Saturday, November 30, 2019

Napolean Essays - French Emperors, House Of Bonaparte, France

Napolean Nationalism is the devotion of people to the interests of its nation or the love of one's country to stay independent. Nationalism played a major role in the downfall of Napoleon in that he wanted an empire and his opponent's wanted independence. As Napoleon was conquering lands and creating a vast empire his troops stressed in the far lands that they conquered life, liberty and equality. Even though Napoleon did not realize it triggered nationalistic feelings among the conquered nations. Spain who was an ally of France, disobeyed Napoleon's decree. Then in 1808 Napoleon overthrew the Spanish royal family and made his brother Joseph king of Spain. But everything that Napoleon did such as put in a foreign ruler, take away noble privileges offended Spanish pride and created nationalistic feelings. The people of Spain revolted in 1808. The French troops stopped the riots, but the nationalistic spirit was not lost. For the next five years there was warfare in Spain. British troops came to aid Spain. This led to the defeat of Joseph, death of thousands of French troops and it inspired patriots and nationalists of other lands to resist Napoleon. This war between 1808 and 1813 is called The Peninsular War. In Germany, anti-French feelings broke out. But the French invasions carried German nationalism beyond the small ranks of writers. In 1807 writers attacked French occupation of Germany. This nationalistic feeling spread to the Prussians. In 1806 the Prussians were defeated by the French troops. To drive the French out of Prussia there would have to be a spirit of cooperation and loyalty. To accomplish this there would have to be social and political reforms. A reformer said that if social abuses were eliminated the Prussians could fight with national honor. Military reforms improved the Prussian army. In the War of Liberation(1813), the soldiers showed great feelings of patriotism and nationalism. And the French were driven out of Prussia. Russia, who was an ally of France went against the word of Napoleon. So Napoleon decided to invade Russia. Napoleon's Grand Army had 700,000 people in it. Most of soldiers were not French and didn't care for the war. In 1812 when Napoleon began the invasion, Russia retreated. As they were retreating they burned all crops which were valuable. When Napoleon reached Moscow, the Russians burned the city. Even worse the winter was in a few months. The Russians also destroyed the food supply to Napoleon. Many soldiers starved to death. Napoleon decided to retreat back to France. On the way back Russian Cossacks slaughtered the soldiers who fell behind. Napoleon abandoned his army and went back to France. In 1813 almost every nation in Europe joined in the final coalition against France. Napoleon raised a new army but couldn't replace the equipment lost in Russia. In October 1813 allied forces from Russia, Austria, Prussia, and Sweden defeated Napoleon at Leipzig. By April 1814 the coalition occupied Paris, Napoleon was exiled to the island of Elba. The coalition made peace with France. They restores Bourbon monarchy to throne in the person of Louis. However Napoleon escaped Elba and returned to France in march of 1815. Louis ordered his troops to stop Napoleon, but no one did. As Napoleon entered Paris he got a cheer. He raised a new army and on June 18 1815 he moved against the allies in Belgium. There the Prussians and the British defeated Napoleon at the Battle of Waterloo. These days of Napoleon trying to regain power are called the Hundred Days. This time they sent him to St. Helena a lonely island near Africa. There he died in 1821. Nationalism was an enemy to Napoleon because it led to the decline of his empire. And the nationalistic feeling that was felt between his opponent's eventually destroyed him.

Tuesday, November 26, 2019

Expansionary vs. Contractionary Monetary Policy

Expansionary vs. Contractionary Monetary Policy Students first learning economics often have trouble understanding what contractionary monetary policy and expansionary monetary policy are and why they have the effects they do. Generally speaking contractionary monetary policies and expansionary monetary policies involve changing the level of the money supply in a country. Expansionary monetary policy is simply a policy which expands (increases) the supply of money, whereas contractionary monetary policy contracts (decreases) the supply of a countrys currency. Expansionary Monetary Policy In the United States, when the Federal Open Market Committee wishes to increase the money supply, it can do a combination of three things: Purchase securities on the open market, known as Open Market OperationsLower the Federal Discount RateLower Reserve Requirements These all directly impact the interest rate. When the Fed buys securities on the open market, it causes the price of those securities to rise. In my article on the Dividend Tax Cut, we saw that bond prices and interest rates are inversely related. The Federal Discount Rate is an interest rate, so lowering it is essentially lowering interest rates. If the Fed instead decides to lower reserve requirements, this will cause banks to have an increase in the amount of money they can invest. This causes the price of investments such as bonds to rise, so interest rates must fall. No matter what tool the Fed uses to expand the money supply interest rates will decline and bond prices will rise. Increases in American bond prices will have an effect on the exchange market. Rising American bond prices will cause investors to sell those bonds in exchange for other bonds, such as Canadian ones. So an investor will sell his American bond, exchange his American dollars for Canadian dollars, and buy a Canadian bond. This causes the supply of American dollars on foreign exchange markets to increase and the supply of Canadian dollars on foreign exchange markets to decrease. As shown in my Beginners Guide to Exchange Rates this causes the U.S. Dollar to become less valuable relative to the Canadian Dollar. The lower exchange rate makes American produced goods cheaper in Canada and Canadian produced goods more expensive in America, so exports will increase and imports will decrease causing the balance of trade to increase. When interest rates are lower, the cost of financing capital projects is less. So all else being equal, lower interest rates lead to higher rates of investment. What We've Learned About Expansionary Monetary Policy: Expansionary monetary policy causes an increase in bond prices and a reduction in interest rates.Lower interest rates lead to higher levels of capital investment.The lower interest rates make domestic bonds less attractive, so the demand for domestic bonds falls and the demand for foreign bonds rises.The demand for domestic currency falls and the demand for foreign currency rises, causing a decrease in the exchange rate. (The value of the domestic currency is now lower relative to foreign currencies)A lower exchange rate causes exports to increase, imports to decrease and the balance of trade to increase. Be Sure to Continue to Page 2 Contractionary Monetary Policy Federal Open Market Committee Sell securities on the open market, known as Open Market OperationsRaise the Federal Discount RateRaise Reserve Requirements    What We've Learned About Contractionary Monetary Policy: Contractionary monetary policy causes a decrease in bond prices and an increase in interest rates.Higher interest rates lead to lower levels of capital investment.The higher interest rates make domestic bonds more attractive, so the demand for domestic bonds rises and the demand for foreign bonds falls.The demand for domestic currency rises and the demand for foreign currency falls, causing an increase in the exchange rate. (The value of the domestic currency is now higher relative to foreign currencies)A higher exchange rate causes exports to decrease, imports to increase and the balance of trade to decrease. If youd like to ask a question about contractionary monetary policy, expansionary monetary policy or any other topic or comment on this story, please use the feedback form.

