Saturday, December 28, 2019

Classical and Operant Conditiioning - 1123 Words

General Psy Monday 6:30-9:30pm Wrighting Assignment 1 Have you walked into the pet store and went to buy pet treats? Which one stands out the most? Most would see the yellow bag of Beggin Strip. Beggin strips has a very humorous form of classical conditioning in there commercial. It starts out with the dog lying on the bed, he hears the bag open. The smell travels up the stairs, across the street to the neighbor’s dog. The smell even traveled to Paris, France where French poodle was standing by the Eiffel Tower. Once the dog smells the treats he takes off running down the stairs where he sees the women in the†¦show more content†¦Negative punishment can be from the life that’s being taking away from the individual person or the life they took from somebody else if multiple collision. Many states in the U.S. have banned texting and talking on cell phones while driving this can be used as positive punishment if you get caught you can get a ticket or going to jail. Adding on manslaughter can be a positive punishmen t seeing how most people will change their behavior on the texting and driving. Statics rate that 1.6 million accidents occur per year. 300 hundred thousand injuries and nearly 11 teen deaths a day. So making it illegal to text and drive is a positive punishment also. It will decrease the accidents and injuries. This is a variable ratio schedule you don’t know when the deaths or injuries will occur. Or how in depth they will be when you suffer a collision. You don’t know when you are going to get caught for texting and driving but eventually you will get caught and after so many times the charge will go up. Another operant condition is the ‘click it or ticket’ commercial. Traffic laws are the most violated laws, wither it is drinking and driving, running stop signs, speeding or most common not wearing your seat belts. The media commercial started off with a grey Silverado driving in the neighborhood with the window down. A pink ticket went flying in the wi ndow and land on the man chest that was driving. His wife tried to yank it off but

Friday, December 20, 2019

Harriet Beecher Stowe s Uncle Tom s Cabin And Olaudah

Sydney Sanders Ms. Johnson American Literature 2301-60 December 1, 2015 American Slave Literature Harriet Beecher Stowe’s novel, Uncle Tom’s Cabin and Olaudah Equiano’s Narrative of his Life both endeavor to stir antislavery sentiment in predominantly white, proslavery readers. Each author uses a variety of literary tactics to persuade audiences that slavery is inhumane. Equiano uses vivid imagery and inserts personal experience to appeal to audiences, believing that a first-hand account of the varying traumas slaves encounter would affect change. Stowe relies on emotional connection between the readers and characters in her novel. By forcing her audience to have empathy for characters, thus forcing readers to confront the harsh realities of slavery, Stowe has the more effective approach to encouraging abolitionist sentiment in white readers. When looking at a full version of Olaudah Equiano’s Narrative, the reader is immediately presented with an image of Equiano holding a Bible open to Acts. Equiano later explains his religi ous beliefs in chapter 10 of the Narrative. This has often been interpreted as a plot for Equiano to gain the trust of readers, who at this point in time placed high value in religion, however Professor Eileen Elrod views this as interpretation as dismissal of Equiano’s Christianity as a result of assimilation to the Western world. Elrod notes, â€Å"if we take the facile view that he is simply using religion to manipulate readers, or we see him as simplyShow MoreRelatedSlavery in American Literature1590 Words   |  7 Pagespublic an account of slavery was Olaudah Equiano. Perhaps the most eloquent accont was written by Harriet Jacobs. Sojurner Truth and Stephen Douglas laster wrote powerful accounts. Several great pieces of American literature addressed the slave issue. Harriet Beecher Stowe The most important ante-bellum (pre-War work)was Harriet Beecher Stowes Uncle Toms Cabin (1852). Stowe was virtually unknown when she wrote the book. She was influenced by the experience s of two teenage Maryland slave girlsRead MoreIndividual Rhetorical Analysis Of The Selected Readings2297 Words   |  10 PagesIndividual rhetorical analysis of the selected readings by Olaudah Equiano, Harriet Jacobs, Frederick Douglass, and Harriet Beecher Stowe are necessary to arrive at a collective analysis of the most effective strategies. Olaudah Equiano’s â€Å"The Interesting Narrative of the Life of Olaudah Equiano or Gustavas Vassa, the African† was first published in 1789 in London, England (687). Equiano’s narrative is informative; however, it is critical of the treatment of slaves and persuasive in its appeals to

Thursday, December 12, 2019

Lost Minds A Study Of Alzheimers Disease Essay Example For Students

Lost Minds: A Study Of Alzheimers Disease Essay Lost Minds: A Study Of Alzheimers DiseaseLost Minds:A Study of Alzheimers DiseaseAlzheimers Disease is one of the most common diseases among elderly people today. Alzheimers creates emotional and financial catastrophe for many American families every year. It affects nearly 4 million people in the United States. Alzheimers Disease is the fourth leading cause of adult death in the United States, and nearly 90 billion dollars go towards Alzheimers research each year, most of this money is funded largely by Medicare and Medicaid, but the government funds some (Medical?). Many elderly people are thought to be crazy, people think the strain of their lives has been too much for their minds, when in fact the real problem may be a serious condition called Alzheimers. Alzheimers Disease is a degenerative brain disease. It is caused by a slow break down of the brain cells. Alois Alzheimer, a German physician, first discovered Alzheimers Disease in 1906. The first recorded case of Alzheimers Disease was a 55-year-old woman. She was admitted to the mental asylum where Alzheimer worked when she was 51 and slowly deteriorated over her 4 years there. After her death, Alzheimer performed an autopsy in which he found a small, shrunken brain. This was the start of Alzheimers research. Since its discovery, Alzheimers Disease hasnt evolved much. Its much more common now and the symptoms are slightly enhanced, but the disease is relatively the same. The number of people with Alzheimers Disease is expected to increase dramatically as the baby boomers age (Davis). Some scientists believe that Alzheimers Disease may be caused by a mutation of a gene on chromosome 14, this mutation is related to about 8% of all Alzheimers cases (Alzheimers). Alzheimers patients a lso have an excess of aluminum in their brain tissues, which is linked to the disease and they lack hootropic agents, the chemicals that protect the brain cells. The early stages of the disease are often viewed as the consequences of aging, so Alzheimers often goes unrecognized. There are several stages to Alzheimers Disease. In the early stages people forget recent events, but they clearly remember things that happened many years ago. In the later stages of the disease, people can no longer remember past events and often do not recognize their family members. Some victims do not even recognize themselves. Alzheimers victims often suffer from impaired judgement. They may touch a hot stove burner not remembering that it can burn them. There have been cases where people with Alzheimers Disease nearly starve because they forget to eat for days. When my Great Grandma, who had Alzheimers, was left alone, she would drive from her home in Meade to Hugoton or Satanta trying to find Liberal. The disease can also cause people to be very tired. Patients may also have trouble with place and time. They may not recognize their own home of many years, and they may confuse morning with afternoon. Some patients with Alzheimers Disease will revert back to an almost child-like state. Some of the victims are very angry and aggressive while others are very calm and quiet. How fast the disease advances varies from person to person. Eventually, most people with Alzheimers disease become unable to care for themselves. Alzheimers Disease is not the direct cause of the victims deaths. The disease renders the patients bedridden and in their weakened condition they catch viruses such as pneumonia. Alzheimers attacks few people after age 60, but occurs in 20% of people who live to age 85 (Gillick). Alzheimers does not occur more in men or woman, but the disease is more prone to Caucasian people. Out of all the cases of Alzheimers in the United States, about three-fourths or three million of them are white people. Scientists do not know why this is, because black peoples brain cells are the same as those of white people (Gillick). Some scientists say that Alzheimers Disease is genetic, and it may be. Scientists say that if the disease is genetic, then it only occurs in every 4th or 5th generation, but that the disease must be ?turned on? by some outside factor. Doctors cant seem to figure out what the outside factor is. Some scientists even believe that Alzheimers may be caused by an excess of estrogen in the brain (Gillick). .u90c4d695db55dde27a603363b2fd0b1c , .u90c4d695db55dde27a603363b2fd0b1c .postImageUrl , .u90c4d695db55dde27a603363b2fd0b1c .centered-text-area { min-height: 80px; position: relative; } .u90c4d695db55dde27a603363b2fd0b1c , .u90c4d695db55dde27a603363b2fd0b1c:hover , .u90c4d695db55dde27a603363b2fd0b1c:visited , .u90c4d695db55dde27a603363b2fd0b1c:active { border:0!important; } .u90c4d695db55dde27a603363b2fd0b1c .clearfix:after { content: ""; display: table; clear: both; } .u90c4d695db55dde27a603363b2fd0b1c { display: block; transition: background-color 250ms; webkit-transition: background-color 250ms; width: 100%; opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #95A5A6; } .u90c4d695db55dde27a603363b2fd0b1c:active , .u90c4d695db55dde27a603363b2fd0b1c:hover { opacity: 1; transition: opacity 250ms; webkit-transition: opacity 250ms; background-color: #2C3E50; } .u90c4d695db55dde27a603363b2fd0b1c .centered-text-area { width: 100%; position: relative ; } .u90c4d695db55dde27a603363b2fd0b1c .ctaText { border-bottom: 0 solid #fff; color: #2980B9; font-size: 16px; font-weight: bold; margin: 0; padding: 0; text-decoration: underline; } .u90c4d695db55dde27a603363b2fd0b1c .postTitle { color: #FFFFFF; font-size: 16px; font-weight: 600; margin: 0; padding: 0; width: 100%; } .u90c4d695db55dde27a603363b2fd0b1c .ctaButton { background-color: #7F8C8D!important; color: #2980B9; border: none; border-radius: 3px; box-shadow: none; font-size: 14px; font-weight: bold; line-height: 26px; moz-border-radius: 3px; text-align: center; text-decoration: none; text-shadow: none; width: 80px; min-height: 80px; background: url(https://artscolumbia.org/wp-content/plugins/intelly-related-posts/assets/images/simple-arrow.png)no-repeat; position: absolute; right: 0; top: 0; } .u90c4d695db55dde27a603363b2fd0b1c:hover .ctaButton { background-color: #34495E!important; } .u90c4d695db55dde27a603363b2fd0b1c .centered-text { display: table; height: 80px; padding-left : 18px; top: 0; } .u90c4d695db55dde27a603363b2fd0b1c .u90c4d695db55dde27a603363b2fd0b1c-content { display: table-cell; margin: 0; padding: 0; padding-right: 108px; position: relative; vertical-align: middle; width: 100%; } .u90c4d695db55dde27a603363b2fd0b1c:after { content: ""; display: block; clear: both; } READ: The pope the jews and Hitler EssayAlzheimers Disease is considered non-reversible. Many of the symptoms can be treated, but not the actual disease. To date, no chronic degenerative disease, Alzheimers or others, can be cured. Most therapies currently being used are experimental (Medical). The drugs Tacrine and Donepezil are the only two drugs proven effective in slowing the progress of Alzheimers Disease, and even they dont have a vast effect. Selegilin, the drug used to treat Parkinsons Disease, has been shown to delay symptoms of Alzheimers by about seven months in test cases, but doctors are not sure if it is safe for people yet (Davis). Some doctors suggest for people to take one ibuprofen a day, to help lower the risk of developing Alzheimers Disease. Daily supplements of vitamin E can help too. Thanks to medical breakthroughs and healthier lifestyles, Alzheimers patients can live longer then ever. There are no screening tests for Alzheimers Disease. In fact, brain tumors, blood clots, hypothyroidism and vitamin deficiencies have all been mistaken for Alzheimers. The reason for these mix-ups is that a head scan can not show Alzheimers Disease until well in to the disease. If the tumors or clots are small enough they might not be seen either and can produce nearly the same results (Alzheimers). Alzheimers disease is a serious and growing medical, social and economic problem. It affects millions of people in the United States and millions more around the world. When we look at elderly people and cast them off as crazy or senile we should stop and consider the root of their problems. We know more about the disease now then at any other time in history. Doctors are closer to a cure then ever, but until there is a cure for Alzheimers Disease, we are all at risk. Bibliography?Alzheimers Disease.? World Book Encyclopedia. 1998 ed. Davis, Patti. ?Long Good-Bye.? Ladies Home Journal. Nov. 1997: 170-175. Gillick, Muriel R. ?Tangled Minds.? New York: Penguin Books, 1998. ?Medical Self-Care.? Retrieved 4/13/99. http://www.healthy.net/library/articles/ahper/alzheim2.htm. Medicine Essays

