to the government. Therefore, most countries or investors make huge investments in the tourism industry because of its potential of boosting economic growth. Thus, developing tourism industry is the main contributor of the stimulation of the local economy. Furthermore, tourism plays an important role on improving the living standards of the local people by improving communitys facilities and services. It can be seen that Hong Kong has become a famous and popular attraction, whether for mainland people or international people nowadays. What is more, it is reported that the Tourism Commission invested HK$50 million to improve the tourism infrastructural. For example, it would improve the scenic square, the public facilities at Lantau Ngong Ping 360, the pedestrian bridge at the east of Tsim Sha Tsui, and upgrade some tourism signboards for tourists. Besides that, Hong Kong would improve the services of online ticket-selling, which make more convenient for tourists (Mercier, 2009). There is no doubt that these kinds of infrastructures and facilities will considerably benefit for the local people and improve their living standards. Besides that, the transportation and public services have an impact on the tourism industry, which also influ ence the local peoples living standards and the tourism industry itself. Take Beijing as an example: in order to welcome the Olympics Games, the government of China made regulations to improve environment and repair the tourism resources, public services and facilities. During the period of Olympics Games, ten million tourists visited Beijing and there was no complaint or dissatisfaction with the hotels, public services and attractions (Alcantara, 2010). If facilities or services are not improved and cause tourists lots of inconvenient, this will easily push them to give up or change their travel plans. Finally, it seems that it is a good opportunity to protect the culture and heritage when developing modern tourism. The WTO estimates that there would be an increase of 15% in the areas of cultural tourism each year (Nworisara, 2011). Most tourists are willing to spend money to learn and understand different cultures and customs of different countries. Taking the European tourism industry as an example, a growing number of people prefer to visit Europe, especially Italy, France, Spain and so on. The main reason is that the governments of those countries understand the importance of the heritage and history of a country. It is a character or symbol of that country. Thus, the government is willing to spend money remodeling and restoring the heritage. For instance, the Indian government regarded Jammu and Kashmir as a heritage attraction for visitors. Thus, it foucused on it and started to protect it to attract tourists (Naseem, 2009). It is well know that protecting a countrys culture and heritage is a big challenge, but it is very important because they represent the identity of the country. Moreover, visitors can understand deeply the local culture only by visiting it. Thus, in order to attract more tourists to popular tourist areas, both the government and the tourism industry have a responsibility to preserve the local heritage and culture. However, firstly, it must be admitted that tourism brings many disadvantages. Without doubt the most obvious disadvantage is that tourism has negative effects on the local environment and the eco-system. For instance, it is well known that the Hawaiian eco-system is the most diverse in the world. Nevertheless, due to the development of tourism industry, a large number of infrastructures such as hotels and restaurants were built, leading to the local environments deterioration. Besides that, it is reported that 60% of animal and plant species are dying out in Hawaii (Darowski, Strilchuk, Sorochuk Provost, 2006). Bali is another example: it has been found that six tourist beaches, which include Kuta, Legian, Nusa Dua, Jimbaran, Tanjung Benoa and Canggue are contaminated. This is because the waste from hotels, restaurants and other hospitality and tourist-related businesses cannot be dealt with effectively (Kencana A., 2010). It is obvious that a lot of businessmen do not care if the e nvironment becomes bad, they just consider whether they can earn money or not. In addition, a number of tourists have the bad habit of throwing waste everywhere. Thus, the local environment becomes worse and influences the eco-systems. Secondly, tourism has a bad impact on the society and culture of the popular tourist areas. For example, it is well known that Indonesia is a special country which has a special cultural history. However, in order to attract more tourists and meet their needs, some original customs have changed, such as dances performed only in every 60 years while nowadays they are performed weekly. Besides that, original temples used to be quiet places while today they are always overcrowded with tourists. In addition, masks, costumes and jewelry which were used for religious rituals, have a special and unique meaning. In order to earn money, companies produce these productions largely and sell them in antique shops. Even more, most arts forms such as paintings and sculptures have been adjusted according to the taste of the current market. Furthermore, it seems that these cultural and social changes not only influence the local people, but also it may lead people to forget the original culture due to the commercial influences. For instance, in order to earn more money, investors have driven local communities out of their lands and even beaches, which influence the temples and local people of Bali. The resorts also would threaten the temples cosmological primacy (Wijaya, 2008). Thirdly, although the development of tourism has lots of advantages, however, it often do some unethical behaviors from local people and industry. For instance, when they lack employees in the peak season, some hotels and restaurants recruit low skilled people or people who are under 18 years old. Even more, lots of illegal migrants are working in tourism and hospitality industry. It is reported that there are around 12 million illegal immigrant people in the United States, and the American Tourism and Hospitality industry employed them because they would pay them a lower wage. In fact, it is argued that these illegal immigrants are substitutes for low-skilled workers (Fedeli, 2010). It seems that recruiting employees who are low-skilled and unprofessional is only benefit to the companies because they get low salaries. Actually, this is not good for the tourists because it easily causes troubles as these employees cannot deal with at urgent situations. Thus, it gives unsafe feeling t o the tourists and that leads to hinder the development of tourism industry and also gives a bad imagine to this popular tourist areas. In conclusion, it is clear that there could be great benefits to develop the tourist industry if governments and companies take the local environment into consideration. Furthermore, if all tourists obeyed the local rules and culture, the beautiful attractions will not be contaminated. What is more, if each person is aware of the importance of protecting our history and culture, the tourism industry can develop better and more and more people can have the opportunity to explore the history of the popular tourist areas. There is no doubt that developing tourism industry is essential and one of the reasons for this is that people can learn more about this world. Therefore, each person has a responsibility to protect the popular tourist areas. Word count: 1526

