Monday, September 30, 2019

Benefits of Distance Learning Essay

The benefits of distance learning are apparent as distance learning aims at meeting student’s needs. The offered outline is composed according to student’s needs and abilities. The most important factor affecting many future students who are willing to study is financial problems. Therefore firstly they consider financial benefits of any type of learning. Ability to take part-time job along with ability to save money plays an important role in choosing studying course. Students having financial problems also consider benefits in time management and distance learning gives the opportunity to study when it is convenient for a student. Therefore time management benefits have to follow financial ones. Furthermore, effectiveness of studying process is also a matter of concern for future students. Ability to correspond with teachers and other students via e-mail, telephone and chat rooms offers wide range of studying opportunities. Constant access to on-line libraries and data bases affects student’s choice. Students having full-time and part-time jobs would be able to pass exams during their available time. Finally, social benefits take the last place, because considerations about financial and studying benefits are more important in modern society as education is very expensive and one firstly thinks abut the ability to pay for the course and only then about the opportunities to lead social life. References Distance Learning Benefits. (2005). Retrieved October, 27, 2006, from http://www. distance-learning-college-guide. com/distance-learning-benefits. html

Sunday, September 29, 2019

Logistics and Project Planning Essay

The mission of elc was to provide consumers with access to the Internet at the lowest cost. Despite the excellent support and recognition from the public, elc was experiencing adversity of keeping their business profitable after the Internet Investment bubble burst. The original concept of owning many of the large stand-alone cafes with 250-500 PC terminals at each cafe was not working well. elc undertook a dramatic restructuring of the company by downsizing the cafes. Many of the large, original stand-alone elc stores will be run by franchisees. These franchised stores will become smaller stores which have 20 to 30 PCs terminals at each cafe and with no staff required except for regular maintenance. Less involvement with store operations allows elc to concentrate on activities of their core competence and outsource all the non-core activities. Their core competence was to continue building their ‘easy’ brand and applying the yield management model to the Internet cafe business. Their business goal was to open 4 new franchises per week over the next 3 years. In order to achieve the goal of growing their franchised Internet cafes business, an efficient, flexible and cost-effective logistics system is what they need for the provision of equipment to the franchisee. Since logistics is one of the non-core activities that is perceived as a bottleneck for scalability, the present logistics system of elc will be reviewed and findings of whether to outsource the logistics system will be presented to the management team. Background of easyGroup Stelios Haji-loannou, the founder of easyGroup, is the renowned Greek entrepreneur who utilized his family money to launch a serial of ventures. His first venture, Stelmar Tankers was found in 1992. The company very soon went into the public sector and was listed on New York Stock Exchange. In 1995, he found easyJet. easyJet was a no-frills, low cost airline company and later grew to become the largest no-frill airline in Europe and was listed on the London stock exchange in 2000. Building on the success of easyJet and to extend the ‘easy’ brand further, he formed the holding company easyGroup in 1998. easyInternetcafe was his first venture under the umbrella of the easyGroup. Other companies in the group included easyJet, easyCar, easyCinema, easy. com, easyMoney and easyValue, easyBus, easyPizza, easyCruise, and easyDorm. Low price and no-frill is the key elements of the ‘easy’ brand. Yield Management Model Stelios is an enthusiast of Yield Management Model and he applies the model to his business. According to Wikipedia, yield management is the process of understanding, anticipating and influencing consumer behavior in order to maximize revenue or profits from a fixed, perishable resource (such as airline seats or hotel room reservations). Stelios believes that lowering the price will increase the demands of the customers significantly. By locating all the large internet cafes in high traffic areas, elc aimed to capture the maximum revenue by providing internet services with a variety of price points at different points in time (peak hours or off peak hours). The price for Internet access varies based on demand, raising the price in dollar per hour in mid-afternoon, when stores are nearly full. That gives bargain hunters an incentive to visit in the non-peak hours, when price is dropping. The model is well suited for business with high fixed cost and perishable supply. The large numbers of computer equipments inside the Internet cafes are capital intensive for elc. The empty seats inside the cafe in a certain time period cannot generate any revenue and thus can be said to have perished. elc uses one of their capital proprietary products, CVM, to monitor how seats are occupied and react accordingly, for example by adjusting the price to offer discounts when it appears that large amount of seats are remaining empty. However, this model is not working for elc as it does for airline and hotel industries. The customers’ willingness to pay for using the internet access at theses internet cafe is impulsive and their demands are not easy to predict. The yield management model works well for airlines and hotels mainly because their customers usually plan ahead of time on their journey. Therefore, airlines and hotels are more likely to predict their customer demands and adjust the prices accordingly. They still have time to attract customers by offering last minute deals. But for internet cafes, customers do not make reservation for their usage of Internet in advance. Customer demands are thus very hard to predict. Even though the CVM can adjust the pricing based on the vacancy of the cafe, it is difficult to attract enough customers in a short period of time to fill up the empty usage of the internet access. Since Internet was still a new technology at that time, Internet access was not yet considered to be an essential product. Customers were likely to learn when to visit the cafes so that they can pay less compared to other time period.

Saturday, September 28, 2019

Pentecost Essay Example | Topics and Well Written Essays - 1000 words

Pentecost - Essay Example The term, â€Å"they† indicates the apostles who were present at the place where Lord Jesus was crucified, with an intention to spread the preaching of the gospel to various corners of the earth. The term â€Å"all† is indicative of the number of people present there at that time which was 120 including the apostles (Acts 1:15). However, a common consensus could not be arrived as regards the â€Å"one place† which has been mentioned here. It could however be concluded that the place was a room upstairs (Acts 1:13). The phrase â€Å"suddenly† indicates the unpredictability of the event although they were expecting the descent of the Holy Spirit. The term â€Å"from heaven† is used to emphasis the fact that the sound descended from the sky. Rushing like a violent wind signifies the magnitude of the sound and the house was full of it describes aptly the force and power of the sound that it filled the entire house where they had gathered. The term it is indicative of the sound and not the wind. The term appeared unto them suggests that they saw or had visions of. The word cloven means divided or distributed whereas the term tongues is used shape of fire that looked like a tongue. In Hebrew the word tongue is described as something which is long, narrow and pointed in shape, and hence resembling fire. It sat upon each of them denotes that it rested on the heads of those gathered there and is indicative of the descent of the Holy Spirit. The phrase and they were all filled with the Holy Ghost is used to indicate that they were graced by the sacred presence of the Holy Spirit and hence were entirely under his command / power / influence / spell. The term filled with is used to signify the absolute power cast by his presence. The term began to speak in other tongues means that they started conversing in different languages and as the spirit gave them utterance denotes that the power / ability to speak in different languages was conferred on them by the holy spirit,

Friday, September 27, 2019

Drugs In The World Essay Example | Topics and Well Written Essays - 1000 words

Drugs In The World - Essay Example To this end, opium planting first began in eastern Mediterranean and spread systematically to India via trade routes and eventually arriving at China by the eighth century A.D (Chouvy, 2010). On the other hand, cocaine, which is a derivative drug of the cocoa plants traces it genealogy back to the Andes region where it was cultivated by the Incas populace. Evidently, cocaine was first derived from coca in 1860 and it powerful stimulant effects became evident. To this end, the drug creates an instantaneous sense of euphoria by igniting the brain’s regulatory transmitters (Marcy, 2010). Presently, both opium and cocaine have become a global drug menace that was catalyzed through colonization and wars. During the British occupation of India in 1750, they specifically took control of Bihar and Bengal which were key opium growing districts. To this end, the British shipping company took control over the opium trade from Calcutta to China. Evidently, by 1767, the opium exports to Ch ina by the British reached a record two thousand chests per year. In addition, the British India Company created a monopoly over the opium trade and restricted the Indian poppy growers from selling the commodity to competing trading companies. In Turkey, the British Levant Company bought more than half of the opium originating from Smyrna Turkey. Furthermore, they diverted all importations strictly to the United States and Europe. During the First and Second Opium War which was precipitated by efforts to suppress opium trade by the Chinese commissioner, the British sent warships to China’s coast. To this end, the Chinese lost the war to Britain and eventually opium importation was legalized. This further proliferated the supply of opium. On the other hand, cocaine spread and proliferation began during the Spanish colonial era when it was slowly becoming entrenched as a global commodity. Furthermore, the success of Europe’s commercial revolution was also hinged on cocai ne since it assisted in lubricating the major silver mining industry of colonial Spain. Evidently, the colonial Spanish slave masters came to discover that the coca stimulant made the laborers to work harder, eat less and work for longer hours. To this end, the cocoa leaves were used as a major stimulant towards coercing the Indian worker at the Potosi mines. When cocaine alkaloid derivative was discovered, the Spanish colonial masters began an intensive cultivation of coca for cocaine cultivation. The leaves were thus traded and also transplanting of the Andean coca specimens in Asia, Australia and Africa. During World War 1 and 2 eras, importation of coca leaves and manufacturing of cocaine increased significantly. Evidently, between 1918 and 1921, Japan recorded an all time import of coca of 455,000 kg. Evidently, the trade of cocaine has been largely fuelled by notorious violence in countries such as Peru and Colombia since the late 1970’s. In the United States during Wor ld War 2, coca trades that were used in the manufacture of cocaine increased to the range of 300-400,000 lb. These were largely imports from Peru. The U. S cocaine networks during the World War 2 period exhibited features such as monopolies of cocaine processing that were assisted by the state, while leading intensive global campaigns that were against the illegal production of coca and

