Wednesday, July 31, 2019

Personal Philosophy Paper Assignment Essay

I think that individuals in a society should function in a way to help each other to sustain a community alive and well. In order to keep the flow within a society continuous, the individuals in the society should abide by the rules of their community, which are set to prevent disorder or avoid a halt a community’s progress, and in this way a society can go on with its processes. Individuals should respect each other, and the rest, within their community; it is on these bases that humans have evolved with the basic morals that we recognize today. However religions have improved and â€Å"streamlined† basic regulations of ancient communities, and those â€Å"dogmas† or rules, from whatever origin they’re from, are what influenced organizations to get to how they are today, like the Puritan, Anglican, and traditional British influences on the US Constitution. I believe that people should be educated especially if they are interested in receiving that knowled ge, preferably with vocational schooling or internships, just like the apprenticeships that were popular in Europe long ago, but as for less technical subjects or careers, the traditional lectures should be adequate, like it should be in a university. I think that schools should be free for those that would truly benefit and thrive in them, but they’re not. However some reasons why people do not support free college are not unjustified. Students who wouldn’t commit themselves to take advantage of that free education would be obviously wasting people’s tax money. But unfortunately I’m not sure that’s the only reason why college isn’t free, like it is in Europe and elsewhere. Along the lines of morals, I believe them to be as they are in the Christian tradition, but as for culture, since religion can’t explain that, I am left to decide myself what is better for me. I personally find the culture of 21st century America to be repulsive in some respects but worthy of credit in others, I find customs of other cultures to be interesting. Here in America, many are interested entirely in materialism in life and are often driven by greed and vain pleasure. There are too many that (specificall y and especially around the neighborhood and community where I live) steal, kill, fornicate, and commit all kinds of crimes and immoralities. One of the most heartrending things is the lack of spiritually zealous individuals, most are totally uninterested in what they participate in, and I think it has to do with the fact that they don’t know the history, the reason or rationality behind things. This is why I don’t have any close friends because none that I know of, or rather scarcely any fall into the categorizations that I respect. I have high regards for Sir Thomas More for keeping to his stand in the face of death and against the violation of what he held to be true and just. I also respect G F Handel for following through with his artistic passion, even when the situations where grim and difficult. There are several others, who I revere for their works and deeds, but I can’t make much use of these people’s legacies – I know I don’t have the capacity to accomplish feats at their level. I hardly have any skill, talent, or much else that is uniquely useful or applicable to anythi ng, and whatever qualities that I may genuinely have, they are of little use because I’m usually lacking in some other aspect that would otherwise allow me to accomplish a task effectively. I believe people in society do have responsibilities that are not written down, nor written out in some special contract, rather there are those responsibilities that are expected to be followed regardless of the circumstances. Raising a child to be compatible with social norms, communal requisites, and the law, is an example of these responsibilities, but of course there are other such responsibilities that are followed by people of all walks of life; but as everyone in this world had parents at one point in their life, the position as a parent is thus of upmost importance. Technically, as a parent or guardian you are required by the law to be the caretaker of your own son or daughter (i.e. not just expected), but the law doesn’t get too specific on other details, and as a result these seemingly minor but meaningful details often go unaccounted for. Because some people are unprepared to have children and they do unexpectedly, a â€Å"gap† is left in each individual thereafter, where ordinarily there would be certain skills that would help a person to be socially adept as well as have the ability to pass on those attributes or skills if that individual decides to have children of his/her own. Personally I know that I do have such a chink, and it is also present in both of my parents as well – my father grew up with about a dozen other siblings, and his father had to work in the fields from sunrise to sunset, while his mother had to do what else she could, such as tailoring or making dresses to raise some extra money, my mother on the other hand, grew up as if she was an orphan, her mother being the eldest of again about a dozen other siblings, my mother’s father having been lost to a casualty, her mother set out to find work, leaving my mother to live on her grandparents’ farm with her other uncles, au nts, and cousins, as if they were siblings. As you might expect, my parents grew up in poverty, never went to college, and had to find work in new frontiers, ending up in occupations unlike those of their own parents. I don’t think having children is wrong at all – far from that mentality – but I think that people should plan or be ready to have a child and provide them with all the nurture and attention they are supposed to give him/her, or else, a pattern of spiritual, mental, social, and emotional poverty could possibly repeat itself. If you ask me if I’d like to be employed in a trade like the one of my father, I would have to decline, because put simply, I have never even received any kind of preparation from my father (not that I need much) in the occupation that he is in today, and I don’t blame him. My father has always told me that he wants the best for me, and that he wants me to get a proper education in order to lead a better lifestyle than his own. However, I don’t feel as if I’ve been adequately prepared to achieve that.

Tuesday, July 30, 2019

Globalization and Early America, 1492-1750

America’s present is significantly shaped by its past. Hence, it is vital for one to grasp the concepts that formed America to what it is now. Globalization in America is one of the key notions that play a vital role in forming today’s society. Though several scholars place the origins of globalization in modern times, others trace its history long before the European age of discovery and voyages to the New World. However, did early American history play a role in creating today’s globalization? Does globalization in the past play a positive, or negative role in this time period? While some might argue that weakening national autonomy is a negative result of globalization, others might defend that it has also sparked economic innovation. One of the major characters that changed the history of the world was Christopher Columbus. What would be the outcome today if Columbus never discovered the New World? Firstly, colonization would be nonexistent. In addition, without colonization U. S. ould have never created. The creation of the U. S. helped move much of the world towards democracy. It also led to the development of what is now the world's only superpower. A world without the United States is impossible to imagine today. Furthermore, a discovery by another major character, Ferdinand Magellan, also had a tremendous impact on the history of the world. He proved that oceans connected continents rather than dividing them. How did this important discovery influence today’s economy? By having the knowledge that oceans were great global passageways, Magellan had demonstrated that continents could be linked. Europe had the opportunity to establish a great economy and military power over Asian, Africa and the Americas that created great global trade networks. This was the beginning of the creation of globalization, which is very significant for today’s world economy. This also further demonstrates that early American history did play a role in creating today’s globalization.

Monday, July 29, 2019

A Journey of a Hundred Miles Begins with a Single Step

A Journey of a hundred miles begins with a single step It means that however long your Journey or how big and impossible the change you want to make it starts with Just one step, or action. If you have a long term goal, you cannot achieve it without taking steps or measures to achieve them. For example, I want to become a doctor. Well 10 years of school starts with English 101, and math, and science, etc Simple things sometimes lead to big things You have to start something before you can finish it.You have to write a word, then a entente, then a paragraph, then a page, then 3 more pages and you are done. Asking what it means was the first step it could mean that every step you take that step begins a new Journey! Or If you want to take a thousand miles all you have to do is take a step In a new direction! I dont know though so you might not want to use that on your paper! No matter how big the task seems, no matter how Insurmountable It seems, make a start and continue from there. Most things In life are accomplished In small stages, not In huge giant steps.Any task, broken down Into small pieces, seems much easier. It means If you never get started with anything. You never get anything done No matter how big the task or how challenging the goal, you get there by Just beginning. Without the first step, the Journey will never happen. Somebody who dreams big but never acts to make their dreams real will never attain them. But even if the dream seems unattainable, by taking that first small step, you move towards making that dream come true. In fact, the whole Journey Is made up of small steps.

Species Aroun You Essay Example | Topics and Well Written Essays - 500 words

Species Aroun You - Essay Example We, human-beings survive on love and fresh air but wonder, if the plants also need tender loving care for thriving? Love and caring is a very strong factor in the development of the personalities and character of the child. In the environment of loving care and security, children develop into healthy and happy adults. Similarly, the plants, as living organism, should also respond to love and care. Two houseplants would be used and kept in the same place where they are able to get fresh air and little sunlight. Two persons would take of those plants. One would caress the plant often and sing to it while watering. He will also sit beside it and share his feelings and happy moments. The second person would just water the plants at the right times and leave it alone for the rest of the time. The experiment would continue for 15 days. The experiment would prove that human psychology also works with the same consistency with other living organisms. While the plants are not able to talk and express their feelings verbally but even under controlled environment, they are capable of showing positive reaction to the loving care. The astonishing response of the plant that was nurtured with love and care is actually not so surprising. We are all aware that all animals, irrespective of their behavioral pattern and predatory habits, respond to love and care. Dog is considered to be the best friend of man who is not afraid to put his life at stake for his master but the same dog, if reared in wildness, would kill man to satisfy his hunger. ‘Many plant lovers insist the secret to healthy plants is tender loving care, including some optimistic words spoken to them daily’ (gardenbetter.com). Hence, one can conclude that tender loving care is an intrinsic part of all living organisms to

Sunday, July 28, 2019

Projectd Mangement Case Study Example | Topics and Well Written Essays - 750 words

Projectd Mangement - Case Study Example If another individual takes the responsibility of overlooking the project and taking its name under himself, it can pose as a problem between the two individuals. The person who is taking the responsibility of the project can go to any lengths to make the other person work, external pressure from that person can make the project manager undertake a lot of decisions which the manager never intended to take. Due to this, the project manager also has to be answerable to all the resulting problems with the other person sitting at the corner. Therefore, considering all the above communicational problems, I would not have taken the project if someone else in the team referred to my project as their baby. 2. The biggest moral and ethical issue that Gary is facing in this situation is hiding the facts from the whole team and specially the customer who in this case is the Lord's Corporation. In order to get the contract, the company official ordered Gary to lie about the temperature specifications of the raw materials, convincing him by saying that they can later ask the customer change the specifications when they win the contract. Keeping an open communication flow between the people related to the project and the stakeholders is the prime responsibility of a project manager (Heerkeens, 2001). ... 3. Gary Anderson was awarded the position of the project manager for the Blue Spider Project. Undertaking his responsibilities, he had to report to the director of program management and his major responsibility was that of cost handling, time management and administration. Gary was chosen to become the Project manager because Gable wanted an expert in the Technical department so that he can get all the help about the R&D from that person. Also, the biggest responsibility as a project manager was the ability to communicate verbally and nonverbally, the ability to motivate people. With time, as matters worsened, Gary took the responsibility of undertaking minutes of the meeting and all the undergoing of the project. Also, since his area of expertise was engineering and not administration, he was more focused on the R&D and was giving away his responsibility of cutting down costs, communicating with other departments and the customer; in short administrative responsibilities were negle cted by him, which were his prime responsibility. 4. The functional employees of the customer and contractor should be allowed to certain standards and levels and not all the way. The reason for is that there should be a level of transparency and co-operation and trust between the two parties which can make huge projects work. Too much work can make the workers feel that their personal space to work is being invaded and can hamper their performance. However, in order to keep a fair level of transparency and accountability on the part of the workers, the functional workers should be allowed to communicate without the formal to some extent. 5. A