Those Winter Sundays :: Literary Analysis, Rita Dove

The poem â€Å"Daystar† by Rita Dove and the poem â€Å"Those Winter Sundays† by Robert Hayden have some similarities, but they also have some differences. These poems mainly deal with parenting and the parenting life as well as their own personal issues. Each parent in the two poems have their children’s best interest at heart, but the two very different parents in two different time periods deal with very similar issues. The poem â€Å"Those Winter Sundays† Robert Hayden expresses regret through this poem about his father. This poem is set when the speaker was a child which makes this poem older than from 1966. The poem is a reflection of his father years before. The speaker describes his father as a hard worker through the week and even on Sundays, which was a weekly routine. The speaker says, â€Å"Sundays too my father got up early / and put his clothes on in the blueblack cold, / then with cracked hands that ached / from labor in the weekday weather made / banked fires blaze† (Hayden lines 1-5). The speaker says, â€Å"Sundays too† (Hayden line 1) as if it were included like every other weekday. Traditionally, families rest and participate in other activities other than work on Sundays, but not the speaker’s father. His father worked hard no matter what state the weather was or his physical condition was, he had a family to care for, which was his objective. Next, the speaker says, â€Å"No one ever thanked him† (Hayden line 5). In the poem the speaker also says, â€Å"I would rise and dress, / fearing the chronic angers of that house† (Hayden lines 8 and 9). The speaker’s father was a hard working man only to care and provide for his family, but he did not receive any appreciation from them. Feeling unappreciated is very frustrating which could lead to being angry, especially when the ability to rest is out of reach. The speaker describes his feelings when he would wake up on Sunday mornings as a fearful child. He was a fearful because he knew his father would be frustrated. The father had callused and bruised hands that were painful, he was cold, and felt unappreciated. All the listed factors could build up and make anybody angry or frustrated. Regardless that his father was an angry man he obviously loved his family. The speaker says, â€Å"I’d wake and hear the cold splintering, breaking. Those Winter Sundays :: Literary Analysis, Rita Dove The poem â€Å"Daystar† by Rita Dove and the poem â€Å"Those Winter Sundays† by Robert Hayden have some similarities, but they also have some differences. These poems mainly deal with parenting and the parenting life as well as their own personal issues. Each parent in the two poems have their children’s best interest at heart, but the two very different parents in two different time periods deal with very similar issues. The poem â€Å"Those Winter Sundays† Robert Hayden expresses regret through this poem about his father. This poem is set when the speaker was a child which makes this poem older than from 1966. The poem is a reflection of his father years before. The speaker describes his father as a hard worker through the week and even on Sundays, which was a weekly routine. The speaker says, â€Å"Sundays too my father got up early / and put his clothes on in the blueblack cold, / then with cracked hands that ached / from labor in the weekday weather made / banked fires blaze† (Hayden lines 1-5). The speaker says, â€Å"Sundays too† (Hayden line 1) as if it were included like every other weekday. Traditionally, families rest and participate in other activities other than work on Sundays, but not the speaker’s father. His father worked hard no matter what state the weather was or his physical condition was, he had a family to care for, which was his objective. Next, the speaker says, â€Å"No one ever thanked him† (Hayden line 5). In the poem the speaker also says, â€Å"I would rise and dress, / fearing the chronic angers of that house† (Hayden lines 8 and 9). The speaker’s father was a hard working man only to care and provide for his family, but he did not receive any appreciation from them. Feeling unappreciated is very frustrating which could lead to being angry, especially when the ability to rest is out of reach. The speaker describes his feelings when he would wake up on Sunday mornings as a fearful child. He was a fearful because he knew his father would be frustrated. The father had callused and bruised hands that were painful, he was cold, and felt unappreciated. All the listed factors could build up and make anybody angry or frustrated. Regardless that his father was an angry man he obviously loved his family. The speaker says, â€Å"I’d wake and hear the cold splintering, breaking.