Thursday, September 26, 2019

Socciological Reasearch Proposal- Violence and gun control Term Paper

Socciological Reasearch Proposal- Violence and gun control - Term Paper Example ops as â€Å"armed forces† and the importance of maintaining our firepower has been identified throughout the human history, which the firearm has helped to shape. The father of the nation have identified the necessity of arming the citizen to protect themselves and made it a part of the constitution for them to possess arms However, comparing to other countries United States have more fatalities due to fire arm violence. It is widely observed that the United States has basically higher rates of gun violence because its gun control measures are not as rigid as those found in Great Britain, Australia and Japan. The rate of gun related homicides in United States is more along with other fatalities involving gun. â€Å"President Bill Clinton initiated a $15 million program directed at lowering the number of guns in and around housing projects. When the people bring guns to local police stations they received fifty dollars on each weapon; these were then destroyed† (Squires 2001) Gun violence is an issue of major concern in America. US have a high gun murder rate as compared to England and other countries where Gun control rules are stricter. Gun control has been a controversial issue for years. A vast majority of citizens believe that, if gun control is strictly enforced it would quickly reduce the threat of crime. According to(La Follette 2001) â€Å" Based upon the production data from manufacturers of fire arms there around 300 million firearms owned by citizens in the United States as of 2010. Among them, about 100 million are handguns†. This shows the rate of guns owned by the citizens and risk of violence prevalent in the country. He suggests that 16,272 murders occurred in the United States in the year of 2008. About 10,886 or 67% were performed with firearms. It is very important to ensure the safety of the public by implementing a gun control system. If the children find gun at home they can use by not knowing the consequences of it. A much planned law and

Argument Essay Example | Topics and Well Written Essays - 1250 words - 1

Argument - Essay Example This paper will examine the perception towards slum tourism through literature exploration (Eveline & Rivke, p 113.) In the slum, setting there is nothing that is called garbage. Everyone in the slum wants a better life, Critics argue out the slums are exploitative, and they do not have a place in ethical travelers` itinerary. Professor David Fenell, at Brock University in Ontario, questioned the fact that the tourists visit places to take pictures and observe the lifestyles of the slum residents. He believes that the main purpose of slum tourism is to make the westerners feel better of their lifestyle in comparison to the slum habitants. They feel lucky on their life situation in comparison them. However, the proponents of slum tourism argue that ignoring poverty will not take it away. Slum tourism helps them to understand what poverty means. The big issue is how to conduct it (The New York Times, 2008) There conceptual ambiguity in slum tourism is based on a failure to set specific goals of tourism. The exact thing that attracts people during the tour in the slums and favelas is not precisely known (Manfred, p. 421). The use of poverty tourism indicates that poverty is the reason for the visits. The critiques argue that tours on the human wretchedness, infirmity, and unworthy living conditions should not be termed as a tourist attraction aspect. This issue has been largely fuelled by the mass media who present the pictures of such conditions. However, the proponents suggest that the word poverty tourism demonstrates the anticipated situation that propels them to go to slums (Eveline & Rivke, p 114.) Many organizers of slum tourism encourage active role-playing of the participants aimed at helping the residents. A church group in Mexico runs a tour of local garbage dumps where the scavengers collect trash to earn a living. In the tour, they make sandwiches and provide water in bottles for the scavenger.

Tuesday, September 24, 2019

Impact of Class Size on Students' Achievement Thesis

Impact of Class Size on Students' Achievement - Thesis Example Since education is the understanding, wisdom and the information that any individual elucidate and illuminate in order to become proficient in a particular area of interest. However, there are abundant of students especially in the underdeveloped countries who do not even get the opportunity to get the elementary or primary education due to their poor financial statuses. Whereas, the developed nations are providing the students with quality education that helps them in making them live a better and standard life with the power of knowledge (Saracho, 2002). In view of the fact that education and learning is a critical and vital process that determines the future of any individual and how the person will shape his entire life with the knowledge that he will get. Therefore, education is one principal factor that cannot come under ignorance. Nevertheless, like any other field, the domain of education also has numerous problems that the students may encounter in their academic lives. Howe ver, the problems may come across with the teachers as well either with the administration department or in coping up with students (Saracho, 2002). By means of the rising population in the modern world in conjunction with the significance of education, the design, plan, and initiative for the development and enhancement of academic programs have escalated the proportion of students for each class. There are several reasons due to which elementary schools tend to have larger number of students per class without considering the fact that this is making a huge impact on the students’ accomplishments and achievements in their academic careers (Jepsen &Â  Rivkin, 2002). The relationship of students’ achievements caused by the class size has come under numerous researches and exploration since couple of decades; the aftermaths and findings have elevated this matter of subject into many discussions and arguments. In addition, the arguments provide the evidence for the fact that how the suggestions can contribute and influence to the improvements of the students’ performances. Moreover, the suggestions also propose the idea that how all students can get individual attention that can lead to a positive impact on to their achievements (Jepsen &Â  Rivkin, 2002). One of the leading obstacles that are under debates and arguments in the current times that catch the attention of one’s mind is the size of the class that the students study in, as it is one of the imperative subjects that give rise to the problems in the field of education. It has come under surveillance that the class size has a direct impact where it persuades on the learning and accomplishments of the students. In addition, the class size plays a great deal of value and prominence in the essence of learning and education that a student acquires and gains (Franciosi, 2004). Another query arises with the class size concern is that whether the students tend to perform better, gain additional and supplementary knowledge and have high level of achievements and success? This question is in comparison to the students who study in class where there are more students and

Monday, September 23, 2019

The impact of Apple company stocks on the economy Essay

The impact of Apple company stocks on the economy - Essay Example Paradoxically, the institutional investors of Apple had a stock value of $427 billion whereas those of Microsoft had the stock value of only $172 billion. Apple saw the peak value of its shares worth $702.10 on 19 September 2012, but its fall as of 16 November 2012 has been quite as remarkable, when the value of its shares dropped to $505.75. A senior research analyst, Brian Colello said, â€Å"It's just amazing because it's such a large company. The company lost about $35 billion in market cap in one day. That's the size of some large-cap stocks† (Colello cited in O’Brien, 2012). The senior index analyst, Howard Silverblatt, said, â€Å"The impact on shareholders and on the economy is incredible. We've not seen anything like this in the modern trading era. Ever† (Silverblatt cited in O’Brien, 2012). People tend to understand the behavior of Apple’s stock by considering the bits of bad news, the questions and controversies about Apple’s compe tition and its market share, that in reality, have little to do with the Apple shares. According to Steven Milunovich, a UBS analyst, the rate of manufacture of Apple iPhones would decline in the first quarter of the year 2013 (NBC News, 2012). Milunovich expects Apple to produce 2 million fewer iPads and 5 million fewer iPhones till September 2013, though he expects Apple to be able to sell up to 41 million iPhones in the first quarter of the year 2013, followed by 36 million in the second quarter and 33 million in the third quarter of 2013. In addition to that, Milunovich also expects sale of about 21.7 million iPads, 24.5 million iPads, and 20.7 million iPads in the first, second, and third quarter of the year 2013 respectively. Nevertheless, â€Å"The extraordinary volatility is the result of Apple's strength. People try to blame the volatility on Apple's weaknesses† (Schwarz cited in O’Brien, 2012). Since the establishment of Apple Inc. as a company, there have be en mixed effects on the economy. Apple has conventionally had tremendous effect on the economy. This is evident from the fact that the sales of iPhone added anywhere from 0.25 to 0.5 percentage point to the growth rate of the US economy (Rushe, 2012). While on one hand, consumers have contributed a lot to the economy by buying the supplies and the different electronic gadgets that Apple has made available to them, on the other hand, companies competing with Apple have faced a decrease in the values of their shares and so have their shareholders and investors since Apple has outdone them in the sale of products. Since Apple has contributed immensely to the economy in the recent years, the economy has started to increasingly depend and rely on Apple. Accordingly, with the downfall of the value of Apple’s shares, the economy goes down as well. However, the downfall of the value of Apple’s stock is not expected to sustain for too long and is expected to rise again as soon as Apple introduces another innovative product into the market. â€Å"Whether it is an iTV, wearable computers, or another new product category, we have faith that innovation is not dead† (Milonovich cited in NBC News, 2012). Concluding, despite the apparent decline in the value of its shares in the recent weeks, Apple still remains the most valuable company among all in the world. However, the investors are becoming increasingly cautious regarding the future of the company and its ability to introduce

Sunday, September 22, 2019

Second paper Essay Example | Topics and Well Written Essays - 500 words

Second paper - Essay Example He introduces the concept of economic or environmental determinism, in which he cites external forces as the cause of poverty of some groups.1 Bauer dispels the common opinion that the underdeveloped world is poor because of Western policies and imperialism. Removal of colonialism does not necessarily trigger economic development. Colonial status does not necessarily hamper material progress of developing countries in Africa or Asia. Robert Kaplan’s article â€Å"In Defense of Empire† explores a tempered American imperialism. Imperialism has both positive and negative aspects, depending on its application in a country or empire. Kaplan explains that previous empires provided greater peace and stability as compared to contemporary America. Imperialism is a form of self-government that occupies a middle ground between disorder and full state control.2 Although the quest for riches drives imperialism, it results in other beneficial factors such as cosmopolitanism, which spur growth. The conclusion that imperialism only results in evil is an apathetic notion based on some minor cases of its negative effects. Mike Davis’ â€Å"Late Victorian Holocausts† is a book that relates political economy and global climate patterns, specifically, the relationship of colonialism, capitalism, and global famine. He highlights the negative effects of imperialism when he argues that economic and political systems, which characterize imperialism, have caused the death of millions. Davis’ book details how the economic philosophy of the colonial governments exacerbated rural poverty and food shortage while economic guidelines intensified famine. This imperialistic behavior is the reason for most third world countries.3 Davis would dispute Bauer and Kaplan’s argument because he focuses on the negative effects of imperialism. Bauer and Kaplan