Friday, November 22, 2019

Ideas for Thanksgiving Math Word Problems

Ideas for Thanksgiving Math Word Problems Thanksgiving math word problems are an easy way to infuse the November spirit of gratitude into every part of the school day. Customize these general turkey-themed concepts for whatever grade level you teach. Addition/Subtraction Mrs. Jones baked 5 pumpkin pies on Monday, 6 pumpkin pies on Tuesday, and 8 pumpkin pies on Wednesday. How many pumpkin pies did she bake altogether?Jasmine made 14 cups of butternut squash soup for Thanksgiving dinner. The family ate 9 cups of the soup at dinner. How many cups of soup were left over?Mr. Wilson went to the store to buy the food for Thanksgiving dinner. He spent $17.43 on vegetables, $32.16 on turkey and stuffing, and $12.19 on beverages. How much did Mr. Wilson spend altogether?Grandma brought two dozen cookies to Thanksgiving dinner. All but 3 were eaten that night. How many cookies were eaten?The Pilgrims sat down to the very first Thanksgiving dinner. There were 73 Pilgrims and 56 Native Americans at the table. How many people were at the table altogether? Multiplication/Division Each apple pie serves 9 people. There are 5 pies on the table. How many people will this feed?There are 32 ears of corn for 16 people. How many ears of corn can each person eat?The grocery store is selling turkeys for $7 each. They have sold 13 so far in the month of November. How much money has the store made so far in turkey sales?The pumpkin patch has 47 rows of pumpkins and 93 pumpkins in each row. How many pumpkins are there in all? Advanced/Other Lois bought three turkeys for three different prices. The prices were $18.92, $21.75, and $16.31. What is the average cost of the turkeys? Round to the nearest cent.Mike ate 1.4 pounds of food at Thanksgiving dinner. John ate 1.6 pounds. Write an inequality to compare the amount of food each boy ate. Use the less than or greater than sign.

Wednesday, November 20, 2019

Noise in Multimedia System Essay Example | Topics and Well Written Essays - 3750 words

Noise in Multimedia System - Essay Example Noise is defined as any unwanted thing in the desired one. Though in some special cases in electronics like oscillator where noise is intentionally introduced but, most of the times they create hindrance to the actual motto. Suppose after faithful encoding data is sent over transmission medium. Spurious electrical signals from environment may interfere to the original signal resulting noise. In other cases noise appears as flicker of screen. For portable devices developers need to design layout for the target device and developing pixels of precise width and resolution sometimes give erroneous result. Again, online content developers who work independently for target devices finally come out with objects which have problem in mapping. This paper explicitly concentrates on various noise sources and their effect on multimedia products. It also outlines ways to overcome it. Noise in one sense is defined as measurable amount of loss of data. It is a random parameter that can be measured by its statistical properties. In telecommunication channel noise is generally gets added in medium during transmission. Figure 1 shows such a transmission channel. In between transmitter to receiver there is the medium. It can be either wire in case of line communication or free space for wireless communication. Signal gets interfered by noise in the medium by various means e.g. thundering, signal from other sources if two signals are close to each other and from mismatch between transmitter and receiver. Shannon defined the limit of transmission in a noisy channel for a given channel capacity in order to maximize the signal-to-noise (SNR) ratio1. But it does not guarantee noise free transmission. This is nothing but the post transmission noise and before it gets received. Different methods exist to detect any error has arisen and if so, to correct it. The seven layer OSI model works well for error detection and correction in any computer communication process. From multimedia perspective transmission and reception methods are somewhat more complex where; total display is fragmented into different components and then all together information is sent to the target end maintaining timing constraint. SMIL is a language format used for encoding multimedia presentations for transmission over the web. It's a structured composition of autonomous media objects. Figure 2 shows one basic timing containers2. In SMIL seq container begin time is relative to predecessor's end. Par container has begin time relative to the containing par but for excl object a is started whenever object x (not shown) is activated and object b, c are started when object y and z (not shown) are activated. It is to be noted that no two common timeline should be used to model the relationship between a, b and c. If it's not maintained then there will be overlap between the objects that will turn to give timing mismatch, which may appear as noise in display. Other than this, before transmission objects are encoded into convenient form. During encoding data might get lost. For example if it's an image then it might have been encoded into jpg form where loss of data and as a result noise can get introduced. This noise will be incorporated throughout its processing and appear finally in

Tuesday, November 19, 2019

Running Head Essay Example | Topics and Well Written Essays - 2500 words

Running Head - Essay Example Additionally, the article provides verification of the usefulness of self-management interferences and puts forward a feasible system, self-effectiveness, by which these intercessions function (Lorig & Holman, p. 1-2, 2003). Towards the end, the article talks about setbacks as well as solutions for combining self-management culture into the typical operational systems. Article 2: A Stitch in Time: Self-Regulation and Proactive Coping. Within a theoretical and chronological outline, obtained from study on public cognition, communal dealings, as well as nervous tension and dealing with it, the writers analyze the procedures by which individuals expect or notice possible stressors as well as act beforehand to stop them or to cancel out their force. The outline identifies 5 phases in practical coping: (1) reserve gathering, (2) acknowledgment of possible stressors, (3) preliminary evaluation, (4) introductory managing attempts, and (5) elicitation in addition to utilization of opinion wi th reference to primary attempts. The writers explain the part of personal divergences, expertise, and capital on every phase. They draw attention towards the exclusive forecasts afforded by a concentration on practical management as well as the significance of considering how individuals stay away from as well as compensate possible stressors. Individuals are variously recommended to be on familiar terms with indications signifying that problem is forthcoming and to do something to anticipate or to lessen an unpleasant incident. In fact, in a number of life fields, individuals experience excellent results or avoid terrible ones as a result of their practical attempts. â€Å"Effective proactive coping involves the mustering of time, money, planning and organizational skills, social support, and, to the extent possible, the management of the chronic burden so that when, inevitably, stressors are detected, one is prepared as much as possible to manage them† (Aspinwall & Taylor, pp. 421, 1997). Article 3: Beyond Self-Management: Antecedents and Consequences of Team Empowerment. The utilization of work groups carries on developing. It is a team of persons who work ‘interdependently’ to resolve issues or to do work. As both the utilization of work groups within business along with the level of study on groups has improved, researchers have concentrated more to worker empowerment. Research on empowered groups has fallen behind on self-managing groups, or groups whose associates organize them, allocate occupations, and plan. Self-managing groups have been linked with high efficiency, excellent customer service, security, professional contentment, and organizational assurance. A number of associates make use of the terms empowered groups and self-managing groups identically; however, others distinguish the perceptions (Kirkman & Rosen, pp. 63-64, 1999). Irrespective of the semantic uncertainty, there has been very small amount of practical work on groups strictly termed as empowered groups. Lately, a hypothetical model of empowered group has been developed that differentiates the concept from self-managing groups. The aim of this article was to test theory created by the model of group empowerment. â€Å"