Wednesday, December 4, 2019

Comparing Cultures and Traditions in Poetry Essay Example For Students

Comparing Cultures and Traditions in Poetry Essay The two poems Search for my tongue and Not my business are both written by poets from very different backgrounds and cultures, looking to get their point across. Bhatt emphasises in his poem the on-going concerns of dying traditional languages and the fact that if you learn a new language, your old language could fade away. Osundare a Nigerian poet describes the growth of tyranny and if people ignore this growth, the tyranny will grow and grow till you become directly involved with it, Osundares poem is based upon Pasto Neimallers speech about Nazis in WWI and how they forcibly removed Jews from their homes. Both the poems adopt irregular poetic structures to the more traditional way. Bhatt writes the poem Search for my tongue as if it were a speech, speaking to the reader and telling the reader about issues that he faces as a dialect. There are no separate verses, just one long verse split up by phonetic translation of Gujarati. Enjambment is also used to maker poem flow much easier, increasing feeling that he is talking to us. Osundare writes the poem like a native Nigerian song with a repetition of the chorus What business it is of mine, so long as they dont take the yam from my savouring mouth. At the end of the first three verses he denies that what is happening around is his business, but ironically the same fate that he has been saying is none of his business befalls him and it is now becomes his business at the end of the poem. At the beginning of the poem Search for my tongue she talks about loosing her mother tongue, she uses negative verbs like rot, die and split. At the end of the poem when she is talking about her mothers tongue returning she uses positive verbs like grows, opens and blossoms, which give the effect that she is happy about remembering her mothers tongue. Bhatt cleverly uses phonetics to help the reader understand what it is like to learn a new language such as Gujarti. This is an unusual device in a poem and makes the poem more interesting for the reader. In the poem Not my business a similar technique is used whit the poet using negative words to describe treatment of his friends suffered by the militants. He uses beat, booted and sacked to describe the treatment and repeats word no three times in one sentence; this makes the reader realise that he does feel for these people, however he still does not feel it his business. The main imagery in Search for my tongue is of a person with two tongues in their mouth, one their mother tongue, in this case Gujarati, and one a second language. Towards the end of the poem she has come to the conclusion the mother tongue will not die, but rather like a plant growing shoots, it will come alive again, that is a good example of a metaphor. In the poem Not my business, the imagery is mainly in describing the jeep, which is used to take people away, and is being used like a coffin. The last line waiting, waiting in its usual silence. There is also some personification in the poem, where the waiting jeep has a belly. The poets hand is described as hungry and there is a bewildered lawn. To conclude it is clear poetry is no more a means of expressing traditional ideas but has now evolved, where people of different cultures can now express aspects of their cultures that make us think deeper about communities and the world on a whole. Therefore it is fair to say through poetry the breaking down of cultures and traditions is possible. Lastly from the comparing of two cultural poems we could say that all cultures are fundamentally built up on same ideas.

Thursday, November 28, 2019

The Failure Of Integration Essay Research Paper free essay sample

The Failure Of Integration Essay, Research Paper The Failure of Integration Integration is to stop the segregation of and convey into equal rank in society as defined by the Merriam-Webster Dictionary. Personally I believe this end has neer and likely neer will be to the full reached. In the United States there is segregation everyplace. It is non every bit public as it was in history but it still exists in people s heads. If the definition of integrating is true so why are such racist groups such as the Ku Klux Klan still around? They are historically knows for degrading and mortifying the Afro-american race throughout history. How come there are still race offenses happening today? And how come favoritism is so common in the U.S? Frequently being a black male I get discriminated against. I remember one incident when I was walking place from hoops pattern one dark with my best friend Keiji who happens to besides be black. We will write a custom essay sample on The Failure Of Integration Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page All of a sudden about three constabulary patrol cars pull up and throw us on the auto, and get down to frolic us down. They said we matched the description of people they are seeking for who robbed a convenience shop. The bull put us both in the back place of the sail R with handlocks on and were inquiring us all sorts of inquiries. After about 20 proceedingss another constabulary patrol car pulls up with two white males in the dorsum who were well different looking than us. The bulls opened the patrol car, un-handcuffed us and told us to acquire the snake pit out of here. I remember another incident here at URI outside of a fraternity. Myself and a twosome of my friends who are besides black tried to travel to a techno party at one. We saw they were allowing people in so we walked up to the door. The cat said they are full right now come back subsequently. We said all right no large trade so we turn and walk off. We stand about merely speaking and we see the same cat allow a group of approximately ten or eleven Caucasians in. Then the following group right after them was approximately seven or eight Caucasians right in to the party. Personally I believe that the lone manner racism will of all time stop and the end of integrating will be achieved is through apprehension and instruction of the job Peoples must recognize that God created all worlds from one twosome non many twosomes of different races. And that the full human race is hence one big extended household. If/When this of all time happens this universe will be a much better topographic point.

Sunday, November 24, 2019

What Did You Do This Summer College Interview Question

What Did You Do This Summer College Interview Question When answering a college interview question about your summer activities, no one is expecting you to be busy every day of the year. Summer is indeed a time to recoup after a busy academic year. Students who treat summer like an 80-hour-a-week job are setting themselves up for burn-out. That said, your interviewer will want to see that you did something productive in the summer. Youll want to show that you seek out meaningful and enriching experiences. A question about your summer activities has similarities to a question about  what do you do in your free time.  Summer, however, is a lot more substantial than a few free hours on the weekend, so your interviewer is going to be looking for something meaningful that youve accomplished during those months off from school. Strong Answers to a Question About  Your Summer Activities Your answer to the question, of course, is going to depend entirely on what you did in the summer, but work to identify a few meaningful activities from your summer break before you set foot in the interview room. Some activities that  will  sound good to your interviewer include: Travel.  Did you go somewhere interesting? A national park, historic site, cultural center, or some other destination that expanded your world view or opened your eyes to new experiences?Reading.  Your interviewer wont want to hear that you spent the whole summer indoors with your face buried in books, but they love to hear about reading. Students who read a lot tend to do well in college. You may even find that your interviewer asks you to recommend a good book.  Work.  Whether you helped on the family farm or cleaned dishes at the local eatery, students who work reveal a level of maturity and responsibility that will impress the admissions folks. Your summer may not be as exciting as a trip to Europe, but colleges truly do value work experience.Entrepreneurship.  This could be related to work, but youll certainly make a good impression if you started your own lawn mowing business, developed a useful app, or did something else that reveals creativity, confidence, and motiv ation.Volunteerism.  Community service and volunteer work play an increasingly important role in the college admissions process, and summer is the ideal time to do meaningful volunteer work. Education.  Did you attend a summer engineering or creative writing camp? Did you take a class at the local community college? Needless to say, colleges want to enroll students who like to learn. Weak Answers to a Question About Your Summer Colleges will want to see that youre not the type of student who lets three months go by without doing anything productive. Answers such as these are not going to impress anyone: I built a really cool world in Minecraft. Good for you, but realize that a lot of students fail out of college because they give video games priority over all else; three months staring at the computer screen represents a rather anti-social- even if multiplayer- and unproductive use of time.  I was burned out from school, so I relaxed. For three months? Also, dont highlight academic burn-out in your college interview. Sure, it happens to most students, but such an answer also sends a message that you get overwhelmed by school work. This isnt what you want to tell a college admissions representative.I hung out with my friends. Having friends is good. Colleges want to admit friendly students who build meaningful relationships with others. But what exactly did you do with your friends? Develop this reply to explain the meaningful activities you did with your friends. Ideally, you did something more productive than cruise the local shopping mall. The list could go on, but you get the idea. Answers that suggest you let the summer slip by without doing anything to enrich yourself or help others arent going to impress anyone. A Final Word About Summer Activities Your answer to the question will obviously be unique to your own interests and activities, and thats largely the point here- make sure you are telling your interviewer about summer experiences that have helped make you the person you are. Show that when you are given the time, youll do something meaningful and productive. In short, show your interviewer that youre the type of interesting, curious, hard-working, motivated person who will contribute to a campus community in positive ways.