Saturday, September 21, 2019

Divine Justice In King Lear Essay Example for Free

Divine Justice In King Lear Essay King Lear inspires many philosophical questions; chief among them is the existence of divine justice. This concept was particularly important during the Elizabethan era, because religion played such a significant role in everyday life. Religious leaders directed people to expect that they would have to answer to a higher authority, expressing some hope that good would triumph and be rewarded over evil. But throughout King Lear, good does not triumph without honorable characters suffering terrible loss. In fact, at the plays conclusion, many of the good characters lie dead on the stageLear, Gloucester, and Cordelia. In addition, the audience hears that Kent will soon die, and the Fool has earlier disappeared, presumably to die. Of course, the evil characters are also dead, but their punishment is to be expected according to the laws of divine justice. But how then does the audience account for the punishment and, finally, the death of the good characters in King Lear? Lear makes several poor choices, most importantly in misjudging the sincerity of his daughters words; but when he flees out into the open heath during a storm, his madness seems a painful and excessive punishment to witness. Parallel to Lears punishment is that which Gloucester suffers. The plucking of Gloucesters eyes can be perceived as another instance in which divine justice is lacking. Gloucester has made several errors in judgment, as has Lear; but the brutal nature of Gloucesters blindingthe plucking out of his eyes and the crushing of them under Cornwalls bootsis surely in excess of any errors he might have made. Both Lear and Gloucester endure terrible physical and mental suffering as punishment for their misjudgment, but before dying, both men are reunited with the child each earlier rejected. This resolution of the child-parent conflict, which earlier tore apart both families, may be seen as an element of divine justice, although it offers little gratification for the audience. Throughout King Lear, the audience has witnessed Edmunds growing success as a reward for his evil machinations. But when Edgar and Edmund meet in Act V, the duel between these two brothers is very different from the traditional match for sport. Christian tradition recalls several biblical battles  between good and evil, as divine justice is an important component of trial by combat. The duel between Edgar and Edmund is really a conflict that replays this ongoing battle between good and evil, with Edgars defeat of Edmund obviously signaling the triumph of righteousness over corruption. Edgars victory, as well as his succession of Lear, as king of Britain, points to an intervention of divine justice. And yet, when Lear enters with Cordelias body, any immediate ideas about divine justice vanish. The deaths of Cornwall, Edmund, Regan, and Goneril have lulled the audience into a belief that the gods would restore order to this chaotic world. But Cordelias death creates new questions about the role of divine justice; a just god could not account for the death of this faithful and loving daughter. In spite of the seemingly senseless death of this young woman, Shakespeare never intended for his audience to escape the painful questions that Cordelias death creates. Instead, the audience is expected to struggle with the question of why such tragedies occur. The deaths of Gloucester and Lear are acceptable. Both have made serious errors in judgment, and although both came to recognize their complicity in the destruction that they caused, the natural resolution of this change was an acceptance of their future, whatever it held. But Cordelia is young and blameless. She is completely good and pure. At the plays conclusion, the stage is littered with bodies, some deserving of death and some the innocent victims of evil. Cornwall has been destroyed by his own honest servant; Edmund is killed by the brother he sought to usurp; both Goneril and Regan are dead, one murdered and the other a suicide; the obedient steward, Oswald, is dead, a victim of his own compulsion to obey. In the end, no easy answer surfaces to the question of divine justice, except that perhaps man must live as if divine justice exists, even if its only a product of rich and wishful imaginations.

