Wednesday, October 30, 2019

It is written in the word file that i have upload Essay

It is written in the word file that i have upload - Essay Example It was the notion of many individuals in the world in the early years, that in order to increase the production of honey from bees one just needed to create a conducive environment for many more beehives. In the current days, the process of bee keeping has become very complicated, a process, which entails several, processes (Perman, 2012). For better results of beekeeping, the practitioners should combine both the scientific and the technological and practical skills to their knowledge of beekeeping. Eventually, the word apiculture describes the scientific process of beekeeping as a very comprehensive and technological enterprise. Human beings made their first hives, which varied in sizes and their main intention was to increase the production of honey. After they had trapped enough bees that made enough honey in the hives, such hives collected five gallons of honey. The colonies of bees in the hives were first killed before the harvesting of honey and later removed all the honeycomb s from the hives. This way of collection of honey shows that the people’s main interest was honey and they did not think of the consequences they pose to the colonies of bees (Tietenberg, & Organisation for Economic Co-operation and Development, 2004). This method is unreliable since it endangers the survival of bees. Later on, in the nineteenth century, the beekeepers experimented making the beehives using wood. The beehives were made into wooden boxes and inside the boxes were plated which divided the boxes for easy addition and removal of boxes and in order to control the activities of the bees. This method proved to work because people could do the harvesting of honey without killing the colonies of bees thus promoting the process of beekeeping (Pearce, J, & R, 2011). There are different types of honeybees. They include the European Honey Bees and the African Honey Bees among others. The scientists believe that the African Honey Bees will dominate and especially when the regular honeybees interbreed with the Africanized honey bees, the Africanized honeybees dominate. This shows that there is a likelihood of the Africanized honeybees to dominate and migrate to Arizona and other parts of the world. Therefore, the individuals who want to indulge into beekeeping should permanently change their view on the Africanized honeybee. They should also learn the habits of bees so that they can be able to take precautions and to be able to support their efforts of beekeeping. Bees are very important insects that human beings greatly depend on them. In order for an individual to be able to understand the threat posed by the bees, they should start by understanding the behaviour of the honeybees. These insects are very essential to human beings and thus their destruction will affect several activities of a human being. The honey bees aid in pollination of many crops that human beings farm and consume as food thus it is a very essential agricultural component. In an y case, as long as the bee colony does not negatively affect animals and human beings, the bee colonies should prosper and grow wide (Pearce & Golen, 1984). The European honeybees differ greatly from Africanized honeybees. They may appear to look similar but they have very different behaviours. The Africanized honeybees have a tendency of swarming more frequently as compared to the European

Monday, October 28, 2019

The US border Security Essay Example for Free

The US border Security Essay Discussed in this essay is an outline of US borders and security related to them. The geographic and strategic value of the borders has been described in the beginning. Then the origin and purpose of United States Border Patrol has been discussed. Mentioned in the middle body are the steps or actions that USBP had taken so far in for safeguarding the borders along with the trouble they have endured in curbing issues such as illegal immigration, drug and human trafficking and screen immigrants for the signs of terrorism. Also discussed in length are human and drug trafficking that takes place across US border and how these things make their way into United States. The United States policy regarding border security is briefly discussed and the essay is closed with an analytical conclusion. US Border Security Since the beginning of civilization, borders have perhaps been the most valued asset nations consider themselves to have. Wars have been waged for the sake of their protection or expansion but they have been regarded sacredly none the less. As humanity progressed into the latter centuries, the concepts and its rigidity regarding the borders of a state kept on changing as the ancient world had open and unmanned borders. United States of America, since its creation has been guarding her borders with absolute zeal and dedication. Acquiring the half of the north American continent, United States is flanked by ocean on both its east and west side, whilst it shares its borders with Canada in the north and from Mexico in the south. Being one of the richest, most advanced and highly organized countries of the world, United States borders have been the object of fascination for its neighboring countries, specially Mexico being a third world country living right at the door step of US. Adhering to a strict and stern immigration and interior policy, people from all across the globe find it difficult to get entrance into the US without severe securitization. Offering the glorious prospects of freedom, financial security, safeguarding of rights and its ability to assimilate the diverse cultures of the world into its own, almost every person in the world has been enchanted by the prospect of living a life in the US, the Land of the Free. That is the reason its 8,000 miles long border have been violated enough times, specially from the south as immigrants from all across South American wishes to live a life of peace in the US. Along with the sea of illegal immigrants, US borders also face smugglers of both drugs and contraband items because of being one of the most lucrative markets in the world. Coupled with these troubles, US borders have been guarded highly as means of not permitting terrorist from making their way into US. The taste of 9/11 is something that US hasn’t quite forgotten yet. Thus, the border security of United States is not only one of the highest efficient and vigilant in the world, it is also one of the most sensitive one due to its immense size. Its importance can be summed up in the words of Ronald Regan as he said: The simple truth is that weve lost control of our own borders, and no Nation can do that and survive. We ignore Americas lost sovereignty at our own peril† (cited in www. usborderwatch. com) Overview The land border of US along with Canada spans 5,525 miles and is the longest non-militarized border in the world. There are 84 land POEs (Point Of Entry) along the northern border, which include but are not limited to three in Idaho,13 in Maine, three in Michigan, five in Minnesota, 10 in Montana, 12 in New York, 18 in North Dakota, seven in Vermont, and 12 in Washington. Around 250,000 people enter the United States from Canada. Canada is the single largest trading partner of the United States, with the total trade exceeding almost $372 billion in 2003. In fact, the largest trade link in the world is the Ambassador Bridge (connecting Detroit, Michigan and Windsor, Ontario) that has more than 7,000 trucks crossing daily transporting goods worth more than $120 billion per year. The southern land border with Mexico is 1,933 miles across and has 25 land POEs, six of which are in California, six in Arizona, two in New Mexico, and 11 in Texas. Over 800,000 people arrive from Mexico daily. Mexico is United States second largest trading partner, with the trade of $220. 3 billion in 2003, down from $247. 2 billion in 2000. The coast line of the United States is 12,479 miles long and there are 143 sea POEs. Some sea and river POEs are principally commercial ports while others receive passengers (Border Security: Inspections Practices, Policies, and Issues, 2004). In order to be able to cope with such a vast border from which not trade merchandise has been able to pass but also torrent of immigrants, either legal or illegal along with the high possibility of drugs, liquor, contraband items and smuggled good, US Border Patrol was founded in 1924 which after 85 five years is among one of the finest law enforcement organizations in the world. United States Border Patrol (USBP) Founded in 1924, the U. S. Border Patrol was established in El Paso, Texas, and Detroit, Michigan. Its primary purpose was to curb the illegal entry of aliens, contraband, and the flow of forbidden liquor from Mexico and Canada into the United States. Under the authority of the Immigration Act, approved by Congress on May 28, 1924, the Border Patrol was created as a uniformed law enforcement branch of the Immigration Bureau (â€Å"85 Years Of Protected By†, 2009). Back in those days, smuggling of liquor from Canada and Mexico was an immensely lucrative business and invited illegal immigrants to have a go at their lucks in United States. Today, the USBP’s primary mission is to detect and prevent the entry of terrorists, weapons of mass destruction, and illegal aliens into the country, and to interdict drug smugglers and other criminals along the border. The Homeland Security Act of 2002 dissolved the Immigration and Naturalization Service and placed the USBP within the Department of Homeland Security (DHS) (Border security, the role of US border patrol, 2008). In the wake of 9/11, USBP’s funding and man power has been increased exponentially by the consent of Congress. Now having almost 18,000 agents in 20 sectors, and 164 stations all across the United States, its objectives and strategies also include the prevention of terrorists from entering the United States soil along with the detection and neutralization of weapons of mass destruction. Perhaps the toughest task USBP has to do is to curb the flow of illegal immigrants the swarms the borders of United States, especially the southern border. Due to the fact that over 97% of unauthorized migrant apprehensions occur along the southwest border, the USBP deploys over 90% of its agents there to deter illegal immigration. In 1993, a study commissioned by the Office of National Drug Control Policy pointed out to the fact that the southwest border was becoming the den of illegal immigrants noting as an example that 6,000 illegal immigrants attempted to enter the United States every night along a 7. 5 mile stretch of the San Diego border. The study also concluded that drug smuggling was a serious threat all along the southwest border, and recommended that the entries of the illegal immigrants should e prevented at the border rather than arresting them after entrance. This consequently led to USBP’s implementation of its first National Strategic Plan (NSP) in 1994. National Strategic Plan An endeavor to gain control over the overrun borders, NSP started out as a multiphase programs so as to maximize the USBP’s resources and their implementation on the areas of greatest entry of illegal immigrants and goods. The focus of the NSP was an operational strategy known as â€Å"Prevention Through Deterrence. † The strategy’s goal was to place USBP agents and resources directly on the border in order to prevent the entry of illegal aliens, rather than attempting to arrest aliens after they have already entered the country. Strategy’s phase I was called program â€Å"Hold the Line† at El Paso sector, which focused on the deployment of the agents deep into the borders in order to detect any alleged or attempted entries of border crossing rather than apprehending the culprits in the city streets and wasting precious time as it was relatively easy to catch border crossers in the wide open desert. The program wasn’t a complete success as it merely shifted the border crossing point from El Paso to somewhere else. San Diego’s Operation Gatekeeper followed after the El Paso program and many agents were deployed along the San Diego border. Aiding them was the state of the art ground sensors, infra-red cameras and stadium lights along with landing mats used as a border fence. Phase II of the program included the expansion of Operation Safeguard (1999) in Tucson, Arizona, operation Rio Grande (1997) in the McAllen and Laredo sectors of Texas, and an increased emphasis on securing the northern border. Phase III was set to involve the remaining areas of the southwest border as well as the coastal waters around Florida and Puerto Rico (Border security, the role of US border patrol, 2008). After the fateful events of 9/11, the USBP has modified its directives and prioritizing the prevention of terrorist penetration through the borders. As the investigations relating to 9/11 revealed that the terrorists had roamed freely across US with the status of illegal immigrant and prepared for the attacks from with in the US soil, USBP in collaboration with Immigration and Custom’s Enforcements, Anti Smuggling Units and CBP’s intelligence has directed all its attention towards the alien penetration across the US border. USBP revealed their new strategy to cope with the terror threats from entering US via illegal border crossing in March 2005. The five major points of that strategy are as follows. Establishing the substantial probability of apprehending terrorists and their weapons as they attempt to enter illegally between the ports of entry; Deterring illegal entries through improved enforcement; Detecting, apprehending, and deterring smugglers of humans, drugs, and other contraband; Leveraging â€Å"Smart Border† technology to multiply the deterrent and enforcement effect of Agents; Reducing crime in border communities, thereby improving the quality of life and economic vitality of those areas (Border security, the role of US border patrol, 2008). Striving hard to get the task done, the Homeland Security Department last year awarded one of the most ambitious technology contracts in the war on terror, a 10-year deal estimated at up to $10 billion to the global consulting firm Accenture. In return, the company would provide services to create a â€Å"virtual border that would electronically screen millions of foreign travelers. Termed as US-VISIT program, which stands for the United States Visitor and Immigrant Status Indicator Technology, started in July 2003. The US-VISIT system must eventually cover nearly 7,000 miles of borders along Mexico and Canada, including more than 300 land, air and sea ports that witness 450 million crossings a year (Higam OHarrow Jr. , 2005, p. A01). Human and Drug Trafficking across US borders Aside from the newly instilled fear of terrorism, United States faces the troublesome elements of smuggling of drugs and human trafficking and most of these gruesome things wade their way into America by means of illegal border crossing. Addressing the human trafficking element first, â€Å"The U. S. State Department’s 2005 Report on Human Trafficking estimates that between 600,000 to 800,000 people are trafficked across international borders every year and almost 20,000 are trafficked across U. S. borders alone† (â€Å"Combat Trafficking in Persons†, 2005). The horrible side of this gruesome business is that most of the trafficked persons are children. Extremely lucrative and seemingly unobtrusive, â€Å"human trafficking is considered to be the third-largest source of criminal income worldwide, generating an estimated $9. 5 billion per year. It is also closely linked with money laundering, document forgery, drug trafficking and international terrorism. † (Keefer, 2006, p. 5). According to John P. Torres, deputy assistant director for smuggling and public safety at the United States Bureau of Immigration and Customs Enforcement (ICE) cross border human trafficking is a â€Å"significant risk to national security and public safety† (Seper, 2004). Drug trafficking is the problem that has plagued US since its very beginning. The very purpose of the establishment of USBP was to prohibit smuggled drugs from entering American territory but even after 85 years, the problem has not been fully curbed yet. It is the most lucrative organized crime operation in United States with its annual income estimated to be â€Å"as high as $110 billion† (â€Å"America’s Habit†, 1986). Cocaine being the most sought after drug, as its roots of origin are literally buried in South American countries, other popular drugs such as marijuana and heroin make its way into United States by means of either maritime vessels or through southern border. The numerous drug cartels active in United States gets their drugs en route Mexico regardless of the joint ventures both countries engaged in so as to hamper the drug trafficking. Mexico itself cultivates heroin and due to its lightly guarded 2,000 miles border with United States is the chief trafficker of heroin in USA. Drugs also are brought in underground through tunnels; some 100 have been discovered since 1990 along the 1,950-mile U. S. -Mexico border. The most sophisticated tunnels have lights, air systems and hydraulics (Feyerick et al, 2009). Regardless of extra tight security since 9/11 drug somehow is making its way into United States and hasn’t completely been stopped yet. Aside from human and drug trafficking, the USBP also has to look out for items of contraband nature such as weapons and pirated merchandise. With such a huge number of people passing through both north and south borders of United States, hunting down illegal immigrants, terrorists, drugs and pirated merchandise has become a daunting task for USBP. United States Border Security Policy Aware of its much sought after status, United States border security has always been very clear and its primary motive is to make sure the safety and its borders from the swarms of illegal immigrants and smuggled goods. The primary emphasis of the policy is about the status of immigrants who crosses both the borders of north and south to gain access into United States. Being in excellent terms with the government of Canada, the northern border of United States is subjected to less scrutinizing as compared to the southern one that’s in contact with Mexico. The residents of Mexico are issued a special Mexican Laser Visa that grants them access into US for as long as 6 months. Southern border, being constantly breached by illegal immigrants and smugglers is a highly watched territory where thousands of people pass every day thus making it extremely difficult for CBP and USBP to keep an eye out for anomalies. Keeping that in mind, granting Visa is not the only procedure to gain access into United States. Interviews are conducted, data is cross referenced and surveillance is mounted so that only the right person could be able to go through the gates of US. In the post 9/11 times, the security checks has been doubled and it has become the â€Å"primary mission of CBP is to prevent terrorists and terrorist weapons from entering the country. However, other components of CBP’s mission include interdicting other prohibited items such as illegal drugs, ammunition, firearms, and counterfeit goods; and monitoring trade compliance† (Border Security: Inspections Practices, Policies, and Issues, 2004). Conclusion The border patrol strategy was aimed at strengthening of United States immigration laws and strove for decreasing the number of illegal immigrants coming into the United States by increasing controls at the its borders. Previously the resources were primarily directed at strengthening the border patrol along the southwest border, to curb the entrance of illegal immigrants and smuggled goods but the terrorist attacks, however, brought attention to the northern border, which has been understaffed and lacked the necessary technology to adequately screen individuals seeking entry into the United States. Several pieces of legislation passed in the 107th Congress authorized and appropriated funding for additional staffing and resources along the northern border. Regardless of its outstanding services and capabilities, USBP has not been able to completely tackle the problem of illegal immigrants and smuggled merchandise. Many reasons, such the sheer size of the borders, the number of immigrants passing through it every and the dogged determinacy of people willing to enter the Land of the Free etc may contribute to its incomplete success. But that still doesn’t change the fact that US borders are much more safe and vigilant in the presence of United Stated Border Patrol. Reference â€Å"85 years of protected by† retrieved May 24, 2009 from http://www. cbp. gov/xp/cgov/border_security/border_patrol/85th_anniversary. xml/. â€Å"Americas Habit†, Drug Abuse, Drug Trafficking, Organized Crime Presidents Commission on Organized Crime, 1986, retrieved May 24, 2009 from http://www. druglibrary. org/SCHAFFER/GOVPUBS/amhab/amhabc3. htm/. â€Å"Border Security: Inspections Practices, Policies, and Issues†. CRS Report for Congress, 2004. Order Code RL32399, Congressional Research Service, The Library of Congress. â€Å"Border Security: The Role of the U. S. Border Patrol†. CRS Report for Congress, 2008. Order Code RL32562, Congressional Research Service, The Library of Congress. Feyerick, Deborah; Cary, Michael Steffen, Sheila. â€Å"Drug smugglers becoming more creative, U. S. agents say† April 16, 2009, retrieved May 24, 2009 from http://edition. cnn. com/2009/CRIME/04/16/creative. drug. smugglers/index. html/. Keefer, Sandra L. , â€Å"Human Trafficking And The Impact On National Security For The United States† March 2006, U. S. Army War College Carlisle Barracks, Pennsylvania 17013, p. 5-8. OHarrow Jr. Robert Higham, Scott. â€Å"US Border Security At Cross Roads† Washington Post, Monday, May 23, 2005, p. A01. Regan, Ronald. Quotation. Retrieved May 24, 2009 from http://usborderwatch. com/. Seper, Jerry. â€Å"Human Smuggling a Security Risk. † Washington Times. 19 May 2004, retrieved May 24 2009 from http://www. washingtontimes. com/functions/print. php? StoryID=20040518-103934-8980/. Trafficking in Persons Report, U. S. Department of State, 2005, retrieved May 24, 2009, http://state. gov/g/tip/tiprpt/2005/46606. htm/.