Thursday, November 21, 2019

Gorbachev and the Age of Rebuilding Essay Example | Topics and Well Written Essays - 2250 words

Gorbachev and the Age of Rebuilding - Essay Example Did he really know what he was doing? Most of the radical reformists generally receive much doubt and unstable support simply because their theories have yet to be tested. It does not come as a surprise that many perceived Gorbachev was moving blind in his pursuit of reforms. But the author firmly believes that he had a clear and well equipped understanding on their position regarding what matters were needed to be reformed. Gorbachev literally grew up inside the sluggish Soviet system, thus he knew which components were hindering them from achieving good economic standing (Mcnair et al. 2005: p. 1). The West perceived him as a liberator and progressive leader with his foreign and domestic policies such as the Perestroika, which means restructuring or rebuilding, and the Glasnost which is literally translated as openness. These reforms were meant to remedy the economic deficiency of Russia and adapt better practices in the hope of making Russia a globally competitive economy. These p olicies, especially the Perestroika, received the spotlight since the USSR standard of living drastically collapsed together with the economy under his rule, and ultimately it also lead to the dissolution of the USSR. Perestroika is widely believed and argued to be also the main cause of the revolution of Eastern Europe in 1989 and also it contributed to the end of the Cold War (Heauel & Cohen 2009: p. 1). In the aftermath of these events, it is relevant to consider how Gorbachev has come up with such policies and aggressive reforms. Relevant also would be how he devised and schemed the plans to go, and how the plans later on faltered and backfired to Mother Russia despite all the good intentions and virtues that it bannered. The status quo before he came into power should also be put into consideration and also the consequences of the demise and how much should really be the attributed blame to his blunder. The policies of his predecessors, like Khruschchev, where the early stages of Perestroika was likened to his reforms during the 1950s and sixties (Tompson 1993: p. 73), should also be understood. This is necessary so as to learn how he then came to be with his political orientation and of what external factors are at play in influencing and engineering such policies. SHAPING A REFORMIST Before delving deeper into Gorbachev’s policies and reforms, one must first try to understand where he is coming from and how he came to be in power. His early life shaped how he came to be an aggressive reformist who later on became one of the most influential political figures in the XX century. Gorbachev was born into a mixed Russian-Ukrainian family on March 2, 1931 (Ikeda & Gorbachev 2005: p. 11). Early in his childhood, he experienced the Soviet famine of 1932-1933 which claimed the lives of his two sisters (Gorbachev 2006: p. 10). His family started off as poor landless peasants but later on rose to become middle-class farmers because of the Soviet collectiviz ation (Mcnair et al. 2005: p. 1). He recalls that â€Å"The peasant labor was very hard. It was back-breaking labor twenty hours a day, with no more than three or four hours of sleep. Yet it did not bring prosperity to the farmers. The only hope was the private plot of land where everything was cultivated to make ends meet somehow† (Gorbachev 1996: p. 36). It can be concluded that he is no stranger to the struggles of the lowest of classes for he experienced the

Wednesday, November 20, 2019

Article review Essay Example | Topics and Well Written Essays - 250 words - 3

Article review - Essay Example Students with different forms of disabilities present similar characteristics on the factors explored. According to the findings of the article, children with special needs have lesser and poorer social relations as compared to those with no special needs. The option of regular education for students with special needs is in this case beneficial. In essence, these students can interrelate with those without special needs to enhance positive social interrelations. However, it does not automatically mean a fruitful social interaction, since it always depends on how naturally social a person is, and the way they settle into their class setting. The information from the article is applicable in a class setting. From the article, I learned that it is necessary to instruct students with special needs in an inclusive classroom and provide opportunities for social interactions. They should not be secluded and taught or treated differently. There are increased social opportunities for special needs students in an inclusive class setting, but there is always a need to understand the individual characteristics of each student so that negative outcomes from introverts, such as loneliness, do not

Monday, November 18, 2019

Safety And hazards of pyrotechnics Essay Example | Topics and Well Written Essays - 1000 words

Safety And hazards of pyrotechnics - Essay Example A pyrotechnic technician should be aware of the various measures of creating a convincing explosion while ensuring that they maintain control of the process. Safety refers to the situation of acquiring protection form physical, damage, harm, accidents, errors and other events that are undesirable. It is also the control of various recognized hazards to acquire an acceptable level of risk. Safety is extremely vital in daily life and human should be cautious under all circumstances especially when dealing with pyrotechnics (Agrawal 9). A hazard refers to a situation that poses a certain level of threat to property, health, environment, or life. Majority of the risks are potential or dormant and have a characteristic of theoretical risk of harm. A hazard does not exist if it does not happen. When a hazardous situation comes to pass, people call it an incident. Pyrotechnics is a dormant hazard since they have the potential to be hazardous but do not affect the people or the environment. The key factor that leads to identification of a hazard in pyrotechnics is the energy stored that can cause damage upon release. Pyrotechnics store energy in various forms, which includes chemical, thermal, mechanical, and radioactive forms. Pyrotechnics are tremendously valuable in the entertainment industry and regularly used to mark various critical events. The producers or manufacturers of such pyrotechnics have a responsibility to ensure that the individuals who use them are not liable to adverse effects. They should achieve this through ensuring that they decrease the level of toxic materials in the pyrotechnics. They should ensure that it has minimal side effect to intended users. The employee who uses these pyrotechnics should also be protected since they work with them on a daily basis. Education concerning various measures of minimizing the chances of people being affected is particularly beneficial. Employees and