Monday, August 19, 2019

The Scarlett Letter :: essays research papers

Symbolism at it's best is limitless in conveying a feeling, mood, or atmoshphere that words alone can not define. It can trigger emotion, persuade the reader to question everything they know thus far, or inflict thoughts that, in the most twisted sense of the story, would seem barely justified. Symboloism reaches out to the reader in numerous ways, but no matter what the effect, it's almost always starts as something subconscious. In Nathanial Hawthorn's novel, 'The Scarlet Letter,' there is an immense ammount of symbolism; the structure and flow of progression are both held back by this element. The subtle way Hawthorn uses this is incredible; he takes us to such a place where everything and everyone is suspect and subject to thorough examination, as things are not always what they seem. Other times, however, they are in fact exactly what they seem; usually too little too late. By the time the truth is laid outright, the truth had already been known; symbolism is subconscious. At t imes when there is no truth to be uncovered, it is the world created by this world of various entities, in a matter of symbol, that lies dormant in the back of the readers head. Being fully and inescapably aware though, from a place deep inside, of the uncertanties and illusions that are not being focused on, instead only hinted at. The mind's eye is where symbolism wraps it's ugly tentacles of doubt and discretion, whether realized by the reader or not. 'The Scarlet Letter,' demonstrates this characteristic impecibly.   Ã‚  Ã‚  Ã‚  Ã‚  The scaffold where Hester stands in front of the public is symbolic of penitence and God's judgement. Dimmesdale on the other hand, can not bring himself to stand on the platform and confess his sins, because of it's comparison to judgement day. The first time he brings himself to stand upon the scaffold, seeking relief from his secret sin is under the cover of night, as if he could hide his sin from the people, or even God. In the end Dimmesdale does stand on the scaffold in the light of day to public confess his sins. This took courage, as the platform represented weakness in the eyes of God.   Ã‚  Ã‚  Ã‚  Ã‚  Across from the prison Hester was sentenced to there is a rose bush; the single beautiful thing in a world of sin and shame. In the book when Pearl was asked where she came from, she states that she was plucked from the rosebush.

Sunday, August 18, 2019

Evolution vs. Creation Essay -- essays research papers

Don’t Monkey Around in Class   Ã‚  Ã‚  Ã‚  Ã‚  Ã¢â‚¬Å"In the beginning, God created the heavens and the earth† (Gen. 1:1). Words of this nature have been questioned for thousands of years—by naturalists, materialists, humanists, etc.—and, in more recent times, have led to court cases, heated arguments, and public debates. The major debate intended to be covered in this piece is that of whether or not evolution should be taught in classrooms. Also, if it is to be taught, should it be taught as fact or theory? It is also intended to present enough evidence to disprove evolution altogether and, as a result, make it much less than a theory, but actually the vain opinions of a man who chose not to accept the truth.   Ã‚  Ã‚  Ã‚  Ã‚  The entire point of this essay is to breakdown the theory of evolution, invalidate its scientific reliability, and support the necessity of showing its errors and inaccuracies in classroom textbooks side-by-side with creationism. To date, evolution is being taught in public schools as the only theory of origins. Creationism must be included as the only alternative and evolution discredited because of its invalidity. On the other hand, Steve Edinger, a biologist at Ohio University, warned members of the House Education Committee about presenting alternative evidence against evolution, saying it â€Å"was not scientific† and disservices the students. He continues, â€Å"One would wonder what would happen if a teacher spent half a period explai...

