Saturday, August 31, 2019

Common Stock Essay

Question 1.1. (TCO D) Which of the following statements concerning common stock and the investment banking process is NOT CORRECT? (a) The preemptive right gives each existing common stockholder the right to purchase his or her proportionate share of a new stock issue. (b) If a firm sells 1,000,000 new shares of Class B stock, the transaction occurs in the primary market. (c) Listing a large firm’s stock is often considered to be beneficial to stockholders because the increases in liquidity and reputation probably outweigh the additional costs to the firm. (d) Stockholders have the right to elect the firm’s directors, who in turn select the officers who manage the business. If stockholders are dissatisfied with management’s performance, an outside group may ask the stockholders to vote for it in an effort to take control of the business. This action is called a tender offer. (e) The announcement of a large issue of new stock could cause the stock price to fall. This loss is called â€Å"market pressure,† and it is treated as a flotation cost because it is a cost to stockholders that is associated with the new issue. (Points : 20) Answer d. Question 2.2. (TCO D) The City of Charleston issued $3,000,000 of eight percent coupon, 30-year, semiannual payment, tax-exempt muni bonds 10 years ago. The bonds had 10 years of call protection, but now the bonds can be called if the city chooses to do so. The call premium would be six percent of the face amount. New 20-year, six percent, semiannual payment bonds can be sold at par, but flotation costs on this issue would be two percent of the amount of bonds sold. What is the net present value of the refunding? Note that cities pay no income taxes, hence taxes are not relevant. Answer a Question 3.3. (TCO D) New York Waste (NYW) is considering refunding a $50,000,000, annual payment, 14 percent coupon, 30-year bond issue that was issued five years ago. It has been amortizing $3 million of flotation costs on these bonds over their 30-year life. The company could sell a new issue of 25-year bonds at an annual interest rate of 11.67 percent in today’s market. A call premium of 14 percent would be required to retire the old bonds, and flotation costs on the new issue would amount to $3 million. NYW’s marginal tax rate is 40 percent. The new bonds would be issued when the old bonds are called. The amortization of flotation costs reduces taxes, and thus provides an annual cash flow. What will the net increase or decrease in the annual flotation cost tax savings be if refunding takes place? Answer c (a) $6,480 (b) $7,200 (c) $8,000 (d) $8,800 (e) $9,680 (Points : 20)

Case Study Zumo Essay

You will notice during your reading that some of your recommendations offered during the debriefing oh our oral presentation have not been met, including the change of our logo. This reflects in any way an act of negligence or a lack of rigour. Indeed, we are convinced by some of our ideas, so we prefer to develop you them so that you join there rather than suppress. Hope you like it, enjoy your reading. Sincerely, Laurie and Emilie. Zumospa would like to make Zumo a global brand; the company needs to reposition Zumo for the international market. Zumospa would like to launch a global campaign focussing first on South America, Mexico, The Southern states of the US and Japan, where they have regional offices. Zumospa is a food and drink company based in Valencia, in Spain. Zumo is the best-selling sports drink in Spain. In the last financial year, Zumo contributed â‚ ¬30 million to Zumospa’s annual sales revenue, accounting for 20% of the company’s total turnover, and 4,5 million in profits. It is Zumospa’s cash cow, generating more revenue than any other of its products. The drink contains vitamin and a secret ingredient: â€Å"herbora†, made from roots of rare African plants. Scientific studies results about its formula and proved that the body absorbs Zumo faster than water or other soft drink. Zumo offers four flavours: classic, light, kiwi and strawberry. Zumo is now sold all over Europe. It has a large channel of distribution: the drink is distributed mainly through grocery stores, convenience stores, and supermarkets, also through sports clubs. Sales generated through contracts with professional leagues, such as football, golf and tennis associations. Press, TV and radio advertising is backed up by endorsement contracts with famous European footballers and tennis stars. Which is a pity; it’s that this drink is sold only in Europe. Such a success deserves to be applied internationally. The sports drink market is the most rapidly growing segment of the world beverage market. The market is very competitive, with major companies such as Coca-Cola, Pepsi Cola another fighting for market share. We can expect an Entry Barriers from the existing market on each country. Product strategy: Zumo’s new face Even though Zumospa has been going well in Spain, if we go and run a business with the same brand name â€Å"Zumo† and similar image to the USA, Mexico, South America, and Japan, it would be possible to make the countries rouse antipathy. The reserve for the foreign products is increasing. Initial research suggests that Zumo is perceived, as a Spanish drink, and its close identification with Spain may not be suitable when developing a global brand. We will discard old perspectives towards the markets, especially when we expand our services or products to international market, which have different cultural foundations. An energizing drink is a drink that gives a renewal of energy to the consumer, not to confuse with an energy drink dedicated to the hydration of the sportsmen. In most case, an energizing drink contains a concentration rather high of caffeine and sugar then, according to the specific receipt of each product, of the extracts of plants like the guarana or the ginseng and various molecules like the bull-fighting one, of the vitamins B, the arginine, creatin, etc.†¦ As we know, Zumo just contain vitamin and African plants, and scientific have recognized the energy inputs of natural products used. We believe it’s important to emphasize this point, which represents a competitive advantage of the products to its competitors. That’s why we propose several solutions to refresh Zumo, and highlight the brand’s values. In addition, for a brand to be global, its logo, name and slogan must be recognized and perceived like a familiar for all people. We invented a new name, logo, slogan and packaging for the drink, in order to anchor a positive image of the brand in the minds of consumers. Talking about consumers†¦ Zumo is positioned as an energy product for fitness conscious people, especially sportsmen and women between the age of 20 and 35, and even the older athletes. We succeeded in Spain with this target market and we will continue to maintain it in international market. The scope of the drink matches these consumers. Athletes support the values of the beverage, recognize its qualities. They represent our main target. But our customers can extend far beyond sportsmen. Indeed, people are concerned more and more about health, and pay attention to the ingredients contained in what they eat and what they drink. We can expect to receive more in addition to consumers through the properties of the drink. In order to stretch our consumer panel, the drink will be offered in different version, like in Spain, where the drink is proposed with kiwi and strawberry. A version of the drink sugar-depleted will be deployed in each country. With regard to the different fragrance (cherry, mint, etc.) depending on the country concerned by this development. But before that, it’s necessary to perform a complete redesign of the brand, to give an image more correlated with the drink’s values. A new name, for a new fame The name Zumospa is focused as a Spain brand, to Spanish language. It’s clearly a household name. It’s necessary to reinvent it, for a more international name. This name must be euphonic, easy to pronounce and memorize. Zumospa is a Spanish product; it means the fruit juice in Spanish. †¨In Spain, this product is much known, but not in the other countries because it is only sold in Spain. †¨We so had to find a new name, so that he must be significant for all that is why we chose the English language, it is going to give a modern and young tone. And especially all the consumers and the future consumers will understand it NED Natural Energy Dring NED Natural Energy Dring The new name has to express the benefits of the product, that it represents the drink, a powerful, energetic name and especially that it shows highly rated natural of this energy drink. We had found several names as for example: Strong Jet, Big Torrent, NED or TORERO. Having hesitated a lot, we selected NED (the Natural Energy drink), it is very simple because it is the definition of the product but it is particularly easy to pronounce for the most part of country, it is short and precise. It is also necessary to respect the administrative formalities; we shall thus have to register the name of our product to protect it from any copy, to WIPO (the World Intellectual Property Organization A little makeover It exists on the market of the drink big competitors as Pepsi, Coca Cola but especially on the market of energy drinks as Red Bull. In order to compete against big competitors like Pepsi and Coke, especially Red Bull, and reshape the image of the drink, we think we should redesign the logo. The current image is too simple, too Spanish and cannot create strong impressions in foreign customers. Pepsi and Coke have been known as calorie products while nowadays more and more people are paying attention to healthy product. So we will focus on marketing that Zumo is energy drink with low gas, glucose and with natural ingredients. That’s why, in the logo, we have combined the Hulk’s arm with a small daisy. We wanted to show it in the logo so that the customers realize of highly rated natural of the product To represent the energy values of the drink that brings strength and force, we used the Hulk arm that represents, in our opinion, an icon of physical force. To show that this strength comes from the earth, we combined with this image of a small daisy, reminding the natural aspect of the drink. The particularity of this logo is the contrast between the powerful arm and the delicate flower, held in his hand. In addition, the colours are sparkling and strongly recall the ecological context (green, yellow, white). The specificity of the image will allow that it’s permanently implanted in the mind of the consumer. After the logo, we have decided to occupy us of the slogan. We thus needed a small sentence, which represents the logo but especially the product. As we used Hulk as image of Zumo, we decided to stay in this spirit of great powerful, but natural strength. Having thought a lot we have chooses † Great Get the Natural Strength â€Å". Obtain the strength by drinking our drink, a strength nature but very powerful. We thus used play on words to insist well on the natural fact of the supernatural product and the strength of Hulk. And a suitable outfit Our main target being athletes, as well as all active people, we decided to adapt the new packaging for their needs. In addition, it breaks the image of the current energy drink, full of chemicals. Indeed, all competing drinks, except one, offer their beverage in cans. That’s why we will propose a new contain: plastic bottles. Available in different format, from 25cl to 50cl, these contain enables easier transport of the drink. Whether in a gym bag or a handbag, an open can can no longer store while the bottle is reformed indefinitely. The bottles will have a stopper teat, making usage more convenient and less risky for active people moving constantly. The bottles will be made with a green plastic. It can be recycled and reused to reduce the impact of waste on the environment. Indeed, it’s impossible for a company promoting ecologic values to neglect the growing concern of consumers for ecology. Position We should reshape specific identity and directional characteristics of Zumo as a sports beverage. Choose gorgeous designs and intense colours to lay an emphasis on the image of the silver generation who care about their style and intend to the luxurious life style. The price will be about 2 £ because we have made decision that our targeted customers is ready to pay for a high quality product. They could be willing to pay for the product, even it could be expensive. Moreover we made a decision to the price, which is higher than other competitor’s products to posit high quality to consumers. What else? We can expect a real success for the introduction of the drink worldwide. We will have to monitor the results of the campaign and the strategies put un place. Subsequently, other operations will need to be considered to maintain the reputation and the dynamism of the brand. E already thought of some actions. For example, it would be interesting to create versions derived from NED: a line of bottle for girls, a light version, as well as other flavours (strawberry, peach, etc.). Proposed perfumes will vary depending on the country in witch the drink is sold. Each of them may have different preferences in terms of taste, so it will be necessary to adapt to their habits. Communication strategy We can lead international marketing campaign as a successful case by selecting specific target layers and using effective promotion routes. Media Firstly, advertising is known as the first step to introduce our product to foreign market We use one method: Innovative advertising, marketing around the world. We are planned to do promotion by teaser ad, outdoor billboards, and sampling party. Our creative team knew create us some very interesting sketches. We could do teaser ad, which are easy to see around us as a promotion method to attract customer’s interests and attention. The location to publicize will be a rush place. Our views will be present in many places: Using outdoor billboards, especially at bus stops, buildings, fitness centres, and on the newspaper, magazines and so on. Hors media The world is waiting for London 2012 Olympic and I think this will be a good opportunity to advertise our products by sponsoring. Olympic always attracts everybody all over the world. If we sponsor Olympic, our product will appear frequently and it will create strong impression in foreign customers. When athletes use our products, our prestige will be consolidated and many people will want to try our products. We going to take advantage the Olympics games for doing the global launched of the new brand, new product line and new image (logo), supports of advertising in media. We are supposed to hold a sampling party. For example, we are scheduled to a sampling party at the fitness centre, which is a lot of members, since we could expect to get people to attract. Also, it could be a good way to inform the new brand. Apply to be official sponsor at next Olympic Games. It’s a great chance for us to publicize our new brand. Olympic Games are the biggest sports event that sportsmen and women all around the world look forward to. We could contract an ad with famous footballers, tennis players, and athletes.