Friday, November 15, 2019

Aspects And Subcultures Of Digital Culture Media Essay

Aspects And Subcultures Of Digital Culture Media Essay Today digital trends are increasingly connected with the world of culture and arts, involving different aspects of culture, media and information technologies, and influencing new forms of communication. This course paper will review 3 fundamental aspects and particular subcultures of the digital culture. The term digital culture includes 3 main aspects digital culture in videogames, in music and in the Internet. It also includes the vast array of subcultures that have grown up in the last years around these aspects. These new trends have deeply modified all of our day to day activities. In the Digital culture: pragmatic and philosophical challenges Marcelo Dascal speaks about the changes that are transforming the nature of international communication and are modifying the way in which we carry out research, engage in study, keep our accounts, plan our travel, and so on. This article depicts the changes in todays digital culture and that is why it is the article this course paper st arts with. The relevance of the issue is explained by the pace of technological evolution which is much more rapid than the cultural one. No one controls the direction that technological development is taking, it is directing us (Dascal, 2006) This phenomenon of the digital culture influences all the spheres of our life. Today people cannot imagine their lives without digital culture. In the work Youth culture, music, and cell phone branding in China (2005), Jing Wang admits that nowadays music, Internet and video games are all connected with each other. The article examines the place of music in an emerging youth culture. As for the games culture, this course paper will refer to Live in your world, play in ours (by Sheila Murphy and What is video game culture? Cultural studies and game studies by Adrienne Shaw. Besides, the course paper also relies on the work by J.A. McArthur A geek meaning of style (2008) that considers the culture today should be understood as an open and dynamic process that is based on interactive communication. It changes every minute. This means that digital culture is a living system that always changes. That is why it is interesting to discuss the so-called geek subcultures. The present research is a brief review of the articles and an attempt to define how the digital culture and subcultures are reflected in academic studies. This paper summarizes various aspects of digital culture in two steps. It defines three key aspects of the digital culture and demonstrates three main subcultures of digital culture. Aspects of digital culture In the study of digital culture one thing can be pointed out is the sociological aspect. Digital culture is considered to be a socio-cultural phenomenon. There are three main aspects in digital culture. These are video games, music, and the Internet. Video games It is possible to say that computer and man communicate. To the question How will man and computer work together? there is an answer: à ¢Ã¢â€š ¬Ã‚ ¦through speech. (Dascal, 2006) Today there is a tendency for the newspaper articles to point out that video gamers are not necessarily who we think they are. As one article asserts, the stereotype of the gamer as a glaze, incoherent teenage boy is wrong (Shaw, A. 2010) What is video game culture? Cultural studies and game studies, p407). In the culture the gamer identity is defined by technical proficiency, geek cultural capital and maleness. While the games that they play make up a wide range of genres there is little diversity among the gamers themselves. According to the data, released by the Interactive Digital Software Association (IDSA), 62% of PC gamers are male and 60% of those gamers are under 36 years old (Murphy, 2004). Dovey and Kennedy (2006) define video games culture by the way of the major discourses used by members of th e video game development industry. Games culture isà ¢Ã¢â€š ¬Ã‚ ¦a critical site, where discourses around technology, technological innovation, and technological competence converge with dominant conceptions of gender and race (cited in Shaw, 2010, p405) 1.2. Music Music is definitely an aspect of digital culture J. Wang claims according to a BRANDchild study nearly 50% of wired urban teenagers frequently download music from the Internet.(2005, p 187) Basing on this statistic data, no doubt it is important for the youth. We can even say that it has become a new way of communication communication through music. Today people all over the world buy music from iTunes and it is a major part of digital culture that is growing form year to year. The changes happen in music sphere extremely fast and the reason for that is the computerization of the modern world. Almost everybody has a computer and an Internet access, and therefore has unlimited (free or paid) access to music. Such an access is very convenient although uncontrolled. Besides, music has become mobile with the wide spread of portable phones and other gadgets. Mobile music is said to be the panacea that cuts across cultural borders, able to attract global cool youth. (Wang, 2005, p 188) Actually, the world youth prefer music, which is well-known in many countries, therefore music becomes international, no matter what language it uses. Gadgets are developing very rapidly, new mobile means and new opportunities for listening to music arrive. Music has become a field in which tastes and preferences have become more eclectic than ever before (McArthur, 2008) Transnational marketers consider music as the fastest way into the mind and soul of todays youths (Wang, 2005) It rarely needs to be argued that music is the global language of the Now Generation. Internet Of course, it goes without saying that Internet has changed the world we used to know. Today it is one of the main parts in digital culture. Such a global phenomenon as Internet culture has appeared thanks to development of the net and has become a social event in human history. The Internet today is not only huge quantity of computers, but also the improbable quantity of the people, for which network is an essentially new way of dialogue almost not having of analogues in the material world. (Silver, 2004, p 57) The Internet gave everybody a chance of self-realization in this vast space: digital youth subcultures can not be centered round musical preference. (McArthur, 2008) The Internet may be a new resource for the affiliation and expression of sub-cultural identity. It may serve as a place for sub-cultural development. Moreover, it is a place where some subcultures (such as hackers) are born. The use of the Internet as a resource for subcultures suggests that subcultures today are able to affiliate across location and time constraints. It is no doubt effective across time and space.(McArthur, 2008) Subcultures Gamers Video games have produced a variety of subcultures. Some authors look at games as a social practice. For example, T. Taylor (2006) describes an outline gaming culture as a social practice and a shared identity created in the game space. (cited in Shaw, 2010). In the gamers culture, subcultures are marked by their look, specific linguistic jargon, and a sense of solidarity. Gamers often wear clothing that reference specific games, comics, television shows, or movies that are not widely known outside of a small following (Shaw, 2010) One of the biggest subculture of video gamers in the world is the World of Warcraft Community. As Hackeleman (2011) claims: As game developers have strived to create engaging environments and immersive stories for players to experience, independent machine producers have taken an unofficial and sometimes controversial role by expanding the game universe from a different perspective: tinkering with the game engine itself. The demand for this type of user generated content has risen as the addictive qualities of games like World of Warcraft have stimulated the creation of vast social networks and thriving online communities that provide gamers with the ability to stay connected while outside the virtual space. (2011, p 2) To understand the size of the community one can look at its Facebook group (http://www.facebook.com/warcraft) where 1,430,549 people (assessed on April 26 2011) claimed their affiliation with the game by following the games group page. According to the official website, more than 11 mln people play World of Warcraft around the world (http://www.worldofwarcraft.com) That is a size of a big city and if we bear in mind that they meet offline, buy different objects form each other and have their own language, they are a real culture, which is only one example of the video game culture. Many other communities of video gamers (such as Second Life, Sims Online, Grand Thief Auto Online) have their own subcultures which include almost 300 mln people playing online (based on estimate provided in Yahoo Answers). In different countries people have different attitudes to this. According to my observations, in Russia most of these players are thought to be computer geeks because they are different non-gamers and communicate with other gamers much easier. But when looking at the worlds most advanced video game culture South Korea à ¢Ã¢â€š ¬Ã‚ ¦ it is stressed that Koreans are very different from Americans because they treat pro-gamers as heroes, unlike U.S. sports culture that values real athletes. (Shaw, 2010) Music fans The next digital subculture which is considered is connected with the aspect of music. Studies of youth subcultures during the past 30 years have typically coincided with studies of popular music preferences. (Bennet, 1999, cited in McArthur, 2008. p. 58) There are many different music genres, which vary respectively to the style of music. For example, there are widely known rappers and rockers, but in modern world we commonly associate them more with their look and outfit, than the music genre. Those features, which show belonging to certain music style, allow to identify the typical representatives of different music subcultures. That means that there is not only music it is backed up with the different types of culture. One of the most influential musical subcultures existing nowadays is punk. From the Wangs point of view there are 2 types of punk-lovers: originals and wannabes. First group focuses generally on the punk music itself, while the other is more concerned about the fa shion code, and punk music is simply part of their lifestyle. This process went further so much that it has become common to treat punk as a sociological rather than a musical phenomenon from start. Punk is often considered as implementation of youths rebellious moods, but often their interest in punk culture symbolizes the search of band that will help them [students] say I am unique without making them look weird or socially unacceptable. According to Jing Wang, there is a so-called punk syndrome, which refers to the mentality, culture, lifestyle of punk-lovers. The typical representatives of this subculture are angry young high school kids, and the music is their way to show disobedience or the way to cope with the pressure they receive at school. In his article Jing Wang talks about several high school kids, who managed to pull through their entrance exams with the help of punk music. The anger of music, played with drums, bass guitars and songs performed in the aggressive or even shouting ways affects enormously peoples emotions. Online communities An online culture has developed as online social relationships have deepened and matured (Silver, 2004) The net is an accessible and user-friendly area in which subcultures can form, meet, and interact both in online and offline mode. Different groups of users appeared: anime geeks, hackers, flooders and etc. The Internet provides an opportunity for would-be members of cultural groups to seek out people who have similar thoughts to them. As Parker (1989) claimed computers have become a part of the genesis of a new crime from that has added computer programmers, computer operators, and electronic engineers to the traditional categories of criminals. (cited Turgeman-Goldschmidt, 2005). Hacking is a widespread international phenomenon, and hackers actions occasionally reach the media headlines. They are one of the most interesting subcultures that appeared on the Internet. According to Turgeman-Goldschmidt (2005, p 8) the hacker community is clearly male dominated and hackers are typically young adults. Moreover most hackers have no previous criminal record, are White and nonviolent, and come from middle- to upper-class backgrounds. The subculture can be divided in several communities of different type hackers. First ones hack the computer system to achieve fame jokers. Not likely to cause serious harm to the system, and express themselves making various humorous captions, viruses with different visual and sound effects (music, shaking or turning the screen, drawing all sorts of images, etc.) Next community type is professional crackers they carry out hacking a computer system to steal or substitute information stored there. They are characterized by systematic and organized action. The last ones are called vandals they carry out hacking a computer system to its destruction: delete data, create viruses or Trojan horses. But no matter what their type of hacker community is according to Taylor (1999, cited in Turgeman-Goldschmidt, 2005) there are six motivators for hackers : feelings of addiction, urge of curiosity, boredom with educational system, enjoyment of feelings of power, peer recognition and political acts. During his research Turgeman-Goldschmidt (2005) gives an explanation to each motivator in the hacker subculture. First of all, he says is the feeling for addiction to anarchy and anarchy is extremely entertaining. Secondly, their curiosity for hackers lies in the desire to learn and know as much as possible. Overall, it is stated that original hackers mostly do it not for revenue, but for the idea of free knowledge. They fight against Microsoft and help Linux in any way they find. They are trying to change the world the way the can, fighting with globalization, starting wars against the multinationals, and just by helping to find bugs in the anti-virus software. The considerable group of hackers regularly organizes hacker conventions. It operates a conference in Las Vegas which is annually visited by several thousand participants from all over the world from the U.S. to Australia. Each year the World Congress takes place in Germany is the of hackers, under the auspices Computer Chaos Club. CCC is a three-day conference on technology, society and the future of mankind. (Coleman, 2008) During these meetings hackers even manage to create their own outlook, own language, and made their own bible. For the hackers à ¢Ã¢â€š ¬Ã‚ ¦ hacking is a new form of entertainment based on the play-like quality that characterizes the use of digital technology and is a new form of social activity. Hacking can be considered a new form of entertainment that could not have existed before the development of an adequate technology. (Turgeman-Goldschmidt, 2005) Today hackers became a wide dangerous subculture. Conclusion Digital culture is a largely modern phenomenon. It should be understood primarily as part of general culture, one of the most important aspects of cultural activity in general. There are many other subcultures in the digital culture, but my research is focused primarily on three most popular ones. These three subcultures demonstrate aspects, which are more or less typical for other subcultures, associated with digital culture. As for my experience, during the research I have found out a lot of new about aspects and subcultures in general to particular differences inside different type of subcultures. In general, it was unexpected to learn that every subculture consists of those who are original and those who are posers. Every subculture does have a group of people that are a part of it only because they adore how people of this subculture look like not even understanding the main idea of it. This can be proved by a subculture I have analyzed in my course paper punks. I did not know that there are so many posers that just like the outlook, not knowing the history, nor understanding the main idea of the subculture. Besides, I have never heard of the attitude towards pro gamers in South Korea. They are thought to be almost national heroes there. The interesting fact is that every year they have a championship, in which anyone can participate. It is as popular as watching the hockey matches in Russia. Special TV channels translate news for gamers and computer geeks, youths and aged watch the championship matches together. In result the winner gets a major gift from the sponsor (which reaches $500,000) and incredible respect. The amount of money for winning the tournament motivates people to play professionally from early childhood. As a result, different kind of gamers all together are a tremendous size subculture in South Korea. In Russia digital subcultures are just getting born because our Internet and technology evolution is several steps back from the United States of America or South Korea. But I am sure that in several years we are going to have our own specific subcultures that would be interesting to analyze. Drawing to the conclusion, it is necessary to remember that this issue is extremely complicated and it worth more research. It is always interesting to analyze people, there communications, and new subcultures that reflect current situation in the country. That is the reason why I plan to keep on my research work in a slightly different way after I finish this course paper to analyze the digital subcultures in Russia and their influence on businesses for the next course paper.