Saturday, August 17, 2019

Analysis of learning outcomes with web-based tools

Research QuestionThe past research has shown that the experimental groups learning outcome was higher than the control group. However the follow-up questionnaires and interviews three months after the post-test showed that both the experimental and control groups seemed to retain the same amount of information and procedures learned in the session.The experimental group did show that they coached others more, deliberately applying the procedures and following up with the provided web-site for reviews. Our research will review the two group’s ability to retain the information for long points of time and which method provides the best long term retention rate. The research problem will review if web-based learning tools will help the one group retain the information longer we will retest both group in 6 months and 12 months. Does the use of web-based learning tools provide employees with a source to help them maintain knowledge learned longer? PurposeTo write a quantitative purp ose statement, we must first start with our general topic, which in this case is, interpersonal communication skills. We must include the variables (what are the outcomes and what factors influence those outcomes?), the participants in the study and the research site. As we narrow our topic, we see from the information given that we want to focus our investigation on using web-based instruction to teach interpersonal communication. The study will be conducted for the employer, so we know the subjects will be the employees   of ABC Corporation. We know that a good purpose statement takes the form of â€Å"the effect of x on y†.With the above information in mind, our purpose statement becomes: â€Å"The purpose of this study is to examine the effect of web-based instruction on the acquisition and application of interpersonal skills for employees at ABC Corporation†.Literature SearchThe research question addresses the use of web-based tools and how they can help profess ionals in a work environment learn and retain information better. Researching other companies and how their use of web-based tools have helped improve production, time management, communication skills, and the impact on return on investment would be the main groups of literature research to review.Looking at the different types of research is needed to create a concrete research paper. Benchmarking other companies, colleges and how they are using technology to improve the learning environment of their students, and technology sites to find out what changes in online tools are being developed. Because this research is using adult learners it is important to look at research from college level up. Most research on children and the use of web-based tools would not be useful. If the impact that we show can be compared to the impact other companies have seen then the data that our research fines will be more concrete. There are standard that we will have to follow before the research can even begin. We will need to review the professional ethics in educational assessments and also the ethical standard for developing the research. Review of the accreditations of all research papers we review is also important. When using a quantitative study it is important to justify the research problem and to compare the results with the prior predictions (Creswell, 2005).Ways to Collect DataThe researcher would have to get permission from management to do a research study. They need to determine if employees who have access to a web site after their training retain more information? The representatives of the study would be the employees who went through the four sessions on improving interpersonal communications in the workplace using the web-based tools and the control group that did not use the web.The researcher will show that longer term retaination of information can be enhances by using the web supported tools. Neither group will know they are participating in a planned study because if the study was know ahead of time people would be able to prepare and that would effect the data collected. A quantitative should be used because we will have to compare groups against each other. Managers should fill out questionnaires when employees access web sites. Did the employees solve problems without management becoming involved? Were employees without web sites able to solve problems as often as the web group? Information should be put into categories, those with web support and those without web support. Interviews and Likert scales could be used to evaluate the employees’ use of the web site. Tally sheets and logs should be kept each time a problem is solved with or without web site usage. A checklist inventory or assessment should be used each time a problem is solved with or without using the web site. A numerical chart can be used to compare the results after three months and six months. After the first three months the learning outcomes of the experimental group was higher. This could be shown on a chart or graph. Ten out of forty-four employees were using principles that they had learned. While only 3 out of 50 participants of the control group used knowledge they had learned. Post survey scores increased by 30% over pre survey scores for the experimental group. Observations of the employee’s behavior should be monitored. The groups should be compared at the end of three and six months to see which groups are doing the best job of retaining what they have learned. A personality assessment could also be used to determine if employees using the web site will continue to retain their training information. Data AnalysisThe data analysis process would consist of both quantitative and qualitative methods. The quantitative and qualitative data for both groups would be measured against their baseline abilities. This means that changes would be measured first against the behaviors practiced by each group before the intervention took place (for example, the 30% increase over pre-survey scores). Then, the intervention and control groups would be measured against each other in order to identify whether the changes that took place might be said to have occurred as a result of the web-based instruction.The quantitative data measurements would inclu de not only comparisons of the number of persons reporting their use of principles acquired at the seminar (that is, 10 against 3), as this would give a slightly less optimistic outlook for the technology intervention. Rather, percentages will be computed, which would generate a ratio of approximately 23:6 (23% vs. 6%) in favor of the experimental group.Qualitative analysis could be measured by constructing questionnaires that require the respondents to rate their current communication levels using a Likert scale and then applying quantitative measures to tell how many people (compared with baseline levels) detect an improvement in different areas. The questionnaire could also include areas that allow them to comment on the extent to which the improvement has taken place and the areas in which the intervention helped the most. Where verbal descriptions of changes are given, similar responses might be coded and grouped together. The number of occurrences of key words would be noted a s well as the use of qualifiers, such as â€Å"best,† â€Å"somewhat,† â€Å"significantly† or â€Å"dramatically†.Findings and RecommendationsThe problem of the research would be stated and detailed background information given to provide the reader with the proper foundation for the full comprehension of the research. Next, a review of the literature would follow, and this would allow the reader to expand his/her knowledge concerning the current trends and understandings about the subject as they prevail in the general academic circles. It would also grant the writer a chance to demonstrate his/her expertise on the topic.A description of the methodology would explain the methods of data collection and clarify the reasons for choosing these. This would include a description of the population sample, the intervention site and methods, and any other details that pertain to the study. It would also outline any limitations of the research. The findings would then be explicitly presented and a discussion of these findings would ensue.The discussion would include the discovery of any trends and an explanation of why these trends are believed to have occurred. After this, a conclusion would be given that would summarize the main points of the study. Finally, recommendations would be given, both for future intervention (through computer-based instruction) as well as for extensions of the study (such as conducting a similar study on younger persons who already have excellent exposure to technology to find out if results would be even better.) In short, the research would follow (more or less) the Trochim format: introduction, literature review, methods, results/discussion, conclusion/recommendations. ReferencesCreswell, J. (2005). Educational Research: Planning, Conducting, and Evaluation Quantitative and Qualitative Research. New Jersey: Pearson Education Inc. Retrieved September 26, 2006

