Saturday, August 31, 2019

Was the U.S. Justified in Going to War With Mexico?

The United States of America in the 1800’s was a rapidly growing country. Many people moved west for religious freedom while others were strong believers in Manifest Destiny. In order to occupy land, settlers had to find land that wasn’t already occupied. Since most of the west was a part of Mexico, this was not easy to do. Luckily, Mexicans also wanted settlers in their western lands because that area was not developed. Mexico invited Americans to settle in their land. However, both countries had many differences.It did not take long before the United States and Mexico went to war. The United States was justified in going to war because Mexico had shed American blood on American soil, Texas (a land that many Mexicans still considered theirs) was an independent republic and had the right to govern itself, and Texas was trying to become part of the United States, which means that the United States had a right to be involved, too. Mexico had encouraged Americans to settle in the province of Texas, which was part of Mexico at the time.After the Texans and Mexicans fought, Texas won its independence from Mexico in 1836. Now, in 1846, America sent a troop of men lead by General Zachary Taylor to the Texan border to make sure the Mexicans weren’t attempting to attack Texas (Doc B). This angered the Mexicans since it made it seem like Texas was now allied with America. The dispute that followed led to the death of sixteen Americans. Also, the Mexicans chose to believe that the arrival of General Zachary Taylor was an outright attack, which lead to the battles of Palo Alto and Resaca de la Palma (Doc C).This shows that Mexico had taken the first step of fighting the United States. Eventually, the Mexicans were forced to surrender. As to which side fired first, this cannot be determined. In one letter to Congress, James Polk stated, â€Å"We have tried every effort at reconciliation. The cup of forbearance had been exhausted even before the recent information from the frontier of the Del Norte. But now, †¦Mexico has passed the boundary of the United States, has invaded our territory and shed American blood upon the American soil† (Doc B).Before Texas became part of the United States, it was an independent republic. An independent republic has the right to govern itself and set itself apart from other nations. Texas regarded the Rio del Norte to be the Texan border (Doc B). This means that Texas now has the choice to do whatever they wish. Charles Sumner, a state legislator from Massachusetts, said, â€Å"†¦in seeking extension of slavery, (our own citizens denied) the great truths of American freedom† (Doc D). If Texas is independent, it has the right to own slaves.Also, states in the United States already owned slaves, so the point cannot be argued any further. Sumner also said Americans brought slaves in Mexico in defiance of Mexican law (Doc D). However, Mexico invited Americans into Mexico and Mexic o should have realized that Americans would have different ways. Also, Texas was trying to become part of the United States, which meant that the United States had a right to go to war with Mexico. Since Mexico could not govern all of its territory, they invited Americans in.Now that Americans were settling in unpopulated Mexican territory, the ratio of Americans to Mexicans increased (Doc A). Eventually, the American lifestyle took over, and demanded different rights. In Document C, Velasco-Marquez said the treaty signed between Texas and the U. S. and also the fact that Texas wanted to be annexed to the U. S. was an act of war. Texas had the right to be a part of the U. S. , and if Mexico considered this an act of war with Texas, then the U. S. had the right to be involved too (Doc C).Finally, James Polk said, â€Å"The invasion was threatened solely because Texas had determined†¦to annex herself to our Union† (Doc B). If that is true, then America did have the right t o declare war. Once Mexico showed aggression to Texas, the United States had a right to go to war with Mexico because Texas was an independent republic and wanted to be annexed into the United States. Whatever Texas does, Mexico cannot have a stake in it. From these points, it can be concluded that the United States was justified in going to war with Mexico.

Friday, August 30, 2019

Fake Myth

How Shadows Came To Be In the kingdom of Ridonicorn, there was a peculiar king named Shade. He claimed that he could stalk anyone without being seen. The Olympians knew him well, for his boasts were somewhat true. Often times, they bet on him to see if he tail people. Poseidon and Hermes almost always won the bets since they usually on the same side. If there was ever an argument, Artemis would settle it by choosing the right side of the bet. One day, Hermes and Poseidon didn’t place the same bet.Artemis was not there to settle the argument. This may seem trivial but it greatly upset the Olympians. They were so confused that no one else placed a bet. Poseidon thought Shade would not be able to follow the mysterious citizen and Hermes thought he would. Shade had already followed the citizen one mile into the enchanted forest near Ridonicorn when he heard a voice telling him to come into the bushes. He obeyed silently and went off his path. â€Å"What dost thou want? † sa id Shade to the voice.Then, right before his eyes, an old man with a cane came out of nowhere and said to him; â€Å"Only to help my king. † Shade was curious at his response In his weird manner of talking, he said; â€Å"What would thou doest to helpeth me in my quest from the gods? † â€Å"I have an enchanted necklace,† replied the old man. â€Å"that will make it so that no one can see hear you but the gods. † â€Å"Give it to me now! † ordered Shade. The old man gave it to him and Shade immediately put it on. â€Å"Did it work? † he asked the old man.Deceivingly, the old man replied; â€Å"Shade? Where did you go? † Shade was filled with happiness and continued his peculiar errand. He did not know that the old man was Hermes and could indeed see and hear him. Hermes was trying to â€Å"secure† his success of his bet with the necklace. However, no one knew that the person who Shade was stalking could see and hear him perfect ly. She was Artemis. She had left Olympus to take a break and hunt since she was not a good mood. When she noticed that Hermes was trying to win a bet, she was filled with nger. She shot an arrow right past Shade’s head. Shade was surprised since he thought he could not be noticed. â€Å"You think I can’t see you, mortal? † Shade shuddered. The way she said â€Å"mortal† made it seem as if she wasn’t. He was too late to notice and Artemis placed a curse on him. He and his offspring were forced to follow everyone without secrecy. Poseidon won the bet, Hermes had to do Poseidon’s chores for a millennium, and Shade (now Shadow) and his children had to follow everyone while always being seen for eternity.

Thursday, August 29, 2019

Matters of Life and Death Essay

In a new book, A Miracle and a Privilege, Dr Francis Moore, 81, of Harvard Medical School, discusses a lifetime of grappling with the issue of when to help a patient die. An excerpt: Doctors of our generation are not newcomer to this question. Going back to my internship days, I can remember many patients in pain, sometimes in coma or delirious, with late, hopeless cancer. For many of them, we wrote an order for heavy medication – morphine by the clock. This was not talked about openly and little was written about it. It was essential, not controversial The best way to bring the problem into focus is to describe two patients whom I cared for. The first, formerly a nurse, had sustained a fractured pelvis in an automobile accident. A few day later her lungs seemed to fill up, her urine stopped, her heart developed dangerous rhythm disturbances. So there she was: in coma, on dialysis, on a breathing machine, her heartbeat maintained with an electrical device. One day after rounds, my secretary said the husband and son of the patient wanted to see me. They told me their wife and mother was obviously going to die, she was a nurse and had told her family that she never wanted this kind of terrible death, being maintained by machines. I told them that while I respected their view, there was nothing intrinsically lethal about her situation. The kidney failure she had was just the kind for which the artificial kidney was most effective. While possibly a bit reassured, they were disappointed. Here was the head surgeon, seemingly determined to keep everybody alive, no matter what When patients start to get very sick, they often seem to fall apart all at once. The reverse is also true. Within a few days, the patient’s pacemaker could be removed, and she awoke from her coma. About six months later I was again in my office. The door opened and in walked a gloriously fit woman. After some cheery words of appreciation, the father and son asked to speak to me alone. As soon as the door closed, both men became quite tearful. All that came out was, â€Å"We want you to know how wrong we were† The second patient was an 85-year-old lady whose hair caught fire while she was smoking. She arrived with a deep burn, I knew it would surely be fatal. As a remarkable coincidence, there was a similar going on at the time in medical ethics, given by the wife of an official of our university. She asked me if I had any sort of ethical problem I could bring up for discussion. I described the  case and asked the students their opinion. After the discussion, I made a remark that was, in retrospect, a serious mistake. I said, â€Å"I’ll take the word back to the nurses about her, and we will talk about it some more before we decide†. The instructor and the students were shocked: â€Å"You mean this is a real patient?† The teacher of ethics was not accustomed to being challenged by reality. In any event, I went back and met with the nurses.  A day or two later, when she was making no progress and was suffering terribly, we began to back off treatment. When she complained of pain, we gave her plenty of morphine. A great plenty. Soon she died quietly and not in pain. As a reasonable physician, you had better move ahead and do what you would want done for you. And don’t discuss it with the world first. There is a lesson here for everybody.  

Wednesday, August 28, 2019

Leslie Fay Case Study Essay Example | Topics and Well Written Essays - 2500 words - 1

Leslie Fay Case Study - Essay Example The essay "Leslie Fay Case Study" tries to deeper understand what happened at the Leslie Fay Companies by analyzing the business organization. The first four are geared in the strategic aspect of the firm. Prior to the audit failure, Leslie Fay’s mission is to design, manufacture, and sell moderately priced and stylishly conservative women’s dresses. The company’s product lines are targeted to women aged 30-55 years old. Even though indirectly stated, the company has no plan of changing its products in order to cope with the emerging trends. The company opts to stick with its current fashion statement. In order to pursue its vision of staying on top on the industry, Leslie Fay utilizes a strategy of designing and manufacturing products by trusting the instincts of the designers. It should be noted that as opposed to other industry players which rely on customer preference, the business organization opted to create what is fashionable for the customer. The whole marketing mix of Leslie Fay can be stated as offering fashionable clothing at a moderate price in department stores and enhancing a customer experience by offering seasonal discounts. Armed with this strategy, Leslie Fay captures its market niche and creates strong brand equity. In terms of financing, the firm relies both on liabilities and equities. It can be recalled that Leslie Fay banked on its prominence and profitability and went public in as early as 1952. The technology is seen as insignificant in the operation of Leslie Fay.

