Wednesday, October 30, 2019

P.Sc.1001 term paper Example | Topics and Well Written Essays - 2500 words

P.Sc.1001 - Term Paper Example Ensuring the public good is no simple task, but nonetheless with good policy it is very possible to work toward a better future. The public good is essentially defined as the safety, liberty, health, and welfare of the United States. Safety is mentioned because it is in the best interest of Americans to be protected from all dangers. Ensuring the public good would therefore include protection from crime, from disease, from inadvertent accidents, from foreign attacks and invasion, from atmospheric and environmental threats, and any risk to health or life that can be minimized or controlled. Health is a similar issue, and in the case of government responsibility calls for sanitation and prevention of exposure to dangerous materials or illnesses. Thus, this calls for clean air, clean water, and even clean streets. In addition, it calls for regulations of food and other consumable items that may cause illness. Liberty and welfare are both part of a much less physical and concrete realm t han safety and health. These two aspects of the public good are largely philosophical, and largely tied to the founding ideals. Americans are familiar with the phrase â€Å"life, liberty and pursuit of happiness†, as well as the similar â€Å"life, liberty and property.† A combination of these two encompasses the overall idea of liberty and welfare. These two can be separated however when taking a paternal view for one and a maternal view for the other. Liberty is generally paternal, and thus is something that the state protects rather than provides. The American government should pursue the concept of an island of constitutionality, where the law applies to small areas here and there within a sea of liberty. A poor alternative to this is having islands of liberty that are afloat upon a sea of legality, where the government regulates almost everything unless specified. The former approach is in the interest of the public good. Welfare is a maternal concept, and involve s the government providing for its citizens. Basically, this encompasses the essential services that must be paid for with tax dollars, to include roads, postal service, and the other agencies that basically ensure health and safety. Welfare also includes, beyond health and safety, the opportunity to pursue happiness, and thus provides for equal protection under the law, prohibition of slander and libel, prohibition of fraud, regulation of work hours, and other laws that don’t protect health or physical safety but more the emotional and mental wellbeing of citizens while ensuring that all business is conducted fairly and with equal opportunity. Welfare is therefore the assurance of social fluidity and fairness, and elimination of discrimination and exploitation. If American society therefore provides for safety at home and abroad, keeps the environment and the population clean and healthy, ensures liberty is granted and protected, and also regulates society to guarantee a fai r and equal field of play, then the public good has been well served. These issues are those that are most important to Americans and that the government is entrusted with addressing. The first issue on which a recommendation is necessary is on health care. The current state of American health care is well summarized in a report by the American College of Physicians, where the group points out what is lacking and what it

Monday, October 28, 2019

Forecasting Presidential Election Essay Example for Free

Forecasting Presidential Election Essay The economy of the United States is believed to be experiencing a â€Å"recession†, creating a global effect on the economies of other nations. The Democratic Party of the United States has several essential arguments when dealing with the national economy. For instance, Democrats largely believe in the principle of graduated tax incomes which focus on the belief that those who have higher earnings should pay more taxes and, conversely, the poor people should pay less tax. Barak Obama has stronger chances of winning the 2008 Presidential Elections over Hillary Clinton when taking the matter of national economy as the central basis. Clinton’s strong urge for a ‘universal healthcare’ will not take her any further in the presidential elections for several reasons. On the basis of the national economy, Clinton cannot expect every single American to avail themselves of healthcare, especially among the poor population. Although Clinton may strongly support affordable universal healthcare, it is by far an idealistic goal precisely because sustained payments for a healthcare provider is still beyond the reach of the pockets of many Americans. Moreover, the establishment of a universal healthcare system for Americans cannot be managed single-handedly by an already-busy government. That is the part where private companies offering healthcare services enter the subject. Unfortunately, Fran Baum suggests that â€Å"the privatization of health services† has effectively â€Å"reduced access to healthcare for poorer people† inasmuch as it has also â€Å"reduced the likelihood of universal health services that offer equitable access to health services† . The fact that the resources of America are limited and that these resources should be properly allocated means that a large chunk of the national budget spent on a universal healthcare alone would create an economic imbalance, an event which is not within the top priorities of democrats. Obama’s plan with regard to the national economy, on the other hand, zeroes in giving tax reliefs to the middle class Americans. Obama’s plans to give tax reliefs of approximately $1,000 for middle class Americans is based on the observation that wages have remained significantly stagnant while the steady rises in the prices of commodities have eaten a large part of the budget of Americans. By trimming the taxes of middle class Americans which comprise the larger fraction of the nation, Obama expects that middle class will be given more purchasing power which in turn will translate to a revitalized economy. Although â€Å"the U. S. federal tax system is in reality a hybrid of an income and consumption tax, with some elements that do not fit naturally into either system† , Obama’s proposal makes it clear that every working family will be awarded tax reliefs whether or not they consume or spend too much, or they have a higher income in contrast to families of similar financial status. The fact that the U. S. federal tax system is a hybrid system suggests that a tax cut on healthcare may not easily meet its goals. To surpass the challenge of determining which part of healthcare—the ‘income’ part of the ‘consumption’ part—is to be deducted with tax is to surmount a hefty task. An analysis of the status of the national economy of America and its peripheries is just one approach in determining or predicting the outcome of the impending presidential elections. Apparently, technology also shares an equally important role in this national event, among others. Exit and public polls Frederic Solop maintains that the internet â€Å"has recently become an important part of the democratic process† . The fact that America is one of the top countries in the world which has the most number of people who are connected to the internet makes the country more susceptible to the changes in the online industry. The online industry has also been equally strong in influencing the media, and as we know if it, the broadcasting media has its own role in forecasting the presidential elections. Exit polls are being used by several media networks such as CNN and Fox New Network as basis for their elections forecast. Since these television networks have a broad range of reach, it is not a farfetched idea that the observations derived by these networks from the exit polls contribute to the ways in which the voters are able to decide on their presidential candidate. Exit polls are essentially public polls and this fact essentially gives the impression that the behavior of public opinion based on these exit polls is as close to the results of the presidential race as it can get. Of course, there are a number of exceptional cases such as the margin of error, usually at about 4 percent plus or minus, which can overturn the forecasted results assuming the difference in the rankings of the candidates are close to 2 to 4 percent. Add up to the forecasting use of exit polls the role of the media in actually transmitting these polls across the nation. The Fox News Network previously included in its broadcast of the polling results in the different parts of America prior to â€Å"Super Tuesday† a partition of the various factors that led to the polling results. For instance, the analysis on the exit polls released by Fox News included a subdivision of the voting preferences which the network later used to arrive at certain observations such as how blacks voted in favor of either Clinton or Obama, or as to how women preferred Clinton over Obama and vice versa. Fox News also had forecasts on the presidential elections based on public opinion which includes but is not limited to: the effects of Bill Clinton’s attitude towards the media in relation to Hillary’s performance in the election race, how the public views the gender and racial issues being infused into the elections, and the perception of the public concerning the personal attacks of the Clinton and Obama camps to one another. All of these things and a lot more have effects on the voting preference of the public. Public opinions by any media network transmitted via the internet or through live broadcast are just some of the ways in forecasting the presidential elections. Bellwether states Bellwether states have become the center of attention of political analysts who cast their forecasts on the presidential elections. Although the states of Missouri, Nevada, Tennessee, Ohio and Delaware have produces different outcomes in the national elections, these states have merely missed quite a few instances of these electoral outcomes. It is for this reason that the belief in these Bellwether States as probable indicators of the next American President have remained since the early twentieth century. With regard to the Clinton-Obama presidential campaign, it can be said that these Bellwether States pose a certain bearing on the outcome of the elections. If either one of the two democratic candidates are able to win in these states, it can be considered that they may have already won the presidential elections. Yet this may simply be not the case, as the certainties of the current presidential race are yet to be seen. If one is to delimit the considerations for presidency in terms of these states, then it can also be argued that the democratic winner in these Bellwether States has a higher chance of succeeding in the elections. However, the performance of Obama and Clinton in the various polls and the widely divided expert opinion on their presidential campaigns draws more and more uncertainties. If indeed the larger streams of factors are to be considered, the Bellwether States have very minimal bearing on the outcome of the presidential elections. In fact, these states have a disparity in terms of the outcome of the national elections. While Obama and Clinton won two of these five states each, with the remaining to be decided sometime this February, it appears that there are further uncertainties that remain to be resolved in the coming days. Expert opinion In terms of expert opinion, it would be no surprise to have a division among these opinions because it is quite difficult to share personal views even when based on facts without having an inclination to infuse certain ideologies which border on the side of either Obama or Clinton. Expert’s opinions nevertheless do hold certain grounds, and the weight of their merit resides more or less on the experiences and background of the ‘expert’. Political experts who both argue against and argue with the democrats, and with or against either Obama or Clinton, have credibility in their insights largely because of what they have contributed to American politics, especially in forecasting the presidential elections. As for the Obama-Clinton presidential campaigns, these experts are equally divided as well.The only similarity that one may see among them is their fervent desire to draw their forecasts on the elections. Bibliography Baum, Fran. Primary Healthcare: Can the Dream Be Revived? Development in Practice 13, no. 5 (2003): 517. Gordon, Roger, Laura Kalambokidis, Jeffrey Rohaly, and Joel Slemrod. Toward a Consumption Tax, and Beyond. The American Economic Review 94, no. 2 (2004): 161. Solop, Frederic I. Digital Democracy Comes of Age: Internet Voting and the 2000 Arizona Democratic Primary Election. Political Science and Politics 34, no. 2 (2001): 289.

