Wednesday, October 30, 2019

Tecumseh Essay Example | Topics and Well Written Essays - 1000 words

Tecumseh - Essay Example This made the treaties that had allowed this annexation void since it was signed by individual chiefs (Klinck 43). He was also a skillful orator and a brave warrior. These traits made the Americans and the British admire him (Klinck 36). Although Tecumseh was the leader of the confederacy during the Tecumseh war and war of 1812, the relationship between the Shawnee and the Iroquois Confederacy was a mixed one, with some Iroquois speaking people being friendly and allied to the Shawnee and the others who were enemies to them. While the other groups were enemies to the Shawnee, the Mingo and the Huron groups were their allies (Edmunds 23). The reason for this mixed relationship between the Iroquois Confederacy and the Shawnee is the following: the Iroquois Confederacy pursued a territorial expansionism policy which caused a conflict with its neighbors. Consequently, the neighboring communities, such as the Mingo and the Huron (Wyandot), cooperated with the Shawnee people due to the thr eat of territorial loss they experienced from the Iroquois Confederacy (Klinck 45). However, the relationship between the Shawnee and the Iroquois Confederacy was that of enmity since the Iroquois Confederacy embarked on invading the hunting grounds previously owned by the Shawnee, eventually evicting the Shawnee from their native lands of Ohio. The Iroquois made the Shawnee their dependents (Edmunds 40). During the American war of Independence, the Shawnee, Native American tribe, opted for joining the British in the fight against rebel colonists. The Shawnee planned to become British allies since they hoped that joining hands with the British would help them evict the colonists from their territory and draw them back across the mountains (Klinck 49). Considering that the invasion of the British and the consequent treaty signed with the Iroquois Confederacy had allowed many Colonists to settle in the native Shawnee lands, they needed some support to evict the colonists, which - they hoped - the British would grant them since the colonists had rebelled against the British colony (Edmunds 54). This saw the Shawnee ally with the British during that war. The concepts of land use advocated for by the British caused friction between the Indians and the whites. Notably, the signing of the Royal Proclamation of 1763 which sought to draw a line of territory between the Whites and the Indians sparked a great conflict (Klinck 62). This treaty sought to establish a reserve for the Indians but eventually ended up causing the encroachment by the whites into the areas where the Indians had previously occupied. Additionally, the treaty signed between the British and the Iroquois Confederacy over land use angered the Shawnee who were the native occupants of these lands before they were evicted by the Iroquois Confederacy (Edmunds 22). Thus, these concepts of land ownership and land use sparked off conflicts between the Indians and the whites. Tenskwatawa was a Shawnee religiou s leader who advocated for the Indians to revert to their traditional lifestyle (Edmunds 47). There were various reasons why the teaching by Tenskwatawa became very attractive to the Native Americans. First, these teachings advocated for a return to the traditional ways of living for the Indians. He advocated for the traditional lifestyle that was not influenced by the white cultures (Klinck 50). Additionally, his teachings advocat

Monday, October 28, 2019

Shigeru Miyamoto Essay Example for Free

Shigeru Miyamoto Essay Miyamoto is a Japanese game designer, famous for his well-known works such as Mario, Donkey Kong, The Legend Of Zelda and much more, therefore he works in the Product area. The New Mario Game Designed by Miyamoto One of his well known designs is the worldwide-known Mario, the lovable heroine was originally created by Miyamoto. This character was then adopted into 3D – 2D platform games, escalating into a movie and to what it is now. Miyamoto is also the designer of Wii series; this is a picture of him illustrating the Wii U. Miyamoto talking about the Wii U Within early childhood, Miyamoto grew up in a small country town of Sonobe, in Japan. The young boy had no access to a television, thus spending more time on exploring the rural area of his town. One day, in his usual adventures, he discovered a large series of caves. As a curious child, he lit a lamp and ventured inside. In elementary stage, Miyamoto had interest in conjuring objects that would surprise or shock everyone. Considering this interest, he began to have thoughts about becoming a puppeteer or a painter, soon later he started creating and making toys. After graduating within five years, Miyamoto studied in the area of Industrial Design, in Kanazawa Munici College. Miyamoto’s Quote that explains and highlights his imaginative thoughts and beliefs At the age of 24, he requested his father to organise a meeting with an old friend from the company of Nintendo, Hiroshi Yamauchi. Yamauchi then asks for a few designs, after being surprised by the male’s work, he recruited Miyamoto into the company, taking place of the first staff artist. His hobby from early age brought him to this stage, if he did not discover the countryside of his town; Miyamoto would not have developed the desire of creating something that could affect the world. This also distinguished him from many other game designers was that, he never exactly played video games when in young age, spending more time on other activities. One of the works accomplished by Miyamoto was as mentioned earlier, Mario. This famous and loved character is depicted as a plumber, revealed in an interview with the Game Hunters in New York, that Mario wasn’t originally a plumber. Mario (Right) Luigi (Left) Miyamoto begins to state that the technology back then was not as advanced as today and also not as much room to apply the details needed. Due to the limited size of the screen, he was only able to design a character with a big nose and moustache. The back ground was a construction site; therefore Mario was made into a carpenter. In 1983, the game had a character named Luigi and the game stage was set underground, thus the decision to make Mario a plumber instead. A statue of Mario in a game shop, indicating how popular the character designed by Miyamoto has become Another moderated design that was applied to the small character was the red hat. Miyamoto reveals that this was to the efficiency of the technology available back then, the red hat was purposefully placed on the character to avoid having to animate the hair, drawing the eyebrows. The addition made the process and designing more easy and convenient. A question asked was that, if Miyamoto was Japanese, then why were the brothers (Mario and Luigi) Italian? The game designer finally replies that, ever since young age, he was a boy who was interested in foreign comics. Thus, this can be implied that his childhood memoirs influenced his design. A design philosophy conveyed in his designs is to give balance and equality to two factors. The two factors are the sense of familiarity and the new features within a game. As well as challenging the player, without until to the extent of forcing them to their absolute limit. This is an important philosophy for Miyamoto. The current design trend is the Nintendo 3Ds, and due to the works of Miyamoto, Nintendo has evolved and become more popular. As the game has become world-wide and most well-known in the Nintendo district. Some even believe that Nintendo depends too much upon the Japanese designer.

Saturday, October 26, 2019

Defining Identity Essay -- Personal Narrative, Identity Essays

There are millions of words across the globe that are used to describe people and uncover their identity, but what is identity? How can you begin to describe something that varies so greatly from one human being to another? Can you create a universal meaning for a word describing human concepts that people often fail to define for themselves? Of course there isn't one definition to define such a word. It is an intricate aspect of human nature, and it has a definition just as complex. Webster's dictionary describes identity as sameness of essential character, individuality, or the fact of being the same person as one claims to be. So your identity can include your name, your age, your job title, or simply characteristics of your body. These things are facts, facts you don't care to share with the world. Just as the word suggests your identity is something by which you can be identified. These are things that describe a person in terms a stranger would understand. This area of identity is proof of who you are. However, your identity is also composed of what you are. They mark your role in society. Who you are and what you do make up your identity. This is essential in the human life span because people are always searching to find where they truly belong in the world. Obviously a word that has such a deep meaning can?t have a shallow definition. The other component of identity is one?s personality. Your thoughts, emotions, and attitudes also have a huge impact on your identity. This part is not something the world can hold to be true, but something you know to be true. This portion of your identity is not something that you have passively acquired, it is something you have experienced and built upon through... ...can go through an entire lifetime and not really know how to define their own identity. In many cases people suffer through a great crisis to discover who they really are. If someone doesn?t know the meaning of their own identity, how can society apply a definition to the word? It leaves people to ponder whether or not there are some feelings and parts of life that simply cannot be explained. When defining the word identity scholars and common men alike must agree to disagree. It is a word so diverse in context that it is seemingly impossible to take it down to a simplified definition. There are some things in life that just aren?t meant to be completely understood, and one?s identity is among these things. Not until a person has a lived out their live could they sit down and tell you how their adventure has shaped them into the person they became in the end.