Economic Crisis Research Paper Example | Topics and Well Written Essays - 2000 words

Economic Crisis - Research Paper Example Eventually, critical evaluation of the policies is exercised in order to execute cross evaluation procedure and suggestion of optimal policies are being stipulated in order to strengthen the policy implication paradigm. The propulsion of the economic crisis in 2008-2009 is the devastating economic crisis that the world faced in the past six decades. The crisis was predicted by a host of economists but it was mainly unforeseen. In the World Economic Outlook, the International Monetary Fund (IMF) even inferred that the threats to the global economy are minimal and for the moment there were no anticipations of any severe economic downturn. The juncture before the crisis was infested with widening global imbalances but owing to the virtue of the world’s largest capital markets and its stable financial regulation and political stability, they saw the global imbalances with sustainability angle. Apart from that the emerging developing countries also found a secure place for investin g their funds in order to earn a huge benefit so that they could sustain their position and enhance their credibility in the debt market in the long run. The United States was also considered to possess a superior monetary policy institutions and monetary policy and monetary policy making environment. But the world economy was shattered with the launch of the economic crisis and the crisis shook down the roots of the formidable US economy (Verick & Islam, 2010, p.v). The evil effects of the crisis led to the shattering down of the trade scenario of the world economy with the plight of tremendously declining unemployment rate of the developing economies and subsequent rescue efforts of the government. Launch of the crisis The global economic crisis emerged in September 2008 following the collapse of the strong US financial institution, the Lehman Brothers with the result of the accumulation of the defaults on the mortgages and the derivative products (Lin & Treichel, n.d., p.7). Imme diate impact The financial sector crisis very quickly led to the significant decline in the credit volume in the private sector as well as sharp rise in the interest rates. The equity market crashed and the real growth rate around the globe declined significantly below the projections and the US along with the developed economies. The only exception was China and developing Asia who maintained robust growth (Lin & Treichel, n.d., p.8). The root causes The microeconomic dimension Real estate bubble burst The primal reason for the outburst of the crisis was the bubble burst in the US real estate market. As the house price falling rapidly in the second quarter of 2007, the growth rate of the prices of the real estate saw a declining trend since 2005. In the late 1990s, the housing prices began to rise sharply and deviated from their fundamental characteristics. Reaching the summit in April 2006, the bubble burst rose heavily with the tightening of the monetary policy of the Federal Res erve. With signs that the exaggerated rise in the real estate was coming to an end, the banks decided to issue NINJA loans which were made without any prior income declaration from the borrowers to start paying off debt. With the intensification of the downturn in house prices, the mortgage

Tuesday, August 27, 2019

Management Essay Example | Topics and Well Written Essays - 500 words - 31

Management - Essay Example These factors have enable the firm be the best semiconductor chip manufacturer globally. The company currently enjoys a wider market and increased profits. The two factors are of essence in the existence of a business. Intel thus has a number of strengths and these include effective marketing. There is no doubt to the fact that the firm has one of the best marketing teams in the world. The company manufactures information technology devices. It is therefore more likely for the firm’s employees to be technologically savvy. Such a team knows what to do to result in increased publicity for products. Within no time, the products and services of the business are uploaded onto the social networking platforms alongside the other conventional media. The social media offers clients a unique opportunity to stay a head of their competition; the customer literally interacts with possible clients who may develop customer infatuation with products (Alexander 128). Besides the extensive and very elaborate advertisement parameters, the company enjoys a favorable reputation. This factor comes from the fact that it has existed for a very long time and is arguably among the pioneers of modern day computing technology. The high quality of its chips is thus known and highly regarded. Such occurrences make clients develop loyalty with the given products. Customer loyalty as well as interpersonal recommendation is the most effective form of advertisement. With these, the firm enjoys positivity and commands a large customer base globally. Additionally, the firm currently enjoys the increased revenue because of the market segment it targets. It is common knowledge that the market is divided into two; there are those who shop while attaching more importance to the price of the commodity while there are those who attach heir shopping decisions on the quality of the products. Subscribers having a belief in quality will buy any good regardless of its price provided the

Monday, August 26, 2019

Managing Organizational Change - Project proposal Essay

Managing Organizational Change - Project proposal - Essay Example While going through literatures, I found impressing that ‘resistance is a resource, an opportunity and a power’ (Palmer, Dunford and Akin, 2009 and Ford and Ford, 2009) as resistance can help managers gain more ideas and feedback about the proposed changes. The course project paper will consider this as a personal model for specific change management and describe its theoretical perspectives and practical evidences based on relevant literatures. Exploratory research will be used in the paper to describe the change management concept of ‘resistance to change’ and to explore strategic initiatives to manage resistance, based on reviewing various relevant literatures in the field, taken from books and journals accessed from sources like EBSCO, Emerald etc. Apart from the course text book, journals will be used to review the literature that explores organizational resistance to change. Out of journal sources, the scholarly articles, Decoding Resistance to Change: Strong leaders can hear and learn from their critics by Ford and Ford (2009) and Navigating Organizational Change: Change Leaders, Employee Resistance and Work-based Identities by Dijk, R. V and Dick, R. V (2009) will be of greater use in the research paper as these sources have detailed much about managing resistance and approaching it as power and

Sunday, August 25, 2019

IBM and the Holocaust Essay Example | Topics and Well Written Essays - 1500 words

IBM and the Holocaust - Essay Example IBM’s German subsidiary, called Dehomag, once put up a poster in German whose translation to English meant â€Å"see everything with Hollerith punch cards.† This poster, while at the time simply advertising the importance of punch cards in capturing individuals’ information, have been found to have been the reason why the Nazis found it easy to carry out mass murders of the minority groups in Germany. Dehomag is the acronym for the company Deutsche Hollerith Maschinen Gesellschaft (German Hollerith Machine Corporation); a company established in 1910 by Willy Heidinger. Heidinger later sold the company to American industrialist Charles Flint. Through various stages of acquisitions, Dehomag eventually became a direct subsidiary of CTR which was later renamed to International Business Machines in 1924 (Jeffery, 2001). The idea of punch cards had been conceived by Herman Hollerith about the year 1880. Hollerith was working for the US Census Bureau. The punch cards were basically readable cards with perforations in a standardized pattern. Every perforation represented a given piece of information about the individual such as their nationality, occupation, gender, and so on. The traits could be easily sorted out to give the desired picture of a given population. For example, gender could be used to divide the country into males and females (Hayes, 2000). Adolf Hitler and the chief executive officer of IBM Thomas J. Watson are two of the people most famously accused of the genocide in Nazi Germany. While Hitler broadcasted his hate messages against the Jews (and other races), he found fanatics among great men such as Henry Ford and Thomas Watson. With IBM’s presence in Germany and with Hitler at the helm, it was not by chance that Watson fueled Hitler’s aims. While, in my opinion, Watson and IBM are victims of circumstances, their role in the holocaust shall remain significant. If they had turned down Germany’s use of punch cards, they would not have prevented the holocaust since Germany would have obtained the technology anyway.

Saturday, August 24, 2019

Aldi moves beyond competing on price Essay Example | Topics and Well Written Essays - 1000 words

Aldi moves beyond competing on price - Essay Example In the process they have also changed competitive environment. In the face of such changing economy supermarkets like ALDI should respond to its environment, and take strategic actions to not only sustain growth but also improve on its competitive position in the industry. The UK supermarket industry in 2008 accounted for retail sales of approximately  £124.1bn and performed well compared to other industries despite market gloom (Verdict 2009). This combined output has been generated by the various categories of supermarkets - large grocery retailers, regional retailers, fascia group, convenience stores, LADs (limited assortment discounters), frozen food retailers and specialist retailers (Verdict 2009). Despite its financial size, the supermarkets industry is driven by the major large grocery retailers which account for 85 percent of its sales and four dominant supermarkets (Competition Commission 2008). Although, ALDIs direct competitors are Lidl and Netto, it is also competing with the other categories of retailers. Considering this scenario, ALDI which is a LAD must consider its competitive environment in order to devise strategic plans for sustainable growth. To analyze the industry, Michael Porters (1985) Five Forces Model is being used to gauge the competitive environment. The Five Forces include buyers bargaining power; suppliers bargaining power, threats of substitutes; threats of new entrants; and the degree of rivalry among the firms. These shall be analyzed as follows: The supermarkets are the price-takers according to the Competition Commission Report (2008) which means that the consumers have to buy at the price set by the supermarkets. The supermarkets compete based on prices which although allow consumers a wide range of retailers to choose from but the nature of the product (food) allows them to be

Friday, August 23, 2019

Social Class and Impact this has Upon Young Children's Learning and Essay

Social Class and Impact this has Upon Young Children's Learning and Early Years Practice - Essay Example This essay sresses that the primary purpose of this study was to identify the parenting practices that mediate relations between persistent, recent, and transitional poverty and the externalizing and internalizing behaviors of 0- to eight-year-old children. Poverty was hypothesized to influence children's externalizing and internalizing behaviors indirectly by affecting maternal emotional unresponsiveness, use of physical discipline, fewer stimulating experiences, and a lower-quality home physical environment. With the exception of the effects of poverty transitions, poverty estimates generally cross-validate. This report makes a conclusion that negative relations between poor social class transitions and fewer stimulating experiences, lower-quality home physical environment, and children's externalizing and internalizing behaviors were unexpected. A possible explanation for these findings is that parents use financial resources in periods of relative economic prosperity to enhance the quality of the physical environment and ease economic hardship during years of poverty. This interpretation is consistent with Garrett, Ng'andu, and Ferron's NLSY study, which found that increases in family income had the strongest effect of any predictor on subsequent total HOME scores for children who were born poor. The large increase in the total effects of persistent poverty on both outcomes when the poverty transition variable was placed in the model suggests that the effects of poverty could well be much greater in the absence of periods of relative economic well-being.