Saturday, November 16, 2019

Impact of Employee Retention Essay Example for Free

Impact of Employee Retention Essay Griffeth Hom (2001) have argued that employee turnover is assuming crisis proportions for many employers who struggle to retain people in the tightest labour market. Griffeth Hom (2001, Pg 1) 52% of companies report that their turnover is increasing and quit rates are running high of 1.1% a month.† Turnover can be a real problem in many organisations. Companies spend a great deal of time and money recruiting and training employees and the cost of replacing staff members lost through turnover are great. The monetary cost of replacing one employee is generally estimated to range from 50 percent to 200 percent of the annual salary for the position, and may even be higher in very specialized fields. Furthermore, poor employee retention can have a negative impact on workplace productivity, job satisfaction, and also on the overall morale of the organisation. It is proven that a high turnover percentage can cost employers a great deal of financial distress. Depending on the size of the company, to many employers it can make the difference in staying or going out of business. Phillips (2003,Pg 4) noted that, â€Å"of late employee retention has captured the attention of the business, financial, and executive community as a critically important strategic issue that can have a dramatic effect on productivity and profits.† Cascio, 2000 and Johnson,1995 cited in Griffeth Hom, Retaining Valued Employees (2001), are of the opinion that, human resources professionals and researchers project that the cost of one turnover incidence ranges from between 93% to 200% of a leavers salary, depending on his or her skill and level of job responsibility. Labour turnover has a negative impact on the organizations. Although every manager and team member is aware of problems associated with high turnover, a review of its foremost consequences puts employee retention in the appropriate perspective. Patricia (2002, pg 4, 5) noted that â€Å"employee turnover has a serious impact on organisations. Firstly high financial costs, which is both in terms of direct and indirect costs and the performance of companies has been inhibited in many ways by high turnover rates. Sometimes the costs alone causes turnover to become a critical strategic issue. Secondly, in terms of survival as an issue, where in a tight labour market in which the company depends on having employees with critical skills, recruiting and retaining the appropriate talent can determine the success or failure of the organisation. Thirdly in terms of productivity loses and workflow interruptions , where an employee who quits abruptly not only leaves a productivity gap but also causes problems for others on the same team and within the same flow of work. Fourthly in terms of loss of know-how especially with regards to knowledge industry, where a departing employee may have the critical knowledge and skills needed for working with specific software. This can be a negative impact at least in the short run. Fifthly, turnover can have a serious impact on the image of the organisations.† Patricia (2002) also noted that some of the other impacts of turnover on organisations may be with regards to loss of business opportunities, administrative problems, disruption of social and communication networks, and job satisfaction of remaining employees. Patricia (2002) noted that it is important to remember that turnover can have a negative impact on the individual, particularly if an employee is leaving because of problems that could have been prevented. Furthermore, Patricia (2002) noted that a voluntary turnover because of problems that could have been avoided creates a variety of consequences such as loss of employee benefits or job seniority, financial difficulties, loss of social network, relocation costs, wasted efforts and uncompleted projects, and even more in terms of career problems. Branham (2005) noted that employees quit because of the disengagement process and deliberation process. Branham (2005) also noted that there are 7 reasons as to why employees leave organisations. They are as follows: 1. The job or the workplace was not expected. 2. The mismatch between job and person. 3. Very little coaching and feedback. 4. Few growth and advancement opportunities. 5. Feeling devalued and unrecognised. 6. Stress from overwork and work-life imbalance. 7. Loss of trust and confidence in senior leaders. There is no set level of employee turnover that determines at what point turnover starts to have a negative impact on an organisations performance. Everything depends on the type of labour markets in which you compete. Where it is relatively easy to find and train new employees quickly and at relatively little cost (that is where the labour market is loose), it is possible to sustain high quality levels of service provision despite having a high turnover rate. By contrast, where skills are relatively scarce, where recruitment is costly or where it takes several weeks to fill a vacancy, turnover is likely to be problematic for the organisation. This is especially true of situations in which you are losing staff to direct competitors or where customers have developed relationships with individual employees. Some employee turnover positively benefits organisations. This happens when a poor performer is replaced by a more productive employee, and can happen when a senior retirement allows the promotion or acquisition of welcome fresh blood. The more valuable the employees in question the more damaging the resignation, particularly when they move on to work for competitors. Moderate levels of staff turnover can also help to reduce staff costs in organisations where business levels are unpredictable month on month. When business is slack it is straightforward to hold off filling recently created vacancies for some weeks. Staw (1980 cited in Griffeth and Hom (2002), argues that turnover is not always bad. For instance, vacating employees or employees who quit can increase promotional opportunities for other employees or can infuse new ideas and technologies when new employees replace those who left. Dalton, Krackhardt and Porter (1981cited in Griffeth and Hom (2002), are of the opinion that certain kinds of jobs exits or quits among marginal perfor mers are even desirable. Abelson Bay singer (1994, cited in Griffeth and Hom (2002) that a certain quit rate might be tolerated as a cost of doing business in a particular industry. Stephen Taylor (2002, Pg 15) noted that for many HR specialists, rising staff turnover is seen as being an important organisational problem. It follows that improving retention rates should be high on the management agenda, and it is proper for resources to be devoted to achieving this aim. However a certain amount of turnover is actively welcomed by many managers. â€Å"Nonetheless, Griffeth Hom (2001) have noticed that organisational-level research and corporate studies report that high exit rates generally worsen organisational effectiveness. Though there are diverse opinions from various authors, and taking the above argument into consideration, it is clear that employees play a fundamental role in the success of any organisation and therefore by retaining talented or rather key employees is a very important task that the managers should undertake. Phillips Connell (2002) noted that, some organisations do a superb job of managing retention, whereas others fail miserably. The issues are not always externally driven but often lie within the organisation.

Thursday, November 14, 2019

Analysis of West Side Story Essay -- Film West Side Story Movie Essays

Analysis of West Side Story West Side Story came out in 1961 as a melodramatic musical that took place in New York. It takes the same theme as Shakespeare's, Romeo and Juliet, in that it is about two lovers whose relationship is not accepted by others because of conflicting backgrounds. The artistic intensions of this film are implicitly stated everywhere throughout the film. All of the dancing, singing, acting and pretend fighting was done thoroughly and very well, although the miking and mixing during the pretend fighting did not seem realistic. Specific actors, dancers, and singers were trained and taught how to perform in order to get the message across to the audience that this West Side Story is not just a film, but a theatrical, musical, choreographed, work of art. Specific messages are portrayed in different art forms such as the way the Puerto Rican women dressed compared to the American women. The Puerto Ricans had fluffier, more brightly colored dresses than did the Americans and the Puerto Rican women made their own clothes. I lived in Mexico last summer and in my opinion, their authentic style of clothing still has those same characteristics. The exception was Maria, who was also not allowed to wear a brightly colored dress with a low cut neck because she was too young, and although she claimed to be an American girl now which would make her eligible for being more free and independent, or shall we say sexy, she still had to wear a conservatively cut white dress. A characterization was pointed out about American women being able do more and be less conservative than Puerto Rican women. The musical selections and songs that were sung told a story and narrated the almost the entire film, as is expected in... ...remember hearing Bernardo telling Maria that when she is an old lady with five children then she could boss him around. That statement in itself also holds true to the stereotype these people usually have a lot of children and this was brought up again in the song, America, when Anita asks how she will get all of her cousins into a car. I would say the target audience for this film would be people who enjoy musicals, no matter their age. The time lag would only have much of an effect for younger generations who do not remember the 1960's and the discrimination and the political actions that were being taken during that time period. The film is still a classic I would say because of all of the wonderful costumes, dancing, singing, acting, and clever story telling through songs. I can definitely see why this film was a popular success then as it still is today.