Friday, October 25, 2019

Platos Symposium Essay -- Socrates Love Symposium Essays Plato

Plato's Symposium   Ã‚  Ã‚  Ã‚  Ã‚  What is the meaning of love? What does love feel like? How does love come about? No one can truly explain it, yet somehow it's understood. In Plato's Symposium, a dinner party was held with the discussion of love as the main topic. Everyone was required to make a speech, an ode to Love, the spirit. The philosopher, Socrates gave his speech last, claiming that his speech was merely a repetition of what a wise woman named Diotima once told him. The speech was a powerful one, but before the night was over, a drunk Alcibiades entered. He was asked to make a eulogy for Love as well, but instead, talked about the nature of Socrates. The nature of Love and the nature of Socrates turned out to be extremely similar. In the Symposium, Socrates can be seen as the embodiment of Love itself.   Ã‚  Ã‚  Ã‚  Ã‚  The notion of love that was understood at the end of the Symposium came about gradually. It transformed from speaker to speaker over the course of the party, and could be compared to the whole process of understanding love that Socrates tried to explain in his own speech.   Ã‚  Ã‚  Ã‚  Ã‚  Its complexity was attained by taking small steps in a larger direction. Diotima explained to Socrates, that to attain the deepest love, he had to follow a certain order.   Ã‚  Ã‚  Ã‚  Ã‚  Much like stepping up on the "rungs in a ladder"(211c), love's nature started small, with Phaedrus and Pausinas merely stating that there was good love and bad love. This was the first step, starting with "beautiful things"(211c) and making those things "reason for... ascent"(211c) up the proverbial ladder. Next Eryximachus' speech compared love's importance to that of medicine's. He used the "things of this world as rungs in a ladder"(211c). Aristophanes then gives love a comedic approach, breaking up the adulation. Agathon was next, and his speech showed how love affected people's minds. It created great poets, and spawned the practices of "hedonism, luxury, and sensualism"(197d). Agathon was last before Socrates, and the closest to Socrates' view. He was at the final steps of the deepest love, seeing the "beauty of people's activities"(211c) and of "intellectual endeavors"(211c).   Ã‚  Ã‚  Ã‚  Ã‚  Love, the spirit, was said to be the son of "Plenty and Poverty"(203c). One parent a polar opposite of the other, coming together to form the middle path named Love. The spirit Love was full of self-conflic... ...lings were not a eulogy for Love, they were personal opinions of his experiences with Socrates, and bluntly stated it. Although it must be taken into consideration that he was characterized as drunk while giving his speech, he reminded the party that the "truth comes from wine"(217e). Essentially, reassuring the reader that he is not in a condition to be making up lies. His description of Socrates' nature was similar to that of Socrates' own description of love's nature. However, Alcibiades was not at the party when Socrates made his speech, so there was no way could have used it to fashion a similar story of his own.   Ã‚  Ã‚  Ã‚  Ã‚  Socrates was regarded as the wisest man at the party. He could have given a "second-rate report"(215d) on love, as Alcibiades would have said, and "woman, man, or child"(215d) would have been "overwhelmed and spellbound"(215d). It was the effect Socrates had on people. Perhaps he was the embodiment of love? Even if his speech was fictional, he held a captivated audience of men who would have reveled in the chance to "lay"(219b) with the Socrates. Works Cited: Plato, and Robin Waterfield, trans. Symposium. New York: Oxford University Press, 1994.