Thursday, August 22, 2019

Should People Make More of an Effort to Keep Things Private Essay Example for Free

Should People Make More of an Effort to Keep Things Private Essay People should make more of an effort to keep factors of their life private. For example when you see some people on Facebook updating about what they had for breakfast. I do not think we need to know that isnt them truly expressing themselves however that seems to be what they think they are doing. You shouldnt express yourself via the internet it should be what you do in certain situations and how you do it that express who you are. Today, many seem to not to want to keep some mystery about them. In addition, the internet does make this difficult as all you have to do is Google somebody and you can find out where they live, work, what their hobbies are and even who their family are. Initially, the fact you can find this information so easily is incredibly scary. Also it takes away the mystery of meeting someone and getting to know them when you can flick through their Facebook pictures and find out what they wore last Christmas. We expect people to respect our privacy but then we go and post all our details, this makes us hypocrites. I understand not everyone may do this but the majority do, if you post pictures on the internet, put your name and number anywhere you are giving away your privacy. Even the governments cannot respect our privacy. They put security cameras on every corner, in every building. Understandably they prevent and solve crimes but as a result it removes our privacy. Also, it is a huge factor in being a nanny state where we no longer have any privacy or the freedom to make decisions. They should respect our privacy and trust their people. However, should they respect our privacy if we think we have the right to know about their private lives? For example, we know all about Arnold Schwarzeneggers love child but should we be privy to this information it doesnt affect is ability to do his jobs. Also football players are a good example as many of them have affairs but it doesnt affect how they play. Why do we know intimate details of their life? Why do we feel we have the right to it? We wouldnt want everyone in our street knowing details like that let alone wanting it to be common knowledge internationally. We should respect their privacy as long as it does not affect how they act publicly. In conclusion, even though the media may not respect some individuals privacy and the governments may take ours as a bi-product of protecting us people should make more of an effort to keep some factors of their life private. As I said at the beginning people should retain some mystery and express themselves truly by what they do and how they do it. Yet, they may feel free to express themselves by telling us about their breakfast if it is a humorous anecdote or an interesting metaphor.

Wednesday, August 21, 2019

Community Policing Essay Example for Free

Community Policing Essay 1. Explain the concept Total Quality Management (TQM) and give examples of each stage of the process (Lesson Two Notes and Internet Research). TQM is a structured approach to organizational management. It entails several steps to identify, assess and implement solutions to problems. The first step is to identify a problem: This could be a patient complaint or an internal process that is not working. The next step would be to assess any needed corrective action. This is done through teamwork and collaboration by brainstorming on how the complaint can be resolved or what part of the process is not working. The questions to ask are; how can we improve? Additional steps are implementing the new process and checking the quality to see if it is actually an improvement. This is done through feedback, surveys and visual observance. 2. How is the nature of crime changing? What types of crimes do you feel we will have to deal with in the future, possibly some that we presently do not deal with? Crime has been changing in numerous ways. With the internet, to name a few, there are crimes of fraud, identity theft and hackers using spam and viruses to steal information and funds. Bank robberies are occurring online and criminals are avoiding the risk of getting caught by robbing them in person. New drugs are manufactured or smuggled into the US constantly and law enforcement is not able to keep up. With the advancements of electronic technology, I foresee many crimes being committed against people who use electronics solely for protecting their home, investments, etc. Hackers will be able to bypass any home security system and gain entry through electronic means. We will no longer be safe in the fortress we thought was solid. Another crime that has the potential to escalate is the creation and selling of coins simila r to bitcoins. Because they are relatively new, people don’t know much about them and take a risk in investing in them. I can visualize fraud and Ponzi type crimes as a result. 3. Explain what is meant by the title of Chapter Two: Engaging in a Changing Society. Be sure to give examples. Actually the title is â€Å"Partnerships in a Changing Society† and discusses the relationship between the community and police as times change. This includes a number of concepts like; communitarianism, in which a community is given the rights and responsibilities to take care of itself by  developing community watches, preventing drug dealers from selling in their neighborhoods; social capital, which is a form of bonding between the community and its individuals, like churches and schools. And last but not least there are volunteers who provide an invaluable service to the police free of charge. These services range from fundraising to helping out in soup kitchens. 4. How does the traditional police organization contrast with the community problem solving strategy of community policing? There are several ways traditional policing contrasts with COPPS. Initially, the government was solely responsible for ensuring laws were enforced while now, both the public and police work together to prevent crimes. In the past, issues important to the police were not important or not taken seriously by other public service departments. In today’s policing, they all assume some responsibility in trying to improve quality of life. Crimes that netted high values were the focus of law enforcement while now, crimes that disrupt a citizens way of like and is of concern has become the focus. These are but just a few ways the two contrasts. 5. How can government most effectively expand its commitment to customer service? Currently, the government has offered services online as well as post updated information to be reviewed by the public. These include; calls for services as some police departments, sheriff’s departments share information about sex offenders in the area as well as arrests and police reports on a daily basis. By providing this type of information to the public, it shows the government as being a willing participant in an effort to protect our communities.