Saturday, July 27, 2019

Article response Essay Example | Topics and Well Written Essays - 500 words

Article response - Essay Example The privacy of application should be guarded strongly and safely against illegal use and collection; that is without the consent of the device and application users. This is because it leaves the users vulnerable to exploitation and abuse by application proprietors and developers, who collect the said information. As such, the report recommended by the FTC should be seen through to its end in implementation and enforcement as without it many will suffer under lack of privacy. Especially affected are those that are still considered underage children as companies tend to collect their data even more than adults. This shows violation of rights since children do not have the power to know and even take legal action against the companies of their own accord as seen in â€Å"indicated that they were under age 13 without permission of their parents or disclosure of how it would use the information† (Wyatt). As a result, the move is strongly recommended to protect the privacy of inter net users on their mobile devices. However, the report has some significant flaw that cannot be overlooked which acts as a deal breaker for me. This is the guideline created to ensure that application developers stick to the defined code of conduct, which greatly interferes with the sense of creativity and revenue generation for developers, as well as the unexpected failure to meet requirements. This is of considerable concern following that it is likely that some of the companies providing application may do their best to meet the demands of the report, and still fall short of the requirement. The above is unintentional and may lead in unfavorable consequences for vendors and not on the developers since vendors shoulder the liability of the failures of the developer. The issue of collection of data without the users consent is not a new thing since most application found on the android platform, and especially those developed by Google tend to

Friday, July 26, 2019

Week3 Essay Example | Topics and Well Written Essays - 1000 words

Week3 - Essay Example According to research in the textbook, diets that contain saturated fats and trans fats can affect a person’s health negatively since they lead to increase in the level of cholesterol in the blood, which can in turn lead to heart disease and other acute health conditions. Additionally, the textbook indicated that a study was conducted between seven countries in order to understand the link between heart disease and fat diets. The study showed the two populations, which is the Island of Crete and Finland, suffered from heart disease. Indeed, the study found that the food diet in Crete contained less saturated fat as compared to Finland, where death rates linked to heart disease were much higher than Crete. Furthermore, according to Omega article, consuming more fish and food elements that contain omega-3 helps in reducing the risk of getting heart disease. In addition, omega-3 also helps in reducing the effect of some risk factors such as stress that can lead to heart disease and strokes. According to the article â€Å"Omega-3 Fatty Acids and Mood Disorders†, Omega-3 is an important mineral in maintaining ones moods. This is why people with depressive disorders are likely to have mood swings if omega-3 is absent in their diet. Moreover, research shows that the tremendous increase in depression and neurological disorders is being fueled by the increasing consumption of vegetable oils that are rich in the omega-6 fatty acids (Parker et al. 969). However, consumption of foods such as fish, which is rich on omega-3, helps in preventing depression. Dietary changes from traditional foods that include fish eating to western fast food diets have led to increased rates of anxiety, depre ssion, seasonal affective disorder, and suicide (Parker et al. 969-970). Some of the changes that I would like to make when it comes to changing my food diet include consuming more fish and less fast food. Additionally, I will include

Thursday, July 25, 2019

Philosophy Essay Example | Topics and Well Written Essays - 1500 words

Philosophy - Essay Example 47). Each and every person has the right to life and so the fetus to become entitled to this right. Nevertheless, the mother has the right over her body, and can decide on what shall or shall not happen to her body. Every person should be able to grant her will. Is another person’s right to life stronger than a mother’s decision to what shall or shall not happen to her body? Therefore, the fetus will not be killed, and an abortion will not be performed to the mother. To show the example of performing an abortion when pregnancy is as a result of voluntary sex, we take the example of a person waking up in the morning lying in bed with an unconscious violinist, a famous violinist. He has a fatal ailment of the kidney, and the Music Lovers Society has established that she is the person with the right blood type to help. They kidnap her and use her kidney to extract poison from the violinists’ kidney. She later became informed by the hospital’s director that it is the Music Lovers Society that did that to her, and we would have refused if we had known. She gets conjoined to him for 9 months and to unplug her means killing him. She has the right to decide what occurs to her body, but another person’s right to life outweighs yours. This means she can never be unplugged from him. She would see this as outrageous which sounds the same as what I had suggested earlier on a mother’s body. ... The experiments above show that the woman has no right over her life, but the other person determines the right for her. Critiques argue that the unplugging of the violinists does not amount to direct killing as she claims. They claim that Thompson is not able to see the argument of rights in both ways. The fetus just like the mother has a claim to the right of being alive, as well. However, if you unplug yourself from the sick violinist, you are totally unjust to him. This is unfair since you gave him no right to use your kidney and nobody else could have given him. Violinists, like all human beings, have the right to life, and by unplugging yourself from him, he will die ad in this case you do what the violinist has a right that you will not do it, but not to act unjustly to him when doing the act. Also, when a woman voluntarily engages in intercourse and gets pregnant, she is responsible for pregnancy and the person inside her. The person inside the body has the right to be there and aborting it, will be denying it of what it has a right over. This will amount to injustice to the thing. If she gets asked to kill it even for the sake of saving her own life, is wrong, since she voluntarily accepted it into her body. Nevertheless, a person who exists from the act of rape has no right to the mothers’ body, and abortion is, therefore, acceptable. Section B 2. David Miller claims that the distributive justice argument for a policy of open borders fails. Explain Miller’s argument for this claim and discuss what you take to be its most serious shortcoming. Distributive justices involve the comparison of how people of different origins fair according to some standard. It is not clear, according to Miller, that the distributive justice applies

Wednesday, July 24, 2019

The Gap Inc Case Study Example | Topics and Well Written Essays - 500 words

The Gap Inc - Case Study Example (About Gap Inc: Social Responsibility Report) Their products are marketed under the brand names of Gap, Banana Republic, Old Navy and Piperlime. The brands are moderately upscale labels that target the fashion conscious consumer. Gap manufactures and markets wearing apparel and accessories and the brands have some overlap in products and target markets. Gap, Banana Republic, and Old Navy, manufacture similar products that are differentiated by luxury, price, and value. Piperlime is an online shoe store that specializes in marketing over 200 brands of fashionable, upscale footwear. All their products are direct marketed online at dedicated brand web sites. In 2007, Gap Inc. test marketed a brand under the name of Forth and Towne. They subsequently closed 19 stores in 10 cities after the brand failed to demonstrate significant potential. (About Gap Inc: 2007 Annual Report) The organizational stakeholders at Gap Inc. are 150,000 employees, shareholders, CEO, Board of Directors, and executive office holders. Gap Inc. is headed by CEO Glenn K Murphy, who has over 20 years of retail experience. He has been at the head of Gap Inc. for less than one year and this is his first experience in the apparel industry. Japan and Europe are directed by presidents John Ermatinger and Stephen Sunnucks.

Tuesday, July 23, 2019

Perfomance Improvement Managment Development & Creativity Assignment

Perfomance Improvement Managment Development & Creativity - Assignment Example The objective of such exercise was to 'provide an opportunity for non-managerial employees to learn about themselves and about the organization's expectations for managers'. The programs initiated by the organization focused on the personal capabilities of the participant, and the methodology was adopted so as to explore the suitable and diversified background and mentalities of the professionals. The question relevant to the personal information, experience, objective, development of the organization, and several case studies were offered to brainstorm the participants. The focus of the exercise was to ensure the enhancement of the managerial and professional expertise of the participants, for that purpose, the exercises 'enabled the participants to assess their values, managerial styles and attitudes, and career interests' (Hayes, 1988). The management oriented sessions and seminars have undoubtedly led the potential participants to realize their potential and capabilities to the f ullest, and for that purpose the attribute of decision making was focused, and the evaluation and discussion process was narrowed to that spectrum. The organizatRole & Responsibilities The organization usually assigns the managerial responsibilities to the employees of various divisions, keeping in view the difference of area of specialization of the employees. The organization offers employment positions i.e. 'accountants, position classification and labor relations specialists, fiscal analysts, training and development specialists, criminal investigators, taxpayer assistors' (Welch, 2001), in all such respective departments the managerial skills are required to ensure the performance improvement and management development. The Internal Revenue Service has performed required exercises and reviews which has led to the identification of 'twenty one generic skills that managers need, these twenty one skills are divided into four categories: interpersonal skills, analysis and decision making skills, managing systems and organizations, and understanding operations'. The Myers-Briggs Type Indicator and Adjective Check List incorporate the self-assessment relevant to the interpersonal skills category which encompasses, 'self-awareness, understanding individuals and groups, and communications' (Welch, 2001). The scheme has converged the interpersonal skills and managerial skills, and the influence of the respective aspects has been monitored. The Myers-Briggs Type Indicator and The Adjective Check List has been a source of insight for the participants which have helped these participants to resolve their respective concerns having relevance to the career development process. The techniques have relevance towards the leadership and career development processes. The Myers-Briggs Type Indicator was designed as per conclusion of the Carl Jung's Psychological Type. The Myers-Briggs Type Indicator has enabled the participants to concentrate and focus upon managerial skills and leadership qualities, and 'the assessment of their preferences with regard to judging and perceiving' (Jaques, 1989). Techniques & Indicators The findings and the results derived from the Myers-Briggs Ty

