Monday, December 23, 2019

The Bolshevik Consolidation of Power 1918-21 Essay

The Bolshevik Consolidation of Power 1918-21 The Bolsheviks under Lenin, when they came into power in October 1917, faced immense problems in trying to consolidate their hold over the ex-tsarist empire. Firstly, how were the Bolsheviks, in view of their military resources, to extend their hold over the nation at large? The second, was how could they achieve a speedy end to the war and effect a rapid withdrawal of the German army, which was currently occupying the western part of Russia. Thirdly, how quickly would they be able to stage an economic recovery? Beset by internal and external enemies, the Bolsheviks were engaged in a desperate struggle for survival. Pre-1917, they had been spent in†¦show more content†¦His objective was not to win mass support, but to create a party capable of seizing power when political circumstances permitted. After the successful October coup in 1917, he was even more determined not to jeopardise the Bolsheviks newly-won power by allowing elections to dictate the pace of revolutionary change. The November election, therefore presented him with a problem; the Bolshevik party had won barely a quarter of the seats. Results of the Constituent Assembly: November 1917 Votes Seats SRs 17,490,000 370 Bolsheviks 9,844,000 175 National minority groups 8,257,000 99 Left SRs (pro-Bolshevik) 2,861,000 40 Kadets (Constitutional Democrats) 1,986,000 17 Mensheviks 1,248,000 16 41,686,000 717 Lenins response to this was simple and unscrupulous. In January 1918, after only one days session, the Constituent Assembly was dissolved at gun-point by the Red Guards. Without this course of action, the prospects of the Bolsheviks survival seemed slim. There was strong opposition to them both inside and outside the country. Lenin justified his action with the following speech: To hand over power to the Constituent Assembly would again be compromising with the malignant bourgeoisie. The RussianShow MoreRelatedTrotskys Role in the Soviet Union1012 Words   |  4 PagesRussia during the period 1918 to 1928 as he can be attributed with the Bolshevik acquisition and consolidation of power. However, to achieve a more balanced interpretation it is imperative all contributing factors to his role are acknowledged. Trotsky’s role has not been greatly exaggerated as his strategic leadership skills enabled him to play a fundamental role in the organisation and implementation of the November 1917 Bolshevik seizure of power and the Civil War in 1918-21; however, the importanceRead MoreWas the Cold War Inevitable Essay2937 Words   |  12 Pagesargued that it happened due to the actions that Soviets took and the consequential responses made by the United States as a result of their inflexible, single-sided interpretations of Soviet action. Yet, even with the backdrop of the early Bolshevik conflict in 1918 as well as the great ideological gulf between the Soviet Union and United states, the cold war could have been avoided in its initial stages under President Roosevelt. However, what really determined it was the series of events that occurredRead MoreSecret Intelligence Service and Espionage4647 Words   |  19 Pagesregarded as the founder of modern military espionage. During the American Revolution, Nathan  Hale  and Benedict  Arnold  achieved fame as spies, and there was considerable use of spies on both sides during the U.S. Civil War. By World War I, all the great powers except the United States had elaborate civilian espionage systems and all national military establishments had intelligence units. To protect the country against foreign agents, the U.S. Congress passed the Espionage Statute of 1917.  Mata Hari, whoRead MoreOne Significant Change That Has Occurred in the World Between 1900 and 2005. Explain the Impact This Change Has Made on Our Lives and Why It Is an Important Change.163893 Words   |  656 Pagesdetermining beginnings and endings that accord with major shifts in political and socioeconomic circumstances and dynamics rather than standard but arbitrary chronological break points. In the decades that followed the Great War, the victorious European powers appeared to have restored, even expanded, their global political and economic preeminence only to see it eclipsed by the emergence of the Soviet and U.S. superpowers on their periphery and a second round of even more devastating global conflict.

Saturday, December 14, 2019

Angela’s Ashes Free Essays

A happy life could have been because of the existence of luxury and riches around you. It could also be because you are contented with the way your life goes and you feel so much lucky with all your blessings but, it is not that easy all the time. Some would need to suffer first before finding that happiness and some would need to undergo pain and hunger before coming to the point of satisfaction. We will write a custom essay sample on Angela’s Ashes or any similar topic only for you Order Now The novel Angela’s Ashes (1996) by Frank McCourt depicts a life of poverty and tells a story of a little boy’s dream of surpassing his family’s miserable state. In this narrative, Frank as a child experienced a not so typical childhood. Having to experience the death of his three other siblings, a drunkard father and a life full of hunger, it is not a normal kind of life for a child. His was a story of pain and fate that embraced his younger years up to his teenage days. It was not an easy life for a 10 year old boy who was supposed to be playing and having fun. This novel also talks about Franks religious life and his fear in committing mistakes. His ideals and his dreams were tackled in this novel and how he will be able to achieve these things despite all the hardships and the poverty he was facing. Your Name 2 Frank McCourt was the eldest son of Angela and Malachy McCourt. He was born in America and was followed by Malachy Jr. and the twins Oliver and Eugene. The family moved back to Limerick after the death of baby Margaret. As the family went back to Limerick, their grief was only added by the consecutive death of Oliver and Eugene. Two weeks before Christmas, Angela together with Frank went to a butcher and asked for a meat. What they had was the pig’s head and Frank’s classmate were laughing at him as he carries the meat while Malachy is very disgusted upon seeing them. On Christmas morning, Frank and Malachy Jr. attended the mass with their father and later on collected for coal so that their mother can cook the pig’s head. Again, Angela gave birth to another boy named Michael and whom Frank calls as the â€Å"angel on the seventh step†. This baby got ill but Malachy was able to save him by sucking the mucus out of his nose. Malachy found a job but on pay day, he got drunk again and missed his job the following day and got fired. Frank had his first communion but he missed the collection which was according to Mikey was the best thing in having to take the first communion. He was told by his mother to attend a dance class but little did Angel know, he wasn’t really attending the class. Instead, he goes to the movies with Billy. When his mother and father learned about this, they confront Frank and told him to confess his sins to the priest. Your Name 3 Malachy wants Frank to be an Altar boy but they were refused when they asked about it. After few more years, Malachy continues to drink away the dole money while Angela gave birth to another boy who was named Alphonsus. Frank at this part of the story has a job already as he was instructed by Grandma. Frank is on his 10th year and was preparing for his confirmation and after being confirmed, he had a nosebleed and was rushed to the hospital and found out that he has a typhoid fever. He was confined and there he learned more about Shakespeare and read books most of the time. He had a friend named Patricia and Seamus who shared to him the books and Seamus was the one who recited the â€Å"Highway Man†. Almost all families in Limerick were getting richer because their father goes in the war to have work and sens money back home. Malachy left home and go in the war to find a job and Angela was overwhelmed thinking that he will send money and she can buy a new coat and boots for the kids. Unfortunately, there was no money from Malachy again. Malachy did not send any money to his family. On Chapter 10 of the book, Angela got sick of pneumonia. Frank wrote to Malachy and his father went home to take care of the kids but also left the following day when Angela was released from the hospital. Because Malachy was not able to send his paycheck, Angela was forced to appeal to the Dispensary for money. The author felt bad when he saw his mother begging outside the church. Your Name 4 Because the family owes the owner of the house with 4 months rent and they don’t have money, the kids burned a wall and the owner found out and they were asked to leave. The family stayed in the house of Laman Griffin, Angela’s cousin but he treats them bad and soon, Malachy left Limerick to go to the Army School of Music while Frank worked on a post office. He stayed with Ab Sheehan and during his work hours as a mail man, he met Theresa and they had an affair. Later on the story, she died of consumption and Frank worked for Brigid Funicane where he sends a threat letter to her debtors and when she died, he stole her money and throw the ledger in the river. He then made his plans in leaving Limerick for America. Angela’s Ashes is an autobiography of a child from Limerick who tells his story of suffering and agony during his younger years. This novel also tackles how his family, the McCourts grew up in a place where poverty is such a disease and that living in a house infested with fleas and rats is such a common thing. This novel shows many aspects of inequality. Opening the pages of the book and reading each words composing a line, phrase and slowly becoming a sentence, Frank McCourt successfully described his childhood which is full of suffering and poverty. His life together with his family in Limerick shows a side of poverty in that place that was never known to people and the whole world. With this autobiography, he stated the real situation during those years in Ireland, therefore, making the whole biography more emotional and interesting. Your Name 5 Talking about the family’s suffering, one definite example is Margaret’s who brought joy to the family and the reason why for a while, Malachy stopped from drinking and focused in taking care of his family especially taking good care of Margaret but aside from this, the death of the twins also caused suffering to the family and most of all, Malachy’s vice caused most of their misery. His hobby to drink away his wage brought hunger to the family that Angela was forced to beg in order for them to have something to eat. As the mother, she decided to do something so that there will be no dead anymore and that the kids will not be in hunger but she must admit it that all she can give to the kids is a simple life, still bounded by poverty. Aside from suffering, the main theme of the novel is poverty. Frank McCourt showed in his narrative the state of their life including their neighbors. He mentioned certain things that the people do to survive. The best example for this one is Nora whose husband was like Malachy, drinks his wage away that most of the time, it resulted to Nora’s psychological problems that she has to be taken to an asylum. Frank said that he really doesn’t know if at some point, maybe Nora finds peace in the asylum that is why she choose to be brought there. ` Citing evidences from the novel regarding poverty is easy. Angela begs for food, Frank and Malachy Jr. steals so that they will have something to eat. They live in a slum and their family so does the neighbors share the same toilet. They ask for coal to the rich families in their neighborhood and they were told to live the house they were living in because they can’t pay. Your Name 6 The life of the McCourt kids is very unusual. It is not everyday that a little kid starves to death or maybe sleeps in hunger. In their case, it is natural, a common thing and it is usual. Because of the strong poverty that they had, Angela had to beg while the kids need to steal so that they can eat and somehow fill their stomach. It is really a bad thing to do but in their situation, it seems like it is a noble thing to be done. Like Robin Hood who steals from the rich people and gives it to the poor ones, Frank has no other way but to do the same thing or watch his family slowly die, one by one. He has to be sure that they have something to eat even if its not fish and chips. What matters to young frank was to have something that can fill their hungry stomachs and make them live another day. Remember a part in the novel wherein Michael asked what’s for dinner and he wished that they have fish and chips while Angela as a mother said next week they’ll eat fish together with chips, Frank knows it is impossible because life in poverty is worse and asking money from others including the dispensary is even worse. That is how their life goes as they experience poverty in Ireland wherein during those times, it was a disease, an itch of the society. It is already a disease of the society. People oftentimes neglect those who are needing assistance but in the end, what helped this family is their strong will to survive and overcome every struggle, in the end, maybe it was because of Frank’s prayers that helped him. How to cite Angela’s Ashes, Papers