Friday, August 16, 2019

Development of renewable energy sources Essay

Unlike solar energy, wind power grown faster the last couple years and is today the environmentalists preferred alternative energy source (Bradley 1). Paul Brown writes, Sebastian Seidel 3 â€Å"Electricity production [in the U. K. ] from wind leapt by 31% last year, making it the fastest growing industry in the field of power generation† (1). Every year, the amount of electricity produced by wind power is increasing, especially in the USA, Germany, Denmark and Spain (Brown 1). The improvements made in wind power generators in the past years, has led to more efficient wind mills. James Flanigan describes, â€Å"[a] single windmill generator today is capable of doing the work of 10 windmills of the 1970s, when wind power experiments began† (2). He adds, â€Å"Wind generation can deliverer electricity at 3 cents to 6 cents a kilowatt-hour† (2). This is a lot less than the average electricity price paid in the U. S. today. But although wind power seems to be the ideal energy source, environmental activist who were promoting alternative energy in the past now have doubts about wind power. Robert L. Bradley reasons in his article, that â€Å"[w]ind blades have killed thousand of birds in the U. S.and abroad in the last decade, including endangered species† (2). Like any human made construction, wind blades are a threat to birds, but so is any electricity line. The Altamont Pass wind-power plant in California is a good example of a misplaced wind power facility. Hardly any research about the animal environment was done when the windmills were set up. But even if one project has a bad impact on the environment and wildlife, wind power has still countless good aspects (Bradley 2). Therefore Hal Harvey, president of the Energy Foundation, declares, â€Å"[w]e’ve found the holy grail: wind is now cheaper than any fossil fuel-based. Sebastian Seidel 4 power source† (qtd. in Linden 1). Hydro-Power means making electricity from water power. In his article, Stuart Baird declares, â€Å"Hydro-Power is currently the world’s largest renewable source of electricity, accounting for 6% of worldwide energy supply or about 15% of the world’s electricity†(1). It has been known to be one of the cleanest ways to produce energy, because it does not produce any exhaust fumes or waste of any kind. As Baird adds, â€Å"hydro-power is better than burning coal, oil or natural gas to produce electricity, as it does not contribute to global warming or acid rain† (2). Another benefit is that it helps to control water, for example with dams. But hydropower dams also have negative environmental impacts, such as blocking fish movements and decreasing water quality. Another disadvantage of this technique is â€Å"the flooding and destruction of entire ecosystems† (Baird 2) and the â€Å"increase of bacteria in the water due to decaying vegetation, which can be harmful to the fishes and to those who eat them† (Baird 4). Like solar- and wind-power, Hydro-Power has many good as well as a few bad aspects. The problems mentioned above result from unplanned, bad managed and oversized hydro-power systems. But, if a dam is well sited, well operated and kept reasonable in size, these environmental impacts can be reduced though not eliminated. Renewable energy has many good as well as many bad aspects. Today most of the electricity comes from coal-, gas- and nuclear-plants. Still, the percentage of electricity made with renewable energy is growing every year. Canada for example adds â€Å"60%† of Sebastian Seidel 5 energy made by hydro-plants to the national grid (Baird 1) and Denmark satisfies 18% of electrical demand with electricity produced wind-power (Brown 1). Within the few next years, due to technical improvements and cheaper production methods, the percentage of renewable energy added to western countries demand will rapidly grow. But lots of research has to be done until then to limit the negative impacts on the environment. Sebastian Seidel 6 Baird, Stuart â€Å"Hydro-Electric Power. † Energy Educators of Ontario 1993. 15 Jan. 2002. Bradley, Robert L. â€Å"Dirty Secrets of Renewable Energy. † USA Today Magazine May 1998. 14 Jan. 2002 Brown, Paul â€Å"Wind power use grows by 30%. † The Guardian 10 Jan. 2002. 17 Jan. 2002. Flanigan, James â€Å"Getting serious about Earth-Friendly Energy. † Los Angeles Times June 2001. 21 Jan. 2002. Greenwald, John â€Å"Energy: Here comes the sun. † Time 18 Sep. 1993. 15 Jan. 2002. Kozloff, Keith Lee. â€Å"Rethinking development assistance for renewable electricity sources. † Environment Nov. 1995. 15 Jan. 2002. Linden, Eugene â€Å"Selling the Sun†¦ and the Wind Renewable energy has come of age-but it’s mostly foreign companies that are making money on it. † Time 16 July 2001. 15 Jan. 2002.