Saturday, October 26, 2019

Unity Amid Diversity Essay -- essays papers

Unity Amid Diversity The 1950’s and 1960’s was a dawning of a new age. Many changes were occurring within America’s society. Segregation was prominent with the passing of Plessy vs. Ferguson, however, the Jim Crow laws of the south were being challenged. Negroes in the south wanted equality and justice. The nation was in need of an ethic of caring and a solid identity of what it meant to be an â€Å"American.† With the war in Vietnam and the war for equality, people were fed up with all of the hate. The public cried, â€Å"Make love, not war (Tallulah).† During this time of hardship, the Civil Rights Movement introduced us to many influential Americans that helped make equality possible and also made everyone proud to be American. From the famous court case of Brown vs. Board of Education and the refusal of Rosa Parks to the ideas and actions of Martin Luther King, Jr., Malcolm X and Anne Moody, equality emerged in the United States and a positive, patriotic and respectful outlook was placed on what it is to be an â€Å"American.† The Civil Rights Movement was like a time bomb waiting to go off. African-Americans throughout the south looked at each other as if saying, â€Å"wait, just wait.† Surprisingly, the initiation came from a young, black girl who had to travel several miles to attend a segregated school even though she lived right next door to a white elementary school. This famous court case, known as Brown vs. Board of Education, determined that segregation in public schools based on race was unconstitutional. This decision was the result of decades of efforts by black segregationist opponents. With black and white children attending the same schools, having equal opportunities elsewhere became increasingly desirable. It was during this period of waiting that a petite, middle-aged woman named Rosa Parks was the person to officially begin the fight for racial equality in America. On the afternoon of Thursday, December 1, 1995, Mrs. Parks refused to give up her seat on the bus to a white man and was arrested. This simple action of dominance and defiance began one of the most important struggles in American history. As the small yet strong-willed woman was hauled off to jail, word of her refusal spread throughout the country. People of all races and ages were inspired by her actions and the news traveled through telephone lines and word of mout... ...to every privilege, law and punishment. We, black and white, attend the same schools, churches and shop in the same grocery stores; we live in the same neighborhoods and swim in the same pools. America is the diverse yet unified country that it should be. As a result of the success of the movement, the rest of the world admires the U.S. and what it stands for. Without the leaders of the Civil Rights Movement, who knows where we would be in the world society. I wonder. I really wonder. Works Cited 1.â€Å"1963.† http://net4tv.com/color/60/16Bombing.htm Copyright 1997, Iacta IIC, (22 April 1999) 2.Cohen, Jeff and Norman Solomon. â€Å"The Martin Luther King You don’t see on TV.† http://www.fair.org/media-beat/950104.html (27 April 1999). 3.Dancier, Tallulah. â€Å"Dawning of an Age.† http://net4tv.com/color/60/60about.htm Copyright 1997, Iacta IIC, (22 April 1999) 4.Haley, Alex. â€Å"The Autobiography of Malcolm X.† New York: Ballantine Books, 1965 5.Moody, Anne. â€Å"Coming of Age in Mississippi.† New York: Bantam Doubleday Dell Publishing Group, 1968. 6.Robinson, Jo Ann Gibson. â€Å"Excerpts from the Montgomery Bus Boycott and the Women who Started it.† Primis.

Thursday, October 24, 2019

Err Booklet

ERR Booklet Task A – Short Answer Questions Ai – Imagine you are a newly appointed supervisor/manager within your service. You need to update your staff handbook to reflect current employment law. Identify three different sources of information you could use to enable you to do this. Direct. gov website Citizens advice Existing company handbook Aii – List three aspects of employment covered by law Work Conditions (safety, discrimination, accommodation, etc. ) Wages Hours ) List three main features of current employment legislation. Minimum wage Training Holiday entitlements Aiii – Briefly outline why employment law exists. Employment law exists to safeguard the interests of both employers and employees. We understand that this particular area of law is continually developing and it is of critical importance to keep abreast of evolving legislation. Bi – Describe the terms and conditions of your employment as set out in your contract of Employment or employment agreement )Job description – defining the role, responsibility level (eg Manager, Deputy Manager, Assistant etc). It might include limits on decision making/to whom one reports/is supervised by. 2) Entitlement – rate of pay, holiday entitlement, retirement and ill-health benefits, bonus/overtime rates, uniform and/expenses allowances, canteen facilities, etc. 3) Responsibilities: working hours, dress code, reporting illness/absence, annual assessments, complaints procedures, notice periods for leaving/dismissal, requirements to change working hours. )General: Depending on the type of job, there might be other conditions restricting the employee taking other part-time work, confidentiality clauses, using company equipment for private use (eg phones, computers, vehicles) general codes of behaviour and adherence to certain corporate practices, health & safety regulations, etc. The actual format of the contract will vary from company to company. Some will cover more general matters in a Staff Handbook which the employee is required to read and confirm he/she has done soBii – Describe the information which needs to be shown on your pay slip/statement: Employee’s name Tax code National Insurance Nett pay Payment of overtime, bonus’s or tips Date Company name Payment method Payment period Biii – Identify two changes to personal information which you must report to your employer. Address Bank detail Biv – Describe the procedure to follow if you wanted to raise a grievance at work. You may describe this in writing or produce a flow chart or diagram. 1) Firstly, write to your employer setting out all the details of your grievance. ) Meet with your employer. Your employer should then arrange a meeting to discuss your issue and look at possible resolutions. It is your legal right to take a companion to this meeting, such as a colleague, a trade union representative or trade union official. This companion may spea k on your behalf, but may not answer questions on your behalf. 3) Appeal your employer's decision. After the meeting has taken place, your employer should write to you in a timely fashion with a decision on how your rievance will be resolved. If you are unsatisfied with this decision, then you have the right to appeal. This appeal should again be made in writing, and your employer must arrange another meeting. Bv – Explain the agreed ways of working with your employer in relation to the following areas: Without a job description how would you apply for a job, both you and your employer need to know the perimeters that you will work to be able to determine: the responsibility; the type and class of work you will do and pay scales.Unions will always never agree to working conditions that are not safe or health and safety valued,, however, the employer has a right to expect that when you are working in a firm that your time is productive so implementing ways of working by the us e of ‘Time and Motion' studies is not regarded as being taboo. That is why it is essential that there is communication between employer and employee or the employee's representative, the Union.

Wednesday, October 23, 2019

Life of a Slave Girl Essay

Harriet A. Jacobs Incidents in the Life of a Slave Girl is an autobiography written under the name of Linda Brent. This autobiography is a detailed account of her life or lack thereof. I use the term lack thereof because Harriet Jacobs was raised by her grandmother due to her mother dying at a young age. Harriet was taught to read and write as a young slave girl by her mistress. Harriet’s grandmother was a well-respected older slave woman who gained her freedom in the last will and testament of her mistress. Jacobs is determined not to be raped or surrender all her rights to anyone. Jacobs didn’t know she was a slave until she was almost a teenager. Her mother had passed away and the sad reality of her life as a slave sunk in. Harriet was raised to possess great moral character and virtue. During this time in history black women were â€Å"slaves of a slave† (Beal p.13).Frances Beal made that observation due to black women being subservient and degraded by their slave owners and their black men. Not all slave owners allowed their slaves to marry. With that in mind black women often were used and misused by their own race and their masters. Jacobs displays great determination to remain true to chastity despite constant stalking and demeaning remarks by Dr. Flint. In 1842 Harriet Jacobs escapes to freedom, this was at a great price she gave herself willing to the unmarried lawyer next door and bore him two children. Jacobs hid in a 3foot crawl space at her grandmother’s home for seven years. There was no light or room for her to stand up in that small space. Mice and insects crawled on her body and she hid there to avoid Dr. Flint. Jacobs’s story is a testament to what determination and a strong will can produce. Jacobs’s construction of black female empowerment was openly displayed throughout her story. She did not allow intimidation to prohibit her from believing in the hope that she was more than a slave. Harriet displayed this attitude in all that she did she stayed one step ahead of Dr. Flint. To talk of the brutality that was perpetrated by slave owners on slave girls and women was taboo. Not only was it taboo but it was also unheard of. Harriet Jacobs was given a strong will and mind by God. She added to what God gave her by taking the advice of her grandmother. During this time in history black women were raped, molested, tortured, degraded and exploited economically. Black women worked on plantations picking cotton, cooking and cleaning their homes and nursing the mistress babies while most times their children were neglected. There was no possible way you had a right because you were property and property can’t own property (Jacobs). Dr. Flint told Harriet she was made for his use, made to obey his command in everything; that she was nothing but a slave, whose will must and should surrender to his (Jacobs). Harriet would not accept those words. Harriet would not accept that sentence he pronounced on her life. Jacobs knew she had a brain and could think for herself and despite what society had dictated to her race and to black women she would help to free other black women. The United States grew on the backs of slaves male and female. Yes our men suffered great injustices. However, our black women suffered also. There is yet a debate for some as to who suffered the most during slavery. I will say this as a people we have suffered tremendously. There are no words that can replace the separation of families. The loss of parents and children who would die trying to purchase a child that God had allowed them to birth. If you birth a child isn’t that child yours? According to slave rules and regulations slaves were nothing and if a slave girl gave birth to a child that was the master’s she could not tell a soul. Not even the black man who she tried to make believe that he fathered the child. If the slave told that the child was the master’s she could be killed, sold or imprisoned (Jacobs). Certain black men are maintaining that they have been castrated by society but that black women somehow escaped this persecution and even contributed to this emasculation. The black woman had no protector and was used and in some cases, as the scapegoat for the evils this horrendous system has perpetrated on black men (Rubenstein). This statement rings true now as we look at the single parent homes of today. Today black women are yet subverting societal convention. We are yet rising above our current economic and socioeconomic status. In spite of great disadvantages and struggles black women are innovators. The black woman’s physical image has been distorted for societies view. We were called ‘mammies† From slavery through the Jim Crow era, the mammy image served the political, social, and economic interests of mainstream white America. During slavery, the mammy caricature was posted as proof that blacks — in this case, black women — were contented, even happy, as slaves. Her wide grin, hearty laugher, and loyal servitude were offered as evidence of the supposed humanity of the institution of slavery (Ferris). The mammy caricature was deliberately constructed to suggest ugliness. Mammy was portrayed as dark-skinned; often pitch black, in a society that regarded black skin as ugly, tainted. She was obese, sometimes morbidly overweight. Moreover, she was often portrayed as old, or at least middle-aged. The attempt was to desexualize mammy. The implicit assumption was this: No reasonable white man would choose a fat, elderly black woman instead of the idealized white woman. The black mammy was portrayed as lacking all sexual and sensual qualities (Ferris). This was a well calculated plan executed by the white slave owners. This was done to provide a false sense of security to the white woman. Mammy was some bogus reassurance that their ideal life style was not in danger of being destroyed. Harriet was able to expose this injustice through her writings. Jacobs’s writings were shared with whites and blacks. Exposing the dark pit of slavery and his secrets is what Harriet Jacobs and several other noteworthy African American literary abolitionists did. Their writing was productive and powerful. Their writings provided hope to other black people who dared to even dream of freedom. African American women suffered hardships of oppression and yet while being oppressed and depressed black women were inspired to write. They were compelled to share their story with others. Although, the recollection of the events that shaped their lives was not pleasant memories; they knew they could not remain silent. They knew that they had to tell the story in hopes and saving their race. My people perish for a lack of knowledge (Hosea 4).Knowledge of what was exactly going on in the deep dark south would hopefully and eventually save lives. Spreading the truth about slavery would expedite freedom for the black race. During slavery it was also believed that black slave girls were promiscuous this undoubtedly was another untruth placed upon the black race. However, this untruth was widely used as an excuse to sexually exploit the black female. This is what was used as the carte blanche to allow more evils upon the black slave girl. Black women continued to be oppressed for many years because society would not see black women as citizens. The de-eroticism of mammy meant that the white wife — and by extension, the white family was safe. The sexual exploitation of black women by white