Thursday, October 24, 2019

Salvador Dali Last Supper

February 4, 2009 Surrealistic Meeting Salvador Dali drew the pictureâ€Å"The Sacrament of the Last Supper†in 1955. This painting has quite a bit of emotion as you look and see how the apostles are kneeling. This image was created to show the futurism in the resurrection of Christ. Futurism rejects the traditional form and include art into modern technology. In this painting the most significant detail in this portrait, would be the spirt above the table in form of the cross. This figure is Jesus sprit rising out of him the night before he was going to be crucified.Everyone at the table see this spirt floating out of him and that is why they are bowing their heads. Along with this spirt rising, the large windows in the background, Dali seemed to want all the heavens see what is going on during this meal. Salvador Dali's picture is a totally different setting than the original painting of the last supper. Dali's is set in a peaceful table with bright sun that is showing happine ss and the bright future of everyone at the table. With the mountains covered in snow the setting must be cold but the people in the picture look very warm with just their light robes on while praying.Dali's picture shows the man rising above the table must be the spirit of Jesus leaving his body the night before he was crucified. The arms reaching over the people at the table show his power, strength and desire to protect the loyal ones. The Jesus at the table is in torn clothes, symbolizing a struggle during the day. He looks at peace, like he is ready for his punishment the next day. Out stretched arms of his spirit means he is floating up to the heavens, so the only thing left is just his body or shell. The other people at the table are praying for his spirit and giving thanks for the bread and wine he left them on the table.On the left arm of Jesus is a dove sitting on his hand that symbolizes the calmness of the situation. His right hand, with the fingers that look like they a re pointing to the spirit rising above shows the world  that his spirit will not be stopped no matter what they do with his shell he will live on. This surrealistic setting is the sign that Dali is portraying Jesus as a wonderful peaceful man. He is facing his ordeal with courage and dignity. He looks to be telling his people not to morn and not to hate for what is about to happen. Letting everyone know to keep faith in him and all will be well in the future.The sun shining through the clouds indicates the day is calm and warm even though the mountains have snow in them, It seems Jesus is assuring them that he will keep them all warm with his heart. There is a boat on the shore and that must mean someone with wealth and power showed up for the supper, it might belong to the one person that is in the gold robe. The setting of this background might be a place by Dali's home or  a place where he wanted to live. The big wooden beams and stone dining area proves this is a strong plac e and built to withstand anything.The arms of Jesus spirit are going through the beams and must mean that nothing is as strong as the spirit of Jesus. This surrealistic setting is the sign that Dali is portraying Jesus as a wonderful peaceful man. He is facing his ordeal with courage and dignity. He looks to be telling his people not to morn and not to hate for what is about to happen. Letting everyone know to keep faith in him and all will be well in the future. This painting has a very peaceful and serene theme as shown by the mountains, and the calm face of Jesus.

Wednesday, October 23, 2019

How does Mackay express his feelings for the two cultures he belongs to?

Claude Mckay was brought up in Jamaica and moved in the to New York in the 1930s. This was during America's post-economical depression, which meant getting enough money or getting enough money was a very big struggle. It was even a bigger struggle for him to get a good job as an immigrant worker, so he had to settle for menial jobs. Although there was not formal and legal ‘segregation' between black and white as there was in the South, there were areas for only blacks or only whites and prejudice was rife. Mckay became a political and social activist for human rights. In his poems, he evokes a strong sense of his homeland in order to assert the power of its beauty, to seek comfort in the emotional and spiritual warmth he remembers about the place. I SHALL RETURN The title ‘I shall return' suggests a sense of homesickness and emphasises his determination to go back. The title is a definite statement which may suggest a sense of disappointment or frustration which is reminding him of how beautiful his homeland is. It can also be seen as a promise, as if he was promising himself a reward in order to carry on with life struggle with a purpose. He repeats the same statement, almost as if he was trying to memorize it: â€Å"I shall return to loiter. I shall return to fiddle†¦Ã¢â‚¬  This helps to add a certain flow as the reader reads through the poem. It also makes the statement ‘I shall return' become more alive and more promising to come to pass. It could be seen as him making himself a purpose for carrying on with life. He uses colour to describe the images in his homeland: â€Å"†¦like brown blade†¦Ã¢â‚¬ , â€Å"†¦the forest fires burn wafting their blue-black smoke to sapphire skies†¦Ã¢â‚¬  This allows the images to be physical and easier to picture. He probably used this technique to make the idea of his returning more realistic for him to be able to picture himself there. He stresses on how much he misses his homeland, even its disadvantages by beautifying them: â€Å"†¦at golden noon the forest fires burn wafting†¦Ã¢â‚¬  He uses this to show that his homeland's bad views can be looked upon as exhibitions. This help to promote the idea of his returning even besides the negative aspects. He uses metaphors to describe his feelings for the New York: â€Å"†¦to ease my mind off long, long years of pain†¦Ã¢â‚¬  This technique portrays his feelings for New York in a way the reader can relate to. The structure of the text has a tremendous significance as it echoes the pattern of thoughts and feelings of the writer. It heads the reader to understand the message. The poem is written in a sonnet, which is important as a sonnet consists of two stanzas; an octave and a Sestet. The octave involves talking about the problems being faced, whilst the Sestet is about finding a solution to the problem: â€Å"I shall return again†¦Ã¢â‚¬  So in ‘I shall return' he uses the idea of returning to his homeland as a solution to his problem. THE TROPICS OF NEW YORK The title ‘The tropics of New York' suggests McKay evolving New York and turning it into his homeland. It could be said that he was missing home so much that he was starting to see visions of his homeland in New York. The title can also suggest Mckay getting used to the Yankees style of life and him finding positive aspects of their culture. He uses repetition and makes the rhythm comparable to that of an excited child at Christmas: â€Å"Bananas ripe and green and ginger-roots†¦and pears†¦Ã¢â‚¬  He uses this technique to illustrate the joy he had when he saw these fruits and vegetables. The excitement of the tone is only because the fruit reminds him of his homeland which just goes to show of how much he misses the place. In The Tropics of New York, he uses religious vocabulary to describe the landscape of his homeland: â€Å"†¦mystical blue skies. In benediction over nun-like hill†¦Ã¢â‚¬  He gives the landscape a significance, which suggests that he adores it. It also adds a sense of silence and peace to the landscape. He uses alliteration to describe his memories of his memories: â€Å"†¦of fruit trees laden by low †¦Ã¢â‚¬ , â€Å"†¦and dewy dawn†¦Ã¢â‚¬  This helps slow the pace down to help him emphasis the beauty of his homeland. It also adds a gentle sound and some resonance, which helps to produce a visual image of calm beauty. As these were memories, the qualities could not have been present in New York. He evolves senses in order to separate the three stanzas. In the first stanza, he uses the sense of taste and tells of the food he saw. He uses sight in the second stanza to describe what he was seeing and the sense of feeling in the third in order to show his emotions. This allows the reader to picture New York from different points of view. It also helps to convey his emotions in a way that the reader could relate to. He uses archaic syntax in the beginning of the third stanza to describe his emotions after seeing these fruits: â€Å"†¦I could no more gaze†¦Ã¢â‚¬  This helps to lead the calmness of the stanza. The calmness of the stanza can help evaluate how emotionally touched he was to see these fruits as he probably last saw them a long time ago. He uses a metaphor to describe how he misses his old homeland: â€Å"†¦hungry for the old familiar ways†¦Ã¢â‚¬  The metaphor signals a change from physical longing to emotional and spiritual longing. It shows of how desperate he is to go back to his country. Mckay uses a regular rhythm scheme (a/b/a/b). This helps to contain the emotion. The structure of the poem mirrors the process of seeing the fruit and wanting to eat it, whilst visualising the country it comes from to the spiritual way of life in that place. In conclusion, I found out that Mckay uses both poems to illustrate his feelings towards both places uses techniques such as alliteration, narrative voice, metaphors, vocabulary, structure of the poems etc. His overall feeling is that he misses home and has a great desire to return. He feels living in New York is very painful and he does not seem to want to get use to the its lifestyle: â€Å"†¦hungry for the old familiar ways†¦Ã¢â‚¬ 