Monday, November 11, 2019

Rethinking Video Game Violence Essay

Technological advancements made in the twenty first century have continuously altered the lives of every individual in this planet. Digital technologies have made communication among individuals very easy with the click of a button. In addition to this, technological advancements have also affected how people entertain themselves. Children all over the world are already abandoning their traditional toys. Action figures, matchboxes, building sets and puzzles are now losing its popularity because of the invasion of video games. The technological advancements have introduced the Play Station, Xbox, Game Cube, etc. to millions and millions of children all over the world (Mayor, 2005). True enough; the development of video and online games has continuously invaded the households of citizens all over the world, targeting their most important clients, the children. For some reason, video games only cater to the young adolescents and children; only in rare cases do they tend to be successful in influencing the adults. This is due to the fact that these games were designed using the role-playing method, which only entice the younger population as they are the ones who could not distinguish which is real and which remains to be in the fantasy realm of their minds. When adults observe children playing video games, the former fails to see what the latter sees (Mackey, n. d. ). In one way or another, these video games contribute to the construction of the children’s identity and culture, thus greatly affecting the lives of the children. With the popularity of video games increasing, the traditional ways by which childhood is characterized have continuously eroded and undermined. Somehow, no one knows where and what childhood really is about (In Search of the Child, 1969). Together with these advancements in technology come social problems associated with children and the youth such as drug-trafficking, teenage crime and the involvement of children in crime. The development of these video games has continuously instilled fear upon educators and parents as they continuously affect the children’s lives. Critics of video games fear transmission of violent messages to the children as they engage in playing with these video games (Squire, 2002). It was in 1980 when these video games were developed when President Reagan called for the creation of cold war warriors, knowing that these games would instill skills and attitudes to the warriors. However, more critics become more and more afraid of the effects of these games to cultural activities. They would often think that these would become influence children negatively as these would cause the young children addiction in technological developments (Squire, 2002). In April of 2002, a U. S. District Judge named Stephen N. Limbaugh, Sr. made a claim which somehow contrasted this particular fact. According to this very famous personality, video games are not capable in conveying ideas or expressing anything else that could possibly amount to speech (Jenkins, n. d. ). Because of this, video games did not enjoy constitutional protection since then. Limbaugh also said that for as long as games do not express ideas, no game shall be protected even if laws clearly state that children and the youth should not have access to any form of media that is said to explicitly contain violence and sexual messages (Jenkins, n. d. ). According to different research and studies made regarding this topic, the kids who have are now part of the videogame generation does not respond to traditional instructions. Because of this, researchers and educators worry that video games transmit hyper competitive and distorted sexual values to the children. Government policies have been constructed in such away that violent messages could not reach the children. Government policies introduced censorship practices which aim to keep the different homes safe from violence and distorted sexual messages. There had been several devices developed that could help in filtering out violent messages from reaching the homes of the children (In Search of the Child, 1969). In addition, video games are said to turn the children’s attention away from their academics (Squire, 2002). This particular ruling met a lot of criticisms, arguing that video games do express ideas that could definitely influence the minds of the youth negatively. Video games are seen to have psychological and social effects (Jenkins, n. d. ). According to some critics, gamers produce meanings through game play and other related activities. Effects are often seen as they emerge in the game itself. Thus, meanings become visible through interpretations as it continuously reflect our conscious engagement. Through this, they would be put into words and finally, examined. New meanings would often arise from what we already know and think. Because of this, each and every player would interpret a game according to his or her own experience and knowledge (Jenkins, n. d. ). In the same manner, it is often argued that children could not distinguish fantasy from reality. Due to this, focusing on meaning would increase the knowledge and competence each player has, that would often start with the mastery of particular concepts that differentiate the fantasy from the real world (Jenkins, n. d. ). This paper would look into the effects of video games on the children and the role they play in the lives of the children. In the same manner, it would look into how violence is instilled in the minds of these children through these video games. In addition to this, this paper shall look into how these games construct meanings and identities for the young children. For this paper to accomplish these tasks, it shall be using the game RuneScape, developed by Jagex Ltd. , one of the most popular online games in the whole world. RuneScape Released and Operated by Jagex Ltd. in 2001, RuneScape, once again is one of the most popular games in the world. It is said to take place in the fantasy world of Gielinor which is divided into different kingdoms, regions and areas. Players travel throughout the world by foot, often using spells and devices and other means of transportation. As they travel to each region, players face different monsters and quests. In the same way, more and more materials are being made available to them (RuneScape, 2007). Players are portrayed in the screen as avatars that could easily be customized. The players of this game could set their own goals and objectives together with the activities they would want to pursue in order to reach their goal. Competitors engaged in the game are not encouraged to pursue a linear path. They fight with other players, monsters, complete quests and increase their experience in all the skills available. Interaction between players is also encouraged through chatting, trading, etc (RuneScape, 2007). Video Games and their Impact to Children’s Lives A very famous retired military psychologist, Grossman said that video games teach kids to kill in the same way the military trains their soldiers. This very famous retired military man turned psychologist identified the following military concepts included in video games. The following are: brutalization, classical conditioning, operant conditioning and role modeling. These concepts are said to be adopted by the training camps as they prepare their soldiers for the battlefield (Jenkins, n. d. ). These methods have similarities in the way players interact with the computer games and other players. Because of this, the over exposure of children to these kinds of violence at the age when they are still having a hard time in distinguishing fantasy from reality brutalize them. Because of the rewards associated with the different video games, the children are trained to kill in exchange for these prizes. In addition to this, Grossman claims that a child acquires the same conditioned reflex and motor skills the soldiers have every time he plays an interactive point-and-shoot video game (Jenkins, n. d. ). Lastly, soldiers tend to imitate the role models being made visible in the games. Thus, the possibility of acquiring the same skills in real life is high. For humanist researchers on the other hand, these games are very powerful tools for teaching. It could help players in problem solving as they can see their mistakes as opportunities for learning and reflection (Jenkins, n. d. ). Thus, they would be finding better solutions to their problems. The different video games encourage the players to form their own hypotheses, and in the same manner, test them. In the obstacles that they face in the game world, their abilities are pushed to the highest level, since these games are designed in such a way that players would be encouraged to meet their goals (Jenkins, n. d. ). Thus, video games increase aggression among its players which then affects crime rates all over the world. Because of this, even unrealistic video games could be dangerous for the children and young adolescents. According to an experimental study that dealt with college students that engage in video games, these students have increased aggression after exposure to fantasy violent video games. This then proves the alarming situation at hand, that young adults are even affected by the violent messages transmitted by video games even when they are already supposed to know how to differentiate between fantasy and reality (Anderson, 2003). Because of this, these video games are said to be more dangerous than violent television shows and cinemas. In the same way, newly developed video games are now designed to reward the players for killing innocent bystanders, police, prostitutes, etc. using different means and weapons (Anderson, 2003). Hence, the plots of video games are now worse than ever, becoming more and more violent. In addition to this, there are even games that make some criminals as the heroes of the particular video game. For the author of the book What Video Games Have to Teach Us about Learning and Literacy, the most powerful dimension of these games is the projective identity. Projective identity is the way role-playing allows us to experience the world from different perspectives. Identity then is chosen, accepted or constructed rather than imposed through the games that they engage in. How Video Games Define What it means to be A Child Young children, as mentioned often find it hard to distinguish fantasy from reality. Thus, most children are engaged in games that often involve role-playing. As defined, role-playing games are composed of sessions where group of gamers meet to play. Make believe rules are often formulated which may be simple or sophisticated. As adults already know the difference between reality and fantasy, they find it hard to grasp the concept associated with role playing games (Fei, n. d. ). These role-playing games have said to continuously influence the personality of the children and other young adults. These particular influences, in turn help in shaping the identities of these teens, especially those that are still in the so-called development phase (Fei, n. d. ). How Children Use Video Games to Construct their Realities and Identities As mentioned in the previous parts of this paper, children engage in role playing activities when they play with video games. Thus, this somehow helps them in constructing their realities and identities, how they perceive themselves. This perhaps is the reason why research published in 2000 supports the fact that playing violent video games increases one’s aggressive thoughts, feelings and behavior. Apparently, without the children’s proper discernment of what is right and wrong would lead them to the adoption of these concepts that are supposed to exist only in the fantasy world in real life. In the study conducted by Craig Anderson and Karen Dill, it showed that their college student respondents have been influenced by the violent games they have played or are currently playing. It is quite obvious that the aggressiveness they have acquired through playing these violent video games caused their delinquent behaviors in the past (Anderson, 2003). In the same manner, video games have been a very popular avenue in which certain children construct their gender realities. In one way or another, video games have played a very important role in enhancing the gender differences between the girls and the boys. Based on observation and research, the characters, stories and worlds created by girls are truly different from that of the boys. Obviously, boys are more violent than the girls, making violence the most popular feature of the video games for boys. On the other hand, the girls just do not find the themes of these video games appealing – hunting, battling with monsters, etc. Because of this, video games tend to be more popular among the male kids than the female ones. In addition, this then leads to the social construct embedded upon the young minds of these children. At a very young age, the differences between the roles of the males and the females are quite clear to them (Kafai, 2001).