Friday, August 30, 2019

Crime and Punishment Essay

People will sometimes go to greater extents just because they believe it’s for the better of the people. Mankind may sometimes reside to murdering a person in belief that it will benefit the society because that person is worthless and just takes up space. In Fedor Dosteovsky’s Crime and Punishment, the character Raskolinikov decides to commit a murder or in his eyes, rid society of a worthless person. Sometimes poverty will make a man tip over the edge. It will cause a man to commit a homicide because in their mind they see that person worthless to society. In Doestoevsky’s Crime and Punishment, poverty helps setup the theme of nihilism. â€Å"Life is in ourselves and not in the external,† writes Fyodor Dostoevsky in a letter to his brother dated December 22, 1849. â€Å"To be a human being among human beings, and remain one forever, no matter what misfortunes befall, not to become depressed, and not to falter—this is what life is, herein lies its task.† This passage was written immediately after Dostoevsky underwent the traumatic experience that Tsar Nicholas I ordered for sever prisoners condemned to death for supporting the expression of free thought within the Russian state, a mock execution in Semyonovsky Square, a staged performance so terrifyingly real that it induced insanity within one of the author’s fellow prisoners. The quote is evidence of Dostoevsky’s strength of character; his would be a difficult life living in poverty, he would helplessly watch as many of the people closest to him died from the ailments of the poor. It also exposes the significant flaw common to som e of his characters and tragic heroes through despair, and weakness before the weight of misfortune, they falter, and commit barbaric acts that render them unfit to operate within the context of humanity. This is the case with both Baklushkin and Shishkov from The Hous of the Dead, as well as with Raskolnikov in Crime and Punishment. Fyodor Dostoevksy was born on October 30, 1821 in Moscow, Russia. He was born into a strict way of life. He lived much of his childhood distanced from his frail mother and officious father. In these formative years, he formed a close bond with his elder brother Mikhail. He was sent to school at an early age, during his years in school Dostoevsky was lonesome, but those lonesome years in school afforded him a release from his father’s stern household. In his solitude he found an interest in Literature and spent most of his time reading. As a young man, Dostoevsky’s father was brutally murdered by his serfs. Though he rarely mentioned his father’s death, the theme of parricide provided the central focus of perhaps his greatest work, The Brothers Karamazov. At his father’s instance, Dostoevsky attended engineering school, but upon graduation he chose to pursue a literary career. His first published work, Eugenie Grandel, was published in a St. Petersburg journal in 1844. Dostoevsky completed his first novel, Poor Folk, in 1845. A naturalistic tale with a clear social message, the novel was acclaimed by the foremost literary critic of the day, Vissarion Belinsky, who stated, â€Å"A new Gogol is born!† the work brought Dostoevsky success and adulation that he was ill-equipped to handle. Dostoevsky became a member of Belinsky’s literary circle, but when Belinsky reacted coldly to Dostoevsky’s subsequent work, a breach developed between them. In 1848, Dostoevsky joined a political group of young intellectuals led by Mikhail Petrashevsky. The reactionary climate of Russia at the time was not receptive to a group which published illegal literature and discussed utopian socialism, and in 1849 the members were arrested and charged with subversion. Dostoevsky, whom the authorities considered the most important member, was imprisoned and sentenced to death. In a scene that was to haunt him all of his life, Dostoevsky and his friends faced a firing squad, but were reprieved when a messenger arrived with the announcement that their sentences had been commuted to four years of hard labor in Siberia and four years of army service. His harrowing near-execution and terrible years of imprisonment made an undeniable impression on his life, converting him to a long life of intense spiritual lifestyle. His prison experiences, as well as his life after prison among the urban poor of Russia, would provide a vivid backdrop for much of his later work. Released from his imprisonment and service by 1858, he began a fourteen-year period of furious writing, in which he published many significant texts. Among these were: The House of the Dead, Notes From The Underground, Crime and Punishment, The Idiot, and Devils. In 1859 Dostoevsky returned to St. Petersburg were he contributed articles expressing his belief that Russia should develop a social and polit ical system based on the values drawn from the Russian people. He then described his life as a prisoner in the book The House of the Dead, a novel reflecting both an insight into a criminal mind and an understanding of the Russian lower class. His intense study of the New Testament, the only book prisoners were allowed to read, provided a major influence on his later work as he became convinced that redemption was only possible though suffering and faith. In 1862, Dostoevsky and his brother Mikhail created a magazine called The Time, which was later banned in 1863. Due to the Dostoevsky and Mikhail created another magazine called Epoch, which in 1864 published the complex novel Notes From Underground, generally considered the preface to Dostoevsky’s greater novels. In that same year, 1864, both Dostoevsky’s wife and beloved brother died, leaving him saddled with debts and dependents. In an attempt to win money though gambling, Dostoevsky instead buried himself further in debt. With creditors at his heels and with debts around 43,000 rubles, he was able to escape with 175 rubles and a slave contract with book seller F.T. Stellovsky. This agreement stipulated that if Dostoevsky did not produce a novel by November 1, 1866, all rights to Dostoevsky’s past and future works would revert to Stellovsky. Time passed and Dostoevsky, preoccupied with a longer, serialized novel, did not work on the book he promised Stellovsky until at last, on the advice of his friends, he hired the young Anna Grigorievna, Snitkin as his stenographer. He the dictated the Gambler to her, and the manuscript was delivered to Stellovsky on the same day their agreement was to expire.

Thursday, August 29, 2019

The problem to be investigated is ethical challenges and grey areas Essay

The problem to be investigated is ethical challenges and grey areas within business processes that are exploited by businesses for financial gain. Laddering, Layered investment strategy - Essay Example Once the prices escalate, the shares are sold to make profits from the gullible public. Goldman has been using this strategy to make quick money. It is ethically wrong. Business ethics are mainly principles and values that guide business strategies and decision-making processes to promote responsible behavior. Kantian ethical theory is implicit in its universalism and proposes that one must act in a manner that one would expect others to act towards oneself (Johnson, 2008). Goldman Sachs had used underhand techniques to deliberately increase the price of shares and then float the same share into the market to profit. Hence, Goldman was highly unethical and exploited the trust of the public to gain profits. Laddering It is an agreement between the client and the firm whereby the client or buyer promises to buy the shares of IPO at a higher price above the initial one so that its market shares are guaranteed to increase. This is a scam between the underwriter for the IPO and the favore d client to make money at the cost of general public. Goldman Sachs has been responsible for committing this crime with the deliberate intention of fraud. Not only has the company violated the trust and confidentiality of other clients but also its irresponsible and fraudulent behavior has resulted in the bankruptcy of the new firm whose IPO was floated. A prime example is eToys, which had gone bankrupt. Hosmer (1994) asserts that business decisions need to be constructed on the basis of economic considerations, ethical values and moral obligations to its various stakeholders. Goldman’s sole purpose was to make profit and benefit few clients thereby harming the interests of its other clients and public in general. Hence, its conduct and business practice was hugely unethical. CDO or collateralized debt obligations Collateralized debt obligations are financial instruments that are mortgage backed and, therefore, attractive to clients. The short sale and maintaining short subpr ime position considerably benefits the firm. In 2008, Goldman became a bank holding company. Though the company was brought under the regulation of Federal Reserve Bank, it also obtained easy access to funds from Federal Reserve at zero percent interest and no time limit. It started recommending CDO to its clients. The mortgage pools of CDOs were not good and were purposely chosen for their low value by the finance director, Paulson. The deal was structured by a trusted company that continued to question the validity of the mortgage pool. Goldman insured the CDOs for $11 million with AIG. The company has created false demands by buying it and then selling it in open market to make short position. When Goldman pulled out, the clients were left with $40 million of securities which had no worth. Goldman sold its insurance profits to hedge funds. Goldman’s culture was based on maximizing profit and money for themselves and their select few clients. Promising to make a person rich by forty was the critical philosophy that encouraged them to evolve innovative ways to manipulate market and cheat general public. The general culture of dishonesty and non-accountability towards their various stakeholders was an important ingredient of their work environment. Thus, values and ethics played no part in their decision-making processes. They only conformed to the legal

Wednesday, August 28, 2019

Education topic in U.S. Supreme Court Essay Example | Topics and Well Written Essays - 500 words