Tuesday, October 22, 2019

The History and Domestication of Cassava

The History and Domestication of Cassava Cassava (Manihot esculenta), also known as manioc, tapioca, yuca, and mandioca, is a domesticated species of tuber, a root crop originally domesticated perhaps as long ago as 8,000–10,000 years ago, in southern Brazil and eastern Bolivia along the southwestern border of the Amazon basin. Cassava is today a primary calorie source in tropical regions around the world, and the sixth most important crop plant worldwide. Fast Facts: Cassava Domestication Cassava, commonly called manioc or tapioca, is a domesticated species of tuber, and the sixth most important food crop in the world.  It was domesticated in the southwestern Amazon of Brazil and Bolivia some 8,000-10,000 years ago.  Domesticate improvements include traits which must have been added by means of clonal propagation.  Burned tubers of manioc were discovered at the classic Maya site of Ceren, dated to 600 CE.   Cassava Progenitors The progenitor of cassava (M. esculenta ssp. flabellifolia) exists today and is adapted to forest and savanna ecotones. The process of domestication improved the size and production level of its tubers, and increased the photosynthesis rate and seed functionality, by using repeated cycles of clonal propagation- wild manioc cannot be reproduced by stem cuttings. Archaeological macro-botanical evidence of cassava in the little-investigated Amazon basin has not been identified, partly because root crops do not preserve well. Identification of the Amazon as the point of origin was based on genetic studies of cultivated cassava and all various possible progenitors, and the Amazonian M. esculenta ssp. flabellifolia was determined to be the wild form of todays cassava plant. Amazon Evidence: The Teotonio Site The oldest archaeological evidence for manioc domestication is from starches and pollen grains from sites outside the Amazon.  In 2018, archaeologist Jennifer Watling and colleagues reported the presence of manioc phytoliths attached to stone tools at the southwestern Amazon Teotonio site in Brazil very near the Bolivian border. The phytoliths were found in a level of dark earth (terra preta) dated to 6,000 calendar years ago (cal BP), 3,500 years older than any terra preta anywhere else in the Amazon to date. The manioc at Teotonio was found alongside domesticated squash (Cucurbita sp), beans (Phaseolus), and guava (Psidium), indicating that the inhabitants were early horticulturalists in what is becoming recognized as an Amazonian center of domestication. Cassava Species Around the World Cassava (Manihot esculenta), root and ground for dinner.   Rodrigo Ruiz Ciancia / Moment / Getty Images Cassava starches have been identified in north-central Colombia by approximately 7,500 years ago, and in Panama at Aguadulce Shelter, about 6,900 years ago. Pollen grains from cultivated cassava have been found in archaeological sites in Belize and Mexicos Gulf coast by 5,800–4,500 bp, and in Puerto Rico between 3,300 and 2,900 years ago. Thus, scholars can safely say that the domestication in the Amazon had to happen before 7,500 years ago. There are numerous cassava and manioc species in the world today, and researchers still struggle with their differentiation, but recent research supports the notion that they are all descended from a single domestication event in the Amazon basin. Domestic manioc has larger and more roots and increased tannin content in the leaves. Traditionally, manioc is grown in the field-and-fallow cycles of slash and burn agriculture, where its flowers are pollinated by insects and its seeds dispersed by ants. Manioc and the Maya The Pompeii of North America, Joya de Ceren, was buried in a volcanic eruption in August 595 CE. Ed Nellis Members of the Maya civilization cultivated the root crop and it may have been a staple in some parts of the Maya world. Manioc pollen has been discovered in the Maya region by the late Archaic period, and most of the Maya groups studied in the 20th century were found to cultivate manioc in their fields. The excavations at Ceren, a classic period Maya village that was destroyed (and preserved) by a volcanic eruption, identified manioc plants within the kitchen gardens. Manioc planting beds were discovered some 550 feet (170 meters) away from the village. The manioc beds at Ceren date to approximately 600 CE. They consist of ridged fields, with the tubers planted on the top of the ridges and water allowed to drain and flow through the wales between the ridges (called calles). Archaeologists discovered five manioc tubers in the field which had been missed during harvesting. Stalks of manioc bushes had been cut into 3–5 foot (1–1.5 meter) lengths and buried horizontally in the beds shortly before the eruption: these represent preparation for the next crop. The eruption occurred in August of 595 CE, burying the field in nearly 10 ft (3 m) of volcanic ash. Sources Brown, Cecil H., et al. The Paleobiolinguistics of Domesticated Manioc (Manihot esculenta). Ethnobiology Letters 4 (2013): 61–70. Print.Clement, Charles R., et al. The Domestication of Amazonia before European Conquest. Proceedings of the Royal Society B: Biological Sciences 282.1812 (2015): 20150813. Print.De Matos Viegas, Susana. Pleasures That Differentiate: Transformational Bodies among the Tupinamb of Olivenà §a (Atlantic Coast, Brazil). Journal of the Royal Anthropological Institute 18.3 (2012): 536–53. Print.Fraser, James, et al. Crop Diversity on Anthropogenic Dark Earths in Central Amazonia. Human Ecology 39.4 (2011): 395–406. Print.Isendahl, Christian. The Domestication and Early Spread of Manioc ( Manihot Esculenta Crantz): A Brief Synthesis. Latin American Antiquity 22.4 (2011): 452–68. Print.Kawa, Nicholas C., Christopher McCarty, and Charles R. Clement. Manioc Varietal Diversity, Social Networks, and Distribution Constraints in Rural Amazoni a. Current Anthropology 54.6 (2013): 764–70. Print. Sheets, Payson, et al. Manioc Cultivation at Ceren, El Salvador: Occasional Kitchen Garden Plant or Staple Crop? Ancient Mesoamerica 22.01 (2011): 1–11. Print.Watling, Jennifer, et al. Direct Archaeological Evidence for Southwestern Amazonia as an Early Plant Domestication and Food Production Centre. PLOS ONE 13.7 (2018): e0199868. Print.

Monday, October 21, 2019

Raoults Law Definition in Chemistry

Raoult's Law Definition in Chemistry Raoults law is a chemical law that relates the the vapor pressure of a  solution is dependent on the mole fraction of a solute added to solution.Raoults Law is expressed by the formula:Psolution ÃŽ §solventP0solventwherePsolution is the vapor pressure of the solutionÃŽ §solvent is mole fraction of the solventP0solvent is the vapor pressure of the pure solventIf more than one solute is added to the solution, each individual solvents component is added to the total pressure. Raoults law is akin to the ideal gas law, except for solution. The ideal gas law assumes ideal behavior in which the intermolecular forces between dissimilar molecules equals forces between similar molecules. Raoults law assumes the physical properties of the components of a chemical solution are identical. Deviations From Raoult's Law If there are adhesive or cohesive forces between two liquids, there will be deviations from Raoults law. There is negative deviation when the vapor pressure is lower than expected from the law. This occurs when forces between particles are stronger than those between particles in pure liquids. This behavior is observed in a mixture of chloroform and acetone. Here, hydrogen bonds cause the deviation. Another example of negative deviation is in a solution of hydrochloric acid and water. Positive deviation occurs when the cohesion between similar molecules exceeds adhesion between unlike molecules. The result is higher than expected vapor pressure. Both components of the mixture escape solution more readily than if the components were pure. This behavior is observed in mixtures of benzene and methanol and mixtures of chloroform and ethanol. Sources Raoult, F. M. (1886). Loi gà ©nà ©rale des tensions de vapeur des dissolvants (General law of vapor pressures of solvents), Comptes rendus, 104 : 1430-1433.Rock, Peter A. (1969). Chemical Thermodynamics. MacMillan. p.261 ISBN 1891389327.

Sunday, October 20, 2019

Definition and Use of Strikethrough

Definition and Use of Strikethrough A strikethrough is a horizontal line drawn through text, used to indicate the deletion of an error or the removal of text in a draft. If your work is edited or proofed professionally on paper, understanding common revision and editing symbols and abbreviations will help you process the suggested changes. Strikethroughs are used to recommend the deletion of material in traditional editing processes.In modern social-media contexts, a strikethrough thats shown is sometimes used ironically.In some technical contexts, the history of document changes, including struck passages, serves a valuable public purpose. Conventional Uses of Strikethroughs In document editing, both by hand and through computer-aided editing, a strikethrough conveys the editors intent that the material in question ought to be deleted. A strikethrough is a basic copyediting symbol; in ink-on-paper proofreading, a strikethrough is accompanied by a loop at the end of the line to signify deletion. Editing using the track-changes feature in Microsoft Word, by contrast, indicates the deletion through the use of a red strikethrough. When you revise the document using Words reviewing tools, youll either accept or reject the proposed deletion. If you accept it, the struck text vanishes; if you reject it, the strikethrough vanishes and the text remains as-is.   When you encounter strikethroughs in documents that display in black, it suggests that someone intends an edit but isnt using the Track Changes feature. Public Use Cases for Strikethroughs Beyond the one-to-one document editing, the strikethrough can serve as a public record of changes, reflecting who made what revision at what time. The use of sophisticated version-control systems like Git, Subversion, or Mercurial allow people to change a document (usually with symbols that resemble a Track Changes project, including strikethroughs), but each change is captured with a version record that can be viewed over time. For example, Washington, D.C. publishes city laws using a service called Github. Anyone can view the districts complete set of regulations, including noting what changes were made at specific dates. One author proposed a minor typographic tweak to the districts online laws - a change that the D.C. legal administrator accepted. Not many municipalities, let alone other governmental agencies or public corporations, publish their official documents in this manner, but if more people did, it might enhance transparency and public engagement. Alternative Uses of Strikethroughs Online communication sometimes uses these strikethroughs to communicate, usually with intended humorous irony, that the non-stricken language is official and the text with a strike-through represents the writers genuine, unfiltered opinion. In this context, the strikethrough isnt actually a proofreading symbol, but rather a line through the text. In Microsoft Word or Microsoft Outlook, you can apply a strikethrough (or a double-strikethrough) effect on text without invoking any sort of editing tools. You can even color it red to mimic a track-changes edit. This alternative use of strike-through text: Is intended to be viewedReflects an opinion that shouldnt be expressed using that wordingCan sometimes lightly veil an insultHas nothing to do with document editing Youll see this alternative approach most often in blog postings and social media, where the implied snark is more accepted than it might be in formal business contexts.

Saturday, October 19, 2019

Course Essay Example | Topics and Well Written Essays - 5000 words

Course - Essay Example Most often, behaviour, poor performance, and violations of the company’s policies warrant company’s discipline. Dealing with this matter is very important on the part of the company in the development in the attitude in the workforce and also for the advantage of the company’s interest to deliver good quality of products in the increasing demand in the competing world of business. In handling certain situations regarding this, companies adhere to some of the progressive disciplinary process such as verbal caution, verbal warning, written warning, suspension the decision to leave, and termination. Jack manages a call centre for a mail order company. Frequently his reps end up staying late because call volume is heavy. These results in a lot of overtime pay that Jack would like to avoid. He’s considering reclassifying the position as exempt so he wouldn’t have to pay them overtime. He would, however, give them a small raise when he reclassifies them. Do you think Jack’s idea has merit? Discuss the pros and cons. Answer: With regard to the idea of jack that represents the company as a whole, I think it would be best to lay down some of the legal basis before pursuing to these reclassifications of job. The companies, before hiring, has probably gone through job descriptions and in reclassifying those, there must be a compliance within the Department of Labor regulations or otherwise, misclassifications of a job will be subjected to fines and penalties as a part of the consequences. There are certain conditions that must be met for an employee to be exempt job classifications like lawyers, accountants and doctors. Advantages on the part of the company on the exempt job classification is that the company is not required anymore to pay any back overtime but it is also nice that the company offers to pay something even if not being required to do so. I think it is also beneficial on the part of the employee considering that the change takes place only in the classification and not on the job so it is expected that the working hours beyond 40 hours weekly is subjected to be paid as overtime. You are the HR Manager for a retail store with 4 locations within one metropolitan area. The company's sales/marketing strategy has been to be the low cost leader (i.e. have lower prices than competitors), and therefore the compensation strategy has been to pay its store employees just above minimum wage, in the first quartile. Your boss has just told you that he is changing the strategy and now he wants to provide "optimum service", and not necessarily the lowest prices. What changes should be made in the company's compensation strategy as a result of this new direction? You expect your boss will be surprised at how much impact the new pay strategy will have on the payroll budget. What could you suggest to reduce the impact? Answer: In the situation that was given above, there were two concerns involved that have to b e dealt with, the increase in the salary and implementation of the lower cost of the products against the competitors. Lowering the price of the products at the store against the rest of the competitors is a very powerful strategy in attracting more customers that would increase the sales in a certain stores. With regard to these the company is eyeing to also increase the compensation on the part of the wage of the workforce. I think that the main objective of the compensation

Writer's choice Term Paper Example | Topics and Well Written Essays - 750 words

Writer's choice - Term Paper Example With the implementation of effective security mechanism we can gain a great deal of confidence and peace of mind while using these systems at home or marketplace (Shelly, Cashman and Vermaat; Turban, Leidner and McLean). This paper presents some of the security, privacy and ethical aspects regarding information technology and computer systems. There are many issues and threats which are hindering the successful operation and working on information and computer system arrangements. In this scenario, one of the initial risks is security issues from less effectively recruited staff personnel. For instance, any staff member with some illegal aims and objectives can set a virus in the database or hack the overall corporate information. Additionally, this is one of the major ethical dilemmas in information and computer systems (UN; Farshchi, Gharib and Ziyaee). In addition, differences in operating systems, versions and patches can also create various problems and issues regarding defense and protection of information and computer systems. In the absence of such protection strategy the overall information and data can be hacked or deleted. In worst case the business information can be accessed by corporate competitors. Additionally, absence of antivirus software for information and computer systems can also cause a huge problem for personal or business data and information. In case of such situation any virus can simply attack and destroy or stop the overall working of systems. In addition, one of the main issues is about the absence of internal firewalls. In this scenario, any user of systems and web services are open to virus attacks, malware, or Trojan attacks. In such situation overall information and computer systems can be hacked or influenced in case of effective handling and management of operations (UN; Farshchi, Gharib and Ziyaee ). This section discusses how some of the major and critical security, privacy and ethical issues happen.

