Thursday, November 28, 2019

The Failure Of Integration Essay Research Paper free essay sample

The Failure Of Integration Essay, Research Paper The Failure of Integration Integration is to stop the segregation of and convey into equal rank in society as defined by the Merriam-Webster Dictionary. Personally I believe this end has neer and likely neer will be to the full reached. In the United States there is segregation everyplace. It is non every bit public as it was in history but it still exists in people s heads. If the definition of integrating is true so why are such racist groups such as the Ku Klux Klan still around? They are historically knows for degrading and mortifying the Afro-american race throughout history. How come there are still race offenses happening today? And how come favoritism is so common in the U.S? Frequently being a black male I get discriminated against. I remember one incident when I was walking place from hoops pattern one dark with my best friend Keiji who happens to besides be black. We will write a custom essay sample on The Failure Of Integration Essay Research Paper or any similar topic specifically for you Do Not WasteYour Time HIRE WRITER Only 13.90 / page All of a sudden about three constabulary patrol cars pull up and throw us on the auto, and get down to frolic us down. They said we matched the description of people they are seeking for who robbed a convenience shop. The bull put us both in the back place of the sail R with handlocks on and were inquiring us all sorts of inquiries. After about 20 proceedingss another constabulary patrol car pulls up with two white males in the dorsum who were well different looking than us. The bulls opened the patrol car, un-handcuffed us and told us to acquire the snake pit out of here. I remember another incident here at URI outside of a fraternity. Myself and a twosome of my friends who are besides black tried to travel to a techno party at one. We saw they were allowing people in so we walked up to the door. The cat said they are full right now come back subsequently. We said all right no large trade so we turn and walk off. We stand about merely speaking and we see the same cat allow a group of approximately ten or eleven Caucasians in. Then the following group right after them was approximately seven or eight Caucasians right in to the party. Personally I believe that the lone manner racism will of all time stop and the end of integrating will be achieved is through apprehension and instruction of the job Peoples must recognize that God created all worlds from one twosome non many twosomes of different races. And that the full human race is hence one big extended household. If/When this of all time happens this universe will be a much better topographic point.

Sunday, November 24, 2019

What Did You Do This Summer College Interview Question

What Did You Do This Summer College Interview Question When answering a college interview question about your summer activities, no one is expecting you to be busy every day of the year. Summer is indeed a time to recoup after a busy academic year. Students who treat summer like an 80-hour-a-week job are setting themselves up for burn-out. That said, your interviewer will want to see that you did something productive in the summer. Youll want to show that you seek out meaningful and enriching experiences. A question about your summer activities has similarities to a question about  what do you do in your free time.  Summer, however, is a lot more substantial than a few free hours on the weekend, so your interviewer is going to be looking for something meaningful that youve accomplished during those months off from school. Strong Answers to a Question About  Your Summer Activities Your answer to the question, of course, is going to depend entirely on what you did in the summer, but work to identify a few meaningful activities from your summer break before you set foot in the interview room. Some activities that  will  sound good to your interviewer include: Travel.  Did you go somewhere interesting? A national park, historic site, cultural center, or some other destination that expanded your world view or opened your eyes to new experiences?Reading.  Your interviewer wont want to hear that you spent the whole summer indoors with your face buried in books, but they love to hear about reading. Students who read a lot tend to do well in college. You may even find that your interviewer asks you to recommend a good book.  Work.  Whether you helped on the family farm or cleaned dishes at the local eatery, students who work reveal a level of maturity and responsibility that will impress the admissions folks. Your summer may not be as exciting as a trip to Europe, but colleges truly do value work experience.Entrepreneurship.  This could be related to work, but youll certainly make a good impression if you started your own lawn mowing business, developed a useful app, or did something else that reveals creativity, confidence, and motiv ation.Volunteerism.  Community service and volunteer work play an increasingly important role in the college admissions process, and summer is the ideal time to do meaningful volunteer work. Education.  Did you attend a summer engineering or creative writing camp? Did you take a class at the local community college? Needless to say, colleges want to enroll students who like to learn. Weak Answers to a Question About Your Summer Colleges will want to see that youre not the type of student who lets three months go by without doing anything productive. Answers such as these are not going to impress anyone: I built a really cool world in Minecraft. Good for you, but realize that a lot of students fail out of college because they give video games priority over all else; three months staring at the computer screen represents a rather anti-social- even if multiplayer- and unproductive use of time.  I was burned out from school, so I relaxed. For three months? Also, dont highlight academic burn-out in your college interview. Sure, it happens to most students, but such an answer also sends a message that you get overwhelmed by school work. This isnt what you want to tell a college admissions representative.I hung out with my friends. Having friends is good. Colleges want to admit friendly students who build meaningful relationships with others. But what exactly did you do with your friends? Develop this reply to explain the meaningful activities you did with your friends. Ideally, you did something more productive than cruise the local shopping mall. The list could go on, but you get the idea. Answers that suggest you let the summer slip by without doing anything to enrich yourself or help others arent going to impress anyone. A Final Word About Summer Activities Your answer to the question will obviously be unique to your own interests and activities, and thats largely the point here- make sure you are telling your interviewer about summer experiences that have helped make you the person you are. Show that when you are given the time, youll do something meaningful and productive. In short, show your interviewer that youre the type of interesting, curious, hard-working, motivated person who will contribute to a campus community in positive ways.

Thursday, November 21, 2019

Gorbachev and the Age of Rebuilding Essay Example | Topics and Well Written Essays - 2250 words