Friday, December 6, 2019

Operation Mincemeat Strategies-Free-Samples-Myassignmenthelp.com

Question: Discuss about the Operation Mincemeat Strategies. Answer: Focus The focus of operation mincemeat strategiesin modern business is to protect the vital information from unauthentic access. In modern business environment, each organization is trying to beat others for gaining competitive advantage in the market. Moreover, competitor organizations are highly inclined to unethically access the unique business tricks of their competitive organizations. In such situation, the focus of mincemeat strategieswill be to provide disinformationto the competitive organization for protecting their unique business tricks towards gaining competitive edge (Crane, 2013). Objectives The objective of operation mincemeat strategiesis to mislead the enemy by providing the misinformation for winning the war (Colvin, 2016). In modern business organization, the objective of operation mincemeat strategieswill be to mislead the competitor organizations regarding the unique business formula for taking the advantage of the market (Kauppinen-Risnen Grnroos, 2015). Centralized Control Operation Mincemeat Strategiescan be better utilized in enhancing the centralized control of the modern business organizations. Moreover, the disinformation strategy of Operation Mincemeat can mislead the competitor organizations upon the secret business formula of any modern business organization. In this way, the organization can be capable of having a centralized control over their secret business formula for gaining competitive advantage over the rival organizations. Security Operation Mincemeat Strategiescan be the most tricky business strategy for maintaining the security of information of the modern business organizations. Security violation can be extremely harmful for modern businesses, when important and confidential information is hacked by unauthentic and competitor organizations. In such situation, the contemporary business organizations can upload some misleading information for protecting or securing their actual and vital business secrets from the hackers (Crane, 2013). Timeliness Timeliness of project completion and delivery is the most important secret of modern business organizations for gaining competitive edge in the market. The competitor organizations of an organization can deliver the same business project prior to the organization by stealing the secret business formula of that organization. Hence, it destroys the value of business project the main organization and makes delay on their project execution. Operation Mincemeat Strategiescan always protect the secret business formula of an organization by providing misinformation to the competitors (Colvin, 2016). In this way, the organization can maintain the value of the project and execute that within stated deadline. Integration Operation Mincemeat Strategiescan facilitate the modern business organizations in integration of several unique business formulas without the fear information hacking. Such assimilation of innovation business concept and protection of those concepts from the unauthentic persons can foster high level of competitive gain of the organizations Reference List Colvin, I., 2016.The Unknown Courier: The True Story of Operation Mincemeat. Biteback Publishing. Crane, A. (2013). Modern slavery as a management practice: Exploring the conditions and capabilities for human exploitation.Academy of Management Review,38(1), 49-69. Kauppinen-Risnen, H., Grnroos, C. (2015). Are service marketing models really used in modern practice?.Journal of Service Management,26(3), 346-371.

Friday, November 29, 2019

The Impact of Tourism on the Ecosystem

According to Beaver, â€Å"tourism is the temporary, short term movement of people to destinations outside the places where they normally live and work, and their activities during their stay at these destinations; it includes movement for all purposes as well as day visits or excursions† (313).Advertising We will write a custom research paper sample on The Impact of Tourism on the Ecosystem specifically for you for only $16.05 $11/page Learn More Beaver argues that tourism arises from a number of factors (313). â€Å"Tourism arises from the movement of people to and their stay in, various destinations† (Beaver 313). Tourism is made up of two major components: â€Å"the journey to the destination and the stay including the activities at the destination† (Beaver 313). Usually, the journey and the stay take place in an area that is different from the normal place of work or stay. As a result, tourism gives rise to activities which are different from those done while at work or at home. On the other hand, â€Å"Dickson defines ecosystem as a community of living organisms with the physical processes which occur within an environment† (2). Ecosystems often interact in a variety of ways through their biotic and abiotic components. Ecosystems often encounter stresses imposed by human activities and physical environments. In addition, they encounter changes which may be caused by human activities. An example of human activities which cause changes in the ecosystem is tourism. One of the most difficult problem facing environmental scientists is diagnosing the nature of environmental change. Not only is the extent and rate of change often hard to detect, and even harder to predict, but it may also be very difficult to distinguish between those components of change which are part of a natural process and ecosystem dynamics, and those which are as a result of human impacts. Yet unravelling all of these issues is vit al if ecosystem function is to be sustained and irreparable damage to the biosphere avoided. This paper attempts to analyse the impact of tourism on the ecosystem.Advertising Looking for research paper on ecology? Let's see if we can help you! Get your first paper with 15% OFF Learn More According to Bio Intelligence Service, â€Å"people are great consumers when on holiday† (1). Recent studies have indicated that the ecological footprint in some parts of the world is almost same as that of residents. Bio Intelligence Service notes that, when arrival transport account is put into consideration, this ecological footprint escalates. Tourism forms the backbone of many economies around the globe. However, it has been found to exert indirect and direct pressure on species and habitats and, as a result, it poses a significant threat to conservation. Furthermore, tourism often disturbs wildlife and heightens environmental pollution due to increased transportation of pe ople. The negative impacts of tourism on ecosystem are aggravated by the fact that tourists tend to consume more than the local communities. In addition, tourists tend to consume more when they are on vacation. A study was conducted recently in Val di Merse, Italy, to determine the ecological footprint of tourists in this region. This study found out that Val di Merse receives a total of 685 tourists per day. As a result, the local population is increased by 5 percent. The researchers â€Å"gathered data on arrival transport, on food and fibre consumption, on accommodation, on land use, utilities and waste, on local transport and on activities of tourists on holiday in Val de Merse region† (Bio Intelligence Service 1). The study revealed that arrival transport contributes 86 per net of the total tourist impact on ecosystem. The study indicated that â€Å"the total impact of one tourist is 38.08 gha/per year† (Bio Intelligence Service1). RAMP notes that â€Å"while rec reational activities that take place in lakes, streams, wetlands, and their riparian areas are most likely to negatively impact the aquatic environment, land based activities can also impact the environment† (1). RAMP indicates that tourist activities such as fishing and hunting of sea animals often lead to the decline in the pollution of aquatic species (1). Tourist activities also alter the aquatic habitat. For example, predator prey interactions are likely to be altered. Aquatic habitat is likely to be distorted by pollution and alterations in the neighbouring habitats.Advertising We will write a custom research paper sample on The Impact of Tourism on the Ecosystem specifically for you for only $16.05 $11/page Learn More â€Å"Off highway vehicles, including all terrain vehicles, Argos, dirt bikes, and off road vehicles, driven trough or across steams and other water bodies can lead to habitat destruction and degradation, including loss of st ream bank stability and erosion† (RAMP 1). On the other hand, when tourists come into contact with wildlife, wildlife behaviour is often affected. Johnson notes that the growth of tourism around the globe has overlooked concerns of increasing ecological resource use (2). Of late, various tourist attraction sites and infrastructures have been identified as sites of resource overconsumption. Johnson argues that ecological footprint is essential in the evaluation of different types of tourist behaviours and choices. According to Johnson, â€Å"an ecological footprint examines the amount of natural resources required to support a specific type of behaviour, business or process† (2). A recent study funded by World Wildlife Fund sought to evaluate the use of ecological footprint in the evaluation of the impact of tourism on ecosystem. The study collected data â€Å"on bioreproductive land, Bioreproductive Sea, built land, energy land, and area for biodiversity† (Johnso n 6). During the study, â€Å"the ecological footprint of each resort was broken into a number of key areas of ecological impact; air travel, waste, food, and hotel energy use† (Johnson 6). The research was conducted in Ontario. The study revealed that tourism has a total impact of a 45.79 gha/per year on the selected region (Johnson 6). On the other hand, GDRC indicates that tourism has a number of physical impacts (1). It causes trampling. In this case, vegetation and soil are often disturbed when tourists use the same route over and over again. Anchoring activities also degrade the ecosystem. â€Å"Anchoring, snorkelling, sport fishing, scuba diving, yachting and cruising, are some of the activities which can cause direct degradation of marine ecosystems such as coral reefs, and subsequent impacts on coastal protection and fisheries† (GDRC 2).Advertising Looking for research paper on ecology? Let's see if we can help you! Get your first paper with 15% OFF Learn More In addition, tourist activities might alter the ecosystems in a number of ways. â€Å"For example, wildlife viewing can bring about stress for the animals and alter their natural behaviours when tourists come too close† (GDRC 2). As noted earlier, tourism forms the backbone of the economy of many countries in the world. Many governments have invested heavily in the promotion of their tourist destinations. Some of these developments have a significant impact on nearby ecosystems. For example, many natural lands located close to wildlife ecosystems are being cleared to create space for the construction of centres which will accommodate the growing number of tourists. In addition, most governments have converted natural wildlife ecosystems into national parks and game reserves. Confining wild animals in national parks and game reserves significantly affects their behaviours. The reproduction of these animals is restricted and this can result into the extinction of the confined s pecies. In addition, their natural feeding habits are affected. Some of these animals are fed on synthetic foods which might hamper their health. Furthermore, the confining of wild animals into national parks alters food chains and food webs in the natural world. Hotels and recreational centres which are located close to water bodies often discharge wastes into these water bodies thus affecting the aquatic ecosystem. Moreover, there is an increase in the consumption of sea foods. Many resorts located close to water bodies often offer sea food to visiting tourists as one of their special meals. Tourism contributes to the increase in the demand of sea food and indirectly affects the aquatic ecosystem due to overfishing. In summary, this paper has noted that â€Å"tourism is the temporary, short term movement of people to destinations outside the places where they normally live and work, and their activities during their stay at these destinations; it includes movement for all purpose s as well as day visits or excursions† (Beaver 313). Beaver argues that tourism arises from a number of factors. â€Å"Tourism arises from the movement of people to, and their stay in, various destinations† (Beaver 313). Tourism is made up of two major components: â€Å"the journey to the destination and the stay including the activities at the destination† (Beaver 313). Ecosystems often encounter stresses imposed by human activities and physical environments. In addition, they encounter changes which may be caused by human activities. An example of human activities which cause changes in the ecosystem is tourism. One of the most difficult problem facing environmental scientists is diagnosing the nature of environmental change. Not only is the extent and rate of change often hard to detect, and even harder to predict, but it may also be very difficult to distinguish between those components of change which are part of a natural process and ecosystem dynamics, and those which are as a result of human impacts. Yet, unravelling all of these issues is vital if ecosystem function is to be sustained and irreparable damage to the biosphere avoided. Experts argue, â€Å"people are great consumers when on holiday† (Bioscience Intelligence 2). Recent studies have indicated that the ecological footprint in some parts of the world is almost same as that of residents. Bio Intelligence Service notes that, when arrival transport account is put into consideration, this ecological footprint escalates. Tourism forms the backbone of many economies around the globe. However, it has been found to exert indirect and direct pressure on species and habitats and as a result it poses a significant threat to conservation. Furthermore, tourism often disturbs wildlife and heightens environmental pollution due to increased transportation of people. The negative impacts of tourism on ecosystem are aggravated by the fact that tourists tend to consume more than the local communities. In addition, tourists tend to consume more when they are on vacation. Tourist activities such as fishing and hunting of sea animals often lead to the decline in the pollution of aquatic species (RAMP 1). Tourist activities also alter the aquatic habitat. For example, predator prey interactions are likely to be altered. Aquatic habitat is likely to be distorted by pollution and alterations in the neighbouring habitats. â€Å"Off highway vehicles, including all terrain vehicles, Argos, dirt bikes, and off road vehicles, driven trough or across steams and other water bodies can lead to habitat destruction and degradation, including loss of stream bank stability and erosion† (RAMP 1). On the other hand, when tourists come into contact with wildlife, wildlife behaviour is often affected. Works Cited Beaver, Allan. A Dictionary of Travel and Tourism Terminology. Derby: Macmilan, 2010. Print. Bio Intelligence Service. Environmental Impacts of Tourism. June 2010. W eb. http://ec.europa.eu/ Dickson, Gohr. Ecosystems. Vancouver: Oxford, 2010. GDRC. Tourism’s Three Main Impact Areas. May 2012. Web. Johnson, Allan. Exploring The Ecological Footprint Of Tourism In Ontario. Waterloo, Ontario: Oxford Press, 2010. Regional Acquatics Managment Program (RAMP). ‘Potential Effects from Tourism and Recreation on Aquatic Ecosystems.’ June 2012. Web. http://ramp-alberta.org/RAMP.aspx This research paper on The Impact of Tourism on the Ecosystem was written and submitted by user Ezra Burch to help you with your own studies. You are free to use it for research and reference purposes in order to write your own paper; however, you must cite it accordingly. You can donate your paper here.