Friday, October 18, 2019

JOURNALISM AND DEFARMATION Essay Example | Topics and Well Written Essays - 1250 words

JOURNALISM AND DEFARMATION - Essay Example Journalists handle critical stories each day and have to remain on guard each time. Staying on guard will prevent them from getting overwhelmed by the stories and going overboard to publicize public opinion concerning the stories. Therefore, a journalist will need adequate research from reliable sources before publishing any story. However, it is proving much more difficult for journalists to reserve their opinion especially in the current world whereby there are so many media forums1. In the recent past, many journalists have found themselves in much trouble. For example, the yahoo organization fired one of its chief journalists after making a joke about the Romney campaigns. According to many people, Yahoo took the joke with too much weight yet the journalists uttered the statement without malice. In other numerous cases, journalists find themselves sued for causing damages on the reputation of others2. The law classifies such cases as defamation3. However, the law provides defence s that journalists can use in such cases4. The first defense that a journalist can use is justification. Being able to present proof that what the journalist published concerning a plaintiff is true. This requires journalists to publish information after careful research from reliable sources. Justification may require the journalist to present a witness in court in order to expose the truth in what he published. Presenting a reliable justification will serve to clear the plaintiff’s claims of defamation. If the court establishes that the journalist only said something that is true, then he clears the defendant of the charges5. However, the court does not need the defendant to prove beyond doubt that the statement under investigation is true. The courts consider a lower level that involves presenting acceptable proof that the statements made about the plaintiff are true. The challenge for many journalists lies in convincing a witness to testify before a court. Sometimes, thes e witnesses present information in privacy and decline to appear in the limelight. It is worthy noting that regardless of the fact that the standard of ‘beyond reasonable doubt’ does not apply, a court may expect a high level of contextual truth because it expects journalists to be cautious of the statements they make. The second form of defense occurs in the presence of a conviction indicating that the plaintiff had previously faced a conviction regarding the act mentioned in the statement claimed to be defamatory. However, the court will require substantial evidence of conviction in order to prove that the convictions made translate to the statement under investigation. This will require evidence of several instances. For example, making a claim that someone lacks integrity to hold office will require at least two convictions concerning abuse of office6. However, depending on the conviction and the time elapsed; the court may consider the conviction spent. Therefore, a journalist must understand the spending duration of different convictions before drawing conclusions. In other cases, the journalist may use the defence of ‘fair comment’ and give proof to the court that any individual in such a situation would draw similar situations7. This

Write the three definitions on pre-production, production and Essay

Write the three definitions on pre-production, production and post-production - Essay Example Once financing is confirmed and principal cast members, director/directors, and cinematography is determined, this process takes up with helping to integrate the script with regards to the scenery and dynamic which will be utilized. As a function of this, preproduction entails the script being simplified to its most basic scenes. Within such a construct, the preproduction process is able to determine locations, cast members, costumes, special effects/visual effects, and props that will be utilized as a means of making the story cohesive. In order to ensure that this process takes place according to schedule, a detailed schedule is almost always created with regards to the necessary elements that need to take place within the given period of time (Schaefer et al, 2004). Moreover, the script is integrated with the screenplay by means of numbering and page locking the scenes so that all actors and representative staff members will have no confusion with regards to what will take place w ithin each given scene. Finally, any last-minute additions or deletions with regard to the plot line and scripts must be made prior to the process proceeding. Accordingly, as the preceding analysis as discussed, the specific aspects of the filling process is oftentimes one of the most hectic and challenging with regards to the overall level in which all of the necessary components can be completed according to the specified schedule. Production: Upon conclusion of preproduction, the production process itself begins. Within the production process, the actual video/film itself is shot. As compared to the preproduction process, a much larger number of crew are required due to the fact that script supervisors, picture editors, sound editors, photographers, assistant directors, and property masters must all integrated together as a function of producing the film. Although it might be understood by the reader that production itself merely involves the cast members arriving on set and film ing particular scenes, the production process is much more nuanced than this due to the fact that makeup, dressing/lighting, special effects, and seeing preparation crews must all integrate within the process as a means of ensuring that a fluid transition is affected (Johnson-Yale, 2008). In such a manner, adherence to restrict and rigid schedule is also necessary for each of these compounds to take place in an efficient and productive manner. Although there is obviously time for last-minute adjustments, the ultimate goal of this particular process is to wrap each specific scene in a satisfactory manner and move on to the next. Furthermore, the necessity of getting a particular scene correct is an absolute necessity due to the fact that any subsequent set up of a past scene will require a large number of man-hours and additional funding to re-create a prior scene/dynamic of the film. Once the production process has wrapped, a â€Å"wrap party† is oftentimes hosted as a means of expressing thanks to the crew and the cast for the diligence and hard work in bringing the production to a close. Post-Production: The process of postproduction is oftentimes much slower than the process of production. This is somewhat strange due to the fact that the process of postproduction does not require the overall manpower of production. However, during this particular stage video and film that was shot is extensively edited. This requires a painstaking process in which dialogue, music, songs, sound effects, computer graphics, and a variety of other elements are all mixed together as a means of creating a finished product (Davis, 2003). This painstaking process can vary in overall length with regards to specific type of film which is being made. For instance, if a film is

Thursday, October 17, 2019

Book Listing Website using PHP and mySQL,HTML Literature review

Book Listing Website using PHP and mySQL,HTML - Literature review Example This is where a Human-Computer Interaction (HCI) comes into picture. According to (ACM SIGCHI 1996), â€Å"Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them†. HCI in general terms can be inferred as a mix of a discipline belonging to the field of engineering dealing with the science of design. It’s a kind of study which evaluates the level of ease with which a person could use the system using the attributes of practicability, intuitiveness and accuracy. A successful interface implementation depends on how well the requirements of the system are gathered in the initial phase. There are critical opinions mentioning the lack of knowledge with developers in identifying the characteristics of humans while using a system, especially a website (Lotze 2002). Reducing design costs, improving quality and the process involved are some of the research areas that are been explored in recent times. Being a subset of User Interaction, HCI involves identifying goals from the standpoint view of both the user and business and also, developing architectural prototypes that can be refined consistently. Most of the efforts that go into coding and creating designs are actually directed towards the development of HCI. In the current trend, with the emergence of cloud computing and other technical advancements, the necessity to develop a safe, useful and commercially viable website is imperative and looking forward, it stands to remain at the same cynosure. Software Development Life Cycle Software development Life Cycle (SDLC) provides an effective approach for developing a website or any kind of software. SDLC involves seven fundamental phases which enclose the entire development timeframe of the software. All these phases are equally important as faltering in any of the phase would lead to astronomical errors in all ot her subsequent phases. The phases includes, studying feasibleness, analysing requirements, designing, modelling, implementation, testing and active operation. SDLC directly relates the phases involved in the management of project with the corresponding phases of Software Development. Out of several SDLC models that are available, for a small term project of this nature, an iterative model of SDLC would be the ideal fit. Other options include the agile and waterfall model. An iterative model allows for an openness to exist between the client and the developer and also, allows for an interactive development – enabling changes to be made even in the middle of a development process. A waterfall model does not allow for the requirements to be added at a later stage as the models are based directly on the initial requirement analysis phase. In case of developing websites, requirements often keep changing and with the advancements in technologies, there is always a constant need for fine tuning the effectiveness of a website. Hence, an iterative model suits as a best model to follow for this kind of development. Additionally, the time spent in analysing the requirements would be quite minimal in an iterative model as there is this feasibility of augmenting the development process with additional requirements, if needed. So, a cost effective, minimal time consuming iterative model would suffice the demands of developing a book listing website. (Saleh 2009) Data Security and Accessibility Information security is one of the primary aspects of

Ford - Supply Chain Management Essay Example | Topics and Well Written Essays - 1500 words

Ford - Supply Chain Management - Essay Example Logistics is the function of the organization that is responsible for movement, handling and storage of materials (raw materials) from the suppliers through the different units of the organization to the end user (consumer). Hence, logistics management is best defined as: the process of planning, implementing and controlling the cost-effective, efficient storage of raw materials, in-process inventory, finished goods, and related information flow from point of origin to point of consumption for the purpose of conforming to consumer requirements.(Cooper et al., 1997, 1) In this report, as the Logistics Director of Ford Motor Company, I have analysed the logistics activities of the organization and made recommendations on how to improve supply chain management to achieve competitive advantage. For better understanding, a brief description of background of the company is included. Ford – Background Ford Motor Company is the one of the world’s largest automobile manufacturer in the world with operations spread over continents. The primary product of the company is automobiles but it also manufactures other products such as trucks, tractors, buses and also includes financial services (Ford, 2012). Founded in 1903 by Henry Ford, the company revolutionised the automobile industry by introducing assembly line production which made large scale manufacture of automobiles possible. Ford since the very beginning has been concentrating on vertical integration and this has served the company well for a very long time. But this strategy has its drawbacks in today’s global market place and competition. Ford has around 4600 manufacturing sites around the globe and it has relationships with over 1600 production suppliers. Ford also purchases numerous other non-production supplies from over 9000 suppliers (United Nations Global Compact, 2012). The purchases include products and services such as computers, construction, marketing, machinery, health care, indust rial materials, etc. The traditional approach of the company towards supply chain management over the last century has made it difficult for the company to adapt to modern day challenges. The decentralisation of purchasing and the size of the organization are the two main roadblocks for the company to achieve effective supply chain management. Ford’s Supply Chain and Logistics Activities Ford, since the very beginning, had concentrated on vertical integration wherein the company controlled or owned literally every aspect of the business. All raw materials such as rubber, coal, and iron ore came from plantations and mines that were owned by Ford. Raw materials came from one gate of the plant and finished cars rolled out of another. This approach has been central to Ford’s success since the early years. This approach had limitations and this was exploited by the Japanese companies which adopted a lean manufacturing approach as opposed to the bloated business model of the Ford (NFS, n.d.). Due to the traditional approach and the size of the organization, Ford’s supply chain is one of the most complex supply chains in any industry. There is consistent inflow of shipments from thousands of suppliers from all over the globe to the numerous plants worldwide. Ford has a global production network which can be best understood by the following diagram. Basic Pictorial Representation of Ford’ Supply Chain The above representation does not indicate the complexity involved in the Ford’