Computer Forensics And Crime Investigations Information Technology Essay

Computer Forensics And Crime Investigations Information Technology Essay With the progression of time and advancement in technology, our digitized nation has and will become more dependent on computers as we use them in our daily lives whether it be at school, work, or for personal use. By evaluating past trends it is safe to calculate a rise in crimes using computers. Today criminals put a strain on computer forensic examiners, because there are few crimes that are committed without the involvement of a computer or any other computing device of some sort. Today with computer hardware and software becoming more sophisticated and portable along with wireless technology this broadens the definition of computers, but for this research a personal computer is the extent of the subject. With technology constantly evolving and with the definition updating what is to be considered evidence, this is why proper training and education is necessary. This is why it is imperative to examine crimes where computers play a role in a crime and it is essential to find any potential evidence located on the digital media. For a person charged with an offense, their charge in the case can be weakened if the investigation fails to find any such evidence. This is why it is imperative to create, build, and improve a national standardization and certification for the computer forensics field. The Statement of the Problem The definition of computer forensics may vary slightly depending on the authors on the subject. One of commonly known definition refers computer forensics as the acquisition, examination, and reporting of information found on computers and networks that pertain to a criminal or civil investigation (Kessler, 2005). Computer forensics is becoming increasingly important due to growth of crime-rates involving the use of computers and the Internet. Although such a trend is difficult to control completely, computer forensics technologies and applications provide necessary tools to law enforcement and other agencies to assist in crime investigations. Computer forensics is effectively used in solving cybercrimes; however, its use reaches far beyond just that. As many criminals engage in more sinister crimes-such as murder, kidnapping, sexual assault, and terrorism-also maintain incriminating information on their computers, recovering damning evidence from their computers often provides law enforcement crucial discoveries during investigations. There are numerous real-life crimes that were solved by use of computer forensics, and the significance of computer forensics continues to increase as technologies develop. However, computer evidence does not always provide solid traces of information necessary to prosecute a criminal due to computers volatile and virtual nature of data storage. Proper processing of computer evidence is essential to establishing credibility of evidence collected from computers and other peripherals, and it is computer forensics experts responsibility to ensure that the evidence is valid, uncorrupted, and unq uestionable. Why research this topic During a computer investigation, the computer system that is suspected to have to possible evidence must be properly handled by a professional. They investigator must create a copy or true image (bit stream) of the original media, which would be inspected later in the process for crucial evidence. When inspecting the copy the investigator will look for specific expressions or key words to establish any vital digital evidence that exists or has been deleted. The types of incriminating digital evidence could be many such as: racial discrimination, sexual discrimination, stock fraud, blackmail, and numerous others. To help promote fast turnaround time computer forensic professionals have the aid of commercial software packages like X-Ways Forensics, Encase, and several other commercial and open source utilities. Unfortunately, the consequences of not following precisely these steps can lead to the lost of evidence itself, and therefore it is important to create, build, and improve the m ethods of performing well-organized searches in order to trace evidence. The need for a current study in the computer forensics field is important for the future of not only the computer forensics field, and law enforcement, but for the legal system and everyone else who uses a computer. Today in our digital nation, we are becoming more dependable on technology and its many branches of devices. This has lead to make investigators ask themselves what type of computer crime has happened, what is considered evidence, and how to handle it. Methodology As time and technology progresses computer forensics is a very important factor on the war in computer crimes in our nation. Most reading suggest in order for computer forensics to properly be considered by the courts as a scientific discipline there has to be proper education, training, and testing for adequate certification. The time frames from the readings were 2000-2010, but a majority of them were from 2004 2006. There has been improvement in recent years to develop a national unified approach in undergraduate and graduate programs. Hypothesis Computer forensics is a relatively new field and discipline in the private sector compared to other forensic sciences. Computer forensics is the science of acquiring, preservation, identification, extraction/retrieving, and documentation of computer evidence that has been processed by electronic means and stored on a computer without altering any of the data in the process. With our rapidly evolving improving technology this has lead the definition of computer forensics to be interchangeable with digital forensics, which expands the definition to include PDAs, cell phones, and other portable devices. When conducting a forensic investigation with computer evidence; the investigator must perform particular procedures to guarantee successful evidence collection. The evidence collected can be useful in civil disputes, criminal cases, computer system break in, recover data, and human resources/employment proceedings. As our homes, workplaces, and organizations become more incorporated wit h the aid of information technology and the Internet; we also have to take into consideration the human element as a factor. This is why current research is needed to tailor programs for computer forensics to keep up with advanced criminals. background In order to prepare for the future we need to look in the past and try to figure out how we got here and how to fix some of the problems. Technological progress is like an axe in the hands of a pathological criminal. (Albert Einstein) As technology changes and the words that explain it there is the unchanged motives and emotional needs that drives the criminal behavior. With this in mind we need to understand the intentions of the inventors for the computer and the Internet. Before the invention of personal computers and the Internet these technological tools were used exclusively for scientific leaders and the military; which were located in either military bases or major university campuses. Half a century ago, the technology we use today might have seemed like science fiction. The first general-purpose electronic computer was the ENIAC, Electronic Numerical Integrator And Computer. The intentions of the creators were to design a machine for mathematical power for computing. The Un ited States Department of Defense began funding of ARPA (the Advanced Research Projects Agency) and in 1969 the Internets first long distance electronic communication was made. The intentions of the creators were to create an instrument to guarantee an infrastructure between military installations. The goal of computer forensics is to recover and preserve digital evidence and to understand as much information regarding to the data as possible. The need for a computer forensics examiner is after the fact electronic information has been altered, deleted, or stolen in a computer crime. As with any other types of crimes it is a fact that the criminal leaves behind traces of their activity and these traces are the smoking gun that leads to prosecution in the court system. A computer forensics specialist is more than a computer expert; they must know how to effectively perform complex evidence recover procedures. These procedures include: data duplication/preservation, data seizure, data recover, document searches, expert witness services, media conversion, computer evidence service options, and miscellaneous services. A computer forensic examiner must follow federal guidelines for data seizure. One course of action allows a representative to examine and duplicate designated documents or data compilations that may include evidence, and it is The Federal Rules of Civil Procedure. When data is duplicated or preserved the main concern is that data must not be altered in any way. Data recover is performed using dedicated tools for computer forensics to safely recover and analyze evidence. A document search is the ability to understand storage technology and perform a search with speed and efficiency. Media conversion is the ability to find and cross-examine data from the source or unreadable device, extract data and convert it into readable formats. Part of being a computer forensic specialist is to at times be an expert witness, and explain complex technical processes in an easy to understand manner. Some level of services that should be offered is on-site, standard, emergency, priority, and weekend s ervices. Other miscellaneous services include analysis of computers and data, on-site seizure in criminal investigations. Also an advantage is the ability to work on both PC and Mac O/S and a fast turnaround of time. Overview of Computer Crime Today criminals usually are one step ahead of law enforcement agencies and they have the knowledge to use computers to their gain, and they have the ability to cover their tracks. Since technology is constantly changing definitions are quickly becoming outdated as new definitions expand new offenses to computer crimes. However, computer crime can be generally categorize into four categories and they are criminal activity that involves using a computer as an instrument to commit a crime, criminal activity that has a computer as a target, such as hacking into, criminal activity when the computer was unintentionally part of the crime, and crimes frequently associated with the use of computers. With this new definition computer crimes in 2009 have increased 22% from 2008. The computer as an instrument of a crime When a criminal uses a computer as an instrument in a crime we can think of it as when a burglar uses a crowbar or lock picks as in instrument to enter a house. For this research, when a computer is used as an instrument of a crime there objective is to obtain data to commit fraud, theft of service, harassment and other illegal activities through a network by copying data rather than deleting. Theft is when a criminal unlawfully takes and carries away property or service without the permission of the owner. The property and service can range from personal/private information, financial information, security information, human resources information, internet access and trade secrets. With the stolen property or services the criminal can reproduce false identification, copyright material, and distribute child pornography among other types of crimes. Another use of a computer is by writing letters or e-mails to make threats, harassments, or stalk individuals. Computer as a target When a criminal targets a computer as part of the crime they launch an attack on computers or networks trying to deny service by denying the rightful user access to their own computer system or data. Another attack could be to damage or alter the computer system or data by browsing through valuable information stored or saved on the computer. When a computer is vandalized this also is considered as a computer as a target, because valuable information stored in the computer is denied to the rightful owner. The computer as incidental to a crime In a crime scene a computer can be seen as a subsidiary tool to a crime when criminals use the computer to simplify their transactions. These crimes could happen without technology, but the computer assists the criminal in their transactions which might include child pornography, money laundering, leads to other crimes and other criminal information. This computer crime evidence could have names of victims, associates, clients, and perpetrators personal information. Crimes associated with the prevalence of computers Technology advancements have created new targets of conventional crimes and the targets are on the industry. This includes academic property, software piracy/counterfeiting, copyright infringement of computer programs, black market computer equipment, counterfeit equipment, identity theft, and programs, and theft of technological equipment. The most common use of this crime is piracy or the violation of copyright infringement of commercial software COMPUTER FORENSICS SERVICES Today on television there are shows that portray crime scene investigation while using computer forensics, and they give the audience a little glimpse into the world of computer forensics. When in reality computer forensics is meticulous work, but the shows leave out all the details of the process. Computer forensic today based on a theory of trace evidence, and this theory is build upon the development of forensic science. One of the motivating factors in the development of forensic science was by 20th century forensic scientist Edmond Locard, and his theory was called the The Locard Exchange Principle. The Locard exchange principle states there will always be an exchange when two items come into contact, and that the contact(s) will bring something into the scene of the crime and leave behind something in the scene, therefore leaving a trace of evidence. Although trace evidence might be small yet important information found in a computer, it alone is not enough to make a case. Traces evidence can might be the smoking gun that leads to a successfully win in a court case. No matter how well the criminal tries to cover up their tracks, in todays society with computers hooked up to a network or wirelessly leaves traces of stored data on a computer to be found. This is where the skills and services of a computer forensics specialist will come in handy. This section is where computer forensic specialist and self proclaim computer experts get divided into separate groups. The field of computer forensics is vital to law enforcement agencies, because the procedures to protect and present evidence in court are followed by the requirements of the judicial system. There are plenty of computer experts who know how to search through files, point, click, copy, and make directory listings, but a computer forensics specialist does more than this. A computer forensics specialist must be familiar with and understand in detail how files systems are created, accessed, deleted, and changed. With training and experience a computer forensics specialist understands the methods and techniques for securing and acquiring evidence without altering it in a legal manner. Acquisition Just as any other type of evidence, digital evidence also comes across some difficulty. So why go through the trouble of collecting it? It is because if we dont try to figure out who committed the crime, why they did it and how, then we will never be able to stop them or anyone else from committing a crime again. This is why trying to recover all possible deleted files is crucial. Areas to look evidence can be in the hard drive, page files, temporary or swap files, and unallocated space. When collecting evidence in this step no changes or modifications to the evidence must be made or else the evidence will be considered inadmissible. Preservation When a proper warrant is issued the ability to protect data from a recovered system must be protected and unaltered in any way. The computer forensic specialist should pay close attention to this step in trying to avoid the notorious Murphys Law. To avoid this mishap at this point in time an exact duplicate copy should be made in order to preserve the best evidence, the original evidence. One of the most effective ways to back up is the use of bit stream image back-ups. This method copies and preserves all data enclosed partition, logical drive, and physical drive in the hard drive. Another idea to think about when preserving digital evidence is where to save it, and that depends on the investigator and the organization they work for. Analysis The person conducting and analyzing the evidence in the investigation but be able to guarantee that the result of an conclusion came from the evidence, and were not in any way a part of contamination or error. One area that the computer forensic specialist can control is making sure hardware and software are working properly. They can also check to make sure their equipment is up to date with updates, verify licenses, and know how to use the equipment. A vital process to conduct analysis is creating a hash value. The hash value is created with software to produce a unique value, like a digital fingerprint, produce a mathematical value. Documentation This process is crucial in the field, because if one mistake is made in reporting of evidence, then any other evidence could be questioned. Once the evidence has been indentify everything encountered with the use of a digital camera, video camera, or pen and paper or a combination of two. Once this is done, then all evidence must be labeled and any devices attached to the computer along with ports and wires connected the two. In case a computer forensics investigator is testifying in a court case, then the documentation process will help the investigator jog their memory. In conclusion, following these steps is crucial in computer forensics because it builds stronger methods within time. Experience and training of software can result in better search techniques to build a better and faster turnaround time. There is a need for a current study to identify future trends and concerns in judicial system on the subject of digital evidence and computer forensics. With the data gathered on future trends schools and computer forensic field can educate and train future forensic investigators with current and proper techniques to keep up with criminals. References

Tuesday, August 20, 2019

Liberalism, Civic Reformism and Democracy Essay -- Argumentative Argum

Liberalism, Civic Reformism and Democracy This paper argues that liberalism provides democracy with the experience of civic reformism. Without it, democracy loses any tie-argumentative or practical-to a coherent design of public policy endeavoring to provide the resources for the realization of democratic citizenship. The case for liberalism rests on an argumentative reconstruction of the function it performs before the rise of a world economic order and, more specifically, in the creation of the welfare state after the Second World War. Accordingly, liberalism defines a reformist political program: it is an emancipatory political project by virtue of its struggle for an egalitarian and universalist extension of citizenship rights. This is but a formulation of the modern idea of citizenship, conceived of as a universalizable contract of rights. At the same time, liberalism embraces a socioeconomic emancipatory project that endeavors to provide the conditions, within the institutional framework of modern societies, for the ac complishment of citizenship rights. The origins of liberalism in the seventeenth century tell the story of the struggle for recognition of religious tolerance. This early form of pluralism provided the antecedent for the constitutional recognition of civil rights, interpreted in terms of universal adscription. A further step of constitution-building in liberal polities was taken when the universal principles of equality and liberty assumed the status of fundamental rights. That happened under the form of a constitutional program aimed at the improvement of the civil condition. Liberalism as a revolution of rights not only meant the conquest of civil rights by society, but also their extension by constitut... ... Studies, 1, pp. 73-86. Rawls, J. 1993: Political Liberalism. New York: Columbia University Press. Rosales, J. M. and J. Rubio-carracedo 1997: "To Govern Pluralism: towards a Concept of Complex Citizenship", in W. Krawietz, E. Pattaro and A. Erh-Soon Tay, eds., Rule of Law. Berlin: Duncker & Humblot. Sen, A. 1992: Inequality Reexamined. Oxford: Clarendon. Turner, B. S. 1986: Citizenship and Capitalism. London: Allen & Unwin. ____ 1997: "Citizenship Studies: a General Theory", Citizenship Studies, 1, pp. 5-18. Van steenbergen, Bart 1994: "Global Modelling in the 1990s. A Critical Evaluation of a New Wave", Futures, 26, pp. 44-56. Vogel, U. 1991: "Is Citizenship Gender-Specific?", in U. Vogel and M. Moran, eds., The Frontiers of Citizenship. Houndmills and London: Macmillan, pp. 58-85. Walzer, M. 1983: Spheres of Justice. New York: Basic Books.

