Wednesday, July 31, 2019

St. Johns River, North Florida

The St. Johns I have had many experiences with the St. Johns River in my life. For as long as I can remember I have lived less than a mile from this river. Every activity from boating, to canoeing, or fishing I have done in the river, and every time the water has seemed clean. Over the years the St. Johns River has acquired a bad reputation for being nasty or dangerous. Anything from flesh eating bacteria from algal blooms to bull sharks have been rumored to be lurking in its waters. Though some of these rumors are true and some of them are false, one will not die upon touching the water. However, the St.Johns does need some extra attention based on tests, past and current programs, and the fish population. Many tests performed on the river reflect that the water is relatively clean. State officials over Volusia and Seminole counties have noticed that there is the potential for a water shortage in the next couple years due to population increases. If nothing is done, the ground water in this area will run out. A plan is being proposed to use surface water from the St. Johns River to supplement the ground water. State officials believe they can filter the water from the St. Johns of bacteria and use this water for drinking water. Ann Givens) The fact that the state is considering using the water in the St. Johns for drinking water shows that the water quality is good. If there were severe algal blooms, the state would not consider trying to filter the water. Many tests performed on the river are in response to the paper mills present on the river. There is one mill in particular addressed on Rice Creek outside of Palatka. The waste water from these paper mills is dumped from pipes into the river. Ten years ago these mills were forced to upgrade their equipment due to a toxin being released called Dioxin.Dioxin is chemical that can cause cancer produced by the chlorine reactions in the mill. The older equipment was believed to be allowing this toxin to flow into the St. Johns River. Two years ago another test was done on the Rice Creek and traces of Dioxin are still present. The general belief is that Dioxin has remained in creek residue. (Patterson, S. ) Tests similar to this are done throughout the river. The residue remaining from the Dioxin is only present in Rice Creek and is not present throughout the water system. This effort to control the Dioxin shows progress.Scientists identified that the Dioxin was present and the source and took severe action to eliminate the expansion of Dioxin. Though this effort was necessary and applauded, efforts now need to be made toward eliminating the remaining residue and removing Dioxin from the river completely. Many programs and funds have been devoted to improving the water of the St. Johns River. A major act proposed in the 1970’s was the Clean Water Act of 1972. The Clean Water Act forced Floridians to find bodies of water that are impaired due to higher nitrogen levels.Once established, the state had to institute total maximum daily loads for each of these bodies of water. The total maximum daily load (TMDL) is established â€Å"based on the maximum amount of pollutant that the water body can assimilate without exceeding water quality standards. †( Lynette, M. ) This act made progress in reducing the level of nitrogen being added in the river. Though this act passed in 1972 the problem is still present. Over the years, Florida has seen 80,000 acres of its wetlands developed. (Littlepage, R. L. This results in less water present in the system and more nitrogen in the ground water from people fertilizing their yards. If the population in central Florida continues to expand and the wetlands continue to disappear, the presence of algal blooms and the reduction of the fish population will never stop. The water removed and nitrogen added will continue to create a steeper imbalance. Also with development, central Florida is trying to take water from the St. Johns f or drinking water for their excessively large population.This will just make the nitrogen to water imbalance even steeper. Rules and regulations need to ether be put on wetlands destruction, fertilizer use, and population limits in central Florida based on how many people their water supply can sustain. In 2006 a large sum of money was devoted to the effort of preserving the St. Johns River. Twenty seven million dollars was devoted to reducing the amount of nutrients, like nitrogen, entering the river and increasing standards for companies like Jacksonville Electrical Authority (JEA) who dump into the St. Johns River.The mayor’s office made JEA increase its standards for dumping waste water into the river and expand its programs for reusing water. This would reduce the amount of waste water dumped in the river and reduce the amount of harmful chemicals that enter the river from the JEA plant. (Littlepage, R. L. ) A major concern in the St. Johns is the fish population. The la rgest pollutant in the river is nitrogen from excess fertilizers that flow into the groundwater and into the river. The plant life of the river feed on this nitrogen. More nitrogen then leads to more plants.As the plant population increases problems such as algal blooms on the surface of the water occur. With the algal bloom situation the lower section of the water is blocked or partially blocked from sunlight. This leads to less plant life on the floor of the river and thus less oxygen in the water. With the lack of oxygen the fish population will plummet soon after. In 1994, an experienced bass angler by the name of Doug Gilley did an interview for the Orlando Sentinel. In this article he provided his professional insight on the change destruction of the bass population from 1984 to 1994.Ten years before this article was written, it would be no surprise for him to catch â€Å"10, 20 or even 50 fish in a day. † (Wilson, D) Doug was not the only one who had noticed this drast ic decrease in the bass population. State fisheries agreed with him. They have noticed that the â€Å"large bass almost have disappeared from the river and that the number of mid-sized bass are declining. † (Wilson, D. ) I personally have noticed the decline of fish from the river. My brother and I are avid fisherman and enjoy fishing for just about anything.We lived a quarter of a mile from the river so often we would take my grandfather’s bass boat and go fishing in the river. However, no matter how much we prepared, we would never catch more than maybe one or two fish. This change shows how all the different pollutants are having a large impact on the fish population and if action is not taken species like the largemouth bass could be eliminated from the river. Fishing is not the only recreational activity that takes place in the St. Johns. Activities such as skiing and tubing take place daily during the spring and summer months.These are essential for Floridaâ€⠄¢s economy. When people are going out in their boats, many aspects of the economy are helped. People must buy gas for their boat, food to eat while they are on the boat, and other items. This also attracts tourists. By my house at a local marina, every summer they hosted a wakeboard camp for people to come learn how to wake board. Hundreds of people would come to learn how to wakeboard and have fun in the water. These people bought many things during their stay thus boosting the Florida economy. However, if the water is not maintained and kept clean, events like these cannot occur.Tourists would not be willing to get in the water and would take their business elsewhere thus restricting north Florida’s economy. In closing, the St. Johns River is not dangerous as far swimming and boating are concerned but there are pollutants being dumped into the river that need to be addressed or eliminated. If nothing is done, based on tests done on the water, past and current programs, and the fish population the wildlife, the quality of the St. Johns will continue to plummet. The river damage will become impossible to fix and potentially impossible to swim or use for any recreation.The repercussions of this would be exponential. Water shortages could occur along with Jacksonville losing its appeal as somewhere to live. Citations Page Ann Givens of The Sentinel Staff. (2001, Feb 16). St. Johns River may slake our thirst the St. Johns water district plans to process river water in a three- year test to see if it can be made drinkable. Orlando Sentinel. Lisenby, L. (2007, Jul 11). Growth must be controlled to protect the St. Johns River. Florida Times Union. Littlepage, R. L. (2006, Jan 10). St. Johns River’s health deserves major effort.Florida Times Union. Lynette, M. M. , John, R. W. , & K, R. R. (2004). Nitrogen and phosphorus flux rates from sediment in the lower St. Johns River estuary. Journal of Environmental Quality, 33(4), 1545-1555. Patterson, S. (201 0, Aug 10). With mill pipeline still in doubt, old dioxin haunting rice creek research: Traces of a cancer-causing substance could still exist and be funneled into the St. Johns River. McClatchy – Tribune Business News. Wilson, D. (1994, Sep 09). Veteran angler says bass fishing on St. Johns River deteriorating. Orlando Sentinel.