Wednesday, October 16, 2019

Book Listing Website using PHP and mySQL,HTML Literature review

Book Listing Website using PHP and mySQL,HTML - Literature review Example This is where a Human-Computer Interaction (HCI) comes into picture. According to (ACM SIGCHI 1996), â€Å"Human-computer interaction is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human use and with the study of major phenomena surrounding them†. HCI in general terms can be inferred as a mix of a discipline belonging to the field of engineering dealing with the science of design. It’s a kind of study which evaluates the level of ease with which a person could use the system using the attributes of practicability, intuitiveness and accuracy. A successful interface implementation depends on how well the requirements of the system are gathered in the initial phase. There are critical opinions mentioning the lack of knowledge with developers in identifying the characteristics of humans while using a system, especially a website (Lotze 2002). Reducing design costs, improving quality and the process involved are some of the research areas that are been explored in recent times. Being a subset of User Interaction, HCI involves identifying goals from the standpoint view of both the user and business and also, developing architectural prototypes that can be refined consistently. Most of the efforts that go into coding and creating designs are actually directed towards the development of HCI. In the current trend, with the emergence of cloud computing and other technical advancements, the necessity to develop a safe, useful and commercially viable website is imperative and looking forward, it stands to remain at the same cynosure. Software Development Life Cycle Software development Life Cycle (SDLC) provides an effective approach for developing a website or any kind of software. SDLC involves seven fundamental phases which enclose the entire development timeframe of the software. All these phases are equally important as faltering in any of the phase would lead to astronomical errors in all ot her subsequent phases. The phases includes, studying feasibleness, analysing requirements, designing, modelling, implementation, testing and active operation. SDLC directly relates the phases involved in the management of project with the corresponding phases of Software Development. Out of several SDLC models that are available, for a small term project of this nature, an iterative model of SDLC would be the ideal fit. Other options include the agile and waterfall model. An iterative model allows for an openness to exist between the client and the developer and also, allows for an interactive development – enabling changes to be made even in the middle of a development process. A waterfall model does not allow for the requirements to be added at a later stage as the models are based directly on the initial requirement analysis phase. In case of developing websites, requirements often keep changing and with the advancements in technologies, there is always a constant need for fine tuning the effectiveness of a website. Hence, an iterative model suits as a best model to follow for this kind of development. Additionally, the time spent in analysing the requirements would be quite minimal in an iterative model as there is this feasibility of augmenting the development process with additional requirements, if needed. So, a cost effective, minimal time consuming iterative model would suffice the demands of developing a book listing website. (Saleh 2009) Data Security and Accessibility Information security is one of the primary aspects of

Tuesday, October 15, 2019

No topic Term Paper Example | Topics and Well Written Essays - 500 words - 3

No topic - Term Paper Example I can surely claim that this employee is one of the best employees, who worked in our organization. Mr. Sutherland worked for two years in our volunteer organization as a devoted human resource manager. His open mind and creative ideas helped us many times. It was very interesting for us to see the way he managed to deal with different problems of our employees. This young man deserves further promotion, because he always does his best. Bill Sutherland has an outstanding motivation and there is no need to take a closer look at him. He operates at a full pace. He is ready to learn quickly and effectively. He always does his work in time and no delays were ever noticed. A sense of maturity and professionalism are two permanent companions of Mr. Brown. Our Company enjoys working with this employee and colleagues have positive attitudes towards him. Professionalism of this employee is integrated with his outstanding personal features. I will be looking forward to tell you about Mr. Brown in details for you to know that he is the best candidate for this position in your Company. I am always ready to confirm my words and I have no doubts that you will be satisfied with performance of this employee. Please do not hesitate to call me at 708-900,

Monday, October 14, 2019

The Hemingway Hero Essay Example for Free

The Hemingway Hero Essay Many brave men and women in the military have been inspired by someone or something to put their life on the line for the sake of their country. John McCain and his heroic efforts during the Vietnamese war are a great example of how the Hemingway Hero inspires people in the world today. John McCain gets his inspiration from Ernest Hemingways 1940 novel For Whom the Bell Tolls, in which he says he wants to be just like the main character: Robert Jordan (Stamburg). John McCain spent five and a half years in captivity in North Vietnam as a Lieutenant Commander in the United States Navy. The Vietnamese offered to set McCain free but he would not go without the release of his fellow Navy comrades saying, â€Å"I just didn’t think it was the honorable thing to do.† As result, McCain endured many brutal tortures and harsh mistreatment. Finally in March 1973, after five and a half years of oppression; John and other Americans held captive were released. (Nowicki and Muller) While John McCain is a real life hero, Frederick Henry in Ernest Hemingway’s A Farewell to Arms, is a different kind of hero: the Hemingway Hero. A Hemingway Hero is one who exhibits the principle(s) of honor, courage, bravery, and endurance, one who has qualities that make a man â€Å"a man† and is able to more than just improvise in trivial situations but also demonstrates a big heart. A Hemingway Hero is one who always gets back up when the world knocks him down and never loses his integrity, one who is humble, has high moral codes, and puts others before himself. (Acker) Frederick Henry displays all these traits and more in Ernest Hemingway’s A Farewell to Arms because he is unafraid of death, shows little emotion when under pressure, and finds sensual pleasure from food and drink, hence making Frederick Henry a Hemingway Hero because of how he shows bravery, courage, and endurance during tough times. The Hemingway Hero is not afraid of death but tries to avoid it (Acker). Frederick Henry displays this characteristic when he is in the trench and the mortar hits. Frederick knew the danger that he was going to be in when he told Catherine he was going to a â€Å"show† and went regardless not worrying about the consequences, â€Å"I’m leaving now for a show up above Plava †¦ I don’t think it’s anything† (Hemingway 43). When the mortar hits and Frederick nearly dies, he still tries to help save fellow ambulance driver, Passini, disregarding his own injury and demonstrates honor and courage in trying to accomplish this impossible feat, â€Å"I tried to get closer to Passini to try to put a tourniquet on the legs but I couldn’t move I sat beside him, undid my tunic and tried to rip the tail of my shirt† (Hemingway 55). Frederick also shows that he is not afraid of death when he is in the ambulance after the mortar hits. A man above him is having a hemorrhage and the blood is falling down upon Frederick; and he stays unusually calm as if it barely bothered him only â€Å"†¦ try[ing] to move sideways so that it [does] not fall on [him]†(Hemingway 61) displaying great courageousness and humbleness. After Frederick recovers from his knee injury at the hospital, he wants to return to the front not caring about the fact that he nearly gets killed there showing that he is not afraid of the risk of getting injured again let alone getting killed. The death of Catherine was another example of how Frederick Henry is unafraid of death. When Catherine dies, Frederick states that there was no use to say goodbye because it was like talking to a statue, â€Å"But after I had got them out and shut the door and turned off the light it wasn’t any good. It was like saying good-by to a statue† (Hemingway 332). So he leaves and walks to his hotel as if â€Å"life goes on† and he should not dwell on Catherine’s passing implying that â€Å"what happens happens† and he should just move on (Hemingway). These examples show that death does not faze Frederick and he still tries to accomplish his goals courageously and with honor like a true Hemingway Hero. The Hemingway Hero shows very little emotion when he is under pressure (Acker). Frederick exhibits this characteristic when he shoots a sergeant who would not follow his orders to help cut the brush but tried to escape fearing being overtaken by the Austrians, â€Å"I opened up my holster, took the pistol, aimed it at the one who had talked the most, and fired† (Hemingway 206). Frederick – who has never shot a gun before – did not hesitate to shoot the sergeant displaying great bravery. Frederick also shows very little emotion under pressure when he jumps into the river eluding the battle police accusing him of treachery, â€Å"I ducked down, pushed between two men, and ran for the river †¦ and went in with a splash† (Hemingway 225). Frederick saw an opportunity and simply took advantage. He did not think twice showing great courage and tenacity. Despite being shot at, â€Å"There were shots when I ran and shots when I came up†¦Ã¢â‚¬  (Hemingway 225), Frederick took his chances without worrying about the possible repercussions. Frederick further demonstrates little emotion when under pressure when he rows Catherine and himself on a boat from Italy to Switzerland. He â€Å"†¦ rowed all night [and] [his] hands were so sore that [he] could hardly close them over the oars† (Hemingway 271). Catherine insisted on rowing and giving him a break but Frederick declined despite the seemingly intolerable pain, â€Å"Let me row awhile,† Catherine said. â€Å"I don’t think you ought to,† Frederick opposed (Hemingway 274). Frederick elucidates immense endurance in trying to complete this ambitious conquest like only a true Hemingway Hero would. The Hemingway Hero finds sensual pleasure from food and drink (Hemingway Hero). Frederick illustrates this characteristic when he eats spaghetti with the captain. Frederick goes into great detail on the way he eats the spaghetti â€Å"very quickly and seriously, lifting the spaghetti on the fork until the loose strands hung clear then lowering it into the mouth †¦Ã¢â‚¬  (Hemingway 7). Frederick also displays this characteristic by how everyone who comes to visit him in the hospital gives Frederick a bottle of wine, â€Å"This is a bottle of vermouth† (Hemingway 69). Frederick finds great pleasure in alcohol especially with all the pain that comes with the mortar hit and he drinks so much to the point where he eventually gets jaundice. Frederick also proves this characteristic with how he goes into great detail when eating the macaroni and cheese before the mortar hits, â€Å"I put [my] thumb and [my] fingers into the macaroni and lifted. A mass loosened†¦ I lifted it to arm’s length and the strands cleared. I lowered it into [my] mouth, sucked and snapped in the ends, and chewed, then took a bite of cheese, chewed, and then a drink of the wine†(Hemingway 53-4). Frederick also makes manifest of this characteristic when he tries to cope with the death of his newborn child. Frederick goes and eats and drinks to try to get away from death and his problems. He â€Å"[drank] several glasses of beer†¦ [and was not] thinking at all† (Hemingway 329). Frederick tries to get pleasure from the food and drink to release stress, clear his mind, and calm his nerves. Like any Hemingway Hero would do, Frederick attempts to avoid death. And he uses his sensual pleasure for food and drink to help him do so.   In Conclusion, a Hemingway Hero has to be able to more than just improvise in trivial situations, but also demonstrates a big heart with bravery and courage (Acker); and Frederick does so many times throughout A Farewell to Arms with how he is unafraid of death, how he shows little emotion when under pressure, and how he finds sensual pleasure from food and drink.

