Wednesday, October 30, 2019

Global Integrated marketing communications Essay

Global Integrated marketing communications - Essay Example the IMC is indeed important but not to the same levels as the MC is since the MC looks at all the different angles of marketing the brand, which could be the product and/or service or a combination of both, in certain instances. The integrated marketing campaign cannot be successful if the different deliverables are not put in a direct fashion towards the target audience; no matter it is the primary one or the secondary target market. The marketing plan however remains the key in such a situation and it cannot be counted off, no matter how difficult the undertakings or executions of the IMC turn out to be. IMC and MC must go hand in hand towards a successful execution of the product and/or service’s message geared towards the relevant target audience. Message consistency is indeed a significant aspect of the integrated marketing campaign since the old campaigns might just get mixed with the newer campaigns that are brought forward by the relevant brand, which could either be a product or a service and in some cases, a hybrid also works to some effect. The message must remain geared towards a selected target audience as this ensures that there are no shortcomings on the part of the people for which the message is put out, in the first place. With that, we must understand that a well balanced IMC campaign looks to plug the shortcomings which usually arise in the wake of changing messages and when certain strategies and tactics are amended for one reason or the other. The reasons could be aplenty but the most important thing here to understand is the fact that the message must remain synchronized and there are no double meanings or embedded messages beneath the new campaign brought forward by the product and/or service. Message consistency within an effective and efficient IMC campaign suggests that the brand team has done its homework well and that there are no hindrances in the wake of it achieving short term benefits and long term, strategic profits. An IMC

Monday, October 28, 2019

Organic vs. non organic Essay Example for Free

Organic vs. non organic Essay Organic vs. non organic There is a vast majority of food in our world today, when we consume this food we must stop to think about what exactly it is made of. In today’s society we are always looking for the best healthy foods that are available to us. We want good, nutritious, healthy foods so that we can live a long and healthy life. We live in a world where we have fast, cheap and processed foods all around us. Have you ever considered going a different route? Organic is a different way to eat, a way that could change the way you live your life. While all types of foods are beneficial to the body, organic and non organic foods differ in the way that they are farmed, grown, and packaged. This information can hopefully give you an insight to a better way of life. America is slowly becoming a nation of a population of obese sick people. What we are eating everyday affects our health. Foods are full of preservatives and unhealthy that people eat more junk than food. Did you know that foods are packed with preservatives, sugars and fats that make people addicted to the foods? We are always seeking the quickest cheapest foods even though they are not healthy for us just to save some time. People become overweight do so because of poor eating habits not knowing that there are consequences in doing so. There are diseases that come along with making these poor eating choices. Some of the diseases related to overweight are heart disease, high blood pressure, diabetes; breathing problems and trouble sleeping. Some people seem that we are stuck eating foods that make us overweight and obese. There are however ways to eat healthier. There are foods that are all natural, they are called organic foods. Organic foods are farmed in natural ways than non organic foods. Non organic food has to be grown very quickly to meet the consumer demand and there for is grown with chemicals that make it grow faster. Non organic farmers are allowed by the FDA to use steroids, pesticides and fertilizers in their food products. Even the soil gets contaminated with these harmful products. Non organic farmers contaminate the soil with the over use of fertilizers and pesticides and have polluted our waterways. On the other had organic farmers can use a farming method that does not harm the environment. Organic famers use the natural way in their farming systems. Organic farmers use the land that has not had any pesticides or fertilizers in the soil in the past three years. Crops are rotated from field to field instead of growing the same crop over again. There are alternative ways to eat food. There are foods that are grown all natural, they are called organic foods. When you think of organic, do you think it has to be held to a certain standard? Certain requirements have to be met for a food product to be certified organic. When a farmer grown their crop their crop differs from the way non organic foods are grown. Organic food tends to have more insect damage that non organic food because since no pesticides are being used on their crop it is harder to keep the insects from damaging the crop. Non organic food can grow at a much faster rate and have less damage done to the food because it is grown with pesticides. One of the standards to be certified organic is to be cage free. Cage free is when the animal is not confined to a cage; it is allowed to roam freely. Non organic animals are mostly in cages so they can be able to produce more food faster. Many people do not like the fact that animals are caged up and are sometimes treated badly in order to produce the food they need. When you go to the grocery store and buy a food product you should stop to see what the packaging material is made of. Most producers use recycled products to package their food products. Organic foods and non organic foods differ in the way that they do their packaging. One bad thing that comes to mind about organic food is that it can travel hundreds of miles to get to the grocery store. Non organic food can have the convenience of coming from local farmers that may not grow organic but are grown locally. Non organic food on the other hand may travel to get to the store because there are really not that many locally organic farmers. When we think about our planet we try to think of ways to be less wasteful. Organic foods try to use less wasteful materials concerning packaging their foods. Organic producers try to use recycle material and try to use eco friendly material. Non organic producers can sometimes use recycle materials but are not considerate of the waste they produce in the making of the packaging material. As where organic producers they consider every last detail to make sure they do not affect the environment as little as they can. This is a good thing because we want to make sure we do not affect our planet with all our trash we accumulate in our life time. We must eliminate the trash we leave behind in order to leave our planet clean for our children and their children. If we do not do something about the wasteful material we leave behind we might leave a big mess for our children and grand children to clean up long after we are gone. There has been much controversy about whether organic food is better than non organic food. Honestly one has to make their own personal decisions about what they choose to eat. No one can make that decision for you. Organic is less harmful to the environment and non organic has to produce such large amounts that it can be hard to do that without having some effects on the environment. Remember what we put in our body is important because we want to do whatever it takes to be as healthy as we can be in order to live longer. So if organic food is the right choice for you then you should do it in order to live a long and healthy life.

Saturday, October 26, 2019

With particular reference to the novel opening, how does Jane Austen Es

With particular reference to the novel opening, how does Jane Austen present the role of women in pride and prejudice? Pride and Predujice With particular reference to the novel opening, how does Jane Austen present the role of women in pride and prejudice? Pride and prejudice was first published in 1893, this was a time when it just became acceptable for women to write and publish books. Pride and prejudice was set in the early 19th century in rural England. Pride and Prejudice is the story of Mr and Mrs Bennet, their five daughters, and the various romantic adventures at their Hertfordshire residence of Longbourn. I feel that Jane Austen successfully portrays the Age of Reason through her characters in Pride and Prejudice. I think this was the main purpose Jane Austen wrote this novel was to criticise society and the role of women in the 19th century. Jane Austen's novel surrounds the lives of middle class woman at the time; the female characters are often associated with marriage and money. Firstly the views of marriage and social class in the society of 19th century England were very different from views in modern society of today. In 19th century England there were two main concerns about marriage, to marry for wealth and stability. In the novel, Jane Austin stressed that marriage was not an act of love for most people in that age but and merely an act of survival, high ranking, and a place in society. Strong evidence which very well exemplify the general feelings against marriage for the period is the marriage of Charlotte Lucas to Mr. Collins. As she quoted:" I am not romantic you know. I never was'' yet she still agrees to marry Mr Collins. Charlotte is the main representative o... ...riage. Through the words of her novel Austen evidently criticises women in the 19th century I feel Jane Austen is a very brave novelist who confronted very controversial issues. Jane Austen presents woman as they are, she wrote the truth about how women were seen as weak and how the male population dominated everything. At the time image and social class was everything, and Jane Austen emphasises on this the whole time. Austen indicates through characters and literary devices how she disagrees with society. Austen mocks aristocracy through the presentation of Lady Catherine de burgh; she exaggerates her character to the full extent. Her arrogance is highlighted by the way she addresses other people. Jane Austen created effective characters like Elizabeth and Lady Catherine, they are crucial to the play as they both symbolize different types of woman.