Saturday, November 9, 2019

Did the Bretton Woods Conference help the world economy after World War II?

The occurrence of wars all over the world induced various alterations to the economic situations of all countries and states on the globe; therefore, the conclusion of World War 1 left nations without much of a choice but to work hard to improve their typical stable economies. This then led to the emergence of the gold mechanism, enabling world-class nations to have their economies stabilized once again. In this system, every nation’s currency had to gather the help of other nation’s money and mineral stores to a particular extent.However, the gold mechanism resulted in the breakdown of communications among the economies of nations, leading to the Great Depression which happened during the early 20th century (James, 1996). So the nations could negate the impacts of this financial distress, each country made initiatives to improve the efficiency of their goods and services due for exportation; this was meant to minimize the nations’ deficits through deflation of t heir money. This mechanism however, looked to be perfect only when the nation’s deflation level is quicker and more stable than others.The consequence is that the fighting for global deflation significantly increased, resulting to major losses of different businesses, tremendous lack of job opportunities, unfair inflation rates and the loss of trust on financial institutions. While certain meetings have been accomplished in the early 20th century to find solutions to the global financial dilemmas that have been the major impacts of the Great Depression, all of these meetings did not bore any significant results.After the conclusion of World War 2, the countries came to the realization of the immediate importance to establish a mechanism that will help control all operations of economies. Particularly, this very creative financial mechanism will take over the evaluation of global economic initiatives. This then led to the meeting at Bretton Woods in America. The significant ac hievement of the meeting is the establishment of two primary world institutions. The Bretton Woods ConferenceThe meeting in Bretton Woods happened in 1944, and there were a total of 44 nations present during the meeting. The main goal of this meeting was to establish changes and initiatives within global money flows and economic interactions. The strategy to establish the Bretton Woods mechanism was suggested by two leading economic experts during that period: John Maynard Keynes, a leading economics expert based in the UK, and Harry Dexter White, the American secretary of treasury.As stated by both economics experts, the establishment of the Bretton Woods mechanism is a daunting and difficult endeavor because the economic policies have to be agreed upon by each and every participating nation (Hallerberg, 2004). The formulation of the Bretton Woods strategy resulted to the establishment of America as a superpower. In comparison to other countries and taking into consideration the tr emendous consequences of the recently concluded World War, America still possess the financial stability that other nations crave for.Aside from having an astounding amount of mineral stores, the American money during that period was the money with the most stable buying privilege. The World War 2 relegated all nations based in Europe into having to suffer from huge financial deficits in spite of the fact that they had the most mineral stores given to America; therefore, the emergence of America as a superpower did not came as a shock to everyone. This situation was used then by the Bretton Woods mechanism in selecting the American currency as its primary monetary unit, upon which all member countries agreed in unison.The mechanism is under the control of two primary organizations: The International Monetary Fund (IMF) and the World Bank. These organizations had also been founded in America. The mechanism functioned through the application of stable exchange rates utilizing the Amer ican currency as the primary monetary unit (Bordo, 1993). The major mechanism that identified its functions was based after the strategic ideas of White and not Keynes. With these circumstances and with the other elements under consideration, the superb power of America over the Bretton Woods mechanism was obvious.Effectiveness in relation to its Objectives Based on the situations identified above, here is no doubt that the primary goal of the Bretton Woods is to give aids with regards to the financial stability of countries globally as well as initiate financial strategies for growing and emerging countries. These goals are primarily attained through the allotment of loans that can be attained by all member countries. The long duration of functioning of the Bretton Woods mechanism proved that these goals had been attained.One of the proofs was that the situations of global monetary currencies changed in accordance with level that most nations can afford in the previous and succeedi ng years. Aside from these, the Bretton Woods era also resulted in the establishment of unreal growth in terms of financial opportunities (Culpeper, 1997). It has also been proven that the growth of the financial opportunities during the Bretton period had been valuable. Specifically, the level of inflation was minimized in accordance to the basic level for each country excluding Japan.Through the initiatives of these organizations the goal of enhancing profit was attained as the development of GDP during that period had been larger as compared to any other economic period; moreover, the level of interests, with the help of the Bretton Woods organizations, is still strong and affordable. Aside from these tremendous benefits, the goals of both organizations had been attained through their consistent initiatives and application of beneficial economic policies, particularly for growing countries.For example, the World Bank has an organization under its control called Multilateral Inves tment Guarantee Agency (MIGA) which primarily offers loans to enable that start of various programs of the growing countries. Loans for political initiatives are also being given by MIGA in order to give protection for investors against abuse and corruption. This results into the fulfillment of programs since all delays caused by financial problems are being stopped. Through MIGA, growing countries are also able to encourage and manage their economic policies and programs, enabling the stability of their economies (Boughton, 1995).Composed of almost all nations globally, the purpose of the existence of the International Monetary Fund (IMF) is based on the provision of global economic interaction through the establishment of a global evaluation organizations, which will do all the monitoring, support and communications regarding financial dilemmas and current news. Its primary goal is to help in the emergence of global trade in order to attain profitable options and abundance of job opportunities. It is also the goal of the IMF to guarantee the fairness of the trading, thereby, eliminating the possibility of unfair competition.Its objective is also based on the deletion of complicated policies that prevent the establishment of payment mechanism for economic transactions (Helleiner, 1996). Most significantly, nations having economic dilemmas are provided with chances to solve them with the guidance of the IMF and its current economic conditions. The foundation of the World Bank is an integral factor in the worldwide economic mechanisms, especially among growing nations. As an important organization that provides economic support, growing nations are able to gain access to loans annually.Through its highly-qualified personnel, money and information database, the World Bank has the capability to help each growing nation towards attaining a manageable plan and program to counter poverty (Battilossi, 2005). The primary goals of the organization involve the enhanceme nt of the growing nations’ ways of survival as well as the deletion of mediocrity. Primarily, is objective is to manage the financial plans and programs of the growing countries and give ample financial aid.