Monday, November 25, 2019

Free Essays on A Raisin In The Sun

â€Å"A Raisin in the Sun† In â€Å"A Raisin in the Sun,† Lorraine Hansberry shows that having dreams is essential to the lives of the characters in the play. In particular, the main character Walter Younger has idealistic dreams of better lives for himself and his family. When Walter is introduced in the play, it appears that he is frustrated with his current position in life. His frustrations stem from his inability to provide for his family and his lack of control in making his dreams of a better life become a reality. Throughout the play Walter struggles with these dreams and exhibits greed and foolishness. The consequences of his actions force him to grow up and become the man that his family needs him to be. Walter realizes the selfish nature of his dreams and learns that he must put the dreams of his family as a whole before his own. In Act I, Scene 1, Walter speaks of his dreams and appears to have the best intentions for his family. He believes that an investment in the liquor store business with his friends is the ideal way to lift them out of poverty. The desperation with which he talks about these dreams even causes his wife Ruth to have a slight change of heart about them. The urgency in his voice shows his serious need for change and prompts her to bring the subject up to Mama. â€Å"Walter Lee say colored people ain’t never going to start getting ahead till they start gambling on some different kinds of things in the world – investments and things.† (p. 1815) In 1959, the time period of the play, most black men in America faced struggles and a lack of opportunity in trying to become providers for their families. Without his dreams and the resources to achieve them, Walter feels that his existence in the world is insignificant. However, Walter’s complete determination to have the means to invest in the liquor store begins to overshadow the good intentions of his plans. He wants to use the insurance ... Free Essays on A Raisin In The Sun Free Essays on A Raisin In The Sun Pride in â€Å"A Raisin in the Sun† In the play â€Å"A Raisin in the Sun†, by Lorraine Hansberry, pride is one of the major themes. Several of the characters display their own particular kind of pride. Walter Lee shows a type of pride that could be called â€Å"manly† pride. Beneatha is constantly displaying her â€Å"intellectual† pride. Mama has a deep-rooted â€Å"old-fashioned† pride. Collectively, all of their prides come together to form a sense of â€Å"cultural and ethnic† pride. Walter Lee’s â€Å"manly† pride shows itself as he always insists on being accepted and respected as the head of the Younger household. He expects the rest of the family to listen to him and follow his guidance. When is â€Å"manliness† is questioned, he becomes very angry. Walter Lee wants to invest the ten thousand dollars of insurance money that his mother has inherited from his father’s death in a liquor store. When his wife, Ruth, ignores his idea he becomes angry because he wants to be respected at the man of the house. He tries to make his mother understand his point of view. He thinks that money is the only way that a man can be successful. Beneatha’s name is well suited to her since she seems to feel that everyone is â€Å"beneath† her. She feels that school and learning about her African heritage is the most important thing in her life. Her need to be intellectually superior causes her to often disrespect her mother. She shows this when she sounds out Asagai’s name unnecessarily slowly to her mother, as if her mother was not capable of understanding otherwise (Hansberry 1401). She also insults her mother when she asks her mother not to â€Å"ask any ignorant questions about Africa †¦Ã¢â‚¬  (Hansberry 1401). Most of Mama’s pride has been inherited from her late husband, Big Walter. She believes strongly that everyone in put family first, respect their mother and father, and respect the Lord. She often spoke with prid... Free Essays on A Raisin In The Sun A Raisin in the Sun Title - A Raisin in the Sun Author – Lorraine Hansberry Genre – Drama Copyright Date – 1958, 1986 by Robert Nemiroff, as an unpublished work 1959, 1966, 1987, 1988 by Robert Nemiroff Setting – The setting was after WWII and the present (1958), in the south side of Chicago. Effect of Setting on Characters and Plot – The Younger family is a low class African-American family, who plans to move into an all Caucasian neighborhood. In this time period, an African-American can hardly have any rights because of discrimination and prejudice. The family faces some decisions that change their lives and make conflicts between family members. Main Characters – The mother, Lena Younger, works as a maid for a Caucasian family. She is expecting to receive a $10,000 check from life insurance because of her husband’s death, Walter Lee. With the money that she receives, she hopes to retire. Lena’s son, Walter Lee Younger, also known as Junior, is a dreamer. He wants to open a liquor store, which was his father’s dream. He hopes to use the check that the family receives to open his own business. But, when he pursues this, his plan falls apart, and makes conflicts between his family members. Walter Lee’s wife, Ruth Younger, has some problems with her husband, and wants to make peace with him. She wants the family to learn about their history, and she strongly believes that learning about their past could help the family make a decision about the money. She wants to move into a bigger apartment, because of the amount of people in the house, especially when she finds out she is pregnant. Beneatha Younger, Lena’s daughter, plans to make something of herself and go to medical school. She is a perfectionist and takes pride in being a South African. She has morals and views, and some in which came from college, causes disagreements with her mother’s orthodox beliefs. Travis Younger, the son... Free Essays on A Raisin In The Sun I believe that Lorraine Hansberry is trying say that the African American Women’s experience has been tough. Many women living in the United Stated during segregation, mainly African-American had hard times supporting their families. Also I think she is trying to say that they had many unpleasant experiences, but they also had some nice experiences too. Another thing I believe she is trying to say is they are determined. There are three main African-American women in the book who all struggle in different ways to help their family. All three have similar problems and a difficult path to walk. One woman is Lena Younger or Mama. Mama has a very difficult path to walk in the play; one of those hardships on the path is living in a crowded apartment with her children, daughter-in-law, and grandson. Mama and Ruth, one of the other African-American women, were friends from the beginning of the play. Both women lived with Walter Lee Younger, a drunkard, dreamer, and often a very picky, unpleasant man to be with. Beneatha, Mama’s daughter, wants to be a doctor and does not agree with Mama on many things, such as God. In conclusion, Mama wants to have a house and please her family, though all Ruth wants is for Travis to be happy, and Beneatha wants to marry Asagai and become a doctor. That leads us into our next paragraph about how they cope with their problems. All three women have bumpy paths and problems to cope with. Mama has the insurance money and what to do with it is fought over by her family. Finally Mama decides to put a down payment on a two-story house with a garden, because she has always wanted a garden. Even though Mama bought a nice house, the white neighborhood that it was in was not very friendly. A representative from Clybourne Park (the neighborhood in which the house is) came to the apartment telling the Youngers that the neighborhood does not want them to move in. This upsets the whole family. Thou... Free Essays on A Raisin In The Sun â€Å"A Raisin in the Sun† In â€Å"A Raisin in the Sun,† Lorraine Hansberry shows that having dreams is essential to the lives of the characters in the play. In particular, the main character Walter Younger has idealistic dreams of better lives for himself and his family. When Walter is introduced in the play, it appears that he is frustrated with his current position in life. His frustrations stem from his inability to provide for his family and his lack of control in making his dreams of a better life become a reality. Throughout the play Walter struggles with these dreams and exhibits greed and foolishness. The consequences of his actions force him to grow up and become the man that his family needs him to be. Walter realizes the selfish nature of his dreams and learns that he must put the dreams of his family as a whole before his own. In Act I, Scene 1, Walter speaks of his dreams and appears to have the best intentions for his family. He believes that an investment in the liquor store business with his friends is the ideal way to lift them out of poverty. The desperation with which he talks about these dreams even causes his wife Ruth to have a slight change of heart about them. The urgency in his voice shows his serious need for change and prompts her to bring the subject up to Mama. â€Å"Walter Lee say colored people ain’t never going to start getting ahead till they start gambling on some different kinds of things in the world – investments and things.† (p. 1815) In 1959, the time period of the play, most black men in America faced struggles and a lack of opportunity in trying to become providers for their families. Without his dreams and the resources to achieve them, Walter feels that his existence in the world is insignificant. However, Walter’s complete determination to have the means to invest in the liquor store begins to overshadow the good intentions of his plans. He wants to use the insurance ...