Thursday, October 24, 2019

Manage Recruitment, Selection & Induction Essay

Question 1: Explain the role of probation as part of the recruitment process. All new staff employees are required to serve a probationary period. The probationary period allows the Department and the employee the opportunity to assess each others suitability. It is the responsibility of the Supervisor to continually review the services of staff on probation. An employee must be consulted if there are any problems with performance. Question 2: Explain the term ‘merit selection’ and its implication on equal employment opportunity. Selection based on merit is where the best possible match is made between qualifications, knowledge, skills, abilities and relevant experience of the applicants, and the selection criteria in the Position Description. When assessing applicants, only selection criteria are taken into account; that is, unlawful discrimination based on other applicant characteristics must not occur. In the case of casual and sessional staff, merit is determined by assessing applicants qualifications, skills, knowledge and experience against the duties to be performed. Question 3: Explain the relevant terms and conditions of employment. Not every code of practice of the employer which is referenced within the contract may have any force, but rather, can be used as a guideline. Therefore, when considering whether or not a specific document imposes contractual obligations, the test to be applied in determining intention, is whether a reasonable person would come to the conclusion that the person making the promise, had the intention of being bound by the statement. Question 4: Explain at least 2 valid psychometric testing that you can use in your selection process. Aptitude or Ability Tests Aptitude or ability tests provide information on a person’s ability to perform certain tasks and their potential to learn and understand new information and tasks. The tests cover skills such as: Verbal reasoning (critical evaluation of written information) Comprehension/grammar Numerical reasoning (logical interpretation of numerical and statistical information) Abstract, mechanical or spatial reasoning (pattern recognition) Information checking (checking errors / attention to detail tasks) IQ (how quickly you can learn and master a new task) They can be designed to indicate suitability for specific tasks eg computing, keyboard or foreign?language skills. Work style questionnaires (personality/motivation/Emotional Intelligence) Work style questionnaires or inventories are concerned with how you typically behave, such as?the way you relate to others or the way you approach and solve problems. They generally?explore personality characteristics relevant to the world of work. To answer the questions you often need to think about what you would do in a work situation. If you have no formal work experience, think about how you behave in similar situations such as voluntary work, university activities or when you are participating in your hobbies. Work style questionnaires look at factors such as: Ways of thinking, feeling and acting in different situations Interpersonal style, conflict style, leadership style Patterns of coping with stress Interests – how much do you like carrying out various types of activities at work. Motivations – look at the energy with which you approach your work, and the different conditions which increase or decrease your motivation. Work values– what factors make work worthwhile for you How you interpret your own and others emotions and behaviours Question 5: A. Explain the term outsourcing? Outsourcing is the act of one company contracting with another company to provide services that might otherwise be performed by in-house employees. Often the tasks that are outsourced could be performed by the company itself, but in many cases there are financial advantages that come from outsourcing. Many large companies now outsource jobs such as call center services, e-mail services, and payroll. These jobs are handled by separate companies that specialize in each service, and are often located overseas. b. What functions can Human Resources outsource in terms of recruitment selection and induction, please states advantages and disadvantages of each. Functions include: – Employee assistance/counseling – Retirement planning help – Pension administration – Temporary staffing – Background checks – Training and management development programs – Executive development and coaching – Health care benefits administration – Employee benefit administration – Payroll – Risk management – Executive staffing – Employee relocation – HRIS selection, training implementation – Recruitment – Executive compensation and incentive plans – Policy writing – Administration of compensation/incentive plans – Wage and salary administration Advantages Brings new ideas/talent into the organization get needed competencies Helps organization get needed competencies Provides cross-industry insights May reduce training costs Helps organization meet equal employment opportunity/affirmative action goals Disadvantages May result in misp lacements? Increases recruitment costs? May cause morale problems for internal candidates? Requires longer orientation or adjustment time Question 6: Research the following links to assist you in your answer. a) What is the role of the HREOC? Leading the promotion and protection of human rights in Australia by: Making human rights values part of everyday life and language. Empowering all people to understand and exercise their human rights. Working with individuals, community, business and government to inspire action. Keeping government accountable to national and international human rights standards. Securing an Australian charter of rights. b) What types of complaint can you make to the Commission The Australian Human Rights Commission can investigate and resolve complaints of discrimination, harassment and bullying based on a person’s: Sex, including pregnancy, marital status, breastfeeding, family responsibilities and sexual harassment Disability, including temporary and permanent disabilities; physical, intellectual, sensory, psychiatric disabilities, diseases or illnesses; medical conditions; work related injuries; past, present and future disabilities; and association with a person with a disability Race, including colour, descent, national or ethnic origin, immigrant status and racial hatred Age, covering young people and older people sexual preference, criminal record, trade union activity, political opinion, religion or social origin (in employment only) c) Human Rights and Equal Opportunity Commission Act 1986 Grounds of discrimination – Breaches of human rights by any Commonwealth body or agency and discrimination in employment on the basis of race, colour, sex, religion, political opinion, national extraction, social origin, age, medical record, criminal record, marital status, impairment, disability, nationality, sexual preference, trade union activity. Areas covered – Commonwealth body or agency; employment and occupation. Process for decision making – Complaint must be in writing. It is then assessed and if within jurisdiction is investigated. If complaint is not declined, conciliation is attempted. If it cannot be conciliated, the Commission prepares a report to the federal Attorney General who then tables the report in Parliament. Question 7 : Summarise the national 10 privacy principles. There are ten National Privacy Principles (NPPs) that regulate how private sector organizations manage personal information. They cover the collection, use and disclosure, and secure management of personal information. They also allow individuals to access that information and have it corrected if it is wrong. NPP 1: collection – Describes what an organization should do when collecting personal information and what is told to the individual on collection. NPP 2: use and disclosure – Outlines how organization discloses and uses individual personal information. Under certain conditions and organization doesn’t always need the individuals consent to disclose personal information. NPPs 3 & 4: information quality and security – An organisation must take steps to ensure the personal information it holds is accurate and up-to-date, and is kept secure from unauthorised use or access. NPP 5: openness – An organisation must have a policy on how it manages personal information, and make it available to anyone who asks for it. NPP 6: access and correction – Gives individuals a general right of access to their personal information, and the right to have that information corrected if it is inaccurate, incomplete or out-of-date. NPP 7: identifiers – Generally prevents an organisation from adopting an Australian Government identifier for an individual (e.g. Medicare numbers) as its own. NPP 8: anonymity – Where possible, organisations must give individuals the opportunity to do business with them without the individual having to identify themselves. NPP 9: transborder data flows – Outlines how organisations should protect personal information that they transfer outside Australia. NPP 10: sensitive information – Sensitive information includes information such as health, racial or ethnic background, or criminal record. Higher standards apply to the handling of sensitive information. Question 8: List the elements contained in a contract of employment. The full name of employer and employee The address of the employer The place of work The title of job or nature of work The date the employment started If the contract is temporary, the expected duration of the contract If the contract of employment is for a fixed term, the details Details of rest periods and breaks as required by law The rate of pay or method of calculation of pay The pay reference period for the purposes of the National Minimum Wage Act 2000 Pay intervals Hours of work That the employee has the right to ask the employer for a written statement of his/her average hourly rate of pay as provided for in the National Minimum Wage Act 2000 Details of paid leave Sick pay and pension (if any) Period of notice to be given by employer or employee Details of any collective agreements that may affect the employee’s terms of employment

Wednesday, October 23, 2019

Leadership of Howard Schultz Essay

† Howard Schultz for President? â€Å". Howard Schultz, who is a founder & CEO of Starbucks has showing concern about the future of Americans. His recent activities including boycott the political donations, until Washington, D. C coming up with some â€Å"real effort† to reduce the debt ceiling. Disappointing with the U. S political leaders as they failing to act appropriately while America’s confidence is faltered. By looking at the past, the Starbucks CEO has indeed achieved a remarkable milestone, from a sales person in Xerox Corporation in 1979 and to today, a massive green giant astonishing leader. All this footprint certainly is not coincidence or miracles. In the past, economy volatility, US recession, consumer demand instability struck his business beyond all recognition. Despite all this pitfalls, this premium coffee maker able to embrace the resistance and continue serving quality coffee every corner till today. Looking at his context ,all these demonstrates that his business understands the concept of â€Å"ostrich syndrome†, meaning by burying their head in the sand when facing criticism. And such, Howard now challenge the leadership style adopted by the U.  S government by not hearing the heart of the Americans. The question here is, â€Å"Can his leadership style fit perfectly in the political field†? Many critics claimed this is total different ball game, not just about coffee bean. As Howard apparently lack of political experience, this has put his entrepreneur leadership into challenge. Howard’s leadership however substantiated by evidences, well, at least from business perspectives. In his business history , this captain well aware that customer response and satisfaction is the best business performance thermostat. But to achieve this corporate desire , will require tremendous effort, starting from top management down to every barista in Starbucks. In such circumstances, to him, everything matters, and this is not something hard to observe. This modern leadership are well played by Howard and his team throughout Starbucks business. Sourcing from Joseph Michelli- Starbucks experience, â€Å"this coffee business having the capability of motivating people through powerful, emotionally engaging visions and reconciling the people needs around their organization†. Starbucks management has even establish a Mission Review Committee that govern leadership behaviors and ensure commitment by their partners by listening their concern. They makes a point of listening and responding to the ideas and suggestions of partners. Clearly, Howard adopt â€Å"Situational Leadership† here, whereby attend the perception of the followers and to indicate how efforts directed towards wider organizational goals could align with calculations of follower self-interest. His leadership style, changes our perspectives towards leadership. Is the U. S President not doing sufficiently to address the needs of his people? Don’t get me wrong. Both also are transformational leaders, is just that Howard Schultz is practicing authentic leadership, this largely due to his father losing jobs because of medical problems, since then he became passionate about a company’s need to care for its employees. On the flip side, President Obama has proved to be a very good Senate majority leader by convening committees to do the work and intervening at the end. One of this strength is tends to see issues from several vantage points at once, so maybe it is natural that he favors a process that involves negotiating and fudging between different points of view. But particular in this debt ceiling settlement, he seems to be passive. Further from the above, so what setback is facing by the President? According to the award winning author, John Kotter, in his book â€Å"Our Iceberg is melting†, somewhat is similar to President Obama of failure in producing short-term wins. Failure in creating some visible, unambiguous successes to his fellow Americans all these while. This eventually causing Americans losing faith and trust in his leadership. This weakness of President Barrack Obama allowing Howard Schultz leadership ability become more prominence. Howard now ultimate intention is to create more job opportunities inside U. S, which he believe will turn things around. This similar challenge faced by all the leaders around the world, no exception of the increasing unemployment rate in my country. In my opinion, to resuscitate the economy, unparallel creative leadership style is needed. Perfect example from Sternberg’s propulsion model of creative leadership, â€Å"Re-initiation† leadership style, â€Å"whereby a leap in the dark from the familiar to meet perceived opportunity, and findings ways of removing constraints to uplift current country economic condition†. This is certainly not easy. Especially the effort of satisfying the needs of millions citizen in Malaysia. Perhaps, respective leaders need to learn from the green giant leader on how to â€Å"surprise and delight† like what he did to his Starbucks customer. This is what we hope from our leaders, an effort to put a smile on everyone’s face.