Thursday, November 7, 2019

The History of Internet and Internet Security

The History of Internet and Internet Security Introduction The internet has turn out to be part of our lives that is easy to forget the inventors who had a vision of what worldwide networking could grow to be and toiled to make it ensue. According to a research done, the internet, which started as a minuscule and restricted community, is now diverse and accessible from all parts of the universe.Advertising We will write a custom research paper sample on The History of Internet and Internet Security specifically for you for only $16.05 $11/page Learn More As a result, the issue of internet security is a serious matter because a local problem can be a worldwide incident within a second. Therefore, an understanding of the internet and security is imperative for the development of protective measures that ensure confidentiality, integrity as well as availability of information. The history of internet According to Vacca (2009), the development of computers at approximately 1950 was the genesis of the histor y of the internet. At around 1970, the internet began as ARPANET and it was a project funded by Advanced Research Project Agency (ARPA). The broad objective of the project was creation of a network that will not cease to function even if one of its components failed. Therefore, the creation of the internet was in such a way that it had a capacity to resist attacks like viruses, intrusions and incidents. Additionally, the main aim of the internet was openness, flexibility, and not security because people needed to share information hence there were no restrictions. The ARPANET led to development of internetworking which involved amalgamation of different networks to form a system (Speed, Juanita and Korper, 2010). As more sites linked with ARPANET, the significance of the internet increased. For instance, ARPANET was initially a government and university site but at around 1970 it became public and many people could access and use it for research. As a result, the incidence of securi ty violations increased but people did not consider it as an attack because they trusted each other. In the year, 1982 access to ARPANET expanded with the development of Computer Science Network (CSNET). Besides, at around 1987, there was emergence of commercial Internet Service Providers (ISPs). Therefore, Speed and Juanita (2009) state that the ARPANET came to a halt at around 1994 due to commercialization of the internet. The commercialization permitted people to carry out commercial traffics on the internet.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Since 1994, the internet has had a significant impact on the people’s lifestyle (Shoniregun, 2010). For instance, people use the internet to send text messages, make phone calls, shop and watch movies. In a recent research, Rhee (2010) states that people use the internet to find information. Additionally, most of the researche rs and educationists belong to an online discussion forum where they share information with people from different parts of the world. Therefore, the internet keeps on developing because of the relevant information that it contain. In a survey done, Poole (2008) states that in 1994, the internet carried approximately one percent of information flowing in a two-way telecommunication and by the year 2000 the percentage had risen to ninety-eight. This led to an increase in internet insecurity. For example, Cliff Stoll identified an internet incident and it motivated him to publish a book that created awareness on the existence of destructive use of the internet. The history of internet security Garfinkel, Spafford and Shwartz (2008) state that a virus called vienna was detected in 1987. After the detection, a man named Ralph Burger dissembled it and published the result in a book. The published information led to creation of many viruses. In 1988, many of the research centers internet c onnections in the United States were under attacks. For instance, Ferguson, (2009) states that a virus which was intended to infect computers in order to determine the number of connections ended up exploiting the UNIX vulnerability. Therefore, the virus spread swiftly infecting many computers thus making them unusable. In a research done in 1988, Einar (2008) explain that the WANK worm attacked the VMS system of the internet leading to exploitation of vulnerabilities of the programs that assist in sending and receiving of mails. Additionally, in 1994, an intrusion tool that interfered with the user name and password came out. This interrupted the security of data saved in the internet. For example, a person could log into any internet system and tamper with information.Advertising We will write a custom research paper sample on The History of Internet and Internet Security specifically for you for only $16.05 $11/page Learn More Additionally, in 1995, Citi bank detected a virus that made them loose four hundred thousand dollars to a man called Levin (Cheswick and Bellovin, 2009). Since then, people have detected many viruses that cause great harm to computers and organizations. They include, amoeba, boza and strange view viruses. In 2007, information technology specialists identified a storm worm that spread as an email attachment. Once a person opens a received email, he or she became part of the infected computers and spread the infection to others. As a result, many computers lost their functions. Therefore, computers are susceptible to attacks and people need to have information about internet security. The principles of information protection The three principles of information protection are confidentiality, veracity as well as accessibility. Cheswick and Bellovin (2009) state that information loose confidentiality when unauthorized person read and copy it. Some information like medical records and research data are vital and th ey require privacy. Therefore, it is the obligation of the organizations to ensure that client information is confidential. In the event that someone alters information in a way that is not supposed to be, there is loss of veracity. This is common in networks that are not secure. For instance, Einar (2008) states that integrity is lost when there is intentional or accidental interference with information. Since veracity is imperative for financial as well as critical safety data, people should ensure that they institute information protective measures. Lastly, loss of accessibility occurs when authorized people cannot access information (Ferguson, 2009). This lead to a situation called denial of service because people cannot get relevant information that facilitates the running of the organizations or businesses. For that reason, many organizations authenticate and authorize their information so that it is available to those who require. Authentication is a recognition process that allows specific people to use the internet. It involves the use of password, fingerprints or smart cards. On the contrary, authorization is a procedure that helps to establish if a system can execute a certain task. As a result, authentication and authorization allow authorized people to perform certain computer activities hence reducing the prevalence of cyber attacks. The significance of internet security According to a recent research, it is easy for unauthorized people to access information if the network environment is insecure (Garfinkel, Spafford and Shwartz, 2008). Additionally, it is very hard to determine the attackers. In a situation where the internet users do not have important data stored in the system, the attacked computer become useless.Advertising Looking for research paper on it? Let's see if we can help you! Get your first paper with 15% OFF Learn More Besides, it act as a source of infection transmitting viruses to other computers while permitting unauthorized people to access the organization information. The free access leads to loss of integrity and confidentiality of information because it becomes easy for people to alter the organization data. Moreover, Poole (2008) states that network attacks put the computer system at a compromise. For example, information concerning the computer hardware, network connections, software, configuration and authentication are valuable for the attackers. This is because it enables them to access the files as well as the programs hence decreasing the security of the system. Additionally, attackers who access the password of an organization network always alter the important files leading to loss of integrity and availability. Furthermore, all computers with internet connections are vulnerable to attacks like viruses, intrusions and incidents (Rhee, 2010). The organizations that are mostly affec ted include banks, insurance, universities, brokerage houses, hospitals and the government. Besides, the attack interferes with the running of an organization in a number of ways. To begin with, the organization loses a lot of time trying to repair the damage as well as recovering from the effects of the lost data. This lead to decrease in production, increase in expenditure and a loss of market opportunity as the organization can no longer fit in the competitive business environment. Therefore, computer users need to understand internet security incidents. Internet security incidents Incidents are activities related to the internet that have negative implication on the security. This is because they violate the internet security policies. Shoniregun (2010) states that internet security incidents vary in shapes and sizes and they come from any site although some originate from a specific system. Additionally, they spread fast resulting to massive destruction of systems within a shor t spell of time. Furthermore, it is hard to determine the source of the internet security incident because anyone can cause an intrusion accidentally or intentionally. For instance, Speed and Juanita (2009) explain that a student who has created software, a person with an evil intention or someone who want to search for information about a particular company can cause an intrusion. Additionally, an incident can also come from a fired employee or a consultant who accessed the information of an organization. Most of the times the intruder may want to seek political attention, logical challenge, entertainment as well as fiscal gain. According to a research done in various parts of the world, it is possible to classify the different types of incidents into several kinds. Speed, Juanita and Korper (2010) explain that probe is a type of incident that usually occurs when one tries to access a system of find information about it. For instance, probing is trying to log into an account that i s not functioning. Although probing may be due to inquisitiveness or misunderstanding, it can cause a vital security event. On the other hand, a scan is a type of probing that one accomplishes using a programmed tool (Vacca, 2009). A scan can be due to an error but most of the time it is an attack of a vulnerable system by an intruder. Additionally, account compromise is a type of incident where unauthorized person gain access in to someone else information. This can lead to data loss or theft of computer services. On the contrary, Vacca (2009) states that root compromise is a type of incident that is similar to account compromise. The only difference is that in root compromise the intruder is able to change the look of the system as well as hide the track of their intrusion. As a result, it becomes hard for the owner to trace the source of the intrusion. Moreover, a root compromise can lead to development of a packet sniffer, which is a program that enable an intruder to access dat a as it move over the internet. For instance, a packet sniffer can capture the user name or password of a person as information move around the internet connectivity. Speed, Juanita and Korper (2010) state that Denial of Service (DoS) attack is a kind of incident in which the intruder try to make the internet functions unavailable to the intended customers. The intruder achieves this incident by disrupting the network or manipulating the data. Furthermore, other types of incidents include trust exploitation, malicious code and attacks of the internet infrastructures. The development of the internet security incidents As technology continues to advance, internet intruders gain more information about attacks resulting to an increase in the number of incidents (Shoniregun, 2010). For example instead of attacking a vulnerable system, they examine the source of the code to determine the weaknesses found on computer programs. The source can be unprotected internet programs. Once in posses sion of the code, the intruders use it to determine the weaknesses of the programs. As a result, they can target the network infrastructures like the routers and the firewalls and conceal their functions. For example, an intruder can log into a system and the site owner does not detect due to lack of reflection of his activities on the system logs. This is because they use Trojan horses