Tuesday, October 22, 2019

Ampicillin Resistance essays

Ampicillin Resistance essays The purpose of this lab experiment was to see if a person could use a plasmid (R plasmid) vector containing certain fragments of foreign DNA for ampicillin resistance to be used to transform E. coli (Escherichia coli) cells to give the E. coli cells ampicillin resistance. Ampicillin resistance is needed in order for the E. coli to have the ability to survive in an ampicillin environment. Plasmid is a small ring of DNA that carries accessory genes separate from those of bacterial chromosome. Ampicillin is an antibiotic that is derived from penicillin that prevents bacterial growth by interfering with cell wall synthesis. E. coli is a commensal bacterium inhabiting the human colon that is widely used in biology, both as a simple model of cell biochemical function and as a host for molecular cloning experiments. In nature genes can be transferred between bacteria in different ways like transformation, conjugation, and transduction. One-way is bacterial transformation, it is when tr ansfer of genetic information into a cell by the direct uptake of the DNA. Then the DNA is used to transform the cells from the original DNA to take a certain trait. How ever these bacteria can take up DNA only during the period at the end of logarithmic growth. Conjugation is performed between to bacterial cells of different mating types and genetic information is exchanged between the two through pili. Transduction is conducted between two bacteria cells, but this process requires the presence of a virus that acts as a vector in the process. One could hypothesize that plasmid would be able to successfully be incorporated in the E. coli cell. One would be able to see this by both agar plates without ampicillin and also the agar plate with ampicillin and plasmid would have bacteria growth. However the agar plate with ampicillin, but no plasmid will have no bacteria growth. One could hypothesize this because if the plasmid were incorporated into the ...

Monday, October 21, 2019

What is Senior Epilepsy †Health Research Paper

What is Senior Epilepsy – Health Research Paper Free Online Research Papers What is Senior Epilepsy Health Research Paper Senior Epilepsy has just become a common thing in seniors in the past ten or so years. Epilepsy it self isn’t deadly but it can be in some situations. Most people that have epilepsy or that know someone that does really don’t understand what it is. Basically it is when an elderly person becomes confused, dizzy or kind of forgets things that seem obvious. People around this can think that it is just something that is happening because they are getting old and that’s what happens when your old. Well, that may not be what is happening (healthology). Epilepsy in seniors is becoming more common all the time, around eighty to one hundred and twenty three cases in every one hundred thousand people. Though this sounds low, Alzheimers affects about one hundred and two people for every one hundred thousand so it’s fairly high (healthology). Symptoms of epilepsy are very noticeable. They can be anything from confusion to passing out in front of you. Other things can be brief but non normal gaps while they are talking in a conversation. The most noticeable thing is when a senior will be walking across a room and then just pass out and fall over. When this happens u should try and lay them on their side so that way their tongue is out of the way of the air passage. You shouldn’t worry at this point they will always start to breath again even though it is very nerve racking. After doing this you should call the police and they will send more help for you. Sometimes you will be carrying on a very normal conversation with someone with senior epilepsy and while they are talking they just stop for no apparent reason. This may be for a second or two or up to a full minute. The only thing you can really do in this situation is pretty much snap them out of it. Other than that you are helpless at doing anything for them (epi lepsy1). There are ways you can protect people with seizures. Putting padding around the corners of tables and chairs is a smart thing to do in case of a fall. A type of code could also be useful for your neighbors. Say opening the blinds and then shutting them at a certain time of the day will let them know that you are still ok (epilepsy1). Since you can not feel anything during a seizure you have to take extra precautions to make sure your safer in the case that u have a seizure. Probably the best thing that you can do is not smoke. Smoking leads to other worse health problems anyway and if you have a seizure while smoking you could actually suck the cigarette into you mouth which would cause very bad burns. Also having a seizure while smoking could cause a fire is the cigarette lands on something flammable which wouldn’t be good (epilepsy1). People who have had a seizure should keep the water levels in the bathtub low. In the case that the person has a seizure the body could sink down into the water and then you would just breathe in water and drown. It is recommended that a shower is taken if the person has the energy to do so (epilepsy1). If you have a fire place always keep a screen in front of it. In the case that you pass out and fall you are going to want something to keep you from falling into the fire. You should also never carry the hot ashes of a fire to the trash can. You falling on them could result in very serious burns which would not be very good. You should also try not to play in the fire while you have senior epilepsy. This can be dangerous on its own little lone with u right next to it poking at it with some type of stick (epilepsy1). Though it may not taste as good try to use a microwave instead of a stove for cooking your food. This will be much better for the food to become cold in the microwave while your passed out rather than it keep cooking and maybe start a fire in your kitchen. This is also safer for you in case you would happen to fall over onto the hot stove. Since they have no device to turn off when a timers not set you could be what’s cooking dock (epilepsy1). Try to keep the water temperature on the water heater low enough that its still warm but not hot enough to scald you. This will be much better in low level bathtub waters and wont turn you into a soggy mess. It is always good to keep the temperatures low for when your just washing dishes to so not to scald your self (epilepsy1). Seniors with senior epilepsy sometimes have mood swings seem depressed, or can’t remember things. This may not be because they are getting old. Seniors who are being treated for epilepsy may become like this because of the toxicity in some of the medications they have to take. This is because it takes longer for them to process the medication and get rid of it from their bodies (epilepsy1). Seniors being treated may also be taking other medicines besides the ones for epilepsy. If this is the case then those other medications may interact with the epilepsy medication. This can cause negative side affects or can reduce the good of the medicine. Different epilepsy drugs can interact with each other to causing the medication not to work properly. Doctors are responsible for taking you off medications that can react with the epilepsy medication and might advise you not to take them any more or switch you to a different kind (epilepsy1). Driving is another big issue with epilepsy. In the occasion that you were to pass out while driving would be a very bad thing. Depending on what state you are in will decide on how long you are to be with out a license. You will always get your license taken away for a brief period of time. This is just for safety precautious. It is usually anywhere from three months to one year. After this period of time you will return to the doctor and then will be decided if you are able to drive. In the case that you can’t, moving to an apartment complex or neighborhood with transportation is advised (epilepsy1). There are many different medications out there for epilepsy but some are better than others and choosing which one you would like your doctor about is hard. Once you start taking the medication you should never over dose or skip a medication taking. There are many ways to not forget to take your medication. Try using divided, labeled pill containers. If you cant find one with the right label simply label it your self. It isn’t so hard to just get some tape and put it on a plastic container telling you when you can take it. Try wearing a wrist watch with a timer set to go off when you are to take you pills. This is probably the easiest as long as you can still hear fairly well. Simply make taking your medication routine. Take the pill to the breakfast table or to supper with you that way you know to take it. Make a schedule of when to take your pills. Just like your children did with their chores this will remind you what your suppose to take and when to take it (epilepsy2). People can have a hard time dealing with epilepsy. Loved ones should always be there for them when they need it but try not to push them to much for it will make them feel helpless about their selves. Seniors should also talk to their doctors about any problems they have with the epilepsy it self and with the medication that goes along with it. Even though it may seem very hard, dealing with epilepsy isn’t as bad as it sounds. It can be very frustrating at times but remember that it can pass if you treat it right (epilepsy2). Research Papers on What is Senior Epilepsy - Health Research PaperLifes What IfsThe Hockey Game19 Century Society: A Deeply Divided EraHonest Iagos Truth through DeceptionEffects of Television Violence on ChildrenWhere Wild and West MeetThe Spring and AutumnResearch Process Part OneGenetic EngineeringThe Effects of Illegal Immigration