Thursday, October 24, 2019

Political Science Essay

MSC is a state college funded by the national government and is recognized by the Commission on Higher Education, offering full degree courses in Education, Agriculture, Allied Medicine, Arts and Sciences, Business and Management, Criminal Justice Education, Engineering, Fisheries, Industrial Technology, Information and Computing Sciences, It’s main campus is located at Boac while it has three campuses in Torrijos, Gasan and Santa Cruz Marinduque. Its vision is to become one of the premier colleges in the region, along the fields of instruction, research, extension and production. With the mission of providing quality, responsive, and dynamic leadership in the areas of Education, Technology, Engineering, Environment, Agriculture, Fisheries, Culture, Arts and Sciences to empower God fearing individuals who are innovators and protectors for the sustainable development of the province and the country as a whole. One of its campuses, MSC Santa Cruz offers Bachelor of Arts in Political Science. It is designed to provide students with a broad education in Political Science that prepares students for a wide range of career and employment opportunities. It is considered as the best preparation for a career in law, in government and politics, diplomatic service, and in non-governmental and international organizations. It provides students with formal training in the theoretical and empirical methods in the discipline of Political Science. Students, through their electives, may opt to further specialize in any of the core areas of International Relations, Local and Global Governance, Comparative Politics, Public Management and Political Theory. This study is designed to identify the reasons why students lost their interest in studying a course that is define to be social science dealing with political institutions and with the principles and conduct of government. Furthermore, it strives to identify the contributing factor that affects the continuous decreasing of enrolment of the said course in for the last 2 years. Objectives of the Study The study will focus on determining the reasons why there is a continuous decreasing number of enrollees in the Political Science Course. It will specifically focus on: 1. Determine the profile of the respondents according to: A.) Age B.) Gender C.) Year Level 2. Find the factors that affect the decreasing number of enrollment in AB political Science. 3. Determine the effects of the decreasing number of enrollees to the Political Science Program. 4. Determine the effects of the decreasing number of enrollees of the Political Science Course to the MSC Community as a whole. Significance of the Study This study attempts to determine the factors that affecting the continuous decreasing number of enrollees of Bachelor of Arts Major in Political Science in MSC Santa Cruz Branch. The result of this study may help the school administration to provide new academic programs and policies to strengthen or increase the enrollment of Bachelor of Arts Major in Political Science. Thus, MSC Santa Cruz Campus and administration may benefit from the study, for it will give ideas on how to develop and enhance the current curriculum for AB Political Science. This study may also help the institution to develop the commercial in the career program whenever they visit secondary schools in Marinduque. Moreover, the results of this study may help parents be aware of the factors why students drop-out from these courses. It may also help parents improved their relationship when it comes to decision making on what course what course to take in college. Scope and Delimitation Since the primary objective of this study is to cite factors that affect the continuous decreasing numbers of enrollees of AB Political Science course in MSC Santa Cruz Campus, this study limits particularly on: students of Political Science who did not continue or change their course or transfer to other college or university within the S.Y. 2010-2012. The former students will be used as respondents to determine the factors that affect their decision in changing course or dropping out of school. This study considered students’ demographic profile that might have an impact on their decision making such as their age, gender and year level. One on one interview with the respondents, parents and teachers will be done in order to accomplish more in-depth information. This study will be conducted for 3 months within the month of July to October. Questionnaires, Interviews and Observation will be used to identify the Factors that affect the decreasing number of enrolees of AB-Political Science in MSC Santa Cruz Campus. Chapter 2 REVIEW OF RELATED LITERATURE During our research, we reviewed these, professional journal articles, mission statements, websites, government reports, school reports and in-depth analyses. Not much analysis has been published concerning our research question. However, many published works discussed some aspects that can help in our research. We discuss the related works below: Political Science Definition (According to Sanorjo, 1992) Political science is a social science discipline concerned with the study of the state, government, and politics. Hence, Aristotle defined it as the study of the state. It deals extensively with the theory and practice of politics, and the analysis of political systems and political behavior. Political scientists â€Å"see themselves engaged in revealing the relationships underlying political events and conditions, and from these revelations they attempt to construct general principles about the way the world of politics works. Political science intersects with other fields; including anthropology, public policy, national politics, economics, international relations, comparative politics, psychology, sociology, history, law, and political theory. Although it was codified in the 19th century, when all the social sciences were established, political science has ancient roots; indeed, it originated almost 2,500 years ago with the works of Plato and Aristotle. Political science is commonly divided into three distinct sub-disciplines which together constitute the field: political philosophy, comparative politics and international relations. Political philosophy is the reasoning for an absolute normative government, laws and similar questions and their distinctive characteristics. Comparative politics is the science of comparison and teaching of different types of constitutions, political actors, legislature and associated fields, all of them from an intrastate perspective. International relations deal with the interaction between nation-states as well as intergovernmental and transnational organizations. Political science is methodologically diverse and appropriates many methods originating in social research. Approaches include positivism, interpretivism, rational choice theory, behavioralism, structuralism, post-structuralism, realism, institutionalism, and pluralism. Political science, as one of the social sciences, uses methods and techniques that relate to the kinds of inquiries sought: primary sources such as historical documents and official records, secondary sources such as scholarly journal articles, survey research, statistical analysis, case studies, experimental research and model building. (According to Saviours Hub, 2007), the importance of political science is the application of political powers and authority in the realm of government structures. The ordinary citizens may know and learn about their political rights and privileges from a given form of government including the political structure and processes of the state. Therefore, from the understandings of these basic concepts of government, state, laws and institutions those who would study political science must know its importance and function, relationship with other discipline and broader understanding to its specific roles of individual in a civilized society. The students and professionals should not only know the political theories but also deeper insights as to its application in their own field of expertise. Thus the study of political science will also include the empirical investigation of political facts through social research and the application of critical thinking. The key words in the comprehensive analysis on the principles of political science are state, government, law, institution, power relationships, legal process, constitutions and politics. These are the important dimensions to study political science that need to be constantly in touchs to mold the citizens in achieving quality of life to our society. Why students choose Political Science (According to Bellamy Moon), The study of political science prepares one not only for employment, but for life as an informed citizen ready to participate in political activities within interest groups or political parties; related to community organization and political advocacy; or even service as an elected or appointed official. Political science has been called â€Å"the queen of the sciences,† and rightly so. It is the only major where one can obtain practical knowledge and at the same time gain insights into the great issues of our age. What, for example, are the causes and institutional forces behind conflicts between the President and the chairman of a congressional committee? Are nations threatening an armed confrontation? What lies behind this conflict? Is there public and media frenzy over a certain policy? Why do people react this way and is it justified? What is the human condition? What is the meaning of civil society, and what is the individual’s place in it? When you study Political Science you will think about these questions often. You will be able to answer them better than you could otherwise thanks to an understanding of the Presidency and Congress, international relations, political ideologies, and political theory. The knowledge and critical skills gained from the study of politics will enable you to be a more rational citizen, a more constructive participant in public affairs, and a better professional in any vocation that deals with the public domain, including important positions in corporations, government and non-profit organizations. Political Science is a broad and inclusive discipline. Some political scientists are psychological researchers who want to understand why people behave the way they do politically. Some political scientists study institutions such as legislatures, courts, and bureaucracies. Others seek to know the whys and wherefores of judicial processes and constitutional issues. Some study foreign political systems to learn how their political systems work and why they differ from ours and each other. Other political scientists are intellectual historians and social critics who are interested in the quest for the good society. Still others are policy analysts. Some are omnibus students of American politics. Some are statistical theorists and specialists in surveying political attitudes. Some investigate the causes of war and the conditions for peace among nations. Amid this wide diversity of interests and approaches lies a common concern with anything â€Å"political†: issues, institutions, behavior, power, and public goods. Political scientists also share a common interest: the public arena of human society, the uses of power and persuasion, and the ideas which shape it. The different pursuits and the varied methodologies of political scientists all are directed in one way or another toward promoting this common goal of understanding politics. Factors Affecting the Decrease of Enrollment in Schools (According to Charles Pearson, chows Contributor), Education plays a major role in the future economic success and well-being of an individual. Therefore, parents and educators are often concerned when students leave school. However, schools are also often worried about losing funding during periods of low enrollment, especially when a large number of students attend alternative schools or move out of the area. Lower birth rates influence school enrollment. When the general area has fewer children in general, the schools have enrollment shortages that can lead to decreased funding and teacher layoffs. Population affects the enrollment rates. Areas that have people moving away will have lower school enrollments. Also, if no one is moving into the school district, lower birth rates in general can gradually decrease school enrollments. These problems are frequent in rural areas and exacerbate the already limited funding that these schools receive. The number of businesses in a given are a is positively correlated to school enrollment. Geographic areas with fewer businesses have decreased school enrollment. Unemployment rates do not significantly influence enrollment rates, according to studies conducted by the Center for Rural Pennsylvania. Some reform policies have decreased school enrollments. For example, in Chicago, reforms designed to prepare students for high school have lead to decreased school enrollment in high school as fewer students pass through the promotion gate. Low achieving students were the most likely to not enroll in high school. The transition into high school often causes students to drop out of school. Many students cannot handle the transition towards more autonomy. Some schools have sought to ease the transition by having extended elementary schools which go until 9th grade, with a greater emphasis on preparing the students for the high school environment. Some students drop out of school so that they can pursue employment. Some students are forced into financial situations in which they need to work to bring an income in that can support themselves and their f amily. Some families do not value education and prefer that their children enter the workforce. Pregnancy sometimes leads to high school dropout. Pregnant teens often cannot handle the stress of simultaneous pregnancy and education. Other times, doctors predict that the teen will give birth around a time when the teen has crucial academic events such as exams that determine whether or not the teen passes. Some students have poor grades or attendance. As a result, they do not feel that they can graduate and instead choose to drop out. Students cannot drop out of high school until they are 16. Therefore, reaching this age provides students with the opportunity to drop out of high school. Some parents choose to send their children to private schools. Other parents choose to home school their children. These decisions are often made because the parents are not satisfied with the academic curriculum provided by the public schools, so they decrease the public school enrollment rates by pulling their children out. As Cost of Education Rises, Dropout Rates among Filipino Youths Soar (According to GLAIZA MAY MUZONES and JOSETTE EMILY DE JESUS, 2009), MANILA — with six children and an extended family to fend for, Edna Espinosa has already conditioned her children that the highest education they can achieve is high school. â€Å"Even if I wish they could finish college, we cannot really afford it,† Edna said in an interview with Bulatlat. Considering that her husband doesn’t earn much with his job as a plumber, Edna seeks the help of her children for their daily expenses. Glenn, one of the two children of Edna who was able to get to college, said that after graduating from high school, he had to stop schooling for three years and work as a dishwasher in a restaurant so he could send himself to school. At 26, he took up a computer-technology course at STI College, with tuition of P20, 000 (about $422) per semester. Earning a measly amount of P4, 000 ($84) a month, he wasn’t able to enroll himself this coming semester because of the increase in tuition. From P20, 000, the tuition soared to P25, 000 ($527), excluding other expenses for school projects. He should have been in second year. Glenn is among many Filipino youth who cannot afford the increasing cost of education due to incessant tuition increases every year. The dropout rate has worsened over the years as school-aged children are compelled to work and help their parents earn money for their family’s daily expenses. Based on 2008 data from the Commission on Higher Education (CHEd), out of 100 Grade One pupils, only 66 finish Grade Six. Only 58 of the 66 go on to enroll in first-year high school and only 43 finish high school. Of the 43 who finished high school, only 23 enroll in college and only 14 of the 23 graduate from college. The Increase of tuition fee is one factor. â€Å"The average tuition rate both at the national level and in the National Capital Region (NCR) has doubled under the Arroyo administration,† Kabataan Rep. Raymond Palatino said in a privilege speech on May 18 titled, â€Å"The Tragedy of the Philippine Education.† Citing data from CHEd, Palatino revealed that the national average tuition rate has increased by as much as 89.93 percent, from P230.79 ($4.526 at the average 2001 exchange rate of $1=P50.99) in school year 2001-2002 to P437.10 ($9.829 at the 2008 average exchange rate of $1=P44.47) last school year. The Metro Manila average rate, on the other hand, went up by a whopping 94.54 percent, from P439.59 ($8.62) to P855.20 ($19.23) in the same period. Metro Manila has the highest average tuition rate per unit of P855.2 for the school year 2008-2009 This means that for a regular 21-unit load, students are paying P17,959.20 ($403.849) every semester for the tuition alone. Based on its own monitoring, the National Union of Students of the Philippines (NUSP) cited several schools in Metro Manila that will increase their tuition this coming school year amid the global financial crisis and despite appeals from CHEd. Among these are Lyceum of the Philippines, with a five-percent increase in tuition and another five-percent increase in miscellaneous fees; University of the East, five-percent tuition increase; Far Eastern University, six-percent tuition increase. The Philippine School of Business and Arts, 15-percent tuition increase; San Beda College, 20-percent tuition increase; University of Santo Tomas, seven-percent tuition increase for incoming first and third Year students and 8.52-percent tuition increase to incoming 4th year students, according to the NUSP Tuition Watch. Palatino criticized the practice of some schools to get profit even without increasing tuition. â€Å"A school can forgo tuition increase and they can boast that there is no tuitio n hike. But it does not say that there is an increase in miscellaneous fees, in superfluous and exorbitant fees,† Palatino said in an interview with Bulatlat. The youth representative said the energy fee, development fee, accreditation fee, athletics fee, internet fee, insurance fee and air condition fee are just some of the questionable fees being collected in private schools. â€Å"Such tactic has proven to be very profitable to school owners. Unlike tuition, miscellaneous fee of all sorts are not included in the tuition increase consultations provided under CHED Memorandum No. 13, the guidelines for tuition hike applications, which was recently re-implemented following the lifting of the tuition cap,† Palatino said in his speech. â€Å"In our country, education is a big business,† the NUSP said in its primer on the state of Philippine education. Palatino asserted that high cost of education does not guarantee good quality education. â€Å"Most private schools are prof it-oriented diploma mills. They exist for profit. They only give out diplomas and make students their milking cows.† According to Palatino, half of the unemployed in the country belong to the youth sector. One-third of newly graduates do not immediately get employed. â€Å"If we have a good quality of education in elementary and high school, not all youth need to enter college. In other countries you can still be employed even if you just finished high school. In our country, you need to finish and have a college degree for all kinds of available decent jobs,† said Palatino. Palatino also criticized the low budget of the national government for the education sector. â€Å"In other countries, tertiary education is highly subsidized by the state. In the Philippines, higher education is dominated by the private sector,† he told Bulatlat. Palatino said that the ideal spending on education should be 18 to 20 percent of the national budget, but the average spending on education in the Philippines is only 13 percent. The amount is equivalent to only 2.3 to 2.4 percent of the Gross Domestic Product (GDP). This is way below the prescribed standard of the United Nations Educational, Scientific and Cultural Organization (UNICCO), which states that six percent of GDP must be allotted to education. Because of the limited budget given to public schools, the funds provided for the facilities, salary of teachers, learning materials, and even school feeding programs are also inadequate, Palatino said. He said that despite the free tuition in public schools, it would cost around P15, 000 ($316.78) to P20, 000 ($422.38) to send a student to a public school. This amount covers the auxiliary needs of students that include school fees, books, school supplies, uniform, transportation, and food. Due to the small allocation of budget in education, public schools are forced to collect fees for other services. Palatino co-authored House Bill No. 2440 titled â€Å"An Act Imposing a Three Year Moratorium on Tuition and Other Fee Increases on All Educational Institutions,† principally authored by Bayan Muna Rep. Teddy Casino. The three-year moratorium on tuition hike will serve as a temporary relief for students in accordance with the estimate of the National Economic Development Authority (NEDA) that the current economic crisis would last for three years. The bill is pending in the Lower House. For now, Glenn, like many other Filipino youth, will have to strive on his own to realize his dream. â€Å"I want to go back to college and receive a diploma,† he said.