Tuesday, July 30, 2019

My Sociology Paper Essay

High speed car chases are one of the most highlighted broadcasts in television today. Using aerial shots to give viewers a better preview of the scene, the media even interrupts regular programs to bring special reports of these fast-moving headlines. The media launches multiple fleets of helicopters (which main purpose for existence is to watch and update traffic conditions in real-time) to follow these car chases until they end either losing the perpetrator or catching them; sometimes without casualties, and sometimes with multiple damages added to the casualties of innocent bystanders. Throughout modern history, television entertainment and racing has been closely related spawning many different events to the fore such as F-1 and NASCAR racing. Many would owe their popularity to the adrenalin rush these high-performance vehicles incite in their viewers, and likely, this reason also trickles down to high speed car chases, which are growing more prominent over the recent years. More to this, the growing debate on whether the police are to blame for the chases they give to problematic drivers incites more people to add to the fray, as well the intrigue surrounding the matter of why the driver didn’t pull over in the first place. This and many other factors have made car chases a media staple – something that viewers will look forward to watching (Settgast 2008). With death tolls, injuries and intrigue surrounding these special broadcasts, editorials appear criticizing the police for actually giving chase and not letting these vigilantes go on their way. But even bombarded with criticisms, the police don’t give up the chase and continue with the pursuit of these reckless drivers (Sowell 2007). There are many reasons as to why police officers give chase to reckless drivers. As a matter of fact, courts have continuously investigated on whether the chases are necessary and the use of force by the police to stop them are justified such as the case of â€Å"Scott v. Harris† where a police rammed the car of a 19-year old, rendering him quadriplegic (Settgast 2008). This, and other cases has set the media hogging up more airtime for police chases because of several reasons; one of which is because police car chases, by themselves, already have the star factor to attract viewers. The media exposition of the high speed car chases, from the thrill of the chase to the dramatic (or non-dramatic) ending, have always had viewers finding themselves hooked on the screen once it turns on. The interpretative model is one of the models that explain viewer behavior on media. As Giddens describes, the model views that the â€Å"audience has a powerful role†¦The interpretative model views audience response as shaping the media though its engagement or rejection of its output† (2000). This means that the media is actually beholden to their viewers if only because of the competition they have with other television media companies, and their desire to increase their rating. With more viewers attuned to them, the higher their ratings would become, therefore they would attract more sponsors and more sources of income. In this regard, the media’s duty is to please their viewers also because it is a necessity for them in order to survive. Because of the wide acceptance by the public of high speed car chases as a from of entertainment, the media has jumped at the chance to improve their ratings by showing these through â€Å"special live reports†. One of the most famous and iconic showcase of this is the car chase involving O. J. Simpson in 1994 where â€Å"For two hours, 95 million Americans ignored the sixth game of the professional basketball finals in the East and the sunset in the West to stare at the tube as a white Ford Bronco drove sedately along one strand and then another of L.  A. ‘s web of freeways† (Reuven 1994). With this kind of attention the media gets from the public and the media’s response to getting more of this on television, it is evident that audiences now have the freedom to watch what they want (Chinni 2005) . We see that the public’s attention to high speed car chases actually seems like a glorification of the crime, especially as they are portrayed in movies and are used to be redeeming factors no matter how disastrous a movie turns out to be (Dean 1993). Another side to the story is that high speed car chases sometimes involve violence and some people hope there would be some action if only for reasons of entertainment. Some even consider high speed car chases, themselves to be violence on its own as it capitalizes on aggressive behavior. There are multiple evidences that point to the fact that violence is a form of entertainment is multiple and that the media jump on the chance to be in the action increase their ratings. However, media influence on people is a part of the deal and cannot be ignored. Exposure to almost anything the media imparts creates a permissive atmosphere for aggressive behavior which translates to action over time. Whether the effects are little or the effects are large (in the midst of the ongoing debate of the extent of media influence over its viewers), the bottom line is with the media’s emphasis on aggressive behavior (such as high speed car chases) it is important to note that there is a high likelihood of people imitating the high speed car chases themselves due to drug or alcoholic influences (Felson 1996). In this case, not only do the people dictate what the media will showcase and highlight in their programs, but the media also influences how people perceive the world and influence their choices and preferences of shows and broadcasts. Also of considerable notice is the fact that people, devoid of the factors that control their inhibitions, are susceptible to be the perpetuators of high speed car chases themselves as can be read from the study. Such factors that contribute to the removal of inhibitions include the influences of drugs, alcohol, and others. As such, the likelihood that people would be experiencing and trying out for themselves the â€Å"thrill† of high speed car chases is high. We see that these two factors together (public influence on media and media influence on the public), creates a vicious cycle of the continuous glorification of aggressive behavior, such as high speed car chases.  This glorification is, first of all, seen in how people are attracted like moths to a flame by the star factor of this broadcast/report. Owing to the high speed car chases’ innate ability to arouse emotions (such experiences can also be found in pro-sporting events such as football and NASCAR racing), people become more and more addicted to watching them, and in the end, spurring the media to feature more whenever these incidences take place. Moreover, high speed chases in Hollywood add to the thrill effect of this dangerous pursuit making them more palatable to their viewers. Secondly, the glorification comes in the form of media sensationalizing these high speed car chases by making it seem more exciting than it actually is like adding the words â€Å"special† and other effects to these reports. Also, the media takes these high speed chases to the editorial newsroom to spur more of the excitement even if it only lasts for a few days. In essence, the thrill effect of high speed car chases and the sensationalism by the media glorifies this dangerous sport. Coupled with the emotion-evoking nature of high speed car chases, people are becoming more and more susceptible to its influences (Felson 1996) making the vicious cycle of watching, getting involved in, and broadcasting them unending.

Monday, July 29, 2019

Point of Presence Advertising Essay Example | Topics and Well Written Essays - 1000 words

Point of Presence Advertising - Essay Example The author planned to purchase a movie named Lord of the Rings - Fellowship of the Ring on recommendation of a friend and came across a pack of all the three movies of Lord of the Ring series at a price that was 20% less than the overall cost had the movies been purchased separately. The author realized that he anyway had to purchase the other two movies to complete the story and was delighted to get all the three of them at 20% discount. In the second purchase instance, the author was delighted to realize the value of the package as he owns both a Sony digital camera and Handy Cam. The total price was cheaper by 15%. Such product promotion advertisements resulted in positive impact on the author because the overall value of the buying decisions improved although the author didn't had planned for part of the purchase. The effectiveness of these two "Point-of-Sale" advertisements resulted in win-win deal for both the store and the author - the store increased the net sale value and th e author got more useful products at lesser cost. The author was not at all annoyed but was happy with the sales girl for introducing these offers. Massy and Frank (1966. pp383) presented the findings of an exploratory study on behavior of retailer advertising thus establishing some interesting empirical generalizations. They could prove that the brands sell differently in different stores and the support to a brand depends upon the brand's market share in a particular store type. The author discovered a linkage of this theory with the research by Kumar and Leone (1988. pp178-179) which stated that many customer packaged good manufacturers have resorted to funding short term sales promotion at the store level which primarily has two distinct advantages - the effectiveness of promotions can result in on the spot sales activity and the store management takes pride into participating in on the spot campaigns given increased margins & commissions. Both the manufacturer and the store management gain in this process - the former achieves brand promotion & quick sales and the latter achieves improved profitability of the store. Howeve r the store management normally achieves short term benefits but the manufacturers achieve long term benefits by achieving strong customer franchise through brand substitution. From the author's perspective one good observation about this model is that the on the spot promotional activities sometimes are effective enough to modify the purchase plan by the customers that they had made before visiting the store. Bucklin and Lattin (1991. pp24) observed that "point-of-purchase promotion is particularly attractive given the large pro-portion of grocery purchase decisions made after entering the store". They further observed that "two-thirds of supermarket purchases are the result of an in-store decision". Culturally speaking, such campaigns has promoted a culture of "fun buying" even avail such promotions to just find out what's hot on the day and carry out on the spot purchase decisions. Many a times, customers just get impressed by the sales skills of the sales person and do not bothe r what brand they are buying. Hence the

Sunday, July 28, 2019

South Koreas Economic Indicators and Recent Growth Rate Assignment

South Koreas Economic Indicators and Recent Growth Rate - Assignment Example The growth theory places emphasis on increasing government expenditure, net exports (exports-imports) and investments which are obtained from savings. South Korea’s GDP growth levels can be traced to its increase in export levels, investment levels, and government expenditure. Therefore, the growth theory matches quite well with the economic development and growth in South Korea and its contributing factors-investment, exports and government expenditure. Rapid growth levels coincide with extensive government interventions on the economy. Economic and political policies were geared towards a free capitalistic economy with little government interference except in adjusting externalities resulting from the market failure. The political structure was also adjusted in order to support a capitalistic economy. Investment in human capital refers to investing in nutrition and health, schools and higher education, investment in children, migration, fertility rates, infant mortality rates and maternal healthcare. For example, by analyzing the infant mortality rates or literacy levels of the population, there is a clear positive correlation between an increase in the levels of literacy and infant mortality and an increase in GDP. Investing in children is particularly crucial for long-term economic growth and development of any country. Investment in human capital plays an integral role in any country’s economic growth and development. From the data, it is easy to identify the correlation between GDP and initial human and physical capital. Therefore, countries with greater human capital have greater economic growth Ceteris Paribas. The high human and physical capital levels determine the productivity levels of South Korea.