Gorbachev and the Age of Rebuilding - Essay Example Did he really know what he was doing? Most of the radical reformists generally receive much doubt and unstable support simply because their theories have yet to be tested. It does not come as a surprise that many perceived Gorbachev was moving blind in his pursuit of reforms. But the author firmly believes that he had a clear and well equipped understanding on their position regarding what matters were needed to be reformed. Gorbachev literally grew up inside the sluggish Soviet system, thus he knew which components were hindering them from achieving good economic standing (Mcnair et al. 2005: p. 1). The West perceived him as a liberator and progressive leader with his foreign and domestic policies such as the Perestroika, which means restructuring or rebuilding, and the Glasnost which is literally translated as openness. These reforms were meant to remedy the economic deficiency of Russia and adapt better practices in the hope of making Russia a globally competitive economy. These p olicies, especially the Perestroika, received the spotlight since the USSR standard of living drastically collapsed together with the economy under his rule, and ultimately it also lead to the dissolution of the USSR. Perestroika is widely believed and argued to be also the main cause of the revolution of Eastern Europe in 1989 and also it contributed to the end of the Cold War (Heauel & Cohen 2009: p. 1). In the aftermath of these events, it is relevant to consider how Gorbachev has come up with such policies and aggressive reforms. Relevant also would be how he devised and schemed the plans to go, and how the plans later on faltered and backfired to Mother Russia despite all the good intentions and virtues that it bannered. The status quo before he came into power should also be put into consideration and also the consequences of the demise and how much should really be the attributed blame to his blunder. The policies of his predecessors, like Khruschchev, where the early stages of Perestroika was likened to his reforms during the 1950s and sixties (Tompson 1993: p. 73), should also be understood. This is necessary so as to learn how he then came to be with his political orientation and of what external factors are at play in influencing and engineering such policies. SHAPING A REFORMIST Before delving deeper into Gorbachev’s policies and reforms, one must first try to understand where he is coming from and how he came to be in power. His early life shaped how he came to be an aggressive reformist who later on became one of the most influential political figures in the XX century. Gorbachev was born into a mixed Russian-Ukrainian family on March 2, 1931 (Ikeda & Gorbachev 2005: p. 11). Early in his childhood, he experienced the Soviet famine of 1932-1933 which claimed the lives of his two sisters (Gorbachev 2006: p. 10). His family started off as poor landless peasants but later on rose to become middle-class farmers because of the Soviet collectiviz ation (Mcnair et al. 2005: p. 1). He recalls that â€Å"The peasant labor was very hard. It was back-breaking labor twenty hours a day, with no more than three or four hours of sleep. Yet it did not bring prosperity to the farmers. The only hope was the private plot of land where everything was cultivated to make ends meet somehow† (Gorbachev 1996: p. 36). It can be concluded that he is no stranger to the struggles of the lowest of classes for he experienced the

Wednesday, November 20, 2019

Article review Essay Example | Topics and Well Written Essays - 250 words - 3

Article review - Essay Example Students with different forms of disabilities present similar characteristics on the factors explored. According to the findings of the article, children with special needs have lesser and poorer social relations as compared to those with no special needs. The option of regular education for students with special needs is in this case beneficial. In essence, these students can interrelate with those without special needs to enhance positive social interrelations. However, it does not automatically mean a fruitful social interaction, since it always depends on how naturally social a person is, and the way they settle into their class setting. The information from the article is applicable in a class setting. From the article, I learned that it is necessary to instruct students with special needs in an inclusive classroom and provide opportunities for social interactions. They should not be secluded and taught or treated differently. There are increased social opportunities for special needs students in an inclusive class setting, but there is always a need to understand the individual characteristics of each student so that negative outcomes from introverts, such as loneliness, do not

Monday, November 18, 2019

Safety And hazards of pyrotechnics Essay Example | Topics and Well Written Essays - 1000 words

Safety And hazards of pyrotechnics - Essay Example A pyrotechnic technician should be aware of the various measures of creating a convincing explosion while ensuring that they maintain control of the process. Safety refers to the situation of acquiring protection form physical, damage, harm, accidents, errors and other events that are undesirable. It is also the control of various recognized hazards to acquire an acceptable level of risk. Safety is extremely vital in daily life and human should be cautious under all circumstances especially when dealing with pyrotechnics (Agrawal 9). A hazard refers to a situation that poses a certain level of threat to property, health, environment, or life. Majority of the risks are potential or dormant and have a characteristic of theoretical risk of harm. A hazard does not exist if it does not happen. When a hazardous situation comes to pass, people call it an incident. Pyrotechnics is a dormant hazard since they have the potential to be hazardous but do not affect the people or the environment. The key factor that leads to identification of a hazard in pyrotechnics is the energy stored that can cause damage upon release. Pyrotechnics store energy in various forms, which includes chemical, thermal, mechanical, and radioactive forms. Pyrotechnics are tremendously valuable in the entertainment industry and regularly used to mark various critical events. The producers or manufacturers of such pyrotechnics have a responsibility to ensure that the individuals who use them are not liable to adverse effects. They should achieve this through ensuring that they decrease the level of toxic materials in the pyrotechnics. They should ensure that it has minimal side effect to intended users. The employee who uses these pyrotechnics should also be protected since they work with them on a daily basis. Education concerning various measures of minimizing the chances of people being affected is particularly beneficial. Employees and