Friday, September 20, 2019

Security system for DNS using cryptography

Security system for DNS using cryptography 1. Introduction Scope Of The Project The domain name system has become a serious equipped part of the Internet communications, though it doesn’t contain secured mechanism to guarantee data integration or verification. Extensions to DNS provides services to security awares resolves are applications through the Cryptographic digital signatures which are included as resource records and also provides storage of valid public keys in the DNS which support general public key distribution services and also DNS security. The stored keys make security aware resolvers to know authenticating key of zone and these keys can be used to maintain other protocols and extensions gives for the authenticating DNS protocol transactions also. DNS provides security using the concepts of Digital signature and Asymmetric key cryptography. In this asymmetric key is send as a substitute of private key. DNS security uses message digest algorithm to compact message and PRNG (pseudo random number generator) algorithm in order to generate this public and private key. Signature which is formed by combining message with the private key using DSA Algorithm is send along with public key To form a signature receiver makes use of the public key and DSA Algorithm. If the received message signature is matched then that message is decrypted and will be read or else it will be discarded. Problem Statement Authenticity is based on entity identification where the entity is genuine. In many network applications entity can be identified by name or addresses. In high level applications names are used for authentication as the address lists are difficult to create, to understand and also for maintaining Assume if an entity wants to take off other entity identification, then it is enough to change mapping between low level address and its high level name which means that attacker can forge someone’s name by changing the address associated from his name to those name he wants to takeoff. If this happens an authenticator cannot differentiate between the correct and false entity. 2. Overview Of The DNS In order to connect a system which supports IP then the initiating host should know the IP address before only which is a 32-bit number and it represents the system location in a network and this address is divided into four octets which are separated by a dot character(â€Å".†) and each octet is represented by a decimal number. Though it is easier to remember this four decimal numbers than thirty two 1’s and 0’s,a limit as to how many IP addresses can be remembered by a person without any directory support. Directory basically assigns hosts names to IP addresses . The Stanford Research Institute’s Network Information Center (SRI-NIC) became the responsible authority for maintaining unique host names for the Internet. The SRI-NIC maintained a single file, called hosts.txt, and sites would continuously update SRI-NIC with their host name to IP address mappings to add to, delete from, or change in the file. As the Internet grew rapidly, managing the files become difficult and also the hostnames required to be unique allover the worldwide internet. As the internet size increases the guarantee the uniqueness of host name became impossible. The need for hierarchical naming structure and distributed management of host names lead for the creation of a new networking protocol that was flexible enough for use on a global scale [ALIU]. Internet distributed database is created and this maps the computer system’s names with their respective numerical IP network address. This Internet lookup facility is the DNS. Delegation of authority is important to the distributed database. No single organization is responsible for host name to IP address mappings for longer, but somewhat those sites that are responsible for maintaining host names for their organization(s) can gain that control again. Fundamentals Of DNS The DNS not only supports host name to network address resolution, known as forward resolution, but also network address to host name resolution, known as inverse resolution. This ability of mapping human memorable system names into computer network numerical addresses, its dispersed nature, and its strength, the DNS has become a vital component of the Internet. Without DNS, the only way to reach other computers on the Internet is to use the numerical network address. Connecting a distant computer system using IP addresses is not much user-friendly illustration of a system’s location on the Internet and thus the DNS is heavily relied upon to get back an IP address by referencing just a computer systems Fully Qualified Domain Name (FQDN). A FQDN is mainly a DNS host name which represents where to decide this host name within the DNS hierarchy. Related Works The Domain Name Space The DNS is a hierarchical tree structure. Its root node is known as the root domain. A label in a DNS name directly corresponds with a node in the DNS tree structure. A label is an alphanumeric string that exclusively identifies that node from its brothers. Dot notation (â€Å".†) is used to connect labels together and labels are written from left to right. A DNS name that contains several labels represents its path along the tree to the root. Only one zero length labels are accepted and reserved for the root of the tree. This is referred to as the root zone. As the length of the root label is zero, all FQDNs end in a dot [RFC 1034]. As a tree is traversed in an rising manner (i.e., from the leaf nodes to the root), the nodes become increasingly less specific (i.e., the leftmost label is most specific and the right most label is least specific). Typically in an FQDN, the host name is the left most label , while the next label to the right is the local domain to which the host belongs. The local domain can be a sub domain of another domain. The name of the parent domain is then the next label to the right of the sub domain (i.e., local domain) name label, and so on, till the root of the tree is reached   When the DNS is used to record an IP address back into a host name (i.e., inverse resolution), makes use of the same scheme of labels from left to right (i.e., most specific to least specific) when writing the IP address. This is in contrast to the typical demonstration of an IP address whose dotted decimal notation from left to right is least specific to most specific. For this, IP addresses in the DNS are usually represented in reverse order. IP addresses comes under a special DNS top level domain (TLD), known as the in-addr.arpa domain. By doing this, using IP addresses to find DNS host names are handled just like DNS host name lookups to find IP addresses. DNS Components The DNS has three major components, the database, the server, and the client [RFC 1034]. The database is a distributed database and comprises of the Domain Name Space, which is basically the DNS tree, and the Resource Records (RRs) that define the domain names within the Domain Name Space. The server is generally referred to as a name server that is usually responsible for organizing some portion of the Domain Name Space and also for supporting clients in finding information within the DNS tree. Name servers are authoritative for the domains in which they are responsible. They serve as a delegation point to identify other name servers that have authority over sub domains within a given domain. The zone information is the RR data found on the name server that makes up a domain Thus, name servers have zones of authority. A single zone can either be a forward zone (i.e., zone information that pertains to a given domain) or an inverse zone (i.e., zone information that maps IP addresses into DNS host names). DNS allows more than one name server per zone, but only one name server can be the primary server for the zone. Changes to the data for a zone takes place in Primary servers. Copies of the primary server’s database are maintained in all other name servers for a zone. These servers are called as secondary servers. . A DNS RR has 6 fields: NAME, TYPE, CLASS, TTL, RD Length, and RDATA. The NAME field holds the DNS name, to which the RR belongs. The TYPE field is the TYPE of RR. This field is necessary as it is common for a DNS name to have more than one type of RR. The more common types of RR are found in The CLASS in this case is IN and it stands for Internet. Other classes also exist but are omitted for brevity. The TTL is the time, in seconds, that a name server can cache a RR. A zero time to live means that a server is not to cache the RR. RD Length is the length of the RDATA field in octets. The RDATA field is the resource data field which is defined for each TYPE of RR uniquely, but in common it can be considered as the value into which the entity specified in the NAME field maps. The NAME field can be thought of as the subject of a query, although this is not always the case, in RDATA field the answer is the contained data (even though the entire RR is returned in a DNS response) [RFC 1035]. RRs are grouped into resources records sets (RRSets). RRSets contain 0 or more RRs [RFC 2136] that have the same DNS name, class, and type, but (i.e., RDATA) different data. If the name, type, class and data are the same, for two or more records then there exists a duplicate record for the same DNS name. Name servers should suppress duplicate records [RFC 2181]. The Figure 3 shows an example of an RRSet. The client component of the DNS typically contains software routines, known as functions that are responsible for requesting information from the Domain Name Space on behalf of an application. These functions are bundled collectively into a software library, commonly referred as the resolver library. For this reason, clients are often called resolvers and resolver documentation functions are dependable for sending a query to a name server requesting information concerning a DNS name and returning the answer to the query back to the requestor. DNS Transactions DNS transactions occur continuously across the Internet. DNS zone transfers and DNS queries/responses are the two most common transactions. A DNS zone transfer occurs when the secondary server updates its copy of a zone for which it is authoritative. The secondary server makes use of information it has on the zone, namely the serial number, and checks to see if the primary server has a more recent version. If it does, the secondary server retrieves a new copy of the zone. A DNS query is answered by a DNS response. Resolvers use a finite list of name servers, usually not more than three, to find out where to send queries. If the first name server in the list is available to answer the query, than the others in the list are never consulted. If it is unavailable, each name server in the list is consulted until a name server that can return an answer to the query found. The name server that receives a query from a client can act on behalf of the client to resolve the query. Then the name server can inquiry other name servers one at a time, with each server consulted being most likely closer to the answer. The name server that has the answer sends a response back to the original name server, which then can store the response and send the answer back to the client. Once an answer is cached, a DNS server can use the cached information when responding to consequent queries for the same DNS information. Caching makes the DNS more capable, especially when under heavy load. This efficiency gain has its tradeoffs; the most important is in security. Proposed System Taking the above existing system into concern the best solution is using Pseudo Random Number Generator for generating Key Pair in a quick and more secured manner. We use MD5 (or) SHA-1 for producing Message Digest and Compressing the message. Signature is created using Private Key and Message Digest that is transmitted along with the Public Key. The transfer of the packets from each System to System is shown using Graphical User Interface (GUI). Each time the System get the message, it verifies the IPAddress of the sender and if match is not found then discards it. For verification, the Destination System generates Signature using Public Key and DSA Algorithm and verifies it with received one. If it matches it Decrypts else it discards. The Following functions avoid the pitfalls of the existing system. Fast and efficient work Ease of access to system Manual effort is reduced 3. DNSSEC In 1994, the IETF formed a working group to provide the security issues in the DNS protocol are surrounding the DNS. And these extensions are referred commonly to as DNSSEC extensions. These security enhancements to the protocol are designed to be interoperable with non-security aware implementations of DNS. The IETF achieved this by using the RR construct in the DNS that was knowingly designed to be extensible. The WG defined a new set of RRs to hold the security information that provides strong security to DNS zones wishing to implement DNSSEC. These new RR types are used in combination with existing types of Resource Records. This allows answers to queries for DNS security information belonging to a zone that is protected by DNSSEC to be supported through non-security aware DNS servers. In order to gain widespread approval, the IETF DNSSEC WG acknowledged that DNSSEC must provide backwards compatibly and must have the capability to co-exist with non-secure DNS implementations. This allows for sites to move around to DNSSEC when ready and allows less difficulty when upgrading. This also means that client side software that are not DNSSEC aware can still correctly process RRSets received from a DNSSEC server [CHAR]. In March of 1997, the Internet Architecture Board (IAB) met in order to discuss the development of Internet security architecture. Existing security mechanisms and those that are under development, but have not yet become values, that can play a part in the security architecture were identified in this meeting.. They even found the areas where adequate security cannot be achieved using existing security tools. Core security necessities for the Internet security structural design was recognized in this meeting. DNSSEC is one of the security protocols recognized as core and the protection that it provides false cache information against injection information is important to the core security requirements of the Internet [RFC 2316]. DNSSEC Objectives: A basic principle of the DNS is that it is a public service. It requires accurate and steady responses to queries, but the data considered as public data. As such, it is existed in integrity and for validation, but not for access control and privacy. Thus, the objectives of DNSSEC are to provide authentication and integrity to the DNS. Authentication and integrity of information held within DNS zones is generated through the use of public key technology and provided through the use of cryptographic signatures. Security aware servers, resolvers, and applications can then take advantage of this technology to guarantee that the information obtained from a security aware DNS server is true and has not been changed. Although the DNSSEC WG chose not to provide confidentiality to DNS connections, they did not remove the ability to provide support for confidentiality. Other applications outside of the DNS may choose to use the public keys contained within the DNS to provide confidentiality. Thus the DNS, in real meaning, can become a worldwide public key distribution mechanism. Issues such as cryptographic export are not, and may never be, solved worldwide; however, the DNS provides mechanisms to have multiple keys, each from a different cryptographic algorithm for a given DNS name, as a means to help improve this problem. Performance Considerations: Performance issues are a concern for the security extensions to the DNS protocol and several aspects in the design of DNSSEC are besieged to avoid the overhead linked with processing the extensions. For example, formulating another query that asks for the signature belonging to the RRSet just retrieved is not necessarily the most efficient way to regain a signature for the RRSet. This additional query is avoided whenever possible by allowing information retrieved from secured zones to be accompanied by the signature(s) and key(s) that authenticate the information. DNSSEC Scope: The scope of the security extensions to the DNS can be summarized into three services: key distribution, data origin authentication, and transaction and request authentication. Key Distribution: The key distribution service allows for the recovery of the public key of a DNS name to confirm the authenticity of the DNS zone data, and it also provides a means through which any key linked with a DNS name can be used for purposes other than DNS. The public key distribution service supports several different types of keys and key algorithms. Data Origin Authentication: Data origin authentication is the heart of the design of DNSSEC. It mitigates such threats as cache poisoning and zone data compromise on a Domain Name System server. The Resource Record Sets within a zone are cryptographically signed and thereby giving a high level of assurance to resolvers and servers that the data just received can be trusted. Digital signature technology which contains the encrypted hash of the RRSet that is a data in the RRSet, it is the cryptographic checksum is used by DNSSEC to sign DNS RRSet. The hash is signed (i.e., digitally encrypted) using a private key belonging to the designer of the information, known as the signer or the signing authority. The digital signature is checked by the receiver of the RRSet against the data received in the RRSet. This is done by first decrypting the digital signature using the public key of the signer to get the original hash of the data. Then using the same cryptographic checksum algorithm, the recipient computes its own hash on the RRset data and the results of the hash found in the digital signature are compared with the hash just computed. If the values of the two hash matches, then the data has consistency and the origin of the data is true [CHAR]. DNS Transaction And Request Authentication: DNS requests and DNS message headers can be verified using DNS transaction and request confirmation. This guarantees that the answer is in response to the original query and that the response came from the server for which the query was intended. Thus the assurance for both can be done in one step. Part of the information, signature produced from the concatenation of the query and response is returned in a response to a query from a security aware server. This allows a security aware resolver to perform any necessary verification concerning the transaction can be performed by the security aware resolver Another use of transaction and request verification is for DNS Dynamic Updates. Without DNSSEC, DNS Dynamic Update does not provide a mechanism that prohibits any system with access to a DNS reliable server from updating zone information. In order to provide security for such modifications, Secure DNS Dynamic Update incorporates DNSSEC to give strong verification for systems allowed to dynamically manipulate DNS zone information on the primary server [RFC 2137]. DNSSEC Resource Records: The IETF created several new DNS RRs to maintain the security capabilities provided by DNSSEC extensions. The RRs related to the DNS are the KEY RR, SIG RR, and the NXT RR. DNSSEC utilizes the KEY RR for storing cryptographic public keys, one public key per KEY RR. It is the KEY RR that is used for proof of a DNS RRSet’s signature. SIG RR contains the signature for a RRSet that is used to prove the authenticity and integrity of the information in the RRSet. The NXT RR is the nonexistent RR and is used to cryptographically assert the nonexistence of a RRSet. CERT RR is another RR that does not bring any additional security functions to the DNS, but is provided so that public key certificates can be kept within the DNS for use in applications outside of the DNS [RFC 2538]. In much the same way an application wishing to communicate with a distant IP host generates a query to resolve the host name, a security application wishing to make encryption with another entity, generates a CERT query to getback the entity’s public key certificate. For further explanation on KEY, SIG, and NXT RRs and their RDATA fields and flags not contained herein, please reference RFC 2535 and related documents. KEY RR KEYRR contains the key for a DNS name. Any type of query for a DNS name, found in a secured zone, results in a response that contains the answer to the query. The KEY RR linked with the DNS name can accompany this response. The KEYRR is used to validate the data by the resolver that generated the query without sending another query for the Key RR and there by reducing the queries required for a DNS name in a secured zone. KEY RR is used by DNSSEC for storing cryptographic public keys; though, it is not a public key certificate. Instead, the CERT RR stores public key certificates. The key found in the RDATA section of the KEY RR belongs to the DNS name that is listed first in the KEY RR .The owner name can represent a zone, a host, a user, et al. The Key RR contains information regarding the security characteristics of the key and it’s allowed usage for the given owner name. security information such as the public key, algorithm type, protocol type, and flags that specify such things whether the DNS name has a public key or not are provided by Key RR. The actual format of the public key found in the RDATA section of the KEY RR is determined by the public key algorithm. Many key algorithms are supported and are defined in RFC 2535 as RSA/MD5, Diffie-Hellman, and Digital Signature Algorithm (DSA), and the elliptic curve algorithm. Only DSA support is compulsory. The protocol octet is another field that indicates for which protocol the public key is valid. TLS, email, DNSSEC, and IPsec are some of the previously assigned protocols. As both the public key algorithm field and the protocol octet is an 8-bit field, theoretically up to 255 different algorithms and 255 different protocols can be used in combination with the pub lic key. Out of the sixteen bits used for setting various flags two bits are known as the type bits. All four combinations of the type bits show the usage of KEY RR. They are confidentiality, authentication, confidentiality and authentication, or none. The last one indicates a key does not exist for the DNS name. In this way, one can cryptographically states that the given owner name does not have a key though it is in a secure zone. Other two bits are used to identify three kinds of entities for which this key belongs, such as user, zone, or something that is not a zone. Indicating a host with these flags is actually done by using the flags to indicate that the Information of the DNS zone which is on the primary server. Thus a host is implied rather than specified by the flags. SIG RR: SIG RR is another resource record type. It contains a signature and also provides verification for an RRSet and the signature’s validity time. In a secure zone, an RRSet has one or more SIG RR associated with it and this scenario of having more than one SIG RR for a given RRSet arises if more than one cryptographic algorithm is used for signing the RRSet. Some sites may choose to do this for issues such as cryptographic export restrictions. RDATA section of a SIG RR has a number of fields. In the signature field the signature is belonged to a specific RR. A type covered field is used to indicate the RRtype of the RRSet (NS, MX, PTR, etc.). The signer’s field contains the signer’s name which a resolver or server should know for verifying the signature. The SIG RR has an algorithm field and it is identical to that KEY RR. Since signatures have termination times, as do individual RRs, the SIG RR has numerous time fields. The SIG RRs used for request authentication and transactions and for these are specially the target of a query, security attentive servers try to include in the response the SIG RRs needed to authenticate the Resource Record Set. Hence, a server will receive an answer to an RRSet and it is belonging to a secure zone that does not have the SIG RR. This situation can normally happen when a size limitation is exceeded due to the SIG RR or when a response comes from a non-security aware server. Under these circumstances, the security aware server is essential for another query especially requesting any missing SIG RRs required concluding the confirmation process. NXT RR: DNS provide the ability to cache negative responses. In the RRSet negative response does not exist for a query. DNSSEC provides signatures for these nonexistent RRSets, so these nonexistence RRSets in a zone can be authenticated. By using the NXT RR that is used to identify a variety of DNS names that are not available or for an existing DNS name a wide range of RR types that are unavailable. For nonexistent DNS names two possibilities are exist. First one is that the DNS names don’t contain any RRs; it simply may not exist. The other one is that the RR type in the query does not exist, but the DNS name will be exists. And in this all the records are arranged in alphabetical order to handles the proof of non existence of a DNS name. This method is used for canonical order and is defined in RFC 2535. Then when a query is received for a nonexistent name, after the name in the query is sent back a NXT RR containing the DNS name of the next DNS RRSet occurring canonically or alphabetically†. With the DNS name a NXT record is sent back and the RR types that the name does in fact has to handle a proof of nonexistence of a RR type for an accessible DNS name . When SIGRRs are generated for a zone the entire NXTRRs for a zone should be generated. Within the DNS Security conscious DNS servers are the source of all security-related information. Three main functions of any primary DNS server are managing the caching of DNS information and managing authoritative zone information and respond to client queries. A primary DNS server has more responsibilities to each of these functions because of security conscious. In a zone’s master database file security aware server includes the addition of SIG, KEY, and NXT RRs for an Authoritative zone information management system. The RRSets is generated for the SIG RRs and these are belonging to a zone. For generating the SIG belongs to the zone we are using a private key and itself as these private keys of servers are mostly found in on-line, it is feasible that these keys could be compromised. In contrast, the zone’s private key is reserved off-line for the majority purposes, so its compromise is less likely and the power of the data is further certain and is retrieved occasi onally to re-sign all the records found within the zone. Once the new SIG RRs are generated they are included with the rest of the information in the zone’s master file and whenever SIGRRs are generated these NXT RRs should also be generated on the server and is located into a zone’s master file. At the server side on-line signing also occurred. For DNS queries the transactions and request authentication, the server preparing the reply and that reply must use its private key and that private key is for signing. Moderately the zone key since it is reserved off-line. In the other case in which a zone key is not used for signing is for transaction. For dynamic updates the request authentication is used. The private key of the host creating the request and that request must be used. In very rare cases as DNS queries and active update requests can occur, the signer’s private keys must be maintained on-line. The protection of these on-line private keys is of extreme significance; though these are protected ahead of the scope of the paper. RFC 2541 discusses the operational considerations of SIG RR and KEY. A security aware server must properly control the caching of all security related RRs for doing a caching. The maintaining of a four cache states starts with the extra duty in caching of a security aware server starts. One state, which has a succeeding state in a non-security aware server, is Bad. When a bad reply is received the information contained in that is some way corrupt, and a non-security aware server throws away the reply message without caching it (and typically logs the event) in a non-security aware server. In much the same way, a security aware server can throw away a bad response, but in this case, a bad response means that the SIG RR verifications are failed on the data. Even still the RRSet in the response may look valid, and with the related signature fault of the data checks is a severe condition. In the RRSet Authenticated, Pending and Insecure are the other three states. There is no available data to use to ensure the accurateness of the RRSet in Insecure state. It does not mean the data is bad, just that it cannot be authenticated. This usually occurs from non-secured zones for RRSets. The RRSet cached has been fully definite through the use of the SIG RRs and KEY RRs is called Authentication. The cached data is still in the course of being checked is called pending. When to expire a cached RRSet another server task is caching. Once an RRSet is cached, a count down to zero from the original TTL is started and it is maintained for the cached record. The RRSet is separated from the cache once zero is reached. The cache has changed a slight for security aware servers. When a cached RRSet is expired the TTL could not be the only time to find out the cache. Two new times are now used in addition to the TTL and these finally decide when to expire the RRSet from the cache. The new times are used to find when the signature’s validity time period for the authenticated RRSet expires, rather than just when the RRSet should be expired. These original times are kept in the SIG RR and are known as the signature begins time and the signature end time. For security aware clients and server this information is distant more essential on which to base expiration since it is cryptographically declared. Since the signature end time seems have a link to the TTL , the TTL field cannot be removed due to the backward compatibility issues. For expiring valid RRSets TTL aging is still integrated. If the TTL expires earlier to the signature end time, and the RRSet is decomposed when the TTL strikes zero, the TTL is decremented as normal. If the signature expiration time occurs previous to when the TTL expire, the TTL is familiar to the signature end time and then the normal countdown of the TTL is continued. Both security aware and security unaware resolvers involve answering queries, when a client is responses to a query. In a secured zone the non security aware resolver produces a query and sends it to a security aware server for gaining the information. With either valid or timid data the security aware servers can respond. The checking disabled (CD) flag is set when a security aware server sends the pending data. The security aware server knows not to send Pending data since a resolver not participating in DNSSEC in no way sets the CD flag in a DNS query. The security unaware resolver processes the reply message as common, since sending insecure data is same as DNS without DNSSEC. The security unaware resolver ignores the additional security information till it receives the valid data and it gives the response as normal.