Wednesday, October 23, 2019

Intelligence Community

In evaluating and analyzing the US Intelligence Committee, it would help to look back in history. The Cold War, which emerged in the 1940’s, was the start of the usefulness of the US Intelligence Community in battling against Communism.The result of the Second World War is like glue attached to each country involved therein. By 1943, the effects thereof were already inevitable. Germany, who was the leader of the Axis power, was dealt with full anger. Allied forces became stronger when German invaded Russia.Further, Japan and Germany were continuing then their battle and spread their powers in Europe and Asia. But the suicide of Adolf Hitler around 1945 ended the war. Germany was divided into two—West Germany was invaded by Americans while East Germany was invaded by Russia. This led to tension and anxiety between citizens of Germany. Because of this division, each invader-country practiced their type of economy to their colony.Hence, in West Germany, Capitalist form of economy and East Germany under Russia practiced Communism. After the World War, decolonization and liberation happened to some nations who suffered. These nations as they rise from the battleground seek help especially in their economic status. This situation was taken advantage by Capitalists and Communists powers (Borade, 2009). The US Intelligence Community became popular towards the end of Cold War period. Intelligence is at most the responsibility of the government.But in America, they always connect the success of their Intelligence Community during the Cold War era.   On January 22, 1946, President Truman, due to the lessons learned in Pearl Harbor, created National Intelligence Authority. This group is in-charge of planning the executing the intelligence activities of the country. Under the National Intelligence Authority is the Central Intelligence Group is responsible for disseminating the intelligence activities.The first assignment of CIA was battling against Society Union who is spreading its Communist powers worldwide. During 1950’s and 1960’s, CIA gained its full development. On 1950’s, National Security Agency, under the Department of Defense was created which assumes the some tasks of CIA and military.During the 1960’s a lot of technological advances happened to C IA. As an example, in 1965, the military departments were given the new Defense Attache System. This system includes military men in uniform researching information that will be useful in the military. Other technological advances in the CIA of the Military are: (1) high-speed aircraft and; (2) SR-71. Around 1970, a big reform was made in the Intelligence Community under the presidency of Richard Nixon.A Schlesinger report was made in 1971 and the said report mentioned that the Intelligence Community is already malfunctioning due to its disorganization. For example, the Intelligence Community according to the report was doing redundant activities and these activities were costly. Because of these findings in the report, President Nixon directed the Intelligence Community to manage its budget properly and oversee the execution of projects and activities.After the election of President Bush around in the 1990’s, there are suggestions on how to improve the Intelligence Community . This is also because of several things that happened during that time, especially the end of Cold War. Because of this there were calls for the destruction of Intelligence Community. Some legislators said there is no more need for Intelligence Community. But the Congress proposed that instead, a new structure of the Intelligence Community and across the board reductions in the personnel would be better. (Zegart, 2007). Along with the creation and development of Us Intelligence Community is the US Department of Defense. In 1775, during the American Revolution, US Army, US Marine Corps and US navy were established. Hence, around 1789, the War Department was established.The War Department is what we now called the Department of Defense. Technically, Department of Defense was created in 1947. This was created with the belief that it will regain the trust given to military, which was destroyed during the Second World War. As the new millennium came, new issues were faced by the Department o Defense.Dominant among these issues is the use of budget by the said department. The US Government Accountability Office suggested in 2002, that Department of Defense perhaps should try to partner with other government agencies to minimize their budget.In battling against Communism, CIA has the biggest stake around the world. Communism is like a contagious disease that is growing and spreading throughout the world.An d the CIA has made several steps on war against communism even at the start of the Cold War. Some intellectuals who are exposed to the age of Nazism and Soviet Communism have different views and interpretations about communism. Despite Germany's commitment to democratic reconstruction in the postwar years, its link to liberal and democratic values is weak. Both Nazism and Communisms as intellectuals say promised a new humanity and a new world order.They were examples of what is called utopian thinking. Utopianism assumes a level of social harmony and moral consensus that renders conflict and change abnormal or deviant. Utopias promote, often unwittingly, a hostile attitude towards individualism, pluralism and change. This is also what CIA promises to the people and the reason why they are doing their job. This is the rational behind their series of activities against Communism which started during the Cold War until the present time.