Friday, November 15, 2019

Aspects And Subcultures Of Digital Culture Media Essay

Aspects And Subcultures Of Digital Culture Media Essay Today digital trends are increasingly connected with the world of culture and arts, involving different aspects of culture, media and information technologies, and influencing new forms of communication. This course paper will review 3 fundamental aspects and particular subcultures of the digital culture. The term digital culture includes 3 main aspects digital culture in videogames, in music and in the Internet. It also includes the vast array of subcultures that have grown up in the last years around these aspects. These new trends have deeply modified all of our day to day activities. In the Digital culture: pragmatic and philosophical challenges Marcelo Dascal speaks about the changes that are transforming the nature of international communication and are modifying the way in which we carry out research, engage in study, keep our accounts, plan our travel, and so on. This article depicts the changes in todays digital culture and that is why it is the article this course paper st arts with. The relevance of the issue is explained by the pace of technological evolution which is much more rapid than the cultural one. No one controls the direction that technological development is taking, it is directing us (Dascal, 2006) This phenomenon of the digital culture influences all the spheres of our life. Today people cannot imagine their lives without digital culture. In the work Youth culture, music, and cell phone branding in China (2005), Jing Wang admits that nowadays music, Internet and video games are all connected with each other. The article examines the place of music in an emerging youth culture. As for the games culture, this course paper will refer to Live in your world, play in ours (by Sheila Murphy and What is video game culture? Cultural studies and game studies by Adrienne Shaw. Besides, the course paper also relies on the work by J.A. McArthur A geek meaning of style (2008) that considers the culture today should be understood as an open and dynamic process that is based on interactive communication. It changes every minute. This means that digital culture is a living system that always changes. That is why it is interesting to discuss the so-called geek subcultures. The present research is a brief review of the articles and an attempt to define how the digital culture and subcultures are reflected in academic studies. This paper summarizes various aspects of digital culture in two steps. It defines three key aspects of the digital culture and demonstrates three main subcultures of digital culture. Aspects of digital culture In the study of digital culture one thing can be pointed out is the sociological aspect. Digital culture is considered to be a socio-cultural phenomenon. There are three main aspects in digital culture. These are video games, music, and the Internet. Video games It is possible to say that computer and man communicate. To the question How will man and computer work together? there is an answer: à ¢Ã¢â€š ¬Ã‚ ¦through speech. (Dascal, 2006) Today there is a tendency for the newspaper articles to point out that video gamers are not necessarily who we think they are. As one article asserts, the stereotype of the gamer as a glaze, incoherent teenage boy is wrong (Shaw, A. 2010) What is video game culture? Cultural studies and game studies, p407). In the culture the gamer identity is defined by technical proficiency, geek cultural capital and maleness. While the games that they play make up a wide range of genres there is little diversity among the gamers themselves. According to the data, released by the Interactive Digital Software Association (IDSA), 62% of PC gamers are male and 60% of those gamers are under 36 years old (Murphy, 2004). Dovey and Kennedy (2006) define video games culture by the way of the major discourses used by members of th e video game development industry. Games culture isà ¢Ã¢â€š ¬Ã‚ ¦a critical site, where discourses around technology, technological innovation, and technological competence converge with dominant conceptions of gender and race (cited in Shaw, 2010, p405) 1.2. Music Music is definitely an aspect of digital culture J. Wang claims according to a BRANDchild study nearly 50% of wired urban teenagers frequently download music from the Internet.(2005, p 187) Basing on this statistic data, no doubt it is important for the youth. We can even say that it has become a new way of communication communication through music. Today people all over the world buy music from iTunes and it is a major part of digital culture that is growing form year to year. The changes happen in music sphere extremely fast and the reason for that is the computerization of the modern world. Almost everybody has a computer and an Internet access, and therefore has unlimited (free or paid) access to music. Such an access is very convenient although uncontrolled. Besides, music has become mobile with the wide spread of portable phones and other gadgets. Mobile music is said to be the panacea that cuts across cultural borders, able to attract global cool youth. (Wang, 2005, p 188) Actually, the world youth prefer music, which is well-known in many countries, therefore music becomes international, no matter what language it uses. Gadgets are developing very rapidly, new mobile means and new opportunities for listening to music arrive. Music has become a field in which tastes and preferences have become more eclectic than ever before (McArthur, 2008) Transnational marketers consider music as the fastest way into the mind and soul of todays youths (Wang, 2005) It rarely needs to be argued that music is the global language of the Now Generation. Internet Of course, it goes without saying that Internet has changed the world we used to know. Today it is one of the main parts in digital culture. Such a global phenomenon as Internet culture has appeared thanks to development of the net and has become a social event in human history. The Internet today is not only huge quantity of computers, but also the improbable quantity of the people, for which network is an essentially new way of dialogue almost not having of analogues in the material world. (Silver, 2004, p 57) The Internet gave everybody a chance of self-realization in this vast space: digital youth subcultures can not be centered round musical preference. (McArthur, 2008) The Internet may be a new resource for the affiliation and expression of sub-cultural identity. It may serve as a place for sub-cultural development. Moreover, it is a place where some subcultures (such as hackers) are born. The use of the Internet as a resource for subcultures suggests that subcultures today are able to affiliate across location and time constraints. It is no doubt effective across time and space.(McArthur, 2008) Subcultures Gamers Video games have produced a variety of subcultures. Some authors look at games as a social practice. For example, T. Taylor (2006) describes an outline gaming culture as a social practice and a shared identity created in the game space. (cited in Shaw, 2010). In the gamers culture, subcultures are marked by their look, specific linguistic jargon, and a sense of solidarity. Gamers often wear clothing that reference specific games, comics, television shows, or movies that are not widely known outside of a small following (Shaw, 2010) One of the biggest subculture of video gamers in the world is the World of Warcraft Community. As Hackeleman (2011) claims: As game developers have strived to create engaging environments and immersive stories for players to experience, independent machine producers have taken an unofficial and sometimes controversial role by expanding the game universe from a different perspective: tinkering with the game engine itself. The demand for this type of user generated content has risen as the addictive qualities of games like World of Warcraft have stimulated the creation of vast social networks and thriving online communities that provide gamers with the ability to stay connected while outside the virtual space. (2011, p 2) To understand the size of the community one can look at its Facebook group (http://www.facebook.com/warcraft) where 1,430,549 people (assessed on April 26 2011) claimed their affiliation with the game by following the games group page. According to the official website, more than 11 mln people play World of Warcraft around the world (http://www.worldofwarcraft.com) That is a size of a big city and if we bear in mind that they meet offline, buy different objects form each other and have their own language, they are a real culture, which is only one example of the video game culture. Many other communities of video gamers (such as Second Life, Sims Online, Grand Thief Auto Online) have their own subcultures which include almost 300 mln people playing online (based on estimate provided in Yahoo Answers). In different countries people have different attitudes to this. According to my observations, in Russia most of these players are thought to be computer geeks because they are different non-gamers and communicate with other gamers much easier. But when looking at the worlds most advanced video game culture South Korea à ¢Ã¢â€š ¬Ã‚ ¦ it is stressed that Koreans are very different from Americans because they treat pro-gamers as heroes, unlike U.S. sports culture that values real athletes. (Shaw, 2010) Music fans The next digital subculture which is considered is connected with the aspect of music. Studies of youth subcultures during the past 30 years have typically coincided with studies of popular music preferences. (Bennet, 1999, cited in McArthur, 2008. p. 58) There are many different music genres, which vary respectively to the style of music. For example, there are widely known rappers and rockers, but in modern world we commonly associate them more with their look and outfit, than the music genre. Those features, which show belonging to certain music style, allow to identify the typical representatives of different music subcultures. That means that there is not only music it is backed up with the different types of culture. One of the most influential musical subcultures existing nowadays is punk. From the Wangs point of view there are 2 types of punk-lovers: originals and wannabes. First group focuses generally on the punk music itself, while the other is more concerned about the fa shion code, and punk music is simply part of their lifestyle. This process went further so much that it has become common to treat punk as a sociological rather than a musical phenomenon from start. Punk is often considered as implementation of youths rebellious moods, but often their interest in punk culture symbolizes the search of band that will help them [students] say I am unique without making them look weird or socially unacceptable. According to Jing Wang, there is a so-called punk syndrome, which refers to the mentality, culture, lifestyle of punk-lovers. The typical representatives of this subculture are angry young high school kids, and the music is their way to show disobedience or the way to cope with the pressure they receive at school. In his article Jing Wang talks about several high school kids, who managed to pull through their entrance exams with the help of punk music. The anger of music, played with drums, bass guitars and songs performed in the aggressive or even shouting ways affects enormously peoples emotions. Online communities An online culture has developed as online social relationships have deepened and matured (Silver, 2004) The net is an accessible and user-friendly area in which subcultures can form, meet, and interact both in online and offline mode. Different groups of users appeared: anime geeks, hackers, flooders and etc. The Internet provides an opportunity for would-be members of cultural groups to seek out people who have similar thoughts to them. As Parker (1989) claimed computers have become a part of the genesis of a new crime from that has added computer programmers, computer operators, and electronic engineers to the traditional categories of criminals. (cited Turgeman-Goldschmidt, 2005). Hacking is a widespread international phenomenon, and hackers actions occasionally reach the media headlines. They are one of the most interesting subcultures that appeared on the Internet. According to Turgeman-Goldschmidt (2005, p 8) the hacker community is clearly male dominated and hackers are typically young adults. Moreover most hackers have no previous criminal record, are White and nonviolent, and come from middle- to upper-class backgrounds. The subculture can be divided in several communities of different type hackers. First ones hack the computer system to achieve fame jokers. Not likely to cause serious harm to the system, and express themselves making various humorous captions, viruses with different visual and sound effects (music, shaking or turning the screen, drawing all sorts of images, etc.) Next community type is professional crackers they carry out hacking a computer system to steal or substitute information stored there. They are characterized by systematic and organized action. The last ones are called vandals they carry out hacking a computer system to its destruction: delete data, create viruses or Trojan horses. But no matter what their type of hacker community is according to Taylor (1999, cited in Turgeman-Goldschmidt, 2005) there are six motivators for hackers : feelings of addiction, urge of curiosity, boredom with educational system, enjoyment of feelings of power, peer recognition and political acts. During his research Turgeman-Goldschmidt (2005) gives an explanation to each motivator in the hacker subculture. First of all, he says is the feeling for addiction to anarchy and anarchy is extremely entertaining. Secondly, their curiosity for hackers lies in the desire to learn and know as much as possible. Overall, it is stated that original hackers mostly do it not for revenue, but for the idea of free knowledge. They fight against Microsoft and help Linux in any way they find. They are trying to change the world the way the can, fighting with globalization, starting wars against the multinationals, and just by helping to find bugs in the anti-virus software. The considerable group of hackers regularly organizes hacker conventions. It operates a conference in Las Vegas which is annually visited by several thousand participants from all over the world from the U.S. to Australia. Each year the World Congress takes place in Germany is the of hackers, under the auspices Computer Chaos Club. CCC is a three-day conference on technology, society and the future of mankind. (Coleman, 2008) During these meetings hackers even manage to create their own outlook, own language, and made their own bible. For the hackers à ¢Ã¢â€š ¬Ã‚ ¦ hacking is a new form of entertainment based on the play-like quality that characterizes the use of digital technology and is a new form of social activity. Hacking can be considered a new form of entertainment that could not have existed before the development of an adequate technology. (Turgeman-Goldschmidt, 2005) Today hackers became a wide dangerous subculture. Conclusion Digital culture is a largely modern phenomenon. It should be understood primarily as part of general culture, one of the most important aspects of cultural activity in general. There are many other subcultures in the digital culture, but my research is focused primarily on three most popular ones. These three subcultures demonstrate aspects, which are more or less typical for other subcultures, associated with digital culture. As for my experience, during the research I have found out a lot of new about aspects and subcultures in general to particular differences inside different type of subcultures. In general, it was unexpected to learn that every subculture consists of those who are original and those who are posers. Every subculture does have a group of people that are a part of it only because they adore how people of this subculture look like not even understanding the main idea of it. This can be proved by a subculture I have analyzed in my course paper punks. I did not know that there are so many posers that just like the outlook, not knowing the history, nor understanding the main idea of the subculture. Besides, I have never heard of the attitude towards pro gamers in South Korea. They are thought to be almost national heroes there. The interesting fact is that every year they have a championship, in which anyone can participate. It is as popular as watching the hockey matches in Russia. Special TV channels translate news for gamers and computer geeks, youths and aged watch the championship matches together. In result the winner gets a major gift from the sponsor (which reaches $500,000) and incredible respect. The amount of money for winning the tournament motivates people to play professionally from early childhood. As a result, different kind of gamers all together are a tremendous size subculture in South Korea. In Russia digital subcultures are just getting born because our Internet and technology evolution is several steps back from the United States of America or South Korea. But I am sure that in several years we are going to have our own specific subcultures that would be interesting to analyze. Drawing to the conclusion, it is necessary to remember that this issue is extremely complicated and it worth more research. It is always interesting to analyze people, there communications, and new subcultures that reflect current situation in the country. That is the reason why I plan to keep on my research work in a slightly different way after I finish this course paper to analyze the digital subcultures in Russia and their influence on businesses for the next course paper.