Tuesday, October 22, 2019

Next of Kin essays

Next of Kin essays The next of kin a documentation of mind matter and love. This book was very inspirational it gives you a whole new outlook on the experience and the feelings of animals. Trying to relate with how much Roger Fouts has accomplished in his life is unbearable he has had so many experiences that have been recorded in this book. It was the type of book that was hard to put down from the beginning. In the next few pages I will discuss parts of the book that really moved me and left an impression on me. There are so many great parts it was hard to pick just a few to look into. I read this book in the first few weeks of school and re-read in the last two weeks, also I have bought a copy for my sister who is very interested in primate psychology and it has so much information and personal experience in it that it is in a way a textbook for primate psychology. Washoe was an extraordinary animal saved out of NASA by very patient and brilliant people, it was very exciting to see the advancements that she had made throughout the book. Not only her but also the few people that had have been working with her. The Gardners the first care takers of Washoe was saved by the Gardners had put a lot of trust into Roger and he proved to be able to accept and work with Washoe from the beginning on. Fouts, started off as a little kid knowing his only monkey to be curious George, never realizing that George was not a monkey but a chimp. Growing up on a farm Fouts was always around many animals tending and working with them. Realizing the importance of the entire animal Fouts than realized the loyalty when his dog brownie had died jumping in front of the tractor to save his fallen brother. The care for animal was in all of the family even the mother who had many old time stories to tell about animal intelligences. A life and environment changing situation had happened when Fouts was about twelve years old and the only ones still...

Monday, October 21, 2019

Subcontinent Essay Example

Subcontinent Essay Example Subcontinent Essay Subcontinent Essay In a subcontinent that has been mired by centuries of feudal exploitation, class conflict and colonial subjugation, the prospects of contemporary democratization in South Asia seems utterly difficult, if not patently impossible, especially in the wake of current events in the countries in the region. Nepal is still recovering from the heels of a national crisis that almost toppled the monarchy. Sri Lanka still languishes from the effects of the tsunami disaster in its southern areas, notwithstanding the continuing threat of the Tamil Tigers. Pakistan and Bangladesh have both been experiencing a growth in Islamic fundamentalists that have resulted in suicide bombings. India, on the other hand, despite its so-called vibrant democracy, still has to contend with a growing Maoist insurgency in its countryside and hinterlands.Nonetheless, the paper seeks to examine two of these South Asian states – Nepal and Bangladesh – in terms of how a variety of issues have undermined the ir democratic institutions and the forging of national identities among its population.Nepal –Is it the Monarchy or the Insurgency to Blame?Since the start of the Maoist insurgency led by Prachanda, the Nepalese monarchy and some international commentators have blamed the rebels for undermining the efforts of the present and past governments to establish a truly working democracy in peaceful co-existence with the Nepalese Monarchy. The monarchy charges the Maoist insurgency for terrorizing the villagers in the hinterlands of Nepal, leading blockades of the capital to push the government to its knees.However, since the start of the government crackdown on its political opponents and the dissolution of Parliament, the discourse on the real causes of the curtailment of democracy in Nepal has focused on the repressive measures employed by the monarchy to crush any forms of dissent, to the extent that even the Maoists seem more morally ascendant than the apologists of King Gyanend ra, as royal security forces have resorted to bloody repressive tactics, which according to Amnesty International utilized arbitrary arrests and torture. (Ganguly Shoup, 2005) On the other hand, the mainstream political parties are also to be blamed for undermining the efforts towards democratization in Nepal due to their heedless, endless game of rent-seeking and more than petty personal quarrels and patronage squabbles. (Ganguly Shoup, 2005) All of these inevitably contributed to the rise of the Maoists in the Nepalese politics, that the people have been wary of the conservative and moderate sections of the political system and have learned to embrace the radical politics of the insurgency.On the other hand, the stumbling block to Nepalese democratization also operated in a backdrop of a society that was still enmeshed in socio-economic contradictions which gave the Maoists fertile soil to launch their revolution. In a paper by Stuart Gordon (2005), he explained that –Nep al’s conflict is the product of a complicated convergence of regional, ethnic, and economic inequalities and deprivations. The majority of Nepal’s 36 major   Ã‚   ethnic groups have been marginalized in a power structure in which multi-party   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   democracy and modernization have, perversely, reinforced upper-caste privilege   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   while also highlighting systematic inequality. The Maoists have attempted to   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   mobilize grievances by appealing toethnic communities suffering discrimination, such as those of Tibeto-Burmanstock and the Dalits (untouchable castes).While most members of mainstream political parties came from members of Nepalese society’s upper castes, the Maoists were able to secure the support and loyalty of a broad cross-section of the people’s lower castes, promising genuine land reform and a dismantling of the feudal and semi-feu dal political economy that has relegated to poverty much of Nepal’s constituencies. The radical left was also responsible in brokering an alliance between the peasantry and the intelligentsia, which, in classical Maoist theory, was an indispensable alliance in waging revolution.In the long road towards democratization, the left was able to mobilize not only the different economic classes, but ethnic minorities as well that – (Gordon 2005)Partly as a consequence of democratization, the Maoists have been able to   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   mobilize other castes and ethnic and familial groups (Dalits, Kham Magar, Sarki,   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Tamang, Damai, Gurung, Rai, Limbu, etc.), transforming the war from an intra-   elite conflict into a fragmented inter-group struggle. In effect, in addition to being   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   a conflict between ideologies, the war has become a much more broadly based   Ã‚   struggle for emancipa tion from the ruling Brahmin, Chetri, and Newar elite.In all of these, however, it is clear that the state and all its apparatuses have been clearly unable to realize the goals of a democratic Nepal and has since been isolated from the majority of its people, to the extent that the Maoists themselves – the anti-thesis of a free and democratic republic – are taking the cudgels for the monarchy and the mainstream political parties’ patent inability in enforcing a true democratic system that would truly benefit, in political and economic terms, the lives of the people, as it has been the revolutionary movement that has been able to create unities between castes and mobilize the minorities into action in fulfillment of their democratic hopes and aspirations.Bangladesh – The Problems of Transition from Authoritarian RuleBangladesh democracy is also in peril, with the rise of Islamic fundamentalism in their country in a backdrop of intense political bickerings among mainstream political parties that has led to relentless political crises. In 2005, the mainstream opposition continued its boycott of the Parliament, including massive street protests to force the ouster of the sitting government. Bangladesh also saw the rise in extrajudicial killings of more than three hundred persons in the span of a few months, notwithstanding the unprecedented death sentences on twenty-two persons for the murder of an oppositionist in Parliament. (Riaz 2006) The Ahmadiyyas, a Muslim subsect, have also been the target of political persecution from all fronts, that radical fundamentalists attacking the Ahmadiyyas are being helped even by Bangladeshi security forces in pulling down signboards of Ahamdiyya mosqes. (Riaz 2006) More so, Bangladesh again topped the list, for the last five years, of Transparency International’s Corruption Perception Index (Riaz 2006)Nonetheless, all of these seem to be part of the continuing struggle of the Bangladeshi peop le in the path towards democratization, especially in the light of the long experience of the country under authoritarian rule, that the executive branch in government still tends to over-extend its powers despite the existence of a parliament and judiciary to maintain the checks and balances in government. (Datta) More so, because of this difficult transition to democracy, a true democratic culture within Bangladeshi society has not been created yet, that even the very concept of separation of powers and the system of checks and balances have yet to truly take root, especially when assertions of general corruption in high and low offices of government abound, with even the international community convinced of such a phenomenon in the Bangladeshi government. (Datta)ConclusionIn both states, it is clear that governments, past and present, have been clearly unable to establish and sustain a democracy that will truly serve the needs of their people, especially in societies replete with generations of ethnic discrimination and caste oppression, to the extent that a real national identity of Nepalese and Bangladeshis has never been created, except for these societies as a heterogeneous mix of people from different social groupings.   It must be definitely noted, however, that the foudning of democracy in regions that have been beset with decades of socio-economic and cultural contradictions would definitely find difficulty in such an undertaking.The leading state actors in these countries must be able to sufficiently convince their people that building a true democracy is beyond the internal prejudices between classes and ethnic groups and instead founded on libertarian principles of social justice and the rule of law that knows no race nor creed, but only the upliftment of the lives of a society’s people and their pursuit of happiness and dignity, as individuals and as a people.