Sunday, October 13, 2019

The First Amendment and Conservative Rulings of the Supreme Court :: Politics Political Essays

The First Amendment and Conservative Rulings of the Supreme Court The authors of the Constitution of the United States created a magnificent list of liberties which were, at the time ascribed, to most people belonging to the United States. The main author, James Madison, transported the previous ideas of fundamental liberties from the great libertarians around the world, such as John Lilburne, John Locke, William Walwyn and John Milton. Madison and other previous libertarians of his time were transposed into seventeen different rights which were to be secured to all those in the United States. These seventeen civil liberties were compressed into ten different groupings which were designated as the "Bill of Rights." In this document lay the First Amendment which stated that the people of the United States had the "freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government..." The First Amendment was drafted by federalist Madison mainly as a political tactic to abolish anti-federalist resistance to the Constitution. After its passage in December of 1791, the First Amendment remained more idealistic than realistic. The First Amendment remained a set of ideals which were not to be carried out during its first century, then progressed to more realistic terms during its latter half of utilization. During the first century of the First Amendment, the First Amendment was paid a glance by all when it came to actually carrying out the freedoms guaranteed by this amendment. For example, in 1794, Pennsylvanian backcountry farmers protested a whiskey tax. The protesters were not violent such as those of the previous Shay's Rebellion. George Washington sent in a militia to crush the rebellion denying them of their First Amendment right to "peaceably assemble." Later, in 1836, antiÄ sl avery newspaper editor James G. Birney had been warned that his newspaper "The Philanthropist" was not desirable in the city of Cincinatti. When Birney refused to cooperate, mob action took rule and, "scattered the type into the streets, tore down t he presses and completely dismantled the office." This contradicted the First Amendment which stated that, "freedom...of the press," is a constitutional right. The Supreme Court could do nothing about these situations when in Barron v. Baltimore, t he Court ruled that, "These amendments contain no expression indicating an intention to apply them to state governments. This court cannot so apply them." Thus, the Supreme Court could not interfere when First Amendments The First Amendment and Conservative Rulings of the Supreme Court :: Politics Political Essays The First Amendment and Conservative Rulings of the Supreme Court The authors of the Constitution of the United States created a magnificent list of liberties which were, at the time ascribed, to most people belonging to the United States. The main author, James Madison, transported the previous ideas of fundamental liberties from the great libertarians around the world, such as John Lilburne, John Locke, William Walwyn and John Milton. Madison and other previous libertarians of his time were transposed into seventeen different rights which were to be secured to all those in the United States. These seventeen civil liberties were compressed into ten different groupings which were designated as the "Bill of Rights." In this document lay the First Amendment which stated that the people of the United States had the "freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government..." The First Amendment was drafted by federalist Madison mainly as a political tactic to abolish anti-federalist resistance to the Constitution. After its passage in December of 1791, the First Amendment remained more idealistic than realistic. The First Amendment remained a set of ideals which were not to be carried out during its first century, then progressed to more realistic terms during its latter half of utilization. During the first century of the First Amendment, the First Amendment was paid a glance by all when it came to actually carrying out the freedoms guaranteed by this amendment. For example, in 1794, Pennsylvanian backcountry farmers protested a whiskey tax. The protesters were not violent such as those of the previous Shay's Rebellion. George Washington sent in a militia to crush the rebellion denying them of their First Amendment right to "peaceably assemble." Later, in 1836, antiÄ sl avery newspaper editor James G. Birney had been warned that his newspaper "The Philanthropist" was not desirable in the city of Cincinatti. When Birney refused to cooperate, mob action took rule and, "scattered the type into the streets, tore down t he presses and completely dismantled the office." This contradicted the First Amendment which stated that, "freedom...of the press," is a constitutional right. The Supreme Court could do nothing about these situations when in Barron v. Baltimore, t he Court ruled that, "These amendments contain no expression indicating an intention to apply them to state governments. This court cannot so apply them." Thus, the Supreme Court could not interfere when First Amendments

Saturday, October 12, 2019

Crohns Disease Essay examples -- Health, Chronic Inflammation

When someone first finds out they have Crohn’s disease, they will probably feel overwhelmed. There are so many questions. Will I be able to work, travel and exercise? Should I be on a special diet? Could my medications have side effects? How will Crohn’s disease change my life? The better informed they can become, the more equipped they will be to be an active member in your healthcare (Crohn’s & Colitis Foundation of America, 2009). Crohn’s disease is a chronic disorder of the digestive system. I can affect any area of the gastrointestinal system from the mouth to the anus. Its inflammatory process may spread to include skin, eyes, joints, mouth and sometimes the liver (Chang, 2008). Males and females appear to be affected proportionately. Crohn’s disease can occur in people of any age, but it is mostly a disease of adolescents and young adults. However, Crohn’s disease may occur in people over 70 years old and in young children (Crohn’s & Colitis Foundation of America, 2009). â€Å"Crohn’s disease appears to be caused by a dysfunctional inflammatory response in the gastrointestinal tract† (U. S. News, 2009). Inflammation is the body’s natural way to heal by sending immune cells to the site of the injury or invader. Researchers think that this immune system response may be triggered by bacteria or viruses, material in the intestinal contents, or a defective signal from the body’s own cells, called an autoimmune response. Inflammation results in pain, heat, redness, and swelling of the tissue. Chronic inflammation can harm the function of tissues and organs (U.S. News, 2009). Crohn’s disease also appears to affect certain ethnic groups more than others. American Jews of European descent are four to five times more likely to de... ...rica, 2009). Florida Gator P/ David Lerner was just recently diagnosed with Crohn’s disease. He was ready to start practice season when he was diagnosed. Lerner was about to become the starting punter for the Gators and he thought this would probably derail him. After consist treatment the disease was under control, but not gone. He was able to start for the team, and earn a scholarship. Lerner states, â€Å"Maybe I can’t eat a couple of things here and there that I want to eat, but at the end of the day, it’s really not the worst thing in the world†(Washington Post, 2011). People with Crohn’s disease accept their condition differently. Each person with the disease must adjust in their own way, but they must adjust. Even though there is no cure at this time, research is ongoing and promises to improve the health and quality of life for those with Crohn’s disease.

Friday, October 11, 2019

Cinderella Trend Analysis

Cinderella, directed by Clyde Geronimi, is a movie about a pretty girl who has been made a servant by her ugly stepmother and stepsisters, and deserves a better life. Cinderella is the fairy tale basis for all other movies, in which the underdog prevails against all odds. Ever After, directed by Andy Tehnant, is a movie based on Cinderella. Besides some differences in characters and a change in setting, it has the same good beats evil concept. Maid in Manhattan directed by Wayne Wang is a newer version. It brings motherhood and a difference in ethnicity to the table. Although the servant girl also prevails in this newer version, she does so by working hard at her job and keeping her independence. The article, â€Å"Fairy Tales and a Dose of Reality†, by Catherine Orenstein, is about the non-realistic fairy tales that media today still displays. Between picking bachelors and winning game shows, these unrealistic shows give people false perceptions. â€Å"Commercialism, Materialism, and the Drive to Fulfill Beauty Ideals in the United States† by Katie Hickey, is an article that discusses some of the media affects on girls. All of these sources deal with the trend of girls trying to become the perfect image. During the process of idealizing the perfect image, many girls suffer psychological problems with themselves and their own body image. Since the times when artists inaccurately drew their models to create a more appeasing painting, the media has always touched up women. This trend is demonstrated from paintings, magazines, fairy tales, and television. Shows like â€Å"The Bachelor† and â€Å"Joe Millionaire† demonstrate how easily won over a man can be by a simply beautiful woman. Many of the women are far from intelligent but one standard to be a participant seems to clearly be looks. From Katie Hickey's article, â€Å"women stare at beautiful female faces out of aesthetic appreciation, to look for potential tips-and because a beautiful woman could be a rival worth monitoring†. Women in media almost always measure up to the physical perfection standard. Because of this, competition also is a motive in this trend. People learn from fairy tales that if a prince gets a choice between two women, he will pick the most attractive one. This is true for everyone and is pure genetics. One of the first lessons taught is to not judge from the outside, but that it is what’s inside that counts. Realistically, first impressions are mostly visual and make huge impacts. People understand this and go to the media to know what they are supposed to look like. Causes that lead this trend to continue are mostly pressure from expectations of society. Media, advertising, and fairy tales people grow up with, all play a role. In Ever After, Jacqueline is treated worse than her sister is because their mom believes she could not possibly have a chance with the prince. Margaret, however, is displayed as a petite figure with blue eyes and blonde hair while her sister is thicker in size with black hair and brown eyes. Margaret gets special treatment and the adoration of her mother while Jacqueline, at one point, even gets chores thrown at her like she is a servant. Again, in Cinderella, the stepsisters are portrayed as ugly and deviant without a chance at the prince. Cinderella on the other hand, is petite, blonde-haired, blue-eyed, and although she is deviant, viewers long her to win the prince’s heart. She lies just as much as the stepsisters but has more of a chance at the prince because the charming prince could only want a charming wife. When young girls grow older, they drop the fairy tale role models and move on to models that are more realistic; the ones on television that are lean, mean, dieting machines. Mothers always tell their daughters not to idolize models because the magazines use effects and touch-ups to create their beauty. Although this is true, those models are still something to compare to and thus still create a competition atmosphere. They are the ones that create the fashion, hair, and make-up fads. They are the ones people read about getting thinner and getting plastic surgery. Why should advertisers stop this? After all, â€Å"In 2006 alone, the top 20 global beauty companies accumulated one hundred and four billion in sales† (Hickey). Television is broadcasted for one thing and that is to sell. As long as people are willing to buy, these media messages will not be stopped. The social impact of this trend is the growing amount of girls and women with bulimia, anorexia, drugs, and plastic surgery. With the perfect bodies and models in majority of the media, the next step for the women around the world is a quick and easy way to have the same image. With new technology, there is more and more ways to quickly change your body, many being in unhealthy ways. †According to a survey, sixty-seven percent of women in the U. S. between the ages of twenty-five and forty-five are trying to lose weight. Fifty-three percent of these sixty-seven percent are already at a healthy weight and are continuing to try to lose more† (Hickey). In Maid in Manhattan, Marisa Ventura does not get noticed in her aid uniform. It takes her dressing up in expensive clothing to get a man to notice her. This is the same in Cinderella and Ever After. Not only do the men not notice the underappreciated women, but when they find out the women are lower class, the men are furious and appalled. The message that is getting across to women is if you are not naturally a Cinderella, change yourself to become what society expects to be able to be saved by prince charming. The pressures of media and of having a perfect body image can cause psychological problems to many. When young girls grow up reading fairy tales and happily ever afters, the princess who prevails is clear to them. As girls get older, this trend does not go away, it only changes idols. Pressures of the media, friends, and even pressures of one’s own standards can cause things like bulimia, anorexia, or the rise in plastic surgery. This will also cause many health problems to more and more girls at strikingly younger ages. Self-esteem can also be lowered when constantly comparing one’s self to the high standards the media feeds us. This trend is likely to continue because of advertising, and expectations of society.