Tuesday, October 22, 2019

Matsu the Samurai Essay Example

Matsu the Samurai Essay Example Matsu the Samurai Essay Matsu the Samurai Essay The Samurai’s Garden Stephen was sent from China to Japan to recover from tuberculosis. He goes and stays in the small town of Tarumi with his family’s servant Matsu. During his stay with Matsu, Stephen discovers that there is more to Matsu than meets the eyes. Throughout the story, Stephen begins to see Matsu showing characteristics of a Samurai. One of the first characteristics we see in Matsu is his loyalty to Stephen’s family. Matsu’s parents had served Stephen’s grandfather in that house before him, and even after his parents had passed away, instead of moving away like his sister Fumiko did, he stayed and took care of the house and Stephen’s grandfather. In a sense, Matsu is the bodyguard and watcher of the house and family, just like how a samurai is to his lord. Throughout the story Matsu seems to be a much respected man to everyone in Tarumi. Stephen even told Matsu that â€Å"You have a strong face. A face someone doesn’t forget. Like a samurai† (30). Matsu and Stephen are perfect examples, in it that Matsu is the samurai who must watch over his wealthier master which happens to be Stephen, who indeed is wealthy. Although Matsu is only a servant, Stephen shows great respect for him. Matsu’s silence also brings out the samurai in him. His silence occurs in many parts of the book. At first, Stephen assumed that Matsu just didn’t like to engage in conversations, but Sachi explains how his silence is powerful when she told Stephen that â€Å"with Matsu, everything is in what he does not say† (59). His strength in silence guided him through his childhood to the present day. Because Matsu wasn’t the best looking guy when he was younger, he kept to himself and always stayed back at the house to help out his parents. I guess you can say he was born to become and samurai, unlike his sisters. Even when his younger sister Tomoko took her life, Matsu showed no emotions. He knew what she planned on doing the night that she did it, and he kept quiet. Another event that shows how his actions speak louder than words is during Kenzo’s burial. At the Kenzo’s burial, â€Å"Matsu was silent throughout the entire procession, simply bowing his head to those who showed their sympathy at the loss of his good friend† (109). His silence showed how strong he was holding up. Furthermore, other than his messages through silence, Matsu also shows great inner strength within these two events. Much like how a samurai who never grieves over a comrade’s death, Matsu’s inner strength allowed him to remain calm and prevent an emotional breakdown first after seeing the suicide of his sister, and seeing the death of his best friend Kenzo. When Sachi came down to visit after the storm, she told Stephen that â€Å"Matsu once told me the bridge represented a samurai’s difficult path from this world to the afterlife. When you reach the top of the bridge, you can see your way to paradise† (58). I believe that Matsu has reached the top of this bridge already and saw his way to paradise. While this bridge represents a link between this world and the afterlife, Matsu acted similarly. The people of Yamaguchi are considered dead to those in the city. Matsu acts as the link between the two, delivering to the people of Yamaguchi. On a side note, a person who acts as a link between this world and the next is called a shaman. Matsu once said that the people of Yamaguchi are basically dead to their family, and the only one who knew of their existence until Stephen was introduced to them was Matsu. In their early stages of development, Matsu served as a shaman who helped out the â€Å"dead† people of Yamaguchi. He brought building equipment from the city up to Yamaguchi, and helped them build houses. Furthermore, Matsu has shown great bravery throughout the novel. One specific example of his bravery was shown when they were on their way to visit Sachi in Yamaguchi and they saw that one of the villagers house was on fire. Like a true samurai, Matsu ran to help put out the fire without even considering his own safety first. Like Sachi said, â€Å"bravery is when you step in to help when you have nothing to lose. Matsu-san and you, Stephen san are the brave ones† (123). In addition, Matsu is very a nonjudgmental guy. He never jumps to conclusion about a person and never judge a person by the way they look, or what has happened in their past. Instead he acts as a samurai does what he believes is right and sticks to it. For example, Matsu never judged any of the lepers in Yamaguchi for how they looked, and got to know all of them very well. The way Matsu is portrayed in the novel, sometimes he almost seems like a middle aged man instead of a man in his seventies. But because he is at such an age, we can say that he is a man with much wisdom and experience. Samurai’s grow through each battle and with each battle, win or lose, come strength and wisdom. Every day is a battle for Matsu, and with it he has gained from it. With his wisdom he always knows what to say or do when there is a situation in front of him. For example, after Keiko had told Stephen that they can no longer see each other, Matsu passes down his wisdom to Stephen when he told Stephen â€Å" get quote from book† (). Matsu, the man with undying bravery and wisdom, gentle and loving is the samurai in The Samurai’s Garden. But his garden didn’t stop in just his backyard, no; his garden was also all of Yamaguchi. And as most great samurais, the last thing Matsu does is leaves behind his legacy within Stephen.

Monday, October 21, 2019

Free Essays on So Close Yet So Far

â€Å"So close, but yet so far apart.† Our society today is thoroughly impacted by all aspects of race, class and gender to an extent, in which it forces our society into a state of denial. Observing two very diverse social situations is the only true and proper way to understand the effect these social conditions have upon our society. Perception will provide the answers to any questions or hypotheses that may have ever been misinterpreted or unanswered. I discovered a nonconformity, which proved to be evident in an atmosphere with a predominant population of minorities, as compared to a swarmed environment of Anglo-Saxons. Two hours of observations summed up to develop a summary with conclusions about the percussion’s of age, gender, class, and race. I figured that why stay in my hometown and research this when I can go to another township and observe there diversity. In doing this it will allow me to pay attention to certain aspects that I would most likely over look in my hometown of Union. Just because I move to a new atmosphere I am naturally more observant then I would be in my more natural surrounds. So I decieded look at the two very diverse social situations situated in the same town, the town of Carteret. Why designate city bus stops? Why not? The perfect example to generate conclusions of one portion of town contrasted to the total opposite of the first. Race, class, gender, and age all significant roles in creating the diversity between these social situations. The first of these two hours was disbursed in an area, which seemed to be from a rap video or even a movie with some type of hood values. This area of Carteret is know as "Chrome." It is not that you can not walk down the street without being harassed but it is not the type of street you want to be caught on with a crowd walking your way. I have my share of friends who live amongst these streets, and leave this negative impression of what they go t... Free Essays on So Close Yet So Far Free Essays on So Close Yet So Far â€Å"So close, but yet so far apart.† Our society today is thoroughly impacted by all aspects of race, class and gender to an extent, in which it forces our society into a state of denial. Observing two very diverse social situations is the only true and proper way to understand the effect these social conditions have upon our society. Perception will provide the answers to any questions or hypotheses that may have ever been misinterpreted or unanswered. I discovered a nonconformity, which proved to be evident in an atmosphere with a predominant population of minorities, as compared to a swarmed environment of Anglo-Saxons. Two hours of observations summed up to develop a summary with conclusions about the percussion’s of age, gender, class, and race. I figured that why stay in my hometown and research this when I can go to another township and observe there diversity. In doing this it will allow me to pay attention to certain aspects that I would most likely over look in my hometown of Union. Just because I move to a new atmosphere I am naturally more observant then I would be in my more natural surrounds. So I decieded look at the two very diverse social situations situated in the same town, the town of Carteret. Why designate city bus stops? Why not? The perfect example to generate conclusions of one portion of town contrasted to the total opposite of the first. Race, class, gender, and age all significant roles in creating the diversity between these social situations. The first of these two hours was disbursed in an area, which seemed to be from a rap video or even a movie with some type of hood values. This area of Carteret is know as "Chrome." It is not that you can not walk down the street without being harassed but it is not the type of street you want to be caught on with a crowd walking your way. I have my share of friends who live amongst these streets, and leave this negative impression of what they go t...