Sunday, October 20, 2019

Composite Numbers What Are They How Can You Spot Them

Composite Numbers What Are They How Can You Spot Them SAT / ACT Prep Online Guides and Tips Do you know the difference between prime and composite numbers? If not, don’t worry! You’ve come to the right place. In this post, we’ll talk about what prime and composite numbers are and give you a handy chart you can use to quickly see if something is a composite number. What Is a Composite Number? Composite numbers are whole numbers that are greater than 1 and divisible by other whole numbers. Here are the questions to ask yourself to decide if a number is composite: Is the number a whole number? Is the number greater than 1? Is the number divisible by whole numbers other than itself? Let’s apply those questions to two different numbers to see if they are composite or not. Take the number â€Å"4†. 4 is a whole number. It is greater than 1. You can divide 4 by 4. You can also divide 4 by 2, so it’s divisible by other whole numbers. That means 4 is a composite number. Let’s look at the number â€Å"3†. 3 is a whole number. It’s greater than 1. You can divide 3 by 3. But, you can’t divide 3 by any other whole numbers. That means 3 isn’t a composite number. How to Tell the Difference Between Prime and Composite Numbers If a number isn’t composite, then it’s prime. Prime numbers are numbers that are greater than 1 that are only divisible by themselves and the number 1. The best way to tell if a number is prime or composite is to perform the divisibility test. When you use the divisibility test, you check to see if a number is divisible by common prime factors, like 2, 3, 5, 7, ,and 13. If you’re testing an even number, start by trying to divide it by 2 to see if it’s composite. If you’re testing a number that ends with 0 or 5, try to divide it by 5. If you get a whole number when dividing by any of these common factors, then your number is composite. If you get a fraction or decimal when dividing by these common factors, then your number is likely prime. Composite Number Chart (1-100) Here is a handy composite number list to reference. All of the numbers in blue are composite numbers. Prime Number Chart (1-100) Here’s an easy-to-reference prime number list. All of the numbers in red are prime numbers. Final Thoughts It’s important to know whether a number is prime or composite so you can understand whether or not the number is divisible. Remember, ask yourself these questions to tell if a number is a composite number or not: Is the number a whole number? Is the number greater than 1? Is the number divisible by whole numbers other than itself? What’s Next? Writing a research paper for school but not sure what to write about?Our guide to research paper topicshas over 100 topics in ten categories so you can be sure to find the perfect topic for you. Learning about natural logs?Check out our guide on the natural log rules you must knowto ace this subject. What is dynamic equilibrium and what does it have to do with rusty cars?Find out by reading ourcomplete guide to dynamic equilibrium.

Saturday, October 19, 2019

Interaction between Police, Prosecutors, and the Courts Research Paper

Interaction between Police, Prosecutors, and the Courts - Research Paper Example The smooth and well orchestrated interaction between police, prosecutors, and the courts is necessary to keep the peace and economic viability of the community. The police officers keep the criminals and persons under trial in jail while they are processed for trial. When convicted by the courts of law, the police officers will jail the convicted person in jail the serve the jail sentence handed down by the courts of law. The prosecutors present evidences to the courts to prove the guilt of the persons charged. The courts determine whether the person charged is guilty or innocent of the crime charged. The police officers must ensure that they will implement a high quality investigation to feret out the criminals from the innocent persons as the officers roam the streets of the United States community. The police officers should take extra care of the evidences gathered in order to ensure that the court’s verdict will be correct. The police officers’ presentation of fals ified evidences may result to the court’s erroneous verdict. The erroneous verdict may be to convict an innocent person because of circumstantial evidence. Another erroneous verdict is to declare innocence a person of a crime due to some legal technicalities. One such legal technically is the police officer’s gathering of evidences by using force on a person, against the person’s will. ... The prosecutor must ensure that the court will receive case evidences as a basis for issuing a guilty verdict as well as issue court ruling using legal doctrines. For example, the prosecutor must use the proper section or law references to back up one’s thesis. The court is challenged to prioritize cases. For example, the court must prioritize cases where the person accused is being held under lock and key by the police officers. The court must ensure that the police officers and the prosecutors do not violate the basic rights of the accused persons during their incarceration. For example, Samuel Walker (1993) emphasized â€Å"The videotaped beating of Rodney King by Los Angeles police officers on March 3, 1991--an event that electrified the country—dramatized the problem of police discretion. The officers involved acted out their worst impulses, obviously believing they would never be caught or punished. The fact that a sergeant was present and that the officers later discussed the incident over the police radio is the most damning evidence of their sense of immunity†. The above Rodney King case shows an extreme of the American justice system. The police officers took the law into their own hands. They manhandled the victim, Rodney King of Los Angeles, California. Consequently, the prosecutors must put into motion its duty to gather enough evidences to prosecute the abusive Los Angeles police officers. The police officers must do their best to reduce the crime rate in the community. In their frustration over the unabated crime incidents, some police officers may be triggered to act irrationally. The police officers must uphold the rights of the accused. One of the

Why teachers salary should increase Essay Example | Topics and Well Written Essays - 1000 words

Why teachers salary should increase - Essay Example While education takes up most of the childhood and teenage years, it benefits the whole adult life of a person. While education could really, and actually, happen anywhere, formal education within school settings is what really provides an individual with ammunition later on in life. One cannot disregard the significance of education in life. In fact, in today’s world, an individual is disregarded if without education. Education is not only there to increase one’s knowledge, but also to shape one’s character. It develops the rational aspect of a human being. Now, when one talks about education, one cannot help but think about teachers. This is because education is a teacher-driven industry. Without teachers, education will not be possible (Vedder 17-8). The important status of the teaching profession is the main reason why teachers’ salary should be increased. A higher salary for teachers would mean that existing teachers would feel more inspired as they g o about their daily teaching routine (Mishel and Roy 69). It could also mean that the teaching industry will be more able to attract the best and the brightest minds (Cunningham and Sperry 38). It will also mean that more potential teachers will be inclined to give the career more consideration, which could decrease teaching shortage (Vedder 7). More Inspiration for Teachers Work is all about motivation. While many people will say that a career is based on what one wants to do, at the end of the day, one would hope that what one wants to do is also something that would put food on the table, roof over the heads, and clothes on the back. In addition, it is not asking too much to include a reliable car to make lives easier, along with extra funds to indulge into leisure moments occasionally. It is true that several teachers are able to afford all these things without problems, but one cannot really claim that these things are acquired without many problems (Mishel and Roy 71-2). The t eaching profession should be able to offer such a salary that could at least ensure noble teachers that they could provide education to individuals without enduring a profession that will make them sacrifice some of their personal needs and wants. It is a well-accepted fact that motivated workers are more productive in their jobs. While this is not to say that money is the only source of motivation, removing the barrier of money issues would certainly help a lot in alleviating the situation of people involved in such â€Å"thankless† jobs (Mishel and Roy 75-6). Attracting the Best and the Brightest Minds Everyone has heard a story somewhere of a teacher who has left the profession to enter the corporate world, and the biggest reason stated has always been better paychecks. This is especially true among highly effective and intelligent teachers in the industry. It is understandable that people who have a big potential to really make it big in the better-paying corporate world would be enticed to switch professions. This is coupled by the additional attraction that corporate jobs could be less stressful, where one does not have to take the work back home. If teachers feel that their efforts are being recognized in the paychecks, there would be lesser chances of job switch. Furthermore, it could lessen, if not remove, the connotation that teaching is a thankless career. To do so could attract more brilliant students into the teaching industry (Cunningham and Sperry 38-9). This is not to say, though, that only average people are attracted to get into teaching. However, one cannot disregard the possibility that many highly effective and brilliant individuals who want to get into teaching would settle for better-paying jobs instead, even though they want to teach (Cunningham and S

Friday, October 18, 2019

Assessment Of Resource Capabilities Of BMW Assignment

Assessment Of Resource Capabilities Of BMW - Assignment Example In an effort to uphold quality inventory in its earlier years, BMW ensured that it had innovative technology that would also help the company reach a larger audience. The easy to navigate website captured the attention of many customers making it very simple for people to order commodities As years have gone by, the company has incorporated modern age technology in an effort to increase the market value of its products. In 2009, BMW introduced a software package that would assist in monitoring its workflow and make forecasts on the effects caused by various real estate decisions made. Moreover, it acquired a system that would help intensify its e-commerce trades by faster processing of orders.   With the advent of new technology, the company is bound to make even higher sales (Fleisher, 2008, 48).With relation to tangible resources, it is important to note that the company has made numerous strides in an effort to keep in touch with advancements in the industry. The company has had the ability to buy new machinery that has assisted in cutting down the costs per production. This is the fact that in earlier years, the company had faced numerous challenges having to outsource some of its departments facing the uneven market demographics. Human resource has also worked to ensure that the company gets back to its high market position that it enjoyed in the 1990s. This is from the increased number of retail shops around the world majoring in the sale of BMW products  

Paul Brown Stadium Essay Example | Topics and Well Written Essays - 1000 words

Paul Brown Stadium - Essay Example The cost rose from $280 to an all inclusive costs of nearly $555 million (Albergotti & McWhirter). The county took out $1 billion in bonds to finance these projects. The county and its taxpayers are paying a hefty price for the bad decision that was made. In 2009 Hamilton County had to pay $34.9 million in costs related to the stadium deals which represent 16.4% of the county’s general fund. The normal cost to budget ratio in other counties that help finance stadiums is less than 2%. The county when the proposal was on the table exaggerated the economic benefits the new stadium would bring. Their absurd estimate was $300 million in benefits. These multi-million benefits never manifested. The stadium deal Hamilton County signed with the Bengals is considered the most lopsided deal in favor of a team in NFL history. It was a bad decision that will ruin the fiscal health of the county until the maturity date of the bonds. Currently 1 of 7 residents in Hamilton County is living be low the federal poverty line. 2) Who had ultimate responsibility for the problems? The person that is ultimately responsible for this debacle is the mayor of Hamilton County. He selected a team of three negotiators that acted as puppets of the Bengals. There was corruption and collusion in this deal evidenced by the fact that one of the negotiators, Bob Bedinghaus, joined the Bengals organization in 2001 as the team’s director of business development. The mayor should have never approved the project and he should have been the person negotiating the deal. He delegated a function that he is supposed to perform. Now the damage is done and the taxpayers of Hamilton County are paying a hefty price. That money that is being wasted paying for the expenses of billionaires could have been used to help a community that has 14.28% of its population living in poverty. Other political leaders in Hamilton County should have stepped in and spoke out against this move. Only a few political leaders spoke out against the deal. If the majority of the political leaders would have formed an alliance against issuing the bonds this whole fiscal mess would have never occurred. 3) Discuss the ethical implications of what occurred. This case study is an example of an ethical dilemma regarding governmental spending. The taxpayers are crying wolf now, but when the deal was signed thousands of fans were happy both teams stayed in Cincinnati. The Bengals deal was horrific. It does not make any sense why the county and its mayor approved such a lopsided deal. Hamilton County paid for the entire cost of building the new stadium, they have the Bengals a preferential lease agreement, they let the team keep all the parking revenues and the city is paying for all the securities costs. Hamilton County under any circumstance could not afford to pay for these stadiums themselves. They needed the help of other nearby counties, the city, and the state. They did not receive their support. It w ould have been better to let the Bengals go and keep the Reds in town. The Bengals deal was the deal breaker that destroyed the finances of Hamilton country for decades. 4) Are there any internal control issues to be addressed? A preliminary audit performed by PricewaterhouseCoopers found that there were insufficient financial controls by the project managers. The location move was a bad idea that increased the cost of the project by $70 billion. The contract could have had stipulation that mandated the stadium be