Sunday, October 20, 2019

The Harris Matrix Tool Used to Comprehend the Archaeological Past

The Harris Matrix Tool Used to Comprehend the Archaeological Past The Harris Matrix (or Harris-Winchester matrix) is a tool developed between 1969-1973 by Bermudian archaeologist Edward Cecil Harris to assist in the examination and interpretation of the stratigraphy of archaeological sites. The Harris matrix is specifically for the identification of both natural and cultural events which make up a sites history. The construction process of a Harris matrix compels the user to classify the various deposits in an archaeological site as representing events in the lifecycle of that site. A completed Harris Matrix is a schematic that clearly illustrates the history of an archaeological site, based on the archaeologists interpretation of the stratigraphy seen in the excavations. The History of an Archaeological Site All archaeological sites are palimpsests, that is to say, the end result of a series of events, including cultural events (a house was built, a storage pit was dug, a field was planted, the house was abandoned or torn down) and natural events (a flood or volcanic eruption covered the site, the house burned down, organic materials decayed). When the archaeologist walks onto a site, evidence of all those events is there in some form. The archaeologists job is to identify and record the evidence from those events  if the site and its components are to be understood. In turn, that documentation provides a guide to the context of the artifacts found at the site. Context means that artifacts recovered from the site mean something different if they are found in the construction foundations of the house rather than in the burned basement. If a potsherd was found within a foundation trench, it predates the use of the house; if it was found in the basement, perhaps only physically a few centimeters away from the foundation trench and maybe at the same level, it postdates the construction and may be in fact from after the house was abandoned. Using a Harris matrix allows you to order the chronology of a site, and to tie a particular context to a particular event. Classifying Stratigraphic Units to Context Archaeological sites are typically dug in square excavation units, and in levels, whether arbitrary (in 5 or 10 cm [2-4 inch] levels) or (if possible) natural levels, following the visible deposit lines. Information about every level that is excavated is recorded, including depth below surface and volume of soil excavated; artifacts recovered (which could include microscopic plant remains discovered in the laboratory); soil type, color and texture; and many other things as well. By identifying the contexts of a site, the archaeologist can assign Level 12 in excavation unit 36N-10E to the foundation trench, and Level 12 in excavation unit 36N-9E to the context within the basement. Harris Categories Harris recognized three types of relationships between unitsby which he meant groups of levels which share the same context: Units which have no direct stratigraphic correlationUnits which are in superpositionUnits which are correlated as parts of a once-whole deposit or feature The matrix also requires that you identify characteristics of those units: Units which are positive; that is to say, those that represent the upbuild of material to a siteNegative units; units such as pits or foundation trenches which involved the removal of soilInterfaces between those units History of the Harris Matrix Harris invented his matrix in the late 1960s and early 1970s during post-excavation analysis of site records from the 1960s excavation at Winchester, Hampshire in the UK. His first publication was in June 1979, the first edition of The Principles of Archaeological Stratigraphy. Originally designed for use on urban historic sites (which stratigraphy tends to be horrendously complex and jumbled), the Harris Matrix is applicable to any archaeological site and has also been used to document changes in historical architecture and rock art. Although there are some commercial software programs that assist in building a Harris matrix, Harris himself used no special tools other than a piece of plain gridded papera Microsoft Excel sheet would work just as well. Harris matrices may be compiled in the field as the archaeologist is recording the stratigraphy in her field notes, or in the laboratory, working from notes, photos, and maps. Sources Barros Garcà ­a JMB. 2004. The Use of the Harris Matrix to Document the Layers Removed during the Cleaning of Painted Surfaces. Studies in Conservation 49(4):245-258.Harris EC. 2014. Principles of Archaeological Stratigraphy. London: Academic Press.Harris EC, Brown III MR, and Brown GJ, editors. 2014. Practices in Archaeological Stratigraphy: Elsevier.Higginbotham E. 1985. Excavation Techniques in Historical Archaeology. Australian Journal of Historical Archaeology 3:8-14.Pearce DG. 2010. The Harris Matrix technique in the construction of relative chronologies of rock paintings in South Africa. The South African Archaeological Bulletin 65(192):148-153.Russell T. 2012. No one said it would be easy. Ordering San paintings using the Harris matrix: dangerously fallacious? A reply to David Pearce. The South African Archaeological Bulletin 67(196):267-272.Traxler Ch, and Neubauer W. 2008. The Harris Matrix composer, a new tool to manage archaeological stratigraphy. In: Ioannides M, Addiso n A, Georgopoulos A, and Kalisperis L, editors. Digital Heritage, Proceedings of the 14th International Conference on Virtual Systems and Multimedia:  Cyprus. p 13-20. Wheeler K. 2000. Theoretical and Methodological Considerations for Excavating Privies. Historical Archaeology 34:3-19.

Saturday, October 19, 2019

Labor studies Research Paper Example | Topics and Well Written Essays - 2000 words

Labor studies - Research Paper Example The body gets into the resolution of disputes over the foreign market access and on the issues that influence the trade patterns between the signatories (Howse 134). All these are done with the intent of improving the lives of the people in these regions through free and fair trade between the countries. The objective to improve the lives of people on the trade links and platforms by the WTO are based on the efforts to ensure full employment to the people and regulation of the labor standards. The body was formed by the world laborers who wanted to improve the living standards of the workers through the establishment a candid and sound body to advocate for the rights of the laborers. The WTO has the power to review the laws of a nation which promote the unfair treatment of the workers. These laws are reviewed and various issues addressed so that the workers’ rights are advocated for. Through this mechanism, the WTO advocates for the lower wages for the workers. The organization also strives to meet the demands of the laborers on the issues linked to the labor rights and the free trade agreements and negotiations (Howse 131). Ideologically, it is proved to be wrong and unfair when the producers of the developed industrial countries compete with the imports from the nations with the low wage rates and poor labor standards. The economic effects of the unfavorable competitions are likely to lead to comparative disadvantages to the low wage-rates countries and their workforce. The general objective of the WTO in relation to the improvement of the living standards of the workers has been met through a number of actions in trying to protect the rights of the workers (Powell 91). The World Trade Organization has used the following strategies to realize the objective of creating the conditions of lower wages and the improvement of the lives of workers worldwide: The linking of labor rules is a method that has been used by the WTO to improve the

Communism vs. Capitalism. My Ideal Government System Essay

Communism vs. Capitalism. My Ideal Government System - Essay Example The essay also shows the opinions of prominent figures of politics and economy regarding each government system. Both systems are compared on the basis of education, economy, employment and health standards. The bibliography comprises 6 sources. The most recent one published 2010. Introduction. Communism is a form of government where the resources and the means of production are controlled by the society and the government is headed by one party or the communist party. It was an idea developed by Karl Marx and supported by Stalin and others. For Marx, an ideal government was the one that ensured equality to all members of society without classes. Before then, the economy was controlled by the businessmen and factory owners commonly referred as bourgeoisies whose aim was to make a profit at the expense of the poor farmers who were referred as the proletariat. Capitalism, on the other hand, is characterized by the existence of classes in the society. The means of production is controlled by private individuals who own private property and the government is democratic in nature. The market forces determine what is to be produced and who is to consume the products depending on the wealth of individuals. The private owners thus make huge profits and invest it in machinery and more business investments while the poor continue being poor as they can’t afford to buy goods. A wide gap, therefore, exists between the rich and the poor in the society (Grant & Vidler, 19-25). Communist government is thus preferred as it reduces inequalities and classes in the society and is effective in transforming backward economies. A capitalist system of government is a free market economy where price of products is determined by market forces. The market also allocates the resources to members of society depending on one’s income. The government does not intervene in controlling the prices. In this situation, the owners of property whose aim is to maximize profit may set high prices for products or make goods unavailable so as to control demand and in turn raise prices. The poor consumers are therefore forced to cut consumption of some goods as they cannot afford leaving them to the rich t hus widening the gap between the rich and the poor. Inflation is inevitable due to rise and fall in prices of goods and services (Grant & Vidler, 22). On the other hand, a communist system of government is controlled by the state. It is a command economy where prices are determined by the government thus inflation is controlled. The state also distributes goods and services equally to the society (Schwartz, 292). The resources are distributed according to needs of each individual hence no chance of creating income and wealth inequalities in society; it exercises fairness and equality. The capitalist system is driven by self interest of the actors in the economy. Due to profit maximization objective by businessmen, they are not able to provide essential goods and services that do not make profit such as education and health (Grant, 6). On the other hand, the communist state is involved in provision of resources to all. It thus provides public and merit goods to the society among othe r goods hence individuals in a communist economy benefit from improved public transport, education, and health among others (Leslie, 223). The state also subsidizes basic foodstuffs thus making them affordable to all members of the society unlike in capitalist states where one’s income determines the bundle of goods to buy. Schwartz (292) argues that individuals in a communist state work according to ability. Thus, each individual who is of working age is given a job depending on the skills he/she possesses but the resources obtained are shared among the society according to the needs of each household. The economy hence operates at near or full employment, unemployment

Friday, October 18, 2019

Trading Simulation Report Essay Example | Topics and Well Written Essays - 2500 words