Justifying Vietnam Essay Example for Free

Justifying Vietnam Essay In chapters 3 and 4 of Robert McMahon’s Major Problems in the History of the Vietnam War, there are a number of reasons given for the increased American involvement in Vietnam from the late 1940s to the mid 1950s. McMahon includes several documents in these chapters that point to three main reasons used to justify our role in Vietnam. One underlying reason for the early American presence in Vietnam is given in chapter 3, where in McMahon’s first essay Cold War Strategy and U.   S. Intervention he states that, â€Å"†¦the initial U. S. commitment to provide military assistance to the French in the context of broader American Cold War priorities† (McMahon 58). I think this means that we were justified in starting a limited war with the Vietnamese to prevent a war with a superpower such as China or Russia. The Truman administration was â€Å"convinced that Moscow and Beijing had become even more dangerously opportunistic foes†¦Ã¢â‚¬  (McMahon 67). Vietnam was uniquely placed not far from these Communist countries and with our presence there we could strategically have a military presence closer to that of China and Russia than the United States is. In the Statement of U. S. Policy Toward Indochina, the State Department reviewed that, â€Å"This hatred of the Vietnamese people toward the French is keeping alive anti-western feeling among oriental peoples, to the advantage of the USSR and the detriment of the US† (McMahon 51). Our geographical position in Vietnam and subsequent relationships forged during the Vietnam War with Southeast Asian countries was a major contribution to our victory in the Cold War. The second reason justifying US presence stems from Vietnam’s weak position to fight off potential invading countries. The State Department concluded, â€Å"The countries and areas of Southeast Asia are not at present in a position to form a regional organization for self-defense nor are they capable of defending themselves against military aggressive, without the aid of the great powers† (McMahon 54). The United States had proven its military supremacy in World War II on a global scale. We had won the war and become a superpower overnight. The US was the first country to develop operational nuclear weapons and the only country to have demonstrated their use in war. We soon became the center of helping rebuild the destroyed countries by being a source of funding. All these contributed to the world power position of the United States, and now we were in a position to help countries in need. With that being said, â€Å"The State of Vietnam had a small army of 150,000 led by an inexperienced officer corps that†¦had never been allowed to have any command or staff authority. Industry had been virtually nonexistent†¦and the agricultural base of rice and rubber†¦had been wrecked by explosive landlords who had impoverished much of the peasantry† (McMahon 99). Since Vietnam was not in a state to fight without help, the United States offered our support. The third and most talked about reason discussed in the chapters is our attempt to prevent Communism spreading anywhere else. To start, document 4 conclusions state, â€Å"The whole of Southeast Asia is in danger of falling under Communist domination† (McMahon 54). It had become clear in 1954 that the French were failing to re-colonize Vietnam and without control, it would fall to Communism. The State Department concluded, â€Å"It is important to the United States security interests that all practical measures be taken to prevent further communist expansion of Southeast Asia. Indochina is a key area of Southeast Asia and is under immediate threat† (McMahon 56). In chapter 4, we learn of the domino theory as President Eisenhower explained it in 1954 and this became the most public reason shown in the media for our presence in Vietnam. It describes the fragility of Communism growing throughout the world, especially in Southeast Asia. The analogy explains dominoes set up next to each other and if one falls, the rest will quickly fall as well. This was the position of the United States that if Vietnam fell to Communism, the rest of Southeast Asia and other countries would soon follow including Burma, Thailand, the Peninsula, and Indonesia. In conclusion, the support to enhance our presence in Vietnam was one that was greatly supported in the beginning. The American people at home were afraid of Communism spreading throughout the world which would cause a bigger threat to a domestic attack. In light of the Cold War, Communism was something we were afraid of, and we did what we thought would be an intuitive move to thwart bigger ones from the USSR or China. Since we were in a position to help Vietnam, this was justification for American involvement.

Monday, July 22, 2019

Attacking currency trends how to anticipate and trade big moves in the forex market Essay Example for Free

Attacking currency trends how to anticipate and trade big moves in the forex market Essay Terrorism has been a great challenge to almost all countries in the world. Though it is very challenging for two countries to come into a point of ending war against terror, at times accepting democracy may not be the solution. The term requirement refers to a thing that is required prior condition of something else to exist or happen. War against terrorism does not end because democracy demands. In the real world, war against terrorism ends when one side wins while the other side loses. However, democracy is not a prerequisite towards ending war against terror. In a free world, countries should not accept any form of government they tend to choose. Some forms of government such as dictatorial and Monarchical do not resemble a free world. Such governments do not allow people to participate in decision-making process in regard to important matters affecting their nation, and thus may contribute to terrorism. It is ironic for a â€Å"free† country to demand others to be just like them. Technological advancement has led to the change of business practices. The use of computers in the business premises has contributed to faster means of carrying out transactions, safer way of keeping records and saving time. This is particularly in retrieving important documents. Documents are accurately stored which prevents loss of important documents that are used for future decision making and auditing among other benefits (Brown 2008). On the other hand, adoption of e-commerce has also changed the current business practices. It has contributed to an easier way of reaching customers across the globe without travelling, thus increasing sales that in turn lead to increased profits. It is a confidential way of conducting business as communication is only between the buyer and the seller without the use of agents. It has both negative and positive effects towards individual nation-states. Use of modern technology contributes towards economic growth as it leads to increased government revenue through taxation. It has also led to unemployment as use of computers and e-commerce in businesses has replaced large numbers of casual laborers. Global treaties should be adhered to by a member state without any compromise. Industrialization has been the dream of every country but has also contributed towards environmental degradation. Many treaties have been signed such as the Kyoto agreement of December 1997 with the aim of controlling emissions released to the environment such as greenhouse gases. The effectiveness of such treaties and their implementation is solely achievable via unity among the developed countries such as the U.S, thus U.S should assume a cooperative role in such treaties. In most cases, the hero undergoes harsh situations in life which in turn makes their roles become unique and different from others. She believes that even in cruel, harsh societies, courage will rise.  In  order for her to fight fear, courage has to rise under any circumstance. Harsh and cruel societies make heroes to be more courageous, and thus this makes her believe that the courage will rise despite life challenges. For example, the late Nelson Madera from South Africa never allowed fear to dictate his actions despite the challenges he faced during the struggle for independence. The foreign exchange market is a decentralized global market dealing with trading of currencies (Michalowski 2011). The main active players in this market are the larger national banks. It assists international investments and trade through enabling currency conversion. For instance, it permits a business from a country as United States to import goods from another country such as European Union member states. Especially in Eurozone members, the U.S business pays in Euros even if its income is in United States Dollars. It also supports direct evaluation and speculation relative to the currencies’ value, and the carry trade. It also speculates differences in interest rates between two currencies. Different factors precipitate a currencys strength. Many economists think that the strength of a country’s economy determines the strength of its currency, but the question remains why the British pounds are stronger than US dollars yet their strength of their economy is otherwise. Firstly, low rates of inflation in a country increase the nations value of currency as well as purchasing power in relation to other currencies. Secondly, interest rates that are directly correlated as when one increases the other factor increase. Relative strength of other currencies obviously affects the exchange rate of a country’s currency in the foreign exchange market. Capital mobility which is classified under three main categories which include external debts, foreign direct investment and portfolio investment (Etwaroo et al. 2008). Political and economic factors used by investors when determining which countries to make investments that in turn strengthen the country’s currency. Other factors include speculation and balance of trade. Trade barriers refer to government-included restrictions on international trade. These trade barriers can take different forms such as tariffs, non-tariff barriers to trade such as export licenses, import licenses, import quotas, voluntary export restraints, currency devaluation and trade restriction (Cohen 2010). Trade barriers are criticized for their effect on the developing countries. Trade barriers like taxes on food imports or farm inputs subsidies lead to overproduction and dumping on world markets by developed countries, hence hurting poor-country farmers and lowering prices of goods. Tariffs also tend to be anti-poor, with high rates of labor-intensive processed goods and low rates for raw commodities. Another negative aspect related to trade barriers is that it would lead to limited choice of production thus forcing customers to accept inferior quality at higher prices. Almost all world countries have been experiencing strikes and labor unions revolts. Negotiations towards solving such problems have at times failed as different companies opt to find other alternatives rather than increasing salaries. The current wage rate in the United States and increased cost of living perhaps have been affecting production rate of different companies. If the prevailing wage rate and increasing cost of living continue, production rates continue to be pushed out which may affect the economic growth rate. As discussed above, different economic factors affect the strength of a country’s currency. Of late, European countries especially those in Euro zones have been experiencing political unrest, price fluctuations, inflation, loss of market, and increased cost of living among other economic upheavals. These challenges may cause the collapse of Euro. This may make the US dollar stronger compared to Euro if America avoids such economic crises and implement strategies of strengthening the currency. References Brown, R. (2008). Lasers, tools of modern technology. Garden City, N.Y.: Doubleday. Burke, C. S., Pierce, L. G., Salas, E. (2009). Understanding adaptability a prerequisite for effective performance within complex environments. Amsterdam: Elsevier JAI. Cohen, R. B., Ferguson, R. W. (2010). Nontariff barriers to high-technology trade. Boulder, Colo.: Westview Press. Michalowski, G. (2011). Attacking currency trends how to anticipate and trade big moves in the forex market. Hoboken, N.J.: Wiley. Source document