Thursday, October 17, 2019

Not necessary Research Paper Example | Topics and Well Written Essays - 500 words - 1

Not necessary - Research Paper Example After identification of constituencies, objectives should be set and proper communication channels should be adopted for delivering the probable crisis information to the constituencies (Argenti, 2007). According to Fowler, et.al (2007), top level and middle level managers are much more prepared for crisis as compared to employees. Learning is also a part of the crisis preparation. If the organizations are well prepared before occurrence of a crisis, the employees and management learn from their taken actions and also learn to change according to the needs of a new crisis. The management of an organization plays an active role in preparing for a crisis. In learning from crisis events, there are several barriers for organizations. According to Smith and Elliott (2007), crisis should be used as a means for learning, organizations should learn from crisis, about crisis and for crisis. Learning is not an easy process as there are hindrances in learning such as environmental changes, value systems, refusal of expert opinions and ineffective communication (Smith and Elliott, 2007). Corporate communication is an attractive course and I think that I will be able to obtain much more until the end of this course. In a business setting, communication plays a crucial role and its importance cannot be negated in any circumstances. As a student of corporate communication, I have researched about Primo Small goods Company, which is a meat company in Australia. My learning experience with the company was a good one as I was able to assess corporate environment practically. These kinds of assignments are really helpful for students and provide them a chance to get better equipped with skills that will be required in their future lives and careers. Learning is essential for all the students and I feel that the corporate communication course is providing its students with multiple opportunities to learn. Without effective communication, our day-to-day

Clinical Teaching Strategies Assignment Example | Topics and Well Written Essays - 250 words

Clinical Teaching Strategies - Assignment Example The clinical faculty even needs to know about the set method that the faculty member needs to follow in case of an emergency and they need to be informed about the technological requirements associated with their position. 2. In order to pursue the position of nursing clinical faculty an incumbent needs to be a licensed registered nurse of the state in which they are practicing and they even need to have a minimum two years of practicing experience as a clinical (Duke School of Nursing, 2011). Other than a license to practice the incumbent should at the minimum have a Bachelors’ of Science in nursing which is four year long program and is very essential as it helps students in preparing for a career in the field of nursing and even assist them in gaining further education in the same field. Higher preference is given by nursing educational institutes to those incumbents who have attained Masters’ of Science in

Wednesday, October 16, 2019

Not necessary Research Paper Example | Topics and Well Written Essays - 500 words - 1

Not necessary - Research Paper Example After identification of constituencies, objectives should be set and proper communication channels should be adopted for delivering the probable crisis information to the constituencies (Argenti, 2007). According to Fowler, et.al (2007), top level and middle level managers are much more prepared for crisis as compared to employees. Learning is also a part of the crisis preparation. If the organizations are well prepared before occurrence of a crisis, the employees and management learn from their taken actions and also learn to change according to the needs of a new crisis. The management of an organization plays an active role in preparing for a crisis. In learning from crisis events, there are several barriers for organizations. According to Smith and Elliott (2007), crisis should be used as a means for learning, organizations should learn from crisis, about crisis and for crisis. Learning is not an easy process as there are hindrances in learning such as environmental changes, value systems, refusal of expert opinions and ineffective communication (Smith and Elliott, 2007). Corporate communication is an attractive course and I think that I will be able to obtain much more until the end of this course. In a business setting, communication plays a crucial role and its importance cannot be negated in any circumstances. As a student of corporate communication, I have researched about Primo Small goods Company, which is a meat company in Australia. My learning experience with the company was a good one as I was able to assess corporate environment practically. These kinds of assignments are really helpful for students and provide them a chance to get better equipped with skills that will be required in their future lives and careers. Learning is essential for all the students and I feel that the corporate communication course is providing its students with multiple opportunities to learn. Without effective communication, our day-to-day

Tuesday, October 15, 2019

Final scenerio analysis Essay Example | Topics and Well Written Essays - 1750 words

Final scenerio analysis - Essay Example Based on the Global Enterprise, we take an analysis of the case facts and ethical issues concerning the enterprise’s operations (Nakmwil, 2012). In addition, we also take into account the ethical alternatives and recommendations the business has at their disposal in order to survive the legal accusations they have (Nakmwil, 2012). Case facts Global enterprise international (GEI) is a military contractor charged with the responsibility of manufacturing protective body armor, ammunition equipments and armored vehicles that are all useful during military operations (Nakmwil, 2012). The company has employed 140 workers who are all highly paid union technicians, mechanics, union members and Armor workers (Nakmwil, 2012). For the United States military, Global Enterprise International manufactures body flask jackets, night vision riflescopes and armored tank vehicles (Nakmwil, 2012). Contrary to the spelt out international laws and treaties, Global Enterprise International also part icipates in the manufacturing of land mine explosives (Nakmwil, 2012). The company’s best customers for the illegal land mines products are Afghanistan and Iran (Nakmwil, 2012). Based on these sales, more than half the company’s profits come from these stealthy operations (Nakmwil, 2012). ... For instance, the flak jackets do not effectively protect military soldiers as required from personal ammunition (Nakmwil, 2012). In addition, the night vision rifles produced by the company in many cases end up causing severe injuries and deaths to the users while in combat situations (Nakmwil, 2012). Besides, armored vehicles despite having strong sides and tops, the composition comprises solely of a single thin sheet layer emended on the undersides (Nakmwil, 2012). This makes them very vulnerable and weak to IED (Improvised Explosive Device) explosives (Nakmwil, 2012). Despite all these modifications, the inclusion of superior and quality materials in the flak jackets are capable of effectively preventing the unnecessary injuries encountered when utilizing fake products produced by the company (Nakmwil, 2012). However, Global Enterprise International spitefully declines altering their materials because this would cost the company a fortune and probably at the end lose the contract (Nakmwil, 2012). In addition, most of the landmines sold by the company to the Taliban in Afghanistan and Iran are not effective (Nakmwil, 2012). Those who attempted to plant the mines died in the process as they contained faulty switches. Later on, United States military realized numerous flaws characterizing these jackets, night vision rifles and armored vehicles, which it purchased from Global Enterprises International (Nakmwil, 2012). The United States justice department initiated legal investigations and the families of the deceased military members followed suit (Nakmwil, 2012). They also started forming mass actions and filing lawsuits against the concerned company. A

Monday, October 14, 2019

Assertions and Audit evidence Essay Example for Free

Assertions and Audit evidence Essay 1. The allowance for doubtful accounts is fairly presented in amount. * Valuation or allocation assertion 2. All accounts payable owed as of the balance sheet date are included in the financial statements. * Existence or occurrence assertion 3. All purchase returns recorded in the general ledger are valid. * Existence or occurrence assertion 4. The allowance for doubtful accounts is fairly presented in amount. * Valuation or allocation assertion 5. All accounts payable owed as of the balance sheet date are included in the financial statements. * Completeness assertion 6. All purchase returns recorded in the general ledger are valid. * Existence or occurrence assertion 7. A retail client values its inventory using the retail method of accounting. * Valuation or allocation assertion 8. A construction client uses the percentage of completion method for recognizing revenues. * Existence or occurrence assertion 9. A client has a defined benefit pension plan and does not have competent employees to write footnote disclosures. * Presentation and disclosure assertion – classifications and understandability 10. Slow-moving items included in inventory have been properly identified and priced. * Valuation or allocation assertion 11. A client financed the acquisition of assets using preferred stock that pays a 3 percent dividend and must be redeemed from the shareholders next year. * Rights and obligations assertion 1. Bank statement sent directly to the auditor by the bank. (1) – Most reliable 2. Creditor monthly statement obtained from clients files. (2) – Reliable, but subject to possible forgery 3. Vouchers in clients unpaid voucher file. (4) Least reliable 4. Duplicate sales invoices in filled order file. (4) Least reliable 5. Time tickets filed in payroll department. (4) Least reliable 6. Credit memo in customers file. (4) Least reliable 7. Material requisitions filed in storeroom. (4) Least reliable 8. Bank statement in clients files. (2) Generally reliable 9. Management working papers in making accounting estimates. (4) Least reliable 10. Paid checks returned with bank statement in (1) above. (3) Somewhat reliable 11. Letter in customer file from collection agency on collectability of balance. (2) Generally reliable 12. Memo in customer file from treasurer authorizing the write-off of the account. (4) Least reliable