Education topic in U.S. Supreme Court - Essay Example It was widely covered and debated because of its ridiculous name. In 2002, a student in Alaska held up the sign in question. It was quickly torn down by the school principal and the student was then punished by several days of suspension. The issue was a 1st amendment issue. Could an educator suppress students free speech? This was one of the first decisions of the Roberts Court and was closely watched as such. The judicial history of the case is as follows: The Alaskan rejected the case, but the Ninth Circuit found that the student’s first amendment rights had been violated. The phrase Bong Hits 4 Jesus was interpreted as a political expression. The Ninth Circuit distinguished political speech from a simply offensive remark, writing: â€Å"Also, it is not so easy to distinguish speech about marijuana from political speech in the context of a state where referenda regarding marijuana legalization repeatedly occur and a controversial state court decision on the topic had recently issued. The phrase ‘Bong Hits 4 Jesus’ may be funny, stupid, or insulting, depending on ones point of view, but it is not ‘plainly offensive’ in the way sexual innuendo is.† Frederick v. Morse, 439 F.3d 1114, 1119 (9th Cir. Alaska 2006). The case was then appealed to the Supreme Court. Chief Justice Roberts wrote the majority opinion which found in favor of the school and against the student. The Court gave a very narrow ruling which declared that schools could reasonable restrict students freedom of speech if that speech was being used to encourage or endorse illegal drug use. Roberts wrote that the principal reasonable assumed the banner encouraged drug use and was therefore justified in removing it. While some interveners argued that the banner was a kind of political expression, Roberts wrote that the student’s lawyers didn’t make this argument. It could also have been argued that the

Tuesday, August 27, 2019

AHRQ Research Paper Example | Topics and Well Written Essays - 1000 words

AHRQ - Research Paper Example These are In-patient quality determination There is need for a system integration that will enable the IQIs. Inpatient quality indicator are stipulated measures that gives a dimension the way hospital administration data than involve the degree of care in the hospital. The sensor shows the quality of attention within the hospitals. It covers the sequence of inpatients for some steps and the condition of their illness. The determination whether the rate of mortality is directly proportional to the availability, integrity and accessibility of the information that are facts and can be attested to is a question of concern and the best way to solve this is by ensuring that the system that is in place is void of inaccuracy. The technology that is used to share the information involving this department must make use of the latest EISA fundamentals. The hardware that should be used should must maximum information security especially the networking devices (Andriessen & Vartiainen, 2006). As far as the management of information that involves the release of patients is concern, there is still a lot to be done because there are disparities in knowing whether the patient was discharged or died. For AHRQ to eradicate this problem the software that is used to check the state of a patient in a regular basis must be put in place. The second aspect concerns pediatric quality indicators (PDIs). This is used to keep the information about the discharge of patient. This is to determine the quality of healthcare in the pediatric department. The issues that involve the patients in the pediatric department that is not captured in the healthcare system are given consideration. To ensure that this is achieved the program that should be used should be able to update it anytime a patient is discharged (Andriessen & Vartiainen, 2006). Basically, the discharge process that is undertaken in the hospital involves the doctor, the nurses and the supportinate that such as the security. An effect ive system is one that is able to share the information amongst the three parties and at the same time enables information filtering so that the sensitive health information remains with the doctor. Too ensure this, an interactive system that guides the different parties on how to ensure the authenticity of the data needs to be implemented. The information security system that is applied must ensure that the validity and reliability of the administrative data. Any risk that is involved must be checked. In addition, interconnection between the information concerning adult healthcare as a contributing factor to the children health is a problem. The different servers that maintain this information should be linked so that the availability of data is made flexible. This will make sure that the needs for different social classes ranging from low income to the rich are maintained (Andriessen & Vartiainen, 2006). The indicator that is used for adult patient should also be able to adapt to infants. This is made possible by using physical metric of an individual such as weight to adjust the functionality of the system. The embedded software used must transmit the record immediately so that the analysis and interpretation can be done to facilitate information dissemination to all the agencies. Prevention quality indicators These are the measures that are used for emergency care services. The rate of transferring data

Monday, August 26, 2019

MST 203 Marketing Coursework Essay Example | Topics and Well Written Essays - 1500 words

MST 203 Marketing Coursework - Essay Example It is irrefutable that this principle also changes the role and function of marketing managers in the business organization. Marketing management is defined as the "analysis, planning, implementation, and control of programs designed to create, build, and maintain beneficial exchanges with target buyers for the purpose of achieving organizational objectives (Kotler & Armstrong 2001, p.14)." Truly, the business arena has evolved from placing emphasis on production, product improvements, and selling approaches and started to focus on customers. Marketing management functions now covers how a company can create and extend more valuable goods and services to each customer. Tesco PLC is the largest British retailer based on both global and local shares. Traditionally, the UK-based international retailer specializes only in the distribution of food products but it currently adds other goods and services to its product portfolio which ranges from clothing to consumer electronics to consumer financial services to internet services to internet service and consumer telecom. Last February 26, the company announced a total annual turnover of 33.974 billion and reported a pre-tax profit of 1.962 billion. It is estimated that in every 8 UK retail sales, 1 is spent on Tesco. Tesco is currently one of the world recognized retailers. As marketing is an essential aspect of a business organization, it is irrefutable that Tesco's success can be attributed on how it manages its marketing activities. This report will specifically look at the management activities and decision which named the company as the #5 largest retailer in the global arena. Marketing at a Strategic Level Strategic planning is one of the essential marketing management activities undertaken by Tesco PLC. Accordingly, Tesco PLC's commitment in effectively marketing its products is mirrored in the way it crafts its mission, vision, and goals. Tesco states its mission as "Our core purpose is to create value for customers to earn their lifetime loyalty (Our Core Purpose)." This statement is further expressed in two key values known as "No one tries harder for the customer," and "Treat people as we like to be treated (Our Core Purpose)." With these statements and values as guides in conducting their business operations, Tesco PLC undoubtedly lays a strong foundation in marketing its products and services. Recently, the company launched its new simplified marketing strategy which is a response to the increasing complexity of operations due to the rapid growth of its stores, range of products, intense competition, and new customer demographics. These factors, along with other challenges make it relatively more difficult and longer for Tesco to make important decisions. Thus, simplifying their marketing strategy into three words which contains the core value and purpose of the company is seen to be beneficial. Tesco PLC's new marketing strategy is encapsulated into three words-Every Little Helps. Every Little Helps reflects the company's recognition that it has a huge feat to accomplish and that every little [effort] helps in reaching its goals.

Sunday, August 25, 2019

Technology and Society Essay Example | Topics and Well Written Essays - 500 words

Technology and Society - Essay Example While the instrumental theory sees technology as an instrument, the substantive theory sees technology changing society. 1) What does technology or media determinism mean Technology determinism seeks to explain social and historical phenomena in terms of one principal or determining factor. It focuses on causality - cause and effect relationships - a focus typically associated with scientific explanation. 2) What are technology-led theories Technology is seen as a 'prime mover' in history; particularly technological development, communication technologies, media, or technology in general are the sole or prime antecedent of changes in society and technology is seen as the fundamental condition underlying the pattern of social organization. 4) What does reductionism mean in terms of technological determinism Reductionism aims to reduce a complex whole to the effects of one part (or parts) upon another part (or parts). It is utilized in a linear or one way manner. Technological determinism is mono-causal. It offers a single cause or 'independent variable'. 5) Describe the difference between reductionism and holism. Reductionism discusses a complex whole in terms of parts.

Saturday, August 24, 2019

The New Testament Essay Example | Topics and Well Written Essays - 750 words

The New Testament - Essay Example The purpose of such a fulfillment is the witness of the disciple being taught that he or she should be salt and light. The foundational basis for witness is heart attitude or beatitude as popularly known. Eight attitudes of blessedness or four pairs are given to the disciple, which will cause them to be the influence they need to be, while enjoying blessedness. Verse 5 is just one of the eight stating, â€Å"Blessed are the meek, for they will inherit the earth.† Jesus or the gospel writer reporting Jesus goes directly to basic precept of being an influence for maximum impact and recall, and then builds the argument in a manner which is recognizable to any Jew of that day, with the purpose of testimony and Christ likeness placed consequent to the basic precepts of life being elucidated. B. Form of this passage: The content and form of this passage is a typical of a sermon by Jesus where he reads out a text and then sits down, whereby he invites them for a closer look into what he has spoken about. In terms of the source there is only a single obvious parallel of this verse and style, which is in Luke 6 (Though closer scrutiny shows connectivity to many writing of the OT). Based on the two source theory, if disciple Matthew and Doctor Luke had sources for these it would have been ‘Q’ and not Mark. â€Å"The evidence points to the fact that both Matthew and Luke were referring to the same passage. â€Å"Luke 6:17 means a "plateau" in a mountainous area 21 and there are striking similarities between the two sermons, then how do we reconcile Matthew's "Blessed are the poor in spirit" and Luke's "Blessed are the poor"? Must one be more historical than the other on the basis of redaction critical criteria? Not on the basis of an evangelical use of the tools. Matthew is emphasizing the spiritual side and Luke the economic side of the same original saying. In other words, both are equally historical.† (Osborne, 199) C. Structure: While paral lelism is a Hebraic poetic style and The New Testament is written in Greek it must not be forgotten that it is quoting Jesus who is from a Hebraic cultural milieu. Hebraic poetic parallelism does not use rhyming words but rhyming ideas and there is great merit in seeing Matthew 5:3-10 through this lens D. Redaction: While redaction refers to the author acting as an editor to suit the original content to his own objectives for writing, it does not necessarily mean that the content is rendered corrupt. If this argument is to be based on the two-source theory, then there is the possibility that Matthew arranged chapter 5 to show logical continuity of the Old Testament in the new historical setting to set Jesus above the pharisaic figures and the pharisaic teachings. This is well stated by Robert Imperato â€Å" While Pharisees were claiming that their lifestyle and teachings were the fulfillment of Jewish life, Matthew’s Gospel was claiming that Jesus was the fulfillment of Jew ish life (Imperato, 16) E. Keywords: From the point of view that Matthew has used parallelism, the keywords of 5:5 would be â€Å"Meek† and â€Å"Inherit the earth†. The other keyword that needs to be considered is â€Å"Blessed† in terms the context of the passage as well as the verse being exegeted. These words then have to be understood in terms of it’

Friday, August 23, 2019

The Genetics Of Food Crops Essay Example | Topics and Well Written Essays - 250 words

The Genetics Of Food Crops - Essay Example Firstly there is unintentional harm to other organisms (Such as how other animals will react to modified pollens that other organisms eat). Secondly, there is the reduced effectiveness of pesticides insofar as plants that have been modified to be pest resistant may boost the immune system of insects so that they are less affected by traditional pesticides. Thirdly there is the unintended gene transfer to other species which means cross-pollination with non-genetically modified plants. As a fourth point, there is the risk of increased allergic response to genetically modified crops. One additional point is the unknown long-term effects on human health and finally, there are economic concerns associated with massive new cheap crops that may crowd out traditional food crop growers. With all these points in consideration, one must understand that all these criticisms mean nothing to somebody that is starving to death. People who are impoverished rely heavily on inexpensive food crops. If improvements can be made to increase food output, nutritional output or reduce costs associated with growing food than it may be beneficial to the people who would best capitalize on this product. As a final point if Norman Borlaug had never made the genetic improvements to our cereal crops than according to the American Council on Science and Health (2007) that it is estimated that over a billion people would have starved to death. For his contribution, Borlaug was awarded both the Nobel Peace Prize and the Congressional Medal of Honor.