Thursday, November 21, 2019

Comparison of Leo Tolstoys War and Peace and A Prisoner in the Essay

Comparison of Leo Tolstoys War and Peace and A Prisoner in the Caucasus - Essay Example In general and on a whole, it can be stated that there are more differences than similarities between the two. War and Peace provides ample background as to the war that is taking place, describing in detail the events leading up to the war, the reason for it, the points of view and particularities of both sides involved, and the historical context surrounding the characters and occurrences that are significant to the story. It is a standalone piece that a reader can approach without the need to be versed or even familiar with the history of the time period in which it unfolds, given the fact that all of this information is provided therein, whereas in "A Prisoner in the Caucasus", the only piece of information given as to historical context is that it is taking place amidst the war between the Russians and the Tartars, forcing the discerning and curious reader to research the circumstances of, and time in history when, said war was waged if he/she wishes to obtain some temporal refe rence or detailed contextual information that would serve as a basis for better understanding the tale's time and place. Another general and very important difference between the novel and the short story consists of the fact that the latter was written by Tolstoy based on actual experiences. "A Prisoner in the Caucasus" fictionalizes Tolstoy's first-hand experience as a soldier in 1852 fighting in the war against the Chechenians, Tartars who rebelled against Russian rule. Evidence of actual occurrences that Tolstoy lived during his military career, which he either described in detail to instill realism into certain passages of his story or embellished upon to create memorable scenes, abounds in scholarly biographical works on the author. One such event is beautifully narrated in A Cadet in the Caucasus (Simmons, p. 23): [Tolstoy] and Sado were in a convoy of stores from Fort Vozdvizhenskoe to Fort Groznoe. Although regulations strictly forbade anyone detaching himself from the convoy, because of the danger of being cut off by roving mountaineers, he, Sado and three mounted officers, impatient with the slow pace of the infantry, rode on ahead. Tolstoy and Sado ascended a ridge to see if any of the enemy were in sight. A large band suddenly appeared a short distance away. Shouting a warning to their three comrades below, Tolstoy and Sado galloped for the fort, less than three miles away. The Chechen band divided, seven taking up the pursuit of Tolstoy and Sado and the rest dashing after the other officers. These men had been slow to take the warning and two of them were severely wounded before reaching the convoy. Meanwhile Tolstoy, who had been trying out Sado's spirited new horse and hence might easily have escaped, refused to desert his friend, who was mounted on Tolstoy's slow ambler. The Chechens drew nearer and nearer, while Sado tried to keep them at a distance by threatening them with an unloaded gun. The enemy could have shot them down, but apparently they desired to take them alive, especially the renegade Sado, whom they no doubt wished to torture. Fortunately, a Cossack guard at the post saw their plight. A rescue party at once galloped out and the Chechens fled. This close encounter

Wednesday, November 20, 2019

The Vertical Boundaries of the Firm Essay Example | Topics and Well Written Essays - 1000 words

The Vertical Boundaries of the Firm - Essay Example â€Å"Total Quality Management is a wide management perspective that deals with processes and attitudes† (Delfmann & Thorsten, 2008). It emphasizes quality as a major objective in a manufacturing environment as opposed to traditional mode of maximizing production. It is worth noting that quality in production not only applies to manufacturing environment but also in knowledge service industries for instance universities. â€Å"Total quality management operates under the principles of continuous improvement of quality as opposed to maintenance of a static level† (Gattorna, 1998). It aims at approaching quality at an increasing scale. This is possible through training and motivation of employees so as to better quality. It is therefore paramount for the top management to state their commitment open to all employees. The advantage of the mode is that it has the ability to immediately detect and correct quality problems. It doesn’t rectify problems after occurrence. â€Å"Just in Time† is a philosophy in management that seeks to eliminate manufacturing wastes by producing right quantity at the right time and at the right place. Its main goal is to do away with non-value adding operations during production. Lean production or stockless production is a philosophy that aims at reducing inventory levels to an absolute minimum. Effectiveness of logistics performance index to transnational organisations in decision making. Relationship between logistics index and supply chain location selection.... It aims at approaching quality at an increasing scale. This is possible through training and motivation of employees so as to better quality. It is therefore paramount for the top management to state their commitment open to all employees. The advantage of the mode is that it has the ability to immediately detect and correct quality problems. It doesn’t rectify problems after occurrence. â€Å"Just in Time† is a philosophy in management that seeks to eliminate manufacturing wastes by producing right quantity at the right time and at the right place. Its main goal is to do away with non-value adding operations during production. Lean production or stockless production is a philosophy that aims at reducing inventory levels to an absolute minimum. Looking closely at the three aspects, Just in Time increases production, performance and quality in manufacturing industry. Lean, controls stock levels to avoid unnecessary production while Total Quality Management works towards good quality of products. The three aspects support each other in a manufacturing environment. â€Å"Toyota manufacturing industry adopted this principle which saw a reduction in manufacturing defects and parts storage problem† (ElMaraghy, 2012). Question 3 Rough plan Effectiveness of logistics performance index to transnational organisations in decision making Relationship between logistics index and supply chain location selection Management in transnational organisations is a challenging task especially in decisions making pertaining to supply chain. The use of logistics plays a crucial role in the success of supply chain. â€Å"Order execution is an imperative element

Monday, November 18, 2019

Intellectual property protection Essay Example | Topics and Well Written Essays - 2250 words

Intellectual property protection - Essay Example The scope of the work will cover the conventions in design management and intellectual property rules and processes. In addition to this, relevant elements of international intellectual property law as regulated by the key stakeholders like the World Intellectual Property Organization (WIPO) will be integrated into the study to form the parameters of the discussion Patents are rights to new or useful ideas (Motro, 2012). Thus, if a designer creates a new idea and a new concept, that individual can seek to register it as a patent. A patent is used for inventions and there is the individual who registers a patent has the general authority or license to confer rights for replication of the design or concept (Cannady, 2010). The fundamental requirement for a patent registration is that the idea being patented by a designer is new and useful (Dworkin and Taylor, 2011). Thus, in the world of design, as long as a design is useful and new, a designer can register it. The idea must be one that does not exist and it can be attained if a design can be applied in a scientific way or manner. The advantage of patents over other forms of registration of intellectual property is that it excludes others (Waller, 2011). This protects the legal rights and limits replications through licensing opportunity which brings the inventor royalties (Yu, 2007). This can be easily extended to different nations around the world (Yu, 2007). The disadvantage of patents on the other hand is that it lasts for only 20 y ears (Waller, 2011). It is expensive to register a patent and the requirements are extremely complicated. There is also a long time requirement for people registering patents. Another approach to the registration of a design is to use trademarks. Trademarks are however different from patents and might not be applicable to some forms of designs (Bowen, 1994). The essential role of trademarks is that it gives a commercial