Thursday, September 19, 2019

George Berkley :: essays research papers

â€Å"George Berkeley: Esse Est Percipi?† George Berkeley was an ordained Catholic priest who lived during the 17th century (Price, 206). He wrote some of the most profound works of this time period, which at best, is characterized by the Rationalist and British Empiricist movements. Berkeley was a member of the Empiricists. As a whole, the British Empiricists believed that knowledge is derived from the senses and â€Å"sense experience†(Price, 193). Therefore, they believed that no innate knowledge exists, only knowledge gained after the fact, or a posteriori (Price, 193). Berkeley, for the most part, focused on his ideas of reality and God. However interesting it may be, George Berkeley and his philosophy fail to establish concrete evidence to support his belief of immaterialism, drawing instead upon basic assumptions of God and his existence. im a tool bag. Immaterialism, as aforementioned, was the basis of all of Berkeley’s arguments. Immaterialists deny the actual existence of material objects (Dancy, 94). According to Berkeley, human knowledge is composed of ideas, that of which are formed by things: â€Å"imprints on the senses, the passions and operations of the mind, and composites of memory and imagination†(Berkeley). Basically broken down, this means that what man knows about objects and the material are what he perceives of it. The senses leave impressions which lead to ideas, the mind can come up with ideas of its own (perhaps what Berkeley means by the â€Å"passions and operations† is that the mind can come up with concepts by using reason), and composites, or rough sketches, of previous perceptions can lead to new ideas. â€Å"Thus, for example, a certain colour, taste, smell of a figure, and consistence of having been observed to go together, are accounted one distant thing, signified by the word apple†(Berkeley). Berkeley is saying that if it was not for the senses one could not perceive, and the object would cease to be. Therefore, the very existence of an idea depends upon if it can be perceived by something. An idea or object cannot exist outside of a mind. â€Å"The things that exist truly are those which can do the actual perceiving. Berkeley calls this the mind, soul, spirit, or self† (Dancy, 101). To show this is true, let us go back to the example of the apple. Berkeley points out the fact that it is impossible to think of an object without thinking of your perceptions of it (Price, 207).