Sunday, July 21, 2019

The Objectives Of Cisco Networking

The Objectives Of Cisco Networking Welcome to the Cisco Networking Academy program! This is the first of four courses designed to provide classroom and laboratory experience in current and emerging networking technology, and to help prepare for certification as a Cisco Certified Network Associate (CCNA). This curriculum presents a comprehensive overview of networking; from fundamentals to advanced applications and services. It is based on the top-down approach to networking that is popular in many colleges and universities. The course emphasizes concepts and skills required to design networks, while providing opportunities for practical application and hands-on experience by teaching students how to install, operate, and maintain networks. II. ADVISORY PREREQUISITE CIS 120, CIS 190, A+ Certification, or one year industry experience. III. COURSE GOALS AND OBJECTIVES This course introduces the architecture, structure, functions, components, and models of the Internet and other computer networks. It uses the OSI and TCP layered models to examine the nature and roles of protocols and services at the application, network, data link, and physical layers. The principles and structure of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. Labs use a model Internet to allow students to analyze real data without affecting production networks. Packet Tracer (PT) activities help students analyze protocol and network operation and build small networks in a simulated environment. At the end of the course, students build simple LAN topologies by applying basic principles of cabling; performing basic configurations of network devices, including routers and switches; and implementing IP addressing schemes. By the end of the course, students will achieve the following objectives: Given a LAN/WAN configuration scenario, students will be able to: Describe the basic concepts of how data networks and the Internet support business communications and everyday activities. (a, b) Describe the basic networking processes used to communicate across Local Area Networks, Wide Area Networks and the Internet. (a,b) Operate basic networking devices and services used to support communications across an Internetwork. (c,d) Describe the layers of communications in data networks using the 7-Layer OSI and the 4-LayerTCP/IP models. (a,b) Describe the role of protocols in data networks. (a,b) Describe the importance of addressing and naming schemes at the following OSI Data Link, Network and Application layers. (a,b) Describe the protocols and services provided by the Application layer in the OSI and TCP/IP models. (a,b,d) Describe the functions and features of the Transport layer protocols and services. (a, b) Describe the functions and features of the Network layer protocols and services. (a,b) Describe the fundamental concepts of routing that occur when a packet is forwarded from its source to its destination across multiple networks. (a,b) Design, calculate, and apply subnet masks and IP addresses to meet network design requirements. (c,d) Describe the operation of the OSI Data link layer protocols by explaining how data link frames communicate between networking devices. (a,b) Describe how the OSI Physical layer protocols and services transfer data bits across data networks. (a,b) Describe fundamental Ethernet concepts such as media, services, and operation. (a,b) Apply basic cabling techniques to connect various types of networking devices to meet prescribed network design topologies. (c,d) Build a simple Ethernet network using routers, switches, and network hosts. (c,d) Establish local and remote terminal connections to Cisco Networking devices using Terminal Emulation programs. (c,d) Use Cisco CLI commands to configure and verify basic router and switch operation. (c,d) Analyze the operations and features of common Application layer protocols such as HTTP, DNS, DHCP, SMTP, Telnet, and FTP.(a,b,d) Use common network utilities to verify local area network operation and analyze data traffic. (c,d) Method of Evaluation (Measuring Student Learning Outcomes with Representative Assignments) Chapter exams that measure each students ability to define and appropriately use networking technology concepts and terminology to describe networking processes, protocols, functions and features. Comprehensive final exam that measures each students ability to synthesize and apply course concepts to a variety of networking scenarios. Comprehensive skills exam that measures each students ability to practically apply network, design, configuration and hardware connectivity techniques to LAN environments. Lab exercises that require students to apply course concepts and skills in order to implement LAN solutions, compute IPv4 network addressing to network problems defined by the instructor, and connect and configure LAN devices. IV. TEXT, MATERIALS AND ONLINE WEBSITE Cisco Network Academy Website: http://cisco.netacad.net Instructors Website: http://www.cuyamaca.net/cis/cisco Blackboard: http://bb.gcccd.edu/webapps/login/ Network Fundamentals course: Network Fundamentals, CCNA Exploration Companion Guide ISBN-10: 1-58713-208-7, ISBN-13: 9781587132087, Publication Date: October 2007 Network Fundamentals, CCNA Exploration Labs and Study Guide ISBN-10: 1-58713-203-6, ISBN-13: 9781587132032, Publication Date: October 2007 Recommended Texts (not required) Not required as you are encouraged to print all of the assigned labs directly from the assignments listed in Blackboard. Materials Removable media (thumb drive, floppy) A sectioned three-ring binder with paper for note taking V. COURSE SPECIFICS Attendance This Self-paced open entry-open exit program requires students to complete a minimum of 48 classroom hours in the presence of an Instructor to meet academic standards. Self-paced education places additional responsibility on the student for success. Irregular attendance and lack of participation are key factors in determining poor student performance. The greater the amount of time and effort applied by the student, the greater the opportunity for success, rapid advancement of knowledge, and advancement through the program. Students will be expected to manage their attendance with the goal of completing at least one Cisco Semester during a Cuyamaca College Semester. Higher goals of completion are very possible and will be supported. If you have questions about recommended progress rates, please ask the instructor for guidance. Dropping the Class It is your responsibility to withdraw from class. All students who are enrolled at the end of the course must be given a letter grade. Students who stop attending and do not officially withdraw will be receiving an F. See the IMPORTANT DATES section below for drop deadlines. A W cannot be awarded after the Last day to drop CIS 201 deadline. Assignments Assignments for the class are divided into the following groups: Reading Assignments (Cisco Netacad or textbook) The material for this course is available on the Web. The reading assignments should be completed before the beginning of class. Most students will spend and average of ten hours per week reading the material. Some chapters may take more than one reading to understand. Students are responsible for all terms and concepts in the chapters covered. On-Line Module Exams (Cisco Netacad) All exams are administered online, and enabled only after the topic has been completed. There are ten (10) online module exams and a comprehensive final exam. Module exams can be taken at any location (home, work, school) but may not be repeated. The comprehensive final must be taken at school during normal class hours. Subnetting Practice tests (Blackboard: Assignments: Chapter Folders) Subnetting is one of the most important skills to acquire in the first semester of Cisco. Subnetting is also a skill that requires a lot of practice to master. There will be short subnetting practice test in Blackboard for each chapter. Students may take each practice test up to 2 times with the highest score used for final grading. Students are responsible for seeking additional help from an Instructor or Tutor if their test result is not satisfactory Labs and Packet Tracer Activities (Blackboard: Assignments: Chapter Folders) The hands-on labs are an important part of the Academy. Students may work together in small groups. Content for the skills-based final will be directly drawn from lab assignments, worksheets, and other course material so understanding lab assignments is an important part of passing the course. You are encouraged to complete as many additional labs as you wish as well as working all of the interactive labs found in the curriculum. Labs and Packet Tracer Activities submitted after the corresponding module exam has been attempted will not be graded. Additionally, Labs and Packet Tracer activities submitted more than two weeks after the corresponding Chapter lecture has been presented will not be graded. Contact the instructor of record to arrange any adjustments regarding Lab and Packet Tracer deadlines prior to deadline date. Skills-Based Final, On-Line Student Survey, On-Line Final Exam (Cisco Netacad) A skills-based final and an on-line final exam will be administered the end of the course. The online final exam will be comprehensive and all students must pass the online final and the skills-based final to pass the course (both Skills Based final, and Online final require 60% or above for passing), to be eligible for CCNA2. All labs, on-line chapter tests, and the skills-based final must be completed before you may take the online comprehensive final exam. The online comprehensive final may be repeated once for scores below 60% on the first attempt, however, the average score between the two attempts will be used in final grade calculations for grades submitted to Cuyamaca. Due to the number of students and the resources required for the skills based final, students will be required to schedule a time to take their skills based final. A sign-up matrix will be posted 1 week prior to the skills based finals. Cisco requires that the CCNA 1 on-line survey is completed before receiving a grade in the course. Incomplete grades are not allowed. Grades will be assigned as follows: Domain % Points Grade INSTRUCTIONAL FACILITIES Online Chapter Exams 10 93.4 100 A Classroom Subnetting Worksheets Tests 15 90.0 93.3 A- Laboratory Labs and Packet Tracer Activity 25 86.7 89.9 B+ Personal computer for each student Final Exam (comprehensive Skills Based) 25 83.4 86.6 B Appropriate course software Practice Final 5 80.0 83.3 B- Final Exam (Comprehensive Online) 20 76.7 79.9 C+ 70.0 76.6 C 60.0 60.9 D F IMPORTANT DATES Please refer to the appropriate official Cuyamaca College document to insure compliance with any College deadline. Spring 2010 Semester January 25, 2010 to June 1, 2020 February 5 Last Day to Receive a Refund for Semester-Length Classes February 12 15 Holiday (Presidents Day Weekend Friday, Lincoln Day Monday, Washington Day) March 29 April 2 Spring Recess April 23 Last Day to Drop Semester-Length Classes MAY 13 10:00 pm All Labs, Packet Tracer activities, and Subnetting practice tests due MAY 20 10:00 pm All Skills Based Finals must be completed MAY 25, 26, 27 Comprehensive Online Final Examination Days Must be completed by 10:00 pm May 27 Spring 2010 CIS 201 Schedule Week CCNA 1 8 week Schedule Chapter Reading 16 Week Schedule Chapter Reading Labs Packet tracers due (Thursdays 10pm) Additional topics 1 8 Week schedule 16 Week schedule Binary and Introduction 2 1 2 1 Binary Conversion Addition 3 3 4 2 Binary Combinations 4 5 6 3 1 2 1 Network Addressing 5 7 8 4 3 4 2 Subnetting 6 9 10 5 5 6 3 Subnetting 7 11 6 7 8 4 Subnetting 8 7 9 10 5 Subnetting 9 8 11 6 VLSM 10 9 7 VLSM 11 10 8 VLSM 12 11 9 VLSM 13 10 VLSM 14 All Assignments Due 11 15 Skills Based Finals 16 Online Finals

Saturday, July 20, 2019

Martians Go Home! :: essays research papers

Martians Go Home ! ... but take me with you ! (dissahc) undefined More... [Close] [Close] undefined SHORT LIST OF MARTIAN CHARACTERS IN THE STAGE WORLD (Venusians, Pans, Lizards and others also included) by Josh Nevada Below you see a list of Martian characters in the "Stage World". Martians : Martians in politics and power U.S. Government - Executive Branch Dick Cheney (U.S. Vice-President, former Secretary of Defense) Al Gore (U.S. Vice-President, 1992-2000) Warren Christopher (U.S. Secretary of State, 1993-1996) William Cohen (U.S. Secretary of Defense, Clinton Administration) Henry Kissinger (U.S. Secretary of State, Nixon Administration) Anthony Lake (U.S. national security advisor, 1993-1996) Richard Holbrooke (U.S. Representative to the U.N.) Frank Keating (Governor of Oklahoma) Andy Marshall (Pentagon's military advisor - Office of Net Assessment) A.B. "Buzzy" Krongard (Executive Director of CIA - CIA's No. 3) Robert Zoellick (U.S. Trade Representative) U.S. Senate Craig Thomas (U.S. Senator; R-Wyoming) Jim Inhofe (U.S. Senator; R-Oklahoma) Richard Shelby (U.S. Senator; R-Alabama) John Glenn (former U.S. Senator; astronaut) Learn more about their Committees assignments U.S. House of Representatives Edward R. Royce (U.S. Representative, R-California) Howard "Buck" McKeon (U.S. Representative, R-California) Lois Capps (U.S. Representative; D-California) Tom Lantos (U.S. Representative; D-California) Jim Leach (U.S. Representative; R-Iowa) Jerry Moran (U.S. Representative; R-Kansas) Anne Northup (U.S. Representative; R-Kentucky) Jo Ann Emerson (U.S. Representative; R-Missouri) Kenny Hulshof (U.S. Representative; R-Missouri) Michael R. McNulty (U.S. Representative; D-New York) Curt Weldon (U.S. Representative; R-Pennsylvania) John Thune (U.S. Representative; R-South Dakota) John J. Duncan, Jr. (U.S. Representative; R-Tennessee) William Jenkins (U.S. Representative; R-Tennessee) Tom Petri (U.S. Representative; R-Wisconsin) Learn more about their Committees assignments U.S. - Businessmen Michael Bloomberg (businessman, owner of the Bloomberg conglomerate) Steve Ballmer (CEO, Microsoft) British politicians Tony Blair (UK Prime Minister) Robin Cook (UK Foreign Secretary) Martin McGuinness (Northern Ireland's Education Minister, ex-IRA) Other countries Vladimir Putin (Russian Prime Minister) Gerhard Schroder (German Prime Minister) The Pope John Paul II Yukio Hatoyama (head of Japan's Democratic Party) Hugo Chavez (the President of Venezuela) Leonid Kuchma (the President of Ukraine) Martians in Hollywood (Who said Martians don't combine with entertainment ?) Mel Gibson Tom Hanks Meg Ryan Antonio Banderas Jean Claude Van Damme Ed Harris Michael Keaton Bill Paxton Gary Sinise Brendan Fraser (from "The Mummy", "Blast from the past") Goldie Hawn Eric Stoltz (from "Memphis Belle") Tom Hulce (protagonist of "Amadeus") Milla Jovovich (protagonist of "The Fifth Element") Natassja Kinski Catherine-Zeta Jones Uma Thurman Annete Benning Christopher Walken Denzel Washington Donald Sutherland Pat Morita (Miyagi, the Japanese master in "Karate Kid") Roger Moore Hutger Hauer (from "Blade Runner, "Crossworlds") Eric Idle (from British comedy group "Monty Phyton", now on Sony's TV show "Suddenly Susan") Malcom McDowell (from "Clockwork Orange", "Cat People") Ray Walston (Uncle Martin in the classic TV show "My Favorite Martian") James Stewart (protagonist of several Hitchcock movies)