Trading Simulation Report - Essay Example A portfolio once built and left alone is of no use. Hence, I have decided to carry out a trading simulation and an in depth analysis of the four companies that have been chosen by me. As all four of these companies provide different products and services, it is almost obvious that different returns are expected from each of these companies. Although the portfolio had been developed keeping in mind mainly the long term aspects but analysing it a short term may give us an insight about the future. The four companies that had been considered, along with an introduction and a summary of their latest performance, are: Johnson & Johnson Pfizer Exxon Mobil Walmart Johnson & Johnson Johnson & Johnson is a multinational U.S based company. It was founded in 1886. It deals in pharmaceutics, medical devices along with the manufacturing of consumer packaged goods. Johnson & Johnson comprises of One of the world’s biggest and diversified medical devices company The 6th biggest company with respect to biologics and also with respect to consumer health. Ranked 8th with respect to the world’s biggest pharmaceutics company The headquarters of Johnson & Johnson is situated in New Brunswick, which is in New Jersey USA. The Johnson & Johnson family includes around about 275 operating companies around the globe. Johnson & Johnson employees around about one hundred and twenty eight thousand people in more than sixty countries. Pfizer Pfizer was founded in 1849. Its founding members included two cousins, namely, Charles Pfizer and Charles Erhart. Pfizer is the biggest pharmaceutical company with respect to the revenue it generates. Its headquarters in based in New York, USA while the headquarters of its research program is in Connecticut, USA. Although it has many research facilities around. Pfizer has acquired many renown and established pharmaceuticals on its way to success. The companies acquired include Pharmacia and Wyeth. The latter at its time, 2009, was considere d as the biggest merger since the Bellsouth and AT& T in 2006. Exxon Mobil Exxon Mobil is a Multinational oil and gas company based in USA. Its headquarters is in Irving, Texas. Exxon Mobil was actually formed through merger of Exxon and Mobil in1999. Exxon Mobil is believed to the world’s biggest traded company publicly in the field of Oil and Gas. Walmart The home office of Walmart is situated at 702 SW 8th Street Bentonville. Walmart is a multinational retail company. It basically operates through warehouses and departmental stores. It has around about 10,800 stores across 27 countries. It also operates through websites in 10 countries. It employees above two million people worldwide and is considered as the largest employees recruiting worldwide. It is also estimated that around about 245 million people visit its outlets worldwide on a weekly base. The company was founded in 1962 and is now the largest retailer of USA. Recent Performance According to the first quarter rep orts 2013 of Pfizer Profit of Pfizer has seen an increase of about 53%, that is, an increase from 1.78 billion dollars to 2.75 billion dollars a year before. Earnings per share experienced an increase of 14 cent from a year ago, that is, from 24 cents to 38 cents Adjusted earnings saw a decrease of 3 cents as compared to a year

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING Essay

CAN ALERTNESS OF EMPLOYEES SAVE ORGANISATIONS FROM HACKERS USING SOCIAL ENGINEERING FOR CYBER ATTACKS - Essay Example In their actions, hackers in the contemporary society use the most sophisticated of malware to attack information systems and networks in ways never seen before. Nevertheless, the initial role of social engineering in these attacks is core and cannot be overlooked due to the technologies used. Social engineering is hackers’ equivalent of a con or a trick, which makes the target people or systems to think someone, something or an action, is safe, trustworthy and familiar while in reality it is not (Kiountouzis & Kokolakis, 2011). The most common of social engineering con tricks often involve the hacker sending an e-mail to the target person or system. This e-mail if first tailored so that it appears to have come from a trustworthy sender. However, these con e-mails often contain links that when opened or clicked, directs a computer to a malware, which is in turn downloaded by the user on the target computer or system (Kiountouzis & Kokolakis, 2011). At this stage, the hacker em ploys the Remote Access Tool (RAT) to search through the computer network and/or infect other computers or networks. Social engineering is today exploited by hackers to bring down or access others’ computer/information networks and obtain information in the comfort of their homes provided they are sure their target will most likely be sitting at their computers (Kiountouzis & Kokolakis, 2011). ... This paper explores the various types of cyber and security threats to which information and technology companies and there ISs are exposed and the role of employee alertness in averting these threats, particularly those originating from hackers’ using social engineering. In this regard, the paper is a case study of an information security breach at one of the most renown IT security firms in the United States, the RSA. After addressing how RSA responded to the breach, the paper explores the role of employee alertness in averting such threats in the future. However, it is of the essence to first have a general understanding of the various techniques that hackers use to breach information security systems and obtain information illegally. The Protection Motivation Theory This paper will employ the protection motivation theory to explain the role and importance of employee alertness in assisting IS firms in detecting and preventing security breaches via social engineering techni ques. According to this theory employees will always protect themselves based on certain core factors. These factors include but are not limited to the probability of the occurrence of a security threat or breach, the suspected or expected severity of the threat, the vulnerability of the possible victims, the efficacy of the response/preventive mechanisms or behaviours. The motivation to protect oneself and property emanates from the evaluation of threats as well as the ability to cope with the threats or its effects. In the threat assessment context, employees of IS and IT companies are expected to be able to appraise the severity of possible social engineering threats and the seriousness of the situation once it occurs. On the other hand, the coping

Thursday, October 17, 2019

Bus 234 Quail P1 Essay Example | Topics and Well Written Essays - 250 words

Bus 234 Quail P1 - Essay Example All field agents have an educational background in environmental science while the accountant has an educational background in accounting. The mission of the business is to provide quality services in terms of advising clients on the best approach to designing and putting up infrastructure to allow minimization of environmental pollution in order to make the immediate surrounding healthier and friendlier. The business anticipates to add the number of clients through the field agents. The field agents interact with clients on site and may attract new clients from their code of conduct and interaction with existing clients on the ground. The company wishes to conduct a needs assessment to determine the necessity of training its field agents on the best strategies for winning prospective customers to utilize the business` services. As discussed in Altschuld and David (57), in order to determine the training needs, all the field agents were given questionnaires, which contained open-ended questions on a Likert scale. From the results obtained from the short survey, the field agents` rate of interaction with prospective clients is average since their interaction skills and convincing are also rated average. It is thus imperative for the Earthcare group to train its field agents on best skills and strategies of developing and sustaining good customer relationships in order to increase the customer base for Earthcare

Occupational health and safety ergonomics Essay Example | Topics and Well Written Essays - 500 words

Occupational health and safety ergonomics - Essay Example e practices later on, the history of safe working can be traced back to the ancient times when the need was felt for creating the tools in a manner that provided ease of use and comfort while operating them. In one of the ancient records, Bernardino Ramazinni, who was associated with the field of medicine, brought up working class and the problems faced by them in their surroundings (McCauley & Bush, 2011). At that time, however, the word â€Å"ergonomics† was not introduced. The official usage of this word can be stretched back to mid 19th century; it was a contribution by Wojciech Jastrzebowski and Frederick Taylor, who not only introduced it but also implemented its principles (Schlick, 2009). In modern times, the routes of ergonomics can be traced back to the mid 20th century when K.F Murrell introduced this word for the first time. Each of the two world wars the 20th century saw can be linked to the use of ergonomics in the field of machinery and war crafts. After the Second World War, the pace of improvement and nourishment in the incumbent field took pace, and new techniques were introduced for comforting the fields in any way possible. Since then, the discipline of ergonomics has never looked back; in modern times, all major organizations ensure that their employees work under the umbrella of ergonomics. The implementation of ergonomics has yielded many dividends. Its application is not limited to one particular field; rather, ergonomics is implemented in nearly every organization and every industry. It enables improving the working methods and further enables satisfaction of the employees, which is directly related to the customer response and company productivity. OSHA is an acronym for Occupational Safety and Health Administration, and it is a federal agency which is specialized in dealing with safe practices in regard to physical health and the dangers threatening it. It provides a set of guidelines, necessary dos and don’ts of practices in the

Wednesday, October 16, 2019

Bus 234 Quail P1 Essay Example | Topics and Well Written Essays - 250 words

Bus 234 Quail P1 - Essay Example All field agents have an educational background in environmental science while the accountant has an educational background in accounting. The mission of the business is to provide quality services in terms of advising clients on the best approach to designing and putting up infrastructure to allow minimization of environmental pollution in order to make the immediate surrounding healthier and friendlier. The business anticipates to add the number of clients through the field agents. The field agents interact with clients on site and may attract new clients from their code of conduct and interaction with existing clients on the ground. The company wishes to conduct a needs assessment to determine the necessity of training its field agents on the best strategies for winning prospective customers to utilize the business` services. As discussed in Altschuld and David (57), in order to determine the training needs, all the field agents were given questionnaires, which contained open-ended questions on a Likert scale. From the results obtained from the short survey, the field agents` rate of interaction with prospective clients is average since their interaction skills and convincing are also rated average. It is thus imperative for the Earthcare group to train its field agents on best skills and strategies of developing and sustaining good customer relationships in order to increase the customer base for Earthcare

Tuesday, October 15, 2019

International Accounting and Finance Essay Example | Topics and Well Written Essays - 2500 words

International Accounting and Finance - Essay Example Notwithstanding the concerns and prejudices, there has been noted an increasing trend towards adoption of international accounting standards as a preferred financial reporting framework. Among the concerns stated by the stakeholders to adopting international accounting standards, many are related to the impact of adopting them on capital markets operations and efficiency and on the users of financial statements. The International Financial Reporting Standards are different from the national standards developed by countries for financial reporting within their respective jurisdictions. These differences result in significant shifts in their financial reporting practices for business entities, when they decide on their own or due to mandatory requirements to adopt International Financial Reporting Standards as their financial reporting framework. Due to the differences in the respective requirements of different financial reporting frameworks, there are varying impacts of each on capit al markets and users of financial information. ... Impact of Adopting International Accounting Standards on Capital Markets The impact of adopting international accounting standards as a financial reporting framework can be determined by understanding the impact of adopting the international accounting standards on the efficiency of capital markets. Keeping in view the significant difference in reporting requirements under International Financial Reporting Standards and other national accounting standards, such as U.S. GAAP or other accounting frameworks, a general expectation can be developed that with the adopting of International Financial Reporting Standards, there will be a significant impact on the efficiency of capital markets. Researchers have investigated whether the impact caused by adopting International Financial Reporting Standards on efficiency in capital markets is positive or negative. Some researchers have noted that the impact of adoption of International Financial Reporting Standards on market can be measured throu gh variations in the market liquidity and the cost of capital for business entities. In this regard, Daske et al (2008) have noted that with the adoption of international accounting standards, market liquidity is influenced positively, that is it increases. Similarly, another major finding of their research work is that by adopting international accounting standards the cost of capital for firms are decreased, whereas the value of their equity increases (Daske et al., 2008). Daske et al. (2011) have also noted that those firms which are committed to provide highly transparent financial reporting and thus adopt International Financial Reporting Standards as their financial reporting framework, such firms experience a significant improvement in their respective