Saturday, July 27, 2019

Economics Final Project Assignment Example | Topics and Well Written Essays - 500 words

Economics Final Project - Assignment Example These needs notwithstanding, health insurance coverage has not reached levels most expected by stakeholders. A number of reasons could account for this. As a way of addressing the situation, a number of health insurance policies exist to ensure that people can have options that best apply to their needs so that they would select these. One of the options is the high-deductible health plan (HDHP). The best way to argue on whether or not HDHP will lead to improved coverage is to look at the modalities involved in this type of health insurance plan. There are two broad modalities that can be identified in this context. In the first place, users selecting this option are required to pay much lower premiums than what may be called traditional health insurance plans (Yoo and Chen, 2009). The premium refers to that money that is paid upfront to the health insurance company on a monthly basis. This means that people opting for this would not be paying so much every month as compared to those selecting other traditional plans. On the other hand, these people are required to pay higher deductibles than in traditional health insurance plans (Henderson, 2012). These deductibles are the amounts that are paid for an insurer’s own medical care before the health insurance company come in to pay anything for the insurer. From the explanation given about the rationale based on which the HDHP works, it would be noted that people who visit the doctor less often and do not accrue much cost from their visits with the doctor would have the benefit of this plan. Meanwhile, Chang et al. (2006) argued that the healthcare population of the country is made up of more of such people than those with catastrophic health conditions. Should the greater percentage get the right counsel therefore, chances that a good number of the populace would opt for HDHP and thus increase the coverage with the system is high. With this said, it is also important to look at the issue of economic benefits

Body language Movie Review Example | Topics and Well Written Essays - 1750 words

Body language - Movie Review Example Body language forms a vital part of the everyday social life of humans today. It highly affects the interaction and conversation with the other people and thus, can be used as a powerful weapon for controlling one’s feelings and emotions (Body language expert, â€Å"How Body Language Influences Daily Life†). Body language is a powerful aspect in regards to the self-confidence and self-esteem of the individual. Body language is also explained as an external reflection of one’s emotional condition (Furnham 3-6). For instance, a person may be saying something and keep some of the things hidden while interacting verbally. Thus, in such a situation a person who can read the body language can understand the feelings and emotions of the speaking person (Pease and Pease 11-12). THESIS STATEMENT This essay intends to focus on the influence of body language in the daily life of people. A video on the topic of body language has been summarized in this essay to analyze the v arious forms of body languages and conclude in response to the mentioned objective. DISCUSSION Analysis of the video The video concentrates on the topic of body language used by the people as a non-verbal communication system. ... The body exhibits different signals just as a radio transmits the signals. The video has explained six main categories of body language as elaborated by the body language experts such as kinesics, eye contact, haptics, paralanguage, chronemics and proxemics (Montgomery County Public Schools, â€Å"Body language†). Summarizing and critiquing the video Arguably, the video advocates that communication of messages through body language, either in the form of kinesics, eye contact, haptics, paralanguage, chronemics or proxemics or many of these altogether, is said to have a long-lasting effect in comparison with the verbal messages. At times, we deliver greater importance to the posture, gesture or to the tone of voice, when a person is communicating his/her intended messages verbally, even if those are entirely contradictory to his/her verbal message. For instance, in an interview, the interviewers often focus on reading and interpreting the eye-contact behavior of the candidate t o learn the truth in his/her conveyed verbal messages (Smith â€Å"Interview body language mistakes that can cost you the job†). Psychologists also pay due attention towards reading the posture of the patient as high in confidence or low in self-esteem. Mysteriously, even without knowing the basics or the technicalities of body language, common people also tend to pay greater attention in interpreting non-verbal messages rather than paying attention to only verbal communication (Meeren, Heijnsbergen and Gelder, 16518-16519). Illustratively, a girl tugging or playing with her hair can be interpreted as flirting; while in the same context, one tilting his head too often when listening to others is commonly asserted as their submission to the message being conveyed (Laneri â€Å"Body

Friday, July 26, 2019

Greek Art Essay Example | Topics and Well Written Essays - 750 words

Greek Art - Essay Example It also absorbed ideas from Italian and European arts during the Romantic period. These ideas invigorated the Greek revolution which is, arguably, still taking place today. Greek art is made up of five forms which include: pottery, painting, architecture, jewelry making and sculpture (Maphosa 4). Modern Greek art is as a result of gradual development of the ancient which started during the Romantic period. Many of its elements were absorbed from other European arts and consequently culminated in a unique Greek Romantic art style (Smith and Plantzos 633). This was inspired by the country’s history and geography as well as revolutionary ideals. After the end of the Ottoman rule, education opportunities in arts were limited in independent Greece and, therefore, many Greece artists studied abroad. Majority of the Greece artists of the 19th century studied at Munich International Center for arts (Smith and Plantzos 698). After graduation, they returned to Greece and shared their knowledge with the Greek community. This led to the development of personal and academic bonds between Munich artistry and early Greek painters which in turn gave birth to the Greek Munich School of painting. Nikolaos Gysis was one of the great figures in the 19th century Greek art because he acted as both an artist and a teacher at the Munich academy (Smith and Plantzos 700). The Greek art was characterized by realism, academism, landscape painting, still life, genre painting, portraiture of the upper middle class, and impressionists’ features. Later these features were replaced by symbolism and art Nouveau. In the 20th century, Greek art was represented by many artists who were more interested in living conditions, local customs, and everyday Greek life (Norris 174). Many gifted painters emerged such as Theodoros Vryzakis, Nikiphoros Lytras, Georgios Jakobides, and Georgios Roilos among others. Theodoros

Thursday, July 25, 2019

SAP implementation Project Managment Essay Example | Topics and Well Written Essays - 250 words

SAP implementation Project Managment - Essay Example illustrates the application of various project management principles and practices that are desirable for project success and are largely covered in the PMBOK. This project is quite simple, the IBM PM Team works under a well predefined scope covering major areas such as putting out fires, preventing scope-creep, and managing risks. The most important point coming out here is that the team understands what they need to do and develop the scope well in advance, it is also quite impressive that they determine the risks involved during scope development. This kind of practice is well covered in the PMBOK under the chapter called scope management where project scope definition is identified as a very important area where boundaries of the project are determined. The fact that Prakash and his team start by going to the client site, gathering the requirements, and calculating the plan schedule indicates that they are very serious with project integration management. This is well defined in the PMBOK as a chapter dealing where integration management is presented as an aid towards project planning, execution and control. The preliminary actions of the team culminating in site visit for planning indicates a deep understanding of the importance of this aspect of project management. In my opinion, this action can be enhanced by coming up with a document that clearly maps out all the actions at the site visit level and indicate the project roadmap from this time. The project also includes another very important aspect dealing with stakeholders. After award of the contract it is clear that the Project Manager start implementation by defining objectives, purpose and justifying important actions. The scope is verified to fit within a measurement developed by the team that mainly involves determination of the commitment of stakeholders, performance is good, the schedules are predictable and that the risks identified are well mitigated. It is clear that the team is putting into

Wednesday, July 24, 2019

Civil Right Movement Essay Example | Topics and Well Written Essays - 1250 words

Civil Right Movement - Essay Example They were the oppressed group as they were denied the equal rights and opportunities as white people. The end of World War II set a new tone for civil rights movement. The movement got prominence when in 1954 Supreme Court of US gave a landmark judgment in Brown vs. Board of Education case. In this judgment, Supreme Court declared racial segregation in school totally illegal and a punishable crime (Brown vs. Board of Education). Finally, the Civil Right Act of 1964 put an end to all discrimination that African Americans were suffering from since centuries. The Act eliminated obstacles that persisted for centuries preventing development of African-Americans. Over 45 years have passed since then; the status of African Americans when seen in the above perspective has improved a lot. Now they have not only equal voting rights to elect the government but they can also occupy any office in the US by their sheer ability. The segregation episodes that their children faced in the schools have been now buried deep into history books. They share all public places with equal rights. They can enter into any professions without any restriction depending upon their interest and ability. It is not surprising that African Americans have excelled in sports, politics, business and hosts of other activities. Their contribution in the US mainstreams reached to its pinnacle when an African American reached to the highest office of US in 2009. Several well-known figures such as Tiger Woods, Oprah Winfrey, Michael Jordan sprung into limelight in the post-civil movement era. Boxer Muhammad Ali, tennis star Arthur Ash, Michael Jordan in basketball, athlete Carl Lewis are some of the prominent names that have excelled in sporting activities after the end of Civil Right movement. Condoleezza Rice and Colin Powell became Secretary of State and many large cities such as Chicago, Los Angeles, New York have had mayors from African American community. Barack Obama occupying the highest office in US is a veritable testimony to the genuine change process that has taken place in the last few decades in the country giving equal opportunity, status and privilege to the African Americans as enjoyed by others. The law has given them equal rights and opportunities in all walks of life; this certainly proves that the status of African American has improved significantly since the end of the Civil Rights Movement. Answer 2. The US Law has taken its course giving African American full rights and opportunities but the African American community still faces numerous issues and challenges in the US society. Cedric Herring argues that African Americans still face job discriminations in the US. Giving an example of Texaco, the author states that the companies systemically deny promotions to the members of African American community. The New York Times produced evidence that how several Texaco Executives referred them as 'black jelly beans' and 'niggers' in their mutual conversations. Fi nally, Texaco admitted having excluded all black employees’ names from the list of next level promotions. Later, Texaco had to settle the case by paying $176 million in the largest ever discrimination suit seen in the US. Before 1964, discrimination to the African American community was overt but in the post civil rights movement era it has taken a covert route. Before 1964, no laws questioned the