to mask their activities from the network owner. As a result, no one can trace the cause of the altered information. In a survey done, Rhee (2010) states that, intruders keep on identifying new and complex ways of attacking the internet as they become more stylish. For instance, intruders have a technique of determining a new connection to the internet thus making it susceptible to cyber attacks. Additionally, they use intrusions like packet sniffer to capture all information circulating in the internet thus confidentiality and integrity of data is lost. According to the survey, the percentage of the attack keeps on rising as the years go by. Besides, in 1996 approximately thirty three percent of the computers had a root compromise attack. This shows that intruders keep on attacking the internet because they have diverse knowledge about it. Additionally, any person regardless of his or her knowledge on computer system and the internet can use the software to accomplish the attack (Speed and Juanita, 2009). This means that any person with a burning desire can attack a system even if he or she does not possess technical skills. It is unfortunate that the intruders use the systems used to assess the vulnerability of a program to attack a system. As a result, the intruders can use minimum effort and time to identify weaknesses, alter information or attack a system. Therefore, many companies have developed software packages that assist in exploitation of vulnerabilities. The package include network scanners, tools for cracking passwords, modifying configured files, reporting check s ums, concealing activities and amending the logs into systems. The vulnerabilities of the internet to attacks Poole (2008) states that internet is vulnerable to attacks because the designers did not consider security. Hence, it is difficult to defend the network. Moreover, the extensive use of the internet for research and communication complicate the protective measures. For example, an attacker needs not to be present at a particular area for him or her to accomplish his or her mission. This means that one can compromise the integrity, confidentiality and availability of information from any part of the world and within the shortest time possible. Many people place a lot of trust in the internet without being aware of the risk. This is because they do not know what can happen to their information as well as their systems. Besides, they have a strong believe that they have sufficient protective measures. As the technology keep on changing, attackers also develop new ways of attacki ng the internet (Garfinkel, Spafford and Shwartz, 2008). As a result, it is vanity to believe that protective measures are always effective. Besides, the achievement of confidentiality as well as integrity is difficult because an internet may have a security compromise whose origin is a site that the organization has no control over. For example, a packet sniffer may be in a specific country but the attacker can access information found in different parts of the world. The fast growth as well as widespread internet use contributes to the vulnerability of the internet to attacks. This is because many people use complex services yet they do not safely design, configure, or maintain them (Ferguson, 2009). For example, as people hurry to procure new products through the internet, the system designers do not make sure that the network is free from vulnerabilities. Hence, intruders gain quick access into the system and interfere with the procurement and selling processes. Lastly, the grow th of the internet has led to an increase in demand of information technology specialists and engineers. Due to shortage of these people, inexperienced people address the maters of internet security resulting to an increase of vulnerability to attacks. Types of internet vulnerabilities Einar (2008) states that a fault in the computer software or the design of the protocol renderers a system vulnerable. Protocols are procedures that facilitate communication between computers. In the event that a fault exists, the computer is vulnerable to intrusion. For instance, intrudes usually target the Network File System because it lacks authentication. Additionally, designers usually leave out security component during the development of software. Therefore, the integration of security into the software takes place later after its procurement. Since the added security was not part of the initial software, it interferes with its function leading to an increase in vulnerability. Moreover, a faul t in the implementation of protocol as well as the software increases the vulnerability of the computer system (Cheswick and Bellovin, 2009). For example, the implementation of the protocol for sending messages may be in such a way that allows attackers to alter the internet and permit the system to perform unintended tasks. This attack leads to exploitation of the system as well as the software. Besides, Einar (2008) states that any fault in network configurations increases vulnerability of the computer system. For instance, a network configuration may require that people separate password from the rest of the system. In case the separation does not take place; an attacker can access authentication information and intrude the computer. The improvement of internet security Two ways are imperative in improving the security of the internet and according to Ferguson (2009); they deal with policies and procedures as well as the technology. To begin with, procedures involve the measures that people should take to prevent an attack. On the other hand, policies help in the decision making process. For example, it helps people to determine the type of defense program to use as well as the internet configuration process. Therefore, policy entails the description of a secure information environment and guidelines for reacting to an internet threat. On the other hand, security technology assists people to secure their systems as well as information from the attackers. Security technology focuses on different areas but the most common are operational and cryptography (Garfinkel, Spafford and Shwartz, 2008). Operational technology ensures that the available data is secure. On the other hand, cryptography facilitates privacy, integrity and originality of information. Cryptography is a system that prevents attackers from using the captured information (Poole, 2008). This is because attackers can modify the information of an organization and cause havoc. Therefore, encryption and decryption processes are imperative in enhancing the privacy, integrity and originality of information. For instance, a sender can encrypt a message with a password that the receiver knows. The receiver will then use a similar password to decrypt the message. This process ensures that there is maintenance of confidentiality of the message because without the corresponding decryption password, one cannot read it. Operational technology involves the use of passwords, firewalls and tools for monitoring and performing security analysis (Rhee, 2010). To begin with, the use of password prevents unauthorized people from gaining access into the internet. Secondly, firewalls ensure that people who do not attain the security criteria of an organization do not access the network. Thirdly, monitoring tools facilitate continuous monitoring and evaluation of the internet to ensure that people are confident about the security. For example, the monitoring tool can destroy viruses and malicious programs that can create harm to the computer. Finally, tools for analyzing security are significant in determining the vulnerabilities of the systems. The way forward In order to improve the internet security, research is of great importance because it will ensure availability, authenticity as well as integrity of information. As a result research need to be done about the internet protocol, detection of intrusion, engineering of software, computer system survival, web programs and computing paradigms (Vacca, 2009). This research will assist in detection of the current internet security problems and recommend the way forward. To begin with, Speed, Juanita and Korper (2010) state that there is little change in the internet protocol, therefore, people need to address the weaknesses of the computer in order to develop sophisticated procedures. The weaknesses include, lack of confidentiality, authenticity and integrity. Therefore, designers need to develop protocols that facilitate pr otection of information from unauthorized people. An example of such protocol is the use of cryptography to prevent intruders from accessing information. Additionally, research about intrusion detection is imperative because it will help people to know when the internet systems are under attack (Speed and Juanita, 2009). Therefore, researches need to focus on extensive analysis of the detection of anomaly as well as recognition of pattern. The detection of anomaly involves recognition of the usual behavior of the internet followed by determination of the abnormal characteristics. This is achieved through collection of data for a long period of time and it assist in the development of an intrusion detection device. On the other hand, recognition of pattern entail determination of network activity that is similar to an intrusion attack. Although this method is useful for the detection of future intrusions, it does not apply to new attacks. Therefore, information technology specialists require developing detection tools that can function at present and in future. This mean that extensive research on intrusion detection processes is imperative. In a recent research, Shoniregun (2010) explains that many designers develop software systems that lack security measures. In the event of integrating security measures to the software, weaknesses develop and the system becomes vulnerable to attacks. This is because breaching of systems becomes simple despite the efforts of rendering them invulnerable. Therefore, the concept of internet security should be present during the software development process. Moreover, computer system survival is the ability of a machine to function during an attack (Rhee, 2010). This mean that computer designers need to develop machines that are reliable. Therefore, researchers need to undertake research about software engineering. The research should involve testing dependability as well as fault tolerance of the machine. This will assist in th e detection of weaknesses of the current machines and development of sophisticated computers that withstand intrusions. As a result, computers will be in a position of detecting threats while still performing the normal functions. This mean that people will not suffer from the consequences of lost data. Additionally, Poole (2008) states that downloading information from the internet put ones computer at risk of an attack. This is because most of the internet programs do not have security measures. Furthermore, attackers usually target internet programs like entertainment and tamper them. When one downloads it to his or her computer, the machine gets an attack and stops its normal function. In order to prevent this problem, web designers need to develop programs with security functions. This will ensure that the downloaded information is safe for use. For instance, some internet programs like java have security measures. Therefore, internet users need to have knowledge on secure inte rnet programs. Conclusion In conclusion, an understanding of the internet and security is imperative for the development of protective measures that ensure confidentiality, integrity as well as availability of information. This is because knowledge about the concept of internet security as well as the different types of intrusions is imperative for the development of a sophisticated protective measure. Therefore, information technology specialists should strive to understand the history of internet and internet security as it would help them curb the current problem of insecurity. References Cheswick, R., Bellovin, D. (2009). Firewalls and Internet Security: Repelling the Wily Hacker. New York: Springer. Einar, E. (2008). Internet Security: Hacking, Counterhacking and Society. London: Jones and Barlett Learning. Ferguson, R. (2009). Internet. Oxford: Oxford Publisher. Garfinkel, S., Spafford, G., Schwartz, A. (2008). Practical UNIX and Internet Security. USA: Oreilly and Associate s Inc. Poole, H. (2008). The Internet: A Historical Encyclopedia. London: Academic Press. Rhee, M. (2010). Internet Security: Crytographic Principles, Algorithms and Protocols. New Jersey: John Willey and Sons. Shoniregun, C. (2010). Synchronising Internet Protocol Security. New York: Springer. Speed, T., Juanita, E. (2009). Internet Security: A Jumpstart for Systems Adminstrators and IT Managers. New York: Digital Press. Speed, T., Juanita, E., Korper, S. (2010). The Personal Internet Security Guidebook: Keeping Hackers and Crackers Out. New York: Digital Press. Vacca, J. (2009). Practical Internet Security. New York: Springer.