Saturday, November 16, 2019

The Law Commissions review of the law of intention

The Law Commissions review of the law of intention 'The Law Commission's review of the law of intention confirms the viewthat the English law of intention for murder is based upon an understanding that lacks in two opposite ways. First, as regards direct intention, the law is morally under-inclusive in that it places too much moral weight on a psychological conception of the required mental state. It therefore fails to recognise properly the issue and significance of the concept of 'indiscriminate malice'. Secondly, as regards direct and indirect intention, the law is morally over-inclusive, failing to differentiate culpable and non-culpable acts.'(Norrie, 2006) Critically discuss the above statement with reference to the doctrine of intention in relation to the crime of murder and the Law Commission's Consultation Paper Homicide (No.177, 2005). Before we commence our discussion, let us first be quite clear on what is meant by ‘direct intention’, ‘indirect intention’ and ‘indiscriminate malice’ in the context of the above statement. Intention literally means ‘aim or purpose that guides an action[1]’. Therefore, ‘direct intention’, in the context of murder, means an act committed with the direct purpose of killing, or causing serious harm to, another. This has been one of the mens rea requirements for murder as far back as the 17th Century[2]. Clearly, this precludes an intention to achieve another criminal purpose altogether, where the actor ought reasonably to have foreseen, but did not directly intend, the death of another to be a virtually certain result of his actions, e.g. the intention of a ‘person who places a bomb on a plane for the purpose of making an insurance claim in respect of property but who foresees as a virtual certainty the death or serious injury of those who are on the plane when the bomb explodes.[3]’ This is what Norrie refers to as ‘indiscriminate malice’; ‘malice,’ in that the actor intended to perform an illegal act, and; ‘indiscriminate,’ in that the actor paid little or no regard to the virtually certain consequences of his actions, namely the death of another. It has long been recognised that the law should bring actions of indiscriminate malice within the scope of the crime of murder, but that a strict requirement of ‘direct intention’ would fail to do so; ‘direct intention is simply ‘too narrow for the purposes of criminal responsibility[4]’. Thus, the concept of cognitive ‘indirect intention’ was born, introduced into English law in the case of Nedrick[5]. Such intention does not have to be direct, but can merely involve a degree of foresight which, if possessed, should warrant a conviction of murder rather than manslaughter, a crime which denotes a too low a degree of criminal and moral culpability for actions where the death of another is virtually an incidental certainty. This doctrine, in its current form, was laid down by Lord Lane CJ Nedrick[6] in 1986, and modified by Lord Steyn in Woollin[7]: â€Å"Where the charge is murder and in the rare case where the simple direction is not enough, the jury should be directed that they are not entitled to find the necessary intention, unless they feel sure that death or serious bodily harm was a virtual certainty (barring some unforeseen intervention) as a result of the defendant’s actions and the defendant appreciated that such was the case.[8]† Some commentators have argued, as Norrie does at the top of this paper, that such an extension has gone too far; whilst indiscriminate malice now clearly comes within the scope of this extended intention requirement for murder, which is a good thing, other actions are now also included under the crime of murder, crime which, due to the lack of criminal and moral culpability involved, would be more fairly labeled as manslaughter. An example of such an action being so unfairly labeled was provided by Lord Goff in the Nathan Committee Report by the House of Lords Select Committee on Murder and Life Imprisonment [9]: â€Å"A house is on fire. A father is trapped in the attic floor with his two little girls. He comes to the conclusion that unless they jump they will all be burned alive. But he also realises that if they jump they are all [virtually certain] to suffer serious personal harm. The children are too frightened to jump and so in an attempt to save their lives he throws one out of the window to the crowd waiting below and he jumps with the other one in his arms. All are seriously injured, and the little girl he threw out of the window dies of her injuries.† The Law Commission, in citing and analyzing this example, came to the conclusion that the father in this case should not be labeled a murderer. Under the concept of ‘indirect intention’ however, the father should be guilty of this second-degree crime. As Norrie notes[10], the Law Commission were forced to conclude that ‘indirect intention’, by focusing on the knowledge of the father rather than the wishes behind his actions, was morally over-inclusive, failing to differentiate correctly between culpable and non-culpable acts, i.e. between actions of indiscriminate malice, such as the insurance fraudster who blows up the plane with no regard to the life of those on that plane, and actions involving no malice, but which are indiscriminate in their effects, such as the actio ns of the desperate father in Lord Goff’s example above. In this paper I shall address these concerns in detail, concluding that a cognitive approach to intention may simply be unsuitable for the crime of murder; it fails to adequately demark the boundaries of culpability between this crime and that of manslaughter. I shall then examine the Law Commission’s Consultation Paper Homicide (No.177, 2005), and shall critically discuss their approach to these problems, concluding with an assessment of how successful these reform proposals would be in their aim of differentiating correctly between culpable and non-culpable acts, if implemented. As we have already seen from the examples discussed above, Norrie is quite right in his assertions; the requirement of direct intention is too focussed on the specific mental state of the actor with the effect that the charge of murder would be precluded for anyone other than an offender who either directly intended to kill his victim, or at least intended to cause that victim serious harm from which death was a reasonably foreseeable result. Likewise, the extension of this requirement to include indirect intention, whilst at least serving to bring crimes of indiscriminate malice under the scope of ‘murder’, also serves to bring other such actions under this label, actions which should only be considered manslaughter, in light of the lower degree of criminal culpability possessed by their perpetrators. In other words, it is not always fair to equate foresight of a virtually certain result with intention. Let us now look at the reforms to the doctrine of direct intention, which have been proposed by the Law Commission in their Report on Homicide[11], and assess to what extent these reform might actually serve to correct the current inadequacies: In this Report, the Law Commission make two different reform proposals; the first of these is to create a statutory definition of intention which avoids the problems of indirect intention being construed too widely by a jury; the second is to codify the existing common law doctrine of indirect intention, but to modify it so that the current problems of indirect intention can be avoided. Both of these proposals are therefore designed to rectify the problem of indirect intention being construed too widely, whilst at the same time allowing this doctrine to continue its prosecution of indiscriminate malice as murder where appropriate. The rationale behind both of these alternative proposals is to rectify the distinction which can, in exceptional cases, exist between intention, in its natural form, and intention implied by reasonable foreseeability/ virtual certainty. They reform proposals recognise that it is possible for an offender to have not intended a particular outcome, even though he or she may have realised that such an outcome was a virtually certain consequence of their actions. This is commonly known as the ‘Woolin[12]’ problem. Under the first proposal, the Commission have state that ‘It is crucial that a statutory definition of intention should not cause injustice, or absurdity, by deeming certain conduct to be intended when the circumstances show it to be otherwise[13]’. Thus, under this first proposal, the Commission propose to insert a proviso into a statutory definition of intention, i.e. ‘A person is not to be deemed to have intended any result, which it was his or her specific purpose to avoid.[14]’ This should not be seen as reinserting a motive assessment into that of intention, but rather to provide a means by which a jury will not be forced to convict someone of murder, in an exceptional case where that offender specifically did not intend to cause death even though he knew it would almost certainly result from his actions. Under the second proposal, the Commission suggest a codification of the current doctrine of intention, modified to take account of those exceptional cases where it would be unfair to equate foresight of a virtually certain result with intention, might be as follows. Such a formulation might read as follows: â€Å"(1) A person is to be regarded as acting intentionally with respect to a result when he or she acts in order to bring it about. (2) In the rare case where the simple direction in clause (1) is not enough, the jury should be directed that: they are not entitled to find the necessary intention with regard to a result unless they are sure that the result was a virtual certainty (barring some unforeseen intervention) as a result of the defendant’s actions and that the defendant appreciated that such was the case. (3) In any case where the defendant’s chance of success in his or her purpose of causing some other result is relevant, the direction in clause (2) may be expanded by the addition of the following phrase at the end of the clause (2) direction: or that it would be if he or she were to succeed in his or her purpose of causing some other result, and that the defendant appreciated that such was the case.[15]† This would have the effect of maintaining the current law in relation to virtual certainty, which as Lord Steyn pointed out in Woolin, â€Å"has [over a period of 12 years since Nedrick] apparently caused no practical difficulties,[16]’ whilst at the same time, limiting the doctrine of indirect intention so as to exclude those situations where an offender might have seen death as being virtually certain, but where he specifically tried to avoid it. This proposal purports to do this by providing the jury with more specific guidelines as to when they are entitled to infer indirect intention. Both of these reform proposals are encouraging; it would seem that the Law Commission is heading in the right direction at last. The first proposal specifically precludes the Woolin problem with the insertion of a provision which, although purportedly reintroducing a motive element to the doctrine of intention, can actually be used to ensure that intention is not implied where it would be unfair to do so. The second is less specific, but purports to achieve the same ends by clarifying the necessary circumstances in which indirect intention should be implied. In conclusion, I would favour the first proposal for the following reason; the second proposal will only slightly modify the doctrine of indirect intention, and will only slightly limit its scope. The proviso contained in the first proposal however, is, as yet, unlimited in its scope, and as such, can be used by a jury to greater effect. This may have the result of reverse injustice, i.e. offenders who should morally be guilty of murder escaping this label for the lesser conviction of manslaughter, but I feel that it will so significantly decrease the chances of the reverse occurring, i.e. offenders who should only be found guilty of manslaughter being labeled as a murderers, that such a risk is justified; after all, it is more important to encourage this latter phenomenon than it is to prevent the former from occurring at all costs, especially in light of the huge sentences which are imposed on those offenders convicted for the crime of murder. Bibliography: Law Commission's Consultation Paper Homicide (No.177, 2005) Nathan Committee Report, Report of the House of Lords Select Committee on Murder and Life Imprisonment (HL paper 78-1, 1989). A Ashworth, Principles of Criminal Law (4th ed 2003) A Norrie, â€Å"Subjectivism, Objectivism, and the Limits of Criminal Recklessness† (1992) 12 OJLS 45. A P Simester, â€Å"Why Distinguish Intention from Foresight?’† in A P Simester and A T H Smith, Harm and Culpability (1996) 71. Williams, G. (1955) The definition of Crime Current Legal Problems 8, 107-30 Smith, A. H. (2004) 'Criminal Law: The Future' Criminal Law Review, Dec, 971-80 1 Footnotes [1] A definition provided by the Oxford English Dictionary. [2] See Lord Coke’s classic definition involving ‘malice aforethought’. [3] Law Commission Report: Homicide [No.177; 2005] para 4.6 [4] Ibid, para 4.6 [5] 1986 (83) Cr App R 267 [6] ibid [7] [1999] 1 AC 82. [8] [1999] 1 AC 82, at 96 [9] Lord Goff in the Nathan Committee Report, Report of the House of Lords Select Committee on Murder and Life Imprisonment (HL paper 78-1, 1989). [10] In the statement at the top of this paper, A. Norrie states: 'The Law Commission's review of the law of intention confirms the viewthat †¦ indirect intention†¦ is morally over-inclusive, failing to differentiate culpable and non-culpable acts.' (Norrie 2006) [11] Report No. 177; 2005 [12] In this case, D had a grudge against a woman and had threatened to ‘burn her out’. One night he poured paraffin through her letterbox and set it alight. One of the women dies in the fire. When asked why he did it, he replied ‘to wake her up and frighten her’. Here, he did not intend to kill the woman’s but the question is therefore whether or not he saw such a result as virtually certain. [13] Ibid, para 4.42 [14] Ibid, para 4.50 [15] Report No. 177 2005 para 4.69 [16][1999] 1 AC 82. at 94

Wednesday, November 13, 2019

Independent Medical Examination :: essays research papers

Dear Dr.: is the authorized representative of in all of its workers’ compensation matters. The purpose of this file review is to determine whether the alleged condition of lumbar sprain is causally related to the claimant’s work activities. This claim has been allowed by the BWC for a sprain lumbar region following the claimant’s allegations that he felt back pain after slipping on ice while opening a gate at work. The claimant presented himself to St. Vincent Charity Hospital later that day complaining of sharp pain more on the right than on the left. The claimant admitted to prior back injuries and frequent chiropractic manipulations by a chiropractor during the examination, but was unsure of his previous diagnosis. The claimant stated that his back â€Å"has never been great, and I’ve always had problems with it†. On examination, Dr, Daniel Ryu found mild to moderate right paralumbar tenderness. The claimant was diagnosed with a lumbar sprain and given medications. The claimant followed up on March 9, 2005 with Dr. Ryu, reporting minimal improvement. At this examination, the claimant stated that he had a history of multi-level degenerative disk disease in the lumbar spine. Dr. Ryu requested an MR I, which was administered on March 7, 2005 by Dr. Shockley. The MRI revealed severe degenerative disc disease and mild to moderate facet disease at all levels of the lumbar spine. On March 18, 2005, the claimant returned to St. Vincent Charity Occupational Medicine, stating that he was feeling â€Å"better†, and had been participating in physical therapy. The BWC allowed the claim for a â€Å"Sprain Lumbar Region† on March 9, 2005. The employer does not believe that the claimant’s current condition is a result of a workplace incident. The claimant has a history of severe degenerative disc disease in the lumbar spine and frequent chiropractic manipulations. The employer believes that the claimant’s current complaints stem from the severe degenerative disc disease and is unrelated to the claimant’s 3/1/05 work activities.