Wednesday, November 13, 2019

Power of Women in The Grapes of Wrath :: Grapes Wrath essays

Power of Women in The Grapes of Wrath Women are known for as holding families together. When times get rough women are the foundation to the family and help keep things together. A woman poses different qualities that can help keep the family strong. These qualities can be categorized in the four archetypes of a woman. The idea of the woman Archetype is presented by Carl Jung. The first being Mother Nature, the very physical aspect and the second is the virgin, which represents the spiritual aspect of the archetype. The third is the young which who is the physical state while the fourth is the old witch possessing the spiritual side of the woman archetype. The four women in John Steinbecks, The Grapes of Wrath represent these four archetypes and take on responsibilities that in the end help the family succeeds in achieving their dreams. Ma Joad is a woman of strength and hope who is the backbone of the family. She represents the Mother Nature archetype while she posses the physical aspect of guiding the family and staying strong when the family needs her most. Steinbecks shows the importance of ma's character by the syntax usage to describe ma. " Ma was heavy, but not fat; thick with child-bearing and work...her ankles, and her strong, broad, bare feet moved quickly and deftly over the floor", Ma is described with these features to show her strength as a mother who has control and survives through hard situations (95). Her 'bare feet' being close to the earth shows how she takes on a 'Mother Nature' archetype to her character. She is one with the earth just as Mother Nature is. Mother Nature is one that gives birth, produces, sustains life and nurtures her family. All of these archetypes are expressed in ma's character. Even though she is a very strong woman she knows her role in the family. Ma knows when it is her time to help the family and when it is appropriate to step back and let the father run things. It is an unsaid statement but known by all in the family that "ma was powerful in the group" and they look to her for important decision making (133).