Essay on the Human Spirit in Frankenstein and Picture of Dorian Grey

Similarities of the Human Spirit in Frankenstein and The Picture of Dorian Grey The human spirit is one of the most beautiful forces in the world, but it is also one of the most vulnerable. In the novels Frankenstein by Mary Shelley and The Picture of Dorian Grey by Oscar Wilde, this idea of the human spirit is portrayed clearly. Both novels have similar aspects about the human spirit, but they also have their differences. Both novels have main characters who are influenced greatly by someone that they admire, and they are destroyed by that influence. The difference that these novels have is that in Frankenstein, the main character is influenced and destroyed by something he creates himself, while in The Picture of Dorian Grey, the main character is influenced and destroyed by his friend and mentor. Again, both novels portray the human spirit's motivation and vulnerability. In the novel Frankenstein, Victor, the main character, is driven to insanity and death by his motivation, his own creation. He dedicates all of his time and knowledge to create a living human being from dead tissue. This "monster" becomes his motivation and influence throughout the rest of the novel. Victor blames himself and feels guilt for all of th... ... Dorian converses with Lord Henry, and takes everything that Lord Henry said seriously, even though not everything that Lord Henry said was right. Basically, the difference that these two novels have over the idea that the human spirit is a very strong, but vulnerable force is that a person's motivation to do something great and his infatuation with that great thing will influence the spirit greatly, sometimes totally, and that believing in someone and somebody so much, no matter what they say, you will listen to them and let them have total control over you and your actions, even though that influence probably doesn't know that.

Friday, July 19, 2019

Blind Essay -- essays research papers

Have you ever been completely oblivious to a situation that is taking place right behind your back? You think that everything is going just fine in your perfect little world. You have everything planned out and it seems to be working out right on track. Then all of a sudden you discover something so devastating that it changes your whole life, and everything you worked at for nearly a year. This is exactly how I felt when I found out that my girlfriend had been cheating on me. I felt like everything I had worked so hard to establish had been gone, and that I was all alone.   Ã‚  Ã‚  Ã‚  Ã‚  My life was going along perfectly. I was in the middle of soccer season. My team was destined for the District Championship, and already claimed the Laurel Highlands Championship. I had an amazing girlfriend, who I cared for a lot, and thought she cared about me. She was a junior at Westmont, and also played soccer. She was slightly shorter than me with long blonde hair and beautiful blue eyes. I constantly spending time with her, despite all of my time spent practicing for soccer. My life was focused on her and keeping our relationship a happy one. There was not a day that went by that I did not take the time to at least talk to her for a while, no matter what I had to do.   Ã‚  Ã‚  Ã‚  Ã‚  It was the happiest time of my life. I was a totally different person. I was nicer to everyone, and cared a lot more about what was going on around me. Before my girlfriend I was just a quiet shy kid that did not really talk to anyone. She really helped me to come out and talk to people and be a lot nicer person. I was almost certain I finally had a relationship that I thought would last more than just a couple of months. Maybe this would even be the one person I would spend my life with. That’s how strong our relationship was. I was trying my hardest to make sure that this would be true.   Ã‚  Ã‚  Ã‚  Ã‚  For nearly a year, our relationship was amazing. Everything was working out perfectly. We had plenty of time to spend together and we were never really apart. I had just made the choice to come to UPJ meaning that I could be home and spend time with her. I would never make a choice that important, such as a college and my future based on another person, so that had nothing to do with it. Anyway, I would be staying here in the area so we would... ...blind to a situation. Before this had all happened I always used to think, wow, how stupid could someone be to not know that their girlfriend, or boyfriend, is cheating on them. Well, I guess I found out the hard way that it is not that easy to realize what is going on right behind your back.   Ã‚  Ã‚  Ã‚  Ã‚     Ã‚  Ã‚  Ã‚  Ã‚  Maybe I knew about it all along, maybe I am really not as blind as I think, maybe I was not clueless to it at all, and I just would not let myself believe that it was really true. How could someone that you care about so much, do something that heartless to you? It is almost unbelievable that a person can be that cruel. I spent a little over a year of my life caring and dedicating a great part of my life to this person. However, right behind me for nearly a month my life was drastically changing, and I had no idea of what was to come.   Ã‚  Ã‚  Ã‚  Ã‚  When my girlfriend cheated on me, I felt totally blind to the world. I was lost in my own world, and felt completely alone. The worst feeling I have ever experienced throughout my life was when this happened, and I hope I never have to go through anything like this again.