Wednesday, November 13, 2019

Power of Women in The Grapes of Wrath :: Grapes Wrath essays

Power of Women in The Grapes of Wrath Women are known for as holding families together. When times get rough women are the foundation to the family and help keep things together. A woman poses different qualities that can help keep the family strong. These qualities can be categorized in the four archetypes of a woman. The idea of the woman Archetype is presented by Carl Jung. The first being Mother Nature, the very physical aspect and the second is the virgin, which represents the spiritual aspect of the archetype. The third is the young which who is the physical state while the fourth is the old witch possessing the spiritual side of the woman archetype. The four women in John Steinbecks, The Grapes of Wrath represent these four archetypes and take on responsibilities that in the end help the family succeeds in achieving their dreams. Ma Joad is a woman of strength and hope who is the backbone of the family. She represents the Mother Nature archetype while she posses the physical aspect of guiding the family and staying strong when the family needs her most. Steinbecks shows the importance of ma's character by the syntax usage to describe ma. " Ma was heavy, but not fat; thick with child-bearing and work...her ankles, and her strong, broad, bare feet moved quickly and deftly over the floor", Ma is described with these features to show her strength as a mother who has control and survives through hard situations (95). Her 'bare feet' being close to the earth shows how she takes on a 'Mother Nature' archetype to her character. She is one with the earth just as Mother Nature is. Mother Nature is one that gives birth, produces, sustains life and nurtures her family. All of these archetypes are expressed in ma's character. Even though she is a very strong woman she knows her role in the family. Ma knows when it is her time to help the family and when it is appropriate to step back and let the father run things. It is an unsaid statement but known by all in the family that "ma was powerful in the group" and they look to her for important decision making (133).

Sunday, November 10, 2019

Review on The Pursuit of Happyness Essay

The Pursuit of Happyness is a very moving film about a man and his quest for a better life. It is an inspiring case study of how many of the elements of happiness work together from relationships, to poverty, to positive mental attitude and determination. The movie is based on the true story of Chris Gardener, a struggling entrepreneur in 1980s San Francisco, with one driving ambition- to be a good father to his son. He tries to improve the family financial situation by purchasing and selling medical equipment, but the investment does not work out and the family sinks further into poverty. He sees his chance to make good after admiring a sports car on the street in the business district, where all the people seem happy. The car owner tells Chris he is a stock broker and anyone who is good with numbers and with people can be successful as a stock broker- even without a college degree. Chris uses his people skills and demonstrates the value of good relationships to get a chance at an internship where he must compete with 20 other candidates for 6 months for one paid position. His wife leaves him, he loses his apartment, bank accounts, credit cards, and has to spend time in jail, but all through it he is dedicated to keeping his son and pursuing his dream. The title, Pursuit of Happyness spelled with a y,comes from some graffiti at the daycare center and is also a reference to an essay written by a biracial man in the US shortly after the Declaration of Independence by Thomas Jefferson. The movie is beautifully acted by Will Smith and well written. It shows how people without money are often victimized and bullied by those who do have money and power. Yet Chris Gardener repeatedly demonstrates the importance of good relationships even with people who treat him badly. He shows the importance of knowing his strengths and using them, even in unconventional ways. His optimism turns into dogged determination as he demonstrates incredible persistence and creativity in his pursuit of happiness. The realism and emotional punch of the Christopher Gardner story makes this a moving and inspiring drama. Whether you are inspired to be grateful for your own circumstances or by the value of grace and determination, this movie is sure to show you something about happiness- its importance and how to get it. The Pursuit of Happyness teaches us a lot about the importance of virtues and strengths in our happy lives.

Friday, November 8, 2019

15 Century History

15 Century History The aristocracy of the medieval ages formed a symbiotic relationship with the peasants, a situation in which both parties contribute, although the peasant's contribution seems to be more strenuous. By analyzing primary sources, I intend delineate the function of the aristocracy in regards to the peasants, the attitudes and beliefs characterized by aristocrats, and the restrictions placed on them by their responsibilities to the peasants, as well as the church.Einhard's work, The Life Of Charlemagne, offers some excellent information about the restrictions placed on aristocracy. The document mentions several times Charlemagne's devoutness to the Christian faith and towards the papacy in particular.Beyond all other sacred and venerable places he loved the church of the holy Apostle Peter of Rome, and he poured into its treasury great wealth in silver and gold and precious stones. He sent innumerable gifts to the Pope; and during the whole course of his reign he strove with all his migh t (and, indeed, no object was nearer to his heart than this) to restore to the city of Rome her ancient authority, and not merely to defend the church of Saint Peter but to decorate and enrich it out of his resources above all other churches (Einhard, qtd.St. Peter's Basilica at Early Morning