Wednesday, September 18, 2019

The Communicable Disease: Pertussis Essay -- Health, Diseases, Whoopin

The Communicable Disease: Pertussis Pertussis is a highly infectious disease. It is also known as whooping cough. For more than a decade, pertussis has become a significant public health problem. CDC reports that since the 1980s, there has been an increase in the number of reported cases of pertussis in the United States (2011a). Worldwide, there are 30-50 million cases of pertussis and about 300,000 deaths per year (CDC, 2011a). Public Health Nurses play an important role in limiting the transmission during outbreaks by educating and ensuring appropriate treatments to the communities. Epidemiologic Triad Model Agent. The main biological pathogen that causes the Pertussis is Bordetella Pertussis. The agent is an aerobic gram-negative bacterium. Bordetella Pertussis attaches to and damages ciliated respiratory epithelium (Guinto-Ocampo, McNeil & Aronoff, 2010). The mechanism prevents cilia from capturing debris and interferes with the respiratory tract from clearing secretions. In addition to the adherence, Bordetella Pertussis releases toxin to stimulate the production of thick mucus which can obstruct the airway. Consequently, the body responds by coughing in order to clear the airway which releases the microorganism into the air. Host. Bordetella Pertussis affects only humans. No animal or insect source or vector is known to exist (CDC, 2011a). The mode of transmission is the respiratory route. The bacteria live in mouth, nose, and throat. An infected person spreads the disease to another person via airborne droplets of respiratory secretions. â€Å"Pertussis is especially contagious during the first week of illness but is easily transmitted during the period starting 7 days following exposure and for up to 3 we... ...evelop the symptoms suggesting the paroxysmal stage, the interventions are antibiotic and supportive treatments. San Diego Health Department can develop a standardized protocol for management of patients exposed to pertussis to all hospital settings (Haiduven, Hench, Simpkins & Stevens, 1998). According to the study, Barriers to Public Health Management, the results showed that there is often miscommunication among healthcare professionals since there was no clear and dependable ways to reach every health care worker (Wheeler, Tran, North, Beavers-May, Schutze & et. al., 2004). San Diego Health Department should send out a team of health department staff to be resources and collaborate with hospital staffs to ensure provision of adequate care. It is important to establish a clear communication between public health teams and local hospitals in the community.

Tuesday, September 17, 2019

The Island Of Dr. Moreau :: essays research papers

The Island of Dr. Moreau The Island of Dr. Moreau is a story that questions the ability of men playing God. The balance of nature is put to the ultimate test as a man by the name of Charles Edward Prendick stumbles across an out-of-control experiment that fuses man with animal. At first glance, this tropical paradise seems idyllic. But deep in the jungles lies a terrifying secret. Moreau and Montgomery have been preforming scientific research on human beings and the experiment goes terribly wrong. They have ignored the most fundamental law of the jungle: survival of the fittest. The first illustration is a drawing of Doctor Moreau explaining his status on the island to Prendick. Prendick has been finding out things that he shouldn't have been knowing, and he demands answers. He gets his answers from Dr. Moreau but he hears things that are unimaginable. Moreau explains how he mutates humans into beast-like animals. For the rest of Prendick's stay on the island he maintains an uneasy feeling and he wishes he never arrived on this island. The Next sketch illustrates the beasts new thirst for blood, which is a major turning point for the story. Roaming free, these beast-people are highly intelligent with murderous instincts. Their thirst for blood is pacified through a combination of sedatives and shock discipline. But events triggered by Prendick's unexpected arrival are about to break Moreau's God- like domination over these resentful creatures. The last drawing in my visual essay symbolizes a catastrophe. This was a point in the novel were all hell broke loose. Prendick found himself in the middle of a violent eruption between the doctor and his "family." Moreau, Montgomery, and most of the beasts lost their lives. Prendick himself was even forced to kill. It ended up that he was the last one left on the island except for a few beasts. Prendick later escaped the clutches of his captors and flees the island leaving behind terror, but taking a new life with him.

Family Essay

The Conservative party wishes to try and tackle Homophobia, especially inside sport. The Conservatives also want to make businesses and work places much more LGBT (Lesbian Gay Bisexual Transgender) friendly. The Conservatives are currently debating to try and make same sex marriages legal. Businesses: The Conservatives are trying to help out smaller businesses, and have already doubled small business rates. Which means 330,000 small businesses will not have to pay any business rates until April 2013. The Conservatives have introduced a National Insurance holidays to businesses outside the South East and London. Big Society: Conservatives are currently trying to encourage volunteering, which is a scheme to bring together young people from different back grounds. The Conservatives have started training Community Organisers to identify local leaders and bring people ogether so that these people can act on what is most important to their community. A nuclear family is a universal term to describe a two generation combination/ grouping usually consisting of a father, mother and one or more children (usually two children). They would live in the same household all together to make up the ‘nuclear family. A nuclear family is a universal term to describe a two generation combination/grouping usually consisting of a father, mother and one or more children (usually two children). They would live in the same household all together to ake up the ‘nuclear family. A nuclear family is a universal term to describe a two generation combination/grouping usually consisting of a father, mother and one or more children (usually two children). They would live in the same household all together to make up the ‘nuclear family. A nuclear family is a universal term to describe a two generation combination/grouping usually consisting of a father, mother and one or more children (usually two children). They would live in the same household all together to make up the ‘nuclear family. A nuclear family is a universal term to describe a two generation combination/grouping usually consisting of a father, mother and one or more children (usually two children). They would live in the same household all together to make up the ‘nuclear family. A nuclear family is a universal term to describe a two generation combination/grouping usually consisting of a father, mother and one or more children (usually two children). They would live in the same household all together to make up the ‘nuclear family. v v A

Monday, September 16, 2019

Mcdonald Competitive Advantage

McDonald’s core competency is providing convenience when people need and want to eat fast food at prices that are competitive and provide best value for the customer's money. One of McDonald’s competitive advantages is its focus on consistency of  quality, production of food and use of raw materials all around the world. The world recognition associated with the brand McDonald’s itself is also one of McDonald's competitive advantages. We strive to be cost leaders and offer our food at prices that cannot be matched by our competitors.In order to do this, your store must be efficient and keep everyday operations costs as low as possible. Doing so, will allow for our stores to be superior to other fast food restaurants because we can serve our food at lower prices than any other fast food company. Another important competitive advantage we have here at McDonald’s is the speedy delivery of our food. In order to maintain this advantage over other fast food ch ains, you must make the processes of cooking food simple for all your employees.It must be easy to learn and easy to execute with a low failure rate to ensure the quick production and delivery of your food. These two competitive advantages comply directly with the vision of the company which is as follows: â€Å"McDonald's vision is to be the world's best quick service restaurant experience. Being the best means providing outstanding quality, service, cleanliness, and value, so that we make every customer in every restaurant smile. † Just like any other firm, McDonald’s competitive advantages are what makes it stand out when compared to other companies.These aspects of McDonald’s are what helped it become the number one fast food distributor in the world. McDonald's competitive advantage is based on brand recognition. McDonald's brand is well known in all markets, nationally and internationally. A new report by business intelligence firm shows how top corporatio ns such as McDonalds's, Coca-cola use their brands to strategically position themselves to gain and retain new customers, even in the most competitive markets. Brand recognition holds tremendous influence on consumer buying habits

Sunday, September 15, 2019

Christian Perspective on Physician-Assisted Suicide Essay

Throughout our lifetimes, we are faced with questions that sometimes seem impossible to answer. Everyone is guided by something (or someone) when It comes to making choices both big and small. When it comes to issues of a moral nature, â€Å"three-quarters of all Americans claim their religious beliefs are the primary Influence on how they find guidance In their lives. † (O’Mathuna and Amundsen, 1998) What is the Christian perspective on physician-assisted suicide (PAS)? While the topic certainly inspires debate, conclusions can be reached using examples from the Bible, cripture verses regarding life and death, and denominational statements. There are seven recorded accounts of people in the Bible choosing to end their own lives. (Because the Bible does not speak specifically of PAS, insights will be drawn using examples of suicide. According to the Bible, killing Is killing; no matter who commits the act for what reason. ) Abimilech, Samson, Ahithophel, King Zimri, King Saul, Saul’s armor bearer, and Judas Iscariot. While there is no specific command in the Bible condemning the choice to end one’s own life, the depictions of the aforementioned characters are not those of a positive nature. Abimelech seizes power in his lifetime by conspiracy and murder of 70 of his own half-brothers. He is not chosen or appointed by God. After being mortally wounded by having a woman drop a stone on his head, he asks that his armor bearer run him through with his sword so that no one can say he was killed by a woman. The passage states that his death repaid the wickedness he had done to his father by murdering his brothers (Judges 9:50-57, New International Version). Samson is gifted by God with amazing strength. However, he ignores God’s commandments and lives a life tainted with trickery and sexual Immorality. He dies after being held prisoner by his enemies when he tears down a temple to which he has been tied. It collapses killing Samson and everyone else inside Oudges 17:29-30, NIV). Saul becomes the first king of Israel after being warned by God that Israel’s desire for a human king Is a rejection of the kingship of God. Saul; eventually becomes alienated from God, his family, and his people. His jealousy leads him to attempt murder on more than one occasion. Saul becomes wounded during battle and has no one to turn to for help and refuses to seek Cod. He asks his armor earer to help him die, and after he refuses (and then immediately takes his own life), Saul chooses to fall on his own sword (1 Samuel 31:1-6, NIV). Oftentimes in the New Testament, self-destructive behavior (suicide) Is associated with demon possession. Though the suicide of Judas Iscariot in the New Testament is recorded without comment, Judas was called a traitor, a devil, a thief, and a son of perdition. Judas betrayed Jesus. claiming he never knew him. The weight of his guilt lead him to hang himself. â€Å"A similar analysis of all the other suicide accounts reveals a consistent pattern. Nowhere is suicide praised or commended. In fact, the lack of explicit comment on the suicides could Just as easily be viewed as a negative evaluation. † (O’Mathuna and Amundsen, 1998) There is one last mention of suicide in the New Testament, yet its conclusion is full of hope and life. Two characters, Paul night, Paul and Silas were praying and singing to God in the midst of their suffering. A violent earthquake shook the foundation of the prison, opened all the cell doors, and loosened all of the chains of the prisoners. The Jailer was awakened and for fear of being killed once prisoners escaped, he drew his sword to kill himself. But Paul shouted and insisted that he not harm himself because no one had escaped. Paul and Silas then spoke with the Jailer about God’s love and salvation. The Jailer was filled with Joy because he had come to believe in God (Acts 16:24-34, NIV). Christians believe that the Bible is the spoken word of God through his people. They believe that the Journey of Jesus Christ from birth to death on a cross demonstrates how they are called to live even in the midst of pain and suffering.