Sunday, November 10, 2019

Review on The Pursuit of Happyness Essay

The Pursuit of Happyness is a very moving film about a man and his quest for a better life. It is an inspiring case study of how many of the elements of happiness work together from relationships, to poverty, to positive mental attitude and determination. The movie is based on the true story of Chris Gardener, a struggling entrepreneur in 1980s San Francisco, with one driving ambition- to be a good father to his son. He tries to improve the family financial situation by purchasing and selling medical equipment, but the investment does not work out and the family sinks further into poverty. He sees his chance to make good after admiring a sports car on the street in the business district, where all the people seem happy. The car owner tells Chris he is a stock broker and anyone who is good with numbers and with people can be successful as a stock broker- even without a college degree. Chris uses his people skills and demonstrates the value of good relationships to get a chance at an internship where he must compete with 20 other candidates for 6 months for one paid position. His wife leaves him, he loses his apartment, bank accounts, credit cards, and has to spend time in jail, but all through it he is dedicated to keeping his son and pursuing his dream. The title, Pursuit of Happyness spelled with a y,comes from some graffiti at the daycare center and is also a reference to an essay written by a biracial man in the US shortly after the Declaration of Independence by Thomas Jefferson. The movie is beautifully acted by Will Smith and well written. It shows how people without money are often victimized and bullied by those who do have money and power. Yet Chris Gardener repeatedly demonstrates the importance of good relationships even with people who treat him badly. He shows the importance of knowing his strengths and using them, even in unconventional ways. His optimism turns into dogged determination as he demonstrates incredible persistence and creativity in his pursuit of happiness. The realism and emotional punch of the Christopher Gardner story makes this a moving and inspiring drama. Whether you are inspired to be grateful for your own circumstances or by the value of grace and determination, this movie is sure to show you something about happiness- its importance and how to get it. The Pursuit of Happyness teaches us a lot about the importance of virtues and strengths in our happy lives.

Friday, November 8, 2019

15 Century History

15 Century History The aristocracy of the medieval ages formed a symbiotic relationship with the peasants, a situation in which both parties contribute, although the peasant's contribution seems to be more strenuous. By analyzing primary sources, I intend delineate the function of the aristocracy in regards to the peasants, the attitudes and beliefs characterized by aristocrats, and the restrictions placed on them by their responsibilities to the peasants, as well as the church.Einhard's work, The Life Of Charlemagne, offers some excellent information about the restrictions placed on aristocracy. The document mentions several times Charlemagne's devoutness to the Christian faith and towards the papacy in particular.Beyond all other sacred and venerable places he loved the church of the holy Apostle Peter of Rome, and he poured into its treasury great wealth in silver and gold and precious stones. He sent innumerable gifts to the Pope; and during the whole course of his reign he strove with all his migh t (and, indeed, no object was nearer to his heart than this) to restore to the city of Rome her ancient authority, and not merely to defend the church of Saint Peter but to decorate and enrich it out of his resources above all other churches (Einhard, qtd.St. Peter's Basilica at Early Morning