Thursday, July 18, 2019

Inflation Rate

Assignment On India’s Trend of Economic Growth and Employment (Since the year 1980 to2010) Submitted to DR. TAPAS KUMAR PAL Presented By * ARNABI BOSE (Roll- 1) * DIPA DAS (Roll- 10) * PURNAMRITA MALLICK (Roll- 3) * SWATI AGARWAL (Roll- 25) * TISTA BISWAS (Roll- 26) (MHROM 1st semester, Calcutta University) CHART SHOWING DATA OF NOMINAL & REAL GDP, GROWTH RATE, INFLATION & DEFLATION RATE AND EMPLOYMENT (PUBLIC & PRIVATE SECTOR) IN INDIA SINCE 1980 TO 2010 Year| NominalGDP(Rs. )| NominalGDP Growth Rate(%)| RealGDP(Rs. | RealGDP Growth Rate(%)| Deflator| InflationRate(%)| Public Sector(million)| PrivateSector(million)| Total Employment(million)| EmploymentRate(%)| 1980-81| 1368. 38| 19. 51| 7985. 06| 7. 21| 17. 14| 11. 51| 15. 48| 7. 40| 22. 88| 2. 3| 1981-82| 1602. 13| 17. 08| 8434. 26| 5. 63| 18. 99| 10. 79| 16. 28| 7. 53| 23. 81| 4. 06| 1982-83| 1789. 85| 11. 72| 8680. 91| 2. 92| 20. 62| 8. 58| 16. 75| 7. 39| 24. 14| 1. 38| 1983-84| 2093. 56| 16. 97| 9362. 69| 7. 85| 22. 36| 8. 43| 17. 22| 7. 36| 24. 58| 1. 82| 1984-85| 2351. 13| 12. 30| 9733. 57| 3. 96| 24. 15| 8. 00| 17. 58| 7. 43| 25. 01| 1. 4| 1985-86| 2627. 17| 11. 74| 10138. 66| 4. 16| 25. 91| 7. 28| 17. 68| 7. 37| 25. 05| 1. 71| 1986-87| 2929. 24| 11. 48| 10576. 12| 4. 31| 27. 69| 6. 86| 18. 24| 7. 39| 25. 63| 2. 31| 1987-88| 3320. 68| 13. 36| 10949. 92| 3. 53| 30. 32| 9. 49| 18. 32| 7. 39| 25. 71| 0. 31| 1988-89| 3962. 95| 19. 34| 12062. 43| 10. 16| 32. 85| 8. 34| 18. 51| 7. 45| 25. 96| 0. 97| 1989-90| 4565. 40| 15. 20| 12802. 28| 6. 13| 35. 66| 8. 55| 18. 77| 7. 58| 26. 35| 1. 50| 1990-91| 5318. 13| 16. 49| 13478. 89| 5. 29| 39. 45| 10. 62| 19. 06| 7. 68| 26. 74| 1. 48| 1991-92| 6135. 28| 15. 37| 13671. 71| 1. 3| 44. 87| 13. 73| 19. 21| 7. 85| 27. 06| 1. 19| 1992-93| 7037. 23| 14. 70| 14405. 03| 5. 36| 48. 85| 8. 87| 19. 33| 7. 85| 27. 18| 0. 44| 1993-94| 8197. 61| 16. 49| 15223. 43| 5. 68| 53. 85| 10. 23| 19. 45| 7. 93| 27. 38| 0. 73| 1994-95| 9553. 85| 16. 54| 16196. 94| 6. 39| 58. 98| 9. 52| 19. 47| 8. 06| 27. 53| 0. 54| 1995-96| 11185. 86| 17. 08| 17377. 40| 7. 29| 64. 37| 9. 13| 19. 43| 8. 51| 27. 94| 1. 48| 1996-97| 13017. 88| 16. 38| 18763. 19| 7. 97| 69. 38| 7. 78| 19. 56| 8. 69| 28. 25| 1. 10| 1997-98| 14476. 13| 11. 20| 19570. 31| 4. 30| 73. 97| 6. 61| 19. 42| 8. 75| 28. 17| 0. 8| Year| NominalGDP(billion)| NominalGDP Growth Rate(%)| RealGDP(billion)| RealGDP Growth Rate(%)| Deflator(%)| InflationRate(%)| Public Sector(million)| PrivateSector(million)| Total Employment(million)| EmploymentRate(%)| 1998-99| 16687. 39| 15. 28| 20878. 27| 6. 68| 79. 93| 8. 05| 19. 41| 8. 70| 28. 11| 0. 21| 1999-00| 18472. 73| 10. 70| 22462. 76| 7. 59| 82. 24| 2. 89| 19. 31| 8. 65| 27. 96| 0. 53| 2000-01| 19919. 82| 7. 83| 23427. 74| 4. 30| 85. 03| 3. 39| 19. 14| 8. 65| 27. 79| 0. 60| 2001-02| 21677. 45| 8. 82| 24720. 52| 5. 52| 87. 69| 3. 12| 18. 77| 8. 43| 27. 20| 2. 12| 2002-03| 23382. 00| 7. 86| 25706. 0| 3. 99| 90. 95| 3. 71| 18. 58| 8. 44| 27. 02| 0. 66| 2003-04| 26222. 16| 12 . 15| 27778. 13| 8. 06| 94. 39| 3. 78| 18. 20| 8. 25| 26. 45| 2. 10| 2004-05| 29714. 64| 13. 32| 29714. 64| 6. 97| 100| 5. 94| 18. 01| 8. 45| 26. 46| 0. 03| 2005-06| 33905. 03| 14. 10| 32530. 73| 9. 48| 104. 32| 4. 32| 18. 19| 8. 77| 26. 96| 1. 88| 2006-07| 39532. 76| 16. 60| 35643. 63| 9. 57| 110. 91| 6. 31| 18. 00| 9. 24| 27. 24| 1. 03| 2007-08| 45820. 86| 15. 91| 38966. 36| 9. 32| 117. 59| 6. 02| 17. 67| 9. 88| 27. 55| 1. 13| 2008-09| 53035. 67| 15. 75| 41586. 76| 6. 72| 127. 53| 8. 45| 17. 80| 10. 38| 28. 18| 2. 28| 2009-10| 60914. 5| 14. 86| 45076. 37| 8. 39| 135. 13| 5. 96| 17. 86| 10. 85| 28. 71| 1. 88| * INTRODUCTION: * What is GDP? Gross domestic product (GDP) is the market value of all officially recognized final goods and services produced within a country in a given period. GDP per capita is often considered an indicator of a country's standard of living GDP = private consumption + gross investment + government spending + (exports ? imports) * Nominal GDP is GDP evaluate d at current market prices. Therefore, nominal GDP will include all of the changes in market prices that have occurred during the current year due to inflation or deflation. In order to abstract from changes in the overall price level, another measure of GDP called real GDP is often used. Real GDP is GDP evaluated at the market prices of some base year. For example, if 1990 were chosen as the base year, then real GDP for 1995 is calculated by taking the quantities of all goods and services purchased in 1995 and multiplying them by their 1990 prices. * Inflation is defined as a rise in the overall price level, and deflation is defined as a fall in the overall price level. The inflation rate is one of the most important economic forces consistently weighing on the value of a nation's currency. Low Inflation Causes Growth: It is argued that low inflation can contribute to a higher rate of growth in the long term. This is because low inflation helps promote stability, confidence, and se curity and therefore encourages investment. This investment helps promote long term economic growth. If an economy has periods of high and volatile inflation rates, then rates of economic growth tend to be lower. * High Inflation and Low Growth: It is possible that an economy can experience low growth and high inflation this can occur if there is cost push inflation.Cost push inflation could be caused by rising oil prices. It increases costs for firms and reduces disposable income. Therefore, there is lower growth, whilst high inflation. * What is the relationship between inflation unemployment and Real GDP? During peak periods of the business cycle when the economy is experiencing rapid growth in real GDP, employment will increase as businesses seek workers to produce a higher output. If real GDP grows too quickly, however, it can cause price inflation as firms are forced to bid against one another or increasingly scarce workers. In contrast during trough periods of the business cy cle the economy is experiencing declines in real GDP, and employment rates are low. This is classic Neo-Keynesian economic theory. * Workings: 1. Calculation for Deflator: (Nominal GDP/Real GDP)*100 2. Calculation for Inflation Rate: {(Current Year’s GDP Deflator – Previous Year’s GDP Deflator) / Previous Year’s GDP Deflator}* 100 3. Calculation for Growth Rate: {(Current Year Growth Rate-Previous Year Growth Rate)/Previous Year Growth Rate}*100 4. Calculation for Employment Rate: (Current Year Employment Rate-Previous Year Employment Rate)/Previous Year Employment Rate}*100 # We have calculated nominal GDP and Real GDP at the Factor Cost. * The average inflation rate with a 5-years interval is calculated below: The average inflation rate of year 1980-85 is: (11. 51+10. 79+8. 58+8. 53+8)/5=9. 48 The average inflation rate of year 1985-90 is: (7. 28+6. 86+9. 49+8. 34+8. 55)/5=8. 10 The average inflation rate of year 1990-95 is: (10. 62+13. 73+8. 87+10. 23+ 9. 52)/5=10. 59 The average inflation rate of year 1995-2000 is: (9. 13+7. 78+6. 61+8. 05+2. 89)/5=6. 89 The average inflation rate of year 2000-05 is: 3. 39+3. 12+3. 71+3. 78+5. 94)/5=3. 98 The average inflation rate of year 2005-10 is: (4. 32+6. 31+6. 02+8. 45+5. 96)/5=6. 21 * The average Employment Rate with a 5-years interval is calculated below: The average employment rate of year 1980-85: (2. 3+4. 06+1. 38+1. 82+1. 74)/5=2. 26 The average employment rate of year 1985-90: (1. 71+2. 31+0. 31+0. 97+1. 50)/5=1. 36 The average employment rate of year 1990-95: (1. 48+1. 19+0. 44+0. 73+0. 54)/5=0. 87 The average employment rate of year 1995-2000: (1. 48+1. 10+0. 28+0. 21+0. 53)/5=0. 72 The average employment rate of year 2000-05: (0. 60+2. 12+0. 66+2. 10+0. 03)/5=1. 0 The average employment rate of year 2005-10: (1. 88+1. 03+1. 13+2. 28+1. 88)/5=1. 64 * The average Real GDP Growth rate with a 5-years interval is calculated below: The average real GDP growth rate of year 1980-85 is: ( 7. 21+5. 63+2. 92+7. 85+3. 96)/5=5. 51 The average real GDP growth rate of year 1985-90 is: (4. 16+4. 31+3. 53+10. 16+6. 13)/5=5. 65 The average real GDP growth rate of year 1990-95 is: (5. 29+1. 43+5. 36+5. 68+6. 39)/5=4. 83 The average real GDP growth rate of year 1995-2000 is: (7. 29+7. 97+4. 30+6. 68+7. 59)/5=6. 76 The average real GDP growth rate of year 2000-05 is: (4. 30+5. 52+3. 99+8. 06+6. 7)/5=5. 76 The average real GDP growth rate of year 2005-10 is: (9. 48+9. 57+9. 32+6. 72+8. 39)/5=8. 69 * Conclusion: As we can see the average real GDP growth rate from 1980-85 is 5. 51 and the average inflation rate of year 1980-85 is 9. 48 as well as the average real GDP growth rate of year 1985-90 is 5. 65 and the average inflation rate of year 1985-90 is 8. 10. So, it can be observed that, when the real GDP growth rates increased in the next consecutive years, the inflation rate has been decreased. Again, average real GDP growth rate of year 1990-95 is 4. 83 and average inflation rat e of year 1990-95 is 10. 9. Here with respect to the year 1985-90, the real GDP growth rate is decreasing and the inflation rate is increasing. Further, average real GDP growth rate of year 1995-2000 is 6. 76 and the average inflation rate of year 1995-2000 is 6. 89. Here again, with respect to the year 1990-95, the real GDP growth rate is increasing and the inflation rate is decreasing. Again, average real GDP growth rate of year 2000-05 is 5. 76 and average inflation rate of year 2000-05 is 3. 98. Here with respect to the year 1995-2000, the real GDP growth rate is decreasing and the inflation rate is also decreasing.And, average real GDP growth rate of year 2005-10 is 8. 69 and average inflation rate of year 2005-10 is 6. 21. Here with respect to the year 2000-05, the real GDP growth rate is increasing and the inflation rate is also increasing. THEREFORE, FROM THE ABOVE COMPARISONS, GOING WITH THE MAJORITY, WE CAN CONCLUDE THAT IN INDIA, SINCE THE YEAR 1980-2010, REAL GDP GROWTH RATE AND INFLATION RATE ARE INVERSELY RELATED, AS FOR 3 CASES WE CAN SEE WHEN REAL GDP GROWTH RATES HAVE INCREASED, INFLATION RATES HAVE DECREAS AND VICE VERSA †¦Now, as per our assignment, we have to compare India’s Trend of Economic Growth with Employment (Since the year 1980 to2010). As we can see the average real GDP growth rate from 1980-85 is 5. 51 and the average employment rate of year 1980-85 is 2. 26 as well as the average real GDP growth rate of year 1985-90 is 5. 65 and the average employment rate of year 1985-90 is 1. 36. So, it can be observed that, when the real GDP growth rates increased in the next consecutive years, the employment rate has decreased. Again, average real GDP growth rate of year 1990-95 is 4. 83 and average employment rate of year 1990-95 is 0. 7. Here with respect to the year 1985-90, the real GDP growth rate is decreasing and the employment rate is also decreasing. Further, average real GDP growth rate of year 1995-2000 is 6. 76 and the average employment rate of year 1995-2000 is 0. 72. Here again, with respect to the year 1990-95, the real GDP growth rate is increasing and the employment rate is decreasing. Again, average real GDP growth rate of year 2000-05 is 5. 76 and average employment rate of year 2000-05 is 1. 10. Here with respect to the year 1995-2000, the real GDP growth rate is decreasing and the employment rate is increasing.And, average real GDP growth rate of year 2005-10 is 8. 69 and average employment rate of year 2005-10 is 1. 64. Here with respect to the year 2000-05, the real GDP growth rate is increasing and the employment rate is also increasing. THEREFORE, FROM THE ABOVE COMPARISONS, GOING WITH THE MAJORITY, WE CAN CONCLUDE THAT IN INDIA, SINCE THE YEAR 1980-2010, REAL GDP GROWTH RATE AND EMPLOYMENT RATE ARE INVERSELY RELATED, AS FOR 3 CASES WE CAN SEE WHEN REAL GDP GROWTH RATES HAVE INCREASED, EMPLOYMENT RATES HAVE DECREAS AND VICE VERSA †¦

Wednesday, July 17, 2019

Data Communication Assignment

EENG 33151 DATA COMMUNICATION AND selective information processor NETWORKS ASSIGNMENT 1 (CO1, CO2 PO1,PO3) celebrate Submission Date On or before but not later 12-10-2012 Refer Data Communications and Networking fourth edition, Behrouz A. Forouzan No Plagiarism Kindly office A4 sheets 1. For n devices in a vane, what is the subject of cable links required for a mesh, shout, bus, and star topology? 2. Assume volt devices atomic number 18 arranged in a mesh topology. How many cables are infallible? How many styles are needed for individually device? 3. What is the difference between an meshing and the Internet? 4.When a party makes a local telephone call to some other party, is this a point-to-point or multipoint connection? justify your answer. 5. You have three computers connected by an Ethernet hub at home. Is this a LAN, a MAN, or a WAN? Explain your answer. 6. In a bus topology and ring topology of 8 devices, what happens if one of the nodes is unplugged? 7. fit in the future(a) to one or much layers a. Route determination b. Flow turn back c. Provides access to the end user d. qualifys frames e. Mechanical, electric and functional interface f. Establish, manages and terminates sessions 8.What are the responsibilities of the network layer in the Internet beat? 9. What is the difference between a port address, a logical address and a physical address? 10. Define conclusion. Define relative frequency. 11. In Europe, the power they use at home has a frequency of 50Hz. What is the period of the sine wave in ms? 12. The frequency of a bespeak is cxl KHz, calculate the corresponding period. 13. The period of a signal is 12 micro seconds, what is its frequency? 14. The period of a signal is c ms, what is its frequency in kilohertz? 15. meet the data eccentric stream of the following graphs picpic 16.Draw the graph of Polar RZ scheme for the telephone number streams, (a) 01001, and (b) 00110011001 17. Draw the graph of NRZ-L and NR Z-I schemes for the following data streams (a) 111100001 and (b) 001100110101 18. Draw the graph of Polar Manchester and derived function Manchester Bi-phase AMI and Pseudo ternary for the billet streams, (a) 010011001 and (b) 00110011 19. An analog signal carries 2 bits per signal instalment. If 2000 signal elements are sent per second, find the bit rate. 20. An analog signal has a bit rate of 12000 bps and a baud rate rate of 3000 baud. How many data elements are carried by each signal element?