Saturday, September 14, 2019

Harlequin Enterprises: the Mira Decisions Essay

The primary issue facing Harlequin is the â€Å"steady loss of share in a growing women’s fiction market†, due to the growing popularity of single-title novels. With the volume sales dependence that is inherent in series publishing, the unit sales stalling that occurred in the late 80’s and early 90’s acted as a warning signal to Harlequin. A change in pricing strategies enabled revenues to continue to rise, but this was a short-term solution and Mira has the potential to become a long-term solution. However, there are a number of issues surrounding the launch of Mira. As the world’s largest publisher of romance fiction, Harlequin has a strong global foothold in series publishing with a presence in more than 100 international markets and 23 languages. Indeed, Harlequin has been able to create high barriers to entry in the series market through the development of brand loyalty and excellence in product quality and supply chain management. Brand loyalty comprises a strong readership base, which has been cultivated through brand recognition, trust, and long-term relationships. This is evidenced by the direct-to-reader Book Club, which currently provides 3/8 of US Sales at significantly higher margins than indirect sales. The low-price, consistent, high-quality product is well packaged and positioned ideally to take advantage of customer expectations, supported by a large and capable author/editor base. Standardization has enabled Harlequin to take advantage of significant economies of scale in printing, distribution and advertising; and simplifies retailers’ positioning and marketing strategies. While standing order distribution enables Harlequin to more accurately predict sales and returns, and therefore benefit from predictable cost-based accounting practices to achieve better margins. However, with limited diversification, Harlequin has little expertise in the broader realm of women’s fiction outside of the romance genre, which may limit their abilities to select and develop successful authors and titles, as was the case with the 1987 Worldwide Library failure. Although, the Worldwide experience gives Harlequin a true appreciation of their strengths and provides a strong foundation from which to avoid future mistakes. Harlequin’s inferior presence in traditional retail environments for single-title novels and limited advertising portfolio centred on print media somewhat restricts their sales to their existing, or stereotypical, customer base. Existing distribution partnerships are unlikely to resolve this issue and may force Harlequin to seek out new partnerships and/or mechanisms. According to the market research, â€Å"customers were reading as many single-title romance and women’s fiction books as series romances. This implies that there is significant overlap with other subject areas and market segments within Harlequin’s existing readership base and it should be possible for Harlequin to cultivate their customer loyalty and translate it to direct-to-reader sales in other genres. Mira also provides the opportunity for authors to develop beyond the series format without moving to another publisher, and still remain available to the Harlequin series genre. This promotes emp loyee loyalty and job satisfaction, while allowing Harlequin to invest in promoting individual authors and benefit from the cross-segment marketing. The overheads that Mira would incur, although substantial, would remain competitive with other publishers and would benefit from Harlequin’s global infrastructure. Foreign language markets, in particular, would be accessible to Mira through the use of existing translation services, distribution networks and retail relationships. Mira would also provide Harlequin the opportunity to create economies of scale through the centralization of rights acquisition activities already being undertaken in some international subsidiaries. Conversely, Mira represents an extremely high risk undertaking for Harlequin with significantly higher costs for production, distribution and marketing. A single-title novel is a unique product, which requires a publisher to generate higher per-unit sales volumes; create individual design, marketing and promotion campaigns; and provide higher returns to authors and third parties. Production changes, at least in terms of product dimensions, could have significant unforeseen impacts on the economies of scale currently enjoyed within the production and distribution supply chains. If Mira is to compete with existing single-title publishers, long-term author contracts, royalties and advances could put extreme financial pressure on Harlequin and represent a significant level of investment, which may or may not be realizable in the long-term. Therefore, the failure of a single-title novel to achieve break-even sales targets has far-reaching consequences; and can seriously damage reputations upon which future sales would depend. Nevertheless, the most significant threat to the success of Mira is its potential in the US market. The truce with Simon & Schuster achieved at the end of the Romance Wars may not be sustainable, if Harlequin launches Mira in direct competition with S&S in single-title publishing. This situation would be especially difficult given that Harlequin is entirely dependent on S&S for distribution of its series titles within the US market, and its lack of experience with mainstream retailing avenues. By pursuing Mira, Harlequin risks losing a highly efficient and profitable relationship with S&S and having to completely redevelop its distribution chain within the US. Upon consideration, Harlequin has the resources and capabilities it needs in order to succeed with Mira. Although the company currently has a different business model, it has the same basic components and critical resources necessary to create and manufacture the product. The author/editor base that Harlequin has at its disposal represents a considerable asset, and somewhat mitigates the risk of talent selection and development that can be associated with single-title novels. Historic market positioning and the reputation of Harlequin as a romance eries publisher may overshadow attempts to create the Mira brand; but Harlequin has reached the point where it must expand beyond the romance genre. The direct-to-reader sales, marketing and distribution mechanisms would require few adjustments or adaptations, and would provide Harlequin with an ideal test market from which to make the leap into the mainstream. Existing production and distribution expertise would sustain development of Mira , while Harlequin spends time putting mainstream distribution mechanisms and publicity expertise into place. It is conceivable that successful single-title authors who published their early works with Harlequin could be convinced to return to Harlequin, depending on the financial incentives; but, this is a long-term question, governed by authors’ contractual obligations and the success of Mira in the short-term. However, the back-list of novels created by successful authors who published their early works with Harlequin comprises an easily marketable, cost-effective and potentially profitable resource, that would enable Mira to capitalize on established reputations and in-direct publicity. The downside is that Mira may risk alienating or offending fans of established authors, by publishing works that did not meet reader expectations because of their quality or adherence to Harlequin conventions. Therefore, I would recommend that Harlequin perform a limited launch of Mira by re-developing titles in their back-list and generating direct-to-reader sales through the Book Club, while it explores global distribution and marketing relationships. References: Richard Ivey School of Business Case Harlequin Enterprises: The MIRA Decision #9B03M007

Friday, September 13, 2019

Increasing taxes of alcohol Essay Example | Topics and Well Written Essays - 1250 words

Increasing taxes of alcohol - Essay Example According to the health minister, when in the year 2000 the previous government initiated a tax decrease on these products, it led to a drastic increase in the consumption of these products. Official data suggests that the consumption increased form 14 percent to around 60 percent with young girls. Moreover, an even more alarming situation for the government is that the consumption of ready to alcohol drinks is increasing within teenagers and data suggests that girls are even more responsive towards this trend in comparison with boys. The government hopes to reverse this trend with this price increase since the segment is price sensitive plus the government also promises to spend the tax revenue in preventive health schemes. The above-mentioned case in many ways relates to different concepts of economics. The first one can be the very basic relation of price and demand. Economics at its initial level teaches that price charged for any product and quantity demanded of that product enjoy a negative or inverse relationship. If price charged for a product increases than the quantity demand decreases and vice versa1. This case shows a similar kind of a situation. According to the health minister when in year 2000, the previous government decreased the taxes, it led to the decrease in the price charged for it to consumers and this decrease in price led to a drastic increase in the quantity demanded for ready to drink alcohol drinks. Official data suggests that it rose from 14 percent to 60 percent within the segment of young girls. The price demand relationship explains the idea and phenomenon behind this happening. Another important concept of economics applied here is the price elasticity of demand. Sensitivity of quantity demanded to the changes in the price charged is the price elasticity of demand. In order words, it can also be said that it refers to the responsiveness of demand in relation to the changes in price.

Thursday, September 12, 2019

Radical Feminism most effective for the third wave of feminism Essay

Radical Feminism most effective for the third wave of feminism - Essay Example Passive methods of action will only do so much as structural and societal constraints will prevail. Unless there is a more radical outreach, women will remain the â€Å"underdog† in society, especially because the focus is more on conceptual ideologies such as the abolishment of gender role expectations. These issues, much like in the second wave of feminism, will only become marginalized by other social outcries such as welfare that are apparent and seem to need greater attention. Radical Feminism has proven to be the more effective choice of action since it promotes a greater, positive dialogue and initiates a course of action in support of feminist ideals. Therefore, radical feminism may arguably be considered more appropriate for the third wave of feminism. The following paper will define the term radical in relation to feminism and identify boundaries due to its significant spectrum. Furthermore, to support the above-mentioned claims, cases in which radical feminist movem ents in the past have been more effective from relatively passive movements in the incidence of the Women’s Suffrage, will be identified. Like much of feminism, radical feminism too is highly misunderstood. The textbook definition of the term is as follows, â€Å"Radical feminism is a "current" within feminism that focuses on the theory of patriarchy as a system of power that organizes society into a complex of relationships based on an assumption of "male supremacy" used to oppress women†. Additionally, â€Å"Radical feminists tend to be more militant in their approach (radical as "getting to the root") than other feminists are† (Lewis, 2014). The first part defines the term in a broad ideological sense whereas the second shares the thought response. In the technical sense this is fair considering being a militant refers to a broad group of people such as activists, revolutionaries, terrorists or even insurgents, and feminists can be both revolutionaries and activists.