Wednesday, November 6, 2019

Understanding and Developing Organizational Culture Essay Example

Understanding and Developing Organizational Culture Essay Example Understanding and Developing Organizational Culture Paper Understanding and Developing Organizational Culture Paper The IT nits may be distributed according to business donation, geographic location, or both. All or any of the IT functions may be distributed. The degree to which they are distributed will vary depending upon the philosophy and objectives to the organizations management. 4. What are the advantages and disadvantages of distributed data processing? Response: The advantages of EDP are: a. Cost reductions b. Improved cost control responsibility C. Improved user satisfaction d. Back up flexibility. The disadvantages (risks) are: a. Inefficient use Of resources b. Destruction of audit trails c. Inadequate segregation of duties . Difficulty acquiring qualified professionals e. Lack of standards 5. What types of tasks become redundant in a distributed data processing system? Response: Autonomous systems development initiatives distributed throughout the firm can result in each user area reinventing the Wheel rather than benefiting trot the work to others. For example, application programs created by one user, which could be used with little or no change by others, will be redesigned from scratch rather than shared. Likewise, data common to many users may be recreated for each, resulting in a high level of data redundancy. This situation has implications for data accuracy and consistency. 6. Explain Why certain duties that are deemed incompatible in a manual system may be combined in a CBS computer-based information system environment. Give an example. Response: The IT (CBS) environment tends to consolidate activities. A single application may authorize, process, and record all aspects Of a transaction. Thus, the focus of segregation control shifts from the operational level (transaction processing tasks that computers now perform) to higher. Level organizational relationships within the computer services function. 7. What are the three primary CBS functions that must be separated? Response: The three primary CBS functions that must be separated are as follows: a. Separate systems development from computer operations, b. Separate the database administrator from other functions , and c. Operate new systems development from maintenance. 8. What exposures do data consolidation in a CSS environment pose? Response: In a CBS environment, data consolidation exposes the data to losses from natural and man-made disasters. Consolidation creates a single point of failure. Â  The only way to back up a central computer site against disasters is to roved a second computer facility. 9. What problems may occur as a result of combining applications programming and maintenance tasks into one position? Response: One problem that may occur is inadequate documentation. Documenting is not considered as interesting a task as designing testing, and implementing a new system, thus a systems professional may move on to a new project rather than spend time documenting an almost complete project. Job security may be another reason a programmer may not fully document his or her work. Another problem that may occur is the increased potential for program raid. Fifth original programmer generates fraudulent code during development, then this programmer, through maintenance procedures, may disable the code prior to audits. Thus, the programmer can continue to cover his or her tracks. 10. Why is poor-quality systems documentation a prevalent problem? Response: Poor-quality systems documentation is a chronic IT problem and a significant challenge for many organizations seeking SOX compliance. At least two explanations are possible for this phenomenon. First, documenting systems is not as interesting as designing, testing, and implementing them. Systems repossession much prefer to move on to an exciting new project rather than document one just complete The second possible reason for poor documentation is job security. When a system is poorly documented, it is difficult to interpret, test, and debug. Therefore, the programmer who understands the system (the one who coded it) maintains bargaining power and becomes relatively indispensable. When the programmer leaves the firm, however, a new programmer inherits maintenance responsibility for the undocumented system. Depending on its complexity, the transition period may be long and costly. 11. What is RAID? Response: RAID (redundant arrays of independent disks) use parallel disks that contain redundant elements of data and applications. If one disk fails, the lost data are automatically reconstructed from the redundant components stored on the other disks. 2. What is the role off data librarian? Response: A data librarian, who is responsible for the receipt, storage, retrieval, and custody to data tiles, controls access to the data library. The librarian issues data files to computer operators in accordance with program requests and takes custody files when processing or backup procedures are completed. The trend in recent years toward real-time processing and the increased use of direct- access files has reduced or even eliminated the role of the data librarian in many organizations, 13. What is the role off corporate computer services department? How does this differ from other configurations? Response: The role Of a corporate computer services department (IT function) differs in that it is not a completely centralized model: rather, the group plays the role Of provider Of technical advice and expertise to distributed computer services. Tours, it provides much more support than would be received in a impolitely distributed model. A corporate computer services department provides a means for central testing of commercial hardware and software in an efficient manner. Further, the corporate group can provide users with services such as installation of new software and troubleshooting hardware and software problems. The corporate group can establish systems development, programming, and documentation standards, The corporate group can aid the user groups in evaluating the technical credentials of prospective systems professionals, 14, What are the five risks associated with distributed data processing? Response: The Five risks associated with distributed data processing are as a. Inefficient use of resources, destruction of audit trails, c. Inadequate segregation of duties, potential inability to hire qualified professionals, and e. Lack of standards. IS List the control features that directly contribute to the security of the computer center environment. A. Physical location controls b. Construction controls c. Access controls d. Air conditioning e. Fire suppression f. Fault tolerance 16. What is data conversion? Response: The data conversion function transcribes transaction data from paper source documents into computer input. For example, data conversion could be keying sales orders into a sales order application in modern systems or transcribing data into magnetic media (tape or disk) suitable for computer processing in legacy-type systems. 17, What may be contained in the data library? Response: The data library is a room adjacent to the computer center that provides safe storage for the off-line data files, Those files could be backups or current data files. For instance, the data library could store backups on DVDs, CD-Rooms, tapes, or other storage devices, It could also store live, current data lies on magnetic tapes and removable disk packs. In addition, the data library could store the original copies of commercial soft. are and their licenses for safekeeping. 18. What is an ORG Response: A recovery operations center (ROCK) or hot site is a fully equipped backup data center that many companies share. In addition to hardware and backup facilities, ROCK service providers Offer a range of technical services to their clients, who pay an annual fee for access rights. In the event of a major disaster, a subscriber can occupy the premises and, within a few hours, resume processing critical applications. , What is a cold site? The empty shell or cold site plan is an arrangement wherein the company buys or leases a building that will serve as a data center. In the event of a disaster, the shell is available and ready to receive whatever hardware the temporary user requires to run its essential data processing systems. 20. What is fault tolerance? Response: Fault tolerance is the ability of the system to continue operation when part of the system fails due to hardware failure, application program error, or operator error. Implementing fault tolerance control ensures that no single mint of potential system failure exists Total failure can occur only in the event of the failure of multiple components, or system-wide failure. 21. What are the often-cited benefits of IT outsourcing? Response: Often-cited benefits Of IT outsourcing include improved core business performance, improved IT performance (because of the vendors expertise), and reduced IT costs. 22. Define commodity IT asset. Response: Commodity IT assets are those assets that are not unique to a particular organization and are thus easily acquired in the marketplace. These include such things are nonvoter management, systems operations, server maintenance, and help-desk functions. 23. Define specific asset. Response: Specific assets, in contrast to commodity assets, are unique to the organization and support its strategic objectives. Because of their idiosyncratic nature, specific assets have little value outside of their current use. 24, List five risks associated with IT outsourcing. A. Failure to perform b. Vendor exploitation c. Outsourcing costs exceed benefits d. Reduced security e. Loss Of strategic advantage Discussion Questions 1. How is pre-SOX IT governance different from post-SOX IT governance? Response: Prior to SOX, the common practice regarding IT investments was to defer all decisions to corporate IT professionals. Modern IT governance, however, follows the philosophy that all corporate stakeholders, including boards of directors, top management, and department users (i. E. Accounting and finance) be active participants in key IT decisions. Such broad-based involvement reduces risk and increases the likelihood that IT decisions will be in compliance with user needs, corporate policies, strategic initiatives, and internal control requirements under SOX. . Although IT governance is a broad area, only three aspects of IT governance are discussed in the chapter. Name them and explain why these topics were chosen. Response: Although all IT governance issues are important to the organization, not all of them are matters of internal control under SOX that may potentially impact the financial reporting process. This chapter examined three IT governance issues that are addressed by SOX and the COOS internal control framework. These are: a. Organizational structure of the IT function, b. Computer center operations, and Disaster recovery planning. 3. What types of incompatible activities are prone to becoming consolidated in a distributed data processing system? HOW can this be prevented? Response: Achieving an adequate segregation of duties may not be possible in some distributed environments. The distribution of the IT services to users may result in the creation of small independent units that do not permit the desired separation of incompatible functions. For example, within a single unit the same person may write application programs, perform program maintenance, enter transaction data into the computer, and operate the computer equipment. Such a situation would be a fundamental violation of internal control. 4. Why would an operational manager be willing to take on more work in the tort of supervising an information system? Response: Managers are responsible for the success of their divisions, If the benefits to be reaped from a EDP are expected to be great enough, the manager may find it is worth her or his while to expend the extra effort, Some of the benefits the manager may hope will materialize within the divisions are more efficiently run operations, better decision making, and reduced processing costs. Increased customer satisfaction may also result if the DOPE system is more accommodating. 5. HOW can data be centralized in a distributed data processing system? Response: The data is stored centrally, but updated or processed at the local (remote) site. Thus, data is retrieved from the centralized data store, processed locally, and then sent back to the centralized data store. 