Monday, October 14, 2019

A Response to Historians in Cahoot by Tristram Hunt Essay Example for Free

A Response to Historians in Cahoot by Tristram Hunt Essay Political speeches are of course meticulously designed not to sound like, well, a political speech. Tristam Hunt had seen through the design of President George W. Bush’s inaugural speech in 2005. In Hunt’s article, â€Å"Historians in Cahoot†, he pointed out the heavy use of the term â€Å"history.†   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   President Bush had repeatedly mentioned historic events that range from the formulation of the declaration of independence to the tragic 911 attacks. Hunt’s article is seemingly arguing that history could be used as a political tool. People are attracted to history. It could be nostalgia, or it could just be that history is always presented in a packaged form—a packaged form in a sense that the past events are already modified and consequently stripped of the other details. Moreover, history is often accused of being biased.   Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   Before the article had actually started, there was a suggestion for reading that suggests that there is a distinction between history as â€Å"inspiration† and history as â€Å"instruction.† Aside from the fact that the suggestion for reading had served its purpose as a guide, it leads the readers to a profound realization about history. There is a hint in Hunt’s article that the Bush administration would pattern its style of governance according to what had already transpired in history—a style of governance which is likely to be leaning to only a small portion of the society.

Sunday, October 13, 2019

How Andy Goldsworthy Expresses His Feelings through His Works Essay

How Andy Goldsworthy Expresses His Feelings through His Works Andy Goldsworthy was born in Cheshire in 1956 and was brought up in Yorkshire. He studied at Bradford College of Art (1974-75) and Preston Polytechnic (1975-78). After leaving college Goldsworthy lived in Yorkshire, Lancashire and Cumbria. He moved over the border to Langholm, Dumfriesshire in 1985 and to Penpont one year later. This gradual drift northwards was due to a way of life over which he did not have complete control. However, contributing factors were opportunities and desires to work in these areas and reasons of economy. Throughout his career most of Goldsworthy's work has been made in the open air, in places as diverse as the Yorkshire Dales, the Lake District, Grize Fiord in the Northern Territories of Canada, the North Pole, Japan, the Australian outback, St Louis, Missouri and Dumfriesshire. He collaborates with nature to make his creations. The materials he uses are those you find in the remote locations he visits: twigs, leaves, stones, snow and ice, reeds and thorns. Most works are ephemeral (don't last/live long), but demonstrate in their short life, Goldsworthy's extraordinary sense of play and of place. The works are recorded as photographs. Book publication is an important aspect of Andy Goldsworthy's work: showing all aspects of the production of a given work, each publication is a work of art in its own right. Some recent sculpture has a more permanent natur...

Saturday, October 12, 2019

To what extent is Of Mice and Men a novel of protest? Essay -- English

To what extent is Of Mice and Men a novel of protest? John Steinbeck's novel Of Mice and Men conveys the impression, that it is a novel of protest. The character Candy suffers from discrimination because of his age and his disability. Steinbeck uses this character to protest against ageism and the treatment of the disabled during the Great Depression. The repeated reference to Candy's hopelessness could be understood as a protest against ageism. He says more than once that if he "can't swamp out no bunkhouses, they'll put" him "in the county". His whole life is based on one pillar, the kindness of the boss. He "wisht somebody'd shoot" him, if he gets fired. He "won't have no place to go" and is tied on the ranch. When Curley's wife says that Candy is "a lousy ol' sheep", Candy "subsided". He suggests to tell the boss about that dispute, but he knows that "nobody'd listen to" them. Steinbeck uses these situations to protest against ageism. The hopelessness is also used by John Steinbeck to protest against the treatment of the disabled during the Great Depression. Candy knows that he does not have a future. Crooks emphasises this fact, when he says that Candy will be "a swamper till they take" him "out in a box". Candy swamps out houses, because he is not able to do something else. Although he hopes that their dream will work, he recognises that it is unrealistic. It is unrealistic because of his disability. Steinbeck's protest against the treatment of the disabled is evident from the way he describes Candy's hopelessness. Through his descriptions of Candy's primitive working and living conditions, Steinbeck protests against ageism. Candy is an "old swamper", who lives in a "bunkhouse". His possess... .... That is another parallel between Candy and his dog. Both, Candy and his dog are handy-capped. Carlson discriminates Candy as well, when he states that the dog "can't eat, can't see" and "can't even walk without hurting". The dog would be "no good to himself". Candy receives these statements as discriminations against him. What about him, if his dog has to be shoot? Steinbeck's protest against the discrimination of the disabled is evident from these descriptions. To some extent, John Steinbeck's Of Mice and Men is a novel of protest. When he wrote the novel, Steinbeck was sad because of the horrible situation of the old and disabled during the Great Depression. The themes of ageism and the treatment of the disabled are protested through Candy. Candy does not play a very big role in the story, but he plays a very big role in the background of the novel.

Friday, October 11, 2019

News Channels Essay

With India’s growing importance in international strategic and economic thinking, news about the country is becoming more critical to the world. India alone accounts for over a billion of South Asia’s 1.3 billion people. The sheer mass creates news. Changes in the global balance of power, India’s economic rise, and South Asia’s continuing political and social ferment, are attracting worldwide attention. In addition, Pakistan, Afghanistan, Sri Lanka, Bangladesh, Nepal, Bhutan, and the Maldives are on the global radar for their political developments, social upheavals, festering insurgencies, military actions and environmental challenges. Why IANS? The Indo-Asian News Service (IANS) was established in 1986, initially to serve as an information bridge between India and its thriving diaspora in North America. Today it is a full-fledged, 24 by 7 agencies putting out the real-time news from India, South Asia and news of interest to this region around the world. IANS serves several hundred outlets across the entire media spectrum, in India and around the world. It performs a whole range of other information services as well. Experienced media professionals drive the New Delhi-based group. IANS is divided into six Strategic Business Units (SBUs): IANS English, IANS Hindi, IANS Publishing, IANS Business Consultancy, IANS Solutions, and IANS Mobile. A distinguished professional with strong domain expertise heads each. Its client list includes a range of print publications, television news channels, websites, ethnic publications abroad, government ministries, foreign missions, private sector players, and multilateral institutions. The explosive growth of the Indian media sector, especially audio-visual and new media, augurs well for reliable, independent and professional news  wholesalers like IANS. News Service The News Service, in both English and Hindi, forms the heart of the IANS operation. It presents objective, user-friendly news with a global perspective. This makes it the preferred, content provider and knowledge resource on India, Indians and South Asia. IANS breaks through often cliched and stereotyped reporting about this part of the world. Its talented team of journalists and contributors – some of the best in India – produces a steady output of diverse, well-researched news and backgrounders, features, interviews, analyses and commentaries. Subjects span politics, foreign policy, strategic affairs, corporate affairs, science, and health. Aviation, energy, technology, environment, the arts, literature, entertainment, social trends, human interest, religion and sports are also extensively covered. Given collaborations with several international news organizations, IANS is often used by media as a one-stop source of all news – both domestic and international. Industry, media circles and government departments depend on it. Officials use it for policy publicity and public diplomacy. It is also a content source for our other SBUs. In short, it is capable of meeting almost all information needs. (Website: www.ians.in) IANS Publishing IANS Publishing represents mature capabilities with top-end editorial, domain and delivery skills. It provides clients high quality, effective communications products at optimum cost. Publishing has been a key driver of IANS’ growth. Its strengths are: Editorial functions; Content management, including revision tracking and error elimination; Product creation, page making, design and production; Translation services; Products for Internet and new media. IANS Publishing has harnessed the latest communication and transmission technology to produce entire outsourced newspapers, periodicals and magazines. Clients are in the US, Canada, Britain and the Gulf, besides India. Publications are in English, Indian and foreign languages. (See www.ianspublishing.com) IANS Media Consultancy IANS provides comprehensive and integrated brand and media strategies for corporates and major institutions. Under this IANS undertakes to enhance public profiles of clients through a variety of activities. These include increased publicity of their activities and achievements through professionally written media releases; public relations activities; high-quality house journals and publications on a turnkey basis; and corporate brand identity manuals for easy identification and retention. IANS also creates or revamps websites and updates and maintains them. It is also in a position to write regular summaries/specialized papers on subjects of interest to clients that require high level contacts in industry and government. IANS Solutions IANS Solutions provides all the answers for developing an Internet strategy. It blends design, technology and marketing expertise to create a Web presence delivering outstanding results. Talented website designers collaborate with our technology group to create personalized, graphically superior, functionally sound websites. IANS Mobile IANS was one of the first news agencies to harness cellular technology to launch Content2Mobile operations on both the news and information fronts. This service is available in English and Hindi. IANS Language Services In 1995 IANS started a Hindi Service. Today it virtually operates around the clock, providing quality content in India’s most-understood language. Its subscriber base encompasses all leading Hindi newspapers, websites and other news outlets. In 1998 IANS broke new ground with the launch of an Arabic Service for the  Arab world. Its website – www.alhindelyom.com – helps bridge the information gap with an important region hosting a large Indian and South Asian population. IANS Corporate IANS is the brand name of IANS India Pvt. Ltd., an independent and integrated media company with no affiliation with any major business house, political or ideological group. The media group is driven by professionals with long years of experience and with a collective vision of carving a niche in quality of content and product in a media scenario that is getting increasingly crowded with new names entering the print, electronic and Web space. In many ways, IANS is a trailblazer in the work it is doing. The key people driving IANS are: Tarun Basu is the Chief Editor and Director of the Indo-Asian News Service (IANS), India’s only private and independent news agency and content provider on multimedia platforms. Basu is one of the founders of IANS. He formed the nucleus of IANS when he left a lucrative job as India correspondent of DPA, the German Press Agency, in the late eighties to set up the bureau for the well known India Abroad newspaper in New York – the first multiedition ethnic Indian newspaper in North America. That was the first attempt to begin a two-way information flow between India and the growing and influential Indian diaspora in North America. The seed sown at that time blossomed into the India Abroad News Service which, in a subsequent incarnation that gave it a pan-South Asian dimension, became Indo-Asian News Service, the present day IANS – the premier news service covering India, Indians and South Asia and events of interest to India and the 27 million Indian diaspora spread all over the world. Basu’s aim has been to make IANS an internationally known and respected news and content supplier on both traditional and new media platforms, an information resource on India and South Asia and things of interest to India and Indians worldwide. Today, IANS is more than just a news agency – its a publishing outsource, a multimedia content provider with auxiliary services catering to  growth sectors like education and entertainment, besides being a communication consultant to institutions and companies. Basu has travelled all over the world and has been a regular invitee on the Indian prime minister’s and president’s media delegations in visits to other countries for the past 15 years. He has covered major news developments and international events involving India and South Asia. He has been a special invitee to the World News Agency Summit in Spain, the World Media Summit in China, the Beijing Olympic Games and the World Cup Football in South Africa. Basu also founded the International Media Institute of India, a multimedia training school that conducts media literacy and communication workshops for educational, research and other institutions. K.P.K. Kutty, Director and Chief Mentor, is former chief editor and chief executive of UNI and has been in the profession for 42 years. He has been involved in production of TV news programmes and documentaries too. Shibi Alex Chandy, Director is also Group Editor in charge of its contract publishing division. He has worked with several leading newspapers, television stations and magazines. Arvind Padmanabhan, Group Business Editor, has over 13 years of experience in journalism, covering virtually all media streams – news agency, newspaper, magazine, radio, television and the internet. M.R. Narayan Swamy, Chief News Editor, has been a journalist since 1978, starting with UNI. He was with AFP for 13 years, writing on Indian politics and Sri Lankan affairs. He joined IANS in April 2001. P.S. Mitra, Technology Head, is the man who keeps IANS’ extensive network ticking over. He also oversees IANS Solutions, the company’s web Solutions division.