Monday, August 19, 2019

Essay on Personal Freedom Song of Solomon -- Song Solomon essays

Search for Personal Freedom Song of Solomon      Ã‚  Ã‚   Personal freedom is the ability to ignore societal and familial influences to find the true sense of self. Individuals are truly liberated when they are physically, mentally, and spiritually free. The search for personal freedom is exemplified in Song of Solomon by Toni Morrison. The main protagonist, Milkman achieves personal freedom through attainment of knowledge, by confronting his family, and by overcoming the prejudices of society.    Knowledge is a primary factor in the attainment of personal freedom. This includes not only scholarly education but also awareness of historical heritage and familial legacy. The fact that African-Americans were held in human bondage cannot be forgotten; it has to be remembered and passed on through rememory. Moreover, literacy gives minority cultures a voice to reach out to others with encouragement and hope.    Milkman has a high school education which he took for granted. For Milkman to achieve personal freedom, he needs to search for his ancestral roots. Milkman's father, Macon Dead, Jr., denies Milkman his rememories because Macon assumes that achieving the American Dream means erasing his past. However, as stated above, Morrison believes Milkman has to remember; he has to know his past in order to know his self. His father taught him that Athe one important thing you'll ever need to know: Own things. And let the things you own own other things. Then you'll own yourself and other people too@ (Morrison 55). Macon falsely leads Milkman to believe that "You'll be free. Money is freedom Macon. The only real freedom there is" (163). Milkman buys into his father's fallacy as he too frantically searches for the gold that will s... ... personal freedom is not an easy one, but we must persevere. Milkman's realization of his personal freedom came as his life ended. We must all remember the old Chinese proverb "The longest journey begins with a single step".    WORKS CITED Carmean, Karen, Toni Morrison's World of Fiction, Troy: The Whitston Publishing Company, 1993. Morrison, Toni. Song of Solomon. New York: Plume, Peach, Norman. Modern Novelists Toni Morrison. Ed. Norman Page. New York: St. Martin's Press, 1995. Storhoff, Gary. "'Anaconda Love': Parental Enmeshment in Toni Morrison's Song of Solomon." Style 31 No. 2 (Summer 1997). 290-309. September 18, 2001 <http.//p26688.cl.uh.edu:2071/cgi-bin/web>. Willbern, David. "Reading After Freud." Ed. G. Douglas Atkins and Laura Morrow. Contemporary Literary Theory. Amherst: University of Massachusetts Press, 1989. 158-179.

Sunday, August 18, 2019

Cosmology :: Essays Papers

No one knows how the universe began but there are many theory’s, and ideas man has created to explain how we got here and how everything else around us came to be. There are many different cosmologies. Cosmologies are theories of how the universe began. Physical, biblical, and mythical are theory’s based on personal beliefs. Some people don’t give the universe a second thought and like to stick to what they were first told. Others such as philosophers tend to explore all options and all aspects of how we came to. How did we become, how do we become, and what will we become are great questions. An even greater question is how everything we know did and even things we don’t know become? We probably in this lifetime will never know entirely, but if we do soon, that will be an even greater step for man than walking on the moon. Physical theories such as the big bang are based upon the universes finger prints. Radio active fingerprints that is. We can trace back a single pebble to at least 13.73 Billion years ago. The big bang theories are based off some theories you may or may not know like the string theory. The sting theories itself has many different theories based on it and many mathematical equations based on thoughts. Physical theories are well beloved by scientist, and have a lot of circumstantial evidence that back them up. But no one theory is 100% perfect. They all have a flaw in them somewhere. Biblical Theory’s are very unreliable and do not have a lot of evidence to prove them. Genesis 1 states. â€Å"In the beginning God created the heavens and the earth. Now the earth was formless and empty, darkness was over the surface of the deep, and the spirit of God was hovering over the waters. And God said "Let there be light," and there was light. God saw that the light was good and he separate the light from the darkness. God called the light day, and the darkness night. And there was evening, and there was morning.-the first day." Now this is all fine and dandy, but "God" has not told us how he came to be, or how when he said light it was just there cause he said it. Well if there was no light before how did "God" even know about light? Was he just living by himself in the darkness not doing anything so he got bored one day and decided to create life.

Saturday, August 17, 2019

Kinds of System

Is a system that captures, enters stores, retrieves and processes the relevant details of business events, and generates the information/document necessary for running he organization and interfacing with external entities, such as customers. Transaction – Is the process of dlvldlng a body of data Into blocks and spreading the data blocks across several partitions on several hard disks. Features of Transaction Processing Systems 1. Rapid response – fast performance with rapid results 2.Reliability- well designed backup and recovery with a low failure rate 3. Inflexibility – treat every transaction equally. It may be used many times each day which means it has to be precise and inflexible 4. Controlled processing – maintain speclflc requirements for the roles and responsibilities of different employees. Types of -rps Batch processing Is where the Information Is collected as a batch and then processed later on. An example of batch processing is paying by che que.Batch processing is useful for enterprises that need to process large amounts of data using limited resources Batch Processing system Real Time Processing is where all details of the transaction are recorded and changed at the time as It occurs. Examples of real time processing are ATM's. The importance of data In transaction processing: Data security Is Important as data Is often confidential or has a commercial value, herefore, it needs to be protected from unauthorized access.Data accuracy means that the data is correct and that the data is up to date (current) Data integrity describes the reliability of data. This will include statements of data currency, correct entry of data and accuracy of the data. TPS serve two purposes. 1 . To support day-to-day, routine operations by being made accessible to those parts of the organization (as well as to external entities) where they are needed. 2. To feed 1 OFA effectiveness and efficiency of the operations. The computer system media ting between the humans and physical reality in an nventory application.Updates brought about by a transaction are of three types: Adding a new record, such as when a new customer signs up Changing an existing record, such as changes in credit available for a customer when that customer makes new purchases or returns already purchased products Deleting a record, such as when a product is discontinued TPSs are characterized by Large amounts of input/output Large number of users Huge storage requirements Low computational complexity Fast input/output as well as processing capabilities A high degree of concern for potential security related problems A high degree of oncern for reliability and fault tolerance.Five Stages of Transaction Processing Data Entry Processing Database Maintenance Document And Report Generation Inquiry Processing Management Information Systems Provide information in the form of reports and displays to managers and many business professionals to support business decision making. A management information system is an information system that uses the data collected by the managers can use it to make routine business decisions in response to problems. Some of the reports that this information systems creates are summary, exception and ad hoc reports.All this is done to increase the efficiency of managerial activity. Most management information systems specialize in particular commercial and industrial sectors, aspects of the enterprise, or management substructure. Management information systems (MIS), produce fixed, regularly scheduled reports based on data extracted and summarized from the firm's underlying transaction processing systems[5] to middle and operational level managers to identify and inform structured and semi-structured decision problems.Decision Support Systems (DSS) are computer program applications used by middle management to ompile information from a wide range of sources to support problem solving and decision making. Exec utive Information Systems (EIS) is a reporting tool that provides quick access to summarized reports coming from all company levels and departments such as accounting, human resources and operations. Marketing Information Systems (MIS) are Management Information Systems designed specifically for managing the marketing aspects of the business.Office Automation Systems (OAS) support communication and productivity in the enterprise by automating work flow and eliminating bottlenecks. OAS may be implemented at any nd all levels of management. School Information Management Systems (SIMS) covers school administration, and often including teaching and learning materials. Enterprise Resource Planning (ERP) facilitates the flow of information between all business functions inside the boundaries of the organization and manages the connections to outside stakeholders.Advantages The following are some of the benefits that can be attained for different types of management information systems. Co mpanies are able to highlight their strengths and weaknesses due to the presence of revenue reports, employees' performance record etc. The identification of these aspects can help the company improve their business processes and operations. Giving an overall picture of the company and acting as a communication and planning tool. The availability of the customer data and feedback can help the company to align their business processes according to the needs of the customers.The effective management of customer data can help the company to perform direct marketing and promotion activities. Some disadvantages can exist when using a management information system in a company. Expensive Installing a management information system can be expensive for a company. Information technology†while cheaper today than previous years†can represent a significant expense, especially for larger organizations. These systems may also require ongoing support or upgrade fees, which can represen t future fixed cash outflows.Companies must create a budget to pay for these items to ensure the information system stays current with business technology. Attempting to integrate these systems with technology currently in use can also increase expenses. Companies may need to hire maintenance individuals to help keep an electronic information system running smoothly. These individuals often need experience in omputer science functions and other business topics. Not only does this increase labor costs, but it also requires additional training and ongoing education for these individuals.Business technology can change frequently, creating an environment where companies must have trained individuals who can properly maintain computers, websites, servers and other equipment in use by the management information system. Ineffective Management information systems have the potential to become ineffective in a company's operations. As with all computer systems, the management information syst em is only as good as the programmer. Gathering unimportant or non-essential information can delay business decisions because managers must request additional input.Spending too much time reprogramming or correcting issues can also increase the time spent in the decision-making process. Business owners and managers may also need extensive training on new systems, creating a learning curve that will hopefully diminish over time. Unemployment While information, Information Security Selection Software Evaluation Reports, they secure Information Exchange in an Insecure World, Lack of Job security, Dominant culture , there is no privacy, expensive, maintenance and ineffective.