Thursday, October 10, 2019

Ta Diploma Course Assignment 4

Teaching Assistant Diploma Course Questions on Assignment Four. Explain the legal responsibilities of the school relating to the duty of care and the welfare of the child. All adults working on behalf of, or alongside children have a responsibility to keep them safe. Key people working in schools have responsibilities laid out in child protection laws. The Children Act 1989 states that the welfare of the child is paramount and sets out to detail what Local Authorities and Courts should do to protect children.A school should designate a Senior Teacher with specific responsibilities for child protection, this teacher should be clear about what children are on the Child Protection Register & the key professionals involved with the family, the boundaries of confidentiality, and their training needs in relation to child protection. They should be clear about their role in offering advice and guidance to other colleagues who are unfamiliar with the child protection process. In small school s the designated teacher is usually the Head Teacher, however no one person should be responsible for more than 250 pupils.Teachers have a duty of care to their students and as they have daily contact with them they are able to observe and detect any signs of abuse, neglect, failure to develop or changing behaviour. If a member of staff has any knowledge or suspicion that a child is, or has been suffering harm they must express their concern to the designated member of staff as soon as possible. All allegations should be taken seriously and the student involved should be informed that the information can’t be kept confidential and must be passed on to the designated member of staff in the school.Staff that receive any allegations of abuse or neglect must make an immediate written record of the conversation including all dates and times of reported incidents, the names of all of the people involved, nature of abuse and if any injuries have been observed. The designated Child P rotection Co-ordinator will then notify Social Services by telephone and then confirm the allegations in writing, which is to be signed and dated by the referrer. The Children Act 2004 sets out the process for providing services to children so that every child is able to achieve the five outcomes described in the Every Child Matters green aper, and all schools should aim to support this new approach to the well-being of children and support them in achieving these goals. The five outcomes of the Every Child Matters approach are to be healthy, stay safe, enjoy and achieve, make positive contributions and finally, to achieve economic well-being. It is very important that support is given to children both at home and school as parents and teachers are the biggest influence in a child’s life.Discuss 5 important school and statutory frameworks that directly impact on the teaching assistants work with pupils. Teaching assistant need to be aware of all school and statutory framework s affecting the content and delivery of the curriculum, child protection, health and safety and any other aspects of school life, especially the frameworks that directly impact on their own work with pupils. The first framework that directly impacts the teaching assistant is the Equal Opportunities framework.The teaching assistant has an important role in ensuring that each pupil has equal access to learning opportunities. Teaching assistants are often hired to help individuals or groups of pupils to provide additional or different support in order to achieve equality of opportunity. On some occasions, under constant supervision from the class teacher, teaching assistants may be asked to work with the whole class so that the class teacher can focus on helping individual pupils who may be finding their work difficult.The second framework a teaching assistant should be aware of is Health, Safety and Hygiene. This is a high priority in any school setting because of the importance of pr otecting any person in that setting, for example the pupils, staff or school visitors. Every school will have policies and procedures that outline the intensions to implement Health and Safety legislations and how to put these into practice. The framework and policies to be followed should be known and understood by all staff and parents.The policies should cover such areas as the role of the Safety Officer, dealing with accidents, accident prevention and food storage. The third framework that has a direct impact for the teaching assistant is confidentiality. Teaching assistants must follow all policies and procedures outlined in the framework when it comes to confidentiality. This requirement covers information on colleagues and pupils and extends to communications with others in work related situations and social situations. The fourth framework is Diversity.Teaching assistants should always demonstrate the values of every pupils personal, racial, or any other characteristics so t hat they can develop a sense of identity and build up their self esteem. It will also promote an understanding and appreciation of different cultures and religious beliefs in all pupils. The fifth and final framework is Supporting Inclusion. Some teaching assistants are employed with certain responsibilities to work with individual pupils whereas others are given more general responsibilities in the classroom.No matter what responsibilities a teaching assistant has, supporting inclusion is a key element. A teaching assistant should aim to facilitate learning and participation to build confidence and self esteem as well as independence so that all pupils are able to fulfil their full potential alongside their classmates. Describe the teaching assistants role in helping to keep the environment for children safe, healthy and hygienic. The teaching assistant has a big role in helping the class teacher to keep the environment for children safe, healthy and hygienic.The teaching assistant should liaise with the class teacher at the start of the lesson to determine what materials or equipment will be needed for the lesson. The teaching assistant would then need to ensure that the work environment is clean and safe and that all of the equipment is also clean and safe for the children to use. The teaching assistant must also make sure that the environment is equipped with a first aid box, fire appliances for example a fire extinguisher, smoke detectors and an alarm, and signs to mark fire escape routes.The teaching assistant should ensure that all pupils that will be working in the environment are clear and understand the procedures and rules to follow in the event of a fire, the teaching assistant should also reiterate what the class teacher has taught the pupils with regards to this. The teaching assistant must also make sure that there are soft surfaces and safety mats for activity play, and ensure that that are all in good, clean condition. It is the teaching assis tants job to make sure that the washing acilities are clean and that there are paper towels, liquid soap and nail brushes available to the children. The teaching assistant also has a responsibility to ensure that all the children wash their hands after activities and also clean their equipment. After the activities are over, it is the job of the teaching assistant to clean the environment making sure that it is clean, safe and hygienic. It is very important that all cleaning products such as disinfectant are kept in safe storage where they cannot fall and cause injury, and where the children cannot access them without the help of a responsible adult.There should also be clean cloths for cleaning the learning environment before and after activities, and these should be cleaned thoroughly after use. By doing these tasks, the teaching assistant is ensuring a safe and happy learning environment for the teacher, pupils and also the teaching assistant. How would you carry out a risk asses sment whilst organising a game of football in the school playground. A risk assessment is a careful examination of what could cause harm or pose a threat to children so that one can judge if enough precautions have been taken to prevent it.Control measures are the procedures used to eliminate or reduce the risk of harm. To carry out a risk assessment the steps taken should be to check for hazards, deciding where improvements are needed and in what areas, developing a plan of action that specifies the actions required, the timescale for action, the person responsible for the action and any funds that may be required. A risk assessment should also ask questions that give a yes or no answer, but should also leave space for any additional comments or plans for improvement.The questions should be devised to outline potential problems with the premises used, the equipment used by staff and pupils and the activities performed by practitioners, volunteers and children. There should also be a risk assessment checklist including things such as security, windows, doors and floors, storage, outdoor area, procedure for adults, hygiene, fire, first aid and medication. To carry out a risk assessment whilst organising a game of football in the school playground the teaching assistant must first check for any hazards in and around the playground, for example holes or uneven surfaces on the layground, broken glass, stones or loose gravel. They must then decide what areas need attention and develop an action plan. The next step is to answer the questions that the risk assessment asks, and make any further comments or observations and concerns. Then comes the checklist, every item that will be used for the football game needs to be inspected to ensure that there are no problems and that they pose no threat to pupils, for example, the football nets must be safe and secure to make sure that no harm will come to the children by using them.Everything on the checklist should be up to the standards set in the health and safety legislation, this includes storage space, heating and lighting, footballs, nets, cones or markers, or any clothing the pupils, teachers or other people involved may have to wear. Once any hazard or potential threat has been identified they must be dealt with and sometimes this will happen in two stages. The first stage is to take immediate action to prevent danger in the short term and the second stage is to take more permanent long term action to prevent it from happening again.Once the risk assessment has been performed and any hazards have been eliminated the football game can take place. What training needs may exist for a teaching assistant and how best might they be identified and met. A teaching assistant is always under the watchful eye of the class teacher and the line manager, who are key elements in determining what level of training needs are needed. The line manager is responsible for all issues concerned with teaching assistan ts including recruitment, induction, deployment, timetabling, professional review, training and performance.The line manager also deals with concerns and day to day issues. Regular meetings should be held between the line manager and teaching assistant to discuss any problems or issues that the teaching assistant may be encountering, and the line manager will also keep the teaching assistant up to date with all school development. Decisions regarding a teaching assistants professional and personal development must be a joint agreement with the line manager. By meeting with the line manager on a regular basis a teaching assistant should learn how to form a realistic judgement of their progress and if any further training is needed.There are many training options available to teaching assistants and by determining how much progress they have made it will determine what level of further training they need. DFES induction course are run by Local Authorities , they run induction programm es as well as additional courses covering a range of issues that are relevant to teaching assistants. Then there is Local Authority run training, most Local Authorities run a range of courses that teaching assistants have the opportunity to sign up for.The next option would be school based training; this is training that happens in a school setting, the school should support a wide range of professional and personal development approaches including in-school training using the expertise available in the school. More in-school training could come in the form of distance learning such as Stonebridge college courses, or practical experience; working voluntarily in a school setting is a way to build up a good knowledge of what to expect in a school setting.Involvement in local and national networks would also be a step towards further training. The final option would be long term training in a college or university studying towards an NVQ or degree. Talking to the line manager will help in determining the best option for the teaching assistant and how to go about finding more information on the chosen option. Discuss the teaching assistants role with regards to the promotion of equal opportunities and diversity. Teaching assistants have an important role in the promotion of diversity and equal opportunities.A written policy for equal opportunities will help to ensure that equal opportunities are given to all children and their families throughout every aspect of the school. To provide a school setting that celebrates diversity and does not discriminate against pupils is to ensure that there are certain practices in place, for example ensuring that parental activities are accessible to all parents and children and that all activities reflect the backgrounds of all the families in the community. The way that adults treat children will have a huge influence on them.To promote equal opportunities and celebrate diversity the school should aim to follow practices such a s avoiding stereotyping. The way adults act can send strong messages to a child about the appropriate ways for them to act. For example, suggesting that it is ok for a boy to do something but not for a girl to do the same sends a negative message to the pupils and can restrict possibilities for future development by limiting their expectations of the roles they can play in life. All children develop misconceptions about various racial and cultural groups from the media and the society that we live in.Therefore the environment that they are brought up in is an important way of helping to overcome stereotyping. Also, by treating every child equally a teaching assistant may have to treat them differently to other pupils so that they can adapt appropriately to meet their individual needs and characteristics. Making sure that children have equal opportunities to learn will help them to get the most out of life. There are also legal requirements relating to equal opportunities and to prev ent discriminatory practice and the expression of prejudice.The laws can prevent frameworks that make certain practices punishable but can’t change people’s attitudes. Children Act 1989 is a good example of a law that actively encourages good anti-racist and anti-discriminatory practice. The Sex Discrimination Act 1975 aims to stop gender discrimination. And then there is The Disability Discrimination Act 1995 which works to stop discrimination against disabled people in employment, and in the provision of goods or services. A teaching assistant is a big role model to children and by promoting these values it should encourage pupils to embrace these values too.