Tuesday, July 23, 2019

Does peanut corp. have a conscience What responsibilities does peanut Essay

Does peanut corp. have a conscience What responsibilities does peanut corp. owe society to self regulate their actions in pursuit of profits Did they follow CSR - Essay Example As the paper declares every time consumers walk into a supermarket or retail store they rarely pose to contemplate whether the products they are about to put into their shopping baskets are health hazards. There is an implicit trust that consumers have in the producers putting these products on the shelves, especially those who deal in food products. After all there are bodies such as the Food and Drug Administration (FDA) that are meant to ensure that food products are safe. A corporation is not a thinking, feeling being, hence the corporation in and of itself cannot be termed as having a conscience. However the corporation is made up of individuals who are held responsible for the actions that the corporation takes part in. these individuals are the ones who act as the corporation’s conscience because they are the decision makers. This discussion explores that building a good corporate culture entails in part ensuring that the individuals within a corporation who are responsible for the corporation’s actions are morally upright in that they can factor in the human component into the making their decisions. Though corporations are out to make profit, it should never be at the expense of their own consumers or the society within which they are based. There are repercussions that come with not observing the fundamental principles of business ethics and corporate social responsibility as will be seen with the case of Peanut Corporation of America.... sions that come with not observing the fundamental principles of business ethics and corporate social responsibility as will be seen with the case of Peanut Corporation of America. Salmonella in peanut butter; a modern day tale of greed and tragedy There have been eight deaths and now almost six hundred cases of infection related to the salmonella bacteria that has been found in peanut butter as well as other peanut products ranging from roasted peanuts, peanut granules, and dog food. It has become apparent that the contaminated peanut can be traced back to Peanut Corporation of America (PCA). These cases have been reported through forty five American states and across the border in Canada (Steenhuysen, 2009). According to a report complied by the Food and Drug Administration, there were tests run by the Peanut Corporation of America (PCA) that found traces of salmonella while conducting tests in its own labs in Blakely, Georgia. This did not happen once or twice, but an incredible twelve times between 2007 and 2008. Which means that PCA was presented with multiple opportunities to take action on the tainted peanut such as avoid shipping it all together. However, PCA did not opt to take what should have been the most natural and approvable cause of action, they opted to 'lab shop', that is, look for an outside laboratory that would be willing to state that the results for salmonella had come back negative. When the second results came back negative, PCA went ahead and shipped their products, an action which goes against standard protocol that demands that the first tests saying positive are the ones upon which further action is supposed to be decided (Steenhuysen, 2009). Another action that the company should have taken upon discovery of contamination was a

Monday, July 22, 2019

Mastering Mathematical Facts Essay Example for Free

Mastering Mathematical Facts Essay The basis for success in elementary mathematics is mastering basic facts which mean that a student should acquire the ability to add, subtract, multiply, and divide basic numbers automatically (O’Connell, 2009). Regardless the importance thereby attached, it is very hard to dismiss the relationship between mental computation of basic facts and the memorizing power of a student. The strategies-based approach emphasizes mostly on developing mastering skills from the natural informal knowledge that the child has (Andrew Carroll, 1999). This is better than the usual rote approach which presented such drawbacks as inducing anxiety due to demand for quick performance. Also, students had a tendency to adapt the element of memorizing facts in these rigid schedules rather than application of thoughts in solving mathematical problems. Strategies-based approach requires that the natural thinking of children is utilized whereby informal mathematical knowledge is set as basis to understand harder concepts after learning simpler facts. To help students master basic facts, the elementary step involves testing them on subtraction and addition where they are required to work out simple tests in real life situation. In the meantime, the students should be encouraged to develop patterns, think logically and use their manipulative skills in solving these exercises. It should be noted here that unlike adults who will process this information directly from their memory, children will use the direct manual counting, a technique referred to as direct-modeling technique. As their understanding gradually develop over time, some students would tend to grasp concepts at a faster rates than others where they can use even more than one strategy in solving mathematical problems. It is therefore very important to request students to share their strategies with their peers in class in order to help them advance to more efficient methods and encourage development of self-invented strategies (Steinberg, 1985). ? References Andrew, C. I. and Carroll, M. W. (1999). Teaching children mathematics, 5 (9):508(8) O’Connell, S. (2009). Mastering basic math facts. Retrieved August 09, 2010, from http://www. qualityteacherdevelopment. com/blog/25/mastering-basic-math-facts/ Steinberg, R. M. , (1985). Instruction on derived facts strategies in addition and subtraction. Journal for Research in Mathematics Education , 16: 337-55.

Webform2 †wireless LAN, users and access points management Essay Example for Free