Thursday, October 10, 2019

Distributed Deadlock Detection: Mobile Device Processes Essay

The increasing utilization of mobile devices for development in application usually emphasizes or breaches customary computing methods. A number of obtainable problem solutions, for instance deadlock prevention and avoidance or leader election, are not fitted to situations where clients and servers equally move without restraint all over the network. The free movement of these applications creates interfaces and new events for distributed algorithms and functions that are customarily of no concern. The basic structures of a number of conventional distributed algorithms depend on suppositions, such as location of information, message transmittal and static network properties. The mobility of clients and servers in mobile device systems undermine these basic assumptions. Merely imposing conventional methods of solving problems into the mobile device systems alters the dynamic character of their environments by enforcing limitations, such as restricting device mobility. In effect, new efficient and effective methods for solving distributed issues are needed affecting mobile device systems. In a number of distributed applications there are complicated links between services and information. Mobile devices usually condense services and information like objects in OO (object oriented) programming, expanding and augmenting information and service link by including movement to information and services. In general, mobile devices such as those engaging consensus, transfer of data and database processing distribution must be each other well coordinated to offer services and information access. The advanced synchronization needed in these mobile device-based applications can result to multifarious, complex deadlock scenarios that must be identified and given solution. Conventional deadlock distribution setups are not successful when device mobility and errors are included to the requirement of deadlock resolution. What is more, because of their assumptions, conventional methods such as edge chasing on the global wait-for graph, are insufficient solutions in a mobile device structure. A solution should be developed to address the customary problem of resolution and deadlock detection for mobile device systems. What is Deadlock Deadlock is formally defined as: â€Å"A set of processes is deadlocked if each process in the set is waiting for an event that only another process in the set can cause. † In other words, deadlocks can happen every time limited resources are being competed by processes and these processes are permitted to obtain and hold a lock to the resource. If a process is waiting for resources, the resources it holds will be inaccessible to other processes. If, therefore, process A waits on a resource held by process B, and process B is waiting on one of the resources held by A, a deadlock is occurring. A system obtaining this condition is practically dead and to resume operating it must resolve the deadlock. According to Tenenbaum (1992), the four conditions obtaining a deadlock are: (1) Mutual exclusion. A resource can only be consigned to precisely one resource; (2) Hold and wait. Processes can hold one resource and can request for more; (3) No preemption. Resources cannot be effectively detached from a process; and (4) Circular wait. A circular sequence of processes is required, each process waiting for a resource held by the subsequent member of the sequence. In dealing with deadlocks, there are also four methods generally applied according to Tenenbaum (1992): ignore, detect, prevent, and avoid. Ignoring the problem presents the simplest way to deal with deadlocks. Detection of a deadlock before it occurs is a method trying to identify and locate deadlocks and resolve them. Avoidance of a deadlock is a method that attempts to find out if a deadlock will take place whenever a resource is requested and respond to the request in a way that avoids the occurrence of the deadlock. Prevention of a deadlock is system structuring in such a way that any of the four conditions that permit the possibility of a deadlock cannot take place. Problems with Mobile Devices in Deadlock Detection Breakdown and movement have to be considered in approaching distributed deadlock detection for a mobile device system. For instance, resources and users in conventional distributed deadlock detection do not move about through the system and each server has information about the site of other points that make up the network. In a mobile device system, devices execute operations by going through the source of information and performing locally to gain advantage of locality of reference. The mobile device and the host server can carry on interacting with other resources in the network. In effect, transactions can be distributed over multiple host servers bypassing the node that set off the transaction. Device movement clearly results in problems for algorithms that rely on information of location. In approaches for distributed deadlock detection such as core server or edge chasing, assumptions of location cannot be precluded as data is centrally collected or structured through a sequence of evaluations and verifications. To be able to detect and resolve distributed deadlocks, the processes must be able to pinpoint the nodes initiating the transaction. In a mobile device system, a device’s movement and operations cannot be traced simply. Hence, the device that set off a transaction is not easy to identify, as well as the secondary devices that are involved indirectly. Assumptions regarding location must be applied if a process is to operate efficiently and effectively in a mobile device system. Approach to Distributed Deadlock Detection in Mobile Device Settings The following assumptions illustrate the approach to distributed deadlock detection in mobile device settings: – All types of mobile devices are detached from the structure of the network, and therefore, they cannot move through the network by bypassing the information of how the nodes are linked. – The configuration of the network is immobile or static when the process starts. Priority transactions or two-stage commit are being utilized in standard deadlock avoidance methods. These systems permit the detection and processing of resolution to make certain that a device will not, of its own, unlock or unblock a resource during the process of detection. This feature is important in preventing shadow deadlock detection. – Only a user device can lock or unblock resources when it is actually present at the same location as the resource it is trying to manipulate. This feature permits host servers to convey the particulars being requested by a user device’s resource to its linked deadlock detection complements. A level of coordination between devices or common resources is present. As the devices execute their tasks, resources can be locked. This indicates that they are made solely to an individual user device. – All through the locking process user devices must communicate with the host server. The host is the final validating authority and can permit or reject access to a resource. Given that the host server can disallow the lock request of a device, a respond is needed. Depending on the device’s task, it could block or wait on the resource or it could resume processing and moving through the system.  The validating authority does not instantaneously block the device, as this would restrict flexibility and restrict the dynamic feature of the mobile device setting. – Devices must inform the host server if devices block on the resource. This permits the server to convey the condition of a device to its deadlock detection complements and reject any further request made by the blocked device. Devices that are blocked cannot unblock until the host authorizes their requests. – Devices must be distinctly recognizable the moment they hold a resource. They can be indentified in the device system at the time of the deadlock detection process. The role of identifying nodes may be made before a user device blocks or at the moment they lock a resource only. Overview of the System The mobile device system employs device-adapted methods that are founded in conventional edge-pushing global wait-for graph systems. Particularly, the distributions of the global wait-for graph into in-house maintained divisions and the introduction of deadlock detection examinations are based by conventional solutions. The three kinds of devices occupying the mobile device system are: User Device.  It is the only device in the system that dynamically executes tasks and locks or uses resources. It represents a device that applies the systems. It has no participation in deadlock resolution and detection; Phantom Device. This device is created by host servers and takes charge for keeping the resources locked by a particular user device, tracking it through the network and for starting the deadlock detection point. It further determines the information collected by detection devices to introduce deadlock resolution and detects and retrieves from errors during the process of deadlock detection. It signifies a part of the global wait-for graph; and, Detection Device. Phantom devices create this device when communicated by the host server that their aimed at device has blocked. They are diminutive, very light mobile devices that are tasked for calling hosts and creating the global wait-for graph and for decoding the deadlock condition. Initiating a Deadlock As user devices accomplish tasks, they may of their own lock resources all over the mobile device system. When user devices are created initially, they are not dynamically tracked by the host servers for deadlock detection purposes. The new devices can move without restraint over the network and use resources. User device tracking is done via environment tokens. Every time a device, therefore, approaches at a host server it must submit a token. This token has no significance to the device, and is only utilized by the host servers to manage the process of deadlock detection. User device tracking operations start at the time a device requests a resource lock. Part of permitting the request process is checking for a phantom device by the host server that is linked with the requesting device. If no shadow is present, one is generated and linked with the user device. The user device’s server token is then finally brought up to date to indicate the presence of the newly generated shadow device. When a shadow device is generated for a user device, it enables the host servers to control the process of deadlock detection. Shadow devices are informed of new device locks by host servers through a classified message. The message contains information on deadlock detection, such as the priority and identifier of the resource locked. When a phantom device is created and linked with a user device, they move together all over the network. This harmonized movement is synchronized by instantaneously routing a user’s shadow once the user transmits a passage request to the host server. Notably, this pairing of devices puts limitations on user devices. A user device cannot execute these actions if its linked shadow device is non-existent: moving, locking, and unlocking. The user is informed of the breakdown and the request must be submitted again. This limitation makes certain that the phantom devices will include the precise condition of the wait-for graph, even if they are postponed at the time of sending. Once a user device requests a lock that is rejected by a host server, it could consider blocking and waiting for the resource to be resolved. If the consideration to block is decided, the user device must notify the host server. Host servers respond to blocking information by notifying the user device’s shadow to permit deadlock data to be verified. If the user has no lock held, a shadow device is not present and cannot be notified. This is acceptable since the user device has no other locks held and it cannot be a participant of a distributed deadlock. The host server notifies shadow devices that their target object has blocked or unblocked via a coded message. Blocking and unblocking activities start the process of deadlock initiation. Once the shadow devices have been informed of a block activity, shadow devices inquire the host server to ascertain who is holding the lock on the target object resource. When the host server transmits information to the device identifier on who is holding the lock, a subsequent inquiry is done to ascertain if the device is remote or local. If the locking device is remote, the shadow device initiates the sequence of distributed deadlock detection. If not, no particular processing is occurring. Distributed Deadlock Detection Phantom devices introduce the deadlock detection sequence by creating detection devices. In the creation process, detection devices are commenced with their parent phantom device’s listing of locked resources and the servers where they are situated. This generation of a committed detection device permits a shadow to search at the same time for deadlocks and accordingly respond to other shadow detectors. When initiated, detector devices visit the locked resources by their aimed at user device. By noting the location of the network of each locked resource, routing of detector devices is speeded up. Each visit of the detector device in a resource, they inquire the host server to ascertain if other devices on that resource are blocked. If there are blocked devices found, their linked shadow device is located by the detector and inquires for their deadlock detection data. The processing happens at the same time for every blocked device on a resource held by an offsite device. The deadlock detection response is a list of recorded deadlock detection data that could include the following: Name of the Device. The distinctive identifier information of the user device; Resource Blocked. The resource that the device is blocked with, that includes the unique name of the resource, the user device that has this resource being locked, the server’s name that holds this resource, and the resource’s priority; Basic Locks. The list of basic locks or resources as held by this device. Relevant data regarding a user device that is blocked on a resource is summarized in each deadlock detection record. This information is included at each resource to the deadlock detection table of the detector since the device is blocked on a resource that is held by the detector’s object target. Because these devices are blocked on a resource that is held by another device, their overall detection table is being held indirectly by that device. The secondary information is applicable because blocked devices cannot act to release resources at the same time waiting for the locked resource by a detector’s object target. At the time a detector device visits every resources that were put in its initial array of locks, it goes back to its initial host server. When it arrives, the detector device notifies its shadow that it has came back and conveys its assembled deadlock table. The shadow device ascertains this table, which depicts the global wait-for graph, to make certain the presence of a deadlock. Shadow devices employ their target user device as a key to deadlock detection. If their target device shows in the table communicated by the detector, the target device is waiting on a resource as held by itself. Apparently a deadlock is present because the target device is blocked and that resource can never be released. Shadow devices perform recovery from breakdowns at the time of a deadlock detection point. Detection of a failure is performed through a running cycle calculation delay. Each shadow device is initialized with a fixed cycle time delay depending on the network type and its features. Shadow devices assume that their detector devices will be able to determine all of the required locks in less than four times the optimum delay cycle. When a detector device does not give a response in the optimal time allowed, the shadow device expects that a failure occurs and creates a new device detector to carry on the process of the failed device. Conclusion The suppositions of conventional distributed deadlock systems prevent them from successful completion in a mobile device setting. A successful detection and resolution of a mobile device distributed deadlocks applies the advantages of the mobile device model. The principal features of the advanced method, in particular, that separate it from the conventional solutions could be: reference locality, structure independence, asynchronous process, unrestricted movement, and fault tolerance. These features are accomplished through an independent platform, mobile device distributed deadlock detection resolution. The devices that use resources in the mobile device system are differentiated from the deadlock detection process. This differentiation generates dedicated devices for deadlock initialization, resolution, and detection. These devices are totally fitted to the features of the mobile device setting and operate together to perform a comprehensive distributed deadlock detection resolution. Mobile device settings demand structure flexibility and tolerance of fault. Integrating these properties and features into a mobile device solution affects overall performance. The features need further developing and messages. Because of the congruent nature of mobile device settings, there is no definite fact that these further messages do significantly affect deadlock detection efficiency and effectiveness. In addition, the insufficiency of comparable device solutions poses comparison and examination non-conclusive.