Wednesday, November 6, 2019

Understanding and Developing Organizational Culture Essay Example

Understanding and Developing Organizational Culture Essay Example Understanding and Developing Organizational Culture Paper Understanding and Developing Organizational Culture Paper The IT nits may be distributed according to business donation, geographic location, or both. All or any of the IT functions may be distributed. The degree to which they are distributed will vary depending upon the philosophy and objectives to the organizations management. 4. What are the advantages and disadvantages of distributed data processing? Response: The advantages of EDP are: a. Cost reductions b. Improved cost control responsibility C. Improved user satisfaction d. Back up flexibility. The disadvantages (risks) are: a. Inefficient use Of resources b. Destruction of audit trails c. Inadequate segregation of duties . Difficulty acquiring qualified professionals e. Lack of standards 5. What types of tasks become redundant in a distributed data processing system? Response: Autonomous systems development initiatives distributed throughout the firm can result in each user area reinventing the Wheel rather than benefiting trot the work to others. For example, application programs created by one user, which could be used with little or no change by others, will be redesigned from scratch rather than shared. Likewise, data common to many users may be recreated for each, resulting in a high level of data redundancy. This situation has implications for data accuracy and consistency. 6. Explain Why certain duties that are deemed incompatible in a manual system may be combined in a CBS computer-based information system environment. Give an example. Response: The IT (CBS) environment tends to consolidate activities. A single application may authorize, process, and record all aspects Of a transaction. Thus, the focus of segregation control shifts from the operational level (transaction processing tasks that computers now perform) to higher. Level organizational relationships within the computer services function. 7. What are the three primary CBS functions that must be separated? Response: The three primary CBS functions that must be separated are as follows: a. Separate systems development from computer operations, b. Separate the database administrator from other functions , and c. Operate new systems development from maintenance. 8. What exposures do data consolidation in a CSS environment pose? Response: In a CBS environment, data consolidation exposes the data to losses from natural and man-made disasters. Consolidation creates a single point of failure. Â  The only way to back up a central computer site against disasters is to roved a second computer facility. 9. What problems may occur as a result of combining applications programming and maintenance tasks into one position? Response: One problem that may occur is inadequate documentation. Documenting is not considered as interesting a task as designing testing, and implementing a new system, thus a systems professional may move on to a new project rather than spend time documenting an almost complete project. Job security may be another reason a programmer may not fully document his or her work. Another problem that may occur is the increased potential for program raid. Fifth original programmer generates fraudulent code during development, then this programmer, through maintenance procedures, may disable the code prior to audits. Thus, the programmer can continue to cover his or her tracks. 10. Why is poor-quality systems documentation a prevalent problem? Response: Poor-quality systems documentation is a chronic IT problem and a significant challenge for many organizations seeking SOX compliance. At least two explanations are possible for this phenomenon. First, documenting systems is not as interesting as designing, testing, and implementing them. Systems repossession much prefer to move on to an exciting new project rather than document one just complete The second possible reason for poor documentation is job security. When a system is poorly documented, it is difficult to interpret, test, and debug. Therefore, the programmer who understands the system (the one who coded it) maintains bargaining power and becomes relatively indispensable. When the programmer leaves the firm, however, a new programmer inherits maintenance responsibility for the undocumented system. Depending on its complexity, the transition period may be long and costly. 11. What is RAID? Response: RAID (redundant arrays of independent disks) use parallel disks that contain redundant elements of data and applications. If one disk fails, the lost data are automatically reconstructed from the redundant components stored on the other disks. 2. What is the role off data librarian? Response: A data librarian, who is responsible for the receipt, storage, retrieval, and custody to data tiles, controls access to the data library. The librarian issues data files to computer operators in accordance with program requests and takes custody files when processing or backup procedures are completed. The trend in recent years toward real-time processing and the increased use of direct- access files has reduced or even eliminated the role of the data librarian in many organizations, 13. What is the role off corporate computer services department? How does this differ from other configurations? Response: The role Of a corporate computer services department (IT function) differs in that it is not a completely centralized model: rather, the group plays the role Of provider Of technical advice and expertise to distributed computer services. Tours, it provides much more support than would be received in a impolitely distributed model. A corporate computer services department provides a means for central testing of commercial hardware and software in an efficient manner. Further, the corporate group can provide users with services such as installation of new software and troubleshooting hardware and software problems. The corporate group can establish systems development, programming, and documentation standards, The corporate group can aid the user groups in evaluating the technical credentials of prospective systems professionals, 14, What are the five risks associated with distributed data processing? Response: The Five risks associated with distributed data processing are as a. Inefficient use of resources, destruction of audit trails, c. Inadequate segregation of duties, potential inability to hire qualified professionals, and e. Lack of standards. IS List the control features that directly contribute to the security of the computer center environment. A. Physical location controls b. Construction controls c. Access controls d. Air conditioning e. Fire suppression f. Fault tolerance 16. What is data conversion? Response: The data conversion function transcribes transaction data from paper source documents into computer input. For example, data conversion could be keying sales orders into a sales order application in modern systems or transcribing data into magnetic media (tape or disk) suitable for computer processing in legacy-type systems. 17, What may be contained in the data library? Response: The data library is a room adjacent to the computer center that provides safe storage for the off-line data files, Those files could be backups or current data files. For instance, the data library could store backups on DVDs, CD-Rooms, tapes, or other storage devices, It could also store live, current data lies on magnetic tapes and removable disk packs. In addition, the data library could store the original copies of commercial soft. are and their licenses for safekeeping. 18. What is an ORG Response: A recovery operations center (ROCK) or hot site is a fully equipped backup data center that many companies share. In addition to hardware and backup facilities, ROCK service providers Offer a range of technical services to their clients, who pay an annual fee for access rights. In the event of a major disaster, a subscriber can occupy the premises and, within a few hours, resume processing critical applications. , What is a cold site? The empty shell or cold site plan is an arrangement wherein the company buys or leases a building that will serve as a data center. In the event of a disaster, the shell is available and ready to receive whatever hardware the temporary user requires to run its essential data processing systems. 20. What is fault tolerance? Response: Fault tolerance is the ability of the system to continue operation when part of the system fails due to hardware failure, application program error, or operator error. Implementing fault tolerance control ensures that no single mint of potential system failure exists Total failure can occur only in the event of the failure of multiple components, or system-wide failure. 21. What are the often-cited benefits of IT outsourcing? Response: Often-cited benefits Of IT outsourcing include improved core business performance, improved IT performance (because of the vendors expertise), and reduced IT costs. 22. Define commodity IT asset. Response: Commodity IT assets are those assets that are not unique to a particular organization and are thus easily acquired in the marketplace. These include such things are nonvoter management, systems operations, server maintenance, and help-desk functions. 23. Define specific asset. Response: Specific assets, in contrast to commodity assets, are unique to the organization and support its strategic objectives. Because of their idiosyncratic nature, specific assets have little value outside of their current use. 24, List five risks associated with IT outsourcing. A. Failure to perform b. Vendor exploitation c. Outsourcing costs exceed benefits d. Reduced security e. Loss Of strategic advantage Discussion Questions 1. How is pre-SOX IT governance different from post-SOX IT governance? Response: Prior to SOX, the common practice regarding IT investments was to defer all decisions to corporate IT professionals. Modern IT governance, however, follows the philosophy that all corporate stakeholders, including boards of directors, top management, and department users (i. E. Accounting and finance) be active participants in key IT decisions. Such broad-based involvement reduces risk and increases the likelihood that IT decisions will be in compliance with user needs, corporate policies, strategic initiatives, and internal control requirements under SOX. . Although IT governance is a broad area, only three aspects of IT governance are discussed in the chapter. Name them and explain why these topics were chosen. Response: Although all IT governance issues are important to the organization, not all of them are matters of internal control under SOX that may potentially impact the financial reporting process. This chapter examined three IT governance issues that are addressed by SOX and the COOS internal control framework. These are: a. Organizational structure of the IT function, b. Computer center operations, and Disaster recovery planning. 3. What types of incompatible activities are prone to becoming consolidated in a distributed data processing system? HOW can this be prevented? Response: Achieving an adequate segregation of duties may not be possible in some distributed environments. The distribution of the IT services to users may result in the creation of small independent units that do not permit the desired separation of incompatible functions. For example, within a single unit the same person may write application programs, perform program maintenance, enter transaction data into the computer, and operate the computer equipment. Such a situation would be a fundamental violation of internal control. 4. Why would an operational manager be willing to take on more work in the tort of supervising an information system? Response: Managers are responsible for the success of their divisions, If the benefits to be reaped from a EDP are expected to be great enough, the manager may find it is worth her or his while to expend the extra effort, Some of the benefits the manager may hope will materialize within the divisions are more efficiently run operations, better decision making, and reduced processing costs. Increased customer satisfaction may also result if the DOPE system is more accommodating. 5. HOW can data be centralized in a distributed data processing system? Response: The data is stored centrally, but updated or processed at the local (remote) site. Thus, data is retrieved from the centralized data store, processed locally, and then sent back to the centralized data store. 6. Should standards be centralized in a distributed data processing environment? Explain. Response: The relatively poor control environment imposed by the EDP model can be improved by establishing some central guidance. The corporate group can contribute to this goal by establishing and distributing to user areas appropriate standards for systems development, programming, and documentation. 7. How can human behavior be considered one of the biggest potential threats to operating system integrity? Response: The purpose of segregation of duties is to deal with the potential negative aspects of human behavior including errors and fraud. The relationship between systems development (both new systems development and maintenance) and computer operations activities poses a potential risk that can circumvent operating system integrity. These functions are inherently incompatible. With detailed knowledge of application logic and control parameters and access to the computers operating system and utilities, an individual could make unauthorized changes to the application during its execution. 8. A bank in California has thirteen branches spread throughout northern California, each With its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with its data stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster? Response: The bank that has the data for all of its branches stored on one mainframe computer is at greater risk of access control. All of the firms records are centrally housed. Once a perpetrator gains unauthorized access to the system, the data for all 10 branches are at risk, For the other bank the perpetrator would have to breach security for each of the thirteen branch computers. Thus, the bank with all of data centrally stored on a mainframe is more vulnerable to access control. The primary disasters of concern in California are earthquakes and fires. The bank with a central mainframe in San Francisco is robbery at the greatest risk of damage from both earthquakes and fires. If that system is destroyed, all of the branches lose their processing capability and, possibly, stored data. 9. End-user computing has become extremely popular in distributed data processing organizations. The end users like it because they feel they can more readily design and implement their own applications. Does this type of environment always foster more efficient development Of applications? Explain your answer. Response: Distributed data processing if not properly managed, may result in duplication of efforts. Two or more individual end users may develop similar applications While completely unaware Of each Others efforts. Such duplication is an inefficient use of human resources. 10. Compare and contrast the following disaster recovery options: mutual aid pact, empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly. Response: A mutual aid pact requires two or more organizations to agree to and trust each other to aid the other with data processing needs in the event of a disaster. This method is the lowest cost, but also somewhat risky. First, the host company must be trusted to scale back its own processing in order to process the transactions of the disaster-stricken company, Second, the firms must not be affected by the same disaster, or the plan fails. The next lowest cost method is internally provided backup. With this method, organizations with multiple data processing centers may invest in internal excess capacity and support themselves in the case of disaster in one data processing center. This method is not as risky as the mutual aid pact because reliance on another organization is to a factor. In terms of cost, the next highest method is the empty shell where two or more organizations buy or lease space for a data processing center. The space is made ready for computer installation; however, no computer equipment is installed. This method requires lease or mortgage payments as well as payment for air conditioning and raised floors. The risk in this method is that the hardware, software, and technicians may be difficult, if not impossible, to have available in the case Of a natural disaster. Further, if multiple members systems crash simultaneously, an allocation problem exists. The method with lowest risk and also the highest cost is the recovery operations center. This method takes the empty shell concept one step further-?the computer equipment is actually purchased and software may even be installed. Assuming that this site is far enough away from the disaster-stricken area not to be affected by the disaster, this method can be a very good safeguard. 1 1. Who should determine and prioritize the critical applications? How is this done? How frequently is it done? Response: The critical applications should be identified and prioritize by the seer departments, accountants, and auditors, The applications should be prioritize based upon the impact on the short-run survival of the firm. The frequency with which the priorities need to be assessed depends upon the amount and kinds of changes that are made to systems over time. Firms that make changes frequently should reassess priorities frequently. 12. Why is it easier for programmers to perpetrate a fraud than operators? Response: It is much easier for programmers to perpetrate a fraud because they know the code. They know how to get around Some, or most, Of the embedded controls. Better yet, some programmers deliberately program code that gets them around controls and allows them to commit fraud. 13. Why should an organization centralize the acquisition, testing, and implementation of software and hardware within the corporate IT function? Response: The corporate IT group is better able to evaluate the merits of competing vendor software and hardware. A central, technically astute group such as this can evaluate systems features, controls, and compatibility with industry and organizational standards most efficiently. Test results can then be strutted to user areas as standards for guiding acquisition decisions. 14 Organizations sometimes locate their computer centers in the basement of their buildings to avoid normal traffic flows, Comment on this practice. Response: Locating the computer center in the basement to a building can create an exposure to disaster risk such as floods. The Chicago Board of Trade computer centers systems were located in the basement of a multi-storied office building in Chicago. When the century-old water pipelines burst, part of the first floor and the entire basement flooded. Trade was suspended for several days until system functionality could be restored, causing the loss of millions of dollars. This disaster would have been prevented if the computer center had simply been located on the top floor-?still away from normal traffic flows, but also away from the risk of flood. 15. The 2003 blackout that affected the U. S. Northeast caused numerous computer failures. What Can an organization do to protect itself from such uncontrollable power failures? Response: The decision regarding power controls can be an expensive one and usually requires the advice and analysis of experts. The following, however, are options that can be employed. Voltage regulators and surge protectors provide regulated electricity. Related to the level of electricity (frequency), and clean electricity, related to spikes and other potential hazards. Power outages and brownouts can generally be controlled with a battery backup (known as an uninterruptible power supply). 16. Discuss potential problem with ROCs. Response: Because of the heavy investment involved, ROCS are typically shared among many companies. The firms either buy shares in or become subscribers to the ROCK, paying monthly fees for rights to its use, That situation does provide mom risk because a widespread natural disaster may affect numerous entities in the same general geographic area, If multiple entities share the same ROCK, some firm or firms will end up queued in a waiting line. 17. Discuss two potential problems associated with a cold site. A. Recovery depends on the timely availability of the necessary computer hardware to restore the data processing function. Management must obtain assurances from hardware vendors that the vendor will give priority to meeting the organizations needs in the event Of a disaster. An unanticipated hardware apply problem at this critical juncture could be a fatal blow. B. With this approach there is the potential for competition among users for the shell resources, the same as for a hot site. For example, a widespread natural disaster, such as a flood or earthquake, may destroy the data processing capabilities of several shell members located in the same geographic area. Those affected by the disaster would be faced with a second major problem: how to allocate the limited facilities of the shell among them. The situation is analogous to a sinking ship that has an inadequate number of lifeboats. 8. Discuss three techniques used to achieve fault tolerance. A. Redundant arrays of inexpensive (or independent) disks (RAID), There are several types to RAID configurations. Essentially, each method involves the use of parallel disks that contain redundant elements of data and applications. If one disk fails, the lost data are automatically reconstructed from the redundant components stored on the other disks, b. Uninterruptible power supplies. In the event of a power outage, short-term backup power (i. E. , battery power) is provided to allow the system to shut down n a controlled manner. This process will prevent the data loss and corruption that would otherwise result from an uncontrolled system crash, lag. Explain the outsourcing risk of failure to perform Response: Once a client firm has outsourced specific IT assets, its performance becomes linked to the vendors performance. The negative implications Of such dependency are illustrated in the financial problems that have plagued the huge outsourcing vendor Electronic Data Systems Cop. DES). In a cost-cutting effort, DES terminated seven thousand employees, which impacted its ability to serve Other clients. Following an eleven-year low in share prices, DES stockholders filed a class-action lawsuit against the company. Clearly, vendors experiencing such serious financial and legal problems threaten the viability of their clients also. 20. Explain vendor exploitation. Response: Once the client firm has divested itself of specific assets it becomes dependent on the vendor. The vendor may exploit this dependency by raising service rates to an exorbitant level, As the clients IT needs develop over time beyond the original contract terms, it runs the risk that new or incremental revises will be negotiated at a premium, This dependency may threaten the clients long-term flexibility, agility, and competitiveness and result in even greater vendor dependency. 21, Explain why reduced security is an outsourcing risk, Response: Information outsourced to off-shore IT vendors raises unique and serious questions regarding internal control and the protection of sensitive personal data. When corporate financial systems are developed and hosted overseas, and program code is developed through interfaces with the host companys network, US corporations are at risk of losing control of their information. TO a large degree, US firms are reliant on the outsourcing vendors security measures, data-access policies, and the privacy laws of the host country. 22. Explain how IT outsourcing can lead to loss of strategic advantage. Response: Alignment between IT strategy and business strategy requires a close working relationship between corporate management and IT management in the concurrent development of business and IT strategies. This, however, is difficult to accomplish when IT planning is geographically redeployed off-shore or even domestically. Further, since the financial justification for IT outsourcing upends upon the vendor achieving economies of scale, the vendor is naturally driven toward seeking common solutions that may be used by many clients rather than creating unique solutions for each of them, This fundamental underpinning to IT outsourcing is inconsistent with the clients pursuit of strategic advantage in the marketplace, 23, Explain the role of a ASS 70 report in reviewing internal controls.