Webform2 – wireless LAN, users and access points management Essay Private void Page_Load(object sender, System. EventArgs e) { // intializing the sqlDataAdapter and dataSet sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); sqlDataAdapter2. AcceptChangesDuringFill = true; sqlDataAdapter3. AcceptChangesDuringFill = true; } private void Button9_Click(object sender, System. EventArgs e) //add button(users) { //saving the data the manager insert and adding it to the users table//goto each AP checked by the manager using SNMP protocol and add //them the user String user_name,user_id,user_MAC; String str2=,str3=; int i,j,tmp,k; user_name = TextBox1. Text. ToString(); user_id = TextBox2. Text. ToString(); user_MAC = TextBox5. Text. ToString(); int items = CheckBoxList1. Items. Count; // APs will hold the names of all the APs that the user // can access string[] APs = new string[items]; k=0; APs. Initialize(); try { apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); // add this user to the table // str2 has the names of all the APs coulms // str3 has the values of all the coulms j=0; for(j=0;ji;j++) { str3= str3 + arr[j]. ItemArray. GetValue(0) .ToString()+, ; } str3 = str3. Remove(((str3. Length)-2),2); str2= +user_name +, + user_id +, +user_MAC + , ; tmp = CheckBoxList1. SelectedIndex; for(j=0;ji;j++) { if (tmp==j) { APs[k]=CheckBoxList2. SelectedItem. Text; k++; str2= str2 + 1, ; CheckBoxList1. SelectedItem. Selected = false; tmp = CheckBoxList1. SelectedIndex; } else str2= str2 + 0, ; } str2 = str2. Remove(((str2. Length)-2),2); SqlCommand insCommand = new SqlCommand( INSERT INTO APusers (userName, id_num, mac_adr, + str3 + ) VALUES ( + str2 + ),sqlConnection1); insCommand. Connection. Open(); insCommand. ExecuteNonQuery(); insCommand. Connection. Close(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); / the steps to update the access points:   1. for each AP in the APs array: *  Ã‚  Ã‚   1. 1 get the AP IP address from the AP database. 1. 2 get the add entry to table object ID *   1. 3 call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++)   {*     DataRow [] arr = apDataSet1. AP. Select(Apname ='+APs[i]+); *  Ã‚   IPaddr = arr[0]. ItemArray. GetValue(1). ToString(); *  Ã‚   OID = avaya. addEntry(); *  Ã‚   snmpexe. snmpSet(IPaddr,OID,user_MAC); * } */ } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } TextBox7. Text=; TextBox1. Text=; TextBox2. Text=; TextBox5. Text=; TextBox3. Text=; TextBox4. Text=; } private int GetIndexofelement(string [,] arr,string elem) { int j,i = arr. Length; for(j=0;ji;i++) { if (arr[0,j]. ToString() == elem) return j; } return -1; } private void Button3_Click(object sender, System. EventArgs e) //remove user button. { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList1. Visible=true; Button6. Visible=true; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the user you wish to remove and press remove; /////////////////// //bring the users list into the dropdown box DropDownList1. Items. Clear(); int i=0; try { usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand. CommandText = SELECT userName FROM APusers; sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList1. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button1_Click(object sender, System. EventArgs e)// add AP button { CheckBox1. Visible=true; Label12. Visible=true; TextBox7. Visible=true; DataGrid2. Visible=false; DataGrid1. Visible=false; Label1. Visible=true; Label2. Visible=true; Button10. Visible=true; TextBox3. Visible=true; TextBox4. Visible=true; TextBox5. Visible=false; Label10. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Insert the AP detials and press add; } private void Button4_Click(object sender, System. EventArgs e) //remove AP button. { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; DropDownList2. Visible=true; Button8. Visible=true; Button9. Visible=false; TextBox5. Visible=false; Label10. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the AP you wish to remove and press remove; //bring the APs list into the dropdown box try { DropDownList2. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList2. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button5_Click(object sender, System. EventArgs e) //show all users button { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=true; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; try { sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); DataGrid1. DataSource = usersDataSet11; DataGrid1. DataBind(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } Label6. Text=which operation would you like to perform? ; } private void Button6_Click(object sender, System. EventArgs e) // remove button(users) { //goto all APs listed for this user and remove the user from //ther table and then remove the user from the data base String user_name; try { user_name = DropDownList1. SelectedItem. Text. ToString(); Label6. Text=Remove user + user_name; /* * the steps to update the access points: * 0. create an array with the APs name * 1. for each AP in the APs array: *  Ã‚  Ã‚   1. 1 get the AP IP address from the AP database *  Ã‚  Ã‚   1. 2 get the remove entry to table object ID *  Ã‚  Ã‚   1. 3 call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++) * { *  Ã‚   DataRow [] arr = apDataSet1. AP. Select(APname ='+APs[i]+); *  Ã‚   IPaddr = arr[0]. ItemArray. GetValue(1). ToString(); *  Ã‚   OID = avaya. removeEntry(); *  Ã‚   snmpexe. snmpSet(IPaddr,OID,user_MAC); * } */ SqlCommand DelCommand = new SqlCommand(DELETE FROM APusers WHERE userName = + user_name + ,sqlConnection1); DelCommand. Connection. Open(); DelCommand. ExecuteNonQuery(); DelCommand. Connection. Close(); usersDataSet11. Clear(); sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); //todo: refrash list DropDownList1. Items. Clear(); int i=0; usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand = new SqlCommand( SELECT userName FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList1. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev). {Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button10_Click(object sender, System. EventArgs e) //add button(AP) {//updata the APs table and init the AP String AP_name,AP_ip,Location; bool active; try { AP_name = TextBox3. Text. ToString(); AP_ip = TextBox4. Text. ToString(); Location = TextBox7. Text. ToString(); active = CheckBox1. Checked; apDataSet1. AP. AddAPRow(AP_name,AP_ip,Location,active); sqlDataAdapter2. Update(apDataSet1); SqlCommand myCommand = new SqlCommand(ALTER TABLE APusers ADD +AP_name+ bit,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); //todo: make all the users in the APusers table marked as not allowed to this AP myCommand = new SqlCommand( UPDATE APusers SET +AP_name+= 0,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); /* the steps to update the access points: * 1. connect to the AP IP address from the AP database * 2. get the remove entry to table object ID *3. call snmpSET function */ /* String IPaddr,OID; * for(i=0;ik;i++) * { *  Ã‚   OID = avaya. setName(); *  Ã‚   snmpexe. snmpSet(AP_ip,OID,AP_name); *  Ã‚   OID = avaya. setLocation(); *  Ã‚   snmpexe. snmpSet(AP_ip,OID,Location); * }   */ }catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } TextBox7. Text=; TextBox1. Text=; TextBox2. Text=; TextBox5. Text=; TextBox3. Text=; TextBox4. Text=; } private void Button8_Click(object sender, System. EventArgs e) //remove button(AP) {//remove the APs table String AP_name; try { AP_name = DropDownList2. SelectedItem. Text. ToString(); Label6. Text=Removing AP + AP_name; SqlCommand DelCommand = new SqlCommand(DELETE FROM AP WHERE APname = + AP_name + ,sqlConnection1); DelCommand. Connection. Open(); DelCommand. ExecuteNonQuery(); DelCommand. Connection. Close(); apDataSet1. Clear();sqlDataAdapter2. Fill(apDataSet1); sqlDataAdapter3. Fill(usersDataSet11); sqlDataAdapter2. AcceptChangesDuringFill = true; sqlDataAdapter3. AcceptChangesDuringFill = true; DataGrid1. DataSource = apDataSet1; DataGrid1. DataBind(); //todo: refrash list DropDownList2. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList2. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); //todo: remove the AP_name culomn from the APusers table SqlCommand myCommand = new SqlCommand(ALTER TABLE APusers DROP COLUMN +AP_name,sqlConnection1); myCommand. Connection. Open(); myCommand. ExecuteNonQuery(); myCommand. Connection. Close(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } /*SNMP: * goto the selected AP * a. go to the data base and get the AP IP number * b. snmp. snmpSet(IP,DisableAllUsers) */ } private void Button2_Click(object sender, System. EventArgs e) // add user button. { int i=0; CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=true; TextBox1. Visible=true; TextBox2. Visible=true; TextBox5. Visible=true; Label10. Visible=true; Label3. Visible=true; Label4. Visible=true; Label5. Visible=true; CheckBoxList1. Visible=true; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Insert the user detials and press add; //bring to the checkbox list all the APs available CheckBoxList1. Items. Clear(); apDataSet1. Clear(); Try { sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); int j =i; while (i! =0) { CheckBoxList1. Items. Add(arr[j-i]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button11_Click(object sender, System. EventArgs e) //show all APs button { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=true; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; try { DataGrid2. DataSource = apDataSet1; DataGrid2. DataBind(); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } Label6. Text=which operation would you like to perform?; } private void Button7_Click(object sender, System. EventArgs e) { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; Label3. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; DropDownList3. Visible=true; Button12. Visible=true; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=false; Button16. Visible=false; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the user whose details you wish to update; bring the users list into the dropdown box DropDownList3. Items. Clear(); int i=0; try { usersDataSet11. Clear(); sqlDataAdapter3. SelectCommand. CommandText = SELECT userName FROM APusers; sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(); i = arr. GetLength(0); while (i! =0) { DropDownList3. Items. Add(arr[i-1]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter3. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM APusers,sqlConnection1); sqlDataAdapter3. Fill(usersDataSet11,APusers); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } }private void Button12_Click(object sender, System. EventArgs e) { string user, id_num, mac_addr; int i=3, length; int APnum; user= DropDownList3. SelectedItem. Text. ToString(); original = user; Label6. Text=Update user + user; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=true; Label14. Visible=true; Label15. Visible=true; Label16. Visible=true; TextBox6. Visible=true; TextBox8. Visible=true; TextBox9. Visible=true; CheckBoxList2. Visible=true; Button13. Visible=true; //filling the text boxs with the existing user data CheckBoxList2. Items. Clear(); sqlDataAdapter3. Fill(usersDataSet11); DataRow [] arr = usersDataSet11. APusers. Select(userName ='+user+); id_num = arr[0]. ItemArray. GetValue(1). ToString(); mac_addr = arr[0]. ItemArray. GetValue(2). ToString(); //displaying the current user data in text boxs TextBox6. Text=user; TextBox8. Text=id_num; TextBox9. Text=mac_addr; CheckBoxList2. Items. Clear(); apDataSet1. Clear(); try { sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr1 = apDataSet1. AP. Select(); APnum = arr1. GetLength(0); i = APnum; int j =i; while (i! =0) { CheckBoxList2. Items. Add(arr1[j-i]. ItemArray. GetValue(0). ToString()); i=i-1; } sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); for(i=0;iAPnum;i++) { SqlCommand myCommand = new SqlCommand( SELECT + CheckBoxList2. Items[i]. Text + FROM APusers WHERE (userName = + user +),sqlConnection1); myCommand. Connection. Open(); SqlDataReader data = myCommand. ExecuteReader(); data. Read(); CheckBoxList2. Items[i]. Selected = data. GetBoolean(0); myCommand. Connection. Close(); } } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } } private void Button13_Click(object sender, System. EventArgs e) { String user_name,user_id,user_MAC; String str2=,str3=; int i,j,tmp; user_name = TextBox6. Text. ToString(); user_id = TextBox8. Text. ToString(); user_MAC = TextBox9. Text. ToString(); int items = CheckBoxList2. Items. Count; try { apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr. GetLength(0); //todo: add this user to the table //todo: create str2 with the names of all the APs coulms //todo: create str3 with the values of all the coulms j=0; for(j=0;ji;j++) { str3= str3 + arr[j]. ItemArray. GetValue(0). ToString()+, ; } str3 = str3. Remove(((str3. Length)-2),2); Label6. Text =CheckBoxList2. SelectedIndex. ToString(); str2= +user_name +, + user_id +, +user_MAC + ,; tmp = CheckBoxList2. SelectedIndex; for(j=0;ji;j++) { if (tmp==j) { str2= str2 + 1, ; CheckBoxList2. SelectedItem. Selected = false; tmp = CheckBoxList2. SelectedIndex; } else str2= str2 + 0, ; } str2 = str2. Remove(((str2. Length)-2),2); Label6. Text =str2; SqlCommand delCommand = new SqlCommand(DELETE FROM APusers WHERE userName = + original + ,sqlConnection1); delCommand. Connection. Open(); delCommand. ExecuteNonQuery(); delCommand. Connection. Close(); SqlCommand insCommand = new SqlCommand(INSERT INTO APusers (userName, id_num, mac_adr, + str3 + ) VALUES ( + str2 + ),sqlConnection1); insCommand. Connection. Open(); insCommand. ExecuteNonQuery(); insCommand. Connection. Close(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT * FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); } catch(Exception ev) { Label6. Text=ERROR ACSESSING THE DATABASE; } /*SNMP: * goto the selected user * a. get all the APs IP numbers * b. for each IP *  Ã‚  Ã‚      if checked. *  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   snmp. snmpSet(IP,addUsers) *  Ã‚  Ã‚      else *  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚  Ã‚   snmp. snmpSet(IP,removeUsers) */ Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; } private void Button14_Click(object sender, System. EventArgs e) { CheckBox1. Visible=false; Label12. Visible=false; TextBox7. Visible=false; DataGrid2. Visible=false; DataGrid1. Visible=false; Button9. Visible=false; TextBox1. Visible=false; TextBox2. Visible=false; TextBox5. Visible=false; Label10. Visible=false; Label3. Visible=false; Label4. Visible=false; Label5. Visible=false; CheckBoxList1. Visible=false; DropDownList1. Visible=false; Button6. Visible=false; Label1. Visible=false; Label2. Visible=false; Button10. Visible=false; TextBox3. Visible=false; TextBox4. Visible=false; DropDownList2. Visible=false; Button8. Visible=false; DropDownList3. Visible=false; Button12. Visible=false; Label13. Visible=false; Label14. Visible=false; Label15. Visible=false; Label16. Visible=false; TextBox6. Visible=false; TextBox8. Visible=false; TextBox9. Visible=false; CheckBoxList2. Visible=false; Button13. Visible=false; DropDownList4. Visible=true; Button16. Visible=true; Button15. Visible=false; Label11. Visible=false; Label17. Visible=false; Label18. Visible=false; TextBox11. Visible=false; TextBox12. Visible=false; TextBox10. Visible=false; CheckBox2. Visible=false; Label6. Text=Select the AP you wish to update and press select; //bring the APs list into the dropdown box try { DropDownList4. Items. Clear(); int i=0; apDataSet1. Clear(); sqlDataAdapter2. SelectCommand = new SqlCommand(  Ã‚  Ã‚  Ã‚  Ã‚   SELECT APname FROM AP,sqlConnection1); sqlDataAdapter2. Fill(apDataSet1,AP); DataRow [] arr = apDataSet1. AP. Select(); i = arr.