Case Study#5 Let the Committee Decide Study Example | Topics and Well Written Essays - 500 words

#5 Let the Committee Decide - Case Study Example However, in any learning institution the decisions are vital since they impact the learners, teachers and community (P.2, L.24). Principals, often don’t advocate the model since it leaves only a few people within the school committee with the power to make decisions that affect the entire administration. According to them, this initiative directly undermines the principles administrative role, limits creativity and general commitment. Possible perceived advantages of dividing administrative functions into organizational units include: allowing for more targeted governance within the organizational divisions. The division of responsibilities will guarantee accountability and efficiency in administrative roles. As well as provide an opportunity in measuring individual performance of the appointed management. The cons of dividing administrative funding include less self-sustainability - in that smaller sections often tend to face challenges in regards to human and natural resource available to carry out the organizational tasks. Since, they are still dependent on the central body for regular funds and resources. They are also known to affect the unity since some of the management, divisions and distributions of resources choices are bias, and this will ultimately affect unity and lead to in fights. The perceived advantages of committee panel making administrative decisions include the commonly identified aspect of automatically gaining access to the accumulative group knowledge which results in an advantage to the organization. In addition, it makes the decisions more professional and due to its participative nature can contribute to the general satisfaction of the teachers. On the other hand, the perceived disadvantages with using committees for decision making include. The members tend to shift towards extreme or exaggerated decisions, in that person acting as a committee often seem to make decisions that individuals

Thursday, August 22, 2019

Ottoman Empire Study Guide Essay Example for Free

Ottoman Empire Study Guide Essay Devshirme: Every 2 years or so, young Christians were taken and trained and converted to Islam. They would either be janissaries (foot soldiers) but ones with â€Å"intellectual promise† went to work in the government. Many became powerful. Some were slaves? Because the enslavement of the Muslims was not allowed. The power was NOT hereditary (like the Chinese). So the sultan surrounded himself with people who did not have families. Millet System: Each religion had their own leader -Kept Jews and Christians happy -But they were still viewed as second-class citizens. -Everyone in a Millet still had to pay taxes to Empire though. -The Christians and Jews had to pay a special tax called the Jyzia. Jyzia was expensive tax. It showed favor to the Muslims. If you converted to Islam then you would not have to pay the tax. -Jews normally had more respect for this system because they never really were respected and had a country -Muslims regarded the Christians and Jews with a sort of respect because they are all Abrahamic Religions. But they were skeptical of Christianity because of the holy trinity and they believed that that meant they were poly, not monotheistic. Sà ¼leyman: â€Å"Suleyman the Magnificent† -10th Ottoman Sultan -Had great army -Warlike -Enforced the â€Å"Law of Fratricide† which was the act of killing all male relatives of the sultans so they would not over take the throne. -Was married to Hà ¼rrem (the smiling one) who was the â€Å"head concubine† fell in love with her. This was unusual because by this time it was not necessary for alliances through marriage to be formed. Selim the Sot: Successor of Suleyman. -Did not do much. Slacker. Preferred Eunuchs and concubines, and drank a lot Murad III: Successor to Selim -Manipulated by mother and wife -But still had military advances Mehmet: †¢Sultan Mehmet II -Conquered Constantinople †¢renamed it Istanbul †¢largest city in Europe (700,000+ people) †¢architecturally unbelievable (symbolized wealth and power) -Formed a navy †¢enabled Ottomans to conquer Venice and Mediterranean Islands -Improved Army †¢guns + gunpowder + technical advantages -portable guns Decline of Ottomans: Inflation, created an atmosphere of bribery and corruption. Not able to pay Janissaries so they no longer had complete power. Army became less efficient. Sultans stopped training their sons to rule so they became terrible rulers. So power went to the Janissaries and became a hereditary thing. Empire soon began to be ruled by the military.