Monday, November 4, 2019

Consumer Behaviour Business Degree with Marketing Assignment

Consumer Behaviour Business Degree with Marketing - Assignment Example Marketers need to know what their customers need and want and they also need to know how their customers make decisions about buying and using products. As such, this report for Starbuck’s senior executives seeks to explore different factors that influence the behaviour of different customers towards a particular product or service. The report is divided into two parts and the first part is mainly concerned with establishing the extent to which motivation and the benefits sought by the customers go hand in hand towards the satisfaction of the needs of the targeted consumers. The second part seeks to establish the significance of understanding the family life-cycle and family decision making in order to make the organisation to be in a position to market their products and services more successfully. The report will also focus on how the marketers can focus on different factors which influence customer behaviour in order to positively change it through the effective use of diff erent elements of the marketing mix. Recommendations will be given in both cases. 1. Motivation of the customers is mainly influenced by their behaviour hence it is imperative for the marketers at Starbuck’s to first establish the behaviour of their consumers in order to be better positioned to satisfy their needs. Hawkins et al (1998, p.7) define customer behaviour as â€Å"the study of individuals, groups, or organisations and processes they use to select, secure, use and dispose of products, services, experiences or ideas to satisfy needs and the impacts these processes have on consumer and society.† This definition implies that there are indirect influences on consumer decisions. As such, any profit oriented organisation must satisfy the needs and wants of the customers. The realisation that long term survival of companies is only possible if customer satisfaction has been achieved has led the companies and their employees to motivate the customers towards their pr oducts. In their quest to satisfy their needs, customers also seek to derive benefits from consumption of particular products hence the attempt to satisfy these benefits by the marketers goes hand in hand with the concept of motivation. To understand motivation is to understand why customers do what they do. The philosophy of marketing rests on the premise that customers’ needs are the starting point from which all other activities can be planned (Cant, 2002). However, there is need to take a motivational approach to establish the needs of the customers which influences their buying behaviour. Basically, motivation occurs when a need is aroused that the customer wants to satisfy. A need refers to something physical or psychological that the body must have to function and develop (Cant, 2002). As such, motivation is the driving force within the individuals that drives them to act in a particular way. According to Kotler & Armstrong (2004), a motivated person is ready to act an d he is influenced by his or her own perceptions of the situation. People have different perceptions of the same stimulus and when they act, they learn something new. In the process, they acquire beliefs and attitudes that will shape their behaviour if they are satisfied that they will derive benefits f

Friday, November 1, 2019

Alfuttaim motors Toyota Essay Example | Topics and Well Written Essays - 1500 words - 1

Alfuttaim motors Toyota - Essay Example This has made it to enhance the robust development of the automotive industry of the UAE as well as contributing to its significant growth widely. Alfuttaim motors have the greatest number of its vehicles on the road as compared to other automobile manufacturers in the world. Its vehicle brands target both the middle-class economy as well as the first-economy economy (Nayak & Josh, 2012). Its vehicle brand, the Lexus, targets the first-class economy. This is because it is quite expensive and it can only be afforded by people who consider themselves as falling under the category of first-class. The sales of this Lexus brand are however minimized by the stiff competition from the German machines like the Mercedes Benz and the BMW. The majority of the sales of the Alfuttaim motors are the Toyota. This is because these types of vehicles are affordable to the middle-class in the economy. It is also notable that the middle-class makes up the largest percentage of the people in the world. It is also the biggest sale as it is accompanied by a wide variety of material handling equipment from the same manufacturer which is equally affordable to the middle-class. This has made Alfuttaim motors to be a significant exporter of cars in the developing nations as that is where most of the middle-class people reside. The target market of the Alfuttaim Motors is spread throughout the world. This is mainly due to its ability to cater for the vehicle needs of all the people whether they are low income earners or the high income earners. Its ability to offer a wide variety of motor vehicles also places it at a better position to capture a wide market base in the world. It is acknowledged that the Alfuttaim motors makes affordable vehicle brands for the low income earners so as to provide them with a rudimentary means of transport (Nayak & Josh, 2012). It also makes luxurious cars, for example the Lexus,

Wednesday, October 30, 2019

Writer's choice Essay Example | Topics and Well Written Essays - 250 words - 48

Writer's choice - Essay Example When the decision of abortion is left with a mother, the life of an innocent baby is at risk. Rarely can a mother in an awkward situation make a sound and credible decision pertaining to abortion. However, sometimes the judiciary ignorantly leaves such a decision to the mother. The legal status ought to be resolved by the legislature because of direct contact with legislators with locals. The legislators can easily air the input of locals in law-making chambers hence comprehensive debates can generate reliable statutes. The judiciary should not be involved because many women have been jailed in any countries, including Chile for abortion even when their lives were in danger. Restrictions are better, and the intent of an abortion must be evaluated before a legal action is taken against a mother (Ginsberg et al. 83). This situation notwithstanding, the life of the child must be preserved in case there is no danger posed by the birth process. The legislature can adjust various abortion statutes, depending on the trend and relevance of abortion cases in society. It will deter reckless abortions in