Sunday, July 21, 2019

Unethical Marketing Research Practices

Unethical Marketing Research Practices Practices in relation to proposals constitute a breach of professionalism, courtesy and ethics, research managers should understand that, Examples of common faults: Added consulting services prior to winning the assignment, expecting the research company to provide value Developing research instruments and special exercises and providing customized local market information. These may include project design, However, it is wrong to make this an expectation., the research company may wish to supply some of these services to place themselves in a better competitive position; In order to place the second in a better competitive position, disclosing details of one Research Companys proposal to another Company information and pricing structure the research companys approach should be treated as proprietary and confidential. Research managers should not use another company as a lever or check on a regular supplier, seeking comparison bids without charge Evaluating Research The process of vendor selection can sometimes become derailed by individual egos and political dynamics which are harmful to successful study execution and should be avoided, the research manager typically must review them with senior research, brand and marketing management. The consultants personal qualities including their level of enthusiasm, poise and professionalism as well as the skills and professional capabilities offered by the research company, primary criteria that should be applied in the selection process are the fit between the projects substantive requirements and the research manager should be certain that the proposals offered are equivalent in all respects, particularly in terms of specifications and possible hidden costs not apparent in the quotation Unethical Practices in Marketing RESEARCH SUPPLIERS Low-ball pricing Underpaying field services Lack of objectivity Abuse of respondents Selling unnecessary research Violating client confidentiality Research Clients Issuing bid requests when a supplier has been predetermined Obtaining free advice and methodology via bid requests Making false promises Unauthorized requests for proposals Field Services Law-ball Pricing What Is Low Balling the Price When Buying Car? Car dealers are often stereotyped as tricky and dishonest, and the car buying experience is viewed as an adversarial contest between the customer and salesperson. While its not always that way, there are some dishonest dealerships and salespeople who will use unethical practices to sell their cars. One of these practices is known as lowball. Not every dealer will use it, but you should be aware of it in case someone tries it. If they do, you should know how to handle it. Lowball the price of a car means offering to sell it at an unrealistically low price. For example, a car dealer might offer you a vehicle for $27,000 even though it normally sells for a minimum of $30,000. Unfortunately, the dealer has no intention of actually selling the car at that price. Its an underhanded tactic to get you through the door. There are two purposes for giving you a lowball offer. If you are shopping around, Roosevelt Gist of Auto Network says a salesperson will give a lowball price to ensure that you will come back. He knows that no other dealer will be able to meet the offer, so he wants to guarantee your return. He wont give you anything in writing, and when you return he wont honor the price. Youll get an excuse like you misunderstood or the sales manager wouldnt approve it or the car has been sold. Instead, youll find yourself back in negotiations. The second purpose is to get you into the dealership if you have not been there yet. If you are shopping via email or over the phone, the dealer may call you with a price that sounds too good to be true. When you arrive, he wont honor the price. It may seem that lowball would turn off buyers, but some dealers get good results with this tactic. If youre shopping over the phone or via email and he can get you through the door, he hopes that you wont want to be bothered shopping around at other dealers. If he can get you to do a test drive and engage you in negotiations, he hopes to make a sale. If youre already at the dealership after shopping around, he is counting on the fact that you are tired and will give in to the higher price. The best reaction when you have been lowballs to simply walk out the door. Once you see the dealer has no intention of honoring the price, youll also see that he is not above using dishonest tactics. Its better to spending more time shopping around than to deal with an unethical business. You can prevent lowball by asking the salesperson to put his offer in writing if it sounds unusually low. If he makes the offer over the phone, ask him to send you an email or fax you a written confirmation before you visit the dealership. If he refuses to do this, dont bother going to the dealership. Youve probably gotten a lowball offer that will not be honored when you arrive. Lake of Objectivity How to Avoid Unethical Behaviors and Dirty Tricks of Realtors Since the commissions of the Real Estate Agent are being paid by the seller of the house a buyer cannot relay on his objectivity or impartial conduct, like in many professions and occupations there are honest and ethical people and there are some who arent exactly as since without a buyer there is no deal, the seller can expect the agent to exert pressure to lower the selling price. Therefore he would do anything in his power to make the buyer pay more than he wanted and on the other hand (the good hand :-), push the seller to settle for less than he hoped to be paid for his property. In short, the agents main interest is to make sure that there would be a sale, so he would be able to get his commission , what we would concentrate here though, is the unethical dirty tricks and manipulations some of the Real Estate agents are using in order to achieve it. In general it make sense to bring both sides to agree on realistic price that can cut a deal Misconduct of Agents to Seller The sellers are the biggest losers from the real estate agents tricks Home owners are often duped into paying money to agents before their homes are sold. If their home does not sell, or it sells for less than the consumer was led to believe, this money, which often amounts to thousands of dollars, is lost. Purpose of advertising is NOT to sell homes, but to raise the profile of agents; this is at the direct expense of home sellers. Home sellers are being convinced by a rational that the price goes up at auctions but the reason the price goes up at auction is because it starts at a very low price. The truth is that auctions get lower prices more often than they get higher prices. Among agents, an auction is considered the fastest and best conditioning method. Home Owners lose millions through having their homes undersold at auctions.. It is a common deceit. At other times, home sellers are given totally fictitious offers in order to convince them to lower prices, many agents submit offers to sellers which are lower than the offer actually made by the buyers. This reckless disregard for the personal safety of home-owners is a serious ethical concern. Open Inspections, Almost anyone can walk through a family home without identification. Agents will say that there has been lots of activity and, if no one has bought, the price must be lowered. But agents do not say that the people who looked were not qualified Also, the more lookers who can be attracted to an open inspection the easier it is to persuade the owner to reduce the price. Abuse of Respondents Often, an association and its members will have already heard rumors or seen patterns of wrongdoing before a crisis becomes public. By choosing to do nothing then-or even after a scandal breaks-associations have failed their professions and industries. Leadership and quick action to shore up public trust is needed. I am convinced that many associations have failed their professions and industries in times of scandal and crisis. But what should an association do when one or more of its members is waist-deep in a public scandal? Here are a few suggestions: Condemn the sin, not the sinner. Public confidence in a profession or industry demands that the profession always be ready to draw clear lines between acceptable and unacceptable behavior. It is possible to make a strong and timely statement on the ethics of a specific behavior without judging whether the particular behavior has occurred in this case or whether a specific executive is guilty. The first response of an association must be to label the unethical behavior for what it is Ask the accused to step aside. It should be an unwritten law of associations and professional societies that accused individuals step aside temporarily until charges are resolved. The credibility of any association depends on the integrity of its leaders. This does not admit guilt, but simply respects the special role of the association. Pull the trigger if guilt is established. If the guilt of an individual or member firm is established, then the association must act to force the resignation or withdraw the membership of the guilty. Cases where guilt is never proven, but the stench of scandal is strong, present harder choices. Associations must be in the business of building public trust. Quiet action to force the resignation of an association board member may be called for. If an association today does not have a process for throwing out a member, it had better create one. Define and advocate best ethical practices, not just minimum behaviors. Association codes designed to define and advocate exemplary rather than minimal behaviors. In todays ethical climate, restoring trust will require a focus on best practices and exemplary behavior If only the lower boundary is established, those inclined to wrongdoing will always be probing how low is low, most association and industry codes of ethical conduct are least common denominators, a list of provisions that virtually every member can agree to because the standards are so low Keep your ethics current with the changing nature of your profession or industry. Ethical norms codified by the firms and their associations in the past addressed problems of a simpler time. Only through visionary action and timely debate on new ethical issues facing the profession or industry will public credibility and trust be sustained The ethical failures in the accounting, financial services, health care, and telecommunications industries can in part be attributed to the rapidly changing structure and altered characteristics of those industries Selling unnecessary Research Admittedly, people assume different approaches to managing their visibility. On the contrary, years of BSRP research finds that in our culture, if you want to get paid what youre worth, its essential. Doing whatever you can to direct attention to the competencies you have, and contributions you make, is not inherently wrong or evil. Some are narcissistic and vain but not necessarily unethical. However, there are some people who plainly do not subscribe to conventional rule of conduct. To them, for example, the rhetoric of principles, values and integrity only serves as an additional device which can be used to scam others. Their unrestrained behavior taints ethical self-projection for everyone. They may be tedious and boring, but they are not necessarily unethical. The result is a catalog of twenty-two behavioral tools unethical self-promoters tend to use. How many have you experienced? Well intended people are content to practice appropriate self-presentation, when they can, moderated by a sense of honor, respect for the truth and prudent regard for the feelings of others For 30 years we have been observing those devices in use, especially as they are used by salespeople, managers, executives, ex-clergy, consultants, psychologists, and others. Violating Client Confidentiality Temptation grows stronger when were tired, afraid, under pressure, or in conflict all of us face the human temptation to duck important ethical responsibilities. By making what we know or suspect is unethical seem perfectly ethical. Common cognitive strategies can fool us They can spin the most questionable behaviors into ethical ideals. The most common ethical fallacies rely on twisted judgment, appealing fallacies, and juggled language. To restate a major theme of this book: We believe that the overwhelming majority of psychologists are conscientious, caring individuals, committed to ethical behavior. We also believe that all of us are fallible, no one is perfect in all areas at all times, and we all share vulnerabilities at one time or another to at least a few of these ethical justifications. What sorts of cognitive maneuvers can transform unethical behavior into the ethical ideal? Many of the justifications below appeared in previous editions of this book, and some were added when the list appeared in Here are a few. We encourage readers to expand the list. Unethical not as long as a managed care administrator or insurance case reviewer required or suggested it. Unethical not what sorts of cognitive maneuvers can transform unethical behavior into the ethical ideal? if the American Psychological Association or similar organization allows it. Unethical not if an ethics code never mentions the concept, term, or act Unethical not as long as any law was broken. If someone discovers that our c.v. is full of degrees we never earned, positions we never held, and awards we never received, all we need do is non defensively acknowledge that mistakes were made and its time to move on Its not unethical as long as we can name others who do the same thing. unethical not if we can use the passive voice and look ahead. Its not unethical as long as we didnt mean to hurt anyone. unethical not even if our acts have caused harm as long as the person we harmed had it coming, provoked us, deserved it, was really asking for it, or practically forced us to do it or, failing that, has not behaved perfectly, is in some way unlikable, or is acting unreasonably. without any doubt whatsoever that exactly what we did was the necessary and sufficient proximate cause of harm to the client and that the client would otherwise be free of all physical and psychological problems. Its not unethical as long as there is no body of universally accepted, methodologically perfect (i.e., without any flaws, weaknesses, or limitations) studies showing -, difficulties, or challenges. Its not unethical if we could not (or did not) anticipate the unintended consequences of our acts. For example, it may seem as if a therapist who has submitted hundreds of thousands of dollars worth of bogus insurance claims for patients he never saw might have behaved unethically. Its not unethical if we acknowledge the importance of judgment, consistency, and context. : It was simply an error in judgment, completely inconsistent with the high ethics manifest in every other part of the persons life, and insignificant in the context of the unbelievable good that this person does. However, as attorneys and others representing such professionals often point out Use of professional Respondents Unethical Behavior Its Impact on Todays Workplace Such unethical behaviors include a wide variety of different activities. Among the most common unethical business behaviors of employees are making long-distance calls on business lines, duplicating software for use at home, falsifying the number of hours worked, or much more serious and illegal practices, such as embezzling money from the business, or falsifying business records. Though there is sometimes a difference between behaviors that are unethical and activities that are actually illegal, it is up to the business itself to decide how it deals with unethical behavior legal or not. It is a sad truth that the employees of just about every business, in every business, will occasionally encounter team members who are taking part in unethical behaviors. After all, unethical behavior that is not illegal frequently falls in a grey area between right and wrong that make it difficult to decide what to do when it is encountered. Many employees find that discovering unethical behavior among co-workers actually tests their own values and ethical behaviors. For example, some people feel that it is alright to tell a little white lie, or to make one long distance call on the companys nickel, as long as they can justify it in their mind. Furthermore, different people have different views regarding what is ethical and what is unethical. Employee needs to consider how s/he feels about that particular activity, as well as informing about that activity, or turning a blind eye. When employees discover other employees doing something that they know is wrong by the companys standards, their own sense of what is right and what is wrong instantly comes into question The first step is to create a company policy, in writing, that is read and signed by each employee. This erases most feelings of ambiguity when it comes to deciding what to do after witnessing an unethical behavior Should the employee speak to the individual directly, or should the employee head directly to a company supervisor? Even by deciding to do something about it, the employee who has discovered the unethical behavior is presented with a number of difficult choices. To make this decision a bit easier, many companies have adopted several techniques that allow for the management of unethical activities. With clear instructions, there will be less hesitation in reporting unethical activities, and then they can be dealt with quickly and relatively easily, before they develop into overwhelming issues the second is to give a clear outline of what is expected of the person who has discovered the unethical behavior. It should include the person who should be contacted, and how to go about doing it. Furthermore, the repercussions of unethical behaviors should be clearly stated. both the person doing the activity, and the witness to the activity will be well aware of the way that things will be dealt with, and there wont be any risk of someone not reporting unethical behavior because theyre afraid that the culprit will be unfairly treated. Communication is key in the proper management of unethical behavior in todays workplace. RESOURCES Hagan, F. (2000). Research Methods in Criminal Justice and Criminology. Boston: Allyn Bacon. Lasley, J. (1999). Essentials of Criminal Justice and Criminological Research. NJ: Prentice Hall Neuman, L. B. Wiegand. (2000). Criminal Justice Research Methods. Boston: Allyn Bacon. Reynolds, P. (1982). Ethics and Social Science Research. Englewood Cliffs, NJ: Prentice Hall. Senese, J. (1997). Applied Research Methods in Criminal Justice. Chicago: Nelson Hall. Not an official webpage of APSU, copyright restrictions apply, see Megalinks in Criminal Justice OConnor, T. (Date of Last Update at bottom of page). In Part of web cited (Windows name for file at top of browser), MegaLinks in Criminal Justice. Retrieved from http://www.apsu.edu/oconnort/rest of URL accessed on todays date.