Al- Qaeda, Homeland Security, and US Patriot Act

Terrorism was viewed in the early days as an prompt of abandon against a limited gathering of individuals. The chips then were consisted of bom hive awayg, puss, cleaning prominent public officials, and former(a)s. The employment of staging the terrorist locomote was to catch the political sciences attention with the want that the g overnment whitethorn give in to the terrorists demands. The demands may be considered political, economical, or ideological. However, no matter the purpose is, the regime activity usu each(prenominal)y do not listen the terrorist groups for they crap been considered as a mere hatred of the society that finish easily be eradicated finished military force.Additionally, terrorist groups were likened to a group of rebels operating as a group of limited members. The terrorist groups were not considered as a major curse to the nations tribute. But then, the horrifying 9/11 terrorist approach path stick unwrap drastically and light-colored ly changed the worlds perception most terrorist act. the States, on the separatewise hand, has greatly changed in its broadcasting with terrorist act and terror groups. The external Community alike realized that terrorism is a real holy terror to the worlds trade protection. The queer 9/11 has indeed revealed the true construction of terrorism.In rejoinder to the terrorism, the States hunted all those responsible for(p) for the bom storeg by declaring an all out contend against terrorism. Concomitant to the contend is the enactment of all that would pardon the political sympathiess acts against terrorism. The government has enacted the U. S. nationalist shape and the motherland protective covering. The president has rapidly heightened all measures to plug security and to pursue all those responsible for the 9/11 and those who argon connected with terrorism. in spite of criticisms on the effect of the legislations to civil liberties, the government has been ada mant on its stand to battle terrorism.The vengeance has lastly resulted to the war in Iraq and bombardment of Afghanistan. Likewise, the head of terrorism, Osama salt away laden and Sadam Hussein were apprehended and punished accordingly. Despite the tell death of the prominent architects of terrorism, the participation against terrorism even-tempered continues beca expenditure of the belief that terrorism is still alive. The police forces be as well controlling deep d profess the nation. In extraction with this, the discover will explore the scheme of radix and at the same time present an evaluation of the counterterrorism police forces. BodyThe fix al-Qaida started to reverberate at the very(prenominal) flack of the 9/11 terrorist bam. The horrifying bombard of the very symbol of economic and military prowess of the States, the population Trade sum, was rapidly relate to the home and Osama bin Laden. Right later the assault, the government of the United S tates and irrelevant allies has united to condemn the unjustified act of terrorism. basal was believed to grant been established in 1988. The home was the by-product of the Muslims retaliation against the Soviet Union that intermeshed Afghanistan in 1979 by 1989 (Katzman).During the war against the Soviet Union, group of Muslims kick in started to recruit jihadis to fight against the Soviet Union. The recruiting and bread and butter of the jihadis or fighters were initiated by Abdullah Azzam and his former student, Osama bin Laden, by shewing the Maktab al-Khidamat which manner Services Office (Katzman). This was to a fault known as or Al Khifah. Notably, the Maktab al-Khidamat was believed to be the forerunner of alkali. After the war with the Soviet Union, bin Laden and Abdullah Azzam established the Al-Qaeda in 1984 (Katzman). Al-Qaeda is an Arabic word which means the base (Katzman).Purposely, Al-Qaeda was established as a rapid chemical re meet force avail able-bod ied to intervene wherever Muslim were perceived to be affrightened (Katzman). Al-Qaeda is alike defined as a secret, almost practical(prenominal) organization, one that denies its own knowence in line of battle to remain in the shadows (Atkins, 2004). The Al-Qaeda which was jointly founded was eventually controlled by Osama bin Laden as a result of Abdullah Azzams assassination. Mean plot of ground, the assassination of Azzam was linked to Osama bin Laden. Remarkably, Al-Qaeda came to be known worldwide right after the 9/11 attack.The firmness of the organization of Al-Qaeda was believed to confuse been founded on ideology. at that place has been both(prenominal)(prenominal) controlling ideology of Al-Qaeda. Aside from be a religious craft, the Holy War has been viewed as infallible for the salvation of ones soul and a means of defending the Muslim nation (Martin, 2006). instant, peace treaty with the West is impossible and the only course of action in defending Islam is by violence (Martin, 2006). Third, the Al-Qaeda considers Muslim government as apostasies and is violently overthrown when they stand by with the West (Martin, 2006).Fourth, the Al-Qaeda believes that only two sides exist and that no apocalyptic conflict in the midst of Islam and forces of repulsiveness exist (Martin, 2006). From the time Al-Qaeda was founded in 1989, some(prenominal)(prenominal) terrorist activities were perpetuated in some other parts of the globe. In October 1993, the World Trade Center was attempted to be blown by Ramzi Ahmed Y determinationf (Katzman). In June 25, 1996, US Servicemen were killed patch hundreds were wounded when a bomb exploded alfresco the Khobar Towers in Dhahran, Saudi Arabia (Martin, 2006).Then in August 7, 1998, a onslaught was in like manner planned n the US Embassies in Nairobi, Kenya and Tanzania that caused almost 200 innocent people. The USS simoleons was as well dishonored by suicide bombardment in October 12, 2000 wh ere 17 sailors were killed (Martin, 2006). The most damaging terrorist action was the terrifying 9/11 attack. The 9/11 terrorist attack has totally crashed the World Trade Center in unfermented York. The third plane was say Pentagon killing hundreds of people and the fourth plane crashed in the Pennsylvania field (Martin, 2006). The 9/11 terrorist attack has drastically changed the worlds perception on terrorism.Likewise, the attack has changed the worlds perception about Osama bin Laden. Primarily, the target of Al-Qaeda is the US government and the the Statesn people. America has been considered as the rival of the Muslim nation because of the wars perpetrated against them. The economic embargo and the control over the worlds economy have been super criticized by the Muslim nation. Eventually, the perception that the West is the enemy to Muslim nations has been shaped. Since the West is considered as the enemy, the Al-Qaedas target has been the American people.It is notewort hy that all the attacks have been perpetrated against US embassies and US nationals. Aside from the Americans, the terrorist withal targeted citizens of Europe, Israel, Russia and other allies of America. Likewise, the 9/11 is a bring message or expression of hatred of terrorist against the Americans. In rove to send a clear and besotted message, the terrorist has implemented high-profile target. In addition, they select the suicide outpouring as a means of carrying out their designs because it is simplify and a means of eliminating last minute brochureableness (Mannes, 2004).In addition, they targeted high officials and use the media in enjoin for the government not to undermine the target. Al-Qaeda excessively adopt the unconventional means of acquiring data by means of an extensive research and contacts of professionals. Internet has been ingrained for Al-Qaeda in penetrating the security, intelligence, and military organizations of other countries. Notably, the inf ormation the Al-Qaeda has gathered were used in prep their attacks in several countries. Additionally, Al-Qaedas primary goal was to obtain nuclear apparatus (Mannes, 2004).The Al-Qaeda has success to the full created their own bomb by means of the documents they have captured. Besides, professionals were excessively recruited and being turned into a radical in order to obtain materials from the outside. Interestingly, the group was able to create a biological weapon through the extensive research done by Ayman Zawahari, a medical doctor (Mannes, 2004). The group withal examine in order to create their own weapons. some other tactic of the Al-Qaeda in carrying out their explosive charge is to at least impair the economy of other ground.This has been done by terrifying tourists through kidnapping of foreign nationals visiting a particular nation. Furthermore, bombing of public places has withal threatened tourists from visiting places occupied by terrorist groups. In asses sing the Al-Qaeda organization, it can be observed that the group has been patient and enduring in order to succeed in their plans. The tactics and strategies adopted by the group can be considered to have been brilliantly drafted and carried out. However, the group was molded and blinded by extremism. On the part of the American government, the 9/11 attack cannot just be dis forecasted.Right after the attack, the court of Bush formed the 9/11 thrill. Primarily, the Commission was directed to conduct an investigation on the bombing. Thereafter, the get of Al-Qaeda appeargond. In response to the 9/11 attack, Bush institution has created a sensitive national official office of fatherland gage nine days after the attack (Andryszewski, 2004). Pres. Bush also sign-language(a) into law the U. S. nationalist come, 45 days after the 9/11/. In addition, then hot property Bush also subscribe the homeland surety Act of 2002 in November 22, 2002 (Andryszewski, 2004).All these were the result of the fear of another(prenominal) terrorist attack. Furthermore, these laws have essentially changed the internality of security in the country. Meanwhile, in order to cite the targets of the laws, the government found the need to define terrorism. Terrorism has been defined by Federal Bureau of Investigation (FBI) as the outlawed use of force or violence against persons or property to intimidate or coerce a Government, the civilian population, or some(prenominal) segment thereof, in furtherance of political or social objectives (Sauter and Carafano, 2005, p. 65).From the definition, it is clear that terrorism has been recognized to exist inside the country targeting the citizens and outside the country targeting Americans. Hence, the counterterrorism laws have been designed to deal with terrorism indoors and outside America. superstar of the weapons of America in struggle terrorism is the Homeland security which has been referred to consists of all military activities aimed at preparing for, protecting against, or managing the consequences of attacks on American soil, including the CONUS and U. S. territories and possessions.It includes all actions to safeguard the macrocosm and its property, critical bag, the government, and the military, its installations, and deploying forces (Larson, et. al. , 2000). As to the military function of the Homeland shelter, it has five major key atomic number 18as of focus. One is the weapon of atomic pile destruction home(prenominal) preparedness and civil support (Larson, et. al). Second is continuity of government to ensure or impact civil authority (Larson, et. al. , 2000). Third is border and coastal defense which includes management of large-scale refugee flow and revention of weapon of mass destruction smuggling that may potentially create threat to security (Larson, et.al, 2000). Fourth is the continuation of military doing (Larson, et. al. , 2000). And, last is the national missile def ense (Larson, et. al. , 2000). In domestic preparedness, the FBI and Federal Emergency Management potency (FEMA) can request from the part of Defense the cooperation of the federal Army (Larson, et. al, 2000). Likewise, the National Guard can also participate in maintaining civil authorities. Interestingly, military has an essential role in all areas of Homeland Security.In a broader scope, the Homeland Security is defined as a concerted national effort to prevent terrorist attacks within United Sates, reduce Americas exposure to terrorism, and minimize the damage and recover from attacks that do elapse (Bolt, Colleta, and Shacklford, 2005, p. 433). In order to rough-and-readyly fight terrorism, the administration of Bush has formed the Department of Homeland Security. The Department is composed of 22 federal departments, agencies, and bureaus from Central experience Agency, FBI, DOD, and Center for Disease Control and Prevention (Andryszewski, 2004).These diametric agencies have been divided into board of directorss with unique duties and jurisdiction. The first is the palisade and Transportation Security Directorate which is responsible for ensuring the borders of America from terrorists coming from the outside of the country (Homeland Security, 2009). Aside from that, the Directorate ensures safety of land, sea, and air transportations. Immigration laws are also attached to the