Friday, August 16, 2019

Behavioral Observation Project

Going to school is one of the most valuable social rituals people do. Staying for over 15 years at school, people earn an academic education that will shape their careers and lives. In school, people also meet friends and mentors who influence their personal beliefs. The early years in school are especially crucial for shaping foundations for virtues such as the proper behavior and self-discipline. Thus, grade school teachers are given the responsibility of instilling in their students the right qualities and attitudes.The learning site observed is a co-ed second grade class. The students are smart and energetic kids, with a few quiet ones thrown in. They come mostly from middle-class families and are of mixed ethnicities. They are still learning the core of education; spelling, writing, reading comprehension, basic geography, and fractions. Their teacher is male and a fresh university graduate; thus, he is younger than most of the faculty members. His youth presents itself in his in teraction and communication style.The teacher is approachable and authoritative at the same time. He is kind, friendlier, and less stiff than other teachers. He also has a more laidback demeanor that is evident in his non-verbal gestures, such as giving high-fives and thumbs up to his students as a way of affirming their answers. His students perceive him as likable and are also more relaxed with him. By their standards, he is seen as more of big brother type rather than a scary teacher. The respect he receives is different, but in no way less than what other teachers get.At times when the students get too noisy or when kids fight, the teacher lets out his more commanding side to discipline the students. The teacher aims to improve and influence his students’ behavior, such as building up their self-discipline to keep them from chatting with seatmates and increase the attention that they pay to the lessons. To fulfill these, he makes use of some reinforcing and motivating con sequences for the children’s actions. According to Skinner, using reinforcements is effective in helping shape or condition one’s reactions to stimuli.Thus, stimuli are called behavior influencers (Barker, Kreider, Peissig, Sokoloff & Stansfield, 2008) Positive reinforcement increases the desired stimulus while a negative reinforcement removes a negative stimulus. Both encourage one to continue whichever action will lead to one’s benefit and increased comfort (Feist & Feist, 2007). In the case of the second grade class, the most important stimulus is their grades. Having good grades leads to positive stimuli such as teacher’s praises, feelings of pride, and rewards from their parents.On the other hand, low grades bring about negative stimuli like dissatisfaction with oneself and disappointment from teachers and parents. The second-grade teacher uses public praises as positive reinforcements for kids who do well. By announcing how high one student’s grade is or by putting up the best artwork on the classroom corkboard, he highlights the student’s admirable behavior and quality of schoolwork, thus heartening the student to continue his or her hard work. The teacher uses mostly intangible reward to cheer his students on, as he hopes to motivate his students intrinsically rather than by bribes or physical rewards.Internal motivation will lead to a continued and better performance. He makes a special exception though for the case of a student with ADHD. He gives external rewards such as bowling games vouchers to this particular student to persuade him to continue his good performance and classroom behavior and continue his improvements. The teacher does not practice much punishment and extinction in the classroom. The harshest punishment he does is calling out a student’s name to get his or her attention back to the lessons. He was allowed to give them detention, especially when the kids get very naughty.His strength as an instructor and behavior model for the kids lay in the fact that he never had to give detentions because he is able to subdue a conflict before it even starts. He also understands the kids’ need to let go of pent-up energy and allows them to have some energy-releasing activities. The students receive punishment and extinction at home, mostly in the form of added chores for the former and revoked TV and video game privileges for the latter. The second graders are under the teacher’s excellent classroom management. The teacher’s policies are effectively and followed soundly.The teacher showed a perceptive understanding of when he should be friendly and when he should be authoritative with his students. Further, the behavior and discipline conditioning is enhanced by the good, trusting relationships between the teacher and his students. References Barker, B. , J Kreider, J Peissig, G Sokoloff, & M Stansfield. (2008). Glossary of terms for the experimental ana lysis of behavior. The University of Iowa. Retrieved February 9, 2009 from http://www. psychology. uiowa. edu/Faculty/Wasserman/Glossary/stimuli. html Feist, J. & Feist, G. J. (2007). Theories of Personality (6th ed). N