Saturday, July 20, 2019

Live Flesh by Pedro Almodovar: Scene Analysis :: essays research papers

Pedro Almodovar’s 1997 film Live Flesh (Carne Tremula), is rich in both visual and story elements, making in the perfect candidate for a scene analysis. Upon writing this paper, however, this was almost to my disadvantage. I watched it through and whittled it down to about five scenes I considered analyzing. This self-challenge is a testament to not only this film, but Almodovar’s whole body of work; he has created so many thoughtful, intricate, and all together entertaining films in his career, I had to somehow forgive myself for just choosing one short scene out of only one of his movies for analysis. So, without further ado, here is an analysis of a scene from Live Flesh. The scene I chose to analyze is the one in which David (Javier Bardem) returns home from a basketball game, only to find out his wife, Elena (Francesca Neri) has slept with another man. It occurs at roughly an hour and 17 minutes into the film, and is relatively short, but extremely powerful. The opening shot to the scene of Elena returning home from her tryst early in the morning. She enters the shower and begins to smell her naked body, seemingly bringing back memories from the previous night. Every time she inhales, she lets out an orgasmic sigh, which makes it clear to the audience exactly what she is recalling. With each sigh it seems that she not only had an amazing sexual experience, but that she also doesn’t regret it at all. This is until her last deep breathe. After this, she pauses for a beat, and in this moment, a look of full realization about the events of the past night washes over her face. This moment is fleeting, however, because right when she turns the shower on, she closes her eyes, as if she is recalling not only the scents of the night before, but even the sights and sounds. As soon as she stops moving and cracks a smile, the shot quickly changes to David’s cab pulling up. The cab symbolizes David’s dependence, in that all he can do is sit in the back and tell the driver where to go, showing that his disability has forced him to become dependent on so many different people. The fact that David’s cab was shown right as Elena began to smile shows that David’s dependence is preventing Elena from truly being happy, which I’m sure is a struggle in any relationship involving a handicapped person.