Wednesday, August 21, 2019

Investigating The Importance Of WAN Technologies Information Technology Essay

Investigating The Importance Of WAN Technologies Information Technology Essay Wide area network is very important to the global to do their work easily now days every companies trying to develop their business all over the world wide area network helps them to connect their network together .the companies need to design the network according to their needs and purpose because different type of networks are available for different purpose. According to this project the company network placed in different countries each network hold different application Different type of architecture models is available to design network one is peer to peer model and another one is client/server model most of the network designed by using client/server model. peer to peer model is connect two or more computers connected through network this model is unsafe because it is difficult to implement security policies .different network topologies are available to design network so we have to consider these topologies when design a network. Normally every companies using star topology to design their network because this topology have more advantage when compare with other topologies various hardware components need to design a network such as switches, routers, firewalls, server, linkect By using Ethernet technologies and other network technologies several LAN (local area network) is created in different countries then each subnet LAN was connected together via ATM cloud to make WAN (wide area network) In this project company network model was designed in opnet modeller to investigate the performance of a network looking at WAN technologies with varying traffic loads there are different type of link used to implement the traffic load the network was designed up to getting the final result LITERATURE REVIEW Computer network Computer network is more than one computers or group of computers and network devices are connected together for the purpose sharing information, file and data between each computer. Different type of devices need to design a computer network such as switches, hubs, routers, different link, firewall, server and work station Protocols are use to do sharing information, files, datas over the network there are two transmission technology available in computer network one is broadcast and another is point to point connection. Computer network classified according to network architecture (peer to peer model, client/server mode), network topology (star topology, ring topology, bus topology and mesh network topology).computer network it is classified as personal area network (PAN), local area network (LAN),metropolitan area network(MAN),wide area network(WAN),global area network(GAN) Computer network is very useful to the public because it has many applications such as access to remote information by using this application any one can do their work from anywhere in the world( ticket reservation ,shopping), communication between one to another through email, videoconferencing. Business application Different type of computer network Local area network (LAN) Local area network (LAN) is less number or group of computers and related devices such as printer, scanner etc that share a common communication line.lan is considered within a small geographical area such as a home, office building here LAN is designed by using Ethernet technology such as Ethernet cables, Ethernet switches and adapters. Local area network (LAN) performance features are depending on size of the network, network topologies and transmission technology. Advantage of LAN is cover small geographical area so transmission time is limited. Different type of topologies is support to create broadcast LAN network such as bus and ring based topologies. FIDD is used in the LAN for connect token ring. IEEE 802.11standad indicates the local area network technologies. [Andrew s] Metropolitan area network (MAN) Metropolitan area network (MAN) is developed version of LAN and this network also using same technologies as LAN, compare with LAN it cover large area (company offices and city).this network carrying voice signal and dates. MAN network contain few cables it dont have any switching elements, by using network technologies such as backbone technology, routers and switches it connect several LAN networks. DQDB (distributed queue dual bus) is MAN network standard by using this standard we can expand the network up to 30km and speeds of 34 to 155 Mbit/s Wide area network (WAN) Wide area network (WAN) comparatively covers wide geographical (country or continent) area and connecting number of local area network, local area network connected to a WAN through the public net work such as internet.WAN network can use is satellite system, WAN routers contain antenna by using antenna it can make data transmission. Switching device and transmission link are two separate mechanism of subnet in the WAN network. Different type of transmission link are available to carry the signals and data transmission from one system to another system over the WAN network such as twisted pair cable, coaxial cable and fiber optic cable. WAN is a collection of LAN, these LANs are connected via switching device router so each LAN must contain at least one router to interconnect. WAN network use backbone technology. Global area network (GAN) Global area network (GAN) is collection of different network such as WAN or MAN it covers the very large geographical area (unlimited area). Worldwide individual business companies use GAN network for their process. Network architecture model Client-server network model Client- server model is very useful and popular network model in the network architecture client and server devices are designed for the particular function in the computer network client server model mainly used in internet as well as local area network. Personal computers are client device in the network it is installed with required network software; database and files are stored in the server devices, server devices contain more memory, bigger disk drive than client devices The client server model client makes a request to server and server receives client request and response to their client request. Advantage of client-server model is centralised network model it means all users in the network are connected to a central server. Central server contains all user information and communication information. Configuration of data backup, security policies are easy in this model Peer to peer network model Peer to peer network is suitable for a small network in this model more than one computer or group of computers are connected through the network .peer nodes sharing their documents, audio, video file and datas in digital format a and also they sharing their resource without a dedicated server all connected peers act as either client or server. One system acts as server for one transaction while simultaneously act as client for another transaction in this model every client act as server and server act as client. It is complicated to apply security policies and access policies to the network because peer to peer network is a small contain few computers. Access permission and rights of users set individuality in peer to peer network. This model do not utilize centralized network model so it dont have any user information or communication information NETWORK TOPOLOGIES Different network topologies are available in computer networking they are star topology, bus topology, ring topology, tree topology and mesh topology these topologies help to design an excellent network. when design a network designer should have to choose which topology is suitable for the particular network Ring topology Ring topology is used to connect network devices in ring shape when these devices in ring shape each device has two neighbour devices for their message transaction this message transaction between neighbour only one direction. Ring topology use token passing system to their message transmission and access control. Main drawback of this method is any device fails in network ring that cause entire network transmission become failure this kind of network can manage and implement easily and it normally uses in office, school network different technologies are available to implement ring topology such as token ring and FDDI Star topology Most of the network use star topology because implementation and maintains of this network is easily this kind of networks use point to point connection between devices and central hub main advantage of star topology is any connection fail between device and hub that affect only particular device. This network devices use twisted pair Ethernet cable to connect with central device hub Bus topology Bus topology mainly used in LAN networks because these kinds of topology suitable for limited number of device bus topology use backbone to connect all devices together backbone function as connect different part of network and offering path to message transmission between network. Implementation of this topology is easy and inexpensive. It is possible to message transmission in both directions, to avoid message bouncing use termination at both end of the bus cable there is no need more cabling to connect devices. Main disadvantage of this topology is if backbone cable fails that affect whole network Tree topology Tree topology combines multiple several star topologies together into a bus by using point to point connection hub devices linked to the tree bus to develop network scalability bus/star topology in a hybrid approach. Implementation of this topology is very difficult, if backbone cable file whole network become failure advantage of this topology is each parts connected by point to point link and it supported by a number of hardware and software vendor. Network components Hardware and software components need to create a network there are different type of hardware components available in the network each of them configured for different function. Usually a network contains many components such as switch, router, server, firewall, hub, work stationest. Router Router is one of the important devices in the network it is used to connect more than one network together such as two WANs or two LANs and it allow data transmission between the networks. Routers having routing tables it contain information about network devices that uses to find the destination place of the network. Routers work at transport and network layer of the OSI reference model. Routers maintain traffic control in the network. Switch Switch is one of the hardware devices in the network it is used to connect network device such as server, workstation and printers together with in a local area network .switches work at the data link layer of the OSI reference model. Switches have a facility to check whether that the data received or not, delivering the messages to correct destination and also identifying that the particular data was transferred from which device (source) to other device (destination).`different type of Ethernet switches are available but in this network i have used Ethernet 16 port switches to connect network devices. Server In the client/server networking model a server receive requests from client in the same network or other network and response client request. There are different types of server with their related configuration. In this network i have used many servers such as database server, Email server, VoIP server, HTTP server, FTP server, file server, printer server and backup server. Firewall Main task of the firewall is preventing unprivileged user from accessing the network. There is different type of firewalls such as packet filter firewall, application gateway and proxy server each of them doing different job in the network .firewall implemented in some hardware devices. In this project i have used firewall router in a simulation. Open system interconnection (OSI) model OSI reference model is clearly defined how messages transmitted from source to destination in the networking. OSI reference model contain seven layers such as application layer, presentation layer, session layer, Trans port layer, network layer, data link layer and presentation layer. This model describes structure of a network for applying protocol on seven layers. Every layers doing different function. This model spited into tow part such as upper layers and lower layers. Upper layers associated with software and lower layers associated with hardware. Application layer Application layer is highest layer of OSI reference model. Main function of this layer is interface for users to relate with application and identifying end user, verify resource availability. By using application users can access information at application layer. Application layer providing some services such as file transfer, electronic mail and software services. Many Protocols are implemented in this layer such as file transfer protocol (FTP), hyper text transfer protocol (HTTP), simple mail transfer protocol (SMTP) and telnet. Presentation layer Presentation layer is sixth layer of the OSI reference model this layer receives all messages from application and sends those messages to session layer. Main function of this layer is converting the format of receiving and sending data format and also many functions are undertaking by this layer such as data compression, encryption, decryption, protocol conversation and encodes message for email transaction. Presentation layer providing some services such as simple mail transfer protocol (SMTP), telnet and file transfer protocol (FTP). At this layer data transmission starts with syntax and semantics format. Session layer Fifth layer of the OSI reference model is session layer it provides function to communicate between two nodes in the network this layer create, maintain and stop connection between the node and few protocols are implemented they are data link protocol (DLP), apple talk session protocol (ASP) and printer access control protocol (PAP) these protocols are mainly uses to multimedia messages. Transport layer Data link layer Data link layer is second layer of the OSI reference model the use of this layer is control and arranges all sending messages from software to network link. This layer makes some network setting such as data format setting, time setting and wire setting. it gives many services such as keep all messages are correct format when they transmit, maintain flow control when messages transmit over the link ,detecting error in physical layer and encoding messages for secure transaction. Physical layer Physical layer is lowest layer of the OSI reference model. This layer receives all messages from data link layer in the format of bits and converts into signal (electrical or electromagnetic signal).messages are sending to physical media via switches and wires TCP/IP model TCP/IP model contain four network layers such as application layer, transport layer, internet layer and network inter face layer. TCP/IP model and OSI reference models are providing similar services.TCP/IP model contain network communication protocol used to for different type data transmission between different networks. Simple mail transfer protocol (SMTP), used to Email transaction, file transfer protocol (FTP) used to file transaction etc. This model defines how particular protocols are implemented in a computer for data transmission over the network. End to end connectivity of the TCP/IP model define how datas received, routed and formatted at end nodes. TCP/IP application layer Application layer is higher level protocol of TCP/IP model this layer match to OSI reference model of session layer, application layer and presentation layer. This layer gives different services to user such as file transfer, email ect. Application layer contain many protocol such as simple mail transfer protocol (SMTP), file transfer protocol (FTP) and telnet. All datas are coded in this layer then these datas encapsulated into transport layer. Lower level layers of TCP/IP model treat by application layer. Transport layer Transport layer is third layer of TCP/IP model. This layer providing services these services are managed by the user datagram protocol (UDP) and transmission control protocol (TCP). TCP is connection oriented and reliable transmission protocol. Connection oriented it means source (sender) set up connection with destination (receiver) node before the sending data. Error detection, error correction retransmission of datas is possible in TCP. UDP is connection less and unreliable transmission. Error detection, error correction retransmission of datas is impossible in UDP it is suitable for audio and video transmission. Internet layer Internet layer is second layer of TCP/IP model this model used to transfer the message from source computer to destination computer. Internet protocol (IP) is main protocol of this layer. This protocol providing many services such as routing packets between source and destination. Internet protocols receive messages from network interface layer in the format of bit then make it into packets. Network interface layer is lowest layer of the TCP/IP model main function of this layer is by using protocol it create a connection to physical medium, error detection and packet framing are possible in this layer. This layer contain local area network (LAN) and wide area network (WAN) technologies such as token ring,X.25,ehhernet and frame relay. This layer responsible for physical devices such as wire, cables, network interface card and satellite links. Asynchronous transfer mode (ATM) Asynchronous transfer mode (ATM) contains three layers such as ATM adaption layer, ATM layer and physical layer. This model providing different type of function it used to transfer all type datas such as audio, video and text messages. Same time we can use ATM technology in different network (LAN. MAN and WAN). ATM model contain management, hyphenated and handshaking protocol, quality of services and flow control facilities. Hyphenated protocol is connection oriented; cell switched and point to point.ATM use different type of technologies to data transmission. Fixed -length cells model used to transfer variable frames this model use 48 bytes for data, 5bytes for overhead. ATM adaption layer ATM adaption layer is third layer of this model this model composed application layer, transport layer and session layer of OSI reference mode. There are two different types of layers in ATM adaption layer such as convergence sub layer and segmentation and reassembly sub layer. It is classified into five types of class for providing different type of services. According to this class of services Convergence sub layer receive messages from high level layer, identify the received message format, type finally arrange all messages for sending out. ATM layer ATM layer is second layer of this model this layer providing link between ATM adaption layer and physical layer to transmit cells between those two layers and also create virtual link, doing multiplex and de-multiplex of cells, creating cell header. ATM physical layer ATM physical layer is first layer of this model the main function of this layer is encapsulate all incoming cells in a proper format before transmit bit to the physical medium. Physical layer divided into two sub layers such as transmission convergence sub layer and physical medium dependent sub layer these sub layers are doing different function such as transmission convergence sub layer doing error correction, framing and de-framing of cells and physical medium dependent sub layer assign bit time and coding for the physical medium. Protocols Protocol is a set of rules it is used to transfer the message between one ends to another end. OSI reference model is clearly defined how messages transmitted from source to destination in the networking. This reference model contain seven layers each layers must contain one or more protocol for their message transmission. Internet protocol (IP) Main function of internet protocol (IP) is transmits message between one end to another end. When sends the messages via this protocol message divided into many parts each part contain IP address if end system and this small segment send different ways receiver receive this segment in different order. This protocol implemented in network layer of OSI reference model and internet layer of TCP/IP model so internet protocol (IP) support data transmission to upper level layers in OSI and TCP/IP reference model. This protocol is connection less protocol and we cant make sure about delivery of message. Now days two different version of internet protocols (IP) are available in the networking such as internet protocol version4 (IPV4) and internet protocol version6 (IPV6). Transmission control protocol (TCP) Transmission control protocol (TCP) applied in transport layer of OSI reference model and host to host transport layer of TCP/IP model for message transmission. This protocol is a connection oriented and reliable transmission protocol. Connection oriented it means source (sender) set up connection with destination (receiver) node before the sending data. Error detection, error correction retransmission of datas is possible in TCP. Message transmission via this protocol is very slow because of overhead (20bytes) for error correction/detection and acknowledgement. There are two types of buffers such as sending and receiving buffers these buffers are used to storage, flow control, error detection and correction. Same time messages can be transfer both direction in TCP it provides full duplex transaction and also multiplexing and de-multiplexing are possible in TCP. [Behrouz A.] User datagram protocol (UDP) User datagram protocol (UDP) installed in transport layer of OSI reference model and host to host transport layer of TCP/IP model for message transmission between the layers. This protocol is a connection less and unreliable transmission protocol. Message transmission via UDP is very fast because there is small header (8bytes).this protocol containing many drawbacks such as no error control and no flow control. Receiver cant identify whether this message is original or duplicate when message transfer via UDP. Encapulation and decapitation of messages are possible in UDP when messages transfer from source to destination. [Behrouz A.] Hyper text transfer protocol (HTTP) Main function of hyper text transfer protocol (HTTP) is access data from internet (www).this protocol is applied in application layer of OSI and TCP/IP reference model. It is describe the message transmission over the network from client to server and data format. This protocol use TCP for data transmission between client and server in this model the client first send request to server then server send response message to client. There is no secure message transmission because HTTP does not provide security HTTP provide security when it run over the secure socket layer This protocol messages can only understand by HTTP client and server. [Behrouz A.] File transfer protocol (FTP) File transfer protocol (FTP) is applied in application layer in TCP/IP model. Main function of this protocol is transferring datas from source to destination (client to server or server to client) in easy way.FTP protocol create two link between source and destination one is for message transmission other link for replay.FTP use three commands such as RETR command function of this command is copying files, STOR command function of this command is store the files and LIST command this is for list the files.FTP use different transmission mode to transfer the files such as compressed mode, stream mode and block mode .through the FTP protocol we can send text files, images and ASCII files.FTP use two different TCP port, port 20 is used transfer datas or files between client and server and port 21 is used to control transmission between them. [Behrouz A.] Simple mail transfer protocol (SMTP) Simple mail transfer protocol (SMTP) is installed in application layer in TCP/IP reference model. Function of this protocol is transferring the email messages between client and server and also it contains some commands these commands are used to transfer the datas between client and server. Some other protocols are support to email transmission with SMTP such as post office protocol (POP3) and internet mail access protocol (IMAP4) [Behrouz A.] Simple network management protocol (SNMP) Simple network management protocol (SNMP) is applied in application layer of TCP/IP reference model this type of protocol is used to manage the network for providing better network performance by regular testing system, protect the network from unwanted user by monitoring system. SNMP protocol defines the transaction between the manager and agent. SNMP manager verify the agent details by sending requesting message to agent. SNMP identify the packets exchange between manager and agent [Behrouz A.] Network transmission media A transmission media is necessary to transfer a signal form source to destination in the networking system. Signals are transfer via Guided and unguided transmission media now a days different type of guided transmission media support to carry the signal such as twisted pair cable, coaxial cable and fiber optic cable. Unguided transmission media it is radio wave, micro wave and infrared Twisted pair cable Twisted pair cable is one of the guided transmission media to carry the signal over the network. Analogy and digital signal can be carried by this cable. This cable contains two shield copper wire then these wires are sick together. This type of cables used in telecommunication system. Twisted pair cable not suitable for long expanse, repeaters is needed to use long distance, for small area it will work without amplification. Compare to other cables this type of cable is inexpensive. Two types of twisted pair cables are available one is unshielded twisted pair cable (UTP) another one is shield twisted pair cable (STP). [Andrew s] Coaxial cable Compare to twisted pair cable it is better shield cable it is suitable for carry the signal to long distance. This kind of cables used to carry the high frequency signals and broad band signals as well as this cable carries analogy and digital signal but using different cable. Coaxial cables providing functions in several ways one is baseband it use total bandwidth to carry the signals, another one is broad band it divide the bandwidth with signals. Centre core it is made by hard copper wire, this core is bounded by inner dielectric insulator, copper screen and plastic sheath. [Andrew s], [Michael] Fiber optics cable Fiber optic cables transfer the signal in the form of light beam. This type of cable is used to connect different cities and countries such as telephone connection because these cables are suitable for long distance. Two different types of fibre optic cables are available such as single mode fibber optic cable and multimode fiber optic cable and this cables contain two part such as inner class cylindrical core and outer class cladding Compare with other cables it has many advantage such as it can be used to long distance, signal transmission is very fast and loss of signal is very low. Disadvantage of this cable it is very expensive. [Michael] Quality of services Quality of services (QOS) contains many network technologies to develop a network. Quality of services gives expected result to the network and quality of services develop and determine data transfer, delay, and error rate and loss of cell in the network. It is very use full apply the quality of services to VOIP and video but implementation of quality if services to network is very difficult. Quality of service measure Type of Delay Different type of delay are occur in the network during the data transmission from one system to another system they are processing delay, queuing delay, transmission delay and propagation delay. Processing delay A data(1 bit) transmission time between the end systems (source to destination) it is called processing delay this delay may occur for the following reaction such as error datas transmitting from one system to router, network architecture, switching mode and also it include in configuration of network devices Propagation delay A data (1 bit) of transmission between the source and destination it is called propagation delay. This delay depends on distance between routers and propagation speed; it depends on the transmission media propagation delay calculated by dividing the distance by propagation speed Propagation delay= [Behrouz A] Queuing delay Datas or packets waiting in queue at intermediate device (router) for their transaction, when the network is busy router cant rout all the packet at same time it process these packet one by one so packets need to wait this waiting time is called queuing delay. Transmission delay Transmission delay is amount of time is needed to transfer one bit of data via transmission media. Transmission delay depends on bandwidth and size of the data. Transmission time= [Behrouz A] Jitter Voice over internet protocol (VOIP) Voice over internet protocol (VoIP) is used to communication purpose it means one person can transfer his information to another person through telephone call, voice and fax over the IP based network. To reduce the bandwidth waste VOIP use packet- switching method to telephone calls. Normally more bandwidth is needed to voice transmission but voice data is compressed to small for the transaction so it require small bandwidth. Main advantage of VOIP is reducing the cost of long distance calls, when compare with ordinary phone call for this reason every organization applying VOIP in their networks. IP telephone is used in the VOIP network because IP telephone designed with coder/decoder for convert the voice signal from analogy to digital signal and digital to analogy signal. Softwares and hardware components are helps to connect the phone with network. Different protocols are implemented in the VOIP network for support voice transaction such as RTP(real time transport protocol) it support the delay of audio, H.323 protocol used to multimedia transmission, H.235 protocol used to data encryption. ) [Michael] List of books 1) [Michael] MICHAEL A, WILLIAM M Networking explained, second edition ISBN 1-55558-252-4 2) [Behrouz A.] Behrouz A. Frozen, TCP/IP protocol Suite Fourth Edition ISBN 978-0-07-016678-3 3) [Andrew s] Andrew S.Tanenbaum, computer networks fourth edition ISBN 0-13-038488-7 4) [James F] James F.Kurose, Keith W.ROSE Computer networking, fourth edition, a top down approach ISBN -13:978-0-321-51325-0 ISBN -10:0-321-51325-8 5) [Behrouz A] Behrouz A.Forouzan, data communication and networking, fourth edition ISBN 007-125442-0 List of Internet and