Sunday, October 20, 2019

Nick Stephenson on Reader Magnets and Amazon SEO Reedsy

Nick Stephenson on Reader Magnets and Amazon SEO Reedsy Reader Magnets and Amazon SEO - Nick Stephenson on Author Marketing Last update: 07/06/2017â€Å"You’ve got to think about what the benefit is for the reader.† This is what author marketing is all about, according to bestselling author Nick Stephenson, who we have the pleasure of interviewing today.We first reached out to Nick over a year ago, when he had started implementing this mindset and his reader magnets technique. In a year, he has built a hugely profitable business out of his writing career, hitting bestsellers lists, writing full-time, and now offering a premium marketing training program for authors: "Your First 10k Readers".He shares his insights on email lists, incentives (reader magnets), reviews, and Amazon search engine optimization. If you want 24 minutes of exceptionally condensed marketing advice, just hit â€Å"play† below. For the lovers of the written word, we also provide, as always, a nice, clean transcript. Enjoy! Hi Nick, great to have you here! You’re a UK bestselling indie author of crime and thrillers. Can you give us a bit of background on what your books are about?Thanks for having me. I write mystery and thrillers, the Leopold Blake series, and I write non-fiction as well: books specifically designed to help authors find their first 10,000 readers and build their platform.My fiction work is based on a modern-day Sherlock Holmes character and is great fun. It’s all based in the US, with American characters and American language. There are 6 books in the series; I’ve been publishing for about two years now and started seeing some amazing results about 12 months ago, when I started really focusing on building my marketing strategy and on what works. It’s been a very exciting year or so for me.I can imagine. And it’s actually a year ago that I first got in touch with you to present you the idea we had about Reedsy, so I’d say it’s been a gre at year for both of us!Absolutely, yes! It’s great to see so many emerging authors and services to help grow this industry, because it’s such a new market! It’s just great to see all this exciting stuff happening.Exciting is definitely the word! You also have a free webinar on the Your First 10k Readers website that I really enjoyed, especially the first video, because that video starts by effectively setting the right mindset for book marketing. I see many authors out there thinking â€Å"how can I sell my books†, when it should actually all be about adopting a reader’s perspective.Absolutely. I think the problem with a lot of authors, like you said, is that they see marketing as a problem, when marketing can be fun as well! Because when you’re building a real connection with your fans, you get to have that exchange of ideas. Getting emails from people telling you how much they love your books and how they can’t wait for your next on e, every day, is a wonderful feeling.And when you have a next book to launch, knowing that you can launch it into the top 200 on Amazon, go to the top of the charts on your bestseller lists, without having to pay for advertising, that is amazing, because you have this built-in platform that you have direct control over. Whereas if you’re relying on Amazon or other ebook stores, or even Facebook, to do that for you, the rules can change at any minute.That’s because you don’t own that platform: it’s their platform, so they can change the rules. But if you have your own platform, you don’t have to worry about that: you control it, and therefore control your career. So my premium training is all based around how to develop that for yourself and how to build that up, so you can take control over being an author.The webinar you mention are the free videos that I show to people to let them know exactly what they can do to get this process started. There a re currently 3 videos and you can sign up for them at Your First 10k Readers.The first one will essentially take you through how the online retailers work. And this is a big one because most authors think about marketing like old school, traditional marketing that publishers used to do (and some still do), where it’s all about the physical bookstores.It’s nothing like that, because Amazon and the other stores are really search engines. They’re like Google for products, Google for books. And if you don’t understand how a search engine works, how it indexes books and pages and how you can get to the top of those search results, you’re leaving a lot of visibility on the table. So I talk about exactly how to get that right mindset.So how can authors do SEO (Search Engine Optimization)? How should they, for example, decide which keywords to enter for their book?It’s difficult I think, because Amazon and the other retailers don’t publish th eir search traffic. If you’re on Google, you can go to the Google Keywords tool, type some keywords and see how much traffic they get, what the competition is like, etc. Amazon doesn’t do this, they keep it very much to themselves, so you’ve got to be manual about it - you have to use a bit of common sense.The easiest way to do it is to use the search bar at the top of the book page and start typing in some relevant search terms that you think might apply. Amazon will suggest some for you, so you just pick some suggested terms and check out whether the books listed under those terms are selling well. If they are, it’s a good keyword, so you have to determine whether you can compete at that level of sales. So if you’re currently selling one copy a day, you don’t want to be in a keyword pool of books that are selling hundreds of copies a day. It’s a lot of manual work, trial and error, but keywords are so important.Do your recommend cha nging them often and testing/iterating?It depends, I don’t change mine that often. If I see my sales drop, I’ll go back and check, but really there is no kind of set that you want to change them out, there’s no magic answer.One post I really liked on your blog was the one about readers magnets. Because often, I finish an indie book and I read something like â€Å"we indie authors rely on reviews/on our newsletter, so please leave a review/subscribe to my newsletter†, and that to me is not a real incentive. You, however, offer a real incentive. Can you tell us more about these reader magnets?Yes, you’ve got to think about what the benefit is for the reader. Because if you put a call to action at the end of your book like â€Å"buy the next book† or â€Å"subscribe to my mailing list† or â€Å"leave a review†, the reader’s thinking: â€Å"what’s in it for me? Why should I do that?†I mean, some people will do it, of course, but most people will just completely ignore that. What you have to do to get more results is offer the reader something for them, something of value, to get them to take action. And personally I’d rather have them subscribe to my mailing list than anything else. Because if you get their email address and get their consent for you to contact them in the future, you can ask them for reviews or sales later on down the line, when you’ve built up that brand and that relationship. And this is where reader magnets really come in.Reader magnets are basically something of value that you give to your readers in exchange for an email address.That has made a tremendous difference. We’re talking more than a 1000% increase in signups, just from doing that. I offer them a book as a magnet, a full book (either another book in the series, or a related book if it’s a non-fiction book), but you don’t have to offer a full book, you can offer bonus chapt ers, deleted scenes; or in non-fiction: cheat sheets, case studies, videos, anything you want as long as it’s related to the book that the reader has just finished.It just makes all the difference because with reader magnets you’re thinking about what is in it for your readers, not what’s in it for you.Exactly, I think that is definitely the key in marketing. And it’s funny because in January, we’ve seen a couple of indie author stars like Hugh Howey or Joanna Penn posting videos about their reading habits and how they find their next reads. It shows that they have this right mindset: they easily put themselves into their readers’ shoes because they are readers themselves.Absolutely, and they build a connection with their readers that way. I’m always going to make as much effort as possible to build a connection with readers, because from a reader’s point of view, you’ve got a book out there but they have no idea who you are, they don’t know what your life story is, what their personality is, all they know is your book.If you’re publishing videos like Joanna Penn and Hugh Howey, you really build that connection and readers start to understand who you are as a person. And then they’re much more likely to buy from you because they’re invested in your success: they feel like they know you.Another great thing about indie authors is the community they’ve built, and the collaborations that emerge between authors. You’ve been working very closely yourself with Matt Iden, another author in your genre, right?I think collaboration is absolutely key, because this kind of old school mentality of â€Å"book launch is the be all and end all† is gone, you know. It used to be that where your book didn’t sell 20 or 30 thousand copies in the first three months, your publisher would either drop you or reduce your advances, or be less invested in marketing your n ext book. The indie mentality is different because we don’t rely on huge sales in the beginning, we can be happy with a few hundred sales in the first month, or a few dozen, or even ten!We’re not â€Å"in competition†, because we don’t have to compete for shelf space with this or that bestseller during launch week: we’re available forever. So we can actually work with other authors to benefit everybody because in the end we all have the same objective, which is to reach more readers and get our work out into the world. And there’s no reason we can’t do that together: I email out my audience all the time, and if I’ve got nothing of my own to promote, I’ll recommend other authors’ books. I want my readers to trust me so if I can give them something good to read that’s a great way of doing it!Another thing I wanted to discuss was your brand, that you’ve built across the years, and that is particularly e vident in your covers. Would you say that branding is one of your selling points or is it just there to support your other marketing activities?Branding is very important because it basically means that your readers know what to expect. Your name is a brand, so if someone is going to read the next Nick Stephenson book, they should understand what that’s going to be like.From a visual point of view, having those covers, almost identical across the series, means that when they’re scrolling through a list of books, they immediately know it when they see a Nick Stephenson book. And if they look at it, they’ll see the â€Å"also bought† at the bottom of the page and there will be all my covers lined up. And on my website they can see them in a banner too. It creates a very strong visual trigger that gets people excited about looking at your books.One of the most important things you should do is have a nice, professional cover, and if you’re writing in a series, having those covers match as closely as possible can make a very big difference.Do you do â€Å"perma-free† on the first book in the series?Yes, I do, and there is a reason for this. We talked about ebook stores being like search engines, right? Well, this is like any other online business, you need two things: traffic, and conversion (turning traffic into customers).Perma-free is a wonderful way to get traffic, because you can get 50x to 100x more downloads on a book if it is free, compared to if it was even 99c. Then, if you’re smart about it, you can find ways to convert that traffic into paying customers (using reader magnets, typically).Even if you don’t do perma-free you can do regular free promotions if you’re enrolled in KDP Select, and use those 5 days every 90 days when your book is free to really promote it. You’ll get subscribers that way that you can then lead on to your other books. It just makes a huge difference.One thing I’ve noticed in the latest numbers you disclosed about your expenditures for your books, is that you’re not afraid to spend money as long as it brings more back. I’ve heard that you’ve even tried Facebook ads, is that right?Yes, I do, even if I didn’t include it in the breakdown (I’d only been doing it for a couple of months). It’s like anything, you know, if you want to take your business to the next level, you’re not going to be able to do it using free marketing tools, or a $5 add.I’m not saying that you cannot have sales without paid marketing, I’ve started making serious money from publishing without really spending that much money. But you hit a plateau pretty quickly. And if you want to go to the next level, you really need to think about how you can invest in your own business.Then, it’s not about cost, it’s about how much value that investment is going to bring. If it’s going to earn you money, save you money, or save you time, then it’s a good investment.Facebook ads have been absolutely incredible. Aiming it at my non-fiction author marketing side of things (and advertising my free Reader Magnets book), I’m getting subscribers through Facebook ads that cost me around a dollar, but they’re earning me around $15, so it’s just an incredible amount of ROI. I actually don’t think that will last forever, Facebook will catch on to how much money people are making through this, and prices will go up. But while it’s like that, it’s just fantastic!Thanks for these insights, Nick, and for your time!  For more insider tips on author marketing, check out our free Reedsy learning courses on marketing.How do you build your mailing list? Do you use any reader magnets? Leaves us your author marketing thoughts and tips in the comments below! And don’t hesitate to ask Nick Stephenson any questions!