6. Should standards be centralized in a distributed data processing environment? Explain. Response: The relatively poor control environment imposed by the EDP model can be improved by establishing some central guidance. The corporate group can contribute to this goal by establishing and distributing to user areas appropriate standards for systems development, programming, and documentation. 7. How can human behavior be considered one of the biggest potential threats to operating system integrity? Response: The purpose of segregation of duties is to deal with the potential negative aspects of human behavior including errors and fraud. The relationship between systems development (both new systems development and maintenance) and computer operations activities poses a potential risk that can circumvent operating system integrity. These functions are inherently incompatible. With detailed knowledge of application logic and control parameters and access to the computers operating system and utilities, an individual could make unauthorized changes to the application during its execution. 8. A bank in California has thirteen branches spread throughout northern California, each With its own minicomputer where its data are stored. Another bank has 10 branches spread throughout California, with its data stored on a mainframe in San Francisco. Which system do you think is more vulnerable to unauthorized access? Excessive losses from disaster? Response: The bank that has the data for all of its branches stored on one mainframe computer is at greater risk of access control. All of the firms records are centrally housed. Once a perpetrator gains unauthorized access to the system, the data for all 10 branches are at risk, For the other bank the perpetrator would have to breach security for each of the thirteen branch computers. Thus, the bank with all of data centrally stored on a mainframe is more vulnerable to access control. The primary disasters of concern in California are earthquakes and fires. The bank with a central mainframe in San Francisco is robbery at the greatest risk of damage from both earthquakes and fires. If that system is destroyed, all of the branches lose their processing capability and, possibly, stored data. 9. End-user computing has become extremely popular in distributed data processing organizations. The end users like it because they feel they can more readily design and implement their own applications. Does this type of environment always foster more efficient development Of applications? Explain your answer. Response: Distributed data processing if not properly managed, may result in duplication of efforts. Two or more individual end users may develop similar applications While completely unaware Of each Others efforts. Such duplication is an inefficient use of human resources. 10. Compare and contrast the following disaster recovery options: mutual aid pact, empty shell, recovery operations center, and internally provided backup. Rank them from most risky to least risky, as well as from most costly to least costly. Response: A mutual aid pact requires two or more organizations to agree to and trust each other to aid the other with data processing needs in the event of a disaster. This method is the lowest cost, but also somewhat risky. First, the host company must be trusted to scale back its own processing in order to process the transactions of the disaster-stricken company, Second, the firms must not be affected by the same disaster, or the plan fails. The next lowest cost method is internally provided backup. With this method, organizations with multiple data processing centers may invest in internal excess capacity and support themselves in the case of disaster in one data processing center. This method is not as risky as the mutual aid pact because reliance on another organization is to a factor. In terms of cost, the next highest method is the empty shell where two or more organizations buy or lease space for a data processing center. The space is made ready for computer installation; however, no computer equipment is installed. This method requires lease or mortgage payments as well as payment for air conditioning and raised floors. The risk in this method is that the hardware, software, and technicians may be difficult, if not impossible, to have available in the case Of a natural disaster. Further, if multiple members systems crash simultaneously, an allocation problem exists. The method with lowest risk and also the highest cost is the recovery operations center. This method takes the empty shell concept one step further-?the computer equipment is actually purchased and software may even be installed. Assuming that this site is far enough away from the disaster-stricken area not to be affected by the disaster, this method can be a very good safeguard. 1 1. Who should determine and prioritize the critical applications? How is this done? How frequently is it done? Response: The critical applications should be identified and prioritize by the seer departments, accountants, and auditors, The applications should be prioritize based upon the impact on the short-run survival of the firm. The frequency with which the priorities need to be assessed depends upon the amount and kinds of changes that are made to systems over time. Firms that make changes frequently should reassess priorities frequently. 12. Why is it easier for programmers to perpetrate a fraud than operators? Response: It is much easier for programmers to perpetrate a fraud because they know the code. They know how to get around Some, or most, Of the embedded controls. Better yet, some programmers deliberately program code that gets them around controls and allows them to commit fraud. 13. Why should an organization centralize the acquisition, testing, and implementation of software and hardware within the corporate IT function? Response: The corporate IT group is better able to evaluate the merits of competing vendor software and hardware. A central, technically astute group such as this can evaluate systems features, controls, and compatibility with industry and organizational standards most efficiently. Test results can then be strutted to user areas as standards for guiding acquisition decisions. 14 Organizations sometimes locate their computer centers in the basement of their buildings to avoid normal traffic flows, Comment on this practice. Response: Locating the computer center in the basement to a building can create an exposure to disaster risk such as floods. The Chicago Board of Trade computer centers systems were located in the basement of a multi-storied office building in Chicago. When the century-old water pipelines burst, part of the first floor and the entire basement flooded. Trade was suspended for several days until system functionality could be restored, causing the loss of millions of dollars. This disaster would have been prevented if the computer center had simply been located on the top floor-?still away from normal traffic flows, but also away from the risk of flood. 15. The 2003 blackout that affected the U. S. Northeast caused numerous computer failures. What Can an organization do to protect itself from such uncontrollable power failures? Response: The decision regarding power controls can be an expensive one and usually requires the advice and analysis of experts. The following, however, are options that can be employed. Voltage regulators and surge protectors provide regulated electricity. Related to the level of electricity (frequency), and clean electricity, related to spikes and other potential hazards. Power outages and brownouts can generally be controlled with a battery backup (known as an uninterruptible power supply). 16. Discuss potential problem with ROCs. Response: Because of the heavy investment involved, ROCS are typically shared among many companies. The firms either buy shares in or become subscribers to the ROCK, paying monthly fees for rights to its use, That situation does provide mom risk because a widespread natural disaster may affect numerous entities in the same general geographic area, If multiple entities share the same ROCK, some firm or firms will end up queued in a waiting line. 17. Discuss two potential problems associated with a cold site. A. Recovery depends on the timely availability of the necessary computer hardware to restore the data processing function. Management must obtain assurances from hardware vendors that the vendor will give priority to meeting the organizations needs in the event Of a disaster. An unanticipated hardware apply problem at this critical juncture could be a fatal blow. B. With this approach there is the potential for competition among users for the shell resources, the same as for a hot site. For example, a widespread natural disaster, such as a flood or earthquake, may destroy the data processing capabilities of several shell members located in the same geographic area. Those affected by the disaster would be faced with a second major problem: how to allocate the limited facilities of the shell among them. The situation is analogous to a sinking ship that has an inadequate number of lifeboats. 8. Discuss three techniques used to achieve fault tolerance. A. Redundant arrays of inexpensive (or independent) disks (RAID), There are several types to RAID configurations. Essentially, each method involves the use of parallel disks that contain redundant elements of data and applications. If one disk fails, the lost data are automatically reconstructed from the redundant components stored on the other disks, b. Uninterruptible power supplies. In the event of a power outage, short-term backup power (i. E. , battery power) is provided to allow the system to shut down n a controlled manner. This process will prevent the data loss and corruption that would otherwise result from an uncontrolled system crash, lag. Explain the outsourcing risk of failure to perform Response: Once a client firm has outsourced specific IT assets, its performance becomes linked to the vendors performance. The negative implications Of such dependency are illustrated in the financial problems that have plagued the huge outsourcing vendor Electronic Data Systems Cop. DES). In a cost-cutting effort, DES terminated seven thousand employees, which impacted its ability to serve Other clients. Following an eleven-year low in share prices, DES stockholders filed a class-action lawsuit against the company. Clearly, vendors experiencing such serious financial and legal problems threaten the viability of their clients also. 20. Explain vendor exploitation. Response: Once the client firm has divested itself of specific assets it becomes dependent on the vendor. The vendor may exploit this dependency by raising service rates to an exorbitant level, As the clients IT needs develop over time beyond the original contract terms, it runs the risk that new or incremental revises will be negotiated at a premium, This dependency may threaten the clients long-term flexibility, agility, and competitiveness and result in even greater vendor dependency. 21, Explain why reduced security is an outsourcing risk, Response: Information outsourced to off-shore IT vendors raises unique and serious questions regarding internal control and the protection of sensitive personal data. When corporate financial systems are developed and hosted overseas, and program code is developed through interfaces with the host companys network, US corporations are at risk of losing control of their information. TO a large degree, US firms are reliant on the outsourcing vendors security measures, data-access policies, and the privacy laws of the host country. 22. Explain how IT outsourcing can lead to loss of strategic advantage. Response: Alignment between IT strategy and business strategy requires a close working relationship between corporate management and IT management in the concurrent development of business and IT strategies. This, however, is difficult to accomplish when IT planning is geographically redeployed off-shore or even domestically. Further, since the financial justification for IT outsourcing upends upon the vendor achieving economies of scale, the vendor is naturally driven toward seeking common solutions that may be used by many clients rather than creating unique solutions for each of them, This fundamental underpinning to IT outsourcing is inconsistent with the clients pursuit of strategic advantage in the marketplace, 23, Explain the role of a ASS 70 report in reviewing internal controls.