Monday, November 11, 2019

Is Privacy In The 21st Century Possible? Essay

Privacy was once valued and protected. But now with so many new and convenient technological advancements, is privacy in the 21st century possible? To protect our privacy Congress created the Electronics Privacy Acts (ECPA) to protect us from government access to private information that is transmitted and stored on the Internet, such as emails, private photos, or corporate data. Congress has not updated the ECPA on technology since it was created, in 1986. When the ECPA was created there was no â€Å"World Wide Web†, social networking was something in the future, and nothing was stored in what we call the â€Å"cloud.† With all the technological changes in today’s society no one is protected. Privacy is defined as being free from the public eye. Yet we have so many people sharing personal information on social networking websites, and government agencies monitoring emails, and phone calls most of the time without our knowledge. There is no privacy in the 21st century, it is just a nostalgic feeling, and it is no longer practiced. Today’s privacy laws aren’t up to date with today’s technology. Things are rarely sent through the mail, and emails and text messages have replaced written communication. Online messaging and social networking was something of a novelty when lawmakers created the ECPA (Frolik, 2013). A recent article from the Dayton Daily news written by Cornelius Frolik on June 2013 he mentioned, â€Å"The Government can easily access many personal communications and other private information without sufficient probable cause†. Instead of acquiring a warrant that requires more standards and procedures. Government agencies instead obtain subpoena’s to obtain people’s emails, and telephone records (Frolik, 2013). Although, local authorities catch lots of dangerous criminals through information online like emails, photos, and social media sites like Facebook some critics still feel it is an invasion of privacy. Also as our technology advances by leaps, and bounds so does the way Government uses new high tech tools to surveillance law-abiding citizens. Though our Fourth Amendment states to protect the American people from unreasonable searches and seizures. Almost everything is done through  technology in the 21st century. This meaning that government can seize any emails that are 180 days or that has been opened without a warrant; subpoenas have become the most used investigator tool for Government agencies. The reason why is because they can be easily written inside the prosecutors office without any further review from a judge. This means there is an exception to the Fourth Amendment of the United States Constitution, if it satisfies the requirements. The question we should be asking when it comes to Government and our privacy are † Is to explain a clear understanding of the word privacy†? If the Government cannot clarify the term privacy then how can they protect our privacy? The lack of clarity makes it hard for lawmakers to create new policies that will keep our privacy out of harm (Libin, 2012). Two reasons why privacy can be considered threaten in today’s society one being the Government powers are limitless, and two being we the American people expose ourselves digitally (Libin, 2012). The people of America should come together and declare for the Government to protect our privacy rather than participate in warrantless searches (Libin, 2012). The fact that the Government can argue that the Fourth Amendment does not apply because there is no exception to privacy when it comes to prot ecting national security, then that leave the American people in times of calamity, and crisis. Laws like the ECPA is a law that the Government has an obligation to respect (Libin, 2012). The ECPA protect the privacy of the electronic communications, but when law enforcement and prosecutors have to protect and enforce laws, personal information has to be collected to build a case (Libin, 2012). The solution is more complex than simply, and right now the Government is facing difficulties figuring out the best way to protect the American people (Libin, 2012). Given all the information privacy seems to be the problem. It can be portrayed in many ways, one as it’s protecting the public from terrorism, and local crime; and two being if you are innocent, what do you have to hide? In 2014 I find that most American people store their digital lives in what we call â€Å"The Cloud† which included emails, calendar data, photos, and other sensitive information. The ECPA has become obsolete. Technology today leaves the ECPA outdated, the laws have not changed since it was originally created  in 1986. The existing privacy laws only focus on the text-based personal records, and the issues that people face today with this outdated privacy law is gathering of digital multi-media files, and the way this unauthorized data is used (Lipton, 2010). Do you consider video surveillance systems out on the street personal data? Some may say yes and some may say no. According to a case study researched by Jacqueline D. Lipton, if the face of an individual is recognizable, than it is considered personal data. Some people feel protected with the video surveillance capturing their every moment. Then on the other hand some people feel they are being scrutinized being watched by video surveillance. The U.S. has a protection for free speech and for free of a press under the First Amendment. However there is no express constitutional right to privacy (Lipton, 2012). The question that American people should rigorously examine is whether or not Congress should repeal the ECPA and creates new privacy laws to replace it (Kerr, 2014). The ECPA should be considered top priority when it comes to being reformed. If Congress were to start fresh on what changes to make on the ECPA the technologic changes would have to be particularly considered. Being that the cost of stored information has changed it also changes how law enforcements surveillance people, it threatens privacy. In 1986 this all made sense because the internet was designed at this time to only hold limited storage, and wire-tapping was a threat more than stored information (Kerr, 2014). Overall access to stored record has become the greatest privacy threat. Technology has changed enormously, now everything is stored. With everything being stored now in what we call â€Å"The Cloud† like mentioned before stored information begins to reveal the same level of details as real time surveillance or real-time access (Kerr, 2014). Stored information has become more revealing an invasive. (Kerr, 2014). References _Cohen, J. E. (2013). What is Privacy For._ Harvard Law Review Association_,_ 126_(7), 1904,29. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=5& sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edsgbe&AN=edsgcl.333333595_ _Kerr, 0. S. (2014). The Next Generation Communications Privacy Act._ University of Pennsylvania Law Review_,_ 162_(2), 373-419. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/command/detail?vid=26&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=aph&AN=93917886_ _Libn, N. (2012). PRIVACY AND ACCOUNTABILITY IN THE 21ST CENTURY: Foreword._ Harvard Law and Policy Review_,_ 6_, 263. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=15&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=edslex&AN=edslex2F0EC940_ _Lipton, J. D. (2010). Digitlal Multi-Media and The Limits of Privacy Law._ Case Western Reserve Journal of International Law_,_ 42_(3), 551-571. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=24&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=51909959_ _Sutanto, J., Palme, E., Chuan-Hoo, T., & Chee Wei, P. (2013). Addressing The Personalization-Privacy Paradox: An Empirical Assessment From a Field Experiment on Smartphone Users._ MIS Quarterly_,_ 37_(4), 1141-A5. Retrieved from http://eds.b.ebscohost.com.proxy-library.ashford.edu/eds/detail/detail?vid=29&sid=34a7b883-e7a4-45d2-aff3-a25b4e535c3e%40sessionmgr110&hid=107&bdata=JnNpdGU9ZWRzLWxpdmU%3d#db=bsh&AN=91906295_

Saturday, November 9, 2019

Finagle a Bagel Marketing Essay Example

Finagle a Bagel Marketing Essay Example Finagle a Bagel Marketing Paper Finagle a Bagel Marketing Paper A Bagel uses all the variables of the marketing mix which Include product, price, distribution and promotion to support their company that makes between 20 and 25 million dollars a year. Promotion. The promotion element of the marketing mix Is creatively organized to make customers aware of new Items Finagle A Bagel might decide to put on their menu. One way in which they have promoted their sandwiches in the past is by running directly up to cars that have stopped at an intersection and handed them Alfa of a sandwich with a coupon to come back for another. That certainly led to word-of-mouth referrals to increase their sales. The above examples are just a few elements of each part of the marketing mix that Finagle A Bagel uses. The forces that Impact Finagle A Bagel Include competitive, economic, political, legal and regulatory, technological, and coloratura forces. (Pride, 2007) Another way they keep original Is by having music for kids In some of their stores. Their hope is that kids will tell their parents that they want to go where the music is. They need to be original to keep up with their competition. Economic Force. Economic forces impact Finagle A Bagel as customers need to have a willingness to spend. They expect to be satisfied when buying their bagels or other fresh food products. Although discretionary income is used to buy basic necessities, eating out of the home could almost be considered entertainment as it is usually more expensive to eat at a restaurant as opposed to buying items at a grocery store and preparing meals at home. If customers are on a fixed budget due to employment or dillydally, the impact It has on Finagle A Bagel could be negative as customers wont be spending as much, If at all. : However, If a customer has an excess of disposable income, it could have a positive impact as sales could increase for Finagle A Bagel. Political Force. If there are legislative regulations that will affect a corporation, this could impact Finagle A Bagel if they need to hire lobbyists to communicate their needs and concerns to the elected officials. Legal and Regulatory Forces. The FTC assists businesses In complying with laws, and t evaluates new marketing methods every year. It also allocates considerable resources to curbing false advertising, misleading pricing, and deceptive packaging and labeling. (Book 2007) For Instance, If Finagle A Bagel created a bagel and advertised It as a bagel that Is guaranteed to enhance weight loss to buyers and had advertised that the bagel had been approved by the Food and Drug Administration Ana provoking retailers Walt acceptable marketing materials, tens could negatively impact their business if such marketing efforts were giving false information. Coloratura Force.