Wednesday, September 11, 2019

The Coast Guard Academy and what you will get as a Cadet Personal Statement

The Coast Guard Academy and what you will get as a Cadet - Personal Statement Example The researcher will begin with the statement that his particular interest is within the Coast Guard Academy. The author has rightly presented that he believes that life is short and one should do what one wants to in entirety. This is the reason why the author tilt is towards becoming a Cadet which shall, in essence, take care of his future professional domains. His four years as a Cadet would teach the author discipline in the sternest manner possible. It will inculcate in him a sense of understanding how life shapes up and what needs to be done in order to bring sanity to his life. The basic understanding underlining the case study is that the researcher’s goals are to achieve what he has always dreamt of within his professional life. The researcher states that this has meant that he shall take care of the important factors within his stay at the Coast Guard Academy which will pave the way for my success in the times to come. The paper tells that other goals that the researc her has established for him include his adherence towards keeping him motivated, especially under difficult circumstances and extraordinary situations. The efforts that the author has put in all this while bank on his educational qualification and his reliance on making his way through the different pathways to achieve his goals. The researcher will conclude with an example of time management which he is good at.

Tuesday, September 10, 2019

History of forensic and science Essay Example | Topics and Well Written Essays - 1250 words

History of forensic and science - Essay Example Later on, Locard came up with his Exchange Principle which claimed ‘any action of an individual, and obviously, the violent action constituting a crime, cannot occur without leaving a trace’ (Locard, La police 8.). In fact, Locard also made significant contributions in improving dactylography, the science that deals with fingerprints. In this connection, he started the science of poroscopy, or the study of fingerprint pores and the impressions produced by the pores. One of his important studies was that if there are at least 12 specific points identical between two fingerprints, that is a positive identification. Thus, for the first time, this enabled police forces to use fingerprints to identify criminals. In the year 1929, Locard jointly with various other criminalists started the International Academy of Criminalistics in Switzerland. However, this initiative could not withstand the turbulence of the Second World War. In fact Dr. Locard is called the Father of Ridgeoscopy because advancing from the observation by Sir Francis Galton that there are variations in individual friction ridge path, he managed to define those friction ridge events successfully. This enabled the area to evolve into Ridgeology , enabling police forces to do effective fingerprint verification. According to Locard, as published in the year 1914, if more than 12 concurring points are visible and if the print is sharp, the positive identification of fingerprints is indisputable. However, if 8 out of the 12 concurring points are visible, it should be considered as a borderline case, and in such cases, the identity will have to depend on other factors like the sharpness of fingerprints, the rarity of the fingerprint type, the presence of the center of the figure and the triangle in the exploitable part of the print, the effective use of poroscopy, and the degree of clarity visible in the width of the papillary ridges and valleys followed by the line directions, and

Monday, September 9, 2019

Management and leadership style Essay Example | Topics and Well Written Essays - 2500 words

Management and leadership style - Essay Example Some of the key differentials that exist between management and leadership also translate to the means by which both of these forms of direction are accomplished. To begin with, one should consider the management style as something of an administrative expertise that focuses on maintenance, systems structures, a focus on the bottom line, imitation, and accomplishing tasks in the specified way. Conversely, good leadership styles tend to focus upon innovation, originality, development, a focus on the shareholders, inspiration and development of trust, and keeping an eye on the future. As a function of such a definition, the reader can and should understand the management style as more of a nuts and bolts approach that tends to be somewhat formulaic and rigid whereas leadership engenders the unique ability to mold and integrate with changes as a means of seeking the best path. It is further important to understand that such a level of approach does not specify one or the other must be e ngaged upon. As such, it is possible and desirable for an individual to accomplish both of these styles of oversight in order to be an effective vehicle for change within a given institution. Although not all individuals can fulfill the requirements of each of these categories, the individual that does is able to see from both perspectives and seek to direct the firm/group/ or entity in the most appropriate way (Paul & Berry, 2013). With regards to ethics, the leadership and management styles play an integral role in determining the priorities of the given individual. One could even argue that ethics violations only spring from management styles if and when the management style is engrained within the company’s culture. This is due to the fact that management styles are almost always formulaic and required attributes that the individual most ascribe to in order to meet the standards of the organization or group he/she is representing to the employees. Conversely, leadership s tyles fall prey much more easily to ethical violations due to the fact that these are almost always more innately tied to the ability of the individual to incorporate what they heave learned from past experience, as well as their own personality into the change mechanism they are attempting to integrate with. In order to create an ethical environment, it is incumbent upon the culture and oversight mechanisms of the firm to seek to instill a strong level of ethics into the management styles that they engender with the leadership (Dong et al., 2012). In such a way, ethical decision making and a culture of morality can be attempted to be grown from the very base levels of the way in which decisions are made within the organizations culture. As a means of integrating this with the leadership and the styles by which they ultimately manage, the organization will maximize the potential of this having a carry-over effect and impacting upon the means by which even personal attributes impact upon management and leadership within such a culture. Good management can be considered as the ability to meet deadlines, evoke utility, and ensure that one’s team meets or exceeds output standards. This process in and of itself is important; however, it has a distinctly impersonal side to it. Ultimately, the metrics of management are somewhat distinct from what the metrics of

Sunday, September 8, 2019

Marketing Campaign for a Successful Product Launch Essay - 3

Marketing Campaign for a Successful Product Launch - Essay Example outhern Africa market will seek to inform the senior management team of the multinational company on how each of the selected promotional tool is appropriate in accomplishing the marketing objectives as well as the overall business objectives. Secondly, the manager in-charge of the South African market will demonstrate in this report how the recommended promotional tools will be implemented in order to make the marketing campaign successful. In most occasions when a business enterprise seeks to venture into a new market or it is about to release a new brand of product or service into the market, it usually engages in aggressive marketing campaigns. The marketing campaigns are mainly intended to create greater hype in the market, which will make the target audience eager to try or experience the newly released product and/ or service. In addition, the marketing campaign should be able to sustain the long-term growth of the business in the market or increased sales of the new product and/ or service. This therefore means that the marketing campaign should be devised properly in the first place to guarantee success of the entire process; this is according to Hollensen (2010). In this present report, Nokia’s manager for the Southern Africa market seeks to convince the company senior management team that the promotional tools he has picked are the most appropriate and effective in ensuring that both Nokia Lumia 920 and 820 record success in the South African market. For the purpose of carrying out a successful marketing campaign in South Africa, the manager in charge of the Southern Africa market picked four promotional tools that comprise of advertising, sales promotion, direct marketing, and public relations. Hollensen (2010) in her studies described advertising, as any form of marketing communication that is used to reinforce what the target audience already knows about the product or service, and to convince, or encourage the target audience to purchase the

Saturday, September 7, 2019

Human resources management final exam Essay Example | Topics and Well Written Essays - 1000 words

Human resources management final exam - Essay Example In addition, leadership should provide the required information and resources for realising that vision, and balance and coordinate conflicting interests among members and stakeholders (leadership, 2010). Leaders, whilst shouldering responsibility for the entire group, should also motivate their following and ensure that they realise their objectives. They should also ensure continuity and momentum, permit change if warranted, and should be sufficiently ahead of the group (ME96 Leadership, n.d.). A transactional leader ensures compliance, by providing incentives, threat of punishment, and appeal to the altruistic leanings of the group members or their sense of rationalism. On the other hand transformational leaders have to improve themselves, asses the leadership situation, and circumstances in which their followers reach beyond the extant requirements. Such leaders have to fully employ their followers, thereby fulfilling their higher necessities (Martin, 2006, p. 46). These leaders are strongly governed by their mission and enjoy a dedicated following. Leadership is distinguished by being unidirectional, static and intrapersonal. What commences as a process of mutual influence amongst individuals culminates with the passage of time, mutual interaction and an array of contextual elements engenders a leadership identity that is fixed and lasting (De Rue and Ashford, 2010, p. 628). Managerial skill emerges from external sources, standards of an organisation and procedures. The policies of an organisation could constitute the justification for managerial decisions. Leadership emerges from awareness or the leader’s ability to process information (Blank, 2001, p. 19). Leaders decide on the basis of what they consider to be significant and what demands attention. Leaders are not born, and there is no hereditary plan or inborn arrangement that creates a leader. History is replete with individuals who were termed leaders, as they were able to attract supporters (Blank, 2001, p. 8). The process of making others willing followers requires certain skills. Leadership is a skill that can be bettered through practice. It can be improved by personal experience and the organised study of the relationships between people (Are leaders born or made? 2011). Leadership may be obtained and developed through intentional practice. Although leadership has considerable influence, there are other factors that affect organisational effectiveness. Some of these are investments, strategic planning, marketing and product development, secondary capacities, motivation and input (Larsson and Vinberg, 2010, p. 318). Good leaders necessarily possess risk forbearance, and the capacity to control others and increase the value of their surroundings. They should also have sufficient courage to express themselves, and the capacity to accept rejection of their initiatives (McCrimmon, 2011). Question 2 Change Change in variegated forms is an inescapable truth of life. Indiv idual concentrate on change and the adaptations required to deal with its effects. On occasion, individuals themselves effect change (How We Change, Stages of Change, n.d.). Change is the universal bedrock, which is especially true of enterprises that are actuated by market pressures. Such business entities have to incorporate in their objectives, better quality, productivity and flexibility; uninterrupted innovation and the capacity to change, in order to provide an adequate response to market demands. Effective