Thursday, August 15, 2019

Unicef Unesco And Education For All In Cambodia Education Essay

United Nations International Children ‘s Emergency Fund ( UNICEF ) was established on December 11, 1946. He was created in the intent to assist kids and adult females that faced up many jobs in life. He works with 190 states through state plan to get the better of the obstructions such as poorness, force, diseases, and favoritism which are affected to kids in day-to-day life. He does work really active in planetary administration in footings of supplying educational system, assisting kids from injury, force, and advancing information by utilizing engineering. Furthermore, he besides works with many people barely in order to protect kids from environmental jobs because he does non desire the kids suffer from those activities. However, he believes that kids are still threatened by those jobs because he can non vouch kids from being out those jobs. Meanwhile, he besides works really difficult to happen the schemes to forestall the spread of HIV/AIDS among immature people because h e wants to maintain them from injury and enable to protect them. However, non merely kids but besides adult females he besides promote misss ‘ instruction because he wants to promote misss have a really deep thought, better citizens in society every bit good as a good female parent for her ain kids. UNESCO ( United Nations Educational Scientific and Cultural Organization ) was created on November 4, 1946. He was established in order to work out jobs that related to wellness, poorness, and instruction that provide installations throughout the universe. In a nut shell, he is responsible for advancing peace, societal justness, human rights, and international security through international cooperation on educational scientific discipline and cultural plans. He has 193 member provinces and 7 associate member provinces ; hence, we trust that we will success in footings of covering with those jobs that we work manus in manus together. More of import than this, we play a critical function in United Nations in footings of cut downing utmost poorness in developing states, extinguishing gender inequalities in primary and secondary instruction, advancing sustainable development and particularly he wants to accomplish the end by 2015. As a consequence, he besides has his ain intent for futur e that he will seek to advance instruction every bit much as possible, societal justness and planetary peace and cooperation. MDG ( Millennium Development Goal ) was adopted by UN Millennium Summit in September 2000. He was established for ASEAN as a whole in order to do all the states in ASEAN obtain the end by 2015 successfully which is ASEAN Community. Furthermore, today he non merely has the fiscal resources to stop utmost poorness but besides has technological cognition to forestall this job in order to avoid this job go on once more and once more. Therefore, MDG has put eight chief schemes for ASEAN states to follow in order to develop the state such as: 1/ Eliminate utmost hungriness and poorness 2/ Achieve cosmopolitan primary instruction 3/ Promote gender equality and empower adult females 4/ Reduce kid mortality 5/ Improve maternal wellness 6/ Combat HIV/AIDS, malaria, and other diseases 7/ Ensure environmental sustainability 8/ Develop a planetary partnership for development. Education was offered by the WATS ( pagoda ) in Cambodia that provided merely male population to larn, in the yesteryear. Female were prohibited. That ‘s why Cambodia remains a batch of uneducated misss that had no activities or action which involve in societal work after Pot Pot government. Furthermore, during that period, the figure of qualified people such as instructors, research workers, and technicians, physicians were died. More significantly, that government led to get rid of instruction, consistently destructing learning stuffs, and so on. Schools and universities were closed. Not for long clip, this government was collapsed. The new authorities came up and had responsibility to retrace the instruction system since these substructures were to a great extent destroyed and besides many educated people were killed. However, he was rather hard to retrace the instruction system because our authorities did non hold ability to put in all the stuffs instantly since we merely w oke up from war. Actually, he can did it unless taking for long times.MC # 2: Function of UNICEF, UNESCO, the MDG, and Education for All in CambodiaUNICEF plays a critical function in Cambodia in footings of assisting hapless people and uneducated people particularly people populating in urban or rural country. Beside this job, UNICEF besides provides gender equality in Cambodia. There is no favoritism in this society. Furthermore, all kids have an equal chance to have an instruction and they can anticipate what they will acquire for their future life. They have a really strong committedness for their future life. UNESCO plays an of import function in Cambodia in footings of sharing cognition. Knowledge can do or take people to hold a really bright hereafter because when people have knowledge, people can protect themselves from something go on around them. However, UNESOC besides has another intent that desiring to construe to Cambodia is peace and security by advancing coaction among the states through instruction, scientific discipline, and civilization in order to foster cosmopolitan regard for justness, for the regulation of jurisprudence, and for the human rights and cardinal freedoms which are affirmed for the peoples of the universe, without differentiation of race, sex, linguistic communication or faith. These are sensible that Cambodia demand because after woke up from war, Cambodia still non stay peace. MDG is one portion of organisation. He besides has map to develop since Cambodia remains a batch of poorness after war. In the existent state of affairs that MDG was practiced in Camb odia about how to extinguish poorness. Cambodia needs to set up a mechanism for periodic reappraisals of advancement made towards bettering policy coordination at all degrees. However, it ‘s rather hard for Cambodia to make so because Cambodia is considered as a developing state which has no adequate natural stuffs, fiscal, human resources and so on. Nonetheless, in order to accomplish MDGs, non merely Cambodia but besides other states need to develop appropriate roadmaps suited to local demands and conditions. Education for all is really of import for Cambodia. Education is the primary vehicle by which economically and socially marginalized grownups and kids can raise themselves out of poorness. Besides, instruction has a critical function in authorising adult females, safeguarding kids from exploitative the environment, and commanding population growing. Education is the great thing that Cambodia need because Cambodia needs human resources to develop state to go comfortable state.MC # 3: The advantages of UNICEF, UNESCO, the MDG, and Education for All in CambodiaUNICEF has a batch of advantages that UNICEF provides to the hapless states particularly Cambodia. UNICEF working with many organisations in order to cover with some issues such as poorness, force, disease, and favoritism in a kid ‘s way that many states is confronting. This organisation works really hard in order to get the better of those jobs. Notwithstanding, he tries to advance misss instruction for guaranting that miss s can finish primary instruction as a lower limit in order to protect themselves from force, foolish, and so no. Furthermore, he works to support the spread of HIV/AID among immature people because it is right to maintain them from injury. However, from my point of position, I can state that the activities that UNICEF act is really right for Cambodia because after Pol Pot government ( race murder ) , Cambodia remains many people who burden HIV/AID virus, orphaned, poorness, and uneducated people. Therefore, the manner that UNICEF performs provides a batch of advantages to Cambodia to extinguish those diseases and all issues that happened in Cambodia from the past until now. Nevertheless, UNICEF does non hold ability to assist Cambodia what he has met presents but he can assist Cambodia to cut down those issues at least from 0 % to 50 % . UNESCO is besides help hapless states to avoid those jobs, but he concentrates much on instruction since this organisation wants people all over the universe to go knowing individual that society need in order to divert from force, poorness, and so on. This organisation has his map similar to UNICEF. Hence, I can state that since this organisation takes topographic point in Cambodia, now there are many people understood much on instruction particularly in university and besides many adult females working in ministries and companies. Since I described briefly about rubric of the end MDG before, now I will state them more clearly. Of class, there are eight ends for accomplishing the MDG by 2015. However, he is really difficult to make so since some states can non pattern its. First, eradicate extreme poorness and hungriness which steps by utilizing poorness spread ratio, portion of poorest quintile in national ingestion, prevalence of scraggy kids under-five old ages of age, and proportion of own-account and lending household workers in entire employment to do certain that there is lower poorness or hungriness occur in the state. Second, achieve cosmopolitan primary instruction which will be guarantee that by 2015, kids everyplace, male childs and misss likewise, will be able to finish a full class of primary schooling for guaranting that miss can obtain knowledge every bit to work forces without favoritism. This is a really of import point that Cambodia needs. Third, promote gender equality and empower adult fema les which is the intent of eliminate gender disparity in primary and secondary instruction, sooner by 2005, and in all degrees of instruction no subsequently than 2015 by sharing the adult females in pay employment in the non-agricultural sector. Fourth, cut down kid mortality is the mark to cut down by two tierces, between 1990 and 2015, the under-five mortality rate to do certain that there is a low of infant mortality rate. Fifth, better maternal wellness by utilizing the maternal mortality ratio, and utilizing prophylactic prevalence rate. Sixth, combat HIV/AIDS, malaria and other diseases in order to do certain that those disease will be reduced by 2015 which utilizing the ratio of school attending of orphans to school attending o non-orphans aged 10-14 old ages. Seventh, guarantee environmental sustainability in the mark that integrate the rules of sustainable development into state policies and plans and change by reversal the loss of environmental resources. Eighth, develop a planetary partnership for development in the arm of developing farther an unfastened, rule-based, predictable, non-discriminatory trading and fiscal system and turn to the particular demands of the least developed states. Education for all is utile for everyone without favoritism both male childs and misss in this universe. Learning is the most powerful tool because the more we know the better we get along in the universe. If we do non hold cognition, we are really hard to populate in this universe since this universe is traveling to seek modern engineering, Furthermore, we have knowledge, we are certainly to acquire a better occupation with a high paid.MC # 4: The impact of UNICEF, UNESCO, the MDG, and Education for All in CambodiaFor positive point of UNICEF, he starts his cooperation in Cambodia in 1952 as a portion of its planetary and Asia-wide regional plan to better kid wellness and wellbeing. UNICEF was helped Cambodia a batch in footings of instruction system, wellness attention service, so on and so away. He helps Cambodia in the intent of forcing Cambodia to go a strong state that full of human resources that would be helped Kampuchean citizens in the following hereafter since the state can develop or non develop based upon on human resources. Positive point of UNESCO, it is non much impact since it is non play in a major function in Cambodia. It merely shows us merely about the negative point. UNESCO provides disadvantages more than advantages. For illustration, in instance PREAH VIHEAR TEMPLE, harmonizing to the web site of one of the celebrated Thai English Newspaper called THE NATION REPORT which announce on Thursday 21, May 2009, said that the UNESCO is unjust because the occupation of UNESCO is to guarantee that this heritage is good conserved. Why UNESCO has to inquire for permission from Thailand if they are merely visit Cambodia? Is Thailand Cambodia ‘s parent? Actually, for this statement, it depicts really clear that UNESCO is unjust in footings of judging the universe heritage. MDG, really MDG play a really of import function in Cambodia in footings of assisting Cambodia to cut down poorness in the state chiefly. A few month ago, in Phnom Penh metropolis ( in forepart of BO TUM VATEY pagoda ) , many official authorities ran this plan for advancing by gather together many people include high school pupils, workers, motor cab, and so on came to speak in order to portion some information which relate to poorness to do certain that these sorts of people understand good what is poorness and where does it come from. Conversely, it is rather difficult to make so since our state deficiency of human resources. Education for All, Cambodia is increasing a batch of schools from the lower grade to the higher grade at everyplace in the state to do certain that all people can hold opportunity to derive cognition in order to better themselves to back up populating criterion. Besides, I think that it is non much influence to Cambodia because now many people are educated so they understand good before they decide to make anything. We can see that most of people are be givening to travel to school.MC # 5: Future position of UNICEF, UNESCO, the MDG, and Education for All in CambodiaUNICEF plays a really of import function in Cambodia in footings of supplying instruction, assisting kids from force, advancing on the utilizations of engineering. Besides, UNICEF works on five issues of kids such as instruction, safety of kids and growing, preparation of kids in their early age, mistreatment and maltreatment guard the kids from maltreatment, and HIV/AIDS. Furthermore, UNICEF works really difficult to happ en the schemes to forestall the spread of HIV/AIDS among immature people since he wants to keep kids from injury and enable them to protect others. In add-on, UNICEF is working with many organisations in order to cover with some issues such as poorness, force, diseases, and favoritism. He works much on developing state. Additionally, he is besides holding a position since he works really difficult for assisting hapless states. The policy model covers all those who are deemed excluded, consisting handicapped kids, working kids, street kids, those with disablements, those with larning troubles, the really hapless, those in geographically distant countries, those from lingual, cultural or cultural minorities, those with parents who have stigmatized occupations, those with HIV or whose parents have HIV, those displaced by struggle or natural catastrophe, but non accomplishing in school and those that drop out of school. Integrated schooling systems consisting of all denominations, are t o be considered, to further societal coherence and better apprehension among communities. UNESCO is besides play a really indispensable manner to assist Cambodia. It helps Cambodia in the intent of forcing Cambodia to go a good state that full of human resources that would be help Cambodia in the following hereafter. Besides, it might believe that state can develop based upon on human resource. Furthermore, UNESCO is besides help hapless states to avoid those jobs, but he concentrates much on instruction since this organisation wants people all over the universe have instruction to divert from force, poorness, and so on. However, UNESCO is still weak that can non happen the right thing to the victim since the victim demand for aid like Cambodia. This organisation has his map similar to UNICEF. Hence, I can state that since this organisation takes topographic point in Cambodia, now there are many people understood much on instruction particularly in rural country. Besides, people who live in countryside let their girls to travel to school. Of class, now it shows us really exactly that there are many adult females pupils who are analyzing in university and besides many adult females working in ministries and companies. The MDG is besides plays a major function in footings of assisting hapless provinces for covering with some issues that those states are confronting. Harmonizing to my point of position, I can reason that the MDG is really difficult to accomplish the end by 2015 since the status of MDG for hapless provinces are rather difficult for them to follow. For the existent illustration of Cambodia, Cambodia is really difficult to obtain those standards since Cambodia deficiency of natural stuffs, human resources, so on and so forth. However, I trust that by 2020, the MDG can derive these aims since the hapless provinces are traveling to modernization provinces. Finally, the Education for All, I believe that it will obtain its end since it provides tonss about instruction system to hapless states since the hapless provinces deficiency of scheme to learn to pupils and no criterion for Cambodia pupils as a whole.

Five basic components of human societies Essay

There are five basic components of the human societies: population, culture, material products, social organization, and social institutions. These components may either deter or promote social change. The size of population will greatly affect the social change. If the population is large, chances are social changes will be promoted. More people will usually result in more ideas, pushing for changes because a larger population will generate more problems and it has a greater need for solutions. A large population will also have more norms and laws and sanctions. Culture includes values, beliefs, norms, knowledge, language, and symbols. Culture can both deter and promote social changes. A society’s belief and values can be essential for technology to grow and develop. Some societies tend to be more conservative and would like for things to continue to be the same, which will likely deter that society from social changes. However, as a society gained more knowledge, there will be people who will want to push for change because of that gained knowledge. New information and discoveries will result in new inventions. Material products consist of a limited amount. Material products will be more likely promote changes because people will try to find other alternatives for those existing products. Social organization is a network of relationship between its members. There are people who hold social positions and political roles that may deter or promote changes. Reformers who hold office positions will persuade more changes in society while conservationist will want things to remain the same. Social institutions consist of the education system, family, economy, government, and religion. A society’s education system has a big influence on the society. If that education system is promoting changes, people in that society will grow up having that thinking, vice versa. A person’s upbringing will also influence a person’s push for change or deterrence of change. The economy’s status holds great importance for change or not. If an economy is not doing so well, changes will likely occur. The government may be pushing for change if a reformist holds political position but if a conservationist will want things to be the same. Religion ties in with a  person’s belief and values. Depending on the religion, a person will be more likely to have moral values and religious beliefs that will either want change or deter from change.