Sunday, October 13, 2019

Fiber optics and its applications

Fiber optics and its applications INTRODUCTION Nothing in the world gives us more power and confidence than having information. The ability to communicate information is essential to achieve the successful advancement of humankind. Transmission of information is imperative to the expansion of our horizons. What does this all have to do with fiber optics? This research paper will cover the basis of fiber optics in terms of its transmission, communication, origin, uses and applications. Fiber optics transports light in a very directional way. Light is focused into and guided through a cylindrical glass fiber. Inside the core of the fiber light bounces back and forth at angles to the side walls, making its way to the end of the fiber where it eventually escapes. The light does not escape through the side walls because of total internal reflection. Why is fiber optics so important? Besides being a flexible conduit that is used to illuminate microscopic objects, fiber optics can also transmit information similarly to the way a copper wire can transmit electricity. However, copper transmits only a few million electrical pulses per second, compared to an optical fiber that carries up to a 20 billion light pulses per second. This means telephone, cable and computer companies can handle huge amounts of data transfers at once, much more than conventional wires can carry. Fiber optic cable was developed because of the incredible increase in the quantity of data over the past 20 years. Without fiber optic cable, the modern Internet and World Wide Web would not be possible. WHAT IS FIBER OPTICS? Fiber optics is extremely thin strands of purified glass that carry information from one point to another in the form of light. Unlike copper wire, fiber optics does not use electricity during transmission. Optical fibers can be either glass or plastic tubing capable of transmitting light, which is then converted into sound, speech or information. Fiber optic cables transmit a digital signal via pulses of light through the very thin strands of glass. A basic fiber optic system consists of: a transmitting device, which generates the light signal, an optical fiber cable, which carries the light, and a receiver, which accepts the light signal that was transmitted. A fiber optic strand is about the thickness of a human hair, about 120 micrometers in diameter and can carry as many as 20 billion light pulses per second. The fibers are bundled together to form optical bundles, which transmit the light signals over long distances up to 50 km without the need for repeaters. Each optic fiber is made up of three main parts: The core or the centre of the optical fiber is a very thin strand of glass that carries the light signal. The cladding is the optical material which reflects the light signals back into the core. This prevents the light from escaping and allows it to travel through the fiber. The outside jacket or buffer coating is made of a plastic material that protects the optical fiber from any moisture, corrosion and external damage. There are only two types of fiber optic cable: Glass fibers, which are more common, because they allow longer distance transmission and they are more efficient. Plastic optical fibbers are used in less technical applications and are normally used in very short-length transmissions. HOW ARE OPTICAL FIBERS MADE? Optical fibers are made of very pure glass. The glass core or centre is made of silica and is purified to minimise the loss of signal. It then gets coated to protect the fibers and to contain the light signals. The light signals carried by the optical cable consist of electrical signals that have been converted or changed into light energy. The following process is followed to manufacture the optical fibers: The Manufacturing of the Preform Blank The silica must first be purified before it can be spun into glass fibers. This process takes a long time and the silica is heated to very high temperatures and then distilled to purification. The sand is heated to a temperature that will change the silica into a gaseous state. The silica will then be combined with other materials called dopants, which will react with the silica (in its gaseous state) to form the fibers. All the solid impurities are removed and the gas is cooled to form the fiber material. A process called modified chemical vapour deposition (MCVD) is used to change the glass into the preform blank. During this process oxygen is bubbled through solutions of silicon chloride (SiCl4), germanium chloride (GeCl4) and other chemicals. The gas vapours are channelled to the inside of a synthetic silica quartz tube in a special lathe to form the cladding. While the lathe rotates a burning flame is moved back and forth on the outside of the tube. The extreme heat from the burner causes the following: The silicon and the germanium react with oxygen to form silicon dioxide (SiO2) and germanium dioxide (GeO2). The silicon dioxide and the germanium dioxide settles on the inside of the tube and it fuses together to form glass. The lathe turns continuously to allow the preform blank to be coated evenly. To maintain the purity of the glass a corrosion resistant plastic is used to accurately control the flow and the structure of the mixture. This process of manufacturing the preform blank takes a couple of hours. The preform blank is cooled and is inspected for quality through an inspection and control process. Drawing fibers from the Preform Blank After testing the preform, it is placed into a fiber drawing tower. The preform blank gets lowered into a furnace and is heated between 1,900 °C to 2,200 °C until the tip starts to melt an a molten blob starts to fall down. As it drops down, it cools and forms a strand. This strand is pulled through a sequence of coating cups (buffer applicators) and curing ovens using ultraviolet light, and then coiled onto a tractor-controlled reel. This process is accurately controlled using a laser micrometer to measure the thickness of the fiber. This information is then sent back to the tractor mechanism. The tractor mechanism pulls the fibers at a rate of 10 to 20m/sec and the finished product is wound onto a spool. A spool can contain more than 2,2km of optical fiber Testing the Finished Optical Fiber Once the optical fiber is manufactured it goes through a process of testing. The following tests are done: Tensile strength The fibers must withstand 100,000 lb/in2 or more Refractive index profile Determine that the core diameter, cladding dimensions and coating diameter are uniform. Screen also for optical defects. Attenuation Determine the extent that light signals of various wavelengths degrade or reduce over certain distances. Information carrying capacity (bandwidth) the number of signals that can be carried at one time (multi-mode fibers) Chromatic dispersion Spread of various wavelengths of light through the core, this is very important for bandwidth. Operating temperature/humidity range Determines the temperature and humidity that the fiber can withstand. Ability to conduct light underwater Important for undersea cables Once t ­he fibers have passed the quality control process, they are sold to telephone companies, cable companies and network providers. Currently many companies are replacing their old copper-wire-based systems with new fiber-optic-based systems to improve speed, capacity and clarity. TYPES OF OPTICAL FIBERS There are two types of optical fibers: Single Mode Fiber Single mode fibers transmit a single data stream. The core of the glass fiber is much finer than in multi-mode fibers. Light thus travels parallel to the axis, creating little pulse dispersion. Data transmission modes are higher, and the distances that single mode fiber can cover can be over 50 times longer than multi-mode fibers. Telephone and cable television networks install millions of kilometers of this fiber every year. Multi-Mode Fiber Multi-mode fibers allow different data streams to be sent simultaneously over a particular fiber. The glass fiber has a slightly larger diameter to allow light to be sent through the fiber at different angles. An LED or laser light source is used in the 50 micron and 62.5 micron fiber optic cables. They are also used in the same networking applications. The main difference between the two is that 50 micron fiber can support 3 times the bandwidth of 62.5 micron fiber. The 50 micron fiber also supports longer cable runs than 62.5 micron cable. Simplex cable consists of only one single fiber optic strand. The data can only be transmitted in one direction. The duplex cable is made up of two fiber optic strands that run side-by-side. One strand runs from transmit to receive and the other strand joins receive to transmit. This allows communication in both directions (bi-directional) between devices. Some optical fibers can be made from plastic. These fibers have a large core (0.04 inches or 1 mm diameter) and transmit visible red light (wavelength = 650 nm) from LEDs. Due to their inferior optical properties, plastic fiber optic (POF) strands and cables are not suitable for extended data transmission. HOW DOES A FIBER OPTIC CABLE WORK? Traditionally when we sent data transmissions over copper cables we transmit electrons over a copper conductor. Fiber optic cables transmit a digital signal via pulses of light through a very thin strand of glass. The fiber strands are extremely thin, not much thicker than a human hair. The basic fiber optic transmission system consists of three basic components: Transmitter fiber optic cable receiver A transmitter is connected to the one end of the fiber cable. Electronic pulses are converted by the transmitter into light pulses and the optical signal gets sent through the fiber cable. A receiver on the other end decodes the optical signal into digital pulses. The core of the cable is surrounded by a cladding which reflects the light back into the core and eliminates light from escaping the cable. This is called total internal reflection. When light is sent through the core of a fiber optic cable, the light constantly bounces off the cladding, which is highly reflective, like a mirror-lined wall. The cladding does not absorb any light allowing complete internal reflection and allowing the light to travel far distances without losing its intensity. The discovery of lasers influenced the development of fiber optics. Lasers and LEDs can generate an enormous amount of light in a very small area, which can successfully used in fiber optics. Laser diodes are complex semiconductors that convert an electrical current into light. The process of converting the electrical signal into light is far more efficient because it generates less heat than an ordinary light bulb. Reasons for using laser diodes in fiber optics: laser diodes are very small