Wednesday, November 6, 2019

How to Check on the Status of Your Tax Refund in Canada

How to Check on the Status of Your Tax Refund in Canada The Canada Revenue Agency (CRA) does not start processing Canadian income tax returns until the middle of February. No matter how early you file your income tax return, you will not be able to get information on the status of an income tax refund until the middle of March. You should also wait until at least four weeks after you file your return before checking on the status of an income tax refund. If you file your return after April 15, you should wait at least six weeks before checking on the status of your return. Processing Times for Tax Refunds The length of time it takes the CRA to process your income tax return and refund depends on how and when you file your return. Processing Times for Paper Returns Paper returns usually take four to six weeks to process.For paper tax returns filed before April 15, wait four weeks before you check on your refund.For paper tax returns filed on or after April 15, wait six weeks before you check on your refund. Processing Times for Electronic Returns Electronic (NETFILE or EFILE) returns can take as little as eight  business days to be processed. However, you should still wait at least four weeks before you check on your refund. Tax Returns Selected for Review Some income tax returns, both paper and electronic, are selected for more detailed tax return reviews by the CRA before they are assessed, as well as afterward. The CRA may ask you to submit documentation to verify claims you submitted. This is not a tax audit, rather it is part of CRA efforts to identify and clarify common areas of misunderstanding in the Canadian tax system. If your tax return is selected for a review, it will slow down the assessment and any refund. Information Required to Check on Your Tax Refund To check on the status of your income tax refund you need to provide the following information: Your Social Insurance NumberThe month and year of your birthThe amount entered as Total Income on line 150 of your income tax return for the previous year. How to Check on Your Tax Refund Online You can check on the status of your income tax return and refund using the My Account tax service, which you can register for using your existing online banking information or by creating a CRA user ID and password. You will be mailed a security code within five to 10 days, but you dont need it to access some limited service options. (The security code has an expiry date, so it is a good idea to use it when it arrives, so you wont have to go through the process again when you want to use My Account for another service.) To access My Account, you will need to provide: Your Social Insurance NumberYour date of birthYour postal code or ZIP code, as appropriateThe amount you entered on your income tax return from either the current tax year or the one before. Have both handy. How to Check on Your Tax Refund by Phone You can use the automated Telerefund service on the Tax Information Phone Service (TIPS) to find out if your return has been processed and when to expect your refund cheque. The TIPS phone number is: 1-800-267-6999The Telerefund service is also available at: 1-800-959-1956

Monday, November 4, 2019

Introduction to Microeconomics Essay Example | Topics and Well Written Essays - 500 words - 1

Introduction to Microeconomics - Essay Example Although, the shift in demand can raise the quantity of food at any given prices, due to the present level of food supply, food prices would have to rise to let this ever-increasing food demand ‘make-up’ with the given supply-level. This making-up of food demand with supply describes upward (leftward) movement along the shifted (new ­) demand curve, raising the equilibrium food prices. Thus, equilibrium food quantity and prices are expected to rise, however, due to the upward movement along new demand curve, the increase in price would keep this increased equilibrium quantity lesser than the shift in demand. But what’s worsening the scenario is leftward shift in food supply which main determinants are unfavorable, volatile weather consequences including droughts, freezes, and floods in the main food producing and exporting countries: China, Russia, Australia, and Mexico. These unpleasant weather conditions have badly affected the crops and other productive resou rces, alarming the food production capacity in these countries. Other harmful environmental changes i.e. global warming can further shift the food supply leftward.

Saturday, November 2, 2019

Issue Invention Handout (Formulating an Issue) Assignment

Issue Invention Handout (Formulating an Issue) - Assignment Example Red is love, but also Chinese nationalism and the society in which the word is used can influence which meanings are intended. This was about method : both the way that Chinese people use English in their own way, but also there was an element of perception in how they view the mistakes that occur as something to be ashamed of rather than something funny. I wanted to show how technology creates a link with home for international students, and how this allows them to maintain their links with family, and also form new links with other international students, particularly by sharing images of family members. This is a kind of dual discourse and is very important for student welfare and motivation. There seems to be a clear difference between the way the university communicates with its international students on printed brochures – the language is more imperative and less â€Å"open† than it is in the brochures for other students. There seems to be a clear difference between the way the university communicates with its international students on printed brochures – the language is more imperative and less â€Å"inviting† than it is in the brochures for other

Thursday, October 31, 2019

Resistance and containment as described in the song The Revolution Essay

Resistance and containment as described in the song The Revolution Will Not be Televised - Essay Example Scott-Heron underlines that a controlled or structured media can never demonstrate the waves of social, political and cultural changes of a nation. The entire song reveals the idea that The Black revolution would be down in the grooves and on the lanes. The whites always regarded the blacks as downtrodden and denied them the necessities of life. Though most of the black leaders had protested against this injustice, they were either silenced by jails or bullets. Blacks used Popular Music as the manifestation of their suppressed feelings and Scott- Heron’s song ‘The Revolution Will Not be Televised’ deserves significance in this respect. Through this widely accepted song, Scott-Heron could rouse the innate feelings of the blacks and the very first stanza of the song makes this grim reality vivid. Readers get a clear picture of the social set up existed with many ‘don’ts’ at the time of the composition of this song. As the blacks ‘will not b e able to’ perform what they desired, they realise the reality that their revolution for attaining racial equality will remain as an oasis. Any one can feel a note of sadness and can experience the dejected state of mind of the blacks in the song; on the other hand, the song has also the power to raise one’s thoughts to a higher level of aesthetic appreciation. As a spokesman of black community, Scott-Heron, like other black writers, portrays the ill-treatment they suffer at the hands of the dominant white community. The very first line of the song grabs one’s attention as one can see the pathetic state of blacks being denied of their own houses. However, there is a struggle to endure the sufferings and by portraying the endurance of the blacks, Scott-Heron in a way is advocating that liberation is constantly countered by implicit (and explicit) forms of oppression that are not always immediately identifiable (Jackson). Scott-Heron uses a lot