Thursday, August 15, 2019

Bullying Essay

Since the hands of time school bullying has been a problem in the school system, recently adding a new layer due to the advances of technology, innovations that challenge the whole infrastructure of educational purpose. Precomputers and cell phones, bullying could only be classified as physical or psychologically abuse on someone that could only be inflicted by face to face contact. Now in today technology age forms a new way of bullying without actually being in the same room or even knowing the individual. Bullying use to consist of physical beating or embarrassment like putting a kid in the garbage can but technology, created to further enhance the mind, became another distraction for the mind because bullying can be done from a distance you don’t even have to be in the same state or even know the person which makes it more difficult on the victim. Every pro has a con and in this case a major one, this method of bullying may be more traumatizing so I will compare and contrast the two types of bullying. This paper will make you decide what side is worse and will show you the comparison but after reading you should want to put a stop to bullying. First, let’s start with physical bullying because of the fact it was the first form of it. In past years, bullying consisted on the size and popularity of someone being less than the so called â€Å"cool† crowd. As time progress formed the mental aspect of bullying, which I feel is more detrimental. My mind is the actual driving for my body that controls our way of living, lower the self-esteem of an individual actually hurts more than any physical blow you could muster up. The progression of using the mental aspect of bullying became more popular because children subconsciously know what hurt more and prey on it. Cyber bulling is usually done by someone who is jealous of another and wants to embarrass them this form is mostly used in high school. Posting embarrassing pictures or videos on social network is common example this is so affective because everyone has a Facebook or twitter in today’s society so more eyes see it making it harder for the victim to overcome it. Secondly, although physical bullying is very harmful it’s also less abusive than cyber bullying because of a number of reasons; first off, with physical bullying you know of your actual bully enforcing the problem. With that information you could eventually take a stand and take of the problem yourself or ask for assistance from your guidance teacher or someone with authority. Also physical bullying and physiological bullying pretechnology didn’t in my opinion last too long. The time frame didn’t last long because before the bully usually bullied multiple people kind of taking the pressure off of you faster than just one individual. All emotions have a time limit in which time could only heal, so physical and mental wounds healed faster pretechnology than it do today. Traditional bullying has to be stopped because some kids are afraid to go to school because of the physical bullying this consist of taking lunch money, tripping or pushing in the hall or into lockers, knocking buts down to cause embarrassment even teasing people because of their weight or clothes is a form of traditional bullying and believe it or not traditional bullying affects the rates of students not graduating because they are fed up and can’t take it no more so they drop out of school. Finally, the most interesting fact of traditional bullying is why they do it. Statistics say most people who bully people have or are being bullied in their life. This interesting because if a person knows how that makes another human feel why they would force the hurt and miserable life on others. Bullies also bully because of problems at home like child abuse so they take it out on other peers. Stress can also cause people to bully because they so filled up with anger and having no one to talk to the result to bullying. Physical bullying is not only in schools it also at jobs to but no matter where you can find it at it needs to be a stop to it because it makes people miserable. Basically all traditional bullying problems are within the bully it has to do with their emotion they release on others. Physical bullying is