Tuesday, November 5, 2019

Art History Essay The Breakfast Scene

The symbol of cupid presented reflects themes presented within Venus, Cupid, Folly and Time , displaying aspects of misguided love , primarily emphasizing how lust compromises the morale of individuals. That the count presented sense of obliviousness in regards to the consequences of his actions, well eventually taint his family name in regards to the infidelity committed , but also such constant self ind... ...h open composition, provides a rustic appeal in order to emphasize the working class. The portrait depicts a fisherman’s daughter , maintain her lovely complexion , in order to lure individuals , to purchase selfish that resides in a basket placed upon her head, establishing a sense of euphoria. Adopting such seductive appearance to establish a form of interest , not only to display her services , but also displays aspects of eroticism and feminism , very large breast that references aspects of fertility , but also the delicate facial features the use of blush to complement her subtle complexion. The use of contropasto, the bodily composition presents a sense of equilibrium in which the action correlates with the action depicted, in which her arm is extended in order to maintain the balance. While the other resides at her waist idealizing her feminine figure.

Saturday, November 2, 2019

Comparison of cultural contact between 2 books, black robe(brian Essay

Comparison of cultural contact between 2 books, black robe(brian moore) & things fall apart(chinua achebe) - Essay Example Initially planned as journey against hunger, exhaustion and cold, the mission ends up fueled by suspicious beliefs and hostility provoked in the local tribes. The focal moment and central theme in Black Robe is the clash between two different cultures. Moore (1997) explores the complexities of utterly divergent cultures and tries to juxtapose them on the background of historical events happening at the beginning of 17th century Canada. Moore (1997) attempts to give new understandings about both cultures. For Native Indians, baptism is â€Å"water sorcery†. To pray over beads would mean to put a curse of someone. To the savages the idea to have only one God is absurd. For the Jesuits, on the other hand the Indians appear barbaric and uncontrollable. Their religion is surrounded with sorcerers and superstitions. The way they observe and follow their customs are bloodthirsty. What Moore (1997) reveals in front of the reader is two cultures that are diametrically different. The Indian way of life and religion is frightenly dissimilar to the Western culture of Laforgue. The attempts from both sides to reach out for each other are direct ed by mutual incomprehension. Overcoming to grasp the different thinking and customs of each culture is the theme of the whole novel. The language barrier is not so difficult an obstacle than to understand the other. Both cultures test their beliefs in their contact of the contrasting culture. Moore (1997) best describes this in the Introduction of the novel: The Indian belief in a world of night and in the power of dreams clashed with the Jesuits preachments of Christianity and a paradise after death.   This novel is an attempt to show that each of these beliefs inspired in the other fear, hostility, and despair, which later would result in the destruction and abandonment of the Jesuit missions, and the conquest of the Huron people by the Iroquois, their deadly enemy. Things Fall Apart, is an African