Tuesday, October 29, 2019

Identify and fully describe the main developments Essay Example for Free

Identify and fully describe the main developments Essay 1. Identify and fully describe the main developments of Operating Systems, giving examples of their origins and use. Batch Operating Systems were an early operating system available, and were first introduced in the mid 50s. They were designed to make human manual work easier; humans were replicating identical jobs over and over again, hence in batch. A batch operating system keeps itself eventful; it does this by taking jobs from a batch queue, instead of waiting for people to submit jobs. The jobs are then processed one or more at a time under control of the operating system, however most jobs undertaken in this operating system would be single-task. These type of operating system were often left to work overnight, mainly because the jobs were batched the next job in the queue would be commenced as soon as the previous job had been completed, this way of processing would allow for a large work load to be automatically completed without the requirement to wait and tell the computer to do the next job. Real Time Operating Systems (RTOS) are often embedded, meaning a integral part of a system inside another device. They have very little user interface capability. Real time operating systems like their name implies, respond to an input immediately. Real time operating systems are capable of processing data so quickly that the results are available to influence the activity currently taking place. [Computer Science 5th Edition, CS French, Ashford Press Gosport, 1996] Real time operating systems guarantee a certain capability within a specified time constraint; these time constraints are usually very rigid. If the system does not conform to this time limit, the system ultimately fails. They are used for various purposes; a few of these are medical equipment, industrial control systems and car computers. Parallel Systems have more than one processor to carry out a single job. The systems often carry out one single job using the resources of both processors of the machine; however some systems will have a processor dedicated to a single task. These operations work in parallel (side by side) of one another. Distributed Systems act as an illusion to a user. A multiple number of nodes are set up on a network, to allow data access or device sharing. This allows for other users of different machines to access data on another machine on the network. For example at college a student logs on to the machine, the machine seems local to the user, the user observes the system as using its own local drives and devices. However these Drives and devices are setup on a client-server machine but appear to be local to the user. Time Sharing Operating Systems allow multi-tasking, the operating system shares a slice of the processor resources to designated programs and users logged on to the system. For example, it is not unusual for a home user to have a word processing package, internet browser and a multimedia package to be open at the same time. Microsoft Windows is a great example for allowing this. Personal Computer Operating Systems were brought about in the early 70s. However it wasnt until the 1980s that they became popular, and the focus of the operating system changed from the hardware aspect, to that of the user interface (how the user observes the operating system). Personal Computer Systems are simply operating systems that share the processors resources for single users tasks. The main concept behind personal computer operating systems is the user interface. The workings are important; however the main principal is that the user is entirely interactive with the system. These are perhaps the most difficult for designers to produce, as a very high level knowledge of user interface design is required. This is to allow users of any level to use the system comfortably. It allows for considerable power for a single user to run high-tech graphics and multimedia packages. These operating systems evolved in to very capable systems, allowing for heavy multi-tasking usage. Examples of Personal Computer operating systems are as follows: Microsoft Windows Linux Apple Macintosh MAC OS 2. Identify and fully describe the main purposes of an operating system. All components of the operating system are required to be covered, to clearly show an understanding of what each component does and how they fit into the overall system design. Process Management Process management is a way of tracking processes and managing them in such a way that there is enough processor resources to correctly function. Process is another word for a task that is to be performed by the computer. Along with a process is a set of information about the particular process. The information required to track these processes are stored in a data package called a Process Control Block (PCB). The process control block contains the following information about a process:   An identification number that uniquely identifies the process Owner ID An identification of the user/device who the process belongs to   Priority A number to represent its priority to the system   Status What its current state is. This is 1 of 3 states (Ready, Waiting, Running). Units of Processor Time Used   Resources waiting for for example paper for the printer.   Link to Another PCB   Registers the registers the process has contents in. Process ID 239845 Owner ID Chris. Oliver Priority 25 Status Waiting Units of Processor Time Used 264 Resource waiting for Disks [printer] Link to another PCB Next PCB in wait Queue Registers Contents of registers when process last stopped running An example of a PCB is shown below: this is for a print job A Processes state is diagrammatically shown below, this shows state transition and how it works. A process can be in one of five states; these five states are as follows: State Definition HOLD A processs state at the beginning, this is when the devices and memory allocation size is decided. READY this state is when the process has been allocated all the resources required and is ready for being operated on by the computer RUNNING This state is when the process is in the CPU WAITING This is when the process stops because of an input or output waiting to be completed. The process is removed from the processor and is allocated this state. It is given this state until the input or output is given the all clear. FINISHED This is when the process has been finished, and all the devices used by the process have been released ready for the next process. Deadlocks Deadlocks occur when a multiple number of processes fight for very little resources available from the processor. For example one process has been granted the allocation of the modem, however is waiting for a text file, but process two has the text file and is waiting for the modem. In this instance each process will not gather the resources required because they have been allocated to another process, this is where a deadlock occurs. Process Management in an operating system has the job to destroy one of the processes to allow for one of the processes to be put in the ready queue. Scheduling Scheduling is a method in the operating system that allows processes to enter the ready queue allowing them to then take execution. The strategies used to take these processes and allow them to be ready for execution are as follows:   Process the maximum amount of jobs.   Sharing out processing time equally to users   Providing acceptable response times, this is in the form of not running intensive programs while users are logged on to the system. Keeping devices as busy as possible.   Attempting to gradually freeing up of processes, instead of crashing.   Avoid Deadlocking Scheduling is comprised of three sections: 1 Long Term Scheduling this is where processes are batched together, when the resources and space are free the process is then executed. This type of scheduling is used for jobs like heavy overnight print jobs. 2 Mid-Term Scheduling this is where a decision is made as to whether the processor is to busy for the amount of processes attempting to use it, the decision can be then fixed by terminating processes. When the system is free again the process can be re-executed. 3 Short Term Scheduling is a where the next process is selected from the ready queue; it uses algorithms to do this. Shortest burst time being the time spent running before the process will have to wait before an input or output operation. Shortest remaining time is the processes that have very little time left; this inevitably allows space for another process to execute. Priority scheduling a control that allow special circumstance processes to execute through the system quickly. Round robin limits the time a process is allowed to run before it is removed, it is then placed back in the ready queue. Memory Management Memory is an area in which data and instructions are stored. These operations must be managed by an operating system in order for the system to be stable and to run fluently. Memory management within an operating system must ensure that a process has enough memory to run, ensuring it does not go in to another processes slot as this causes corruption. This management is a way of protecting memory from becoming unstable. Memory management is also responsible for using the computers other memory sources effectively, to ensure programs run smoothly and effectively. This is handled by using virtual memory; using the hard disc drive as a temporary memory source for processes and data. This can benefit the user in various ways: The user is not rigidly restricted to space available. Using a large virtual memory space provides convenience for instances where large programs etc. are required to be stored in memory. Users are using less physical memory; therefore the system can handle more users on the system. High Speed Cache is a fast memory storage; cache predicts the data that the CPU may need next, it then retrieves it from RAM and places it in to the high speed cache, this speeds up system performance, as cache is a lot faster than RAM is in providing for the processor. The operating systems task is to control an even flow of the processes and decide where they should go practically, moving processes to the best location as the scheduler asks it to do so. This scheduler knows what process is next in line therefore can tell memory it is next and to move it to a suitable location for it to be quickly accessed. Paging Paging is a method used in operating systems to make a programs memory non-contiguous, in simple terms; allowing a program to be allocated to any memory location available. This is used when a bulk of data is bigger than the memory allocation it has been given; it firstly fills the memory allocation provided, and then stores the rest of the data in any space available in memory. This method of splitting the data is known as Fragmentation. This decreases system performance. Defragmentation To enhance the performance of the memory of a secondary storage medium, the operating system runs an operation called Defragmentation. Defragmentation is a process that sorts data in to a contiguous sequence. If a non-contiguous set of data is found, it will be relocated and stored as a whole. The image above is an illustration to show pictorially how a storage device could look in a data structure. As you can see fragmented files are scattered. If this data was attempted to be retrieved it would be slower feedback to the user as the data has been fragmented and would have to be found first. If data is to be found quickly and retrieved without a problem, the diagram below shows how a data structure should pictorially look. The image shows a contiguous data structure, with no fragmented files. This is the idea state for a system to be operated under. File and Disk Management TALK ABOUT HOW MEMORY IS STORED i. e. CONTIGIOUS Blocks of data are assigned in a complete row, using this method the files are simple to access. The space must be large enough to store all the data Files may become larger, therefore the space may be too small in the future, then it will need relocating (moved) This then causes fragmentation of the storage device. , NON CONTIGIOUS Files are recognised by operating systems and worked upon by using file extensions. A file consist of two parts, one being the unique name to the user, second being the file extension related to the program that runs that type of file. The operating system recognises exactly which program to open when the file is run. The way that files and data are managed, is critical to the performance of the computer and the security of the data. File management within an operating system provides a logical way for the user to observe there data, instead of having the complication of the physical implementation. Operating systems main job in this area is to ensure that data is stored and relocated correctly, as well as having the responsibility to process files, find space to store them, and to retrieve this data at any time. For example a . PDF file when run will be recognised by the operating system to be open in Adobe Acrobat Reader, providing the program is installed on the computer. An operating system can perform several different tasks towards files, they are as follows: Operation/Task Function Create finding space for it on storage medium, a new record made in directory Write Finds the file from directory and adds data to it. Read Finds the file then puts it in to memory and a read pointer is used to track where the next read place is to take place. In most operating systems however, a write pointer is held at this point, in-case the user intends to write to the file while reading Delete finds the file, then frees all space given to it, this is then erased from the computer Files are a collection of saved information that is stored on a type of storage medium for later retrieval. File attributes are the information related to the file, just like we have information related to ourselves, i. e. telephone number and home address. A files attributes are vital in order for the operating system to create a file structure system, it does this by using the attributes to sort the files in to some kind of order. For computer data files there are a set of minimum attributes related to them, they are as follows: Attribute Name Role Name an identifier to the user, in the form of a string of characters Type the type of file it is, this is important as different operating systems handle different types of files differently. Location Information held about where the file is stored, usually in the form of a path to it. e. g. C:\Documents and Settings\Chris\Assignment. doc. Size The size of the file (in bytes) e. g. 270kb. Protection Permissions to who can access the file. I. e. Read Only Date when the file was created, modified or accessed. Author the person the file was created and saved by. Directories Directories are a hierarchical way of separating these files; directories simply make it simpler for users to relocate the file at another time. The root is the top directory of a file system; the root is determined by the operating system. The root directory is usually the bootable device on a home computer system. Commonly C: Paths are a list of directories that the operating system goes through to find a run able file. For example: C:\windows\cdplayer. exe The operating system will go in to the root and then in to the directory Windows the file named cdplayer. exe will then be located and executed. Tree Structure are of a hierarchical nature, therefore the top level is the root of the directory and every other sub directory from which all other directories stem off. A Backslash is used to separate and indicate directories within directories (sub directories) Directories allow a method for the operating system to easy locate files. Volumes are a fixed amount of storage space allocated on a device. If a hard disc drive has two partitions set up, then it is said to have two volumes because it has two separate fixed storage spaces. Formatting a device in turn means to prepare it for read and write access. It does this by wiping all drive information that has been pre-set, it then tests each sector of the disc to ensure they are reliable enough for read and writing in and out of. File Allocation Techniques FAT (File Allocation Table) 32. Located on the storage device, basically holds the relevant information in a table, to find the data on the disk. its security does not measure up to that of NTFS and its filename size constraint is poor to that of NTFS. Searches from top to bottom when looking for a file. Contains the first block of each file on the disk, Requires a tremendous amount of space NTFS (New Technology File System) Used in Windows NT based operating systems Uses a similar table to that of FAT32 to keep track of file locations Looks at directory structure from the side to help speed up the location of files Uses Link Listed Allocation. Linked allocation creates inked lists using disk sectors as nodes. For example, if the sector size is 512 bytes, and it takes a 32 bit number to represent the next block address, then only 508 bytes can be used to store data (the other 4 bytes are used to locate the next file sector). This approach eliminates external fragmentation (since even the smallest block can now be used). Some problems with this approach are that seeking within a file is now difficult. For example, if were interested in the last 100 bytes of a 100mb file, we need to traverse all the sectors of the file (follow links) to get to the last 100 bytes. Another major issue is that we need to do a disk seek with every disk sector (unless disk sectors are contiguous). And yet another issue with this is that storing pointers on every disk sector uses up a lot of disk space. UNIX Used I-Nodes an indexed file allocation method. Its fast for small blocks of data and can accommodate extremely large volumes of data RAM Disk RAM disks are a temporary storage solution, data cannot be permanently saved, and data is lost on any type of system shut off. I. e. system reboots. A Random Access Memory disk is a segment of the main memory that is left for extra storage if required. This is otherwise known as a Virtual Drive. The main use for this area is that of performing operations to files, this is a better way of performing operations as the rate at which they can be performed on are that much higher than that of a physical drive. Size constraints are a major problem with RAM disks, as they are limited to that only of the RAM contained in the machine. For example in modern home computer systems 256mb of RAM is contained, therefore only 256megabyte of RAM disc can be used. 256mb in todays computing is very little in comparison to what users require. OS Services files, copy, delete, rename, view, find, backup Directories create, rename, list, delete Programming, Open, close, read, write, seek File allocation methods, FAT 32, NTFS, UNIX, Disk caching RAM disk Defragmentation I/O System Management DMA DMA takes control of the system by imitating the processor; it does this to enable itself to transfer data to and from the memory using the system bus. Buffering is required primarily because of the slow nature of I/O Device function. It is a way of smoothing out an I/O operation, Virtual Segmentation each process is divided in to slices (segments) non-resident Caching and Spooling of Input and output devices Drivers System Components ( CPU, RAM, System Bus, Local Buses, Device Controllers, Control Registers, Devices). IO response System (polling, interrupts, I/O, DMA Kernal Layers, Purpose, Device, Drivers, System calls Device Management Device management controls hardware resources; this includes the control over selection and operation of the devices used for input, output or storage. 2. Select an appropriate type of operating system for the following ICT needs, giving the choice of current operating systems [trade names]: a) Local council office department in charge of the collection, and distribution of council tax. b) A national car-rental agency, whose main computing centre is located in Sheffield, through which all of the daily transactions for the business are conducted. c) An electro-plating circuit board manufactures. d) A travelling company representative, who uses technology to keep in touch with his office. 3. Research and identify the different operating systems currently available for desktop computers. From your research and investigations of these operating systems you must critically evaluate them. This evaluation should clearly demonstrate your understanding of the differences found including and potential disadvantages. Bibliography http://www. cse. lehigh. edu/~glennb/um/book/c10os. htm http://dragon. acadiau. ca/~dbenoit/3713/slides/pdf/Week2. 1_History. pdf http://cne. gmu. edu/itcore/processes/Time. html http://www. netnam. vn/unescocourse/os/35. htm#3. 5. 3%20Virtual%20memory%20concept http://www. cs. aue. auc. dk/~akbar/ospdfiles/wschap7. PDF Books [Computer Science 5th Edition, CS French, Ashford Press Gosport, 1996].