Saturday, October 19, 2019

Project management and methods of enquiry Essay

Project management and methods of enquiry - Essay Example ......................................................................3 1.6 Stakeholders Analysis...........................................................................................4 1.7 Time frames†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦..5 1.8 Action plan............................................................................................................5 1.9 Resource Allocations............................................................................................5 1.10 Risk Analysis .................................................................................................6 1.11 Business Case Evaluation...............................................................................9 1.12 References†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦ †¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..10 1.13 Appendixes; 1.13.1 Appendix a; Questionnaire†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.11 1.13.2 Appendix b; Gantt chart for the business case†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦12 1.13.3 Resource Allocation List†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦..†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦13 1.13.4 Risk Assessment chart†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦.†¦Ã¢â‚¬ ¦Ã¢â‚¬ ¦14 1.1 Introduction Nutritional awareness is becoming one of the major factors influencing the consumption habits of most of the female students in Saudi’s High schools. ... 1.2 Overview Healthy eating is a global concern in relation to rising obesity rates (world health organization) and in particular healthy eating awareness is a priority in Saudi Arabia (Barker and Cole, 2009). The knowledge of healthy diets among female high school students is inadequate; a study done in 2005 (Al-shammari, 2001) revealed 65.2% had little or no knowledge on healthy eating habits. It is known that there could be several factors behind this (Al-rukban, 2003). For example there could be lack of education about nutrients, and/or unavailability of health information in schools (Al-shammari, 2001). This requires a thorough explanation of the benefits and ways of maintaining healthy bodies. Furthermore Al-rukban has shown that (2003) knowledge of the effects of poor eating habits could be a factor in influencing young people and in this case students as they change their eating habits and thus reduce their exposure to ailments associated to malnutrition. 1.3 Business Case Un healthy lifestyles are the major contributors of the medical conditions in the world and also in Saudi Arabia (world health organization). Some health related behaviors like poor dietary habits, substance use and exercise patterns are most visible in adolescent level and could persist into adulthood (Caldwell et.al, 1998). Obesity is however the most persistent problem affecting this age group i.e. adolescents and young people, this is due to their tendency of eating junk and fast foods (Caldwel et.al, 1998). Due to this perceived problem in the school there is a case to support the introduction of a nutritional programme in schools to create awareness to the female students. The following perceived aims for developing

Friday, October 18, 2019

Fundamentals of Communication Essay Example | Topics and Well Written Essays - 1000 words

Fundamentals of Communication - Essay Example 29-44). In other words, the information comes under sharing and transmission in such a way that the receiver must understand the meaning of the exchanged information. However, verbal communication is one of the modes of transmitting the information that also involves face-to-face communication. Sound, words, and language are the few essential elements that come under association with the verbal communication. Although, the authenticity of the origin of the language come under exposure to substantial assumptions and theories, yet several people believe that fundamental sound that incorporate natural sounds and expressions of emotions and gestures are the leading cause for the development of the language. While, on the other hand, according to various theorists, the development of the language is the outcome of the group activities or people working in amalgamation with each other (Alberts et al, pp. 51-57). The history and records reveal the fact that, more than three thousand languages come under speaking by the inhabitants of the globe in the present day. Moreover, it has also come under observation that class, gender, age, and a variety of other social factors exhibit the development of the languages (Alberts et al, pp. 39-56). Although, it has also come under view that the vast and extensive range of languages at many occasions creates complexities between them, yet a single language can eliminate these problems. In addition, language plays a profound and critical role in creating and communicating the meaning (Alberts et al, pp. 12-19). It is the elementary quality of human intelligence to give meaning to the verbal, non-verbal, and written words to communicate. Therefore, people make use of language to â€Å"express, create and interpret meanings so that they can establish and sustain social and interpersonal associations and

The Olympic Games Essay Example | Topics and Well Written Essays - 500 words

The Olympic Games - Essay Example However, there was not enough positive response from the delegates. That was actually devised for the study of amateur sports, he again voiced his view on the revival of the Olympic Games and was delighted when the other countries participating in the Congress agreed with him. Following this consensus, delegates decided to have Coubertin construct a committee, comprising members of various countries, to conduct the first Modern Olympics in Athens, Greece. That committee headed by Demetrious Vikelas from Greece oversaw the preparations for the games and that committee only became the later day and now functioning International Olympic Committee. So, Pierre de Coubertin is widely-acknowledged as the originator of the modern Olympic Games, along with Demetrios Vikelas. The three Latin words of Citius, Altius, and Fortius became the Olympic motto, with Coubertin himself proposing after having borrowed it from his friend Henri Didon, a Dominican priest who taught the sport to students. Th e games started at the Athens’ Panathenaic Stadium in a celebratory mood on 6th April 1896 and concluded on 15th April. â€Å"The modem games were inaugurated in style, with the ritual and fanfare that Coubertin felt was essential to their social purpose.† Competitors came from 14 nations, with around 245 athletes, all of whom were male. From those beginnings, the games continued to take place with increasing number of countries and athletes every four years, with the exception of the years during the World Wars.

Thursday, October 17, 2019

Role of IT in Business Management Essay Example | Topics and Well Written Essays - 500 words

Role of IT in Business Management - Essay Example These are namely: (Angell, 1991) Information technology has helped organizations in managing their resources efficiently and to produce the maximum throughput. Information technology has become an integral part of any organization small or big. This is due to the fact that any organization will have to make critical decisions when it comes to marketing. Information technology when implemented in the following areas of business plays a big role in improving the organization's market hold: Supply Chain Management: Any organization has to take important decisions regarding their products as to what to supply, how much to supply, how to supply and where to supply. Supply chain management can be divided into three main flows: Product Flow, Information Flow and Finance Flow. All this information is stored in databases and data warehouses. This information retrieved and fed to SCM application programs to be analyzed. SCM software has algorithms to determine the best way to fill an order and to track the product status, etc. E-Commerce: Many people nowadays prefer buying products over the internet rather than buying from a retail outlet. Organizations can use internet to sell their products which reduces the paper as well as the manual work to a large extent.