Monday, November 4, 2019

Consumer Behaviour Business Degree with Marketing Assignment

Consumer Behaviour Business Degree with Marketing - Assignment Example Marketers need to know what their customers need and want and they also need to know how their customers make decisions about buying and using products. As such, this report for Starbuck’s senior executives seeks to explore different factors that influence the behaviour of different customers towards a particular product or service. The report is divided into two parts and the first part is mainly concerned with establishing the extent to which motivation and the benefits sought by the customers go hand in hand towards the satisfaction of the needs of the targeted consumers. The second part seeks to establish the significance of understanding the family life-cycle and family decision making in order to make the organisation to be in a position to market their products and services more successfully. The report will also focus on how the marketers can focus on different factors which influence customer behaviour in order to positively change it through the effective use of diff erent elements of the marketing mix. Recommendations will be given in both cases. 1. Motivation of the customers is mainly influenced by their behaviour hence it is imperative for the marketers at Starbuck’s to first establish the behaviour of their consumers in order to be better positioned to satisfy their needs. Hawkins et al (1998, p.7) define customer behaviour as â€Å"the study of individuals, groups, or organisations and processes they use to select, secure, use and dispose of products, services, experiences or ideas to satisfy needs and the impacts these processes have on consumer and society.† This definition implies that there are indirect influences on consumer decisions. As such, any profit oriented organisation must satisfy the needs and wants of the customers. The realisation that long term survival of companies is only possible if customer satisfaction has been achieved has led the companies and their employees to motivate the customers towards their pr oducts. In their quest to satisfy their needs, customers also seek to derive benefits from consumption of particular products hence the attempt to satisfy these benefits by the marketers goes hand in hand with the concept of motivation. To understand motivation is to understand why customers do what they do. The philosophy of marketing rests on the premise that customers’ needs are the starting point from which all other activities can be planned (Cant, 2002). However, there is need to take a motivational approach to establish the needs of the customers which influences their buying behaviour. Basically, motivation occurs when a need is aroused that the customer wants to satisfy. A need refers to something physical or psychological that the body must have to function and develop (Cant, 2002). As such, motivation is the driving force within the individuals that drives them to act in a particular way. According to Kotler & Armstrong (2004), a motivated person is ready to act an d he is influenced by his or her own perceptions of the situation. People have different perceptions of the same stimulus and when they act, they learn something new. In the process, they acquire beliefs and attitudes that will shape their behaviour if they are satisfied that they will derive benefits f

Friday, November 1, 2019

Alfuttaim motors Toyota Essay Example | Topics and Well Written Essays - 1500 words - 1

Alfuttaim motors Toyota - Essay Example This has made it to enhance the robust development of the automotive industry of the UAE as well as contributing to its significant growth widely. Alfuttaim motors have the greatest number of its vehicles on the road as compared to other automobile manufacturers in the world. Its vehicle brands target both the middle-class economy as well as the first-economy economy (Nayak & Josh, 2012). Its vehicle brand, the Lexus, targets the first-class economy. This is because it is quite expensive and it can only be afforded by people who consider themselves as falling under the category of first-class. The sales of this Lexus brand are however minimized by the stiff competition from the German machines like the Mercedes Benz and the BMW. The majority of the sales of the Alfuttaim motors are the Toyota. This is because these types of vehicles are affordable to the middle-class in the economy. It is also notable that the middle-class makes up the largest percentage of the people in the world. It is also the biggest sale as it is accompanied by a wide variety of material handling equipment from the same manufacturer which is equally affordable to the middle-class. This has made Alfuttaim motors to be a significant exporter of cars in the developing nations as that is where most of the middle-class people reside. The target market of the Alfuttaim Motors is spread throughout the world. This is mainly due to its ability to cater for the vehicle needs of all the people whether they are low income earners or the high income earners. Its ability to offer a wide variety of motor vehicles also places it at a better position to capture a wide market base in the world. It is acknowledged that the Alfuttaim motors makes affordable vehicle brands for the low income earners so as to provide them with a rudimentary means of transport (Nayak & Josh, 2012). It also makes luxurious cars, for example the Lexus,