responsibility of the Directorate. The second is the Emergency cooking and Response Directorate which is tasked to coordinate with federal government in topic of attack (Homeland Security, 2009).The third is apprehension and Technology Directorate responsible for biological, radiological, and chemical attacks, and nuclear weapons (Homeland Security, 2009). The last is the Information Analysis and Infrastructure protection Directorate tasked to gather intelligence and information in detecting terrorist activities (Homeland Security, 2009). Furthermore, it is also mandated to identify infrastructures which may be vulnerable to terrorism. An Undersecretary is appoint to administer each Directorate. The Undersecretary has been assigned a task toaccess, receive, and analyze law enforcement information from agencies of the Federal Government, State and local government agencies, and secret sector entities, and to integrate such information to identify and assess the nature and scope of terrorist threat to the motherland detect and identify threats of terrorism against United States and recognise such threat in light of existent and potential vulnerabilities of the homeland (Bolt, Colleta, and Shackelford, 2005, p. 433). Looking back into the definition, Homeland Security has three major concerns.First, prevent terrorist attacks in America (Fisher and Green, 2003). Second, reduce the vulnerability to terrorism of America (Fisher and Green, 2003). Third, minimize damages and recovery in case of attack (Fisher and Green, 2003). In preventing terrorist at tack, the Department of Homeland Security has enhanced its intelligence and warning devices capable of trailing terrorist activities (Sauter and Carafano, 2005). In addition, national laws have been enacted to deal with domestic terrorism. Security within borders has also been intensified.Furthermore, transportation has been highly monitored to detect travelling terrorists. In the second duty of the Homeland Security, the Department is tasked to minimize vulnerability by curbing some(prenominal) possibility of bringing whatsoever weapon of mass destruction into the country. This way, critical infrastructure and catastrophic terrorism are prevented (Sauter and Carafano, 2005). These kinds of terrorism hire attack through computer. Finally, the third duty is accomplish by imp wandering the capability of the Department in responding to a terrorist attack.Response may not only choose military defense but rather, it entails preparedness in rescuing lives of the victims and in conta ining the place attack to limit the deem of victims. Another prevalent counterterrorism law of the government is the U. S. patriot Act. Since the Act was abruptly enacted into law as it was signed 45 days after the 9/11 attack, the Act was perceived to be an legal means of curbing terrorism. Primarily, the U. S. Patriot Act was enacted to prevent terrorism but has effectively expanded the power of the law enforcement and intelligence agencies in carrying out their duties with regard to terrorism.There are basically four ways in carrying out the responsibilities of the Act. First, the Act applies to fighting terrorism through the use of investigative tools previously available in fighting other forms of organized abhorrence (Katzman). Second, the Act has eradicated any kind of barriers that hinders the forgive flow of information between and among law enforcement (Katzman). Third, the act validated the use of new technology and identifying new threats (Katzman). Last, the Act ha s created new terrorism- tie in crimes and change magnitude penalties of crimes (Katzman).Under the first way, the tool that has been accepted or accredited includes electronic surveillances to detect terrorism in full-range and roving wiretaps to be authorized by a federal judge (Katzman). Through the roving wiretaps, the authorities are allowed to use electronic surveillance in response to time-sensitive criminals or terrorist activities (Purpura, 2007, p. 176). In addition, federal agents can also conduct investigations secretly under the authority of a valid warrant obtained also secretly. The person being investigated is not also informed about the warrant.Through this, the federal agents would be able to identify agents, eliminate speedy threats, and coordinate the arrest of suspected individuals (Katzman). Furthermore, business track records of individuals linked to terrorism can be examined through the order sought from the Foreign Intelligence Surveillance judgeship (K atzman). The information held by one federal delegation can also be shared to other agency in order to effectively fight terrorism. Traditionally, each agency kept information occult from other agencies in adherence to the agencys independence.However, through the Patriot Act, the confidentiality of information or record is no hugeer controlling. In order to fully empower the federal agents in eradicating terrorism, jurisdiction as to warrant has been made general. Warrants can be obtained in any district and may be kill at any place being investigated for terrorist activities. Interestingly, cyber hacking has also been allowed in order to trace communications related to terrorism and at the same time tract hackers (Katzman).Furthermore, in order to fully prevent any terrorist activities and ensure the punishment of terrorists, the Act has increased penalties and added crimes that are categorized as terrorism. Among the crimes includes harboring any person linked to terrorism. L ikewise, conspiracy crimes and offenses have been redefined and penalties of such have been increased. There has also been a specific penalty for mass transit attack and attacks using biological weapons. Finally, some terrorist crimes have no statute of limitation while some crimes have a lengthy.It is noteworthy that the Patriot Act has been criticized because of some acts that are obviously in use(p) with the rights of the citizens. Through the Act, the security in airports has been intensified and the law enforcers are even authorized to detain immigrants or suspected terrorist within the authorized time of detaining a person for questioning. Profiling has also been prevalent because Arabs, Muslims, and Asians were hard-boiled separately. Visas and passport of these people were also subjected to strict scrutiny. In addition, library records have been authorized by the Act to be reviewed by the federal agents.Furthermore, Emails can also be tracked by the federal agents on the m ere basis of suspicion. More importantly, shore transactions suspected of funding a terrorist activity can be legally tracked by the federal agents. This has in fact changed the law on bullion laundering. Since the establishment of the Department of Homeland Security and U. S. Patriot Act, terrorism has been effectively deterred. The sweetening of security measures within borders and ports have hindered terrorist from pursuing their evil designs. In addition, several crimes such as smuggling have been prosecuted through the implementation of the counterterrorism laws.several(prenominal) terrorist suspects have also been arrested through the active agent fulfillment of the federal agent of their duties. In line with this, suspects were thoroughly investigated due to the expansion of the courts jurisdiction in trying and hearing terrorism cases. Remarkably, the laws have effectively brought back security within the nation. The fear of another terrorist attack has finally been era dicated. Despite criticisms, the effort of the government in curtailing terrorism has lodge fruit. Notably, the people behind the 9/11 attack and other terrorist attacks have been prosecuted and punished accordingly.The very seat of terrorism has also been bombarded and paralyzed in order to prevent the rise of any sign of terrorism. The measures taken by the U. S. in fighting terrorism has also been adopted by other countries in their own fight to terrorism. The application of the counterterrorism laws has also reached policies of other countries. One of which is the Money Laundering Law which has affected the bank transactions that passes through countries. Meanwhile, financial supports from jealous giver have contributed to the success of terrorist activities.In order to avoid the free flow of the funds to support suspicious organizations, the government has strictly monitored bank transactions involving suspicious depositors and suspicious funds through the Patriot Act. Terr orist acts have also been effectively deterred at the very port of entry. The security equipments have been intensified and upgraded to detect any weapon that may be used to perpetrate a terrorist activity. Such equipments include scanners, surveillance cameras, and x-ray machines. The use of such equipments has been legally justified by the counterterrorism laws.Remarkably, all these measures have been effective in pacifying the nation from the threat of terrorism. Conclusion Traditionally, security can be acquired through the walls erected around houses. Terrorism, on the other hand, was considered as a petty problem yet a crime capable of being curtailed. More importantly, any act of terrorism can be disregarded by the government and responded through defensive military attack. However, the essence of security and terrorism has drastically changed after the 9/11 attack. Terrorism has become real and the combat injury it causes is unimaginable. Terrorism has also become the main enemy of the whole world.It also united the international biotic community in curtailing and in eradicating any sign of it. Likewise, the 9/11 has angered America. The architecture of the attack also proved that Al-Qaeda can penetrate and set down the security of America. The worlds perception of security has also drastically changed. America, on the other hand, has been kind of paranoid about its security. However, it cannot be blamed because of the damaged caused by the 9/11 attack. The America viewed threat to have existed within and outside its territory. More importantly, the ingenuousness about Al-Qaeda has finally been revealed through the bombing of twin towers.Al-Qaeda has indeed existed for a very long period. It has been living as a shadow that its creative activity was doubted by security forces. The organization has also been brilliant in carrying out its mission by extensively and safely planning the attacks. Likewise, the measures it has adopted in implementing the plans are sure yet deadly. But such cannot be considered difficult because of the ideology that has been instilled among the members. On the part of the victim of the attack, the countermeasures that have been adopted are the Homeland Security and U. S. Patriot Act.The Homeland Security was established as a means of centralizing the effort of the government in curbing terrorism. The Patriot Act, on the other hand, has enhanced the power of the federal agents in carrying their responsibilities with regard to terrorism. Any means that may be effective in tracking any sign of terrorism has been adopted and applied all throughout the country. above all, the intelligence and security capabilities of the federal government have been heightened to effectively and efficiently eradicate terrorism. Both laws have been directed against terrorism.Upon the implementation of the counterterrorism laws, several changes have transpired. The enhancement of security has ensured the safety of Amer ica and American people. Several terrorist has also been arrested and punished accordingly. More importantly, the fear that has been instilled by the 9/11 attack among the people has been pacified. field pansy and security has also been restored. Above all, no terrorist attacked against America followed. Hence, the measures adopted and implemented by the government has been effective and responded to the international problem. References Andryszewski, T. (2004). Terrorism in America. freshly York Twenty-First century Books Atkins, S. (2004). Encyclopedia of modern worldwide extremists and extremist groups New York Greenwood Publishing Group. Bolt, P. J. , Coletta, D. V. , and Shackelford, C. G. (2005). American defense policy. Johns Hopkins University Press Homeland Security. (2009). Department Components. Retrieved March 9, 2009, from http//www. dhs. gov/xabout/structure/ Katzman, K. (17 August 2005). congressional Research Service. Al Qaeda Profile and menace Assessment. Retrie ved March 9, 2009, from http//fas. org/sgp/crs/terror/RL33038. pdf Larson, E. V. , Peters, J. E. , Arroyo Center, and Rand Corporation.(2000). Preparing the U. S. Army for Homeland Security Concepts, Issues, and Options. New York Rand Corporation. Mannes, A. (2004). Profiles in terror the guide to set East terrorist organizations. New York Rowman & Littlefield. Martin, G. (2006). Understanding Terrorism Challenges, Perspectives, and Issues. New York Sage Publications. Purpura, P. P. (2007). Terrorism and Homeland Security An foundation with Applications New York Butterworth-Heinemann. Sauter, M. , and Carafano, J. J. (2005) Homeland Security A bonk Guide to Understanding, Preventing, and Surviving Terrorism. New York McGraw-Hill Professional.