How to keep a romantic relationship in long distance via social media Essay

How to keep a romantic relationship in long distance via social media and phones - Essay Example This paper explains the various theories that have been proposed to hinder long distance relationships and how in my interpersonal encounters, they have been overcome. Relationships for different people have different meanings. Most people get invested in the other person too early in the relationship and end up giving up when things do not go the way they want to. The key to a successful relationship is keeping a check and balance on your expectations. The rest of the necessities can be taken care of by the various mechanical devices that have been invented and discovered for the ease of communication. My romantic relationship has been going strong since the last five years, thanks to the efficient communication with the help of social media and mobile phones. It has been postulated that most of the difficulty arises in being unable to see your partner. This is because it fosters uncertainty, which may lead to distrust and disloyalty, and spoil the relationship sooner or later. This complication usually arises either during the early phases of a relationship, when the feelings of apprehension and skepticism may take over logic. It may also arise over a span of few years, since partners tend to get tired of long distances over long spans of time and need a way to either reduce the distance, time, or suffer termination of the relationship. Phones are an important means of bridging this gap, as are increasingly popular internet applications such as Skype, Viber, imo, etcetera. If you designate a particular time in the day when you can use either of these to have some time conversing with the person you are involved with, or share precious moments ranging from birthdays and anniversaries, to joys and sorrows such as getting employment or losing a family member. The face to face communication offers not only a way out for the frustrations that result due to the distance, but also eases doubts that result due to the social expectations out of a

Wednesday, October 16, 2019

Role of IT in Business Management Essay Example | Topics and Well Written Essays - 500 words

Role of IT in Business Management - Essay Example These are namely: (Angell, 1991) Information technology has helped organizations in managing their resources efficiently and to produce the maximum throughput. Information technology has become an integral part of any organization small or big. This is due to the fact that any organization will have to make critical decisions when it comes to marketing. Information technology when implemented in the following areas of business plays a big role in improving the organization's market hold: Supply Chain Management: Any organization has to take important decisions regarding their products as to what to supply, how much to supply, how to supply and where to supply. Supply chain management can be divided into three main flows: Product Flow, Information Flow and Finance Flow. All this information is stored in databases and data warehouses. This information retrieved and fed to SCM application programs to be analyzed. SCM software has algorithms to determine the best way to fill an order and to track the product status, etc. E-Commerce: Many people nowadays prefer buying products over the internet rather than buying from a retail outlet. Organizations can use internet to sell their products which reduces the paper as well as the manual work to a large extent.

Tuesday, October 15, 2019

State Of Blacks During Jim Crow Era Essay Example | Topics and Well Written Essays - 1000 words

State Of Blacks During Jim Crow Era - Essay Example The term â€Å"Jim Crow† in the history of America is often related with the rigid segregation or exclusion of Blacks. The word ‘Jim Crow’ actually referred to black character in an old song. The period 1881 to 1964 marked the era of Jim Crow in the American history. Jim Crow era reflects Jim Crow laws separating black from white races in America. Since its inception, the term Jim Crow witnessed extensive usage as an orientation to practices, laws or institution that ascend from physical separation of black people from white people. The major purpose of Jim Crow laws was to separate black from white races as a measure to promote equal treatment (Tischauser 1-3). Jim Crow laws incorporated numerous practices of segregation. Jim Crow laws were primarily aimed at promoting equal treatment to Black African American people but the laws were criticized on several grounds. As a consequence of Jim Crow laws, Blacks were subjected to segregation in courtrooms and cemeteries, on trains and in sanatoriums among others. They were barred from public and private institutions such as restaurants, parks, libraries, public pools and hotels. Jim Crow segregation affected almost all aspects of Blacks. For instance, many courtrooms during Jim Crow era followed specific Jim Crow bibles for Black people and varied significantly from one used for white people. During Jim Crow era, Blacks were confronted with humiliation and dehumanizing practices.

Monday, October 14, 2019

Extracurricular Activities in School Essay Example for Free

Extracurricular Activities in School Essay An ideal school gives to students the scope and the spirit of healthy competition — to excel at all levels. Class work and the home work given by teachers have their academic importance; in this also one who excels wins the praise and appreciation from the teachers. But academic distinctions alone do not fulfill all the purpose for which the school exists. A school is the workshop of life-building in which the raw material is the nascent young pupils. The Principal, the teachers are molders of this raw material into the ideal mold. For this process, many more activities, other than vroom ones are needed to fulfill the purpose. A young pupil might have the potential and the natural Lent to excel in games and sports and he needs to go to play field and the sports ground for the purpose. There can be students whose natural bent of mind is towards creative art and the art room is his field where he needs to be given the chance to exhibit his potential. Even little children of the nursery or the primary classes can draw such lines and make such figures which may amaze an on-looker and may be led to exclaim —’What an idea, how could he imagine this?’ One cannot and does not know how much talent in what direction lies in a child’s brain. This can only come out when he or she is given that opportunity. The school has to provide such chances and explore out the pearls from the sea-depths of the young mind. Art competitions of different level of students are activities that need to be arranged and the excellence in that to be rewarded and encouraged. There are boys and girls who have a knack of oration. They have in them an amount of self-confidence that they can face spectators and audience. Elocution contests and debates offer them the chance to exhibit this latent talent of theirs. Such inter-class or inter-school competitions should regularly be held which would further them to become good debaters — who knows, they may one day become parliamentarians and what they have gained during their school days may place them in good stead in that field. Cultural shows; dramatics performances, mono- acting’s are events which schools generally hold and it so necessary for schools to hold them. That is also at of total education. Taking part in such events gives children a sense of self-confidence and embellishes their accomplishments which they possess or can even develop. Anything, any activity which helps in the development of the total personality of young boy or girl is a part of  education and competitions, the effort to excel from others, is an incentive which must be provided to a young mind. Such an opportunity is offered to them only through such cultural and extra-curricular activities Opening up of personality; developing the latent talents- promotion of the intellectual effort and an opportunity of healthy competition — all these are factors which an educational institution should always encourage — only when it does this, it fulfills its role in the total education of the young.