Wednesday, August 14, 2019

Short Essay on Racism

t ein the film and begins the movies â€Å"depiction of Arab culture with a decidedly racist tone† (Giroux, 104). An Arab merchant sings the lyrics: â€Å"Oh I come from a land/From a faraway place/Where the caravan camels roam. /Where they cut off your ears/If they don’t like your face. /It’s barbaric, but hey, its home† (Giroux, 104). The message that is given right at the beginning of the film is that the Middle East is a desolate wasteland where the justice system runs on a simple limb-removal policy. These words caused an uproar in Arab countries and the lyrics were later changed to: â€Å"Where it’s flat and immense/ And the heat is intense† which replaced the original verse, â€Å"Where they cut of your ear/ If they don’t like your face† (Giroux, 105). Not only were these lyrics violent but they were truly an example of the worst kind of racism. Aladdin depicts the Arabic world and its people as exotic, humorous, and violent. The American cartoon portrays all Arab men as either street thugs,†¦ n the film and begins the movies â€Å"depiction of Arab culture with a decidedly racist tone† (Giroux, 104). An Arab merchant sings the lyrics: â€Å"Oh I come from a land/From a faraway place/Where the caravan camels roam. /Where they cut off your ears/If they don’t like your face. /It’s barbaric, but hey, its home† (Giroux, 104). The message that is given right at the beginning of the film is that the Middle East is a desolat e wasteland where the justice system runs on a simple limb-removal policy. These words caused an uproar in Arab countries and the lyrics were later changed to: â€Å"Where it’s flat and immense/ And the heat is intense† which replaced the original verse, â€Å"Where they cut of your ear/ If they don’t like your face† (Giroux, 105). Not only were these lyrics violent but they were truly an example of the worst kind of racism. Aladdin depicts the Arabic world and its people as exotic, humorous, and violent. The American cartoon portrays all Arab men as either street thugs,†¦

Tuesday, August 13, 2019

The Glass Menagerie and the two different worlds (reality and fiction) Research Paper

The Glass Menagerie and the two different worlds (reality and fiction) - Research Paper Example Laura is enrolled in a business school in order to start establishing her own life, but due to shyness, she drops out of school and secretly spends her time wandering in the city (Oliveira 1).Tom, who dislikes his shoe warehouse jobs, finds solace in alcohol, movies and literature. This surprised his mother (Oliveira 1).Amanda and Tom plot to get Laura a suitor at the warehouse, and Tom chooses Jim O’Connor who is his casual friend. A dinner is organized for Laura to meet Jim (Oliveira 1). Just before the dinner, Laura discovers that Jim, whom she had a crash on while in high school, is the suitor. Laura however refuses to eat dinner with the family and Jim and pretends she is ill (Kolin 66). Amanda, who was dressed in her youthful dress, ends up talking with Jim throughout the meal. Later after the dinner though, Laura opens up and confesses to Jim that she had a crash on him in high school(Oliveira 1).Jim reproaches her for being shy and having low self-esteem but also prais es her for being unique. Jim mentions that he has to leave and see his fiancà ©e (Kolin 34). It is therefore discovered that he is engaged. This leaves Amanda and Laura sad, and they blame Tom for not being attentive and for being selfish dreamer, because he is the one who brought Jim (Oliveira 2).Not long after Jim had visited, Tom gets fired from his shoe ware house job and leaves his home. As he travels, years later, he finds it very hard to forget and leave behind guilt memories of Laura (Kolin 23). Tennessee Williams, author of the play struggled with homosexuality which made him feel like an outsider in his society. This and other experiences made him feel empathetic to vulnerable people of the society (Oliveira 2).This play presents similarities between the dysfunctional Williams family and the play’s family, the Wingfield family. There are similarities between the fictional Wingfield family and Tennessee Williams’s own family (Kolin 23). The Glass

Monday, August 12, 2019

Management of Information System Change Essay Example | Topics and Well Written Essays - 2750 words

Management of Information System Change - Essay Example The widespread impact of continuous spells of pandemics and other biological attacks alerted the authorities of need for introducing and action plan against the emergencies related to all epidemics and pandemics. The foundation for BioSense was formulated as a national action aimed at improving the bio-surveillance facilities in the country with the amalgamation of existing resource data from all health care organisations and national agencies of data collection. The operation of BioSense is a great advantage to the emergency management system as it enhances the intensity of early detection of health related issues and the acceleration of remedial proceedings. The total action pack of BioSense is framed for simultaneous execution of collection, analysis and evaluation of public health care data from all sources specifically. The case contexts and beneficiary zones of BioSense’s services are DoD and VA hospitals, ambulance clinics, and large clinical laboratories apart from the direct live-wire data collection centers such as local hospitals, healthcare systems, and syndrome-surveillance systems. The functioning of BioSense has brought revolutionary changes in the effect of bio-emergency management systems with the implication of its uses in disease trend monitoring and tracking potential disease cases for synchronizing access to existing health surveillance systems. The initial plan of installing the system was on the ratio of one for each ten cities in the country in 2005.... ion, and in most cases, its prominence was seen to be nullified for lack of support and acceptability from larger hospital units and local health care providers. After evaluating all the points discussed in the journal, the eviction of such a system can be justified for many reasons described in the explanation that are to be read on. 2. Challenges for Implementation BioSense represents the proficiency of the web-based application of the software monitoring inter-hospital health and disease assessment. However, it is obvious that the operation of BioSense is a high profile deal with many professionals is required to access the conditions every moment. Detecting the early symptoms of a bioterrorist attack was the aim of CDC’s proposal for the installation of this system. It was also aimed at providing standards, infrastructure and data acquisition for early detection of every unfriendly situation. The introduction of new software was largely expensive for its operation. As evid ent from the details of the US Government Accountability office, BioSense acquired the financial aid of over $200million till 2006. The managerial challenges faced by BioSense were attributed to the functionary units in association with data collection. Majority of the questions were about the proximity and accuracy of the data collection from the three appointed sources namely, Department of Defense (DOD) Military Treatment Facilities, Department of Veterans Affairs (VA) treatment facilities and the Laboratory Corporation of America (LAbCorp) as to how timely were the data based on emergency situations. This question was supported by the irrelevance of the resource data as it took longer time to cover the concerned regions than the time required for emergency procedures of precocious measures.

Sunday, August 11, 2019

Trends in obesity over the last 20 years and implications for the Coursework

Trends in obesity over the last 20 years and implications for the future - Coursework Example This essay "Trends in obesity over the last 20 years and implications for the future" outlines an increasing trend in the obesity of the USA in the last twenty years and if the effects of the policy implemented are ineffective in the USA. The body mass index (BMI) includes a significant importance. It is a measurement of the weight defined as kg per square meter. In a conventional manner when the range of BMI is between 25 and 30, then the person is said to be overweight and the person is said to be obese when the value is greater than 30 (Akil & Ahmad, 2011, p. 58). This obesity problem is a common trouble in almost every country in the world especially in the Western countries. Statistical analyses is an important tool which will be directed towards analyzing the trends of obesity in different countries and can give us a clear idea about the historical pattern and suggest important policies for the future. Obesity is very crucial problem in every society and it is indeed an importa nt problem in the developed nation like United States of America (USA). There has been a growing awareness of the health problems attached with weight as well as availability of light or no fat foods. But despite that there had been a significant incidence of obesity problem in the United States of America. There has been documentation initiating from period as early as 1960s and there has been a consistent year to year rise in the percentage of adults who are suffering from overweight. This trend increases seem to have accelerated. Data collected from the Behavioral Risk Factor Surveillance System (BRFSS) indicates that within a period of 1985-1995 there has been an increase in the BMI from a level of 29.2 to 34.4 and there has been an increase in the percentage from a magnitude of 8.6 to 15.2. The correlation between overweight and many of the chronic diseases as well as various obnoxious health outcomes has made this a serious health concern. Obesity as a factor also gets associa ted with nation’s burgeoning health care bill. It is estimated that for the year 1990, the costs including direct and indirect costs of the excess weight in the USA were figured at the amount of $46 billion and $ 23 billion respectively (Binkley, Eales & Jekanowski, 2000). The propositions which will be examined in the paper are: 1. There has been an increasing trend in the obesity of USA in the last twenty years 2. Obesity is the highest for USA as compared to other countries 3. Race also plays an important part in USA with respect to obesity 4. The standard deviation of obesity of the data of USA is highly scattered 5. The effects of the policy implemented are ineffective in USA. 4. Analysis Before moving into analysis, the method of data collection is to be mentioned. For the purpose of data collection, we have relied on the government site of USA .The database for data collection which is used is the center for disease control and prevention (CDC) in USA. CDC helps in the creation of expertise, information as well as tools which the people as well as the communities requires for the purpose of protecting their health with the help of promotion, disease prevention, injury and disability as well as preparedness for the threats of new health problems. CDC directs towards accomplishing its mission through working with the partners all over the nation as well as in a global basis for the purpose of detecting as well as investigating the health problems, conducting research as