Tuesday, August 20, 2019

Separates Science From All Other Human Activities Philosophy Essay

Separates Science From All Other Human Activities Philosophy Essay Science is distinguished for its changeable nature of conclusions. It addresses the method  used to reach conclusions; the ideas of verification, falsification, and the thought that science presents its theories with a degree of probability. The conclusions in science are conditional because currently they are considered to be true, but according to the nature of the science, they are subject to change. Science is defined as knowledge gained by systematic experimentation and analysis (Munday). What distinguishes the sciences from other areas is a very different method of finding truth. The definition of truth in this case is what works in practice or is useful to us because science is heavily based on the pragmatic theory (Munday). The question is perhaps misleading since it doesnt mention which type of science is implied; natural science, human science, or ethical science Science is a provisional human activity; this can be observed when comparing areas of knowledge in terms of pr ovisional conclusions. Science is a practice where truth is supported through experimentation and observations. It is a posteriori knowledge, meaning that it is knowledge that is derived from experience or empirical evidence. People state that science is based on too many assumptions, and the rules always change, therefore, we should employ other ways of knowing such as our perception. In my view, the main reason we should appreciate this way of knowing; the conclusions of science are changeable. These regular changes show that even though we might never find out the truth, we are progressing in subjects such as biology, physics, chemistry, etc. However, by expressing it as a pragmatic way of knowing, we can see that science is about discovering the truth. This truth may not be the perfect truth such as outlined by Plato with his idea of ideal forms. This truth is more concerned with value or usefulness. Within the history of science, scientific laws and theories have been changed or have been disproved. F or example, there was a cubical atom theory that stated that all atoms had a shape of a cube (Munday). This theory was disproved by many scientists such as Bohr and Rutherford (Munday). We now have a different prediction of what the atom is due to quantum mechanics (Munday). However, if you take account of Quantum Theory, then even the conclusions about the physical world become highly provisional reality is no longer deterministic and mechanistic, and some of our conclusions about this reality end up being provisional. Scientific knowledge is derived from the use of a precise, rigorous method that involves inductive logic. For example, if I observe that water always boils at 100 °C when I am cooking (Arnhart), I assume that this will always be the case (induction). However, if I were to boil water in Denver, Colorado, a location 1.6 km above sea level, I would discover that the water now boils at 94 °C, as the pressure on the liquid is reduced (Arnhart). As we can see, the ind uctive component of the scientific method can sometimes lead to an incorrect hypothesis. Even if a scientific theory has been rigorously tested one million times there is always the possibility that an exception will be found, and hence the theory falsified. Karl Popper acknowledged this problem and suggested that a hypothetical deductive method should be used, whereby false hypotheses are discarded through trials and disproof (Arnhart). This means we cannot prove a theory is correct; we can only prove that a hypothesis is false. Thus we can never know that a scientific theory is true; the reason why scientific conclusions are provisional. For instance, a scientist is trying to find a cure for cancer, but instead finds out how a persons brain works, he still expands our knowledge of all the things around us, even though that scientist was trying to find a different answer. This usefulness always reshapes our knowledge since it brings in new ideas and models that attempt to explain t he patterns that are all around us and where conclusions are made according to the current knowledge. Our knowledge is available to adapt by being provisional. With science, we accept our limitations of todays instruments, and we analyze the situation and what we can potentially do for further knowledge or experimentation. Science doesnt stop improving our customs of experimenting even though we know we cant reach the perfect truth (Plato) making it provisional even if it may seem to be currently true. Science is so relied upon for this reason that it advances our society. One of the main differences between the Natural and Human Sciences (ethics, history) is the object of study: while the Natural Sciences observe and experiment on the world of nature, the Human Sciences focus more on human behaviour. Humans are, arguably, less predictable and stable than the natural world, so the conclusions about our behaviour should be more provisional than the conclusions reached. Although science is the answer to many of our disputes, it is based mostly on theoretical predictions, and that creates a fallacy. For example, scientists in a university have made a device to clean and purify water for the people in South Africa and they have sent it to Africa (Arnhart). Once the device was in use, it killed 45% of the people in 3 weeks. A study relived that the filter used did stop Cysts (bacteria) from going through initially but these bacteria started to grow inside the filter clogging the filter. Nothing was noticed because the bacteria were so small, and the pressur e of the water squeezed the 4.5 micron bacteria into the 1 micron holes of the filter. In theory, filter was a valid device to use to clean the water but when in application is failed. These predictions are based on theoretical assumptions. Even though our limitations can be accurate even, this accuracy is not perfect; we try to achieve the best at finding a conclusion. Yet, the uncertainty of the conclusion can still prove it false, and so the science turns provisional. Math is a very different area of knowledge. The only difference today is that math is much more complex in applications of basic principles. The definition of math is the system of quantities, forms, space and their relationships in use of numbers and symbols.   The Egyptians came up with simple functions such as addition. These functions are still useful since we substitute symbols to represent difference concepts in reality. The symbols and applications might differ, but the expressions stay the same. The ancient Greeks used symbols rather than numbers; equations, they came up with were the same. One may deduce that math is not a provisional subject. In many ways, math is the foundation of other areas of knowledge such as analysis and measurement in sciences. In some cases, wed never find out more about certain topics. For instance, the string theory can only be proven with math because physically we cant comprehend eleven dimensions. Multiplication will not change over time comp ared to a scholar learning how his brain works- he will soon have to update his knowledge because what we know in the field of science always changes. Today, scientists try to link the missing puzzle pieces; however, once a scientist connects a puzzle to the whole picture, and it is perceived to be the correct placement, then more and more questions arise. Furthermore, in math, once something is proved, it is no longer contested. For example, today nobody should argue that two multiplied by five is not ten. Math, arguably, is a human construct; it is up to us to make up symbols that would represent the patterns that we encounter. The knowledge and conclusions of math arent that provisional but its application is. Like science, art has many changing conclusions. When a person looks at a picture, he invariably interprets it and evaluates it. However, when a different individual looks at the same picture, he might interpret it in a very different way. These interpretations can vary because of many aspects. Ones age, for example; there is a painting of a cow (Arnhart). An elder might think of it as a source of meat, while a boy might see a joy ride (Arnhart). Thus each person has concluded on a different interpretation and this uncertainly on which is the true conclusion makes the art as a area of knowledge provisional. Generally, conclusions in art are based on the frames of reference of the person that is evaluating the art piece with a personal experience or posteriori knowledge. Thus, art is provisional in nature because even one painting might have different conclusions based on it. By comparing math, sciences, and art one can see that the knowledge gained from the sciences change; however, it is not the only subject that is provisional, that is shown through subjects such as art and history. Even one art piece can have many conclusions associated with it. The statement what separates science from all other human activities is its belief in the provisional nature of all conclusions (Michael Shermer, www.edge.com) is only partly true since science is provisional; however, that doesnt separate it from all other human activities. Math is an example of a static subject whereas, science is a subject open to debates and updates. We might think that sciences are not important to us since what we know now as the truth always changes; however, we must understand that a person who is confident that he knows everything will never learn. Through science we accept that our knowledge is limited, and we strive to improve what we already have. Even though some scientific knowle dge is considered be truth, it is still provisional since science is focused on disproving predictions and not on gathering enough evidence to make the conclusion valid or sound. Without science, one may argue, we would never achieve the advancements that we are fortunate to have today. Word Count: 1652