My Experience at the Animal Shelters

These are my experiences while visiting both animal shelters; first I visited Orange County Animal Services. When I came in I realize there were people standing on line waiting to talk to the clerk to tell her their business in the shelter. While waiting on line I observed this two young girls in front of me very excited that they were adopting a dog, when they got to the clerk they told the clerk that they had choose a dog and were ready to take him home, the first question from the clerk was what’s the cage number, but they didn’t know the cage number So the clerk told the girls to go back and check the cage number, soonest they left it was my turn to tell the clerk my business at the shelter. I told her I was there from school and it seem like she has got a lot of those visits because before I could finish she told me the best way to get around the shelter, so I wouldn’t miss anything. She told me that after I was done to come back to her and she would have a brochure signed and ready for me to take. I started walking down the hall and the first thing I saw was a table with some pictures of what I suppose is people that work or volunteer there, with dogs and cats from the shelter; the table was decorated with some dog or cat toys. I kept walking and started hearing barking I was getting closer to where the dogs are. As the barks from the dogs were getting louder I looked around at the walls of the hallway they had pictures of dogs and cats with their happy owners that had adopted them from the shelter. Almost at the end of the hall there was a whole wall of pictures with dogs that were missing from their owners, they all looked so happy in the pictures I counted 18 pictures of dogs that were missing from their owners, after I had reviewed and counted the pictures of the missing dogs. I continued walking down the hall and got to the first door because there are two doors to get to the actual place where the dogs are kept. As soon as a walked in I saw the two young girls from earlier, they were getting the info that the clerk needed to continue with the adoption procedure; the dog they were taking was the first dog in the left. I wanted to ask them some questions but they seem to be so exited and in such a rush that I decided not to ask them anything, regardless I saw the dog they were adopting his name is Gizmo he is a five month old male pointer/bloodhound mix he is super happy and riendly I took a picture with my cell phone I kept walking by the cages looking at the dogs trying not to overdo it because I couldn’t stop feeling bad that they had no home and no master to wag their tail to, even though they all seem to wag their tail to very person that passed by and they tried to look as happy as they can under the circumstances, is like if they knew that th ey had to look their best because one of those person passing by could potentially by his or her new master There were about 60 dogs in house on that day, after walking by all the dogs. I went to where the cats are kept. Where the cats are kept is divide it in three parts, two small rooms were in the front to the left and right side. In the middle was the entrance to the bigger room where most of the cats were kept in small cages, that were all around the room, most of the cages had cats in them some of them had two cats in it. There were two women that were working as volunteers; I asked them a few questions. They told me there were about 60 cats in house at the moment they didn’t know the number of cats and dogs that get adopted but they told me it was high if not 100% In that particular animal shelter, they also explained to me what the two smaller rooms are for. The one in the right side was for letting that cats stretch out and do exercise. The other room on the left was for the people who wanted to adopt a cat, could get to know his or her new cat better. After I was done walking through the shelter I went back to the clerk in the front. she had a brochure sign and ready for me to take, I came out from the first shelter and went in to SPCA of central Florida, which was a little confusing to me because it looked like a store, I asked the clerk and she told me I was in the right place, that was the entrance she told me which was the best way to get around the shelter and told me when I was done walking around to come back to her so she can give me a signed brochure. I found that both shelter are the same but different this one had fewer dogs and they looked to me bigger than the once from the other shelter they had about 40 dogs in house at the moment. After I was done with the dogs, I went to the cat section and to my surprise it was a lot bigger than the other one and had different rooms for different thing, there was a section for sick cats, for healthy cats, for cats that are going home, for cats to know their new master, and for wild cats. I talked to Sherry a nice lady that works there and had the patience to walk and showed all the cat places I mentioned. I ask her about cats and dog adoptions and she told me it was a lot higher for dogs than cats at this shelter, I asked why and she said many different reasons, but mainly because they in house so many wild cats, that made me feel sad because I saw the wild cats and they are just as beautiful as the rest of them I took a picture of a wild cat that I saw at the shelter I will include in this report. After I was done walking the whole shelter I went back to the front desk clerk to collect my brochure and that’s the end of my walk in two Orange County Shelter, I hope you have enjoy reading it as much as I enjoy making it.