more painful and life threating then cyber bullying and it also builds a sense a fear because they know the actual person bullying them, this can have a tremendous affect in people life because it lowers self-esteem. These are reason why traditional bullying is still affective if authorities use this to get to the bottom of bullying it can be decreased or even voided but being that our world is so advanced the bullying we should be worried about is cyber bullying which is more common because of technology. Cyber bullying has taken away some of the toughness of bullying because now you could do it from miles or even country spans away. Technology really up the antics making it more widespread than ever, with cell phones, tablets, and lap top along with the allegiance of social networking a rumor spread like a virus in its effect. A simple text became a new viral experiment that went wrong once adolescent got their hands on it. Same agenda chasing popularity and fame, but lost the ability to challenge someone face to face is one of the scariest evolvements of technology. Now you, in most cases, don’t even know who’s bullying you making it harder to pin point the problem in which it started. Cyber bullying is still a form of bullying but it’s just the mental aspect either way the victim still feels the pain. Internet bullying causes low self-esteem, emotion distress, and total embarrassment where as traditional bullying can cause emotional problems but is mostly physical pain more of the punching and physical contact end. Cyber bullying will get worse before it get better, new policies are in place but do little to change the outcome which come to the conclusion that cyber is nowhere near its peak. Internet bullying has taken away from the physical aspect but the emotional aspect of cyber bullying is far worse. Since technology is the face of the world so cyber bullying is so powerful rumors, gossips, and pictures can be uploaded on the web in seconds. There is several reports some are local about high schools uploading a naked picture of a girl on Facebook or sending to phone to phone in high school and this can lead to horrible emotions or dropping out of school do to humiliation. Even bigger all over the news a Rutgers University student committed suicide because of cyber bullying. He was secretly filmed kissing another male and his roommate puts the video on twitter with the caption â€Å"just found out my roommate is gay†. This was obviously something the student wasn’t ready to tell the world so with built up emotions he jumped off the George Washington Bridge. Clementi death bought national and international issue to cyber bullying and the struggles it’s facing. But it shouldn’t take death of a student to realize the degree of cyber bullying its pros and cons to both types of bullying I just feel cyber bullying is worse because of the generation we live in today and technology is so powerful in seconds the world can see what someone uploaded on the web. Finally, the most important fact of cyber bullying is the reason why they do it because it can be ended if we address it. These reason differ from physical bullying because it to different types of bullying. Cyber bullying comes from people who are jealous of your lifestyle and want to ruin it because their life isn’t as well as yours. Cyber bullying is also triggered by peer pressure they want to be â€Å"cool† and do what everyone else is doing but maybe if people put themselves in the victim shoes they wouldn’t do it. The most common one is from teenagers and their peers they take cyber bullying as a joke or for fun and they also think they will earn respect but who would or should respect anybody who lessens someone as a person. No matter what end of the bullying your child is on, you need to make sure that you are doing your part to prevent and stop this because bullying is a serious matter. Even though the two types of bullying have pros and cons the different types of bullying cause different types of insecurities to others but they all are tremendous and all are major and it’s up to peers, adults, and society to stop bullying. â€Å"Bullying builds character like nuclear waste creates superheroes. It’s a rare occurrence and often does much more damage than endowment. †