Monday, August 19, 2019

Essay --

Cognitive behavioural therapy, an empirically validated treatment for Major Depressive Disorder (Robinson, Berman, & Neimeyer, 1990) has featured in over 78 research studies, and is the treatment of choice when treating depression by many clinicians. A meta analaysis completed by Dobson (1989), reviewed 28 studies featuring cognitive therapy and depression, and found that cognitive therapy was a more effective treatment modality than behaviour therapy, wait list control, medication, and other therapies. A further meta-analysis conducted by Gloaguen et al., (1998) found that Cognitive behavioural therapy was equal to behaviour therapy, and more effective than drug treatments when treating Major Depressive Disorder. While depression has been found to be successfully treated by therapies such as CBT, many depressed individuals do not continue to attend therapy (Barnes et al., 2003). This can be challenging as CBT in particular requires a commitment from participants in terms of attending a number of sessions so that the client can begin to experience progress. Researchers have found inattendance by those with depression may be due to a number of factors, such as avoidance of dealing with negative feelings (Barnes et al., 2013). According to MacDonald et al (2007), the symptomology of depression, such as reduced concentration, may provide a need for alternate ways of information to be provided when treating depression. One of the core components of CBT is homework activities, with homework completion being found to lead to greater results of therapy (Flynn, 2011). In a study by Simons et al., (2012), it was found that adolescents self reported less depressive symptoms, as well as reduced hopelessness,... ...as found, with these changes maintained at three and six month follow up. In addition, a one day EFT workshop, where EFT was delivered to 216 healthcare workers, resulted in a statistically significant reduction in depressive symptoms (Church, Geronilla, & Dinter, 2009). Two randomised controlled trials (RCT) found EFT to be an effective medium when treating symptoms of depression. After completing an 8 week online EFT course, 36 fibromyalgia patients receiving treatment for PTSD were found to have a significant reduction of depressive symptoms (Brattberg, 2008). The second RCT focussed on 59 war veterans who were experiencing clinical levels of depression. After six sessions of EFT, there was a significant change in their depressive levels which dropped to a subclinical level. These improvements were also maintained at follow-up (Church et al., 2011).

Sunday, August 18, 2019

The Christian Perspective on Stem Cell Research Essay -- Argumentative

The Christian Perspective on Stem Cell Research      Ã‚   Many Americans do not see how the existing state laws forbidding human cloning can survive, and others like them be enacted, since the federal government has given its blessing to the cloning and destruction of human embryos for research purposes. An entire area of law where states have been able to express respect for human life may be wiped away.    We know that many have made expansive claims for the benefits of human embryo research. However, all such claims are conjectural. Embryonic stem cell research has not helped a single human patient or demonstrated any therapeutic benefit. At the same time, adult stem cells have helped hundreds of thousands of patients and new clinical uses expand almost weekly. Even President Clinton's National Bioethics Advisory Commission, recognizing the human embryo as "a developing form of human life," concluded that the use of embryos from fertility clinics for such research cannot be justified if morally noncontroversial alternatives exist. There is now ample evidence that they do exist, are far more promising than once thought, and are worthy of increased public attention and government support.    Most Christians have grave concerns on this critically important issue of embryonic stem cell research. In our view, conducting research that relies on deliberate destruction of human embryos for their stem cells is illegal, immoral and unnecessary.    It is illegal because it violates an appropriations rider (the Dickey amendment) passed every year since 1995 by Congress. That provision forbids funding "research in which" human embryos (whether initially created for research purposes or not) are harmed or destroyed ou... ...eficiency (SCID)-X1 Disease," 288 Science 669-72 (28 April 2000).    16. K. Foss, "Paraplegic regains movement after cell procedure," The Globe and Mail (Toronto), June 15, 2001 at A1.    17. E. Ryan et al., "Glycemic Outcome Post Islet Transplantation," Abstract #33-LB, Annual Meeting of the American Diabetes Association, June 24, 2001. See: http://38.204.37.95/am01/AnnualMeeting/Abstracts/NumberResults.asp?idAbs=33-LB.    18. M. McCullough, "Islet transplants offer hope that diabetes can be cured," Philadelphia Inquirer, June 22, 2001 at A1.    19. D. Woodbury et al., "Adult Rat and Human Bone Marrow Stromal Cells Differentiate Into Neurons," 61 J. of Neuroscience Research 364-70 (2000) at 364 (emphasis added).    20. D. Prockop, "Stem Cell Research Has Only Just Begun" (Letter), 293 Science 211-2 (13 July 2001)(citations omitted).