Monday, October 28, 2019

Labelling Processes Essay Example for Free

Labelling Processes Essay The labelling theory is a micro interactionist approach, this is because it focuses on how individuals construct the social world through face-face interactions. It recognises the concept of the ‘procedural self’ where ones identity is continuously constructed and recognised in interaction with significant others, this results in the individual’s behaviour, including that related to crime and deviance. Significant others are those who are in high social power and thus able to dictate influence and actively determine an individual’s life. Such individuals may include police officers, prison officers, politicians, parents and teachers. Feminists would argue however that these are all the males in society, determining and controlling the lives of females, keeping society patriarchal. The influence that significant others place on individuals lives is through the use of labels, the labels aren’t usually based on individual characteristics, more so stereotypes, working assumptions and professional knowledge. For example Cicaurel found that police patrolled working class areas more intensively, resulting in more arrests, this is due to the police’s stereotypical view that delinquent individuals are part of the working class. Lemert distinguishes between primary and secondary deviance in society. Primary deviance involves minor offences such as vandalism or smoking underage and these acts are usually uncaught or insignificant. However an individual may be caught for such acts and inturn be labelled as delinquent or deviant, the social reaction of this label results in the development of secondary deviance: more serious crimes such as assault or drugs. This therefore illustrates that it is not the act itself but the hostile societal reaction by significant others that creates serious deviance, thus crime and deviance being products of the labelling process. Support for this idea is research conducted by Jock Young on hippy marijuana users. Drugs were associated with hippies which demonstrate primary deviance. Police then labelled and persecuted hippies for their behaviour, excluding them from normal society. AS a result a deviant subculture emerged where hippies retreated into closed groups, grew hair out long, wore eccentric clothes and drug use became a central activity. Gove argued that there are two consequences of labelling: creation of sigma, modification of self images. Stigma is the negative branding of an individual and refers to the public condemnation and exclusion of the criminal. The media tend to exaggerate the behaviour of such people, causing increased fear and moral panic in society, resulting in avoidance and constantly being treated with suspicion. Becker refers to a ‘master status’ where once a person is labelled all of their actions are interpreted in light of the label and only negative aspects of that individual’s behaviour are focussed on. Because of the stigma created from the label a modification of self image occurs in the individual. The individual essentially lives up to their deviant label, becoming the person described in the label. The process of deviancy amplification whereby any punishments or treatment therefore reinforce the individual perception of the criminal, thus more crimes fitting to the label are carried out. This theory can however by criticised because it is determinist, where individuals have n control over the process and once they have been labelled they will inevitably turn deviant or criminal. Social action theorists believe in free will and individual’s choice to reject their label. In addition the label may cause the opposite result where an individual seeks to actively prove their label wrong by thriving and succeeding in their work/ life. Furthermore the labelling theory claims that deviant and criminal behaviour only occurs when a label is given, it does not account for crimes committed by those who have no labels placed upon them. Marxists, for example, would argue the theory fails to explain middle class, white collar or corporate crime, since the offenders have high social power and would be significant others rather than the individuals labelled. In conclusion although the labelling theory offers some explanation as to the crime and deviance in today’s society there are many gaps. Other explanation such as subcultural crime and deviance would argue that it is not the interaction of individuals but the illegitimate opportunity structures within society that results in crime and deviance.

Saturday, October 26, 2019

Millenium Bug :: essays research papers

The year 2000 is practically around the corner, promising a new era of greatness and wonder . . . as long as you don't own a computer or work with one. The year 2000 is bringing a Pandora's Box of gifts to the computer world, and the latch is slowly coming undone. The year 2000 bug is not really a "bug" or "virus," but is more a computer industry mistake. Many of the PC's, mainframes, and software out there are not designed or programmed to compute a future year ending in double zeros. This is going to be a costly "fix" for the industry to absorb. In fact, Mike Elgan who is the editor of Windows Magazine, says " . . . the problem could cost businesses a total of $600 billion to remedy." (p. 1)The fallacy that mainframes were the only machines to be affected was short lived as industry realized that 60 to 80 million home and small business users doing math or accounting etc. on Windows 3.1 or older software, are just as susceptible to this "bug." Can this be repaired in time? For some, it is already too late. A system that is devised to cut an annual federal deficit to 0 by the year 2002 is already in "hot water." Data will become erroneous as the numbers "just don't add up" anymore. Some PC owners can upgrade their computer's BIOS (or complete operating system) and upgrade the OS (operating system) to Windows 95, this will set them up for another 99 years. Older software however, may very well have to be replaced or at the very least, upgraded.The year 2000 has become a two-fold problem. One is the inability of the computer to adapt to the MM/DD/YY issue, while the second problem is the reluctance to which we seem to be willing to address the impact it will have. Most IS (information system) people are either unconcerned or unprepared. Let me give you a "short take" on the problem we all are facing. To save storage space and perhaps reduce the amount of keystrokes necessary in order to enter the year to date-most IS groups have allocated two digits to represent the year. For example, "1996" is stored as "96" in data files and "2000" will be stored as "00." These two-digit dates will be on millions of files used as input for millions of applications.

Thursday, October 24, 2019

Its Time to Regulate and Reform Euthanasia and Assisted Suicide :: Euthanasia Physician Assisted Suicide

It's Time to Regulate and Reform Euthanasia One of the landmark cases that involve euthanasia is that of Karen Ann Quinlan. Quinlan, a twenty-one year old New Jersey resident, overdosed on pills and alcohol in 1975. She was rushed to the hospital where her physical condition gradually deteriorated to a vegetative state. The doctors determined she had no chance of recovery. Before the coma Karen said that if anything ever happened that would leave her physically and mentally incompetent, without any chance of recovery, she would not want to be kept alive by "extraordinary medical procedures," notes Derek Humphry. Karen's parents sought religious counsel from their priest. They were told that the Catholic religion allows the removal of extraordinary care if the patient was in a terminal condition. Karen's parents requested she be removed from the respirator. The hospital denied their request. The Quinlans then directed their request to the court. The superior court denied their request. They took their request to the New Jersey Supreme court where the decision was reversed. Karen was removed from the respirator. To everyone's surprise, Karen began breathing on her own and lived another ten years (Humphry 107). The Quinlan case brought to the forefront patients' desire to die a proud, quiet death. It also brought to the forefront the complications caused by the advancement of medical technology ("Euthanasia"27). Euthanasia has been practiced in Eastern and Western culture since the beginning of civilization. The capability of medical technology to extend life (as demonstrated by the Quinlan case) has made the issue of euthanasia more complicated. Individuals should be allowed to "die with dignity" in the event of terminal illness if he or she wants it. Terminating a patient's life is much more merciful than allowing him or her to die a slow painful death from illness. Those who oppose legalizing euthanasia and assisted suicide say that this could lead to involuntary killing of the aged and infirm. I agree that there may be danger of abuse and that the vulnerable need to be protected; therefore, I support passing legislation that monitors and regulates physician assisted suicide. The demand for legislation in support of legalized euthanasia for the terminally ill has been an issue since the beginning of the century.

Wednesday, October 23, 2019

Schools Should Ask Students to Evaluate Their Teachers

Nowadays, education is at the top of people’s concern. Most of schools consider the interaction between students and teachers as an important role in the teaching process. Therefore, it leads to a policy that students can evaluate their teachers. In my opinion, I support that idea for several reasons.First of all, students are the very people who receive knowledge and lessons from their professors directly thus their evaluations must be exact and appropriate. In fact, it is very difficult to ask people to evaluate something that they never experience by themselves. As an example, customers are always the accurate measuring device of products’ quality because customers often try to find the best product among a lot of ones in the market to use. Similarly, students will express true opinions about their teachers and those opinions are very helpful for schools to know their teachers better. In this way, schools can have right methods to improve their staff.Furthermore, eva luations from students will make teachers perform their tasks better. As teachers know that their students always consider their teaching methods and their profession in every lecture or discussion, they will be stimulated to do well at the class. Besides, students’view will help teachers to find out their most effective teaching way and thus, their skills and experience can be boosted to a higher level.Finally, asking studentd to evaluate their teachers is also a way of showing concern to students. By that way, the schools indicate that they really appriciate their students’opinions and feeling. Hence, students may feel more comfortable and free. Also, when evaluating teachers, students have to pay attention to their lessons and they may realize their attitude of studying as well.To sum up, I strongly believe that schools should ask students to evaluate their teachers. That idea will help both of students and teachers to do better in their tasks. Schools Should Ask Students to Evaluate Their Teachers Nowadays, education is at the top of people’s concern. Most of schools consider the interaction between students and teachers as an important role in the teaching process. Therefore, it leads to a policy that students can evaluate their teachers. In my opinion, I support that idea for several reasons.First of all, students are the very people who receive knowledge and lessons from their professors directly thus their evaluations must be exact and appropriate. In fact, it is very difficult to ask people to evaluate something that they never experience by themselves. As an example, customers are always the accurate measuring device of products’ quality because customers often try to find the best product among a lot of ones in the market to use. Similarly, students will express true opinions about their teachers and those opinions are very helpful for schools to know their teachers better. In this way, schools can have right methods to improve their staff.Furthermore, eva luations from students will make teachers perform their tasks better. As teachers know that their students always consider their teaching methods and their profession in every lecture or discussion, they will be stimulated to do well at the class. Besides, students’view will help teachers to find out their most effective teaching way and thus, their skills and experience can be boosted to a higher level.Finally, asking studentd to evaluate their teachers is also a way of showing concern to students. By that way, the schools indicate that they really appriciate their students’opinions and feeling. Hence, students may feel more comfortable and free. Also, when evaluating teachers, students have to pay attention to their lessons and they may realize their attitude of studying as well.To sum up, I strongly believe that schools should ask students to evaluate their teachers. That idea will help both of students and teachers to do better in their tasks.