Sunday, October 13, 2019

Network Security and Vulnerability Threat Table

Network Security and Vulnerability Threat Table LAN Security Is the local area network that access control using the private VLANs and its a networking device within a small geographical area. They are not safe and secure compared to other networks because its easy to access the WLAN security compared to others its more of convenience over security thus it will help business and IT organizations to improve on their network by providing suitable choices for WLAN security for organizations to have a safe WLAN in their working place they must have procedures that outlines forms of double connections that are allowed in the work place for security purposes, also to consider security and its impacts to other networks for instance theWLAN ,to have client devices and APs,also to perform attack and vulnerability monitoring respectively to support this type of network and lastly to carry out a regular assessment about WLAN security in the organization. The wireless system helps devices to connect to the computer minus them being connected to the network,WLAN consists of client devices for examples the laptops and the access points(APs),the APs connect client devices with distributing system(DS) and DS its the only way by which client devices can pass information or communicate with LAN and other networks. Also we have wireless switches that help the WLAN is administrators to manage it. WLAN Architecture It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture, and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming; a microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect Threats of WLAN The following explains the security threats of WLAN that are likely to happen: eavesdropping, spoofing and denial of service A) Eavesdropping Involves attack against the confidentiality of data that is transmitted across the network, eavesdropping is a big threat because the attacker can intercept the transmission over air from a distance that is away from the organization B) Spoofing It is where the attacker could gain access to data and resources in the network by assuming the identity of a valid user this is because some networks do not authenticate the source address thus the attackers may spoof MAC addresses and hijack sessions. C) Denial of service This is where the intruder floods the network with either genuine or fake information affecting the availability of the network resources, WLAN are very vulnerable against denial service attacks due to the nature of the radio transmission. LAN Security Is a wireless networking device within a small locality that access control using the private VLANs. Identity management Is the system discipline whereby the right people access the right and valid information at the right moments and for good particular reasons. Physical security Its the protection of the hardware, software, networks, and data from actions that could cause loss or damage to an organization for instance theft. Personal security Availability Is the quality or state of information or data of being available and easily accessed. Privacy Is the state of a person to seclude himself or herself, or information about him or her, so its the procreation of information or confidentiality of data. Cyberattactks in tabular format Type of attack Effect Malware Its a computer code that a malicious function, used to destroy   or steal private data in a computer. Password attacks They attack on cracking a person or user is password so that the attacker may obtain access to a secured system. Denial of service Focuses on the interruption of a network service when an attacker sends volumes of traffic to the network that is targeted. The following will be employed to mitigate the above types of attacks on the computer: Threat intelligence reports, are documents that describe types of system and information that is on mission or the one being targeted and information important to the organization. We have security alerts that are notifications about the current vulnerabilities and some security concerns. Tool configuration is the recommendations for mechanisms that support the exchange, analyzing, and the use of threat information. Indicators can also be used, they suggest or tell that an attack is imminent or its underway for instance we have the IP. Plan of protections openStego-its a free steganography that has the following functions: Data hiding where it can hide data within a cover file watermarking files with an invisible signature. Quickstego -helps someone to hide text in pictures so that its only users of quickstego who can be able to retrieve and go through those messages. Oursecret -enables the user to hide text files for instance images and videos thus suitable for sending confidential information. Veracrypt -it adds enhanced security to the algorithms used for system and partions encryption making it immune to new developments in brite-force attacks. Axcrypt -it integrates seamlessly with windows to compress, encrypt, decrypt, store, send, and work with individual files. GPG-it enables to encrypt and sign data, communication, as well as access modules for all public directories. Cryptographic mechanisms to organization Cryptographic is writing is in secret code within the context of any application and these are the requirements for it; Authentication, privacy, intergrity, and non-repudiation They include:schannel CNG provider model,ECC cipher suites,AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. Risks associated with these are that they make the problem of general key recovery difficult and expensive and too insecure and expensive for many applications and users as large. File encryption tools Veracrypt, axcyrpt, Bitlocker, GNU Privacy Guard and 7-zip File encryption method We have the following methods; exceptions, syntax, remarks and security Results of the encryption files They provide an overview and pointers to resources on EFS They also point to the implementation strategies and best practices Encryption technologies Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text block coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Description security architecture of the organization It has the following components including the client devices,APs and the wireless switches, this part tries to show the importance of having a standard mechanism of security   thus providing recommendations for implementing, evaluating and maintaining those configurations of the client devices. The architecture of an organization should be standard when it comes to the issues of security configurations because it provides a base for security thus reducing the vulnerabilities and consequences of attacks that might be successful, it will improve the consistency and predictability of security. The following makes up WLAN architecture: roaming, microcells, infrascture and independent. Independent WLAN is the simplest one which consists a group of computers that are equipped with client adapter and access points are not necessary in this case. Infrastructure WLAN consists of wireless stations and access points combined with DS that help roaming and mediating wireless network traffic. Microcells and roaming a   microcell is an area coverage for an   AP,they help users to move between   access points without having to log in again and restarting the applications again, for roaming to work, access points must have a way of exchanging information as a user connect. the cryptographic means of protecting the assets of the organization Cryptographic is writing is writing in secret code within the context of any application and these are the requirements for it; Authentication,privacy,intergrity and non-repudiation They include: schannel CNG provider model, ECC cipher suites, AES cipher suites and the default cipher suite preference. so the basic mechanism is to covert data into   cipher text form and then again into the decipherable when it gets into the user. Encryption and decryption is the main mechanism which works and ensures free flow of data within the system. Benefits The use of using public keys enables individuals to convert data into the encrypted form. Used to hide crucial. important and vital information. Helps in preventing leakage of vital data from a network Helps in the authentication of users over the transfer or flow of data in electronic way. the types of known attacks against those types of protections Password attacks-its a third party who tries to get access of information by cracking the password. Malware-codes with malicious intent to steal data or destruction of the computer system. DOS attacks-it majors on or targeting disruption of the network and can be prevented by keeping the system secure. Strong passwords are the only way against this attack. Malware should be avoided by doing away with links to unknown users. How to ward off the attacks Malware-avoid clicking and downloading attachments from unknown users. Phishing-through verification of any requests from organization via email over the business phone. Passwords attacks-use of strong passwords DOS attacks-the system of the organization to be kept secure with software updates. Encryption Technologies Data Hiding Technologies and Shift/Caesar cipher-its a tool that uses the substitution of a letter by another one further in the alphabet. Polyalphabetic cipher-is a cipher that is based on substitution using the multiple substitution alphabets. Perfect cipher-these are ciphers that can never be broken even with after an unlimited time. Block ciphers-is an algorithm deterministic that operates on fixed-length groups of bits. Triple DES-is a symmetric-key block cipher that applies the DES algorithm three times to the data bits in the system. RSA-is a public-key in the cryptosystems and is used for the transmission of secure data. Advanced encryption standard-its a cipher based on the substitution-permutation network and works fast in both the hardware and software. Symmetric encryption-these are the algorithms that uses the same cryptographic keys for both encryption and decryption of the cipher text. Text blocks coding-are the family of error-correcting codes that do encode data in bits. Information hiding and steganography-is the process of concealing a file, video, image, or file. Digital watermarking-is the practice of hiding digital information in a carrier signal in the system. Masks and filtering-masks show which of the part of the message is displayed. Network security vulnerability and threat table above Common Access Card Deployment Strategy How identity management can be part of security program and CAC deployment plan Identity management involves telling what the user can do to certain devices at a given time. Identity management can be part of the program because of its reasons well known for instance: increasing security, also production while decreasing the cost and effort. The program tools of identity management need to run as application towards a server because it defines the type of user and devices allowed to work on a certain network this for it to be part of the program, must depend on alerts, reports, policy definition and alarms Thus offering directory integration and connection of the wireless and non wireless users and meeting almost the operational and security requirements. Deployment plan of the common access control Can come for different reasons so as to deploy and enforce the authorization policy for instance: The organization -wide authorization policy   that is driven from compliance level of organizational requirement.also departmental authorization policy where they have some special data handling the requirements that would be passed to various department. Then the specific data management relating to compliance and targeting at the   protection of the right access of information. Email Security Strategy Types of public-private key pairing Public keys may be disseminated widely but private are only known to user owner. This makes two functions-the authentication when public key is used to verify or show a private user sent a message and encryption where the holder of the private key can decrypt the message. Authentication-is when the public key is used to verify that a holder of the paired private key sent the message. Non-repudiation-its an attribute of communication that seeks to prevent the occurrence of the untrue or false denial of involvement by either party because it provides the originator of data with credible evidence showing information was received as it was addressed. Hashing -its used to index and retrieve items in database because it is faster to find an item through the use of shorter hashed key thus hashing being the transformation of a string of characters into a shorter fixed length than the original size. This added security benefit will ensure integrity of messaging by: Speeding being high   this is when the number of entries is large because maximum number of entries can be predicted in advance so that the bucket array can be allocated once also one may reduce the average lookup cost by a careful choice of the hash function and even the internal data   of structures. Pretty Good Policy-its a program that is used to encrypt and decrypt email over the internet as well as to authenticate digital messages with signatures the stored files that are already encrypted. GNU privacy Guard-its an encryption software program since it uses the combination of conventional symmetric-key cryptography for speed. Public key infrastructure -its a cryptography key that enables the distribution and the identification of the public encryption keys thus enabling the devices to exchange data securely over various networks. Digital signature -its an electronic signature that can be used to authenticate the identity of the person sending the message. Mobile device encryption-they help mitigate security risks whereby data must be encrypted while it is in transit and when in storage. How to use smartcard readers tied to computer systems Smartcard are the credit-sized plastic cards that do contain the circuit card that are integrated they can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks. Complexibility of cost and technical of email encryption strategic to security benefits The following elements must be considered: The basics because encryption is a process that is based on the cipher that makes or ensures information is hidden.Aslo choosing what to encrypt because it will be part of the risk management and the planning process of data governance. The three states of data in order for data to be secure from data in motion to data at rest and last data in use. Recommendation Smart card can be deployed together with readers to provide user authentication and the non-repudiation for wider range of security purposes. A single smart card can be issued to each network user so as to provide a single set of credentials for logging to remote networks A deployment plan   its a step to step on what need to happen in the last stage in the email security strategy, for a deployment plan to be effective the following must be put into consideration: Layered application that deals with the design management dependencies  Ã‚   between components also the people who structure application layers should not be same again to structure the hardware infrastructure. Reference Atul.kahate, cryptography, and Network security Tata mc Graw.Hill Publishing Company Limited, 2003 E .kranakis primarily and cryptography, Wiley, 1986

Saturday, October 12, 2019

Cloning - Ethics or Life? Essay examples -- Argumentative Persuasive

Cloning: Ethnics or Life? Â   Â   Walking into a small hospital room you notice two small boys. As you observe the diagnostic papers on the young boys' bedposts you suddenly become guilt stricken. The darker haired boy on the right has liver cancer, but thankfully there is hope for this young boy, since he is on a very efficient liver donor program. In two days, Sam, as we will call him, will be receiving a clean and pure liver that will grant him a life as normal and healthy as any other young man. On the other hand the boy in the adjacent small, white hospital bed is not so lucky. We'll call this boy William. William is suffering from a spinal cord injury that occurred in a motor vehicle accident a few days earlier. This injury left William paralyzed and slowly he will deteriorate and die, while his family and friends wait and watch helplessly. Life is not out of the question for young William though, but the technology and science that will save his life is illegal in the United States. The knowledge and abil ity to clone a new spinal cord for William and send him too on his way to a normal life is there, but the ability to access this new science is not. So you play god for a moment and tell this young kid's parents why their son must die while his new friend in the bed next to him will live. Â   Cloning is a process in which one or more individual plants or animals are produced that are genetically identical to another plant or animal (Robinson 2). Cloning has been used since the late 1970's, and was designed to take genetically "perfect" animals and clone them to produce better food for humans (Robinson 3). The idea and wonder always was there, though, of weather we should and could clone a human being. This issue of... ...and Re-Engineering. [online] available: http://cac.psu.edu/ ~gsg109 / qs/ em01003.html. February/29/1996 Brush, Dr. P. "Ethical Concerns" Human Cloning and Re-Engineering. [online] available: http://cac.psu.edu/ ~gsg109/qs/em 01005.html. February/26/1996 "Can and Should We Clone Humans", [online] available: http://www.cwrl.utexas.edu/~mchorost/e306/cloning.htm. ] December/3/2000 Contran, R. "Cancer Resource Center" Welcome to the American cancer Society's Cancer Resource Center [online] available: http://www.cancer.org/cancerinfo/load_cont.asp?ct=1&doc=3&language=english March/24/2000 "Excite Health Center" Cancer [online] available: http://adam.excite.com/ info/?id=001289. December/14/2000 Robinson, Bruce A. "What is cloning?" Ethical Aspects of Human Cloning. [online] available: http://www.religioustolerance.org/cloning.htm#what. October/12/1997