Saturday, August 17, 2019

All Grown Up and No Place to Go Teenagers in Crisis

Child and adolescent development specialist David Elkind contends that today's teenager’s are struggling as the result of a shift in society to a â€Å"postmodern† period. In this period, â€Å"the needs of children and youth are often weighted less heavily than are the needs of parents and the rest of adult society† ( xiii ). Elkind believes that, as a result, â€Å"we as a society have abrogated our responsibility to young people† (xiv).Elkind explains how, in this postmodern period, adults mistakenly treat teenagers as though they were already competent and sophisticated, and therefore do not guide them from childhood into adulthood, as youth were guided in previous generations. His words sound a clear warning to teachers and other adults who tend to confuse teenager’s' physical maturity with emotional, psychological, social, intellectual, and spiritual maturity. A useful feature is his discussion of how the â€Å"growth markers† that were formerly available to guide children into adolescence and teens into adulthood are now absent.Examples include girls of all ages now being encouraged to wear makeup and sophisticated clothes, and boys of all ages being encouraged to participate in high-stakes competitive sports teams. Teen’s perception of stereotypes varies from person to person. It is interesting to know that how teens identify groups and how they decide to associate themselves with particular ones, at a time in their lives when age-mates take on a greater significance and the influence of adults diminishes.Teachers should not ignore or underestimate the power of peer influence; although we commonly think of this influence in negative terms, this article helps us recognize that peer influence can be a positive contributor to teenager’s' classroom behavior, too. The role of environment in determining behavior is considered, much greater by the intellectual descendants of Locke. More than adherents of other schools, they see humans as substantially malleable; they are convinced that children's behavior responds to the expectations expressed for it.Thus, if we believe that teenagers will be moody and rude, our children are likely to comply; if we relegate them to a social holding pattern, they will adopt the general characteristics of powerlessness. The discipline of child psychology, as well as the children it studies, is influenced by cultural assumptions seems beyond doubt. But then, what is to be made of these conflicting views about the plasticity of development? It would hardly be feasible to attempt a grand synthesis of these positions. David Elkind, a longtime observer and scholar of child development and family life, sees in the modern family a â€Å"permeable† family.He discerns in the seeming imbalances and morbidities of postmodern families the stresses hammering at children and youth in the contemporary society and a new family form emerging, a form that is bas ed on values and sentiments that prepare its members to cope with this stunning array of pressures. Three sentiments and their resulting practices are particularly heartening from his point of view. To be sure, by the teenage years, parents must exercise most of their authority by stating acceptable alternatives and sticking to them, even if that means throwing a child out of the house.In a sense, then, we are no longer talking about the kind of parental control liberationists object to, but more subtle pressures generally compatible with their stand except insofar as they think teens have a right to financial support no matter what their behavior. Teens might also insist that drinking or doing drugs should be their own choice, just as it is for adults. But the reverberations both for themselves and for those about them suggest the desirability of pressing them to limit such activities in a way that might not be appropriate for adults.David Elkind has warned against pushing children too fast in an age-inappropriate manner. Latency-age children bear much of the burden of a faster-paced society. Adults are spending more time at work than ever before; children are shuffled between activities in part due to their parents' schedules. Children's time outside of school has become more structured; they participate in extracurricular pursuits at earlier ages. Doing nothing, as in â€Å"those lazy, hazy days of summer,† previously part of the culture of a child, is no longer promoted or valued. Some children no longer just go out to play, they have â€Å"play dates.† They are infrequently left free to explore what they would do if there were nothing to do. There is no time for daydreaming. Television and computers have replaced quieter moments. Rarely do you hear a child say, â€Å"Turn off the television. I want to read now. † In this speeded-up society, adults are resigned to Elkind's concerns; there is no turning back for today's children. Parent s may rationalize and say it is a good learning experience for an eight-year-old to be home alone. Elkind's recommendation is that given the stress imposed on them, children should be taught skills to help them cope effectively with what is expected of them.For example, the â€Å"latchkey† child should be offered assistance such as phone numbers for reaching a parent, the police, and a neighbor, and instructions on what to do in case of fire. Rituals and routines are important components in the structure of the middle childhood years. As children begin to organize and classify their knowledge, they come to depend on routines to help them consciously and unconsciously deal with new issues and experiences. Birthdays, secular and religious rituals, and common developmental milestones all help them to find their place in the world.They are seeking to be connected to the larger society through attachments in school, with their peers, with their teachers, in social activities, and in their families. Ironically, because teenager’s are continually redefining their thinking about self and their own value systems, they are highly vulnerable to believing in media myths. As such, outside-in problems manufactured by the media through the power of suggestion and constant repetition become teenager’s' inside-out personal problems In short, adolescence is the stage in life when children begin to question their own thinking in light of what others think of them as well as for them.In this regard, teenager’s' sense of thinking is not wholly independent of their social sense of self. Although as parents, researchers, and teachers, we may be aware of the variable nature of the teenager’s' thinking self, we may not realize that adolescence is a relatively new stage in human development. In colonial America, teenager’s served as a source of cheap labor. With the advent of modern industrialization, longer periods of schooling have been requi red to prepare children for the workplace. This, in turn, has extended the time that children are economically dependent on their parents.As children enter the teenage culture, they are drawn away from their parents and into peer groups. In the process, teenager’s' developing social sense of self is placed into a tug of war between the norms and pressures of parents and friends. Adolescence in America is the psychological equivalent of toddlerhood. Just as toddlers move away from their parents physically, so teenager’s move away from their parents emotionally There are continuous negotiations between parents and children about distance. Children want to explore and parents want to keep them safe.And both toddlers and teenagers are outraged when their parents don't agree with them about the ideal balance of freedom and security. As teenager’s turn to their peers for validation and support, they often engage in intense experimentation, exploring a wide range of po ssibilities that often contradict parents' cherished beliefs in behavioral norms. In the process, teenagers may become the biggest enforcers and proselytizers for their own peer culture: Teenagers may punish other teenagers for failing to achieve the same impossible goals that they themselves are unable to obtain.Moreover, they may rush to set standards to ward off the imposition of others' standards on them. All the while, the content of the standards may remain variable often depending on what standards the media is marketing at a given time, from baggy pants and body piercing to tattoos and the latest neon hair styles. Teenager’s' social sense of self invariably leads to contradictions, as does their thinking sense of self. Social self-contradictions arise from teenager’s' membership in multiple groups that maintain different expectations and norms.More importantly, contradictions continually arise as teenager’s switch their loyalties from one peer group to t he next, giving rise to competing allegiances. In sum, teenager’s experience contradictions inside-out in terms of their thinking sense of self as well as outside in terms of their social sense of self. In many instances, the frustrations of these contradictions are further exacerbated by the academic sense of self that schools promote. One of the most visibly striking transformations during adolescence occurs as a girl's body changes in size and shape.Girls tend to appear rounder as their hips widen, and fat develops in the breasts, thighs, and buttocks. As these changes occur, culture tells girls that thinness is beautiful, even imperative. Not surprisingly, it is also during this period that girls become increasingly concerned with their bodies. Girls' changing bodies provide powerful stimuli to the self and others. A pertinent issue during early adolescence is that bodily changes bring about a sense of fragmentation in body image. Thus, the body is frequently depicted as a collection of individual parts, such as breasts and hips.So, for example, many girls this age worry about the size of their breasts. In the United States, bigger is generally considered better, yet not from girls' perspectives. Rather others are believed to hold that value. Because the body is often times viewed as a reflection of the self, the eroticization processes through which the body is transformed into a sexual object become a major source of conflict for many teenager girls. Teenager girls continue to suffer in multiple ways as a result of these complex social processes.Meanwhile the psychologists and psychiatrists who have historically led the study of what is known as â€Å"body image† have done so in ways that limit knowledge and understanding of girls, further contributing to the structures supporting domination and oppression of females. That is, these researchers have almost exclusively studied â€Å"body image† through quantitative measures that assum e objectivity. In the process, they have conveniently and openly ignored and dismissed contributions from social scientists and feminists who have studied the body from alternative and more hopeful perspectivesNevertheless, body image work has become influential, creating at least three problems. First, the historical study of â€Å"body image† has contributed to the objectification of the body. Second, â€Å"body image† researchers have created a logic of pathology to explain girls' problems Result of irresponsible sexual activity is substantial teenage motherhood. Yet the consequences of early childbearing are extremely damaging. Pregnancy doubles the risk that a girl will drop out of school; most such girls never return, regardless of their financial situation or ethnic background.Once the child is born, the girl is unlikely to be in a position to earn more than welfare would offer her and she has the responsibility of a child to boot. But if she chooses to go on we lfare, her sense of agency and independence is seriously damaged. If she marries instead, she is not only unlikely to finish her schooling but also faces a significantly higher probability of divorce than a woman who waits until her twenties to marry. Thus girls who engage in unprotected sex and who elect to keep their babies are at serious risk of a worse life than they could otherwise have expected.â€Å"But the damage does not stop there. The plight of their children is painful. Neither parent may take responsibility: they may be ignored by their fathers and handed to some female relative by their mothers. For the child, this may be a blessing in disguise, as the most irresponsible teens are those least likely to possess the qualities required for good childrearing. As these babies get older, however, they show the effects of their unfavorable environment. Children of teen mothers score worse on ability tests, get worse grades, and expect less in the way of education than childr en of older women.They also get less education, marry earlier, and divorce more often†. (p. 133) David Elkind questions the popular conception of parental authority Exerting parental authority doesn't mean that we can't play ball with our children or joke with them or have fun with them. Being a parent doesn't mean being an ogre or a relentless disciplinarian. Rather it means asserting ourselves as adults who have more experience, knowledge, and skill than our offspring. Children and teenagers are young and inexperienced. They very much need and want guidance and instruction from us. (205)At least three areas of concern arise from the literature about violence on television. The obvious ones are the relationship between television violence and aggression, even if the aggression is not directed against society, and the desensitization of children to pain and suffering. The less obvious one is the potential for children who are sensitive and vulnerable to become more fearful and insecure upon exposure to violence on television. â€Å"Television has brought murder into the home, where it belongs† (Elkind, p. 103). Murders and crime occur about ten times more frequently on television than in the real world.A third of all characters in television shows are committing crime or fighting it, most with guns. It becomes, therefore, a chicken-and-egg question. When one examines violence in films the trend towards increased gore and explicit horror is easily documented. Rather than reflecting the content and meaning associated with myths and fairy tales, horror films today are pure sensation with little serious content. If violence on television is controlled, children and adults will still be able to experience violence vicariously through other media such as films, books, and recordings.The contemporary challenges that have created this increase in stress among today's teenager’s, in Elkind's terms — the â€Å"perils of puberty,†  "peer shock,† and â€Å"family permutations†. Authentic parenting is an outgrowth of shared parenting but integrates unilateral and mutual authority depending on the concern at hand and the developmental stage of the child. But it is also leavened by a realization that each parent can perform their roles in ways that are true to their own temperaments, personalities, and experience. Finally, there is an emergent relationship between community and family.How well a family does is seen as partly dependent upon the ties it has with the community and the resources and assets available in the community. Community service has become a part of the required curriculum in many schools. Other neighborhoods are reaching out to isolated families or individuals and families in trouble. Some schools have become â€Å"lighted schoolsâ€Å"—twenty-four-hour family resource centers providing programs, services, and opportunities for connections to others. According to Elkind, i nterdependence is a central value and sentiment that underlies this emerging family form.â€Å"Interdependence is founded upon a sense of being both one and many, of being different from everyone else and like them at the same time† (p. 220). Traces of his longing for the modern family aside, Elkind's thesis about the new family embodies some of what we know about family resilience to this point. And it can apply in spirit to all families and caretaking relationships. It is important, as a starting point, to realize that every family, even those in the midst of gripping disorganization and bewildering turmoil, has strengths and capacities.Every angry, demanding parent has moments of caring; every confused teenagers has moments of hope and clarity; every abusive father has a twinge of doubt or regret. At some time in every family's life there have been periods of relative calm and stability. Every family has overcome hurdles, some more successfully than others. All of these ar e resources to be drawn upon, by the family members themselves or by someone who would deign to be of help to them. Works Cited Elkind David. ( 1998). All Grown Up and No Place to Go: Teenagers in Crisis. Rev. ed. Reading, MA: Addison-Wesley