Friday, July 19, 2019

Radio Frequency Identification (RFID) Essay -- Radio Frequency Identif

The innovation of the RFID chip or the Radio Frequency Identification has been a critical piece of technology that has been around since the early/mid 20th century (est 1938). Functions of a radio frequency identification (RFID) tagging system involves a tag and a reader. When scanned, the antenna within the tag picks up the radio wave and sends a response back to the reader. This technology is being used for both short range and also long range identification, in the short-range identification category, this innovation is used in practical applications like credit cards (pay wave, tap and go ect...), animal identification (domestic pets, farm animals). The long range applications of the RFID chip is used in aeroplanes to bounce back a signal to radio control signifying their plane identification, the long range application of the chip is used in many other systems for similar purposes. the RFID chip is used all around the would and has and is readily available for the past few decades. The RFID chip is used by many agencies including federal agencies and also used for municipal and state and also local agencies. E.G.. RFID for Federal Agencies * Border and Immigration Security * Cargo and Container Security * Food and Cold Chain Safety (Product Authentication and Temperature Tracking) * Livestock & AgricultureTracking * Military Personnel Relocation Services * Military Supply Chain (Supply chain Shipping, * Receiving and Logistics) * Pharmaceutical Track and Trace Trusted Traveler Control Systems aeroplane tracking/ID RFID for Municipal and State and Local Agencies * Asset & Inventory Control * Firefighter Locationing /Emergency Service Personnel Locationing * First Responder Evacuation Services * Lib... ...lter, 2001, pp. 445--456) Motorolasolutions.com. 2014. RFID Government Solutions - Motorola Solutions USA. [online] Available at: http://www.motorolasolutions.com/US-EN/Business+Solutions/Industry+Solutions/Government/Airports+and+Seaports/RFID_Government_Solutions_US-EN Wikipedia. 2014. Radio-frequency identification. [online] Available at: http://en.wikipedia.org/wiki/Radio-frequency_identification [Accessed: 11 Feb 2014]. Wikipedia. 2014. Digital Revolution. [online] Available at: http://en.wikipedia.org/wiki/Digital_Revolution Wikipedia. 2014. Near field communication. [online] Available at: http://en.wikipedia.org/wiki/Near_field_communication Idtechex.com. 2014. RFID Forecasts, Players and Opportunities 2012-2022: IDTechEx. [online] Available at: http://www.idtechex.com/research/reports/rfid-forecasts-players-and-opportunities-2012-2022-000322.asp

Enzymes in Brewing Industry :: essays papers

Enzymes in Brewing Industry Bioengineering Research Paper Enzymes are catalysts or proteins that are produced by a living cell, but in process are independent of the cell itself. There are two types of enzymes i.e 1) Cell Independent enzymes 2) Non-enzymic enzymes Enzymes are long chains of amino acids held together by peptide bonds. They exist in all living cells, usually controlling the metabolic process whereby nutrients are converted into energy. Enzymes are also catalyst, this mean that enzymes can speed up chemical processes that would normally move very slowly. Enzymes unfortunately don’t last forever they have limited stability or lifespan when they have completed their function in the chemical reaction. Science shows that enzymes work on raw material. Fruit, cereal, milk, beer or wood are some typical products for enzymatic conversion. Enzymes are specific, they usually break down or synthesize one particular compound, and in some cases enzymes limit their actions to specific bonds in the compound with in which they react. An example gluconases is one of the many enzymes used in beer brewing. This enzyme is used in industrial applications of brewing beer and is a very efficient catalyst. It breaks down the wheat and converts the carbohydrates into sugars that speed up the reaction in the aspect of the beer’s fermentation. Enzymes need certain types of conditions to operate, these conditions are usually mild in the areas of temperature and acidity. Many enzymes function around 30Â º- 70Â ºC and their acidity are usually around neutral(ph 7). Enzymes are very important to industrial processes, enzymes they are energy saving and also protect the lifespan of equipment used in processes and also having to buy special equipment resistant to heat, pressure or corrosion. Industrial enzymes can be produced in an ecological way, one of the main ways enzymes can be produced industrially is to culture enzymes in vats. Man has been exploiting enzymes in nature unknowingly for centuries. Also for thousands of years the beer brewing processes of many countries has relied heavily on barley malt. In this period of time barley was malted without brewers understanding what happen to the barley during the malting process. The idea back then was good beer couldn’t be made without malted barley. The unknown

Thursday, July 18, 2019

Police Corruption Essay Essay

Police Corruption can be defined as a form of police misconduct in which law enforcement officers break their social contract and abuse their power for personal or department gain. There are three forms of police corruption. These forms are Nonfeasance, which involves failure to perform legal duty, another form is Misfeasance, which is failure to perform legal duty in a proper manner, and the third form is Malfeasance, which is commission of an illegal act. The three explanations of corruption are the â€Å"rotten apples†, â€Å"departmental†, and the other focuses on factors external to the department. An example of these would be an officer might feel unappreciated for their good work and actions and it might make them corruptible. An example of departmental explanation would be if officers feel uncommitted and unsupported, their outlooks and values are reinforced by others in the group which may lead to lack of commitment in their job, thereby leading to corruption. Some police officers may abuse their power because they see themselves as not enforcers of the law, but them as the law itself. The â€Å"blue wall of silence† is a term used in the United States to denote the unwritten rule that exists among officers, where they should not report on a colleague’s misconduct, errors, or crimes. This may impact an officer’s loyalty to their profession because they are not doing their job if they are letting another officer get away with crimes, and if they did report it then they would be breaking their loyalty to fellow cops. It’s important for officers to have a good ethical foundation before they enter into this job because it would help prevent them from doing wrong and abusing their power. In the â€Å"Stopped for Being a Mutt† video, I realized how bad some officers can act sometimes. The teen was stopped and questioned multiple times for looking suspicious, when really they were just racist. They were trying to provoke the teenager to justify an arrest. I feel the form of police corruption they were doing was misfeasance. Stopping someone because of their race, when they weren’t committing any crimes is humiliating to that person and is wrong of any cop to abuse their power in this way. The â€Å"Blue wall of silence† comes up in this type of situation because some other cops  witness it and knows that this goes on when officers have low numbers of stops, and they don’t want to tell because they don’t want to seem disloyal to their fellow police officers. In the â€Å"Los Angeles Police Department† video, they talked about the Rampart and Crash scandal. When I watched this video I was in disbelief that, that many officers were implicated in some form of misconduct. I understand that they wanted to get gangs and crimes off the street but this was no way of going about it. They would shoot or beat people when they were unprovoked. They would steal narcotics and plant false evidence, and frame suspects and cover up all that these officers were doing because it was getting rid of the gangs and â€Å"hoodlums†. I can’t understand how these officers didn’t think what they were doing was wrong and immoral. This form of corruption in this particular situation was malfeasance. What they were doing was illegal, and they are here to protect and obey the law. In the â€Å"Behind the Blue Wall† video. I was extremely shocked to see the police brutality that occurred in these cases. I don’t understand how an officer could deliberately torment a victim because of their race and think they can get away with what they’re doing and that it isn’t wrong. Malfeasance is the form of corruption that comes up in these cases because what they are doing is illegal. The unlawful beatings and shootings of these victims, when they are not provoking the officers; is completely wrong and these cases need to stop. The Blue wall of silence also comes up in these cases because there were officers who knew about what happened and what the other officers were doing and instead of reporting it, they attempted to cover it up. Co-workers should treat those who inform authorities of illegal activity in the police agency the same as how they treated them before they reported corruption. In the virtue ethics perspective, the habit of right desire, he was making the right choice by reporting corruption because he knew that what was going on in the agency wasn’t right and needed to be stopped. Frank Serpico’s response to this case was â€Å"It’s always worth it to be at peace with yourself.† I think this does imply reasoning of ethical thought. I  think Serpico meant that, as long as you feel good with what you are doing, and you are doing what you think is right, then that is all the matters. I agree with this because no matter what happens in the end, it is all worth it if you are at peace and happy with what you did. There are conflicts presented in terms of loyalty and duty. Loyalty is a good to have, but it is not a virtue. If loyalty is treated as a virtue, it can be misguided. It will lead to protection of illegal conduct and can turn into corruption. Officers may want to be loyal to fellow officers and not report what is really going on, however they also want to do their duty, and want to report because it is their duty to not participate in the corruption. The blue wall of silence impacts conflicting loyalty because it is an unwritten rule amongst officers to not report a fellow officer’s mistakes, misconducts, or crimes. This affects them if they want to be loyal to those officers and be loyal to their civic duty as well. If I was an officer in this situation, I would definitely report these crimes. I don’t believe in the blue wall of silence. I think that if an officer is doing something illegal then it needs to be reported and dealt with. Just because they are officers doesn’t mean they should be able to get away with things that they are arresting other citizens for doing.

Wednesday, July 17, 2019

Administrative assistant

I am actively seeking an administrator assistant opportunity in a demanding, fast-paced multi-tasking office. I possess old age of executive experience, which have equipped me with a multitude of skills, and I would like to hap my growth at AB Volvos multitude Accounting Department.I am a college graduate and am serious in the use of the Microsoft Office suite of parcel (MS Word, MS Excel and MS PowerPoint).Throughout my locomote I have demonstrated for my employers an stupendous facility for come acrossing organizational objectives and demands. In addition to my secretarial skills, I am an adept event planner, and am proficient in administrative work regarding the Sarbanes Oxley Act. I am also well informal in financial related talk due to my having worked in accounting environments previously.Furthermore, my genuine and previous employers have regarded my secretarial skills in planning meetings, taking minutes, filing and funding as high quality.I am sure I would prov e to be an addition at AB Volvo as well.If my abilities meet the needs of AB Volvos Group Accounting Department, I would greatly regard the opportunity of speaking with you personally at your earliest convenience. Thank you for your time.Sincerely,Jane Smith