laser diodes are highly reliable and have a long life laser diodes have high radiance laser diodes emit light into a very small area laser diodes can be turned on and off at very high speeds ADVANTAGES OF FIBER OPTICS The use of fiber optics is fast becoming the medium of choice for telecommunication systems, television transmission and data networks. Fiber optic cables have a multitude of advantages and benefits over the more traditional methods of information systems, such as copper or coaxial cables. Speed One of the greatest benefits to using fiber optic systems is the capacity and speed of such a system. Light travels faster than an electrical system which allows faster delivery and reception of information. Fiber optic cables also have a much higher capacity for bandwidth than the more traditional copper cables. Immunity to electromagnetic interference Coaxial cables have a tendency for electromagnetic interference, which renders them less effective. Fiber optics is not affected by external electrical signals, because the data is transmitted with light. Security Optical systems are more secure than traditional mediums. Electromagnetic interference causes coaxial cables to leak information. Optical fiber makes it impossible to remotely detect the signal being transmitted within the cable. The only way to do so is by actually accessing the optical fiber itself. Accessing the fiber requires intervention that is easily detectable by security surveillance. These circumstances make fiber extremely attractive to governments, banks and companies requiring increased security of data. Fire prevention Copper wire transmission can generate sparks, causing shortages and even fire. Because fiber optical strands use light instead of electricity to carry signals, the chance of an electrical fire is eliminated. This makes fiber optics an exceptionally safe form of wiring and one of the safest forms of data transmission. Data signalling Fiber optic systems are much more effective than coaxial or copper systems, because there is minimal loss of data. This can be credited to the design of optical fibers, because of the principle of total internal reflection. The cladding increases the effectiveness of data transmission significantly. There is no crosstalk between cables, e.g. telephone signals from overseas using a signal bounced off a communications satellite, will result in an echo being heard. With undersea fiber optic cables, you have a direct connection with no echoes. Unlike electrical signals in copper wires the light signals from one fiber do not interfere with those of other fibers in the same cable. This means clearer phone conversations or TV reception. Less expensive Several kilometers of optical cable can be made far cheaper than equivalent lengths of copper wire. Service, such as the internet is often cheaper because fiber optic signals stay strong longer, requiring less power over time to transmit signals than copper-wire systems, which need high-voltage transmitters. Large Bandwidth, Light Weight and Small Diameter Modern applications require increased amounts of bandwidth or data capacity, fiber optics can carry much larger bandwidth through a much smaller cable and they arent prone to the loss of information. With the rapid increase of bandwidth demand, fiber optics will continue to play a vital role in the long-term success of telecommunications. Space constraints of many end-users are easily overcome because new cabling can be installed within existing duct systems. The relatively small diameter and light weight of optical cables makes such installations easy and practical. Easy Installation and Upgrades Long lengths of optical cable make installation much easier and less expensive. Fiber optic cables can be installed with the same equipment that is used to install copper and coaxial cables. Long Distance Signal Transmission The low attenuation and superior signal capacity found in optical systems allow much longer intervals of signal transmission than metallic-based systems. Metal based systems require signal repeaters to perform satisfactory. Fiber optic cables can transmit over 100km with no active or passive processing. Even greater distances are being investigated for the future. To use fiber optics in data systems have proven to be a far better alternative to copper wire and coaxial cables. As new technologies are developed, transmission will become even more efficient, assuring the expansion of telecommunication, television and data network industries. DISADVANTAGES OF FIBER OPTICS Despite the many advantages of fiber optic systems, there are some disadvantages. The relative new technology of fiber optic makes the components expensive. Fiber optic transmitters and receivers are still somewhat expensive compared to electrical components. The absence of standardisation in the industry has also limited the acceptance of fiber optics. Many industries are more comfortable with the use of electrical systems and are reluctant to switch to fiber optics. The cost to install fiber optic systems is falling because of an increase in the use of fiber optic technology. As more information about fiber optics is made available to educate managers and technicians, the use of fiber optics in the industry will increase over time. The advantages and the need for more capacity and information will also increase the use of fiber optics. APPLICATIONS OF FIBER OPTICS As the popularity of optical fibers continue to grow, so does their applications and practical uses. Fiber optic cables became more and more popular in a variety of industries and applications. Communications / Data Storage Since fiber optics are resistant to electronic noise, fiber optics has made significant advances in the field of communications. The use of light as its source of data transmission has improved the sound quality in voice communications. It is also being used for transmitting and receiving purposes. Military Optical systems offer more security than traditional metal-based systems. The magnetic interference allows the leak of information in the coaxial cables. Fiber optics is not sensitive to electrical interference; therefore fiber optics is suitable for military application and communications, where signal quality and security of data transmission are important. The increased interest of the military in this technology caused the development of stronger fibers, tactical cables and high quality components. It was also applied in more varied areas such as hydrophones for seismic and SONAR, aircrafts, submarines and other underwater applications. Medical Fiber optic are used as light guides, imaging tools and as lasers for surgeries. Another popular use of fiber-optic cable is in an endoscope, which is a diagnostic instrument that enables users to see through small holes in the body. Medical endoscopes are used for minimally invasive exploratory or surgical procedures. Fiber optics is also used in bronchoscopes and laparoscopes. All versions of endoscopes look like a long thin tube, with a lens or camera at one end through which light is emitted from the bundle of optical fibers banded together inside the enclosure. Mechanical or Industrial Industrial endoscopes also called a borescope or fiberscope, enables the user to observe areas that are difficult to reach or see under normal circumstances, such as jet engine interiors, inspecting mechanical welds in pipes and engines, inspecting space shuttles and rockets. Inspection of sewer lines and pipes. Networking Fiber optic is used to connect servers and users in a variety of network settings. It increases the speed, quality and accuracy of data transmission. Computer and Internet technology has improved due to the enhanced transmission of digital signals through optical fibers. Industrial/Commercial Fiber optics are used for imaging in areas which are difficult to reach. It is also used in wiring where electromagnetic interference is an problem. It gets used often as sensory devices to make temperature, pressure and other measurements as well as in the wiring of motorcars and in industrial settings. Spectroscopy Optical fiber bundles are used to transmit light from a spectrometer to a substance which cannot be placed inside the spectrometer itself, in order to analyse its composition. A spectrometer analyses substances by bouncing light off of and through them. By using optical fibers, a spectrometer can be used to study objects that are too large to fit inside, or gasses, or reactions which occur in pressure vessels Broadcast/CATV/Cable Television Broadcast or cable companies use fiber optic cables for wiring CATV, HDTV, internet, video and other applications. Usage of fiber-optic cables in the cable-television industry began in 1976 and quickly spread because of the superiority of fiber optic cable over traditional coaxial cable. Fiber optic systems became less expensive and capable of transmitting clearer signals further away from the source signal. It also reduced signal losses and decreased the number of amplifiers required for each customer. Fiber optic cable allows cable providers to offer better service, because only one optical line is needed for every  ± 500 households. Lighting and Imaging Fiber optic cables are used for lighting and imaging and as sensors to measure and monitor a vast range of variables. It is also used in research, development and testing in the medical, technological and industrial fields. Fiber optics are used as light guides in medical and other applications where bright light needs to shine on a target without a clear line-of-sight path. In some buildings, optical fibers are used to route sunlight from the roof to other parts of the building. Optical fiber illumination is also used for decorative applications, including signs, art and artificial Christmas trees. Optical fiber is an essential part of the light-transmitting concrete building product, LiTraCon which is a translucent concrete building material. Conclusion With the introduction of highly transparent fiber-optic cable in the 1970s, very high-frequency laser signals now carry phenomenal loads of telephone conversations and data across the country and around the world. From surgical procedures to worldwide communication via the internet, fiber optic has revolutionised our world. Fiber optics has made important contributions to the medical field, especially with regards to surgery. One of the most useful characteristics of optical fibers is their ability to enter the minute passageways and hard-to-reach areas of the human body. But perhaps the greatest contribution of the 20th century is the combination of fiber optics and electronics to transformed telecommunications. References / Bibliography Why is fiber optics importany http://library.thinkquest.org/TQ0312432/lessons_part-04.html http://www.greatachievements.org/?id=3706

Saturday, October 12, 2019

Youth Violence Essay -- Papers Children Child Violent

Youth Violence Violence is a learned behavior. Children often experience violence for the first time in their lives in their homes or in the community. This first taste of violence may include their parents, family members or their friends. Studies have shown that children who witness violent acts, either as a victim or as a victimizer, are more likely to grow up to become involved in violence. During our second weekend class, we talked specifically about violence and youth. For many young people who have already developed a pattern of violent behavior, the probability that this way of life will endure into their adult lives is very likely. I believe that aggression is often learned very early in a child's life. For the growing trend in youth violence to subside, I assert that parents and many others must make every attempt to educate themselves and to implement methods that will reduce and ultimately prevent much of this violent behavior. Parents most often play the greatest positive role in a child's life by raising them in homes where they feel safe, secure and loved...

Friday, October 11, 2019

Malware Discussion Essay

The use of malware is a way for attackers to gain access to person information from a personal computer or company information from an organization. There are several types of malware which include virus, rootkits, and worms. Each malware serves different purposes to achieve the goal of an attacker. An attacker could be envious of a past lover and could send a virus to their email to shutdown the operations of their computer. A disgruntle employee could send a worm to their old company and slow down production of the company. A random person looking for a thrill could set up a rootkit on a company’s network to gain access to company secrets. Each malware is given a name specified for its cause, for example the Trojan Worm. The name is given to this virus because of the activity that happens once it is executed. Viruses are named by antivirus companies who avoid using proper names. The Melissa virus was named by its creator, David Smith, for a Miami stripper. This paper will discuss 5 different types of malware and inform the targets for these attacks. Discussion of Malware The first malware that will be discussed is the Melissa Virus. This virus was detected on the 26th of March 1999. This virus is a Microsoft Word macro virus that is delivered as an E-mail attachment. The virus is activated when an attachment named, list. doc is opened. When it is activated, the Melissa virus searches the Microsoft Outlook address book and sends a message to the first 50 names. This virus proliferates itself as users open the attachment. Melissa doesn’t work on Outlook Express, just Outlook. The message appears to come from the person just infected, which means that the message will seem to come from a recognizable email address. Melissa doesn’t destroy files or other resources, but has the possibility to immobilize corporate and other mails servers. The origin of the Melissa virus is from an Internet alt. sex newsgroup and contains a list of passwords for various Web sites that require memberships. Melissa also has the ability to disable some security safeguards. Users of Microsoft Word 97 or 2000 with Microsoft Outlook 97, 98, or 200 are most likely to be affected. When the virus attacks, it can infect the copy of Microsoft Word that is installed as well as any following Word documents that are created. It can also change the setting of Microsoft Word to make it easier for the computer to become infected by it and succeeding macro viruses. Users of Word 97 or 2000 containing any other E-mail programs can be affected also; the difference is that Melissa will not automatically redistribute itself to the contacts through other E-mail programs. It can still however infect the copy of Microsoft installed on the machine. This infected copy can still be shared with others if a document is created in the infected copy and distributed through E-mail, floppy disk, or FTP. Although the virus won’t appeal to the mailout on a Mac system, it can be stored and resent from Macs. To avoid this virus, it is suggested to not double-click any file, such as an E-mail attachment, without scanning it first with antivirus software, regardless of who it is from. The next malware to be discussed is SQL injection which is an attack where malicious code is placed in within strings that are shortly passed on to an example of SQL Server for parsing and implementation. A form of SQL injection consists of direct placing of code into user-input variables that link with SQL commands and executed. An attack that is not as direct, inserts malicious code into strings that are intended for storage in a table or as metadata. The malicious code is executed once the stored strings are linked into a dynamic SQL command. In SQL Injection, the hacker uses SQL queries and ingenuity to get to the database of susceptible corporate data through the web application. Websites with features as login pages, support and product request forms, feedback forms, search pages, shopping carts and the general delivery of dynamic content, shape modern websites and provide businesses with the means necessary to communicate with prospects and customers are all vulnerable to SQL Injection attacks. The reason behind this is because the fields available for user input allow SQL statements to pass through and query the database directly. SQL Injection flaws are introduced when software developers create dynamic database queries that include user supplied input. There have been several reports of SQL attacks, dating back to 2005. The websites that have became victim to these attacks range from Microsoft U. K. to Lady GaGa’s website. To avoid SQL injection flaws, it is suggested that developers need to either: a) stop writing dynamic queries; and/or b) prevent user supplied input which contains malicious SQL from affecting the logic of the executed query. The next malware discussed will be Stuxnet. Stuxnet is a computer worm that targets Siemens industrial software and equipment running Microsoft Windows, and was discovered in June 2010. Although Stuxnet isn’t the first attack to target industrial systems, it is however the first discovered malware that actually moles on and weakens industrial systems. Stuxnet is also the first malware to include a programmable logic controller rootkit. Stuxnet is designed to target specifically Siemens supervisory control and data acquisition systems that are configured to control and monitor specific industrial processes. The PLCs are infected by Stuxnet weakening the Step-7 software application that is used to reprogram these devices. Stuxnet is different from other malware as it only attacks computers and networks that meet a specific configuration requirement. Stuxnet contains a safeguard and if Siemens software isn’t discovered on the infected computer will prevent each infected computer from spreading the worm to more than three others, and to erase itself on June 24, 2012. Along with other things for its victims, Stuxnets contains code for a man-in-the-middle attack. Stuxnet will spread through removable devices such as an USB drive in a Windows operating system by using a four zero-day attack. After it has infected the removable drive, it uses other utilizations and techniques to infect and update other computers inside private networks. Stuxnet infects Step 7 software by infecting project files belong to Siemen’s WinCC/PCS 7 SCADA control software and weakens a key communication library of WinCC called s7otbxdx. dll. It is recommended by Siemens to contact customer support if and infection is detected and advises installing Microsoft patches for security vulnerabilities and prohibiting the use of third-party USB flash drives. Next, Zeus, also known as Zbot virus will be discussed. This virus is geared toward financial institutions such as banks. Zeus was first discovered in July 2007 after being used to steal information from the US DOT. Zeus is set up to infect a consumers PC, and wait until the log onto a list of targeted banks and financial institutions and steal their credentials and sends them to a remote server in real time. Zeus can also inject HTML into a page that is provided by the browser, this displays its own content instead of the actual page from the bank’s web server. By doing this, it is able to obtain users information such card numbers and pins. According to SecureWorks, ZeuS is sold in the criminal underground as a kit for around $3000-4000, and is likely the one malware most utilized by criminals specializing in financial fraud. According to Lucian Constantin, Zeus is one of the oldest and most popular crimeware toolkits available on the underground market. Up until this year the Trojan could only be acquired for significant sums of money from its original author. However, a few months ago the source code leaked online and now anyone with the proper knowledge can create variations of the malware. Also according to SecureWorks, The latest version of Zeus as of this date is 1. 3. 4. x and is privately sold. The author has gone to great lengths to protect this version using a Hardware-based Licensing System. The author of Zeus has created a hardware-based licensing system for the Zeus Builder kit that you can only run on one computer. Once you run it, you get a code from the specific computer, and then the author gives you a key just for that computer. This is the first time they have seen this level of control for malware. The CTU recommends that businesses and home users carry out online banking and financial transactions on isolated workstations that are not used for general Internet activities, such as web browsing and reading email which could increase the risk of infection. The last malware that will be discussed is the Blaster worm also known as Lovsan, Lovesan, or MSBlast. The Blaster worm spreads on computers that have Windows XP and Windows 2000 as an operating system and was detected in August of 2003. The creator of the B variant of the Blaster worm, Jeffrey Lee Parson was an 18 year old from Hopkins, Minnesota. He was arrested on August 29, 2003, admitted to the creation of the B variant, and was sentenced to 18-months in prison in January 2005. A Windows component known as the DCOM (Distributed Component Object Model) interface which is a known vulnerability of Windows is taken advantage of by Blaster. The DCOM handles messages sent using the RPC (Remote Procedure Call) protocol. Vulnerable systems can be compromised without any interaction from a user, according to Johannes Ullrich, chief technology officer at the SANS Internet Storm Center, which monitors threats to the Internet infrastructure. According to Mikko Hypponen, manager of antivirus research at F-Secure in Helsinki, Blaster unlike the Code Red worm, which contained code for a similar attack against the IP address of White House’s main Web server, targets the windowsupdate. microsoft. com domain, which prevents Microsoft from changing the address of the domain to sidestep the attack. Blaster’s code is small and can be quickly removed using free tools provided by F-Secure as well as other antivirus vendors, Hypponen said. However, customers should patch their systems before removing Blaster to prevent from getting infected again from the worm, he said.

Thursday, October 10, 2019

A house Divided: Abortion and Slavery in America

In 1856, Lincoln stood out as he opposed the sovereignty doctrine and freedom for states to choose whether to continue practicing slavery or free all of their slaves. His assertion was that the country had to make a choice either to continue with slavery or make the slaves free in all states. This was based on the understanding that all the states were bound by one constitution.For the country to stand as one, it had to make a single choice. Today the country is being faced by the debate of prolife and pro-choice. To the pro-choice, the decision to keep or terminate the lie of the unborn child is left on the hands of the mother while the prolife believe the unborn child enjoys the same rights just as any other person (Melton, nd). These serious divisions have the potential to split our country along the line of whether to grant the rights to the mother or the unborn child.In both cases, proponents of anti slavery and pro life had and have a moral argument against an evil that deprive s our society of an obligation to protect the life of the unborn just as we protect the living.   It is definite that there cannot be any middle ground in the case relating to abortion. We need either to fully support the pro-choice and continue blatantly killing the helpless young humans who have no power to defend themselves.On the other, hand we can embrace the logic of the pro-lifers and give the unborn children a chance to enjoy the right to life and other rights later when they see the light in their lives. Just as in the case of slavery, the pursuit of our rights should not be allowed to deprive other humans their equal rights. The law should come out straight and define the fact that, ending the life now is no different from ending it later. By then the question of whether we are killing through abortions shall have been answered.ReferencesMelton, B. (nd).A house Divided: Abortion and Slavery in America. Retrieved on   August 3, 2010 from http://capitolhillcoffeehouse.co m/archives/chch_news_435.htm       A House Divided: Abortion and Slavery in America In the article â€Å"A House Divided: Abortion and Slavery in America,† the author draws a parallelism between abortion and slavery. The article notes four premises around which the arguments for both abortion and slavery similarly revolve as advocates of both practices justify their actions.In rejecting the arguments of the pro-slavery and the pro-choice camps on identical grounds, the author admonishes society not to replicate its past mistake.In the first premise, slaves and in utero children are being regarded as properties. Since they are both properties, it is presumed that their owners retain the right to decide what to do about them. Slave owners, therefore, have the right to do whatever they want to do with the slaves that they â€Å"own† and pregnant women should be allowed to decide whether to keep or abort their â€Å"own† fetuses.The second premise involves the economics of the situations, i.e.: slave owners, in particular, and the nation’s ec onomy, in general, profit from the labor of the slaves while women turn to abortion in order to escape the burden of raising a child under conditions of abject poverty especially when the child is unwanted for whatever reason.Third, both the slave owners and the pregnant women argue that their actions are morally acceptable under specific conditions: when the slaves acquiesce to their situation and the pregnancy endangers the life of the mother.Finally, both the slave owners and the pregnant women claim that they are only doing what is best for the slaves and the fetuses. In the former case, owners argue that slaves have better security if they remain slaves because the owners feed and protect them than when they are freed and left by their lonesome to face the harshness of the world. In the case of the fetus of a poor woman, abortion is considered a humanitarian assurance that the child does not experience the evils of life of poverty.The author rejects all of these premises on the ground that they are one-sided. In other words, only the slave owners and the pregnant women are endowed with the rights to â€Å"life, liberty, and the pursuit of happiness.†The author argues that by denying the same rights to the slaves and the fetuses would be to deny them of their humanity as well. Therefore, the author maintains that both slavery and abortion could not be considered morally right since these practices deny the slaves and the fetuses (who are also considered human beings in the eyes of the law) of their human rights to â€Å"life, liberty, and the pursuit of happiness.†ReferenceA House Divided: Abortion and Slavery in America. Attachment to order # 71203674.Â